Re: [apps-discuss] "finding registered domains"

Andrew Sullivan <ajs@anvilwalrusden.com> Mon, 11 March 2013 12:23 UTC

Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: apps-discuss@ietfa.amsl.com
Delivered-To: apps-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A276421F8794 for <apps-discuss@ietfa.amsl.com>; Mon, 11 Mar 2013 05:23:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.84
X-Spam-Level:
X-Spam-Status: No, score=-0.84 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HELO_MISMATCH_INFO=1.448, HOST_MISMATCH_NET=0.311]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3S3Gcmi3hCOd for <apps-discuss@ietfa.amsl.com>; Mon, 11 Mar 2013 05:23:00 -0700 (PDT)
Received: from mx1.yitter.info (ow5p.x.rootbsd.net [208.79.81.114]) by ietfa.amsl.com (Postfix) with ESMTP id 1D7B921F86AF for <apps-discuss@ietf.org>; Mon, 11 Mar 2013 05:23:00 -0700 (PDT)
Received: from mx1.yitter.info (dhcp-2430.meeting.ietf.org [130.129.36.48]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.yitter.info (Postfix) with ESMTPSA id A1D998A031 for <apps-discuss@ietf.org>; Mon, 11 Mar 2013 12:22:49 +0000 (UTC)
Date: Mon, 11 Mar 2013 08:22:33 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: apps-discuss@ietf.org
Message-ID: <20130311122232.GJ37925@mx1.yitter.info>
References: <20130310042250.GE33497@mx1.yitter.info> <75239F19-93AF-40EF-A367-0E289A6D1269@frobbit.se> <20130310182928.GE37514@mx1.yitter.info> <2EB68C60-4146-4072-A005-DA8DD9AF7993@frobbit.se> <CAMm+LwiHvTmJBxLSPh7ZVRMOyy0-UpRBak9vKL7To9n1sezw5A@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CAMm+LwiHvTmJBxLSPh7ZVRMOyy0-UpRBak9vKL7To9n1sezw5A@mail.gmail.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [apps-discuss] "finding registered domains"
X-BeenThere: apps-discuss@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: General discussion of application-layer protocols <apps-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/apps-discuss>, <mailto:apps-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/apps-discuss>
List-Post: <mailto:apps-discuss@ietf.org>
List-Help: <mailto:apps-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/apps-discuss>, <mailto:apps-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Mar 2013 12:23:00 -0000

On Sun, Mar 10, 2013 at 03:12:30PM -0400, Phillip Hallam-Baker wrote:
> I think that there are two separate sets of security requirements here
> and there is therefore a need to be able to state either
> 
> * This domain is a public delegation point
> * This domain is NOT a public delegation point.
> 
> Andrew's proposal seems to be limited to the security issues of
> cookies.

I don't see why.  In fact, quite the opposite.  

I think the "public delegation point/not public point" dichotomy is
too narrow.  In general, we can say that for administrative purposes,
there are possible close administrative relationships between names.
One such relationship is "none".  If such a name also has any
names beneath it, then for the purposes of cookies (or CAs, or
anything else) it is a public "delegation" point.  (Note the scare
quotes.  Delegation is strictly speaking a matter of adding apex
records at that point in the DNS graph.  But that's not relevant here:
think of "web hotel" kind of cases, which needn't delegate and yet are
clearly cases where the different names are not in the same
administrative realm.) 

If you don't treat the "is this a public delegation point?" as an
empirical matter (are there names beneath me?), then you are subject
to assertions by people that they do not do public delegation, when in
fact they do.  I'm sure there's some genius in some new TLD applicant
company who would like to turn that into a "feature".

> the security concerns are rather different as a result. In particular
> CAs are only ever going to consider information retrieved from the DNS
> as 'evidence'. It is never going to be considered to be 'proof' and
> never relied on to the exclusion of any other information.

Of course.  It's the DNS, not the Lord's Promise Protocol :)

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com