Re: [DNSOP] moving forward on special use names

Ted Lemon <mellon@fugue.com> Mon, 19 September 2016 01:58 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2287D12B0B5 for <dnsop@ietfa.amsl.com>; Sun, 18 Sep 2016 18:58:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id akLo1PK7PyJn for <dnsop@ietfa.amsl.com>; Sun, 18 Sep 2016 18:58:10 -0700 (PDT)
Received: from mail-lf0-x230.google.com (mail-lf0-x230.google.com [IPv6:2a00:1450:4010:c07::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D537412B0AE for <dnsop@ietf.org>; Sun, 18 Sep 2016 18:58:09 -0700 (PDT)
Received: by mail-lf0-x230.google.com with SMTP id h127so100215793lfh.0 for <dnsop@ietf.org>; Sun, 18 Sep 2016 18:58:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=cHvm8oH1EeB0fc1ItE7CeDnTIYr4MMBoJme/12bqG60=; b=JeMyrxSfOACwdGNCn7UiWkat+I0VIHfJV4Oc/WX4EbLRy1Q2n4C2pZWaju5ERJPIrp zR7LQ9SVwz3oIWPYS8r1oJseWGN0XqRg8NNjLnJok8hZ7ScKUriviXelLqgbF2xoTq9U iBdm2ckdeYF4bi/lXjdHYwGxacehC52tCkTnh102bT5IaUqqnpa9/cFR1xnyYxf7Nytx znWcdBhSSGwwY/qJhD7mmHaIrrZRxoYkc5l5rvLiX3uBC7jZBOKQEiQZXWKGu1E/sHMK VgoNCi++ij5zJa5Mk+8Kfq1noVDMYPje5IwXLKaf1ogtsOT7hg2Rv+3kmZ6Wc2QVvIRy tDXA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=cHvm8oH1EeB0fc1ItE7CeDnTIYr4MMBoJme/12bqG60=; b=k2wKroBJOxny06yp+KNFlYdskHM1LQLjFm+OTP6IQU9Raxzdld4CifFYH2UN0UTudq kJ1tHuJhxLMhIruvo5AUwSWUEMaJWzVETnaNpC7SFEgjq3qTOqODKfVuEzPez76G0SI6 qZIejrlZUlSPzBMkKJixT7Y8BvgRkOEV4UYfIA2ChdddopSa0HupPxMdsgp6zrhT/kTL TMBQoxQzi2v+aRX8E0hJ14euqDOSNUjK53kaLM5nkqUqpgXqtl9vohQagPql48CfxAeg 9+0OkePQ7RTiTpSETj1v7NCIHoDKmPUZXIgUB3axcl8I6wVYB9yYPnfvbQf0wN+3ZSf+ FkhQ==
X-Gm-Message-State: AE9vXwO/XcXSDrD6NgicC+MLCSobVcaEM1xB2Y+ihXIBl0cY1+udl/NLtrwPGkeUzHu43vwg8NO5xLGIOpJLJA==
X-Received: by 10.25.17.34 with SMTP id g34mr5007247lfi.181.1474250287753; Sun, 18 Sep 2016 18:58:07 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.25.217.93 with HTTP; Sun, 18 Sep 2016 18:57:26 -0700 (PDT)
In-Reply-To: <D2C5DF2A-9A4A-4E72-92BE-BD8808578BCD@gmail.com>
References: <20160916181356.70566.qmail@ary.lan> <D2C5DF2A-9A4A-4E72-92BE-BD8808578BCD@gmail.com>
From: Ted Lemon <mellon@fugue.com>
Date: Sun, 18 Sep 2016 21:57:26 -0400
Message-ID: <CAPt1N1=pVw+o2fsftqJw72CZxAA1a2+-hhCT0xz1MmPkYNMd9g@mail.gmail.com>
To: Phill <hallam@gmail.com>
Content-Type: multipart/alternative; boundary="001a1140672eb63fb1053cd2a4cf"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/_vwu0YueHCi-jlRWaNhQuxYEi6E>
Cc: dnsop WG <dnsop@ietf.org>, John Levine <johnl@taugh.com>, Suzanne Woolf <suzworldwide@gmail.com>
Subject: Re: [DNSOP] moving forward on special use names
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Sep 2016 01:58:14 -0000

Okay, this is an interesting application that would certainly require some
sort of 6761-style action.   Do you believe that it is not covered by the
current problem statement?

