Re: GMAIL?

2013-04-19 Thread Robert Yoder

On 4/17/13 6:28 AM, Caio Alves wrote:

Someone has access problems in GMAIL? Here in Brazil, many complaints about
the service.



Google made a change so that the user account name must be just 
MAILBOX, and not MAILBOX@gmail.com.


Deleting the domain name fixed my account this morning.


ry
--



Re: What do people use public suffix for?

2013-04-19 Thread Bjørn Mork
Jay Ashworth j...@baylink.com writes:

 - Original Message -
 From: John Levine jo...@iecc.com

 The public suffix list contains points in the DNS where (roughly
 speaking) names below that point are under different management from
 each other and from that name. It's here: http://publicsuffix.org/
 
 The idea is that abc.foo.com and xyz.foo.com have the same management,
 but abc.co.uk and xyz.co.uk do not.
 
 You don't have to tell me that it's a gross crock, but it seems to
 be a useful one. What do people use it for? Here's what I know of:
 
 * Web browsers use it to manage cookies to keep a site from putting
 cookies that will affect other sites, e.g. abc.foo.co.uk can set a
 cookie for foo.co.uk but not for co.uk.
 
 * DMARC (www.dmarc.org) uses it to find a policy record in the DNS
 that describes a subtree, e.g., if you get mail that purports to be
 from e...@reply1.ebay.com it checks the policy at ebay.com.
 
 What other current applications are there?

 Seems to me that it's a crock because *it should be in the DNS*.

It is already, isn't it?  The NS and SOA records will tell you all there
is to know about zone splits and cross zone relations.

 I should be able to retrieve the AS (administrative split) record 
 for .co.uk, and there should be one that says, yup, there's an
 administrative split below me; nothing under there is mine unless 
 you also get an exception record for a subdomain.

Use the SOA record.  If it is identical for two zones, then the
adminstrative authority for those zones is the same.

For example, microsoft.co.uk and microsoft.com can be considered
under the same administration:

 bjorn@nemi:~$ dig +short soa microsoft.co.uk 
 ns1.msft.net. msnhst.microsoft.com. 2013032601 1800 900 2419200 3600
 bjorn@nemi:~$ dig +short soa microsoft.com
 ns1.msft.net. msnhst.microsoft.com. 2013041803 300 600 2419200 3600

While apple.co.uk and apple.com may be, depending on how strict you
are going to be when comparing:

 bjorn@nemi:~$ dig +short soa apple.co.uk 
 nserver.euro.apple.com. hostmaster.apple.com. 10 1800 900 2592000 1800
 bjorn@nemi:~$ dig +short soa apple.com
 gridmaster-ib.apple.com. hostmaster.apple.com. 2010086586 1800 900 2016000 
86500


etc.


Bjørn



Weekly Routing Table Report

2013-04-19 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.

The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG, LacNOG,
TRNOG, CaribNOG and the RIPE Routing Working Group.

Daily listings are sent to bgp-st...@lists.apnic.net

For historical data, please see http://thyme.rand.apnic.net.

If you have any comments please contact Philip Smith pfsi...@gmail.com.

Routing Table Report   04:00 +10GMT Sat 20 Apr, 2013

Report Website: http://thyme.rand.apnic.net
Detailed Analysis:  http://thyme.rand.apnic.net/current/

Analysis Summary


BGP routing table entries examined:  450189
Prefixes after maximum aggregation:  184599
Deaggregation factor:  2.44
Unique aggregates announced to Internet: 222556
Total ASes present in the Internet Routing Table: 43876
Prefixes per ASN: 10.26
Origin-only ASes present in the Internet Routing Table:   34506
Origin ASes announcing only one prefix:   16073
Transit ASes present in the Internet Routing Table:5787
Transit-only ASes present in the Internet Routing Table:142
Average AS path length visible in the Internet Routing Table:   4.6
Max AS path length visible:  29
Max AS path prepend of ASN ( 19037)  22
Prefixes from unregistered ASNs in the Routing Table:   358
Unregistered ASNs in the Routing Table: 132
Number of 32-bit ASNs allocated by the RIRs:   4729
Number of 32-bit ASNs visible in the Routing Table:3583
Prefixes from 32-bit ASNs in the Routing Table:   10155
Special use prefixes present in the Routing Table:   22
Prefixes being announced from unallocated address space:220
Number of addresses announced to Internet:   2613629004
Equivalent to 155 /8s, 200 /16s and 208 /24s
Percentage of available address space announced:   70.6
Percentage of allocated address space announced:   70.6
Percentage of available address space allocated:  100.0
Percentage of address space in use by end-sites:   94.4
Total number of prefixes smaller than registry allocations:  158679

