On Oct 21, 2011, at 11:13 AM, Keith Moore wrote:
IMO: search lists are useful, but only with "bare names" - and the behavior of 
those should be implementation dependent.  Trying to nail it down will break 
too much widespread practice.

On a desktop workstation they are useful, because you can largely trust the 
security of the physical network.   On mobile nodes, though, they are harmful, 
because they open up a really easy avenue for exploit.

On MIF nodes, they also open up potential for mistakes.   So if we are to meet 
the spirit of your request here, it will still require a document describing 
what the mistakes are, and providing advice on how to avoid them.

_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to