On Sun, Sep 18, 2016 at 9:00 PM, Phill <hallam@gmail.com> wrote:

> There is actually a fifth type of name, escaped names. Right now, the only
> names we have of this type are SRV protocol tags, (_http._tcp.example.com)
> and internationalized names (xn—wev.com)
>
> I want to add a third set of escaped names, one that has similar
> functionality to .onion but does not leak as much information.
>
> example.com.m
> ​f--​
> b2gk
> ​
> 6
> ​-​
> duf5
> ​
> y
> ​-​
> gyyl
> ​​-
> jn5e
> ​d​
>
>
> This is a strong domain name and to interpret it we require a policy that
> is validated under the UDF fingerprint b2gk
> ​
> 6
> ​-​
> duf5
> ​
> y
> ​-​
> gyyl
> ​​-
> jn5e
> ​d​. This in turn is a base 32 encoding of 92 bits of digest value plus an
> 8 bit version string. The fingerprint is over a content type identifier
> plus some content as specified here.
>
> https://tools.ietf.org/html/draft-hallambaker-udf-03
>
> The content is typically going to be some sort of cryptographic key (PGP,
> PKIX, SSH, JOSE, whatever) that signs some sort of assertion that states
> how the address ‘example.com’ is to be interpreted.
>
> The trick here is that we can now bind security policy direct to any DNS
> name without having to muck about with DNSSEC, or for that matter any other
> PKI standard other than the particular standard we want.
>
>
> Lets say that Alice is using OpenPGP and her OpenPGPv5 key is
> mw83i-32ri4-83klq-3odp3. We can form an address from that:
>
> alice@example.com.mf--mw83i-32ri4-83klq-3odp3
>
> Now that isn’t an address that we can interpret without access to Alice’s
> public key. Which is actually what I kinda want because I am fed up of
> spam. The fact that I give you my address does not mean I want just anyone
> being able to use it.
>
> In the ordinary course of business, my ‘strong name aware’ mailer knows
> that it has to resolve mf--mw83i-32ri4-83klq-3odp3 somehow before it can
> use that email address. If I just type it into Outlook, the client will
> happily pass it on to my mail server and then it will get ‘stuck’ unless
> the mail system can figure out how to use that address. Which is exactly
> what you would want to happen with confidential mail.
>
> If the address can be resolved, the result is normally going to be a
> policy that says what protocols the address can be used with and how.
>
> Now, naturally, a split horizon DNS would be one natural place to provide
> access to a resolution service, but it need not be the only one.
>
>
> The use of strong DNS names represents a major step forward in achieving a
> genuinely decentralized Web. Instead of there being an institution at the
> trust apex of the Internet, there is a digest function and a PKI scheme.
>
>
> On Sep 16, 2016, at 2:13 PM, John Levine <johnl@taugh.com> wrote:
>
> The drafts are:
> https://datatracker.ietf.org/doc/draft-tldr-sutld-ps/
> https://datatracker.ietf.org/doc/draft-adpkja-dnsop-special-names-problem/
>
>
> Having read them both, neither one thrills me but I'd give the nod to
> adpkja.  The "Internet Names" in tldr seems to me a bad idea, since
> there are a lot of other names on the Internet such as URIs and handle
> system names, and this is about domain names.
>
> It seems to me there are four kinds of names we have to worry about, and
> neither draft calls them all out clearly:
>
> * Names resolved globally with the DNS protocol, i.e.
>  ordinary DNS names
>
> * Names resolved globally with an agreed non-DNS protocol, e.g.
>  .onion via ToR
>
> * Names resolved locally with an agreed non-DNS protocol, e.g,
>  .local via mDNS
>
> * Names resolved locally with unknown protocols, e.g. .corp and
>  .home, the toxic waste names
>
> R's,
> John
>
>
>
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
>
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
>