<<<
Chronological Index
>>> <<<
Thread Index
>>>
Re: [ga] Re: Root server traffic
- Subject: Re: [ga] Re: Root server traffic
- From: Peter Dambier <peter@xxxxxxxxxxxxxxxx>
- Date: Sat, 24 Nov 2007 00:15:06 +0100
Hi Andy,
see below
Andy Gardner wrote:
This proves that CNNIC HAS added extra TLD's running parallel alongside
the "approved" ICANN root.
Why has ICANN never said anything about this?
I understand that many ISP's outside China have added them as well, to
cater for the Chinese people in their community? Tiscali?
Roots I know to carry e.g. "XN--55QX5D" are Public Root, Cesidian Root, Ucann2.
Tiscali used to resolve the Public Root in some countries.
Verisign's "Global Digital Brand Management Services" actually
announced they were selling these TLD's in their news bulletin...
http://gnso.icann.org/mailing-lists/archives/council/msg02929.html
which was later edited to remove the evidence that they were TLD's.
Quickly swept under the carpet.
What with the Arabic split root as well, it's clear that IDN TLD's have
been tested for quite some time already, so why the need to re- test
them again?
I can see the following IDN beeing used at the moment:
Status China Root
soa("XN--55QX5D.","2007112311","CDNS3.CNNIC.NET.CN","210.52.214.86").
soa("XN--55QX5D.","2007112311","CDNS4.CNNIC.NET.CN","61.145.114.120").
soa("XN--55QX5D.","2007112311","CDNS5.CNNIC.NET.CN","61.139.76.55").
soa("XN--55QX5D.","2007112311","HAWK2.CNNIC.NET.CN","159.226.6.185").
soa("XN--FIQS8S.","2007112311","CDNS3.CNNIC.NET.CN","210.52.214.86").
soa("XN--FIQS8S.","2007112311","CDNS4.CNNIC.NET.CN","61.145.114.120").
soa("XN--FIQS8S.","2007112311","CDNS5.CNNIC.NET.CN","61.139.76.55").
soa("XN--FIQS8S.","2007112311","HAWK2.CNNIC.NET.CN","159.226.6.185").
soa("XN--IO0A7I.","2007112311","CDNS3.CNNIC.NET.CN","210.52.214.86").
soa("XN--IO0A7I.","2007112311","CDNS4.CNNIC.NET.CN","61.145.114.120").
soa("XN--IO0A7I.","2007112311","CDNS5.CNNIC.NET.CN","61.139.76.55").
soa("XN--IO0A7I.","2007112311","HAWK2.CNNIC.NET.CN","159.226.6.185").
Status Arab Root
soa("XN--IGBHZH7GPA.","12","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--LGBBAT1AD8J.","9","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--MGB2DDES.","9","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--MGBA3A5AZCI.","9","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--MGBA5B5CCEU.","9","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--MGBAH1A3HJKRD.","9","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--MGBAXP8FPL.","9","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--MGBB7FJB.","9","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--MGBB7FYAB.","9","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--MGBC0A9AZCG.","9","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--MGBCPQ6GPA1A.","9","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--MGBERP4A5D4AR.","4","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--MGBG8EDVM.","9","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--MGBU4CHG.","9","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--NGBEE7IID.","9","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--WGBL6A.","5","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--YGBI2AMMX.","9","AR-ROOT.NIC.NET.SA","212.26.18.12").
soa("XN--MGBAAM7A8H.","12656","NS1.UAENIC.AE","213.42.0.226").
soa("XN--MGBAAM7A8H.","12656","NS2.UAENIC.AE","195.229.0.186").
Status I-DNS.NET
soa("XN--3RC8E2BB9H.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--81B8B9A9C.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--90AE.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--C1AVG.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--E1APQ.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--E1AY.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--G2B9A1A.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--H1AKDX.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--I1B6B7E.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--J1AEF.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--P1AG.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--P1AI.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--QLC9A5A.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--U1AAA.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--USC8B9A.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--USCN1BV9BH3H.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--VF4B131B.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--ZB0BNW.","2007112308","NSA.I-DNS.NET","64.62.142.131").
soa("XN--ZV4B74Y.","2007112308","NSA.I-DNS.NET","64.62.142.131").
Add to that, ICANN's iTLD test breaking the "no variants allowed" rule
requested by the CJK community (which Verisign follows) one must wonder
just what the hell is going on here.
Can any country run a spilt root now?
China does. Turkey does. Some Arab countries do.
Russia promised to do.
On Nov 23, 2007, at 10:00 AM, Joe Baptista wrote:
The point here is that these are still fully functional tlds.
Technical example here. If we query the china root for the TLD
XN--55QX5D. - which represents one of the chinese TLDs we get this:
$ dig @a.dns.cn. XN--55QX5D. NS
; <<>> DiG 9.2.3 <<>> @a.dns.cn. XN--55QX5D. NS
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41
;; flags: qr aa rd; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 4
;; QUESTION SECTION:
;XN--55QX5D. IN NS
;; ANSWER SECTION:
XN--55QX5D. 7200 IN NS cdns3.cnnic.net.cn.
XN--55QX5D. 7200 IN NS cdns4.cnnic.net.cn.
XN--55QX5D. 7200 IN NS cdns5.cnnic.net.cn.
XN--55QX5D. 7200 IN NS hawk2.cnnic.net.cn.
;; ADDITIONAL SECTION:
cdns3.cnnic.net.cn. 600 IN A 210.52.214.86
cdns4.cnnic.net.cn. 600 IN A 61.145.114.120
cdns5.cnnic.net.cn. 600 IN A 61.139.76.55
hawk2.cnnic.net.cn. 600 IN A 159.226.6.185
;; Query time: 290 msec
;; SERVER: 203.119.25.1#53(a.dns.cn.)
;; WHEN: Fri Nov 23 10:42:49 2007
;; MSG SIZE rcvd: 184
The response is NOERROR. Thats means to any expert that the TLD does in
fact exist. No amount of ICANN buffunery is ever going to change that.
Because if we ask the ICANN servers the same question we get:
$ dig @a.root-servers.net. XN--55QX5D. NS
; <<>> DiG 9.2.3 <<>> @a.root-servers.net. XN--55QX5D. NS
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;XN--55QX5D. IN NS
;; AUTHORITY SECTION:
. 86400 IN SOA A.ROOT-SERVERS.NET. NSTLD.VERISIGN-GRS.COM. 2007112300
1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 198.41.0.4#53(a.root-servers.net.)
;; WHEN: Fri Nov 23 10:46:53 2007
;; MSG SIZE rcvd: 103
And NXDOMAIN means in ICANN speak a bogus domain. It does not exist at
ICANN.
Kind regards
Peter and Karin Dambier
--
Peter and Karin Dambier
Cesidian Root - Radice Cesidiana
Rimbacher Strasse 16
D-69509 Moerlenbach-Bonsweiher
+49(6209)795-816 (Telekom)
+49(6252)750-308 (VoIP: sipgate.de)
mail: peter@xxxxxxxxxxxxxxxx
mail: peter@xxxxxxxxxxxx.pirates
http://www.cesidianroot.com/
http://iason.site.voila.fr/
https://sourceforge.net/projects/iason/
<<<
Chronological Index
>>> <<<
Thread Index
>>>
|