Re: [DNSOP] New Version Notification for draft-adpkja-dnsop-special-names-problem-00.txt

"Patrik Fältström " <paf@frobbit.se> Thu, 26 November 2015 18:21 UTC

Return-Path: <paf@frobbit.se>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D2691A1BF1 for <dnsop@ietfa.amsl.com>; Thu, 26 Nov 2015 10:21:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.436
X-Spam-Level:
X-Spam-Status: No, score=-0.436 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, HELO_EQ_SE=0.35, MIME_8BIT_HEADER=0.3, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4lIq_LTeeQSB for <dnsop@ietfa.amsl.com>; Thu, 26 Nov 2015 10:21:11 -0800 (PST)
Received: from mail.frobbit.se (mail.frobbit.se [IPv6:2a02:80:3ffe::176]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0906F1A1BF3 for <dnsop@ietf.org>; Thu, 26 Nov 2015 10:21:11 -0800 (PST)
Received: from [192.71.80.131] (unknown [192.165.72.17]) by mail.frobbit.se (Postfix) with ESMTPSA id 459D8214B8; Thu, 26 Nov 2015 19:21:06 +0100 (CET)
From: "Patrik =?utf-8?b?RsOkbHRzdHLDtm0=?=" <paf@frobbit.se>
To: "Joe Abley" <jabley@hopcount.ca>
Date: Thu, 26 Nov 2015 19:21:05 +0100
Message-ID: <20CA85A8-D24C-4BAD-BF97-39F05AF22B0C@frobbit.se>
In-Reply-To: <B0B4554C-9740-451F-88D3-331FB258E23F@hopcount.ca>
References: <20151019232608.9713.92337.idtracker@ietfa.amsl.com> <68818B75-F6F6-44A1-BAF5-BB68B7BD86F6@hopcount.ca> <EB6AB6D0-8808-49C2-90DE-F4E6E146BDE8@frobbit.se> <B0B4554C-9740-451F-88D3-331FB258E23F@hopcount.ca>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=_MailMate_8A27E754-6A47-4643-B225-08B2E1389CDE_="; micalg=pgp-sha1; protocol="application/pgp-signature"
X-Mailer: MailMate (1.9.3r5187)
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsop/QzapHs2w5NZGU6QjgwLLUjfs3nE>
Cc: dnsop WG <dnsop@ietf.org>
Subject: Re: [DNSOP] New Version Notification for draft-adpkja-dnsop-special-names-problem-00.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Nov 2015 18:21:13 -0000

On 26 Nov 2015, at 18:05, Joe Abley wrote:

> On 25 Nov 2015, at 0:40, Patrik Fältström wrote:
>
>> I have read this draft and have a number of comments. I can not say these are the only ones, but at least some :-)
>>
>> The dominant protocol for name resolution on the Internet is the
>> Domain Name System (DNS).  However, other protocols exist that are
>> fundamentally different from the DNS, but which have syntactically-
>> similar namespaces.
>>
>> I claim that if it is syntactically similar and the names are used interchangeable in protocols (see below) we actually DO talk about use of the same namespace. This is the camel in the tent, and I think we should just admit, or say clearly whether we do talk about, which I think we do, one name space with multiple resolution mechanisms.
>
> That's a possible direction. However, I don't know how far we will get with that approach, since every additional example of a name resolution protocol comes with an attendant list of exceptions, e.g.
>
> - LOCALHOST -- it's a single, dotless name, and there's no hierarchy
> - LOCAL -- child labels can contain spaces and UTF-8-encoded symbols, single-label depth
> - ONION -- a single, fixed-width second-level label (base32-encoded first 80 bits of a SHA-1 hash) and anything at all under that (not relevant to the name resolution protocol, but perhaps useful to applications)
>
> I think the useful point to make is that the intersection of all these sets of possible names is non-empty -- that is, you can trivially find examples of names that are legitimate to more than one name resolution protocol, and hence a potential source of confusion to end-users and applications.

Hmm...I think I understand what you mean here. What I was after was that the strings are replaceable in the various protocol definitions where "domain name" is supposed to be. Then of course certain combination of octet values are not possible depending on various rules. By the protocol where the string is in use, and (as you point out) because of the different resolution mechanisms.

When thinking of what comes below, what do you say about EXAMPLE? What are the rules for that? ;-)

>> It is not so much different protocols as different resolution mechanisms. If you say "protocol" here, it might sounds like if with the DNS protocol you can not use multiple different resolution mechanisms (which I think one can -- one of them using the root managed by ICANN).
>
> Yes, I think it would be better to choose a distinct phrase for what we're talking about here and define it early. I've used "name resolution protocol" for this, but no doubt there are better alternatives.

Hmm...if I knew a good name, I would suggest it. I just stumbled myself over the word "protocol".

>> What about EXAMPLE?
>
> I think (but have no citations handy to support my thinking) that EXAMPLE is a reserved top-level label in the DNS, not an example of what Alain called a protocol switch.

;-)

To some degree it is a protocol switch, right? It should never ever be used. /dev/null comes to mind... :-)

>> Well...in the architecture we have both the URI scheme and if you look further the URN definition to manage all different kind of switches. And we do not have to wake up the old discussion again whether HTTP://EXAMPLE.COM/ in reality should be URI:HTTP://EXAMPLE.COM/
>
> I think we were imagining that if we could go back in time and insist that URIs such as
>
> http://blah-blah-base32-blah-blah!onion/index.html
>
> unambiguously referred to the onion name resolution protocol, then there would be little chance that these names would leak into other name resolution protocols' infrastructure (like the DNS) and that might provide the basis of some kind of solution to the problem of random (e.g.) e-mailed URLs causing leakage when encountered by end-users and robots that don't know about (say) onion names.
>
> Unfortunately, all attempts to confirm that time travel will be available to me in the future have failed, to date. So either returning to the past to change the URI specification would cause a world-ending rift in space-time, or time travel is fictional. Just quietly, I suspect it's the former.

...or of course ask whether all HTTP scheme URIs use DNS, which imply one should place the switch regarding resolution in the URI scheme...

> So, given that it's too dangerous to cross the time streams to fix the URI format, let's go with the ugly but de-facto identifier we have, which is the top label. We don't have to like it, we just have to acknowledge begrudgingly that it exists. That's the intended message in the text.

Yes.

>> What about not-yet-allocated strings in this catalog?
>
> The problem space includes the problem of how a future name resolution protocol architect should register a selector ("switch") for her protocol, how that registration should be handled (and by whom), and what the operational implications to everybody else will be, I think.

Agree.

>> I think it is important to say that as of today (at least), the default resolution mechanism is to use the DNS, although a non-existing string today imply one apply the search path algorithm to chase down names.
>
> That seems sensible to me too, although I think we need to acknowledge that doing so probably risks some leakage of other namespaces into the DNS.

Which to some degree we already have. Right?

>> More, less or similar to leakage when people use non-FQDN and their search path create surprises?
>
> Right. There is no privacy. There is only Zuul.
>
> I think identifying possible information leakage is responsible and sensible. I would hope we could do that without inferring that such leakage is a reason for PANIC! ALL! CAPS! hysteria, but in a practical sense I think it's important that sensible expectations are shared.
>
>> This document aims to provide a problem statement that will inform
>> future work.  Whilst security and privacy are fundamental
>> considerations, this document expects that that future work will
>> include such analysis, and hence no attempt is made to do so here.
>>
>> See among other places SAC-057 <https://www.icann.org/en/system/files/files/sac-057-en.pdf>
>
> Thanks!

N.p.

   paf