On 11/12/10 1:12 AM, Stephane Bortzmeyer wrote:
> On Thu, Dec 09, 2010 at 10:48:03AM +1100,
>   Ian G<i...@iang.org>  wrote
>   a message of 39 lines which said:
>
>> I'd suggest there is a better path:
>>
>>           Bypass the DNS.  Work with IP#s directly.
>
> Remember that what DNS buys is *not* user-friendly names (even if they
> are nice), it is stability. IP addresses change much more
> frequently. Today, my blog is hosted at Slicehost, tomorrow, it will
> be at OVH and the IP address will be different while
> www.bortzmeyer.org will still work.
>
> Any solution which pretend to replace the DNS must address this
> issue. Or state clearly that it implies PI addresses.


Of course.

>>     b. the client has to be resiliant to fall back through that list and
>> try different IP#s.
>
> How the client will know it has reached the right one? Of course, if
> one address yields "No route to host", you know it was not the right
> one. But if it reached a target, how do you know it is the right one,
> if the IP address was reallocated.


High resiliance engineering (an assumption of the original post) 
typically involves private/public key pair authentication in both 
directions.  Nothing happens if we're talking to the wrong party.


>> PS: apps don't care about names or numbers, only humans get
>> flustered about it.  DNS is for humans, not apps.
>
> Completely wrong. If cron does a 'wget
> http://code.google.com/p/libjingle/source/browse/trunk/talk/p2p/base/pseudotcp.h',
> 'code.google.com' is not here for the pleasure of humans but to be
> sure we go to the sam place, even if Google decides to change its
> hosting system.


I wouldn't have classed that line of code as anywhere near high 
resiliance engineering :)



iang
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to