Re: [Rfc6761bis] New Non-WG Mailing List: rfc6761bis

Keith Moore <moore@network-heretics.com> Tue, 13 December 2022 22:00 UTC

Return-Path: <moore@network-heretics.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF903C1524BA for <ietf@ietfa.amsl.com>; Tue, 13 Dec 2022 14:00:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.886
X-Spam-Level:
X-Spam-Status: No, score=-6.886 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=messagingengine.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MeqiSZVWtMnx for <ietf@ietfa.amsl.com>; Tue, 13 Dec 2022 14:00:10 -0800 (PST)
Received: from wout1-smtp.messagingengine.com (wout1-smtp.messagingengine.com [64.147.123.24]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8CA4C14CF16 for <ietf@ietf.org>; Tue, 13 Dec 2022 14:00:10 -0800 (PST)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailout.west.internal (Postfix) with ESMTP id B3A803200922 for <ietf@ietf.org>; Tue, 13 Dec 2022 17:00:09 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute3.internal (MEProxy); Tue, 13 Dec 2022 17:00:09 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:date:feedback-id :feedback-id:from:from:in-reply-to:in-reply-to:message-id :mime-version:references:reply-to:sender:subject:subject:to:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm2; t=1670968809; x=1671055209; bh=O9hg5cRdDdlpwv6kD5k6oBSKqR1/ QgWs3w4xv4eKN58=; b=HAyRsF/QFX/qDdKChYt06ZwLPgageImQV8UNOjRzVRNX Y5WhCNy5f8SfJqBy3T9fMoGDGlHAV0dW9PAPtiWO2mEARSYBDSLG9zI+N8zzwXet eCueFljAKF3mDzm+rGJUekvuIvX19p0etfFqwpR/zRfoWPhMSZOSXs7dbpHnUvkv Ge7Hzx8Ut8+SjLeC0qbLi/51P6NF5zW8U/taiuau+pWoGbiG37RHmkOAHGONQN5n Ge7oi33UpxeUC4KwMjRHH+AU99eLrYzUOTFWKp9zxFewmCseZsbEeh67k2w8L6GG 6+pkO4MzFWwyxm7iHGdAK1g38OQFSCTcFMlZpu5xFw==
X-ME-Sender: <xms:6fWYY35w8w-ILsufly7poufnzrI0dnJ0OdkwMvSdRJQ4eSZD6W_fEQ> <xme:6fWYY8411sHAfirrHhPS8QnRitCPXkeJpOa6ARzLMThecXOCUcX58sgda157ZprWd TJVS7jYXPsnEw>
X-ME-Received: <xmr:6fWYY-dU1DEpv6Rj83SxBegM9YhyHAaQTIkmN5WMqksaKtsv24IApaTST3HW8UKlAbO9xH451NDA9ZUbF5qHF9POZfCdbVcnVi_0CLKLxbkoL4IpWKEm1w>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvhedrfedugdekudcutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurheptgfkffggfgfuvfhfhfgjsegrtderre dtfeejnecuhfhrohhmpefmvghithhhucfoohhorhgvuceomhhoohhrvgesnhgvthifohhr khdqhhgvrhgvthhitghsrdgtohhmqeenucggtffrrghtthgvrhhnpeehfeduvdeggfefve eiiefggeeludefjeduieetledugeefffelffevieffkeeiffenucevlhhushhtvghrufhi iigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehmohhorhgvsehnvghtfihorhhkqd hhvghrvghtihgtshdrtghomh
X-ME-Proxy: <xmx:6fWYY4Ich9eB0f_cBVZPgbWWzl6TyOMYGuq5jY8f9csCSBdX31n-AA> <xmx:6fWYY7KzP2j2dk_5ICPcHJS3bQYPkU14368bZ4PIl2LmJ1IDl-Lkmg> <xmx:6fWYYxwLkCOSUQIga-FTBdh6utWcBd0uTGPBftInXkCriRX0qtAq4Q> <xmx:6fWYYwUtxlFKRV79LNQ3VD31bE6FJU_dSRoT1VO0pCSsvGBQRvJm8A>
Feedback-ID: i5d8c41f0:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <ietf@ietf.org>; Tue, 13 Dec 2022 17:00:08 -0500 (EST)
Content-Type: multipart/alternative; boundary="------------aHTLk5yVv04Gg6uKx5UVpEmY"
Message-ID: <b150ea0c-9199-5556-effe-81218c71ef3f@network-heretics.com>
Date: Tue, 13 Dec 2022 17:00:07 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.4.2
Subject: Re: [Rfc6761bis] New Non-WG Mailing List: rfc6761bis
To: ietf@ietf.org
References: <167043280754.32746.12505647641634366352@ietfa.amsl.com> <26586.1670443013@localhost> <6896EE30-67DE-47FD-826C-52108AA9B1EA@gmail.com> <1ZCcsM481U5jAWWR76ShTniZBa3MYsGI05xpsyddCAXXq-AHEKkKIAoHIzkh2cbp5y98N07Rr54PzK2Bj8TQ6L82HT6-8XNseWN5QqBIo8A=@hopcount.ca> <CAHw9_iKMzWjO+nVYp89aK-yfLbjC0eELi_6mgSTiwEAYD-UEhw@mail.gmail.com> <34psDI7ugojPW4RTAKZabj7cF2VceJ9h3_lnFINMpB1_KVflVIZa6p0upxbVEiaSi_3nuUgtldE9Mz1IdUBXry0L-F2XUHhOS82Wdr-VTQs=@hopcount.ca>
Content-Language: en-US
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <34psDI7ugojPW4RTAKZabj7cF2VceJ9h3_lnFINMpB1_KVflVIZa6p0upxbVEiaSi_3nuUgtldE9Mz1IdUBXry0L-F2XUHhOS82Wdr-VTQs=@hopcount.ca>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/5XzuGJuTtwExqafymOK6QMH6iZs>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IETF-Discussion. This is the most general IETF mailing list, intended for discussion of technical, procedural, operational, and other topics for which no dedicated mailing lists exist." <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Dec 2022 22:00:15 -0000

