[DNSOP] on private use TLDS

Roy Arends <roy@dnss.ec> Tue, 26 November 2019 10:18 UTC

Return-Path: <roy@dnss.ec>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E2C0B12085E for <dnsop@ietfa.amsl.com>; Tue, 26 Nov 2019 02:18:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=dnss.ec
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jlZtEDdekGxN for <dnsop@ietfa.amsl.com>; Tue, 26 Nov 2019 02:18:51 -0800 (PST)
Received: from mail-qv1-xf31.google.com (mail-qv1-xf31.google.com [IPv6:2607:f8b0:4864:20::f31]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D6C40121015 for <dnsop@ietf.org>; Tue, 26 Nov 2019 02:18:50 -0800 (PST)
Received: by mail-qv1-xf31.google.com with SMTP id n12so7044536qvt.1 for <dnsop@ietf.org>; Tue, 26 Nov 2019 02:18:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dnss.ec; s=google; h=from:content-transfer-encoding:mime-version:date:subject:message-id :to; bh=uais8BBVlRL1845qlX5+xHr3+aP1oxrlL1L7eWHWFUw=; b=eJuowF27u96Ss8BwLLmkDnNzt9AffgJCPL5TNgUIkrwEx7A+AoJQ8uMzRsxLSV+gpv 3PFlO9Wdh73LTw8c2PZoKsKK9o54hJKPr/5MDL43mzjT6/6eVntbLXqCu8kFfPgbCLrN pcSbxlJz0ivUn/9n/Fawth4fmm8kqcqNrTbK0=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:content-transfer-encoding:mime-version:date :subject:message-id:to; bh=uais8BBVlRL1845qlX5+xHr3+aP1oxrlL1L7eWHWFUw=; b=VIix00d2k0nkdV1ZBdKuDeK5HPTPCAdTzU9q9aZHg8nciPleJBeIZRM7vtajgykSRY N4KOdbLJ1yPMYXJeK23t6TeiobH9dpvpgT+M2ltasc3+4ckEHHwvyfgunq5mFNoyxafQ n4DxFKDmksk71N3cQ5Q+25Wybv6p0B3d56KPIFJUtye59uXsjZ8JaOSmxQNyOQUW84KK ptIN7vpSKbRrUYUIWiXuf6yWq0zXcXv52CLqCS7HWmssZOZkbOae+IX+58B4eDzucthj QCuA4oHKhl02Ob1LmfNYY/xVmCsUN44SYCz6iMhB6gy2Ds4AB3kxl9EiCxxxUTrzXS/8 zOlw==
X-Gm-Message-State: APjAAAXlDty4CnlMYESbOIWkWo/eOIHAN6OkaRcmW6FougpAKvJpSB9Z JD1ERyVlEDEphf0XCgodqpEeFehSbPpEWQ==
X-Google-Smtp-Source: APXvYqxFVAQPWmh0fhUtf+mkNEzozW+72cfz+1vEKwJy7FYDjJ6+DU1QeFDeaXzU0shCzGr1VuhX0Q==
X-Received: by 2002:a05:6214:7d2:: with SMTP id bb18mr19923810qvb.35.1574763529259; Tue, 26 Nov 2019 02:18:49 -0800 (PST)
Received: from [10.22.230.32] ([77.241.229.232]) by smtp.gmail.com with ESMTPSA id v20sm4777545qkg.92.2019.11.26.02.18.48 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 26 Nov 2019 02:18:48 -0800 (PST)
From: Roy Arends <roy@dnss.ec>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Tue, 26 Nov 2019 11:18:46 +0100
Message-Id: <B679F326-54A0-4010-BD41-F2F317417169@dnss.ec>
To: dnsop <dnsop@ietf.org>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/vJJZ5JOreuUqWHsVIyJmG7RDHmw>
Subject: [DNSOP] on private use TLDS
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Nov 2019 10:18:53 -0000

“ZZ” was used in my presentation as an example. Since this bikeshedding is siphoning attention from the important part of the discussion, I’ll try to re-focus on the question here:

"Is it safe to use ISO3166-1 Alpha-2 code elements from the User Assigned range as top level domains for my own private use?"

1) RFC1591: Selection of 3166 was made with knowledge that ISO has a procedure for determining which entities should be and should not be on that list.
(Note of the word “entities” and “procedure”)

2) From the ISO 3166-1 Alpha-2 standard, on the construction of an alpha-2 code: "42 alpha-2 code elements are not used in the ISO 3166. Users sometimes need to extend or alter the use of country code elements for special purposes.” 

It is my understanding that the ISO3166 Maintenance Agency can not re-assign codes from the User Assigned range. This needs an action from ISO TC46. 

3) Jaap Akkerhuis writes:

> Shane Kerr writes:
> 
>> Certainly I have 
>> made heavy use of .Q* and .X* in my own testing, with the assumption 
>> that these would never be assigned (and yes, there is .TEST but 
>> sometimes you need more than one one TLD).
> 
> Yes, that is a perfectly legit use. 

For those who are not aware, Jaap is a member of the ISO-3166 Maintenance Agency and a Category C liaison for ICANN to TC46/WG2 [1].  Therefore it is likely that he knows these things. Note that the IETF has its own liaison to ISO-TC46 (John Klensin) [2]. Conversely, I (Roy Arends) make no representation for ICANN.

4) The XN— ACE prefix for internationalized domains was chosen by IANA, because "The use of ISO 3166-1 user-assigned elements removes the possibility that the code will duplicate a present or future ccTLD code.” [3]

5) ISO, ICAO, IATA, WIPO, UNLOCODE, UNICODE, Worldbank, Interpol, CABforum, and the IETF  make use of these User Assigned codes as intended by ISO3166. These codes have been assigned for different purposes that only have meaning in the local context of their organization and their constituencies.

6) It is highly unlikely that any of the 42 codes will ever appear in the root zone (especially following Postel’s Law: Be conservative in what you do), as we follow RFC1591. 

When a private space name is chosen, the 42 top-level labels are safe to use, as it is highly unlikely to collide with any top-level domain now or in the future. 

Please see the presentation during DNSOP at IETF106 here: 
https://youtu.be/yUO1J9s8BdE?t=5042

Follow the slides here:
https://datatracker.ietf.org/meeting/106/materials/slides-106-dnsop-sessa-draft-arends-private-use-tld

Warmly,

Roy Arends
Not representing ICANN.

[1] https://www.iso.org/organization/567449.html
[2] https://ietf.org/about/liaisons/
[3] https://psg.com/~randy/lists/iesg/2003/msg01081.html