Re: [DNSOP] Possible alt-tld last call?

"Rob Wilton (rwilton)" <rwilton@cisco.com> Wed, 19 October 2022 12:54 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 83274C14CE33; Wed, 19 Oct 2022 05:54:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.608
X-Spam-Level:
X-Spam-Status: No, score=-14.608 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=EowEAP3O; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=SBU3lApi
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dTh7Kvi4FQAp; Wed, 19 Oct 2022 05:54:46 -0700 (PDT)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4820BC14CE2E; Wed, 19 Oct 2022 05:54:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=55268; q=dns/txt; s=iport; t=1666184086; x=1667393686; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=+ssF0QUJLtQTczxGhNsSWwgcusyNQF3mge690ahI/xc=; b=EowEAP3OmQC6cL1VgK1mBLuzaAiqAAr3FXK5EkKfDV9SBr3awd6p+PZi Z1UfSrDPFM5cm0KaGXe104X3w0vUTANOUsBEuT4tb5lrNvxPFahjf0TMB 2Ep5bgrkJVi2RqpxZdPI2XlEXHqrAYp8+uK90wzllB0yt1c1o8S1R1vqC w=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:WxWJGBY3Y14T8fzq9eMWbQb/LTAphN3EVzX9orIriLNLJ6Kk+Zmqf EnS/u5kg1KBW4LHo+lFhOzbv+GFOyQA7J+NvWpEfMlKUBkI2skTlhYrVciCD0CzJfX2bis8S cJFUlIt/3yyPUVPXsjkYFiHqXyp5jlUERL6ZmJI
IronPort-Data: A9a23:WKtl7a3SUFXfQ5vz9PbD5dBxkn2cJEfYwER7XKvMYLTBsI5bpzwOx mYYDDuPO/veM2GhctpwaoqypBsCuZSHz9VnHQU/3Hw8FHgiRegpqji6wuYcGwvIc6UvmWo+t 512huHodZxyFjmGzvuUGuCJQUNUjclkfZKhTr+ZUsxNbVU8En140Usyw7RRbrNA2LBVPSvc4 bsenOWHULOV82Yc3rU8sv/rRLtH5ZweiRtA1rAMTakjUGz2yxH5OKkiyZSZdBMUdGX78tmSH I4vxJnhlo/QEoxE5tmNyt4XeWVSKlLe0JTnZnd+A8CfbhZ+SiMazIV8bqAtUk1tkBqippcp0 udztMSBcFJ8VkHMsLx1vxhwGiV6O+hN/6XKZCH5us2IxEqAeHzpqxlsJBhpZstDpKAuWicXr qVwxDMlNnhvg8qs37O/Vu5qrs8iN8LseogYvxmMyBmCVKp/HcGdK0nMzfNXjCYRqsZIJM79Q 9I5ZjM0UVebYSQabz/7D7pnzLv32RETaQZwpFSOorJy6GjazRZq+LngLNSTfcaFLe1ZmF2fv krH8nj3RBYAO7SiJSGt+3aogKrEmjn2HdtUH7yj/fksi1qWroAONPEIfUWY5qPju3W0YclwA HVTojAck6lqxXX+G7ERQCaEiHKDuxcdXf9ZHOs79ByBx8LoD+CxWzZsotlpNYFOiSMmedA5/ gTSxoq2W1SDpJXQGCzDqebNxd+nEXJNRVLucxPoWufsDzPLiYU3gxSnoj1LT/Pt14ad9d0dP 1m3QMUWjrEXi4sA0L+2uAmBiDO3rZ+PRQkwjuk2Yo5Hxl4oDGJGT9X3gbQ+0RqmBN3EJrVml CNf8/VyFMhUUfmweNWlGY3h5o2B6fefKyH7ilVyBZQn/DnF0yf9I94JuW4ufxkxaJpsldrVj Kn75FM5CHh7YSvCUEOLS9nZ5zkClPK5To21Cpg4kPIfP8IZmPC7ENFGPB7MgD+FfLkEmqAkM pDTate3EXsfEsxaIMmeGY8gPUsQ7nlmnwv7HMmjpzz+iOb2TCDOE98tbgDRBt3VGYvZ+m05B f4FaZvTo/ieOcWjChTqHXk7dAlTcSdqXc6t8qS6tIere2JbJY3oMNeJqZtJRmCvt/s9ejvgl p1lZnJl9Q==
IronPort-HdrOrdr: A9a23:XRNDK6sdqQWzSgqwfItXpy4L7skCyIMji2hC6mlwRA09TyXGra 6TdaUguiMc1gx8ZJh5o6H9BEGBKUmskaKdkrNhQotKPTOW9VdASbsC0WKM+UyZJ8STzJ8+6U 4kSdkCNDSSNyk3sS+Z2njCLz9I+rDum8rE5Za8854ud3ARV0gK1XYfNu/vKDwOeOAwP+teKH Pz3LsjmxOQPVAsKuirDHgMWObO4/fRkoj9XBIADxk7rCGTkDKB8tfBYlel9yZbdwkK7aYp8G DDnQC8zL6kqeuHxhjV0HKWx4hKmeHm1sBICKW3+4Yow3TX+0eVjbZaKv6/VQMO0aOSAZER4Z zxSiIbToROArXqDyWISFXWqk7dOX0VmgHfIBej8AreSIrCNXQH4w4rv/MATvMfgHBQ5e2UmZ g7r16xpt5ZCwjNkz/64MWNXxZ2llCsqX5niuILiWdDOLFuIIO5gLZvin+9Kq1wVR7S+cQiCq 1jHcvc7PFZfReTaG3YpHBmxJipUm4oFhmLT0AesojNugIm1kxR3g8d3ogSj30A/JUyR91N4P nFKL1hkPVLQtUNZaxwCe8dSY+8C3DLQxjLLGWOSG6XX50vKjbIsdr68b817OaldNgBy4Yzgo 3IVBdCuWs7ayvVeLqzNV1wg2TwqUmGLEHQI5tllutEU5XHNcjWDRE=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.95,196,1661817600"; d="scan'208,217";a="3141496"
Received: from alln-core-1.cisco.com ([173.36.13.131]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 19 Oct 2022 12:54:30 +0000
Received: from mail.cisco.com (xfe-rtp-005.cisco.com [64.101.210.235]) by alln-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 29JCsTrF031641 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Wed, 19 Oct 2022 12:54:30 GMT
Received: from xfe-rcd-005.cisco.com (173.37.227.253) by xfe-rtp-005.cisco.com (64.101.210.235) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9; Wed, 19 Oct 2022 08:54:28 -0400
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-005.cisco.com (173.37.227.253) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9 via Frontend Transport; Wed, 19 Oct 2022 07:54:28 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WhkGw0uoPPITWjHaSuHp0+TYgvFzbKIa+W7ZIgVBG3lcEEAh1f+UhI+rahRvvARQW0m/EUVrnCDqdb+vuUtz6KytMmEXuZ/mioSGzuzad6BIekYUn8oCKf1+3J05Tc2zQHYrOx9SIIg2siSijq8+QA/jXWz77qG5ciK9KSp1XVqMB0dK0xLAMFqmIJe7RGZKglcGK4thtzfuztxo2dWtb+7AK6cN+0YYFrjC2J/QQfKTkn99RJl39ayiyyPL+IIcmAXLlITWkCXVOu4EPqkzHVj4XNSA2mMGprnz6VmbS3rIeq4Am6EEtsNUGFDDIgAlz4fIk3+hng+XkDrRLa1Xcw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=+ssF0QUJLtQTczxGhNsSWwgcusyNQF3mge690ahI/xc=; b=FDniGkmHkD2kRtRrS6cF5d5gWby6Uj104weBrqNsz5IM+/KeYCFnrED58gyFYw/jMlvPCvBYWG6QIechTneLZfpVMmRsXSjqbqgUjxzT+4Y0AcOBdu+rxpKIIkDGlE2GJ1olm/1UEugeD/rA0uFD415T5YX/kipFBWVG6yH3IqFdWNs7Q5lmUod9qs2/BEwxdye0avRA1BkzgpivVQqaFlSAsRZvF/GrAw0G9jYas2xT74hWde7Lo00nST4dOXcUX9UvsbSGQi2GNCv21qH2JKzU1Lvh8bHasl8j2UBlXQZkYNnMpcoGPA/BGoPC8vve0UF84YK8V42P/DXj0D1yfQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+ssF0QUJLtQTczxGhNsSWwgcusyNQF3mge690ahI/xc=; b=SBU3lApiLdjFwDSV3JgiTYmRPENtANSkFGPTPir3HO+AwxQAKeEG2Wqrcl/bcjL3ZKy5iG6hYwXKyIwJF7+/Vn9XrT3Yki6GKnZDWrj2b4Fu2eICSZrUR1qhyyOFaUAZB8KBSgXjrK2MUY6sx1nxEPsOOmToH/123DnyayjEepY=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by BL1PR11MB5511.namprd11.prod.outlook.com (2603:10b6:208:317::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5723.34; Wed, 19 Oct 2022 12:54:26 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::dccd:b45d:104b:851c]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::dccd:b45d:104b:851c%5]) with mapi id 15.20.5723.033; Wed, 19 Oct 2022 12:54:20 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: "dnsop@ietf.org" <dnsop@ietf.org>
CC: DNSOP-Chairs Chairs <dnsop-chairs@ietf.org>
Thread-Topic: Possible alt-tld last call?
Thread-Index: AQHY4XBoiHra3bvIcEKSRB4Bi9FNqK4UfHnQ
Date: Wed, 19 Oct 2022 12:54:20 +0000
Message-ID: <BY5PR11MB41963E8ADCD2D5406C196FC1B52B9@BY5PR11MB4196.namprd11.prod.outlook.com>
References: <D4D1C61C-6DAF-4D02-A861-D808270687B0@pir.org>
In-Reply-To: <D4D1C61C-6DAF-4D02-A861-D808270687B0@pir.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4196:EE_|BL1PR11MB5511:EE_
x-ms-office365-filtering-correlation-id: 9fb40200-aead-4f07-8732-08dab1d10a7f
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: bwXLSQoPoaoDLe0v25qrGdsOQLSnztBz8+tcnVFzkczC/LMcHfTngtmm0OCS4fHzixEPvucYXVIQ2QijAOWpNAV3vkiNKwbnd42ZzaD6UK0IcHo45vFIDwT2Qm0qR3i6mqHFvNAn38eaOBFbeA9EIGN2bBhPqRbiEZp8iErxXiXJRlATZ8GFZ+c2vZjzFi2Jcv57u/YwZW3wQV+JTynBZUmd7sLnpniiHppBQT+GwVebM9Fq2jpj9E+Yytjsz3FwZujCU8mrBOvn4JJSA3/WnQnCJWg3LpMMrfslJuelM+Ps0/xES9dJDaohFYha0SPMvREUMk1n4ndYnhK5bvC/tIog+rATfpp9uCH4ggnuu+KiMRGNDGOhVZWaQJGj5IXrwGJjX/KtWpWxh/yYjm3lp4CqVrpiygO6NdMBtRtAbOf895xP1HvGEBF3LQaXV2z+PJAvQyryDvgCSHx5J7/3YILSPzpEeGfhIyi2fdyBSzto1A8X3z0CQgyCfb828xqysn9BSrGu//98dAkRYg8qIU2tIsVaLmDRC5wsglnTmhAnnwM6IsL14+xkM8Cw1eh6okqgs6ICLQtcdr+EuMuap13VbP3catIEuBNhGVSou4ZOi3hxBkhKylmKDojfJgogmOQli9vOfsioQFH9D+PIcbjjEeYaMvR6rnLbGUFdz4gmL7tkT2wsFRPV3Kfg3Y2VVbAtRK9QmPxpHLpxW5qhi2pZ/2lvrmkQygAxTlW4d401O14gVCBZbvS3npYwNMxFB7pBkNHOxInFp9BTOKIikA==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(136003)(366004)(39860400002)(396003)(376002)(346002)(451199015)(4326008)(5660300002)(450100002)(76116006)(8676002)(8936002)(2906002)(66946007)(64756008)(66446008)(66476007)(66556008)(71200400001)(30864003)(55016003)(6916009)(41300700001)(33656002)(316002)(52536014)(3480700007)(83380400001)(38070700005)(38100700002)(122000001)(6506007)(53546011)(478600001)(7696005)(66899015)(86362001)(186003)(9686003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BY5PR11MB41963E8ADCD2D5406C196FC1B52B9BY5PR11MB4196namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9fb40200-aead-4f07-8732-08dab1d10a7f
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Oct 2022 12:54:20.8601 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 2O6V/xSkI9qIAp/2ux4gLvusB5OURep6t4Bt9uVtymhFFdXb8PQoXgqWtakBvCKSdHVoJrby171KkuGrmqhQEw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR11MB5511
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 64.101.210.235, xfe-rtp-005.cisco.com
X-Outbound-Node: alln-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/3YkJa6Nxeo9mH0AEV70O3jtgOq0>
Subject: Re: [DNSOP] Possible alt-tld last call?
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2022 12:54:50 -0000

