On Jun 3, 2007, at 10:03 AM, Steve Atkins wrote:
This is straying a long way from relevant to DKIM, so I'm not going
to try and explain the basics of DNS here.
A query to "." returns a _root_ SOA record with a no answer
response. Each server which might attempt to resolve a "." host name
will likely repeat the mistake. There would be no cached record to
lessen the frequency of these mistakes either. Multiply the mistake
by billions of spoofed messages being sent, and this starts looking
more like a DDoS attack. Any potential for creating a DDoS
mechanism, intentionally or not, is relevant to DKIM. A DDoS
concern is very relevant when considering record searching methods
and whether a hostname of "." safely signals "no service."
-Doug
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html