ICANN Considers Using '127.0.53.53' To Tackle DNS Namespace Collisions 164
angry tapir writes "As the number of top-level domains undergoes explosive growth, the Internet Corporation for Assigned Names and Numbers (ICANN) is studying ways to reduce the risk of traffic intended for internal network destinations ending up on the Internet via the Domain Name System. Proposals in a report produced on behalf of ICANN include preventing .mail, .home and .corp ever being Internet TLDs; allowing the forcible de-delegation of some second-level domains in emergencies; and returning 127.0.53.53 as an IP address in the hopes that sysadmins will flag and Google it."
hacky (Score:5, Insightful)
Re:hacky (Score:5, Funny)
Re:hacky (Score:5, Funny)
ICANT think of anything better.
ICANN!
Re: (Score:2, Insightful)
Here's a better solution
Refuse to resolve any of the new gTLDs. Start petitions and stuff get you isps to refuse to resolves them. Get distros to patch their networking code to refuse to resolve them. Make them worthless.
Re:hacky (Score:4, Interesting)
Is returning 127.0.53.53 instead of NOT FOUND a good idea? Not sure about that, since, for instance, a browser will say "Cannot connect to..." instead of "Domain not found" - which is actually the correct error message. The real problem is when the domain+subdomain exist on the Internet, users will process information from the wrong site instead of the intranet one
Of course all IT teams will have to be DNS competent - which is currently not (always) the case
Re: (Score:2, Insightful)
What makes you think that a browser getting a 127.0.53.53 won't return a meaningful and very descriptive error? It is a special case worth flagging if ever their was one.
Re:hacky (Score:5, Interesting)
Right its a good idea to expect every application developer everywhere to put a special case test into their code see if the value in the buffer after a call to gethostbyname is 127.0.53.53 rather than just checking the return code and using the value directly or not based on the return code. Doing this means a new branch in every new app, for no real reason; It means odd behavior in old/not updated code that expects to either successfully resolve and address or not.
Case in point someone introduced a hostname into our DNS recently that caused a major application to break. Turned out there was a stale config entry for a hostname that no longer existed. As long as it had been getting back NXDOMIN things hummed along nicely, it just tried the next host in its list from a config file. When someone added that name back it, it started trying to connect to the new server ( which did not run the application it was expecting and did not listen on that port ) this would cause long timeouts on login while it tried and retried the other server. I grant this was a configuration error, someone should have cleaned that old config file, but there are situations like laptops where this might not be the case. Inside your organization .mail might exist as a zone, take the machine home and CustomAPP might work fine today getting NXDOMIN and switching to a local database or trying a different public hostname etc, now its going get back 127.0.53.53 and quite likely not know what to do; when the service isn't there.
No its patently stupid for the name resolution system to return BAD data. If something like .mail is not allocated or de-alocated than it does not exist, and NXDOMIN is what a public DNS system should return. The meaning is clear.
Re: (Score:3)
It's spelled NXDOMAIN, by the way.
NXDOMAIN has not been a reliable response for invalid DNS queries for roughly 15 years. Look into the history of the "*.com" DNS entry in Verisign's root servers for the .com domain, which were returning valid Verisign owned hosts. And look carefully at the DNS proxy setups of major home network services, which often return their domain sales web pages instead of "NXDOMAIN" for invalid DNS entries.
Given that the data has _already_ been corrupted, this seems a reasonable
Re: (Score:3)
Yep, because those DNS servers that refused to reply NXDOMAIN will totally send you that IP code for the domains they don't know.
I mean, now it's a secret code, not some boring documented answer type. Nobody will hijack it.
Re: (Score:2)
I'm afraid that I was unclear. Worrying about how this will hide valid "NXDOMAIN" results is pointless, since thoe have already been hijacked by many ISP's DNS proxy servers and instead return the ISP's desired advertising page. They can also be redirected to far, far more dangerous services, sich as Phishing websites or mail servers to accept misaddressed email.
Re: (Score:2)
Returning a known address can not improve the situation in any way, at best things stay the same, at worst you had a working DNS server before, but now you don't.
