----- Original Message ----- From: "Michael Richardson" <[EMAIL PROTECTED]>
Subject: Re: FW: [Dundi] DUNDi popularity

 You need the PGP model instead.
 Every DUNDi node needs to be a CA/signer. You can have web-of-trust.

 You may also want to look at SPKI:
 (Rivest= R of RSA, Ylonen=SSH)

2692 SPKI Requirements. C. Ellison. September 1999. (Format: TXT=29569
    bytes) (Status: EXPERIMENTAL)

2693 SPKI Certificate Theory. C. Ellison, B. Frantz, B. Lampson, R.
    Rivest, B. Thomas, T. Ylonen. September 1999. (Format: TXT=96699
    bytes) (Status: EXPERIMENTAL)

That's more or less exactly what I was thinking in addressing Anders' issue, then through the certs we have a handoff of trust, and while a single failure would simply identify the end node (identical to the IP address failure), a large scale failure (the real problem) would allow tracking of the bad connectivity point allowing both routing around it, and any additional remedies allowed under law.



Incidentally, through a small extension of the certificate (already enabled through most of the options) we can include link tranversal costs, to address the suggestion made by Jeffrey in a different subthread. With increased connectivity these values would tend towards 0, but as an uptake measure it might be of value.

Joe

_______________________________________________
Dundi mailing list
[email protected]
http://lists.digium.com/mailman/listinfo/dundi

Reply via email to