> On Oct 3, 2016, at 6:31 PM, Warren Kumari <war...@kumari.net> wrote:
> 
> ... and just for the record, much much more could have been determined
> (and users better warned / informed) if the address handed out was a
> server which displayed an error / links to more information[0], or if
> the name-servers serving the wildcard were required to collect and
> publish information and statistics. This would have allowed analysis
> of the effectiveness of the mitigations, etc.
> 
> Yup, I'm beating a dead-horse here, but people keep rediscovering the topic.
> 
> W
> [0]: This could have a webserver which localized the page (based on IP
> / Accept-Language), a mailserver with a useful error, SSH / telnet
> banners, etc. I figured out ~20 protocols which allowed some sort of
> useful banner return. The logs could have been anonymized, or only
> statistics saved…

No surprise .. Warren and I still agree here!

Further, I still believe that enterprise network operators need safe haven name 
space (e.g., intuitively, perhaps, .corp, .home, and .mail, rather than the 
currently but [not assuredly] reserved .gnso, .icann, .iab, .rir, .ietf, and 
the like) if they don’t want to be tethered to the global DNS, for whatever 
reason.

Heck, then we could even allow internal names certificates again (in those name 
spaces, where appropriate) and not force leakage of internal system names via 
the likes of Certificate Transparency - since we just went through all that 
trouble to develop qname minimization et al.


-danny

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to