Re: [dbound] Requirements for administrative boundary data sources?

Jothan Frakes <jothan@jothan.com> Tue, 12 April 2016 19:46 UTC

Return-Path: <jothan@jothan.com>
X-Original-To: dbound@ietfa.amsl.com
Delivered-To: dbound@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D234812D924 for <dbound@ietfa.amsl.com>; Tue, 12 Apr 2016 12:46:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=jothan-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mRv1rnbYB753 for <dbound@ietfa.amsl.com>; Tue, 12 Apr 2016 12:46:15 -0700 (PDT)
Received: from mail-qg0-x230.google.com (mail-qg0-x230.google.com [IPv6:2607:f8b0:400d:c04::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B2A3912D862 for <dbound@ietf.org>; Tue, 12 Apr 2016 12:46:15 -0700 (PDT)
Received: by mail-qg0-x230.google.com with SMTP id f52so25335165qga.3 for <dbound@ietf.org>; Tue, 12 Apr 2016 12:46:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jothan-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=hWhuATLVP2sx+ldGCwOHDvDueWJLETc721aEZv9DSQc=; b=W8BB1tdEls0WZrW7bbX/panL6M0cmBKSdvWSUdcnU49gGpRQMN1PuXR5zuNBP0HXTv mJNSVtxV+BS11g9g284alG7ZRItQhbWOqfPOYOdkW7vVKtsxUtk3D6K93t250kHo9yjm Tx40TltkD773EBWqcBLUzef5pB4gokX3azhAWvxw76cvqS5DCGUOdHsHclVcI/bQJRtC SAtR/2Mls29D/FbwfMsRRD71tmfV2xN6WEzbfeKsj3iUg1eopsNHKPy6O16hiNNNZMKT pokzHlTU9t6/DNFQYspDYokVMuo8FyvwlsvzNEzSfe+yGlllhBBIox2JqgPsvEQ/Rc4c xoCw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=hWhuATLVP2sx+ldGCwOHDvDueWJLETc721aEZv9DSQc=; b=ROTHb/lY5drVocAIVt3T3O2+GKXsgG49rckGoKyfs7TeBfzoDHJBho9xgyRWAB54HD qMOc9n2oEzCtN8xmu9OkaAOog5JYDgOobPMIkGbxCZQRbaCU4QK7JEpX73vc0Q0nZ0SU LN0TB96QQPYRgsyVQuJoWocj8c+UdEzJY4F1OdHBlT8h4YePTEcYEzyPTv8Fh9HfbLmU hhRcG/7PY8BWlFFZqIyB0+p+B47JRSo9mt5Nnpm7kEVSfMtvsE/0snKlo9UqPbJe19WS 2WhnGdr4M+YcoQWFsoG/TJHUQ01I6d1JRzXQPVrPULG4l4a9fowWpoEuH7K0DXBZv3nf Rh/g==
X-Gm-Message-State: AOPr4FW7br3ecJKJNXNwvX5xCtWl4anTX4uaFWle8T5Zwa14oSJE1oT11gweyBWCmk/WoipnceDc3SgX40lmaw==
X-Received: by 10.140.152.78 with SMTP id 75mr6357756qhy.22.1460490374787; Tue, 12 Apr 2016 12:46:14 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.55.189.70 with HTTP; Tue, 12 Apr 2016 12:45:45 -0700 (PDT)
In-Reply-To: <8B580AD0-E10D-42C5-8806-AFA5291FD29D@vpnc.org>
References: <CAH8yC8maLvy34_visC3XvvUcxSBUD50ZFq6NQ4rV7Fve-=rHGA@mail.gmail.com> <570B5E12.6030909@it.aoyama.ac.jp> <CAH8yC8mwh0ddwu3MXdvJ9_JEccmcVx8F+tLi4ckps9Ru-ExaQw@mail.gmail.com> <8B580AD0-E10D-42C5-8806-AFA5291FD29D@vpnc.org>
From: Jothan Frakes <jothan@jothan.com>
Date: Tue, 12 Apr 2016 12:45:45 -0700
Message-ID: <CAGrS0F+2865MUFVn=7S=oOzxmVu5V8rqKn2YOHO5ihq4x4FsmQ@mail.gmail.com>
To: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: multipart/alternative; boundary="001a1135a35afccc3005304ee925"
Archived-At: <http://mailarchive.ietf.org/arch/msg/dbound/KUx_chk9QrPOg6A6atNpHKPAWr4>
Cc: Jeffrey Walton <noloader@gmail.com>, "dbound@ietf.org" <dbound@ietf.org>
Subject: Re: [dbound] Requirements for administrative boundary data sources?
X-BeenThere: dbound@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: DNS tree bounds <dbound.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dbound>, <mailto:dbound-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dbound/>
List-Post: <mailto:dbound@ietf.org>
List-Help: <mailto:dbound-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dbound>, <mailto:dbound-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Apr 2016 19:46:18 -0000

>
>
> As Martin points out, the most logical way for the owner of zone to say
> the zone's policy is in that zone or a child of the zone. To me, that's the
> most important part of the DBOUND work.
>
> +1 also

As one of the contributing volunteers on PSL I can say this is important to
us as well - that these policies be defined by the registry for 'top down'
TLDs that come from IANA delegation (we follow ICP-3 - one authoritative
root).  Some of the biggest challenges that the volunteers have are A]
multiple, conflicting requests from the same registry, B] ensuring requests
are from the authorized source, and C] if a request comes from a third
party - validating the request with the authorized source.  Having this
done in the DNS zone would eliminate all three issues for us within the
IANA chain.

That said, we also recommend any solution be designed to not discriminate,
nor have any opinion on innovation below that, such as done by Amazon,
Microsoft, Google, Github, Centralnic, Dyn or the many others who subdomain
or what they do - and encourage that if there is a top-down solution that
it not introduce burdens, walls. fees or gates where such innovation might
require blessing of the parent in some form.

We record changes the balance between these by maintaining two sections
within PSL, "Public" and "Private", respectively, as described above.

-Jothan