--------
In message <[email protected]>, Tony F
inch writes:

>$ dig +short leapsecond.dotat.at aaaa | sed 's/:6:/:06:/' | sort
>1972:06:30::23:59:60
>1972:12:31::23:59:60
>1973:12:31::23:59:60
>1974:12:31::23:59:60
[...]

Neat :-)

However, I think it is a loosing strategy to send an ever longer
list of addresses, it's only a matter of time before some random
piece of DNS software does something stupid (again).

My plan was to avoid all the redundant information:

        Year
        Month
        Count of leapseconds until end of that month
        Count of leapseconds after end of that month

Bulletin C #48 becomes:

        Date            Count before    Count after
        2014-12         35              35

Bulletin C #49 becomes:

        Date            Count before    Count after
        2015-06         35              36

This way we can do both postive and negative leapseconds.

This fits neatly into a IPv4 address in even the most crude
format:

        14.12.35.35
        15.6.35.36

But my idea was to encode it more tight and add a CRC to detect
DNS-spoofing (hotels free wifi etc.):

        8 bit unsigned year (2015...2270)
        4 bit unsigned month (1...12)
        8 bit signed int before count
        2 bit signed int (after - before) count
       10 bit CRC-10

Obviously the IPv6 mapping can be even more robust.

-- 
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
[email protected]         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.
_______________________________________________
LEAPSECS mailing list
[email protected]
https://pairlist6.pair.net/mailman/listinfo/leapsecs

Reply via email to