Re: (Score:2)
Unfortunately, 127.0.53.53 is a perfectly valid IP address already in use globally - try pinging it on most machines for proof. Remember, the loopback address is not just 127.0.0.1 - it's that whole /8 subnet, all the way up to 127.255.255.255. Indeed, two of my own DNS servers are bound to 127.0.0.53 right now (there's another DNS server bound to the public IP address, which forwards certain queries to this one).
This seems like a really, really stupid hack to me. If they are effectively revoking the domain
Re: (Score:2)
DNS server or equivalent should be in place, and forward the unknown domains to external (Internet) DNS - again, their local config should contain an entry for the ".home" zone, preventing an external resolution.
Yeah but legitimate queries for the external linux.home won't work.
Re:hacky (Score:5, Interesting)
The problem really isn't so much not being able to reach some.home, on the internal network or even something.home on the Internet when you already have a local .home. zone.
The problem is all the uncounted config files out there with unqualified or partially qualified names in them. The RFCs are not entirely clear on what the correct behavior is, and worse the web browser folks have decided to implement the behavior differently themselves in some cases, rather than use the system nss services/apis.
So if you imagine an environment where DHCP configures a list of DNS search suffixes, and one of those is something like us.example.com or something. How the Windows boxes interpret a query mobile.mail (note no trailing dot) will possibly be different than the way the Linux machines do, and different than what the OS X machines do, etc and what Chrome or Firefox decide to do might be different than what nslookup does even on the same machine!
Its going to be nightmarish from a support and troubleshooting perspective, and lets face it nobody on your PC tech team really understands DNS, your network admins probably have a good handle but some major blind spots, and your developers are accustomed to making what are now dangerous assumptions. I am not sure I fully understand DNS on most days.
This is going to be a support nightmare at least at some sites, even some places where the ONLY sin was not using FQDNs everywhere all the time. Which might have deliberate, perhaps not the best way to have gone about it but knowing how search domains operate, and being able to set them with DHCP is entirely possible and like someone architect-ed mobile systems getting a local resource by depending on that behavior.
There are all kinds of potential security problems too. The gTLD expansion is making the Internet both less reliable and less safe.
Re:hacky (Score:4, Informative)
Good summary. FWIW, People were using e.g. ".site" for local domain
for a long time. It was in the only draft RFC that addressed the issue,
and lacking any approved RFC people tend to follow the drafts. It was
noted on Wikipedia and many forums as to be used for this
purpose and along with some other TLDs had become a de-facto standard.
Then draft-ietf-dnsind-test-tlds-08 came along and removed it. Reserved
domains names continued to disappear from this draft document until they
were nearly all gone by the time RFC2606 was certified.
Then they started accepting and seriously considering applications for .site as a TLD and it looks like they are set to approve it [icann.org]. Boneheads.
So yes, in addition to unqualified names, there will be lots of problems with
software and configuration written when several TLDs were presumed safe.
RFC2606/RFC6761 have proper domains to use for test setups and documentation.
Unless/until they get suddenly ammended, which at this point, I wouldn't want
to wager on.
Re: (Score:2)
Lucky for you, .invalid is one of the names that remains in the RFC. However, RFC6761 says that DNS software at all levels (including an application, pre-client) is free to fail any queries to this domain, so as far as using it as an internal DNS domain, you have the potential of running into problems with code that enforces such strictures.
Re: (Score:2)
But if the LAN is correctly setup, the collisions should be minimal.
I'm sorry the Internet is a production network. Time for amateur hour expired with the 20th century. We don't get to make assumptions out of ignorance anymore.
Is returning 127.0.53.53 instead of NOT FOUND a good idea? Not sure about that, since, for instance, a browser will say
When I type http://127.0.53.53/ [127.0.53.53] into my browser I get a web site hosted on my computer. The entire 127/8 acts as a loopback not just 127.0.0.1. Quite a bit more problematic than "Cannot connect to..."
