[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[idn] Re: process
On Thu, Feb 24, 2005 at 08:35:43PM -0800,
Doug Ewell <dewell@adelphia.net> wrote
a message of 26 lines which said:
> Is it really possible that we spent a year and a half, two years on
> putting together an IDN architecture, and during all that time
> nobody ever gave the slightest thought to the possibility of someone
> using IDNs for spoofing purposes,
This is absolutely wrong. The issue has been discussed at length. See
the "Security Considerations" of RFC 3490.
> and now that one or two well-publicized spoofing examples have
> appeared,
Pure marketing, BTW. Nothing new in the recent announces, just
sensation papers.
> Is there even enough solid information to begin writing anything, or
> just a general feeling that Something Needs To Be Done?
The Powers Above require that Something should be done (they will
forget about it in a few weeks) but, technically speaking, there is
indeed nothing now.