Re: [DNSOP] [internet-drafts@ietf.org: I-D Action: draft-bortzmeyer-dname-root-00.txt]

Stephane Bortzmeyer <bortzmeyer@nic.fr> Wed, 06 April 2016 17:59 UTC

Return-Path: <bortzmeyer@nic.fr>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4853912D53C for <dnsop@ietfa.amsl.com>; Wed, 6 Apr 2016 10:59:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kb6iH3WDEmA4 for <dnsop@ietfa.amsl.com>; Wed, 6 Apr 2016 10:59:06 -0700 (PDT)
Received: from mail.bortzmeyer.org (aetius.bortzmeyer.org [IPv6:2001:4b98:dc0:41:216:3eff:fece:1902]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF1CB12D6D9 for <dnsop@ietf.org>; Wed, 6 Apr 2016 10:59:05 -0700 (PDT)
Received: by mail.bortzmeyer.org (Postfix, from userid 10) id E47F83283B; Wed, 6 Apr 2016 19:59:03 +0200 (CEST)
Received: by tyrion (Postfix, from userid 1000) id 92971F01289; Wed, 6 Apr 2016 19:52:23 +0200 (CEST)
Date: Wed, 06 Apr 2016 14:52:23 -0300
From: Stephane Bortzmeyer <bortzmeyer@nic.fr>
To: Shane Kerr <shane@time-travellers.org>
Message-ID: <20160406175223.GA489@laperouse.bortzmeyer.org>
References: <20160406163715.GA27110@laperouse.bortzmeyer.org> <20160406143231.4ffc893f@pallas.home.time-travellers.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20160406143231.4ffc893f@pallas.home.time-travellers.org>
X-Transport: UUCP rules
X-Operating-System: Ubuntu 15.10 (wily)
X-Charlie: Je suis Charlie
User-Agent: Mutt/1.5.23 (2014-03-12)
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsop/-tJEXTW67pyexnnqGWP3mHV9RN4>
Cc: dnsop@ietf.org
Subject: Re: [DNSOP] [internet-drafts@ietf.org: I-D Action: draft-bortzmeyer-dname-root-00.txt]
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Apr 2016 17:59:08 -0000

On Wed, Apr 06, 2016 at 02:32:31PM -0300,
 Shane Kerr <shane@time-travellers.org> wrote 
 a message of 47 lines which said:

> One minor possible concern is with .ONION, where I assume that the Tor
> operators would prefer as little leakage as possible. It seems that a
> DNAME to EMPTY.AS112.ARPA which goes to an unmanaged anycast network
> might be an increase in leakage.

Not also that it is a DNAME so the AS112 servers would not see the
original TLD (although, in the specific case of .onion, they could
probably guess it from the strange look of the Onion key).