Re:hacky (Score:5, Insightful)
I'm sorry the Internet is a production network. Time for amateur hour expired with the 20th century
I'm sorry, I feel the time for amateur hours exploded in the 21th century. Competency was diluted among the many so-called experts answering the huge demand of engineers. It seems in bigger companies IT management is confined to ensure IT services work fine - meaning in most cases implement the fewer changes as possible - "don't fix what isn't broken". Most teams are not used anymore to hacking, customizing, improving, innovating. When something a bit trickier than usual rears its nose on the horizon, they're lost. DNS implementation is one of these trickier thing.
Re: (Score:2)
I'm sorry, I feel the time for amateur hours exploded in the 21th century. Competency was diluted among the many so-called experts answering the huge demand of engineers.
Perhaps I should have chosen different words. I think some distinction is needed between "LameCo, Inc" electing to let fruits of dead labor run the show and competency of those who would be charged with making unnecessary global changes effecting everyone.
That's amusing (Score:2)
Re:hacky (Score:4, Interesting)
It may not even say "Cannot connect to". 127.0.53.53 is in the 127/8 range, reserved for localhost. On some systems, only 127.0.0.1 works for localhost, but nothing prevents a system from using the entire range for localhost.
So rather than getting an error, when server1.here lacks a host file entry for server2.here, you will be connecting to server1.here. So, from server1.here, "ping server2.here" will show that the network works. Browsing to "http://server2.here/" will show the start page of server1.here. If that's the default page, or the two servers are being setup to run some kind of load balancing - thus having the same content - the resulting confusion can be very hard to figure out.
Re: (Score:2)
Returning 127.0.53.53 makes a lot of sense if you put up an ad-farm parking page on it to make a bunch of fake money with ad impressions.
Double bonus points when the "service" gets sold to a bottom feeder who's ad-network gets infected, ending up trying to spread viruses with fake "you are infected!" pop up windows.
Re:hacky (Score:4, Insightful)
Re: (Score:3)
How do you put up a parking page that listens on loopback?
By sitting in a board room without any clue where your money comes from.
Re: (Score:2)
How do you put up a parking page that listens on loopback?
Bots.
By being an ISP (Score:3)
Re: (Score:2)
DOH!
Re: (Score:2)
I changed the DNS hosting and upstream service provider for my workplace due to the service provider not having anyone competent with DNS. More than half the incoming email was getting discarded due to a combination of a slow link to the real mail server and them having a policy of setting the secondary mail server to be a thing that was quick to respond and silently discard all incoming mail. Getting 70% le
Re: (Score:2)
If you have a local authoritative server, why will you have to give up your local domain? (unless you actually want to access the new rightful owner's network)
Re: (Score:2)
... but only if you want to access *.shark on the internet, right? I'm not trying to be pedantic, just don't know if I'm missing something.
Re:hacky (Score:5, Insightful)
It's not as though TLDs were ever a particularly shining moment in the history of information classification; but, after the remnant factions of the Ontology wars (remember when URLs were totally going to express useful data about the world and whatnot by being insufferably long and hierarchical?) retired or were driven into hiding, they mostly slumped, if more by erosion than sound structural engineering, into a vaguely safe and predictable structure.
And then they decided that it was just sickeningly adequate as it was and they started grafting on... things... things that should not be...in places that out not to have things there. Nothing could possibly go wrong. And oh boy, does it look like it will, good and hard.
resolv.conf (Score:2)
search mydomain.com
nameserver 127.0.0.1
There, problem solved.
No need to say thank you...
Re: (Score:2, Funny)
I'm using MSDOS, you insensitive clod!
Re: (Score:3)
wattcp has been around for ages. Like, seriously, where have you been?
http://www.vogons.org/viewtopi... [vogons.org]
He clearly needs to reconfigure his extended memory.
emergency response options (Score:4, Insightful)
In addition the report recommends emergency response options, which will be employed only in situations "where there is a reasonable belief that the DNS namespace collision presents a clear and present danger to human life".
In other words, the DNS will be used for political oppression.
