[26980] in North American Network Operators' Group
Re: SERVER NAMES
daemon@ATHENA.MIT.EDU (Patrick Greenwell)
Thu Feb 3 02:10:20 2000
Date: Wed, 2 Feb 2000 23:08:29 -0800 (PST)
From: Patrick Greenwell <patrick@cybernothing.org>
To: bmanning@vacation.karoshi.com
Cc: Steve Dispensa <steve@mwis.net>, DeepBlue <james@darkblue.net>,
nanog@merit.edu
In-Reply-To: <200002030436.UAA14322@vacation.karoshi.com>
Message-ID: <Pine.BSF.4.20.0002022307400.6834-100000@unagi.cybernothing.org>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu
On Wed, 2 Feb 2000 bmanning@vacation.karoshi.com wrote:
> >
> > Not picking on you in particular, but isn't one of the greatest advantages
> > to having DNS to offer *meaningful* names to machines(assuming anything
> > other than a home network?)
> >
> > It's nice to be able to go in to a company and see machines named "www1,
> > www2, mx1, mx2" etc. which offer some indication as to their purpose
> > rather than "maverick, foozlebutt, blarg", etc. which offers no such
> > indication. I know it isn't as fun, but it certainly seems to be much more
> > useful (IMO of course...)
> >
>
> Sure. Esp. for blackhats. Which makes the more "attactive" target;
>
> db.accounting.bigcorp.com
> foozlebutt.bigcorp.com
Do we need to re-visit the "security through obscurity" argument here?
/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
Patrick Greenwell
Earth is a single point of failure.
\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/