[DNSOP] Re: [Ext] Re: [EXTERNAL] Re: Call for Adoption: draft-davies-internal-tld

Michael De Roover <ietf@nixmagic.com> Mon, 05 May 2025 21:15 UTC

Return-Path: <ietf@nixmagic.com>
X-Original-To: dnsop@mail2.ietf.org
Delivered-To: dnsop@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 32EC9250C8F4 for <dnsop@mail2.ietf.org>; Mon, 5 May 2025 14:15:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0oKEAY3TyExd for <dnsop@mail2.ietf.org>; Mon, 5 May 2025 14:15:41 -0700 (PDT)
Received: from nixmagic.com (e1.nixmagic.com [116.203.235.171]) by mail2.ietf.org (Postfix) with ESMTP id 8695F250C8ED for <dnsop@ietf.org>; Mon, 5 May 2025 14:15:41 -0700 (PDT)
Received: from workstation.vm.ideapad.lan (dhcp13.lan [192.168.10.213]) by nixmagic.com (Postfix) with ESMTPSA id AAB86F8DC; Mon, 5 May 2025 21:15:40 +0000 (UTC)
From: Michael De Roover <ietf@nixmagic.com>
To: Philip Homburg <pch-dnsop-6@u-1.phicoh.com>, DNSOP Working Group <dnsop@ietf.org>
Date: Mon, 05 May 2025 23:15:40 +0200
Message-ID: <2796076.J18nJlZdWt@workstation.vm.ideapad.lan>
Organization: workstation.vm.ideapad.lan
In-Reply-To: <m1uBHRs-0000LsC@stereo.hq.phicoh.net>
References: <1C9E8ABA-4399-491B-A9F4-D9ACCB1BA72C@virtualized.org> <9EE8E4CC-04A3-46C7-BDDF-EF538A822AA8@virtualized.org> <m1uBHRs-0000LsC@stereo.hq.phicoh.net>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"
Message-ID-Hash: KPM32OUHHO6BXXU3SARMOMP66DZAMR67
X-Message-ID-Hash: KPM32OUHHO6BXXU3SARMOMP66DZAMR67
X-MailFrom: ietf@nixmagic.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Martin Schanzenbach <schanzen@gnu.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [DNSOP] Re: [Ext] Re: [EXTERNAL] Re: Call for Adoption: draft-davies-internal-tld
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/2t0JFQFYU4e0wTumVRgv1oCdvPU>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>

Hi, I had a read through v3 of the draft and have a couple more remarks, which 
this message seems to lean closest into. Thank you for having submitted it.

On Saturday, May 3, 2025 8:18:51 PM CEST Philip Homburg wrote:
> .onion
> 
> This is not DNS. Nobody is supposed to run a .onion zone anywhere. So
> no issue. From, a DNS point of view, this domain does not exist.

This is something I was reminded of, from seeing it in the SUDN registry and 
here. It reminds me of how web browsers enter the picture here (though DNS use 
of .internal does not seem limited to that). But being part of the Tor 
network, .onion does have a significant use for specific web browsers.

While MS Edge seems to have just treated it as-is just now (hmm), I might want 
to know that this is to be treated differently if I were a browser vendor 
(which I am not, though I do have a satirical project of that sort). And for 
that, I would look in the SUDN registry so that users attempting to visit a 
.onion in my web browser do not bother the root servers with it.

> Can you explain how this is relevant to the .internal discussion
> which is specifically reserved to be used in DNS?

Within the context of .internal, I would like to remark browsers' role in this 
for internal domain names (currently e.g. .lan in my networks). So the web 
browser has an omnibar, right. And depending on what you put into it, the 
browser needs to decide whether it should execute a DNS lookup and HTTP 
request, or treat it as a search query. For domains on .lan, it always seems 
to need a trailing /, most of the time not even . apex cuts it here. Which is 
annoying.

So being in the SUDN registry, maybe browser vendors would be inclined to at 
least consider treating .internal domains as "this is not a search query, that 
is a domain". MS Edge has proven to me tonight that this is still not a given. 
But it might draw some attention from some browser vendors. That's what I 
would want to achieve.

> .alt
> 
> Again, not DNS. No need to worry about DNSSEC validation because no DNS
> is supposed to exist under .alt.

I remember remarks from Martin Schanzenbach about that, in relation to GNS. I 
wonder how the project is doing now, at the time it did pique my interest... 
How do these kinds of domains get handled for DNSSEC and such by the roots? 
Same question for other domains currently in the SUDN by the way, notably 
home.arpa. and RFC1918 private-use IPs and their PTR zones.

> > As Paul points out, this suggests a need for documentation on how
> > an end-user device that happens to include a DNSSEC validator should
> > behave in the face of names that do not exist for some purpose.
> 
> 
> I'm perfectly fine with delaying the .internal draft until such a 
> documentation has been created for general end-user devices.
> 
> I'm curious what it would look like. Do we expect end-users to know to
> add a negative trust anchor for .internal when they arrive at work and then
> remove it again when they go home?
> 
> Does this involve editing a random config file somewhere on the device?

I'll admit that DNSSEC is something I know nothing about... 5 proverbial 
experience points, I know that it exists. But I don't use it, nor do I know 
how to. ZSK and KSK makes my head spin. But what I can say is that even if 
devices with such specific validator in them are far and wide in between, 
having to do all of that would be a major pain in the rear.

The draft does mention that the role of the root server operators should be 
minimal, which I think is a good idea. But for the stewardship role they have, 
perhaps DNSSEC should be handled there. Again, no experience here, but it 
would be good practice to place such configuration changes as high as 
reasonably possible in the chain.

-- 
Met vriendelijke groet,
Michael De Roover

Mail: ietf@nixmagic.com
Web: michael.de.roover.eu.org