I've gotta say: this doesn't seem like a useful diuscssion here.
IMO the snr on this list is being affected by that, so please
stop discussions that are off-topic for this list.

On this list, we're considering how to make pervasive monitoring
more expensive. Authenticating end-user devices just is not a
part of that. Bulk operations between DNS infratructure nodes is
(by itself) just not a part of that. Since those basic functions
are not relevant here, please don't continue using this list for
that discussion.

If you disagree, please start an informed discussion as to how
authenticating end-users or their devices assists in making
pervasive monitoring harder. Or try argue that protocols used
between DNS infrastructure nodes can help make pervasive
monitorinng harder. But please do not continue discussion that
isn't aimed at making pervasive monitoring harder.

Regards,
Stephen. (As a list admin)

PS: Yes, this mail is a precursor to starting down the road of
RFC 3683. If you don't know what that means, please read the RFC.
Either way, please stay on topic.



_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to