On 2007-05-08, Garrett Wollman <[EMAIL PROTECTED]> wrote:
> In article <[EMAIL PROTECTED]>,
> Steve Kostecke  <[EMAIL PROTECTED]> wrote:
>
>>I'm not sure why you would consider the server's trusted host parameters
>>to be "unauthentic".
>
> And they are made "trusted" by simply asserting that they are so
> (i.e., by setting a bit in a self-signed "certificate")?

There is no Central Scrutinizer who decrees whether or not a server is
"authentic" or "trusted".

The entity generating the host parameters marks them as trusted by using
the '-T' switch during the generation process. Who should perform this
task for a particular application is a policy decision, not an
implementation decision.

-- 
Steve Kostecke <[EMAIL PROTECTED]>
NTP Public Services Project - http://ntp.isc.org/

_______________________________________________
questions mailing list
[email protected]
https://lists.ntp.isc.org/mailman/listinfo/questions

Reply via email to