Re: [DNSOP] [internet-drafts@ietf.org: I-D Action: draft-grothoff-iesg-special-use-p2p-names-00.txt]

David Conrad <drc@virtualized.org> Tue, 03 December 2013 19:00 UTC

Return-Path: <drc@virtualized.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 94E381AD947 for <dnsop@ietfa.amsl.com>; Tue, 3 Dec 2013 11:00:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.903
X-Spam-Level:
X-Spam-Status: No, score=-1.903 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BE7buODCZyGh for <dnsop@ietfa.amsl.com>; Tue, 3 Dec 2013 11:00:14 -0800 (PST)
Received: from alpha.virtualized.org (alpha.virtualized.org [199.233.229.186]) by ietfa.amsl.com (Postfix) with ESMTP id D80F11AC829 for <dnsop@ietf.org>; Tue, 3 Dec 2013 11:00:12 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by alpha.virtualized.org (Postfix) with ESMTP id BE064863E0; Tue, 3 Dec 2013 14:00:08 -0500 (EST)
Received: from alpha.virtualized.org ([127.0.0.1]) by localhost (alpha.virtualized.org [127.0.0.1]) (maiad, port 10024) with ESMTP id 00502-01; Tue, 3 Dec 2013 14:00:07 -0500 (EST)
Received: from [10.0.1.6] (c-24-4-109-25.hsd1.ca.comcast.net [24.4.109.25]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: drc@virtualized.org) by alpha.virtualized.org (Postfix) with ESMTPSA id A6851863C6; Tue, 3 Dec 2013 14:00:06 -0500 (EST)
Content-Type: multipart/signed; boundary="Apple-Mail=_F6A8FA19-4892-4CAC-BA30-40DD311CD426"; protocol="application/pgp-signature"; micalg="pgp-sha1"
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\))
From: David Conrad <drc@virtualized.org>
In-Reply-To: <21D03162-81D1-494A-89A9-41BE89D28A0E@nominum.com>
Date: Tue, 03 Dec 2013 11:00:04 -0800
Message-Id: <BB7627E9-8D50-48E5-B809-64AE4D574271@virtualized.org>
References: <20131201164841.GB12135@sources.org> <BF87877A-8989-4AA4-9ED1-52C82E1BC538@nominum.com> <alpine.LFD.2.10.1312011206480.12923@bofh.nohats.ca> <20131202151651.GD16808@mx1.yitter.info> <A12FD3E0-58F6-4490-877F-A9C59405F717@vpnc.org> <6DBBC8339C394DBDAE4FE1F764E02A8D@hopcount.ca> <20131203170825.GA17211@nic.fr> <21D03162-81D1-494A-89A9-41BE89D28A0E@nominum.com>
To: Ted Lemon <Ted.Lemon@nominum.com>
X-Mailer: Apple Mail (2.1822)
Cc: dnsop WG <dnsop@ietf.org>
Subject: Re: [DNSOP] [internet-drafts@ietf.org: I-D Action: draft-grothoff-iesg-special-use-p2p-names-00.txt]
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Dec 2013 19:00:15 -0000

On Dec 3, 2013, at 9:27 AM, Ted Lemon <Ted.Lemon@nominum.com> wrote:
> On Dec 3, 2013, at 12:08 PM, Stephane Bortzmeyer <bortzmeyer@nic.fr> wrote:
>> If we want actual testing of the ability to run non-IN classes, I
>> accept donations in bitcoins to do so in my lab :-) But, anyway, you
>> have very little chance of convincing any developer to spend time in
>> this direction, which is clearly dead.
> 
> Furthermore, it doesn't even address the problem, because the problem we are talking about is a naming problem, not a problem that exists within the DNS protocol.  So by definition you can't solve it with classes, because classes are a DNS thing.

If it isn't a DNS thing, then why is there a discussion of the allocation of top-level _domains_?  If these applications aren't making use of the DNS, then why does anyone care if they use something that looks like a domain name?

The issue here is that they are, in fact, using the DNS in the sense that they are using applications that expect to query a local DNS stub resolver and they are (presumably) expecting that resolver to distinguish between a query for a "regular" domain name and one of these non-DNS "domain names". The reason they can't use classes is because there isn't a convenient mechanism to specify an alternative class using the vast majority of applications, hence a fallback to distinguishing using "special" names.

I have significant concerns that this is not going to scale. There needs to be a better discriminator than simply "because I wrote an RFC that describes a protocol that assumes a top-level domain".

Regards,
-drc