ietf
[Top] [All Lists]

Re: Security and suffixes (Re: Cite on DNS-related traffic.)

2000-06-02 13:30:03

  *> From owner-ietf-outbound(_at_)ietf(_dot_)org Fri Jun  2 13:09:06 2000
  *> Date: Fri, 02 Jun 2000 15:41:48 -0400
  *> From: John C Klensin <klensin(_at_)jck(_dot_)com>
  *> Subject: Re: Security and suffixes (Re: Cite on DNS-related traffic.)
  *> In-reply-to: <3937F54F(_dot_)F0D9FFF8(_at_)isi(_dot_)edu>
  *> To: Joe Touch <touch(_at_)ISI(_dot_)EDU>
  *> Cc: ietf(_at_)ietf(_dot_)org
  *> MIME-version: 1.0
  *> X-Mailer: Mulberry/2.0.0 (Win32)
  *> Content-transfer-encoding: 7bit
  *> Content-disposition: inline
  *> Content-Transfer-Encoding: 7bit
  *> X-Loop: ietf(_at_)ietf(_dot_)org
  *> Content-Transfer-Encoding: 7bit
  *> X-Lines: 15
  *> 
  *> 
  *> 
  *> --On Friday, June 02, 2000 10:56 AM -0700 Joe Touch
  *> <touch(_at_)ISI(_dot_)EDU> wrote:
  *> 
  *> > The use of the trailing dot (www.netscape.com.) remains
  *> > a useful way to force the resolver to avoid suffix extensions.
  *> 
  *> And a useful way to induce massive confusion, since many
  *> applications do not recognize the hack and won't pass it to a
  *> resolver (which, of course, may or may not recognize it either).
  *> 
  *>    john
  *> 

John,

Hack??  I will admit to being largely out of touch with this issue, but
I recall the discussions in the IAB while the DNS was under
development.  Far from being a hack, I believe it was an architectured
solution to the problem.  It is documented (at least) in section
6.1.4.3 of RFC 1123.

Bob Braden