On Oct 21, 2011, at 11:13 AM, Keith Moore wrote: IMO: search lists are useful, but only with "bare names" - and the behavior of those should be implementation dependent. Trying to nail it down will break too much widespread practice.
On a desktop workstation they are useful, because you can largely trust the security of the physical network. On mobile nodes, though, they are harmful, because they open up a really easy avenue for exploit. On MIF nodes, they also open up potential for mistakes. So if we are to meet the spirit of your request here, it will still require a document describing what the mistakes are, and providing advice on how to avoid them.
_______________________________________________ DNSOP mailing list [email protected] https://www.ietf.org/mailman/listinfo/dnsop
