On Thu, 06 Nov 2008 21:51:24 +0100, Dean Anderson <[EMAIL PROTECTED]> wrote:
The domain structure of a TLD is not something that changes frequently,
it
is therefore suitable for a static file that contain the necessary
information, something which will also reduce network traffic.
This static file is a bad idea waiting to not happen. Root servers
Just assure you: By "static" I do not mean a file that won't change for
the next 100 years. I mean "static" in the web service sense, as opposed
to "dynamic" script generated content.
My suggestion in earlier versions of the draft have been that the client
caches the received file for 30 days, then revalidate it, and that new
registry-like domains should be included 90 days before going active.
This type of information is not updated frequently enough that a dynamic
check for every domain is needed, nor is the number of domains a sizeable
fraction of the domains registered, but small enough to make for a
relatively small download every month or two. Nor is it likely to happen
often (if ever) that a registry-like domain changes to an ordinary domain;
it is more likely to be the other way around.
I agree that the idea about figuring out tld substructure in order to
determine cookie administration is also fatally flawed, for the reasons
Well, as I've mentioned earlier, cookies is the area that have spurred my
development of this specification. It is not the only area asking for such
information, as I've also mentioned earlier, for example URL display in
FF3 and IE8, and if I am not mistaken, Google Chrome. And there are likely
more.
One area where developers want to use such information is to help users
understand where they actually are on the Internet, for example when being
directed somehow to
"www.my-trusted-bank.com.foo.bar.and.something.else.malicious.example.net",
by highlighting "malicious.example.net", and making the rest almost
invisible.
already described: There is no way to determine administrative control
via DNS queries. Either case of same SOA or different SOA could mean
same admin control or different admin control.
Better suggestions for discovering and/or adding the information we need,
or better ways to solve the problems we are working on, will be welcomed.
In order to limit access to cookies to its admin control, you need to
change the cookie format, and probably encrypt the cookie data, and make
changes to the HTTP protocol to make it clear what admin authority
sourced the date, is requesting the data, and to what admin authorities
the data can be provided. It is impossible to infer this information
from the information now available to the browser. Protocol and format
changes are required. DNS is the wrong place to look.
As mentioned earlier in this thread, I am also promoting an updated cookie
specification. However, that is going to take a while to implement when
the draft eventually have become an RFC.
However, what has helped cookies get to the marketcoverage they do have
(just about every web site serving anything more advanced than static HTML
files) is their ease of use. Write a spec that make them any more complex
to use, and the spec will not get implemented, much less adopted by the
market. My draft may actually be close to that edge because it requires
the host to set the cookie for a subdomain in which the host's name is the
suffix, making website deployment more difficult in some respects.
But, as mentioned, cookies is not the only area wanting this information.
Not anymore.
So: Treat cookies as a usage example (it is included as a profile example
in the draft; BTW I did consider, but decided against, releasing those two
parts as separate documents), not the sole reason for the subtld draft's
existence.
--
Sincerely,
Yngve N. Pettersen
********************************************************************
Senior Developer Email: [EMAIL PROTECTED]
Opera Software ASA http://www.opera.com/
Phone: +47 24 16 42 60 Fax: +47 24 16 40 01
********************************************************************
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop