% > Except that if my forward delegation doesn't work, nobody can come to
% > my web pages.  Even the CEO will notice that (well, after his secretary
% > points it out to him).  From the end user point of view, if forward
% > delegation doesn't work, the host isn't on the Internet (whatever "the
% > Internet" is).

        Based on applications use of the name->address mapping
        Few (if any) existing applications use the address-name mapping.
        
        Some applications try to strengthen the integrity check by
        verifying that the name-address & address-name pairs are
        consistant. Thats -one- step up on the authenication ladder
        and in the absence of any other methods is useful.
        
% As this discussion progresses, I'd like to suggest the following: We
% either work toward a BCP document which says:

        "... work toward a BCP..." is just plain wrong. One documents
        BCPs, not create them on the fly.

% 1. IN-ADDR mappings are required, MUST be properly configured, and
% explains why.
% 
% or.
% 
% 2. IN-ADDR mappings are entirely optional, MUST NOT be used for
% authentication under any circumstances (i.e not even if the IN-ADDR PTR
% result is then looked up to verify), and explains why.


        What applications could be enabled by accurate address-name
        maps?  How can we help enable this?  #1 is closer than #2.

% Right now, at least 15% of the end-user stations are not covered by
% pointer records (data from some very active websites I host). This
% covers dialups, corporate networks, DSL subnets, etc.

        Some preliminary data indicates that the accuracy of 
        the forward database (TLDs et.al.) has dropped below
        the accuracy of the inverse database (in-addr.arpa)
        
        
% -----------------------------------------------------------------
% Daniel Senie                                        [EMAIL PROTECTED]
% Amaranth Networks Inc.                    http://www.amaranth.com
% 


-- 
--bill

Reply via email to