Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

draft-ietf-httpbis-alias-proxy-status: Refer to AI_CANONNAME #2358

Closed
bemasc opened this issue Jan 4, 2023 · 4 comments · Fixed by #2484
Closed

draft-ietf-httpbis-alias-proxy-status: Refer to AI_CANONNAME #2358

bemasc opened this issue Jan 4, 2023 · 4 comments · Fixed by #2484

Comments

@bemasc
Copy link
Contributor

bemasc commented Jan 4, 2023

I think the alias draft should probably have a (non-normative) reference to getaddrinfo's AI_CANONNAME functionality, in particular noting that:

  • next-hop-aliases can be populated from the output of getaddrinfo.
  • next-hop-aliases can be used to emulate or substitute for getaddrinfo.
@edmondsfastly
Copy link

I think the AI_CANONNAME flag to getaddrinfo only gives you the "canonical name" which is the final CNAME target at the end of the CNAME chain. If you want the full set of interior names across a chain of multiple CNAME records I don't believe you can retrieve that with getaddrinfo.

@tfpauly
Copy link
Contributor

tfpauly commented Jan 19, 2023

Yeah, I'm hesitant to add references to system APIs like getaddrinfo, and particularly for the reason given above. @bemasc what do you think?

@bemasc
Copy link
Contributor Author

bemasc commented Jan 19, 2023 via email

@tfpauly
Copy link
Contributor

tfpauly commented Jan 26, 2023

I'm not sure AI_CANONNAME is really required to understand the context of the draft. We don't use it at all on iOS/macOS implementations for current CNAME cloaking detection.

I do see that it may be good to warn that it is not sufficient to just wrap up AI_CANONNAME.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

Successfully merging a pull request may close this issue.

3 participants