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:   108086
Total APNIC prefixes after maximum aggregation:   33445
APNIC Deaggregation factor:3.23
Prefixes being announced from the APNIC address blocks:  109312
Unique aggregates announced from the APNIC address blocks:44563
APNIC Region origin ASes present in the Internet Routing Table:4821
APNIC Prefixes per ASN:   22.67
APNIC Region origin ASes announcing only one prefix:   1215
APNIC Region transit ASes present in the Internet Routing Table:818
Average APNIC Region AS path length visible:4.8
Max APNIC Region AS path length visible: 22
Number of APNIC region 32-bit ASNs visible in the Routing Table:500
Number of APNIC addresses announced to Internet:  720782272
Equivalent to 42 /8s, 246 /16s and 67 /24s
Percentage of available APNIC address space announced: 84.2

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911, 45056-46079, 55296-56319,
   58368-59391, 131072-133119
APNIC Address Blocks 1/8,  14/8,  27/8,  36/8,  39/8,  42/8,  43/8,
49/8,  58/8,  59/8,  60/8,  61/8, 101/8, 103/8,
   106/8, 110/8, 111/8, 112/8, 113/8, 114/8, 115/8,
   116/8, 117/8, 118/8, 119/8, 120/8, 121/8, 122/8,
   123/8, 124/8, 125/8, 126/8, 133/8, 150/8, 153/8,
   163/8, 171/8, 175/8, 180/8, 182/8, 183/8, 202/8,
   203/8, 210/8, 211/8, 218/8, 219/8, 220/8, 221/8,
   222/8, 223/8,

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:158276
Total ARIN prefixes after maximum aggregation:79767
ARIN Deaggregation factor: 1.98
Prefixes being announced from the ARIN address blocks:   158919
Unique aggregates announced from the ARIN address blocks: 72644
ARIN Region origin ASes present in the Internet Routing Table:15649
ARIN Prefixes per ASN:10.16
ARIN Region origin 

Re: What do people use public suffix for?

2013-04-19 Thread Joe Abley

On 2013-04-19, at 14:17, Bjørn Mork bj...@mork.no wrote:

 It is already, isn't it?  The NS and SOA records will tell you all there
 is to know about zone splits and cross zone relations.

Not really.

In general, just because a zone is served by the same nameservers as another 
zone doesn't mean that they are administratively equivalent (e.g. for cookie 
hygiene purposes).

Just because two zones are served on different nameservers doesn't mean they 
are administratively separate. Lots of administratively-separate domains share 
the same nameservers.

Drawing related conclusions from similarity of SOA RDATA between zones, or the 
number of zone cuts between a particular zone and the root, or the number of 
labels in a domain name is similarly flawed.

If the rule was just the nameservers need to be the same and the SOA RDATA 
needs to be the same, for some well-documented meaning of 'same' then gaming 
that rule (e.g. for purposes of cookie injection) as a miscreant is 
unpleasantly straightforward.


Joe




Re: What do people use public suffix for?

2013-04-19 Thread Tony Finch
Joe Abley jab...@hopcount.ca wrote:

 If the rule was just the nameservers need to be the same and the SOA
 RDATA needs to be the same, for some well-documented meaning of 'same'
 then gaming that rule (e.g. for purposes of cookie injection) as a
 miscreant is unpleasantly straightforward.

To reinforce Joe's point, there doesn't even need to be a zone cut for
there to be an administrative cut. There are various ISPs and dynamic DNS
providers that put all their users in the same zone, and the common suffix
of a zone like this should be treated as public suffix even though there
is no zone cut.

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
Forties, Cromarty: East, veering southeast, 4 or 5, occasionally 6 at first.
Rough, becoming slight or moderate. Showers, rain at first. Moderate or good,
occasionally poor at first.



Re: What do people use public suffix for?

