Path:
ns3.vrx.net!news2.best.com!newsfeed.berkeley.edu!news.msfc.nasa.gov!nntp.mainstreet.net!bug.rahul.net!samba.rahul.net!rahul.net!a2i!dhesi.a2i!dhesi
From: [EMAIL PROTECTED] (Rahul Dhesi)
Newsgroups: comp.protocols.tcp-ip.domains
Subject: Re: NSI may revoke 100's of domains
Date: 14 Jan 2000 02:39:08 GMT
Organization: a2i network
Lines: 60
Message-ID: <85m28c$et6$[EMAIL PROTECTED]>
References: <854smh$[EMAIL PROTECTED]> <BXnd4.41$hP4.1734@burlma1-snr2>
<85kf40$599$[EMAIL PROTECTED]> <85kgdv$[EMAIL PROTECTED]>
<85kita$625$[EMAIL PROTECTED]> <[EMAIL PROTECTED]>
NNTP-Posting-Host: waltz.rahul.net
NNTP-Posting-User: dhesi
X-Newsreader: NN version 6.5.1 (NOV)
X-Comment: Encoded From: line allows replies that preserve original subject
Xref: ns3.vrx.net comp.protocols.tcp-ip.domains:9700
In <[EMAIL PROTECTED]>
[EMAIL PROTECTED] (Sam Wilson) writes:
>In article <85kita$625$[EMAIL PROTECTED]>, [EMAIL PROTECTED]
>(Rahul Dhesi) wrote:
>>In <85kgdv$[EMAIL PROTECTED]> [EMAIL PROTECTED] (Mark Andrews) writes:
>>
>>> It doesn't to me. Aliases also have to follow hostname syntax.
>>> see: RFC 952. Given that *only* record at webforward.ascio.net
>>> is an A record. www.a-.com can therefore be assumed to be an
>>> alias covered by RFC 952.
>>
>>The words 'cname' and 'alias' nowhere appear in RFC 952.
>Correct, but the word "nickname" does. Same function.
Well, maybe. But in any case, RFC 2181 supersedes RFC 952. And RFC 2181
says:
The DNS itself places only one restriction on the particular labels
that can be used to identify resource records. That one restriction
relates to the length of the label and the full name. The length of
any one label is limited to between 1 and 63 octets. A full domain
name is limited to 255 octets (including the separators). The zero
length full name is defined as representing the root of the DNS tree,
and is typically written and displayed as ".". Those restrictions
aside, any binary string whatever can be used as the label of any
resource record. Similarly, any binary string can serve as the value
of any record that includes a domain name as some or all of its value
(SOA, NS, MX, PTR, CNAME, and any others that may be added).
Implementations of the DNS protocols must not place any restrictions
on the labels that can be used. IN PARTICULAR, DNS SERVERS MUST NOT
REFUSE TO SERVE A ZONE BECAUSE IT CONTAINS LABELS THAT MIGHT NOT BE
ACCEPTABLE TO SOME DNS CLIENT PROGRAMS. A DNS server may be
configurable to issue warnings when loading, or even to refuse to
load, a primary zone containing labels that might be considered
questionable, however this should not happen by default.
Note the emphasis, which I have added. The same RFC says
a little while later:
Clients of the DNS can impose whatever restrictions are appropriate o
their circumstances on the values they use as keys for DNS lookup
requests, and on the values returned by the DNS. If the client has
such restrictions, it is solely responsible for validating the data
from the DNS to ensure that it conforms before it makes any use of
that data.
So, a name like a-.com is valid in DNS, but you are free to write a
program that refuses to use it.
>From the DNS perspective, every character value between 0 and 255 is
valid.
QED, EOP, EOD. Y2K.
--
Rahul Dhesi <[EMAIL PROTECTED]>
See my UUNET spam mini-faq at:
http://www.rahul.net/dhesi/uunet.faq.txt