Re: WCIT outcome?

Dave Crocker <dhc@dcrocker.net> Tue, 01 January 2013 19:08 UTC

Return-Path: <dhc@dcrocker.net>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8068221E803F for <ietf@ietfa.amsl.com>; Tue, 1 Jan 2013 11:08:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.197
X-Spam-Level:
X-Spam-Status: No, score=-6.197 tagged_above=-999 required=5 tests=[AWL=0.402, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IjXCKpnCoPTz for <ietf@ietfa.amsl.com>; Tue, 1 Jan 2013 11:08:22 -0800 (PST)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) by ietfa.amsl.com (Postfix) with ESMTP id 971E421E8044 for <ietf@ietf.org>; Tue, 1 Jan 2013 11:08:22 -0800 (PST)
Received: from [192.168.1.66] (76-218-9-215.lightspeed.sntcca.sbcglobal.net [76.218.9.215]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id r01J8Kkt002618 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Tue, 1 Jan 2013 11:08:21 -0800
Message-ID: <50E33423.6050800@dcrocker.net>
Date: Tue, 01 Jan 2013 11:08:19 -0800
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/17.0 Thunderbird/17.0
MIME-Version: 1.0
To: John Day <jeanjour@comcast.net>
Subject: Re: WCIT outcome?
References: <CAMm+Lwh2cHRY+Dk2_SDtZZmUbPcgRpP89u3DHUcniJDrKrX_pw@mail.gmail.com> <CAMzo+1a0-90dnjnvs48a9DcNN9DY_edF5hH0__4XRuCaLHtL6Q@mail.gmail.com> <CAMm+LwjzjLc2-=4EdxwHOi21B3dOBUohYc5hhXZHL_Pk+iBBmQ@mail.gmail.com> <6.2.5.6.2.20121229192941.0aae33e8@resistor.net> <CAMm+LwiC0xtJU4vnGFPvAG4VKZdj7Tf3LfW0+pzwxKWTegRREw@mail.gmail.com> <a06240800cd074efd45b8@10.0.1.3> <CAMm+Lwiq+DCzXw572wKs78DG+XzYsJtwCVSPvNuVHSrT=Cr2nA@mail.gmail.com> <a06240809cd0799fee029@[10.0.1.3]> <50E29EE0.1080107@gmail.com> <50E32F14.3090409@dcrocker.net> <a06240818cd08dffff813@[10.0.1.3]>
In-Reply-To: <a06240818cd08dffff813@[10.0.1.3]>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.17]); Tue, 01 Jan 2013 11:08:21 -0800 (PST)
Cc: IETF Discussion Mailing List <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Jan 2013 19:08:28 -0000

On 1/1/2013 10:52 AM, John Day wrote:
> I was thinking about that after I sent my email.  I actually don't think
> there is an argument for ITU holding the IANA function.

And just to make sure my own message was clear:  I wasn't commenting on 
the merits of the view, but merely trying to report the facts of what I 
recall taking place at the time.


> Domain names I guess would follow since there are merely macro strings
> for network addresses.

While this is a topic serving more as a discussion black hole than 
likely to engender intellectual opportunity, I'll point out that domain 
names are -- and I think always have been -- quite a bit more than 
merely being macros for network addresses.

The mapping to network addresses has (always?) been the primary use, but 
they are a discrete name space with social as well as operational uses. 
  That is, the social aspects serve as distinct from the mapping aspects.

For that matter, the operational uses have extended considerably beyond 
mapping to addresses.  Given my own activities with DKIM, the obvious 
exemplar is mapping to security parameters.

d/
-- 
  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net