2013-04-19 Thread Dave Crocker



On 4/19/2013 12:57 PM, Tony Finch wrote:

To reinforce Joe's point, there doesn't even need to be a zone cut for
there to be an administrative cut. There are various ISPs and dynamic DNS
providers that put all their users in the same zone, and the common suffix
of a zone like this should be treated as public suffix even though there
is no zone cut.



Zones are nice constructs for partitioning operational management of DNS 
data, but I believe they were not intended to impart semantics about 
organizational boundaries.


The fact that they often correlate moderately well makes it easy to miss 
the facts that a) that's not their job, and b) the correlation isn't 
perfect.  And the imperfections matter.


That is why there is the current interest in developing a cheap, 
accurate method that /is/ intended to define organizational boundaries.


d/
--
 Dave Crocker
 Brandenburg InternetWorking
 bbiw.net



The Cidr Report

2013-04-19 Thread cidr-report
This report has been generated at Fri Apr 19 21:13:18 2013 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
12-04-13452468  259891
13-04-13452722  260158
14-04-13452855  259735
15-04-13452981  259914
16-04-13453089  260043
17-04-13452364  260094
18-04-13452245  260759
19-04-13452740  260944


AS Summary
 44002  Number of ASes in routing system
 18232  Number of ASes announcing only one prefix
  3037  Largest number of prefixes announced by an AS
AS6389 : BELLSOUTH-NET-BLK - BellSouth.net Inc.
  116992736  Largest address span announced by an AS (/32s)
AS4134 : CHINANET-BACKBONE No.31,Jin-rong Street


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 19Apr13 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 452863   260867   19199642.4%   All ASes

AS6389  3037   91 294697.0%   BELLSOUTH-NET-BLK -
   BellSouth.net Inc.
AS4766  2952  938 201468.2%   KIXS-AS-KR Korea Telecom
AS17974 2514  570 194477.3%   TELKOMNET-AS2-AP PT
   Telekomunikasi Indonesia
AS28573 2629  787 184270.1%   NET Serviços de Comunicação
   S.A.
AS22773 1984  197 178790.1%   ASN-CXA-ALL-CCI-22773-RDC -
   Cox Communications Inc.
AS18566 2067  473 159477.1%   COVAD - Covad Communications
   Co.
AS2118  1430   49 138196.6%   RELCOM-AS OOO NPO Relcom
AS7303  1676  449 122773.2%   Telecom Argentina S.A.
AS4323  1612  402 121075.1%   TWTC - tw telecom holdings,
   inc.
AS10620 2374 1252 112247.3%   Telmex Colombia S.A.
AS4755  1738  643 109563.0%   TATACOMM-AS TATA
   Communications formerly VSNL
   is Leading ISP
AS7552  1170  198  97283.1%   VIETEL-AS-AP Vietel
   Corporation
AS7029  2173 1240  93342.9%   WINDSTREAM - Windstream
   Communications Inc
AS18881  859   21  83897.6%   Global Village Telecom
AS18101 1001  179  82282.1%   RELIANCE-COMMUNICATIONS-IN
   Reliance Communications
   Ltd.DAKC MUMBAI
AS36998 1137  382  75566.4%   SDN-MOBITEL
AS1785  1974 1226  74837.9%   AS-PAETEC-NET - PaeTec
   Communications, Inc.
AS4808  1107  367  74066.8%   CHINA169-BJ CNCGROUP IP
   network China169 Beijing
   Province Network
AS13977  839  130  70984.5%   CTELCO - FAIRPOINT
   COMMUNICATIONS, INC.
AS855737   54  68392.7%   CANET-ASN-4 - Bell Aliant
   Regional Communications, Inc.
AS6983  1134  482  65257.5%   ITCDELTA - ITC^Deltacom
AS8151  1243  607  63651.2%   Uninet S.A. de C.V.
AS22561 1085  454  63158.2%   DIGITAL-TELEPORT - Digital
   Teleport Inc.
AS17676  730  108  62285.2%   GIGAINFRA Softbank BB Corp.
AS24560 1067  447  62058.1%   AIRTELBROADBAND-AS-AP Bharti
   Airtel Ltd., Telemedia
   Services
AS3549  1055  446  60957.7%   GBLX Global Crossing Ltd.
AS34744  656   51  60592.2%   GVM S.C. GVM SISTEM 2003
   S.R.L.
AS3356  1090  494  59654.7%   LEVEL3 Level 3 Communications
AS17908  793  197  59675.2%   TCISL Tata Communications
AS19262  999  403  59659.7%   VZGNI-TRANSIT - Verizon Online
   LLC

