RE: DNS role (RE: NATs as firewalls, cryptography, and curbing DDoS threats.)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



 
> One approach for "name" based authorization would place an encoded  
> hash label of the domain name being authorized within the 
> authorizing  
> domain.  Client validation can be as simple as resolving the name of  
> the client, where this name can then be utilized in conjunction with  
> a "name" based authorization.  In the case of DKIM, DNS also 
> supplies  
> the public key as well.

Is there a draft describing this somewhere?

--Michael Dillon


_______________________________________________

Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf


[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]