Why bother? (Score:5, Insightful)
(Perhaps more importantly: wouldn't it be neat if there were some sort of super cool, totally futuristic, security mechanism? One that used a secret number, that the server never told anyone, but still managed to prove that it knew, because number theory, instead of just relying on the URL being right? I bet that I'd have to go, like -25 years into the future to see a system that advanced...)
Re: (Score:2)
stilted non-denials from people who should have known better and vicious mockery from everybody else
Oh, you've had to speak with Exchange admins who can't figure out what HELO is too?
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
He made it so good and generous that he set it up as an open relay.
After that I changed things so the accounts clerks got their nice, shiny and sloooow MS Exchange server but safely hidden behind a *nix box that protected it from the big bad net.
Re: (Score:2)
In some places that's the price that has to be paid for continual employment. Of course in the long run it's probably better to get out of such a place.
STOP (Score:5, Insightful)
The proliferation of TLDs has no positive effect on the Internet community whatsoever short of enriching ICANN and it's seedy network of bottom feeders.
Well ok say it helps scamming phishers and enables organizations to part with even larger sums of cash in any efforts to protect their brands.
Lighting up names with a loopback address like this "127.0.53.53" garbage is about the level of crap we can come to expect from the total idiots at ICANN. If you need to associate an A record pick an address guaranteed to be black holed not one that causes machines to resolve to thyself... extraordinarily moronic...
In my view DNS operators should take responsibility to prevent damage to their customers by not blindly delegating * to root zone operators. Only delegate known TLDs and require manual blessing of all operators before admitting any new TLDs.
Re:STOP (Score:5, Funny)
I know a few people who have conspired to tell others that the nontraditional domains are like 1-900 phone numbers and when you use them, you will get a bill from your ISP.
Re: (Score:2)
In my view DNS operators should take responsibility to prevent damage to their customers by not blindly delegating * to root zone operators. Only delegate known TLDs and require manual blessing of all operators before admitting any new TLDs.
I agree.... ICANN was given their chance, and trust, AND they blew it.
Now a technical solution on the part of organizations administering DNS servers is warranted to head off this TLD foolishness.
Re: (Score:3)
Or 255.255.255.255 - broadcast to the whole internet - get spammed by replies!
Re: (Score:3)
Re: (Score:2)
Then TLD . and we will be truly fucked.
Those wondering why 53.53 (Score:5, Informative)
Re: (Score:3, Funny)
Re: (Score:2, Informative)
Money. Next question?
Re: (Score:2)
Re:Those wondering why 53.53 (Score:5, Informative)
Re: (Score:2)
"TFA is confusing"
Glad i'm not the only one, bear with me....
From what I can understand as a non-network-admin is that some private networks have their own suffix like .home and these can be mistakenly resolved for a public TLD since .home is now a valid TLD like .com. So if my home network is lordtaw.home and I have two systems: linux.lordtaw.home and windows.lordtaw.home, my router/DNS server can mistakenly try to resolve those domains to an external IP if it not configured correctly. And the fix if for e
Re: (Score:2)
You know what people will notice even faster than returning localhost? Returning NXDOMAIN. That'll make it obvious for everybody, from the netwrok admin to the end user, that something is wrong. As an added bonus, that'll make completely clear what's wrong, instead of sending people into a useless debuging saga, and hoping they google the value you expect.
Of course, not issuing the new TLDs wouldn't create the problem to start with... But then, somebody alredy answered that "why" up there.
When greed breaks stuff (Score:3)
All the people who warned them that they will cause permanent micro- and macro- disasters all over the world have been ignored. Due to greed. Let them be proud of their achievement.
Re: (Score:2)
All the people who warned them that they will cause permanent micro- and macro- disasters
Many political figures have actually a "micro" view of events - i.e. the time difference [ NextElection - now ]. Not enough to accurately consider something as diluted in time as global warming.
Re: (Score:2)
Think again: When (not if) the shit hits the fan, who do you think will get the blame? The C-level that fucked up and didn't even understand the problem or the admin who was never informed about it?
Re: (Score:2)
The admin that was informed about it and tried to point out the potential problem is the one that gets blamed when the problem manifests.