Total  44862133373152570.3%   Top 30 total


Possible Bogus Routes


BGP Update Report

2013-04-19 Thread cidr-report
BGP Update Report
Interval: 11-Apr-13 -to- 18-Apr-13 (7 days)
Observation Point: BGP Peering with AS131072

TOP 20 Unstable Origin AS
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS47331   72724  3.2%  35.3 -- TTNET TTNet A.S.
 2 - AS58113   67954  3.0% 102.0 -- LIR-AS LIR DATACENTER TELECOM 
SRL
 3 - AS982961658  2.8%  74.6 -- BSNL-NIB National Internet 
Backbone
 4 - AS840239683  1.8%  35.6 -- CORBINA-AS OJSC Vimpelcom
 5 - AS390925132  1.1%6283.0 -- QWEST-AS-3908 - Qwest 
Communications Company, LLC
 6 - AS270818314  0.8% 231.8 -- Universidad de Guanajuato
 7 - AS36998   16814  0.8%  24.2 -- SDN-MOBITEL
 8 - AS24863   15868  0.7%  27.5 -- LINKdotNET-AS
 9 - AS28573   15560  0.7%  10.3 -- NET Serviços de Comunicação S.A.
10 - AS34984   15326  0.7%  21.1 -- TELLCOM-AS TELLCOM ILETISIM 
HIZMETLERI A.S.
11 - AS33776   14457  0.7% 116.6 -- STARCOMMS-ASN
12 - AS21947   13698  0.6%1956.9 -- TRANSARIA - TransAria, Inc.
13 - AS17974   13486  0.6%  10.8 -- TELKOMNET-AS2-AP PT 
Telekomunikasi Indonesia
14 - AS671313478  0.6%  25.3 -- IAM-AS
15 - AS855113196  0.6%  17.0 -- BEZEQ-INTERNATIONAL-AS Bezeqint 
Internet Backbone
16 - AS453812952  0.6%  27.6 -- ERX-CERNET-BKB China Education 
and Research Network Center
17 - AS27738   12662  0.6%  22.3 -- Ecuadortelecom S.A.
18 - AS211812473  0.6%   8.8 -- RELCOM-AS OOO NPO Relcom
19 - AS29049   11133  0.5%  32.9 -- DELTA-TELECOM-AS Delta Telecom 
LTD.
20 - AS22561   10874  0.5%  57.5 -- DIGITAL-TELEPORT - Digital 
Teleport Inc.


TOP 20 Unstable Origin AS (Updates per announced prefix)
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS6629 7384  0.3%7384.0 -- NOAA-AS - NOAA
 2 - AS109876953  0.3%6953.0 -- PLUMCREEK-AS - Plum Creek 
Marketing, Inc.
 3 - AS335216660  0.3%6660.0 -- MSLA-SCHOOLS - Missoula County 
Public Schools
 4 - AS390925132  1.1%6283.0 -- QWEST-AS-3908 - Qwest 
Communications Company, LLC
 5 - AS194064161  0.2%4161.0 -- TWRS-MA - Towerstream I, Inc.
 6 - AS531684066  0.2%4066.0 -- CIA ESTADUAL DE GERAÇÃO E 
TRANSMISSÃO DE ENERGIA E
 7 - AS6174 5682  0.2%2841.0 -- SPRINTLINK8 - Sprint
 8 - AS146806894  0.3%2298.0 -- REALE-6 - Auction.com
 9 - AS21947   13698  0.6%1956.9 -- TRANSARIA - TransAria, Inc.
10 - AS486128605  0.4%1229.3 -- RTC-ORENBURG-AS CJSC 
Comstar-Regions
11 - AS373672377  0.1%1188.5 -- CALLKEY
12 - AS5074 2376  0.1%1188.0 -- ASN-ATTELS - ATT BMGS
13 - AS9950 3468  0.2%1156.0 -- PUBNETPLUS2-AS-KR DACOM
14 - AS4467 1122  0.1%1122.0 -- EASYLINK3 - ATT Services, Inc.
15 - AS428601021  0.1%1021.0 -- EFT Energy Financing Team 
(Switzerland) AG
16 - AS55062 991  0.0% 991.0 -- GSC-MINNEAPOLISMN - Gannett 
Supply Corp. - Minneapolis, MN
17 - AS222167505  0.3% 750.5 -- SIEMENS-PLM - Siemens 
Corporation
18 - AS23295 750  0.0% 750.0 -- EA-01 - Extend America
19 - AS172932933  0.1% 733.2 -- VTXC - VTX Communications
20 - AS17783 961  0.0% 480.5 -- SRILRPG-AS SRIL RPG Autonomous 
System