Hi WG & chairs,

I’m chiming in on this thread with a “responsible AD for the alt-tld draft” hat on.

The reason for my interjection is only because I’ve seen some comments stating that this topic is too hard, we can’t get rough consensus, and hence the WG should give up and declare defeat.  However, from my reading of the thread, I’m not convinced that the WG is necessarily that far away from rough consensus, particularly on the significant (i.e., most important) parts of the draft.  Nor, if the WG declares failure, do I see a better path forward.

I will inject a disclaimer here, that I don’t know that much of the history regarding special use domain names.  I can entirely understand that they are generally icky, and probably not what DNSOP WG wants to spend its time and energies on and have caused previous unfruitful discussions.  I also appreciate that DNSOP WG is more interested in ensuring DNS works properly rather than building, encouraging, or sanctioning entirely alternative naming schemes.  This is all fine and not surprising.

However, there are clearly some organizations that are interested in exploring alternative name services.  In an ideal world we might like these namespaces to be entirely separate from the DNS, but from an end-user perspective I can see how these things can easily get muddled.  As such, I see the alt-tld document as potentially being helpful, particularly for the proponents of proposals such as GDS, where my interpretation is that they are trying to do the right thing, and they are also trying to play nice with the existing DNS infra.

A few comments on specific aspects of this document:


  1.  I think that we should leave considerations of what to do with RFC 6761bis entirely outside the considerations for this draft.  RFC 6761bis seems like a bigger, harder problem to solve problem, than this draft.  As the chairs have suggested, I think that the alt-tld document should probably include the necessary text to conform to RFC 6761, even if it that text isn’t particularly useful. My suggestion would be to put such text in an appendix.

  2.  I think that the WG should put aside concerns about ICANN.  My instinct, from reading some of the previous recent liaison statements between the IETF and ICANN is that what is proposed in this draft is within scope of the IETF’s remit.  However, assuming that we can get to WG rough consensus, i.e., past WGLC, then I would propose that we send a liaison statement to ICANN, highlighting this draft, and asking them if they have concerns or comments with the IETF progressing this document.  I would take on board the reply to that liaison in determining whether and how to progress the document.

  3.  Some participants have indicated that they don’t support this document because they don’t think that it will end up being useful (principally because the other naming systems may still squat on TLDs anyway), but that they are also not opposed to publishing this document because they also see that it won’t cause harm either.  I regard these views as being within rough consensus of publishing this document.

  4.  The main remaining point of contention that I see, is whether IANA should maintain a registry of protocols under .alt, and if it does, whether the entries in the registry must be “unique”, what registration policy should be applied, and if there are any legal implications on the IETF or IANA on maintaining such a registry.  I have two comments on this:
(i) I think that it is reasonable for the WG to defer the issue of whether maintaining such a registry could cause wider problems for the IETF/IANA to both IANA and the IESG, which would naturally happen at IETF LC + IESG review time anyway.  The WG’s concern with the registry would be flagged in the shepherd’s writeup, and as responsible AD for the document, I would also explicitly flag the WG’s concern to the rest of the IESG for consideration during IESG review.  Finally, the IESG have the option of consulting with legal counsel if needed. If we go ahead with the registry, and it turns out to be a problem in practice, then we always have the option of refining the registry rules, or even deprecating the registry entirely.  I.e., nothing is set in stone.
(ii) As has been noted by others, there is always the fallback option of not having any IETF/IANA managed registry for protocols under .alt at all.  Even without the registry, I still think that the rest of the document is potentially useful, and not harmful.  I.e., specifically, if we are unable to get consensus on the registry then I believe that it would be better to publish the document without the registry than not publish at all.


Without any hats, I have some specific suggestions on the text in section 3.2, “Non-DNS Protocols Using the .alt Pseudo-TLD Registry” on version -17.


  1.  The description of the registry could perhaps be more explicit that the registry (i) does not indicate any IETF endorsement of entries in the registry or the referenced specifications (although I think that this is probably generally a given for IANA registries anyway), and (ii) nor does the registry make any guarantees that it is necessary complete.
  2.  I would recommend a registration policy of “Specification required”.  Specifically, the definition of specification required automatically includes expert review, and RFC 8126 already allows appeals to the IESG/IAB for rejected registrations.
  3.  There should be documented guidelines of what the expert review part of the “Specification Required” policy should entail:
     *   The specification needs to be for a name resolution system and be documented in a stable reference (as per RFC 8126).
     *   The expert reviewer may, but is not required, validate the quality or correctness of the specification.  The expert reviewer may reject requests where the specification is insufficient.
     *   Name resolution protocols are expected to only require a single entry, or otherwise a very small number of unique entries, directly under .alt.
     *   Name resolution protocols SHOULD choose a unique name under .alt, but the expert reviewer MAY allow multiple entries under .alt in exceptional circumstances.

