Re: [DNSOP] AS112 for TLDs

Florian Weimer <fw@deneb.enyo.de> Thu, 13 December 2007 21:39 UTC

Return-path: <dnsop-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1J2vmc-0007Hz-9i; Thu, 13 Dec 2007 16:39:54 -0500
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1J2vmb-0007HT-Dg for dnsop@ietf.org; Thu, 13 Dec 2007 16:39:53 -0500
Received: from mail.enyo.de ([212.9.189.167]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1J2vmb-0002lf-1I for dnsop@ietf.org; Thu, 13 Dec 2007 16:39:53 -0500
Received: from deneb.vpn.enyo.de ([212.9.189.177] helo=deneb.enyo.de) by mail.enyo.de with esmtp id 1J2vhh-0006fd-PY; Thu, 13 Dec 2007 22:34:50 +0100
Received: from fw by deneb.enyo.de with local (Exim 4.68) (envelope-from <fw@deneb.enyo.de>) id 1J2vhf-0004ts-U8; Thu, 13 Dec 2007 22:34:47 +0100
From: Florian Weimer <fw@deneb.enyo.de>
To: Stephane Bortzmeyer <bortzmeyer@nic.fr>
Subject: Re: [DNSOP] AS112 for TLDs
References: <20071127141848.GA16571@nic.fr>
Date: Thu, 13 Dec 2007 22:34:47 +0100
In-Reply-To: <20071127141848.GA16571@nic.fr> (Stephane Bortzmeyer's message of "Tue, 27 Nov 2007 15:18:48 +0100")
Message-ID: <87odcuxoqw.fsf@mid.deneb.enyo.de>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 68c8cc8a64a9d0402e43b8eee9fc4199
Cc: dnsop@ietf.org
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dnsop>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
Errors-To: dnsop-bounces@ietf.org

* Stephane Bortzmeyer:

> I cannot find another report about the TLDs most often queried at a
> root name server. Other reports I've seen aggregated data, while this
> small glimpse, however partial, at least *names* the TLDs.
>
> All the non-existing TLDs queried are local domains (such as Apple's
> ".local"), leaking through a configuration error. This looks like a
> job for AS112.

How do you prevent people from serving a non-empty .local TLD?
This change would make AS112 more attractive to miscreants, I guess.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www1.ietf.org/mailman/listinfo/dnsop