TOP 20 Unstable Prefixes
Rank Prefix Upds % Origin AS -- AS Name
 1 - 209.142.140.0/24   9691  0.4%   AS22561 -- DIGITAL-TELEPORT - Digital 
Teleport Inc.
 2 - 92.246.207.0/248589  0.4%   AS48612 -- RTC-ORENBURG-AS CJSC 
Comstar-Regions
 3 - 193.19.90.0/23 8448  0.3%   AS25233 -- AWALNET-ASN Arab Company For 
Internet  Communications Services (AwalNet)LLC
 AS29684 -- NOURNET-ASN Nour Communication 
Co.Ltd - Nournet
 4 - 151.118.18.0/247549  0.3%   AS3909  -- QWEST-AS-3908 - Qwest 
Communications Company, LLC
 5 - 151.118.255.0/24   7520  0.3%   AS3909  -- QWEST-AS-3908 - Qwest 
Communications Company, LLC
 6 - 151.118.254.0/24   7520  0.3%   AS3909  -- QWEST-AS-3908 - Qwest 
Communications Company, LLC
 7 - 192.58.232.0/247384  0.3%   AS6629  -- NOAA-AS - NOAA
 8 - 209.200.208.0/24   6987  0.3%   AS21947 -- TRANSARIA - TransAria, Inc.
 9 - 199.0.244.0/22 6953  0.3%   AS10987 -- PLUMCREEK-AS - Plum Creek 
Marketing, Inc.
10 - 69.165.112.0/206676  0.3%   AS21947 -- TRANSARIA - TransAria, Inc.
11 - 64.25.130.0/24 6660  0.3%   AS33521 -- MSLA-SCHOOLS - Missoula County 
Public Schools
12 - 12.139.133.0/245612  0.2%   AS14680 -- REALE-6 - Auction.com
13 - 202.41.70.0/24 5004  0.2%   AS2697  -- ERX-ERNET-AS Education and 
Research Network
14 - 194.63.9.0/24  4682  0.2%   AS1273  -- CW Cable and Wireless Worldwide 
plc
15 - 69.38.178.0/24 4161  0.2%   AS19406 -- TWRS-MA - 

Re: What do people use public suffix for?

2013-04-19 Thread Jimmy Hess
On 4/19/13, Dave Crocker d...@dcrocker.net wrote:
 On 4/19/2013 12:57 PM, Tony Finch wrote:
 To reinforce Joe's point, there doesn't even need to be a zone cut for
 there to be an administrative cut. There are various ISPs and dynamic DNS
 providers that put all their users in the same zone, and the common
[snip]

In this case, there really is no administrative cut though... the
provider administers the DNS record.

 The fact that they often correlate moderately well makes it easy to miss
 the facts that a) that's not their job, and b) the correlation isn't
 perfect.  And the imperfections matter.

 That is why there is the current interest in developing a cheap,
 accurate method that /is/ intended to define organizational boundaries.


It seems this is more about providing a security function to DNS, to
inform the public, about where the responsible parties change.

The right place for this, is clearly the  DNSSEC extensions

If  the DS record identifies a different signer, then you have an
administrative split,
or if the e-mail address field in the SOA fields of the parent zone
are different, then you have an administrative split, OR if one of the
two zones has  RP (responsible party records),  and the list of RP
records are different for the two zones, then you have an
administrative split.


If the DS record identifies the same signer, ANDthee-mail
address in the SOA records is the same;  or the  list of e-mail
addresses in the two zones'   RP records are identical,
then you don't have an administrative split.


--
-JH



Re: What do people use public suffix for?

2013-04-19 Thread John Levine
If  the DS record identifies a different signer, then you have an
administrative split,
or if the e-mail address field in the SOA fields of the parent zone
are different, then you have an administrative split, OR if one of the
two zones has  RP (responsible party records),  and the list of RP
records are different for the two zones, then you have an
administrative split.