IPv6 should have been entrenched before TLD prolif (Score:3)
It was always known that IPv4 was running short, and given that, I blame ICANN for proliferating TLDs before IPv6 got well adapted, entrenched & established.
This is different from the question of whether there should be a gazillion TLDs worldwide (I disagree w/ the idea, but let's allow that for the sake of this discussion). Now, as it is, there are unlimited names and ways that websites can be formed, and to make things worse, TLDs are also mushrooming. So one needs an addressing scheme that could mathematically do the best job @ accommodating it.
The only Layer 3 protocol that I can think of that would achieve this is IPv6. Before that gets universally implemented and established, what was ICANN thinking laying out TLDs nilly willy? Result of that is more pressure on IPv4. Let's face it - IPv4 has hit its limit already. We had that discussion the other day of how it's not run out in North America, but once that happens this year, things will only get uglier: multiple levels of NAT would make it a de facto Layer 4 or above communication. The only way to preserve Layer 3 is IPv6, which seems to have enough for everybody.
Only good thing about this issue - if it forces the acceleration of adaption of IPv6 across the board - from infrastructure to last mile.
Re: (Score:2)
Having new TLDs beside .com should be better for the internet. Multiple name spaces should facilitate load sharing between DNS servers.
Re: (Score:2)
Re: (Score:2)
this TLD proliferation shouldn't have been done
Full stop. Your conditional clause is unnecessary and wrong here. As much as we need IPv6, the TLD diarrhoea should never have been allowed to happen.
Re: (Score:2)
Having new TLDs beside .com should be better for the internet. Multiple name spaces should facilitate load sharing between DNS servers.
No it won't. Everyone still needs a .COM.
Alternate TLDs are a novelty market.
Re: (Score:2)
people will use .com and the Countrycodes anyway. The rest will just be reserved or redirections.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Sure they do - all the major web servers and hosting platforms can use and define vhosts (it's just that the mechanism for creating them differs on each platform). IIS for example, if you create a new site, using "All IP Addresses" port 80, will require that you designate a host header so that the HTTP engine can route the request to the right Web Site (and corresponding content). All IP Addresses port 80 with an empty Host Header acts as a "catch-all" and is assigned to the Default Web Site. Which you gene
Re: (Score:2)
Solution looking for a problem (Score:2)
Re: (Score:2)
I can see you're not responsible for security in a company.
I'm so NOT going to sit on an ejector seat just because some idiot thought it's fun to use some "internal" domain name for his projects without informing IT! And trust me, that shit will happen. And it's not going to be any sysadmins fault but rest assured that the PHB who fucked it up will twist it 'til the admin gets it.
I doubt there are too many around here who are looking forward to that.
is 10.0.0.0/8 really needed to be private? (Score:2)
Make it 10.0.0.0/12 for private networks, and reclaim the rest for public networks?
Re: (Score:2)
That does not address the issue they are trying to address here.
Also, there are so many people using addresses in 10.0.0.0/8 but not in 10.0.0.0/12 that you would have to give years lead time to let them get that changed. May as well go to IPv6.
Comment removed (Score:5, Informative)
Re: (Score:2)
A very good explanation. Thanks.
Re:is 10.0.0.0/8 really needed to be private? (Score:4, Interesting)
So... what you are saying is that ICANN/IANA should've done something similar for names that has been done for the various "private" "non-routable" ip address pools (10.x.x.x, 192.168.x.x, etc) have done since The Beginning... there needed to be some TLD that would only work for local networks and queries.
Of course, since that didn't happen all those years ago admins and amatures (and amature admins even) have been using a random mess of things, usually done by trying to ping or get a nslookup for some hopefully imaginary TLD and when it works (or rather, returns a NXDOMAIN error) they assume they can use it locally without repurcussion.
Which means there are tens, hundreds, or maybe thousands (or more!) "fake" TLDs in use out there, some hard coded into applications that are no longer supported, etc. but are still in use. Which means to try and fix it now would be pretty much near impossible.
