Re: [DNSOP] Status of "let localhost be localhost"?

Jacob Hoffman-Andrews <> Wed, 02 August 2017 17:24 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 8AE31131FC0 for <>; Wed, 2 Aug 2017 10:24:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -7.002
X-Spam-Status: No, score=-7.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id dCs0zbaxww7s for <>; Wed, 2 Aug 2017 10:24:05 -0700 (PDT)
Received: from ( []) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id E2724131E9F for <>; Wed, 2 Aug 2017 10:24:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;; s=mail2; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:MIME-Version:Date:Message-ID:From:References:Cc:To:Subject; bh=KlMoKDcll+xxxVPuZ4k9hoRTp4zC+wLscyFRz4yKSFA=; b=hvD9Uqs+i5/Q69nWWvzsSnjhcjMJ+GKYxQ2NYAPuVDdxQICbowHlj5KYM30gFqlMurXbu8CIdASt9rv1HkZSm5pYHDovLHwnyI4UszGOuIIRoLMH9hiSRGJSjQNlnT863v/VhN+WmjTTmYkmatO1J6L3i2f2t8lOf42l0umM9lE=;
Received: ; Wed, 02 Aug 2017 10:24:04 -0700
To: Mark Andrews <>
References: <> <> <> <>
From: Jacob Hoffman-Andrews <>
Message-ID: <>
Date: Wed, 2 Aug 2017 10:24:05 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
In-Reply-To: <>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Received-SPF: skipped for local relay
Archived-At: <>
Subject: Re: [DNSOP] Status of "let localhost be localhost"?
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Wed, 02 Aug 2017 17:24:08 -0000

On 08/01/2017 06:23 PM, Mark Andrews wrote:
> The query for foo.localhost doesn't need to hit-the-wire for this
> to be a issue.  Ask your self why RFC 6303, Security section has
>    As DNSSEC is deployed within the IN-ADDR.ARPA and IP6.ARPA
>    namespaces, the zones listed above will need to be delegated as
>    insecure delegations, or be within insecure zones.  This will
>    allow DNSSEC validation to succeed for queries in these spaces
>    despite not being answered from the delegated servers.
> or draft-ietf-homenet-dot-10 is doing the same thing for "".

RFC 6303 says "as DNSSEC is deployed within...". There's no plan to
deploy DNSSEC within .localhost, because it doesn't make sense there;
all resolutions should be handled locally.

> We didn't add the requirement for insecure delegations for the fun
> of it.  We added it so that the tools that validate will not break
> when those names are being used.

Can you tell me more about what type of tools you're thinking of here?
Are those tools expected to handle "foo.localhost" domains? If so, what
do they currently do with such domains?

To put it another way: is your concern about new potential for breakage
under this draft, or are you saying that there is existing breakage that
we might as well fix as long as we are touching ".localhost"?