I've gotta say: this doesn't seem like a useful diuscssion here. IMO the snr on this list is being affected by that, so please stop discussions that are off-topic for this list.
On this list, we're considering how to make pervasive monitoring more expensive. Authenticating end-user devices just is not a part of that. Bulk operations between DNS infratructure nodes is (by itself) just not a part of that. Since those basic functions are not relevant here, please don't continue using this list for that discussion. If you disagree, please start an informed discussion as to how authenticating end-users or their devices assists in making pervasive monitoring harder. Or try argue that protocols used between DNS infrastructure nodes can help make pervasive monitorinng harder. But please do not continue discussion that isn't aimed at making pervasive monitoring harder. Regards, Stephen. (As a list admin) PS: Yes, this mail is a precursor to starting down the road of RFC 3683. If you don't know what that means, please read the RFC. Either way, please stay on topic. _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