Re: (Score:2)
Re: (Score:2)
so that if a technie working for a company affected is roaming with their laptop, and they try to access "exchange-server.nyoffice.intranet" forgetting to put up the VPN, and ".intranet" is a new TLD, and they can't connect because the VPN isn't up, and they decide to check their Windows Event Logs to figure out why, then instead of "domain not found" which would immediately make them think "Oh wait, of course it can't be resolved, it's not a real domain and I'm not on the VPN", they'd see a weird IP address, and think "That's odd, let me Google that, there's obviously a problem with DNS."
Which is fine for a techie.
I see millions of support calls when non-techie people can't find the cute cat pictures.
Re: (Score:2)
Having more bits makes it easier to manage your local ranges. When you have multiple locations and a bunch of VPNs between them, more address space means you don't need to squeeze it tightly -- something that always backfires once there's a need for expansion.
DO NOT RETURN IPv4 addresses (Score:2)
Chances are that they may still have antiquated routers/networks hard coded to 19.0.0.0/8, and would have to spend a considerable amount to replace. In the meantime, having that entire Class A means that internally, within the organization, they can assign them to their various locations worldwide, w/o batting an eyelid or bothering ARIN.
Like I've argued, nobody should ever return any IPv4 addresses: even if they've switched completely to IPv6, they would likely still need dual stacked support for commun
127.0.53.53.... why not 127.0.42.42? (Score:5, Funny)
>ping answer.to.the.ultimate.question.of.life.the.universe.and.everything
Pinging 127.0.42.42 with 32 bytes of data:
Reply from 127.0.42.42: bytes=32 time=2ms TTL=249
Reply from 127.0.42.42: bytes=32 time1ms TTL=249
Reply from 127.0.42.42: bytes=32 time=1ms TTL=249
Reply from 127.0.42.42: bytes=32 time1ms TTL=249
Ping statistics for 127.0.42.42:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = eternity, Average = ask Deep Thought
Better yet, no new TLD (Score:5, Insightful)
The best solution here is to simply stop this TLD madness because it provides no value at all. A new TLD can be created each time the UN recognizes a new country's existence, but for no other reason.
Yay, applied spearfishing! (Score:3)
Let's face it, the whole craze around the new TLDs is a huge can of worms that serves no purpose (well, none but to make some people rich) while being a problem waiting to explode.
Take Mike, the manager. Mike is a good manager (yes, they exist. No, really!) and he's pretty competent. Well, not in IT, of course, but in his field. In IT, he has to rely on his IT department (and, as I said he is a good manager, he actually does). Mike takes his laptop home, not to play but to actually do some meaningful work. So he creates a rather sensitive document and decides to save it. Now, in our current world, the internal name "documents.thecompanyheworksfor" won't resolve and the system falls back onto his documents folder. Which is pretty neat, because that's what gets sync'd automatically the next time Mike drops his laptop into the docking station at work. No fuss for him and also none for his IT department.
In the new and improved world of TLDs at will, that server could well exist. And it does not necessarily belong to the company Mike works for.
And that's just the tip of the ice berg, how about launching some program from a remote location? Undocked, it won't launch, and if it's just a script that provides network information, who cares? In our new world, it may well launch some malware.
Now, of course one may say that IT should know that and IT should prevent it by ensuring that these things either resolve correctly or not at all. Fair enough. Now, who here can say that he knows of EVERY domain entry in his company's environment (provided you're not working for some mom'n'pop shop)? Who would put his job on the line for saying that there was never some self absorbed PHB who insisted in having the necessary rights to create what domains he thinks was funny without informing the IT department?
TLDs are going to be a security nightmare. But hey, who am I to complain, it's job security for decades!
Re: (Score:2)
Well that is pretty clearly a failure of the application documents.thecompanyheworksfor should be authenticated by the application in some fashion. An SSL certificate or similar. Otherwise it was always vulnerable to anyone who could manipulate DNS.
Whats more likely to happen is Mike opens up his laptop at home. The sync program starts up, and attempts a to resolve documents.thecompanyheworksfor, yesterday when it got back NXDOIN it immediately went back to sleep, got out of the way etc, concluding Mike
and the winner is... (Score:2)
The entity that benefits most from bastardization of ICANN is... Google.
