Feeds

China goes Alt with root proposal

Because the DNS doesn’t scale … no, really

Bridging the IT gap between rising business demands and ageing tools

China Telecom has only our best interests at heart, which is why it’s proposing that a Balkanised DNS system would save us from the disastrous effects of failure to scale.

It’s been a long time – a long, long time – since this author has written up an IETF RFC that wasn’t dated April 1, but it’s time to make an exception, for this draft, “DNS extension for autonomous Internet”.

Apparently, the authors believe that an independent root server is necessary to “achieve the goal of Internet autonomy” – which will probably appear to those inclined to negative connotations as if China wants to ‘draft’ the IETF into helping it perfect its firewall.

The proposal is for an autonomous Internet to have “its own independent domain name resolution hierarchy and root DNS servers” (which calls to mind the old ‘alt root’ wars of days gone by). As far as El Reg can untangle the nearly-lethal combination of jargon and translation, the new hierarchy would work like this: if “yahoo” is present in network A (say, China), then www.yahoo.com would work as it does now. If not, then reachability would depend on whether Network B (where yahoo.com is) is mapped into Network A; if so, it would resolve as www.yahoo.com.B.

If El Reg were given to such wild speculation, we might also suggest an element of nationalism in the proposal. Today, a country-level domain such as .au or .cz refers back to the root DNS; under the China Telecom proposal, .cz would refer to its own local root file, as would other autonomous zones (.com would refer to a different root than .cz, in other words). These distributed roots, existing in a peer relationship, would then resolve names existing in each others’ hierarchy.

Or perhaps, to indulge an even wilder and more-improbable speculation, the whole thing is a lobbying position ahead of this year’s ITU meeting, at which the rest of the world seems hell-bent on destroying the Internet by wresting control away from the US. Or something … ®

Bootnote: A hat-tip to Mark Newton, on Twitter @NewtonMark, whose tweet alerted El Reg to this story. ®

The Essential Guide to IT Transformation

More from The Register

next story
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
What FTC lawsuit? T-Mobile US touts 10GB, $100 family-of-4 plan
Folks 'could use that money for more important things' says CEO Legere
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.