Re: [homenet] I-D Action: draft-ietf-homenet-dot-10.txt

Toke Høiland-Jørgensen <toke@toke.dk> Tue, 01 August 2017 09:53 UTC

Return-Path: <toke@toke.dk>
X-Original-To: homenet@ietfa.amsl.com
Delivered-To: homenet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6CF12131F13 for <homenet@ietfa.amsl.com>; Tue, 1 Aug 2017 02:53:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=toke.dk
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MU-9VoSBcZGS for <homenet@ietfa.amsl.com>; Tue, 1 Aug 2017 02:53:04 -0700 (PDT)
Received: from mail.toke.dk (mail.toke.dk [52.28.52.200]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B02A3131FED for <homenet@ietf.org>; Tue, 1 Aug 2017 02:53:03 -0700 (PDT)
From: Toke Høiland-Jørgensen <toke@toke.dk>
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=toke.dk; s=20161023; t=1501581176; bh=zq3y541qALurqg6AhVHRYZUCFwWvYAJuf00fXhYEdNw=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=S//0WwkklBXC+RDaJVcCaNGZqppL8eeypN4+E9jr7RCfHazc5QHzKEM0sTOqXyibK m4KH38IOI03rbG24pV8m77/4gd9t+/UZ0t0x650sWv+hywLRCDNjGT0inABnthElf+ xLdjbDH7sltzsjVck9rQRjy/bNFyVDIpfRtXqd6RdVfPsJbPN7IQzjAkwc1pF+Sm8O w2RMjfP20qJ7omifP2Ad3ykspWQFMn4IoBDuSl75sekeg1vbYJnDGkuQ+SwiHUE7wp sQEOuQT9aApLqqdIDbTNgo0bAu/rEaIzT/shVZyI0jBt/CWu1jrmoj7deGMJHxZzzN utpXY0LHc4HlA==
To: "Walter H." <walter.h@mathemainzel.info>, Ted Lemon <mellon@fugue.com>
Cc: homenet@ietf.org
In-Reply-To: <b562a9fd0ce2d8af63109aac47d1d47a.1501567308@squirrel.mail>
References: <150127266271.25329.18484770769960144@ietfa.amsl.com> <597F7545.9000702@mathemainzel.info> <E51998F5-8EF9-4FC8-90BE-1D0BF1805339@fugue.com> <b562a9fd0ce2d8af63109aac47d1d47a.1501567308@squirrel.mail>
Date: Tue, 01 Aug 2017 11:52:49 +0200
X-Clacks-Overhead: GNU Terry Pratchett
Message-ID: <87tw1r398u.fsf@toke.dk>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/homenet/jYp6uipaG_SnYSvSt52gKnO953o>
Subject: Re: [homenet] I-D Action: draft-ietf-homenet-dot-10.txt
X-BeenThere: homenet@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF Homenet WG mailing list <homenet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/homenet>, <mailto:homenet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/homenet/>
List-Post: <mailto:homenet@ietf.org>
List-Help: <mailto:homenet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/homenet>, <mailto:homenet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Aug 2017 09:53:06 -0000

>> you couldn't use the fact that you can publish in a name in it
>> to do the ACME authentication.
>
> there SHOULD NOT be the ACME authentication or any neccessarity of any
> other authentication, as these domain names need not be unique ...
>
> in case you use 'teddynet.home.arpa.' and I use this domain name, too;
> we wouldn't have the same x509 SSL certificate, because each of us uses
> its own private key ...
>
> why not just define the org. that hosts the ARPA TLD (IANA?), as the CA
> for these domains and the root certificate as built in token to the common
> browsers and/or operating systems?
> there it should only be neccessary to upload the certificate request,
> gicwn the '.home.arpa.' domain name, and an email address where the
> certificate is sent to;
> the certificate will be a wild card certificate for this .home.arpa.
> domain ..
>
> I would want this to be added as additional section to this Draft/RFC;

If you're going through all this trouble of having a central API that
will hand out certificates, wouldn't it be possible to make that same
authority hand out pseudo-random unique subdomains (of some suitable
domain; not necessarily .home.arpa)? Then you are only an NS record from
solving the globally visible naming problem... :)

-Toke