Re: [DNSOP] Interim DNSOP WG meeting on Special Use Names: some reading material

David Conrad <drc@virtualized.org> Thu, 14 May 2015 20:11 UTC

Return-Path: <drc@virtualized.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BB011A90A3 for <dnsop@ietfa.amsl.com>; Thu, 14 May 2015 13:11:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 61wB3YU5v5YL for <dnsop@ietfa.amsl.com>; Thu, 14 May 2015 13:11:04 -0700 (PDT)
Received: from mail-pa0-f43.google.com (mail-pa0-f43.google.com [209.85.220.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26E331A885A for <dnsop@ietf.org>; Thu, 14 May 2015 13:11:04 -0700 (PDT)
Received: by pacwv17 with SMTP id wv17so99455747pac.0 for <dnsop@ietf.org>; Thu, 14 May 2015 13:11:03 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:subject:mime-version:content-type:from :in-reply-to:date:cc:message-id:references:to; bh=z9V38iRbeR7OxsCxL/zL1qeONyu+qSa9QbMDC7X1eDg=; b=AesFjYKqMQWMUbBySSIz/te2pQM8ApcWtsQDKNrgU0d2lvdjP1YMMd6mFgA2j8iIeU KTpY52MydlSH74Dcv7JIIjGfpHIPJER4KsarjDRzKZ+gP4MrhIoecnKZq8Rj36rz2n32 2MZD7/YZ5pEcXIYS7jxQZ+gNja//KClZli20tSPEqvEzKt5w+AMc9XawfHbuhdXWw3x8 yuK0kVZHUcL364V6nY5M199+GRJDeApzIKy2D70wtTDsIZRAYWQVPhRq/PBjt3+6k0Q6 cbV3fy5gmYigint84n+a32XtdU3Mu3DFbOWO6maQkfG6ygRQTCskXKRUrtg7LDd1XQVS 9LoQ==
X-Gm-Message-State: ALoCoQnEsOf2TEQq7leNt/zo/agbvTs5iLfF73usDEEgYEZ6qFmOsQIpjNsRABr7XoPYJ9oaN0EU
X-Received: by 10.70.129.202 with SMTP id ny10mr11219836pdb.107.1431634263774; Thu, 14 May 2015 13:11:03 -0700 (PDT)
Received: from [10.0.0.5] (c-50-184-24-209.hsd1.ca.comcast.net. [50.184.24.209]) by mx.google.com with ESMTPSA id pc9sm46886pdb.6.2015.05.14.13.11.01 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 14 May 2015 13:11:02 -0700 (PDT)
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2098\))
Content-Type: multipart/signed; boundary="Apple-Mail=_D5341A18-B1C9-4264-9595-03D94C35EDD2"; protocol="application/pgp-signature"; micalg="pgp-sha512"
X-Pgp-Agent: GPGMail 2.5b6
From: David Conrad <drc@virtualized.org>
In-Reply-To: <4B02F93D-BF2D-4549-847B-08C57723DF8D@interisle.net>
Date: Thu, 14 May 2015 13:10:59 -0700
Message-Id: <E16DA4AA-3871-4606-AC89-5C8081BDCD01@virtualized.org>
References: <20150513205135.14395.qmail@ary.lan> <7AD02DF7-45A5-42CE-AAE2-50CCAE3B6A4F@virtualized.org> <0EC766DD-E56D-4E6F-80D7-8B26BC87A528@INTERISLE.NET> <5E25D193-A5A4-46FC-A724-A4125585CAD8@virtualized.org> <0EE18E9E-E7D2-42E3-AEE8-9A43C4032120@nominum.com> <6AA67FEA-4C81-4259-A14F-471D8984D21A@virtualized.org> <4B02F93D-BF2D-4549-847B-08C57723DF8D@interisle.net>
To: Lyman Chapin <lyman@interisle.net>
X-Mailer: Apple Mail (2.2098)
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsop/dxsNI3msK4zGb4HQr6ebUMMVPUo>
Cc: dnsop WG <dnsop@ietf.org>
Subject: Re: [DNSOP] Interim DNSOP WG meeting on Special Use Names: some reading material
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 May 2015 20:11:07 -0000

Lyman,

> I understand the desire to have objective criteria, but in this case your call for a bright-line distinction between "dangerous" and "not dangerous" labels is an obvious red herring.

It's not so obvious to me that dangerous/not is a red herring, particularly since that was one of the primary rationales for (appropriately, IMHO) holding up CORP/MAIL/HOME.

> My argument is that the burden of proof should run in the other direction: that unless we are very sure that putting something in the root will *not* cause stability or security problems, we should keep it out.

Ignoring the question of how one proves a negative, that would seem to run contrary to the "permissionless innovation" theory of why Internet protocols are good.

> The "prove that it's dangerous or we'll put it in the root" mindset is explicitly commercial.

Talk about red herring. In my view, whether it is commercial or not is not relevant here. AFAICT, we're talking about bucketizing labels, either "OK to be in the DNS" or "Placed on the Special Use Registry".

I believe that if you want to put something in the latter bucket, there should be a reason and preferably one that can be objectively measured. For example, in the case of .ONION, it seems to me that:

1) there is a well defined and non-DNS spec for the protocol
2) there are multiple independent implementations in active use
3) there is a "large" installed base that is growing that is already using the protocol
4) the public exposure of queries for the ONION label could be considered a privacy/operational risk

The first two and last of these are objectively measurable.  The third is a bit sticky since "large" isn't well defined or measurable and thus, you get into a subjective evaluation. I'd personally like to come up with something concrete for (3) to avoid stupid rathole arguments, but due the facts of of (1) and (2) along with my personal assumptions about (3), I support putting ONION into the special use names registry.

If we apply the above criteria to .CORP:

1) there is sort of a spec, in the sense that folks documented .CORP as a recommendation for private namespaces
2) there are multiple independent "implementations" in the sense that lots of folks have independently made use of .CORP
3) there is a "large" installed base, albeit hopefully it is shrinking
4) the public exposure of queries for the CORP label could be considered a privacy/operational risk

The first and last is objectively measurable. The second and third are a bit unclear, but based on the quantity of queries to the root over a long period of time (at least as far as we can tell from the yearly DITL samples), I personally am comfortable that .CORP would fall into the special use names registry. I would be much happier if we actually had some clear threshold that we could pointed to, but at the above would be a good start.

You'll note that none of the above takes into consideration any form of commercialization.

> The "prove that it's *not* dangerous or we won't allow it in the root" mindset is explicitly operational.

As far as I am aware, that is not what we're discussing here. For good or ill, my understanding is that RFC 2860 assigned the policy role of what goes into the root to ICANN. What I thought we were talking about was the identification of labels that are to be preempted from consideration of delegation, similar to the IETF reserving 10/8.

> It assumes that the default value is the stable operation of the Internet for the benefit of its users, and that in order to justify risking that benefit, we must be convinced that the gain outweighs the potential loss.

This seems unrelated to the Special Use Names registry, but if this mindset were applied to the routing system, the email system, or pretty much any protocol system operationally deployed on the Internet, we might as well close down the IETF because there will always be someone who will argue that the risk associated with introducing new technology outweighs the benefit.

Regards,
-drc