usefor-article-11 June 2003

[< Prev] [TOC] [ Next >]
5.6.5.  Suggested Verification Methods

[Section now omitted.]
[< Prev] [TOC] [ Next >]
#Diff to first older
NewerOlder
News Article Format April 2003
News Article Format February 2003
News Article Format August 2002
News Article Format May 2002
News Article Format November 2001
News Article Format July 2001
News Article Format April 2001
News Article Format February 2000

--- ../usefor-article-10/Suggested_Verification_Methods.out          April 2003
+++ ../usefor-article-11/Suggested_Verification_Methods.out          June 2003
@@ -1,25 +1,4 @@
 5.6.5.  Suggested Verification Methods
 
-   It is preferable to verify the claimed path-identity against the
-   source than to make routine use of the '?' path-delimiter, with
-   consequential wasteful double-entry Path additions.
-
-   If the incoming article arrives through some TCP/IP protocol such as
-   NNTP, the IP address of the source will be known, and will likely
-   already have been checked against a list of known FQDNs, IP
-   addresses, or other registered aliases that the receiving site has
-   agreed to peer with.
-
-   Since the source host may have several IP addresses, checking the
-   claimed FQDN or IP address against the source IP, or finding a
-   suitable FQDN to report with a '?' path-delimiter, may involve
-   several DNS lookups, following CNAME chains as required. Note that
-   any reverse DNS lookup that is involved needs to be confirmed by a
-   forward one.
-
-   If the incoming article arrives through some other protocol, such as
-   UUCP, that protocol MUST include a means of verifying the source
-   site. In UUCP implementations, commonly each incoming connection has
-   a unique login name and password, and that login name (or some alias
-   registered for it) would be expected as the path-identity.
+[Section now omitted.]
 

Documents were processed to this format by Forrest J. Cavalier III