[134214] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: .gov DNSSEC operational message

daemon@ATHENA.MIT.EDU (Tony Finch)
Wed Dec 29 10:01:57 2010

In-Reply-To: <13710334.3140.1293593268622.JavaMail.root@benjamin.baylink.com>
From: Tony Finch <dot@dotat.at>
Date: Wed, 29 Dec 2010 15:01:41 +0000
To: Jay Ashworth <jra@baylink.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 29 Dec 2010, at 03:27, Jay Ashworth <jra@baylink.com> wrote:
>=20
> If you do not, then your clients have little hope of spotting insider malf=
easance changes, no?

No cryptography can expose the difference between data that is correctly sig=
ned by the proper procedures and data that is correctly signed by a corrupt p=
rocedure.

Tony.
--
f.anthony.n.finch  <dot@dotat.at>  http://dotat.at/



home help back first fref pref prev next nref lref last post