Re: [DNSOP] Last Call: <draft-ietf-dnsop-onion-tld-00.txt> (The .onion Special-Use Domain Name) to Proposed Standard

Mark Nottingham <mnot@mnot.net> Mon, 10 August 2015 23:53 UTC

Return-Path: <mnot@mnot.net>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 72B211A1B8E; Mon, 10 Aug 2015 16:53:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level:
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1CP3A7M-D09g; Mon, 10 Aug 2015 16:53:19 -0700 (PDT)
Received: from mxout-08.mxes.net (mxout-08.mxes.net [216.86.168.183]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 22C9C1A1B86; Mon, 10 Aug 2015 16:53:19 -0700 (PDT)
Received: from [10.40.69.241] (unknown [222.128.202.3]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.mxes.net (Postfix) with ESMTPSA id 21943509BB; Mon, 10 Aug 2015 19:53:14 -0400 (EDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2102\))
Subject: Re: [DNSOP] Last Call: <draft-ietf-dnsop-onion-tld-00.txt> (The .onion Special-Use Domain Name) to Proposed Standard
From: Mark Nottingham <mnot@mnot.net>
In-Reply-To: <2dc608607be34a09bc1192e5366323ed@mxph4chrw.fgremc.it>
Date: Tue, 11 Aug 2015 07:53:10 +0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <1D95CF0F-D6A9-41CA-93AF-8CB7081D20ED@mnot.net>
References: <20150714192438.1138.96059.idtracker@ietfa.amsl.com> <D1EA295A.DFA3%edward.lewis@icann.org> <55C4C0DA.8070502@w3.org> <D1EA43FA.DFB8%edward.lewis@icann.org> <554DA9E5-2071-48A2-8AC8-DD07DE3B2BB0@fb.com> <CA+9kkMAcW_g28qAZ8SKbqefZfdDxzdM7=0D_of7f_qLm08d3wA@mail.gmail.com> <CD2ABBDD-F9CA-4A27-A0B6-3CDD37DB1AB4@fb.com> <CA+9kkMAmuXuLpsHVm8PeFQ5V+48mdd06=u=L+gKPqGVQSh-FFg@mail.gmail.com> <8D7DDDFF-BC2E-4A98-ADDB-A72D2C6A796E@fb.com> <EE0CF597-EC22-4853-8020-1F2AFECF73EE@cursive.net> <C0DB3F19-80F2-415C-9968-CD4072C9298A@fb.com> <2dc608607be34a09bc1192e5366323ed@mxph4chrw.fgremc.it>
To: "Darcy Kevin (FCA)" <kevin.darcy@fcagroup.com>
X-Mailer: Apple Mail (2.2102)
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/FiUeYW0m_jq55YmbZIDbrb8RZYE>
Cc: Edward Lewis <edward.lewis@icann.org>, Joe Hildebrand <hildjj@cursive.net>, Ted Hardie <ted.ietf@gmail.com>, "ietf@ietf.org" <ietf@ietf.org>, Richard Barnes <rlb@ipv.sx>, "dnsop@ietf.org" <dnsop@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Aug 2015 23:53:21 -0000

Kevin,

On 11 Aug 2015, at 6:54 am, Darcy Kevin (FCA) <kevin.darcy@fcagroup.com> wrote:
> 
> In retrospect, the definition of the “http” and “https” schemes (i.e. RFC 7230) should have probably enumerated clearly which name registries were acceptable for those schemes, so that the following language from RFC 7320 (a BCP) could be invoked against any attempt by an app – Onion or anyone else -- to inject their own unique brand of “specialness” into the interpretation of the Authority component of their URIs:
>  
> Scheme definitions define the presence, format and semantics of an
> authority component in URIs; all other specifications MUST NOT
> constrain, or define the structure or the semantics for URI
> authorities, unless they update the scheme registration itself.
>  
> 7230 casually mentions DNS and “network host table” as name registries that can potentially be used for “http” and/or “https”, but never implies that those 2 constitute the only members of the set.
>  
> If both injecting “specialness” into the URI, and updating the “https” scheme itself, were viewed as unavailable or unappealing options, then Onion – and anyone else who follows the same path – would be left with no other choice but to define their own scheme.

I think that would be a bad outcome indeed. 

Viewing this as "injecting specialness" into the URI is counter to the clear examples that Alec just gave of non-HTTP-based (and, indeed, non-URI-based) uses of .onion. So, I can't imagine what end such restrictions would serve, except as a (fairly artificial) way to frustrate the registration of .onion.

I'd also point out that such an approach might place procedural barriers in place of getting .onion or something similar recognised, it would not significantly hinder its deployment — as evidenced by .onion itself.

Regards,




--
Mark Nottingham   https://www.mnot.net/