usefor-article-11 June 2003
[< Prev]
[TOC] [ Next >]
5.6.5. Suggested Verification Methods
[Section now omitted.]
[< Prev]
[TOC] [ Next >]
#Diff to first older
--- ../usefor-article-10/Suggested_Verification_Methods.out April 2003
+++ ../usefor-article-11/Suggested_Verification_Methods.out June 2003
@@ -1,25 +1,4 @@
5.6.5. Suggested Verification Methods
- It is preferable to verify the claimed path-identity against the
- source than to make routine use of the '?' path-delimiter, with
- consequential wasteful double-entry Path additions.
-
- If the incoming article arrives through some TCP/IP protocol such as
- NNTP, the IP address of the source will be known, and will likely
- already have been checked against a list of known FQDNs, IP
- addresses, or other registered aliases that the receiving site has
- agreed to peer with.
-
- Since the source host may have several IP addresses, checking the
- claimed FQDN or IP address against the source IP, or finding a
- suitable FQDN to report with a '?' path-delimiter, may involve
- several DNS lookups, following CNAME chains as required. Note that
- any reverse DNS lookup that is involved needs to be confirmed by a
- forward one.
-
- If the incoming article arrives through some other protocol, such as
- UUCP, that protocol MUST include a means of verifying the source
- site. In UUCP implementations, commonly each incoming connection has
- a unique login name and password, and that login name (or some alias
- registered for it) would be expected as the path-identity.
+[Section now omitted.]