At my employer we use real domains, but do not expose them to the outside world (they just see 127.0.0.1). It's a better than inverting security through obscurity like I have seen elsewhere (not that you would do that Andreas).
Paul, I am not with 100% love of the .alt name./idea but I do agree that if we don't do something the Real Users (tm) will do something even more broken and horrific. Tim On Tue, Jul 24, 2018 at 11:32 AM, Tony Finch <d...@dotat.at> wrote: > Petr Špaček <petr.spa...@nic.cz> wrote: > > > > My operational experience indicates that it is easiest to just use > > "corp.example.com.", "office.example.com.", or even "i.example.com.". > > We use private.cam.ac.uk. > > > Nice thing is that this approach doesn't require: > > - views > > We have an empty version of private.cam.ac.uk in an external view, > originally set up to avoid problems with CAA checking for X.509 > certificates. It also massively reduces retries for REFUSED queries from > outside. (Our qps went down by about 50% when we introduced this view!) > > > - forwarding > > However you do still need forwarding (or stealth secondarying) for RFC1918 > reverse DNS. Catalog zones make stealth secondaries almost as easy as > forwarding to set up and maintain :-) > > > - explicit trust anchor (if you want DNSSEC inside internal network) > > > > and generally just works :-) > > Tony. > -- > f.anthony.n.finch <d...@dotat.at> http://dotat.at/ > Sole: Westerly backing southerly, 3 or 4, increasing 5 or 6 later in west.. > Slight, becoming moderate in west. Mainly fair. Moderate or good. > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop > >
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop