On 5/9/24 15:33, Hollenbeck, Scott wrote:
[SAH] The context is given in the Section title and the included back references. They're proposed best practices. The back-referenced text that describes each practice notes that they haven't been observed in operation. We could add something like "The practices in this section are described as "best practices" because they address the operational risk and have been observed in operation" to 6.1 and "The practices in this section are described as "proposed best practices" because they address the operational risk and haven't been observed in operation" to 6.2. Would that help?


Thanks for this clarification.

But now for the big question: while the practice described in 5.1.9. "Renaming to a Host Object Maintained by the Client" is a current practice, is it really a "best" current practice? As the text suggests, it is the breakdown of this practice that leads to Risky-Bizness domain hijacks.


-andy
_______________________________________________
regext mailing list -- regext@ietf.org
To unsubscribe send an email to regext-le...@ietf.org

Reply via email to