On 12/13/22 15:18, Joe Abley wrote:

> Hi Warren,
>
>
> On Tue, Dec 13, 2022 at 17:03, Warren Kumari <warren@kumari.net> wrote
>
>> I think that the root issue is that there is not a simple way to 
>> determine if a name is included in "that subset of the domain 
>> namespace that is used by IETF protocols like the DNS".
>
> Perhaps part of the problem is phrasing that particular question as 
> though it has a simple answer. The nature and composition of the 
> namespace depends on the vantage point.
>
> I think the IETF has done fine for years understanding what the 
> DNS/zeroconf/dnssd/whatever namespaces looks like without needing a 
> strict definition, with due deference to Robert Persig and apologies 
> for the oblique suggestion of quality.
>
> People have been intentionally causing name collisions with hosts.txt 
> overrides, nsswitch.conf, locally-served zones, etc, etc for decades 
> and it has not caused any great indigestion.

I might disagree here.  I've seen too many cases in which applications 
were broken by these mechanisms.   To the extent that these mechanisms 
work, they rely on users and/or IT people magically understanding which 
names will cause problems if overridden and which ones won't.   The more 
diverse the name space, the less likely that they are right.  And the 
diversity of the name space can only be expected to increase over time.

And yet, I'll admit that the ability to override a name lookup is often 
useful in corner cases, and sometimes essential.   Such as: blocking 
lookups of DNS names known to be used by malware.

> Unintentional name collisions occur every millisecond. Domains exist 
> in some networks that do not exist in any others. Domains are missing 
> from the perspective of some clients that are very much alive and well 
> to the majority. Zones do not propagate instantly. People mess things up.
>
> Every single one of these things represents an opportunity to 
> further bifurcate the domain namespace. The resulting uncertainty 
> has caused no end of angst at ICANN when they have decisions to make 
> about new TLDs but does it make the understanding of what the DNS 
> namespace is in the IETF any more difficult in practical terms?
>
> I think we need to step back and ask what it is that we are trying to 
> achieve.

I like to say that part of IETF's job is to "make the Internet safe for 
applications".  What I mean by that is that applications need to have a 
fairly predictable environment to operate in, no matter where they're 
operating from.   If applications can't trust the network and network 
infrastructure like DNS to do their jobs, the applications have to make 
unreliable guesses, and the result is a mess.

That predictable environment relies significantly on protocol 
standards.  (It also relies significantly on operational standards, 
which IETF does less well, and is less well placed to encourage or 
maintain).

I would propose this as a criterion with which to evaluate both protocol 
standards and operational practices, whether or not related to DNS.

> Are we in the business of asserting control over the whole domain 
> namespace? Do we want to be the self-appointed, enforcement-free 
> gatekeepers who decide who can use what for what?
Without answering that question, I think it's at least useful for us to 
specify what it takes to make applications operate predictably. Whether 
we can require those rules to be followed is a different question.

>
> How is the special names registry actually used? We have asserted that 
> it is useful. Was it instantiated mainly to justify a desire for the 
> use of LOCAL or does it really have a higher purpose?
>
> Is it helpful for things to be included in the special names registry 
> because the way they were assigned or registered is special, even 
> though there is nothing special in how they are used?

Consistent with the reasoning above, I would claim that the special 
names registry is potentially useful if applications can make use of the 
information in that registry to improve their 
reliability/predictability, or to be better at detecting problems that 
arise from the use of those names.

e.g. applications should not expect "something.local" to mean the same 
thing everywhere.

> Why is LOCAL better than LOCAL.ARPA?

It's easier to type, and presumably more likely to be used. Also, for 
better or worse, the .local convention was widely deployed before there 
was any attempt to standardize it.  Assuming for the purpose of argument 
that there was a valid need for something like .local, it was probably 
easier to use .local than to try to get the vendor and user communities 
to migrate to some other (and probably uglier) convention.

Incidentally, .local is a good example of how name collisions can cause 
problems.  My home router has a DNS resolver that it advertises via 
DHCP.  That resolver tries to answer lookups for .local based on who 
knows what voodoo, sets .local as a default suffix for DNS lookups, and 
responds to PTR queries with answers ending in .local.  This conflicts 
with my computers' use of .local to mean "something to be looked up 
using mDNS".   Some of my computers disable mDNS lookups when they see 
the DHCP server advertising it, others don't.  Which basically means 
".local" is worse than useless on my home network - it's both unreliable 
and inconsistent.

>
> How was it that homenet specified use of the HOME domain 
> apparently without enough scrutiny and how do we prevent that from 
> happening again?

We could start by deprecating .home and discouraging its use, just as we 
deprecated IPv6 site-locals.  (I'm not stating a firm position that we 
should deprecate .home, though offhand I think it was a Bad Idea.  
Rather, I'm saying that we do have some precedent for deprecating bad 
ideas that were once standards.)

Keith