Hi, Christian,

On Sep 3, 2015 01:14, "Christian Grothoff" <groth...@gnunet.org> wrote:
>
> On 09/03/2015 04:54 AM, Spencer Dawkins wrote:
> > I thought .onion was tied closely to the TOR protocol, so I have no idea
> > why the second sentence in this paragraph is here, or what it means, and
> > neither the string "TOR" nor the string "onion" appear in RFC 7230, so
> > chasing that reference didn't help.
> >
> >    Like Top-Level Domain Names, .onion addresses can have an arbitrary
> >    number of subdomain components.  This information is not meaningful
> >    to the Tor protocol, but can be used in application protocols like
> >    HTTP [RFC7230].
> >
> > Am I just being dense the night before a telechat, and everyone else
> > understands what this means and why it needs to be included in this
> > document?
> >
> > If this isn't clear to other people, could you either say more about
what
> > it means, or delete the second sentence?
> >
> > I'm not confused about the first sentence, only the second ...
>
> Spencer, let me explain in 2 sentences ;-).

Thank you for the speedy clarification!

> The Tor (router) ignores
> 'foo' in foo.KEYHASH.onion for the name lookup.  However, the Tor
> browser sends 'foo.KEYHASH.onion' to the HTTP server as part of the
> "Host:" header, so the server may act differently for
> 'foo.KEYHASH.onion' than for 'bar.KEYHASH.onion'. (This feature is
> typically used for "virtual" HTTP hosts where multiple servers share one
> IPv4 address.)

Those are two pretty great sentences!

Could that thought make it into the document? It helped a lot ...

Spencer
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to