Dickson S. Guedes wrote:> SSH uses an approach like that.
It would probably be a good idea to check how other programs deal with hostname lookups during authentication. Programs like SSH, Apache, and Squid come to mind.