Re: [dnssd] draft-sullivan-dnssd-mdns-dns-interop-00

Andrew Sullivan <ajs@anvilwalrusden.com> Thu, 30 January 2014 03:11 UTC

Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 657EA1A046B for <dnssd@ietfa.amsl.com>; Wed, 29 Jan 2014 19:11:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.141
X-Spam-Level:
X-Spam-Status: No, score=-0.141 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_MISMATCH_INFO=1.448, HOST_MISMATCH_NET=0.311] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gY-3euT0_HkA for <dnssd@ietfa.amsl.com>; Wed, 29 Jan 2014 19:11:53 -0800 (PST)
Received: from mx1.yitter.info (ow5p.x.rootbsd.net [208.79.81.114]) by ietfa.amsl.com (Postfix) with ESMTP id BFEDC1A0468 for <dnssd@ietf.org>; Wed, 29 Jan 2014 19:11:53 -0800 (PST)
Received: from mx1.yitter.info (c-75-69-155-67.hsd1.nh.comcast.net [75.69.155.67]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.yitter.info (Postfix) with ESMTPSA id 3B0F48A031 for <dnssd@ietf.org>; Thu, 30 Jan 2014 03:11:50 +0000 (UTC)
Date: Wed, 29 Jan 2014 22:11:48 -0500
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dnssd@ietf.org
Message-ID: <20140130031147.GB43017@mx1.yitter.info>
References: <20140122222616.GN1271@mx1.yitter.info> <B1173945-F2CB-4086-A5BA-CAC44C0974D1@gmail.com> <20140123032553.GC1580@mx1.yitter.info> <779216FA-E974-4C95-A46F-DD55F6FC4F89@gmail.com> <20140124193205.GB2065@mx1.yitter.info> <BB22DC64-FA2C-4C2A-975C-8FFB41F8A0BD@gmail.com> <20140128035044.GB7975@mx1.yitter.info> <F6C27052-41E0-41D0-92F6-0809F7D0BEC8@gmail.com> <20140129062726.GB9511@mx1.yitter.info> <E7BEB4F0-89F1-49AA-9CED-1E28E234044E@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <E7BEB4F0-89F1-49AA-9CED-1E28E234044E@gmail.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dnssd] draft-sullivan-dnssd-mdns-dns-interop-00
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of extensions to Bonjour \(mDNS and DNS-SD\) for routed networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>, <mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>, <mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jan 2014 03:11:55 -0000

Hi Doug,

On Wed, Jan 29, 2014 at 06:44:39PM -0800, Douglas Otis wrote:
> Please forgive my awkward summary of what I understood you to be proposing. 

If there's anyone to apologise, it's obviously me, since I've made
such a hash of making my meaning clear.

> On Jan 28, 2014, at 10:27 PM, Andrew Sullivan <ajs@anvilwalrusden.com> wrote:
> 
> The goal is to facilitate access to mDNS gateways or proxies for
> access to services likely publishing non-global addresses in mDNS
> which do not permit direct Internet access and are not on a common
> network bridge.  Profoundly not the same as transparently resolving
> global services which you seem to suggest.

I don't think that's right.  Here's what the charter says:

  The focus of the WG is to develop a solution for extended, scalable
  DNS-SD.  This work is likely to highlight problems and challenges with
  naming protocols, as some level of coexistence will be required between
  local zero configuration name services and those forming part of the
  global DNS.

That seems to me to suggest that we have to cope with service
discovery in a global context.  These are, clearly, not necessarily
global services, but I wasn't trying to suggest that.

> Read section 1.1 of RFC5895.  There are few protocol checks on
> U-Labels. 

So what?  We're developing protocol here, and _we_ need to be clear.
There is a perfectly good definition of U-label in RFC 5890, section
2.3.2.1.  Importantly, that section specifically says that a thing
that might be a U-label but that hasn't been determined yet.  We
sometimes call these "putative U-labels" or something of that sort.
It's really important in this conversation to be clear about this
distinction, however, or we'll never get clear on what we're talking
about.

> depending on geographic or cultural factors.  As such, it does not
> offer fixed translations between user input in UTF-8 form and
> A-labels.  

Of course not.  Not all user input is in fact a U-label.  For
instance, depending on your operating system, your user input may not
be UTF-8 in NFC.  And that barely gets us started.  That's why we have
the definition of U-label we have.

Yes, this imposes all kinds of stuff on clients, and no, it is not
reasonable to expect that everyone will do this correctly.  That's why
IDNA suggests so strongly that different layers each need to do their
own validation.
 
> The suggestion was to recommend an implied ".local." be positioned
> first in a domain search list when fewer than 3 labels are entered
> when applications make use of search domain lists.  This would mean
> for users not entering FQDNs they might experience a 3 second delay
> with the benefit of better protecting the Internet and the user
> alike.

Why do you think that the right level is fewer than 3 labels?  It
seems to me that you're depending in that case on a view about what's
"probably actually DNS" and "probably not" that is at least dodgy in
the current ICANN policies.
 
> room.  Have been unable to find evidence DNS-SD had been implemented
> by the IETF within DNS, although the charter did mention its use.

Stuart Cheshire has used this repeatedly as an example for DNS-SD, so
I encourage you to look through minutes of past meetings.  He also has
said repeatedly that Apple uses it this way.  

> It seems highly doubtful most organizations will want selectively configured local services exposed to the Internet, unlike the IETF.

Who says they're exposed to the Internet?  First, publishing something
in the DNS hardly means that the service is available.  Second, split
horizons are, despite the IETF's lalalala-i-can't-hear-you act, a reality.

Regards,

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com