Re: [DNSOP] And the Wait Continues for .Corp, .Home and .Mail Applicants

Jim Reid <jim@rfc1035.com> Mon, 13 March 2017 10:09 UTC

Return-Path: <jim@rfc1035.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2226612957D for <dnsop@ietfa.amsl.com>; Mon, 13 Mar 2017 03:09:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wV9_0g9iVCdp for <dnsop@ietfa.amsl.com>; Mon, 13 Mar 2017 03:09:06 -0700 (PDT)
Received: from shaun.rfc1035.com (smtp.v6.rfc1035.com [IPv6:2001:4b10:100:7::25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7459F12956D for <dnsop@ietf.org>; Mon, 13 Mar 2017 03:09:06 -0700 (PDT)
Received: from [IPv6:::1] (shaun.rfc1035.com [93.186.33.42]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by shaun.rfc1035.com (Postfix) with ESMTPS id 58BD3242125A; Mon, 13 Mar 2017 10:09:04 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Jim Reid <jim@rfc1035.com>
In-Reply-To: <7D49542B-1852-464A-B3F0-198357DC18A6@nic.fr>
Date: Mon, 13 Mar 2017 10:09:02 +0000
Content-Transfer-Encoding: quoted-printable
Message-Id: <9DC12AF5-F844-4F7A-95CF-B5C0B5358E55@rfc1035.com>
References: <7D49542B-1852-464A-B3F0-198357DC18A6@nic.fr>
To: Stephane Bortzmeyer <bortzmeyer@nic.fr>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/12_TiYWOw-gjqK-P1c_XmgSHdhY>
Cc: dnsop@ietf.org
Subject: Re: [DNSOP] And the Wait Continues for .Corp, .Home and .Mail Applicants
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Mar 2017 10:09:08 -0000

> On 13 Mar 2017, at 07:05, Stéphane Bortzmeyer <bortzmeyer@nic.fr> wrote:
> 
> This is relevant to the Special-Use registry discussion. (Which is mentioned, in a negative way.)

Meh. I fail to understand how the problems that the applicants for these strings made for themselves could be in scope for this WG or the IETF more generally.

If these applicants want these strings to go into the root, they first need to convince ICANN that this won't cause significant problems and/or come up with viable risk mitigation strategies. Once they do that, ICANN may well turn to the IETF or other groups of experts -- SSAC? -- for advice on what to do. How those damage limitation approaches get developed is not something that should concern this WG.

Personally, I think putting .home in the root is doomed forever. This string *still* accounts for 3-4% of the queries in the root server DITL datasets: higher than the queries for almost every existing TLD and the root. (Only .com and .net had higher numbers than .home in the 2016 root server pcaps.) Last time I looked, traffic for .home in the DITL data has increased every year since the 2013 name collision study, both in absolute and relative terms.