On 2007-05-08, Garrett Wollman <[EMAIL PROTECTED]> wrote: > In article <[EMAIL PROTECTED]>, > Steve Kostecke <[EMAIL PROTECTED]> wrote: > >>I'm not sure why you would consider the server's trusted host parameters >>to be "unauthentic". > > And they are made "trusted" by simply asserting that they are so > (i.e., by setting a bit in a self-signed "certificate")?
There is no Central Scrutinizer who decrees whether or not a server is "authentic" or "trusted". The entity generating the host parameters marks them as trusted by using the '-T' switch during the generation process. Who should perform this task for a particular application is a policy decision, not an implementation decision. -- Steve Kostecke <[EMAIL PROTECTED]> NTP Public Services Project - http://ntp.isc.org/ _______________________________________________ questions mailing list [email protected] https://lists.ntp.isc.org/mailman/listinfo/questions
