On Jun 3, 2007, at 10:03 AM, Steve Atkins wrote:

This is straying a long way from relevant to DKIM, so I'm not going to try and explain the basics of DNS here.

A query to "." returns a _root_ SOA record with a no answer response. Each server which might attempt to resolve a "." host name will likely repeat the mistake. There would be no cached record to lessen the frequency of these mistakes either. Multiply the mistake by billions of spoofed messages being sent, and this starts looking more like a DDoS attack. Any potential for creating a DDoS mechanism, intentionally or not, is relevant to DKIM. A DDoS concern is very relevant when considering record searching methods and whether a hostname of "." safely signals "no service."

-Doug


_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to