On Sun, 09 Nov 2008 00:30:54 +0100, Dean Anderson <[EMAIL PROTECTED]> wrote:
On Sat, 8 Nov 2008, Yngve N. Pettersen (Developer Opera Software ASA)
wrote:
> So in this case, Opera is creating and maintaining a list, and
> offering it to their clients. Other software, including non-browser
> software, will have to do the same. The problem is that if TLD's do
> not implement a universal dicovery method, any fancy protocol will
> come to "someone is making a list somewhere and you need to know
> this person and trust them". It also
Which is what is currently happening, because the TLDs are not providing
the information (in a machinereadable fashion, at least), and
alternative
discovery and database building methods (crowdsourcing) are being used.
The TLD's cannot provide this information, since they don't know it
themselves. What you are trying to do with 'crowdsourcing' is no
different from early anti-spam efforts (that also failed). There is no
reliable source of the information you seek outside the admin domains
themselves. The TLDs aren't the same as the admin domains, and don't
know if, say, bankamerica.com is the same as bankofamerica.com, nor if
wachovia.com was bought by wellsfargo.com and so are now the same admin
domain.
As an example, the dot-UK registry _ought_ to know that all second level
domains in the dot-UK hierarchy are registry-like, except (possibly)
parliament.uk and maybe a few others, and should be able to create a
specification for that. Similarly, the dot-US registory should be able to
provide a list of all state.us, city.state.us, etc. registry-like domains.
What I am after is a blacklist of registry-like domains, for example
co.uk, ac.uk, uk.com, ny.us, vgs.no, not a list stating that example.co.uk
is an ordinary domain (unless it is an exception on its level of the
hierarchy, and it is more efficient to list the exceptions than the
registrylike domains), such as www.co.uk and vg.no are ordinary "website"
domains. In fact, the less "ordinary" domains there are in the list, the
better.
As for cookie encryption: Can't be enforced, and won't work in any case.
Just as an example, consider a session fixation attack from one
example1.la.ca.us against another site example2.sf.ca.us via the ca.us
domain (aka replay attack; the cookie will be recognized by the site since
it IS valid, even when encrypted by the site for itself). Another example
is that websites could use such wide distribution for some types of
tracking of visitors.
And I repeat: Cookies is just one area of at least four that I am aware of
where the information covered by my draft is requested, and that is not
counting indications I have heard about at least one spec within the IETF
itself (DKIM) where information about the structure (to my understanding)
might be helpful.
--
Sincerely,
Yngve N. Pettersen
********************************************************************
Senior Developer Email: [EMAIL PROTECTED]
Opera Software ASA http://www.opera.com/
Phone: +47 24 16 42 60 Fax: +47 24 16 40 01
********************************************************************
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop