Deployment plans 2
Initial key-exchange authentication method based on e-mail exchange
- After upload of key mails with a secret are sent to ZONE-C and ADMIN-Cs
- Reply needed for proceeding with the interaction, ‘veto’ available to have the transaction cancelled.
- Details need to be worked out
Little RIPE NCC manpower needed for key-exchange
Easy interface for zone administrator of the child zone