<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html;charset=UTF-8" http-equiv="Content-Type">
</head>
<body bgcolor="#ffffff" text="#000000">
James A. Donald wrote:<br>
<blockquote cite="mid453D7D0A.1070407@echeque.com" type="cite">
<pre wrap="">DNSSEC cannot really be said to exist until there are
well known master root public keys for most well known
top level domains.</pre>
</blockquote>
Supposed, that a few major players involved in OpenID and with the
needed background (without mentioning names) could provide such a
DNSSEC service AND the IDP's would be required to have their DNS hosted
at one or two of these, than all the RP's could verify the responses
received, since the singers would be known to the RP's (even build into
the libraries). This would make RP's extremely secure.<br>
<br>
But I guess, that requiring an IDP to secure its DNS this way is out of
question, if we can't have regular SSL as a requirement to start
with.... ;-)<br>
<br>
<div class="moz-signature">-- <br>
<div><font face="Arial" size="2">Regards</font></div>
<div><font face="Arial" size="2"> </font></div>
<div><font face="Arial" size="2">Signer: Eddy Nigg, StartCom Ltd.</font></div>
<div><font face="Arial" size="2">Phone: +1.213.341.0390</font></div>
</div>
</body>
</html>