Hi,
some additions.
on Monday, 30. December 2019, 23:48:41 CET I wrote:
> resolver1 asks Autoritative of the com-Zone for ImenT.Com or wWw.ImenT.Com
There are two ways for a resolver to behave.
The slower way which is leaking less information to the highest levels of the
authoritatives is to as
Hi Tony,
on Monday, 30. Dezember 2019, 20:10:57 CET Tony Finch wrote:
> It's very difficult to make the DNS properly case-preserving, because a
> parent zone and a child zone can disagree with each other about the case
> of the parent zone.
dnsext-dns0x20-00 doesn't have anything to do with zones.
Fred Morris wrote:
> Regarding case, in any case (pardon the pun) case is not guaranteed.
> Especially regarding dynamic updates, your case will not be preserved
> (and maybe I fat-fingered and left caps lock on once upon a time without
> realizing it) in the authoritative zone.
Well, it's a bit
Lars Kollstedt wrote:
>
> for more information about this see
>
> https://tools.ietf.org/html/draft-vixie-dnsext-dns0x20-00
>
> and
>
> https://indico.dns-oarc.net/event/20/contributions/265/attachments/254/471/ISC-case-sensitivity.pdf
Yes. And one prominent resolver that implements this is unbou
Hi Fred,
On Montag, 23. Dezember 2019 01:08:54 CET Fred Morris wrote:
> but in cache e.g. isc.org matches ISC.ORG or isc.ORG, or
> ISC.org... hopefully you get the idea.
Thats expected behavior. And has IMHO something to do with
https://tools.ietf.org/html/rfc4343
and the elder DNS RFCs not wi
Regarding entropy, that is correct. Regarding case, in any case (pardon
the pun) case is not guaranteed. Especially regarding dynamic updates,
your case will not be preserved (and maybe I fat-fingered and left caps
lock on once upon a time without realizing it) in the authoritative zone.
The mi
On Sunday, December 22th 2019, 18:28:48 CET schrieb Paul Kosinski via bind-
users:
> Every so often, we get a run of peculiar queries to our (BIND / named)
> DNS server. Note the apparently random mix of lower case and upper case
> letters in the domain names.
>
> Does anybody have any idea why so
Sent from my iPhone
> On 22-Dec-2019, at 11:02 PM, h.rei...@thelounge.net wrote:
>
>
>
>> Am 22.12.19 um 18:28 schrieb Paul Kosinski via bind-users:
>> Every so often, we get a run of peculiar queries to our (BIND / named)
>> DNS server. Note the apparently random mix of lower case and upper
This is a “spoofing resistance” technique.
For more info, check “0x20 Bit Encoding”.
Sent from my iPhone
> On 22-Dec-2019, at 10:59 PM, bind-users@lists.isc.org wrote:
>
> Every so often, we get a run of peculiar queries to our (BIND / named)
> DNS server. Note the apparently random mix of low
Am 22.12.19 um 18:28 schrieb Paul Kosinski via bind-users:
> Every so often, we get a run of peculiar queries to our (BIND / named)
> DNS server. Note the apparently random mix of lower case and upper case
> letters in the domain names.
>
> Does anybody have any idea why somebody would be doing
Every so often, we get a run of peculiar queries to our (BIND / named)
DNS server. Note the apparently random mix of lower case and upper case
letters in the domain names.
Does anybody have any idea why somebody would be doing this? (It's
legal, I guess, but quite non-standard.)
Dec 22 12:05:43 i
11 matches
Mail list logo