You can always find Google and Google can always find where you want to go. And now typing addresses into the address bar is about to get more painful.
I'm sorry (Score:3)
Re: (Score:2)
Um... this will happen all the time!
You access some resources on your corporate network from your laptop. To do this, you have configured an application to talk to the server. That server happens to have the name whizzy.corp.
So far, no biggy. IF you launch the application and you are not at work, whizzy.corp doesn't resolve. For example, at your local starbucks, BEFORE you open your VLAN.
What happens when .corp is assigned? Suddenly whizzy.corp is now a machine on he internet. Say the application is your co
Internal TLD? (Score:3)
Back when I used to work for Boeing, our internal TLD was .com. Anything looking for a .boeing .com domain would be resolved via our internal DNS system. All other .com (and any other TLDs) were forwarded to the public DNS services through a firewall.
Were someone to take their laptop out of the company, .boeing.com requests would be resolved via their external DNS service. And they could deal with erroneous requests for internal services in a number of ways. Deny then, or divert them to some sort of error handling service (web page: "Aren't you supposed to be at work right now?") Hand them over to some sort of VPN login service or other firewall portal. Or obfuscate the response, keeping people outside from probing around and guessing at the internal company network structure.
It all worked and it handled everything secure within the companies systems.
browsers part of the problem (Score:2)
I have a big enough problem with my stupid browser deciding that when I type "blahblah" into the host bar that if it can't reach "http://blahblah:80/" that it should automatically default to "http://blahblah.com/" or google "blahblah" ... yeah, that's what I need, the internal hostnames leaked to google, thanks idiot browser developer.
Okay, it's good for grandma and everyone else using browsers. There should be a clear UI element that appears when this happens to allow me to disable it.
Re: (Score:3)
Or maybe you don't understand this other AC's point ?
For example, combining the addressing into the naming method, instead of externally tying 4-byte of IPv4 adressing with host/domain names with a ad-hoc protocol. See IPv6's capability to have addresses made of letters, and push it a little further ? Then maybe even nest some routing hints into that data. Eck, include some multicasting capability at that point too, if you can. Once you start reconsidering the whole IP addressing and routing, surely there a
Re:Obsolete (Score:4, Informative)
See IPv6's capability to have addresses made of letters, and push it a little further?
You mean hex? That's just the way you type it, it has NOTHING to do with the actual packets. For instance, slashdot's IP (216.34.181.45) could just as easily be written as "d8.22.b5.2d", or even "d822:b52d".
We just switched from decimal to hexidecimal for IPv6 notation because the addresses are so much longer now (IPv4 is up to 15 characters in decimal, IPv6 would be up to 63 characters if we used decimal (only 39 in quad-character hex).
Re: (Score:2)
Early ip resolver libraries would sometimes parse octal ip addresses with commas as in your example of /.'s ip address as 330,42,265,55. Many of those would also deal with a 0xd822b52d or sometimes without the 0x. Many systems will let you do something like "ifconfig en0 0xd822b52d/32 alias"
Some of the early proposals to expand the IPv4 address space was to allow use more of the bits from the ports source and destination addresses so you could do things like "ping 8.8.8.888" or "ifconfig en0 8.8.8.8/32/
Re: (Score:2)
Re: (Score:2)
Oddly enough, it wouldn't. You could use NAT hardware in front of old gear and everything will just keep working. Stuff that gets updated, could just use the new syntax and deal with things correctly. Stuff like core routers and switches wouldn't care. It would be fare less disruptive than trying to install ipv6.
Re: (Score:2)
Wouldn't there be issues if 2 machines who's IP's only different in the borrowed port bits were physically distant from each other? I can see the core routers having issues with the same "IP" (the original IP part) being in 2 countries at once. Unless they were going to restrict the IP's that differ by port only to be on the same local network, but then you may as well just use a NAT with forwarded port ranges...
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
The best thing: Protocols like QUIC, which should be just above IP and are above UDP.
Re: (Score:2)
Re: (Score:2)