Re: [DNSOP] [internet-drafts@ietf.org: I-D Action: draft-grothoff-iesg-special-use-p2p-names-00.txt]

David Conrad <drc@virtualized.org> Tue, 10 December 2013 19:13 UTC

Return-Path: <drc@virtualized.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E90481ADBCC for <dnsop@ietfa.amsl.com>; Tue, 10 Dec 2013 11:13:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.903
X-Spam-Level:
X-Spam-Status: No, score=-1.903 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id afbXFnekA9gM for <dnsop@ietfa.amsl.com>; Tue, 10 Dec 2013 11:13:04 -0800 (PST)
Received: from alpha.virtualized.org (alpha.virtualized.org [199.233.229.186]) by ietfa.amsl.com (Postfix) with ESMTP id 983D51AC4A3 for <dnsop@ietf.org>; Tue, 10 Dec 2013 11:13:04 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by alpha.virtualized.org (Postfix) with ESMTP id E10C384CEF; Tue, 10 Dec 2013 14:12:58 -0500 (EST)
Received: from alpha.virtualized.org ([127.0.0.1]) by localhost (alpha.virtualized.org [127.0.0.1]) (maiad, port 10024) with ESMTP id 87190-04; Tue, 10 Dec 2013 14:12:58 -0500 (EST)
Received: from [10.0.1.2] (unknown [206.205.89.138]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: drc@virtualized.org) by alpha.virtualized.org (Postfix) with ESMTPSA id 3F1D1848F1; Tue, 10 Dec 2013 14:12:58 -0500 (EST)
Content-Type: multipart/signed; boundary="Apple-Mail=_4CFCA726-037C-44E1-A018-227DE27829D0"; protocol="application/pgp-signature"; micalg="pgp-sha1"
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\))
From: David Conrad <drc@virtualized.org>
In-Reply-To: <FEC642D5-0DAA-4C2F-9D68-3B41905CAE02@nominum.com>
Date: Tue, 10 Dec 2013 14:12:52 -0500
Message-Id: <D1449A13-A551-4585-94BA-E71B082A0F33@virtualized.org>
References: <529B75A2.10703@appelbaum.net> <529B7E4A.2070600@grothoff.org> <73387529-308B-424D-807C-D41E59B1D5E8@virtualized.org> <52A244EC.5040104@grothoff.org> <37B27FD9-C0BB-4178-84F3-FD6BA6402AFB@virtualized.org> <52A25F03.3070502@grothoff.org> <D259AC50-E055-457F-841E-E72D2D19C53C@virtualized.org> <52A5237E.8050601@grothoff.org> <FA1AB90A-7FA3-48FB-BD30-5C2D141D4104@virtualized.org> <FEC642D5-0DAA-4C2F-9D68-3B41905CAE02@nominum.com>
To: Ted Lemon <Ted.Lemon@nominum.com>
X-Mailer: Apple Mail (2.1822)
Cc: dnsop WG <dnsop@ietf.org>
Subject: Re: [DNSOP] [internet-drafts@ietf.org: I-D Action: draft-grothoff-iesg-special-use-p2p-names-00.txt]
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Dec 2013 19:13:07 -0000

Ted,

On Dec 10, 2013, at 12:26 PM, Ted Lemon <Ted.Lemon@nominum.com> wrote:
> (1) defining sTLDs produces a small (relatively) amount of useless traffic at the root

The amount of useless traffic is unknown/unknowable. All we have by way of example is ".local" which accounts for something like 5-10% of the traffic to the root servers steady state (based on stats available from "L" and extrapolating). I don't think it would have been possible to estimate that number prior to Apple deciding to deploy technology that uses ".local".

However, with that said, it is very likely for the traffic any sTLD or even combination of sTLDs generates to be far less than the root servers must be able to handle to deal with DoS attacks. Probably.

> (2) defining sTLDs may have trademark implications that the IETF is not competent to address

I think a better way of describing the concern is that 6761 preempts all the efforts ICANN has undertaken to protect intellectual property right holders and thus, puts the IETF/IESG in the crosshairs of IPR lawsuits. This (probably) is not directly relevant to the draft in question (although I suppose it is possible that the folks behind gnu.com could want to get a ".brand" TLD).

> (3) supporting sTLDs in stub resolvers requires changes to stub resolvers

Or, more relevantly, lack of support in stub resolvers most likely implies applications/systems using the DNS protocols to do the lookup, implying (a) noise sent to various parts of the infrastructure (resolvers, root servers, etc) and (b) confusion on the part of end users when the resolution fails on one system but works on another.

That is, pretty much the exact same arguments people used in the past to argue against alternative roots.

> (4) it would be nice to have stable specifications for the proposed sTLDs

Sure, but I imagine a sufficiently large deployed base could be a substitute.  Which leads to:

(5) it would be nice to have more objective metrics by which one can measure the potential impact of the sTLD, e.g., it probably does not make sense to reserve a sTLD for a protocol with exactly one user whereas it probably does make sense for a protocol with 1,000,000+ users.

With respect to the draft in question:

(6) bundling the various sTLD requests into a single draft makes discussing the pros/cons of a specific sTLDs more complicated.

> Please do not respond to this message by re-asserting your strong opinion.   Please do not respond to this message by asserting that there's a better way than what's been proposed in the draft we are discussing, in your opinion.

I hope I met your requirements.

Regards,
-drc

P.S. Shouldn't it be 'TLPDs' (using the terminology from 6761: "top-level pseudo-domains")? To me, "sTLDs" is confusingly similar to "sponsored TLDs", but that might be because of my ICANN infection.