Sigh.  See messages from about an hour ago about why zone cuts aren't
the same as management boundaries.  Sprinking DNSSEC pixie dust on the
zone cuts doesn't change that.




Re: What do people use public suffix for?

2013-04-19 Thread Dave Crocker


On 4/19/2013 4:33 PM, Jimmy Hess wrote:

It seems this is more about providing a security function to DNS, to
inform the public, about where the responsible parties change.



Absent a view that somehow says all metadata is a security function, I 
don't see how the marking of administrative boundaries qualifies as a 
security function.


It's easy to imagine security functions that are 'in support of' the 
enforcement of the boundaries, but that's quite different from having an 
annotation mechanism to assert the boundaries.


Let's be careful not to overload functions here.

d/
--
 Dave Crocker
 Brandenburg InternetWorking
 bbiw.net



Re: What do people use public suffix for?

2013-04-19 Thread Jimmy Hess
On 4/19/13, Dave Crocker d...@dcrocker.net wrote:
 On 4/19/2013 4:33 PM, Jimmy Hess wrote:
[snip]
 Absent a view that somehow says all metadata is a security function, I
 don't see how the marking of administrative boundaries qualifies as a
 security function.

The security function comes in immediately, when you consider any
actual uses for said kind of metadata.

The issues are alleviated only by assuming that an administrative
division always exists, unless you can show otherwise,   and showing
that the records are in the same zone is one way of showing otherwise.


When you come to rely on it, there are new security issues.

It becomes such that;   It   is perfectly safe to assume that there is
an administrative division when there is not   (in the worst case, you
break some desired function, such as the sharing of cookies  across
subdomains within the same administrative boundary).

But if you assume no administrative division exists, when there is
supposed to be one -- you have some kind of access control permit
leakage or data leaking through permissions that are supposed to block
operations across the administrative boundaries.


Only a zone signed with DNSSEC can really be trusted not to be
tampered with;  therefore,  any declaration of an administrative
division cannot be proven, and should not be relied upon,  if   any
parent zone up the tree is not signed with delegation validated using
signed records.



 Let's be careful not to overload functions here.

The function becomes pretty useless,  if you cannot safely rely on it
in the real world.
Because tampering can occur through lack of integrity validation,

Or by a child domain claiming to not be administratively divided (when
actually, there is supposed to be an administrative division).


In those cases,  a static list is safer.



 d/
--
-JH



Re: What do people use public suffix for?

2013-04-19 Thread Dave Crocker
1. Explicitly marking an administrative boundary is not inherently a 
'security' function, although properly authorizing and protecting the 
marking no doubt would be.


2. Defining a marking mechanism that is built into a security mechanism 
that is designed for other purposes is overloading functionality, as 
well as setting up a problematic critical dependency.  That's not just 
asking for trouble, it's guaranteeing it.


3. Since you made reference to assumptions a couple of times: the goal 
here is an explicit marking mechanisms.  No assumptions involved.


d/

On 4/19/2013 7:58 PM, Jimmy Hess wrote:

On 4/19/13, Dave Crocker d...@dcrocker.net wrote:

On 4/19/2013 4:33 PM, Jimmy Hess wrote:

[snip]

Absent a view that somehow says all metadata is a security function, I
don't see how the marking of administrative boundaries qualifies as a
security function.


The security function comes in immediately, when you consider any
actual uses for said kind of metadata.

The issues are alleviated only by assuming that an administrative
division always exists, unless you can show otherwise,   and showing
that the records are in the same zone is one way of showing otherwise.


When you come to rely on it, there are new security issues.

It becomes such that;   It   is perfectly safe to assume that there is
an administrative division when there is not


--
 Dave Crocker
 Brandenburg InternetWorking
 bbiw.net

--
 Dave Crocker
 Brandenburg InternetWorking
 bbiw.net



Re: What do people use public suffix for?

2013-04-19 Thread Jimmy Hess
On 4/19/13, Dave Crocker d...@dcrocker.net wrote:

That is only theoretically possible, if every boundary keeper participates.
In reality, you  would wind up with some zones having explicit marking,
and most zones not having any marking at all,  just because the admin
didn't bother to pick up on the new idea  and implement it.

 3. Since you made reference to assumptions a couple of times: the goal
 here is an explicit marking mechanisms.  No assumptions involved.

 d/

--
-JH