-----BEGIN PGP SIGNED MESSAGE-----
>>>>> "Zefram" == Zefram <[EMAIL PROTECTED]> writes: Zefram> Last week I published an I-D, draft-main-sane-tld-00, which Zefram> argued that there is a need in various Internet protocols for I'll read your draft, which I have not yet done. Zefram> The debate in dnsop actually centred on whether this is an IETF Zefram> matter at all, rather than on which WG it is relevant to. Some Zefram> said that it's not a technical problem -- it's true that it's not Zefram> a technical problem in the DNS protocol, it's a problem for other Zefram> protocols. There were varying opinions on the extent to which Zefram> ICANN is, or should be, involved. I would generally agree that the issues are mostly political. There are various dynamic DNS systems out there, many are now switching to DNS update protocol from the various UDP based hacks that were out there. The opportunistic encryption draft (draft-richardson-ipsec-opportunistic-02.txt) relies on ability of users' to populate the reverse DNS maps (and then to secure it with DNSSEC). The major obstucle is the "IPtelcos"/CableCos who aren't being very retinscent to actually let people being peers rather than just client-consumers. There is, with dynamic DNS update no reason why they should not permit people with "always-on" IPs to populate the reverse DNS. ] ON HUMILITY: to err is human. To moo, bovine. | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON |net architect[ ] [EMAIL PROTECTED] http://www.sandelman.ottawa.on.ca/ |device driver[ ] panic("Just another NetBSD/notebook using, kernel hacking, security guy"); [ -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: latin1 Comment: Finger me for keys iQCVAwUBO99seIqHRg3pndX9AQGtGgP/QgaFF4R3S/uq7A0R65JwJF8VO8Z1jWIb z37PDtnIEQUSw2mCjOzoV1Ld7AcCOaEpmslfPD8iwptOHKgBaadSI1S7jGAkx9t8 IDx5VpFtolZEugRtgvQT9j8Edi6Lo97Hiurvt1q8kn+ufH4hfL+9nv6vfNFn9KnH NSKLrrMccaM= =8004 -----END PGP SIGNATURE-----