Proposed next steps (for authors, WG, and WG chairs to consider):

I think that it would be helpful for the authors to post an updated version of the draft aiming to incorporate the feedback that has been received recently.

I also suggest that it would be helpful to have discussion this draft in DNSOPS in IETF 115, if there is time available.  It is up to the authors & WG chairs, but it may be useful to do a hum or “show of hands” on test consensus (specifically if anyone can’t live with) on the proposals for: 4(i), and 4(iii) above.

I am, of course, happy to receive comments from the DNSOP WG (or chairs, or authors) on the mailing list on any aspect of my comments above, either stating that the proposals are awful/misguided/wrong/etc, or that they could be an acceptable way forward.  But I would really appreciate it if we can try and compromise a little to find a way forward.

Kind regards,
Rob


From: DNSOP <dnsop-bounces@ietf.org> On Behalf Of Suzanne Woolf
Sent: 16 October 2022 16:03
To: dnsop@ietf.org
Cc: Rob Wilton (rwilton) <rwilton@cisco.com>; DNSOP-Chairs Chairs <dnsop-chairs@ietf.org>
Subject: [DNSOP] Possible alt-tld last call?

Dear Colleagues,


The chairs have gotten a couple of requests, off-list and on, for a WGLC on draft-ietf-dnsop-alt-tld.

We’ve reviewed the current draft closely and have some concerns that we feel need to be resolved before any effort to move the draft forward. (Suzanne wrote this but it’s been discussed among all of the co-chairs.)

1. As far as I can tell, this draft does not comply with RFC 6761. This is a problem for two reasons.

First, this creates a process problem in that RFC 6761 is the standards-track document that specifies how the SUDN registry is to be administered, so a request that doesn’t meet the requirements in 6761 can’t (or at least shouldn’t) go into the registry.

RFC 6761 section 4 asserts:

The specification also MUST state, in each of the seven "Domain Name Reservation Considerations" categories
below, what special treatment, if any, is to be applied.

The alt-tld draft ignores this MUST, without explanation (unless I missed it).

The substantive issue is that the questions in Section 5 are there to make sure there’s a full description of the expected handling of a proposed name by the assorted components that take part in DNS operations and protocol. The draft answers at least some of the Section 5 questions, but the answers are largely implied.

For example, the draft says that DNS resolvers seeing .alt names "do not need to look them up in the DNS context”, but a big part of the point of codifying these names is the assumption that queries will leak and DNS servers will see them. (“Do not need to” isn’t even “SHOULD not”.) It’s implied that .alt is simply not in the public DNS root zone and the root servers (or better yet, any intermediate resolver) should answer “name error”/NXDOMAIN for such queries. But this should probably be said explicitly, because people who configure DNS servers and services shouldn’t have to guess what’s being implied here. (The WG discussed the possibility that such queries should be blackholed and not answered at all, which is in some ways an obvious answer. Clarification of why this was discarded might also be helpful.)

So, the current draft isn’t meeting the requirements for the registry, and also doesn’t clearly answer substantive questions about what DNS operators are expected to do. This makes me uncomfortable doing a WGLC without a new rev. It would be Rob Wilton’s call of course (as AD for this draft, substituting for Warren) but I’m really uneasy with a WGLC without those changes— they seem rather too large to punt for a post-WGLC version.

2. Having the IETF maintain a registry of pseudo-SLDs concerns me on the basis that having the IETF “recognize” (if only by recording) such pseudo-delegations may serve to attract unwanted attention to the IETF’s supposed recognition of alternate (non-DNS) namespaces as reservations of the namespace from the shared, common DNS root. We’re still being denounced in certain corners for .onion. It might be good to have a paragraph calling out specifically why .alt is not a delegation of a TLD from the DNS root by the IETF, even though it looks like one. (We didn’t invent this problem, because we didn’t make the decision that top-level domain labels should be used by other protocols in a way that led to confusion. But let’s not propagate it.)

3. A couple of nits (p. 2): the definition of “pseudo-TLD” uses the term “registered” differently than common usage. Judging from searches on RFC 6761 and RFC 8499, it’s ambiguous for DNS naming and resolution, and “registered” can definitely mean something different to a registry or registrar than it does to a DNS operator. To people who operate TLD registries, a name can be “registered” and still may or may not be delegated. (“Label” is defined in 8499, “register” and “delegate” are not.) And, in the reference to “TLD,” it feels strange to expand the acronym to “Top-level label” even if “label” is the right word for what you’re talking about.

Thanks to the editors and the WG for considering these comments.


Best,
Suzanne
(For the chairs)