Re: the names that aren't DNS names problem, was Last Call: <draft-ietf-dnsop-onion-tld-00.txt>

Douglas Otis <doug.mtview@gmail.com> Tue, 21 July 2015 08:56 UTC

Return-Path: <doug.mtview@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 627271B2AFE for <ietf@ietfa.amsl.com>; Tue, 21 Jul 2015 01:56:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YtzwGP1LBgkY for <ietf@ietfa.amsl.com>; Tue, 21 Jul 2015 01:56:07 -0700 (PDT)
Received: from mail-oi0-x235.google.com (mail-oi0-x235.google.com [IPv6:2607:f8b0:4003:c06::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AD5CC1A01F2 for <ietf@ietf.org>; Tue, 21 Jul 2015 01:56:04 -0700 (PDT)
Received: by oigd21 with SMTP id d21so80418187oig.1 for <ietf@ietf.org>; Tue, 21 Jul 2015 01:56:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-type:content-transfer-encoding; bh=lTaNxoq2JXYQ80DmObLqjAtE8ACWZA+Fb3G1dt1F+AI=; b=N5QnQ4IPGh4e5h2qnX3qR+yfVQIySP7bwq5bIj6fuTFFJnNGQm7W5Y/TcPtUcKkhQ8 JjU/r40Z2e3uo3H8O3WfsUcbRE/8BUqNmcRfr7NObCGbZhRURLBatMMUjPmOQEhycy0C 7Tr19OKY/XS01/TSQBQA1uBybaFgZffYaF6xS7/+VGlKe64IwO+lG2thAe6+IYyp70eB yErNmMJJeSr2n3iTYq4kpvG4oQoJFzsb2ayhHAUf6IWlawGqLkAQy7ELxVcuxQj30eSK 7vEbx2JQa+1InhuOFEYjJjJY3VwUwOH82Td4slDi40RPpstOJNghZG5yjJmMR1uyRdAL fEGw==
X-Received: by 10.60.145.169 with SMTP id sv9mr29444512oeb.69.1437468964239; Tue, 21 Jul 2015 01:56:04 -0700 (PDT)
Received: from US-DOUGO-MAC.local ([2001:67c:370:176:614f:303a:77c3:4498]) by smtp.googlemail.com with ESMTPSA id sx2sm13800707obc.0.2015.07.21.01.56.03 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 21 Jul 2015 01:56:03 -0700 (PDT)
Subject: Re: the names that aren't DNS names problem, was Last Call: <draft-ietf-dnsop-onion-tld-00.txt>
To: ietf@ietf.org
References: <20150720192219.53802.qmail@ary.lan> <55ADF2A7.3080403@cisco.com>
From: Douglas Otis <doug.mtview@gmail.com>
X-Enigmail-Draft-Status: N1110
Message-ID: <55AE0920.1010400@gmail.com>
Date: Tue, 21 Jul 2015 10:56:00 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:38.0) Gecko/20100101 Thunderbird/38.0.1
MIME-Version: 1.0
In-Reply-To: <55ADF2A7.3080403@cisco.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/IqwCNqq2MFoRyi-G8faqu5MWTac>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Jul 2015 08:56:09 -0000


On 7/21/15 9:20 AM, Eliot Lear wrote:
> Hi,
> 
> On 7/20/15 9:22 PM, John Levine wrote:
> 
>> [John Klensin's question about taking all of this back to ICANN] is an excellent question, and I suppose it couldn't hurt to ask.
>> But I have little confidence that ICANN in anything like its current
>> form, where it is dominated by people who want to collect rent on
>> every imaginable TLD, would come up with an answer any better than let
>> them pay $185K and take their chances.
> 
> That's exactly it.  Some mechanism is needed to address pragmatics of a
> situation, something that the IETF has a pretty good (albeit not
> perfect) record on addressing.  That mechanism could sit at ICANN, the
> IETF, or even both organizations.  No matter what one's opinion of Tor
> is, the fact is that it's out there and in use.  They don't intend that
> the DNS be used, and yet there is clearly an interaction between the two
> namespaces at the CA level.  It's possible that the CA people could have
> created a new usage constraint, but history shows that the extension
> isn't well accepted, and that could actually hinder secure deployment.
> 
> And so to those who think ICANN should reserving names, one reasonable
> question would be “why haven't they done so?”  Perhaps the answer is
> that they have sufficient confidence in the approach that we are
> following that they don't feel the need to do anything else.
> 
> Someone noted that having a lengthy argument on the IETF list about this
> a bad thing.  If we had to repeat the principles argument without any
> new information or ideas, I would tend to agree.  But otherwise this
> discussion has served as a healthy self-limiting function over the
> growth of 6761 reservations; which is exactly what should happen, and
> perhaps the reason why folks at ICANN should be very confident in the
> IETF's decision process in this regard.
> 
> And it call comes down to pragmatics, which, John, you highlighted in
> your first comment about All of This.  That's why I support the draft
> going forward.

Dear Eliot,

Not all names resolve with DNS. For example, mDNS
automatically adds '.local' (RFC6761) to service names to
imply mDNS resolution. '.onion' informally implies Tor
although mentioned in RFC4303. To support home environments--
https://tools.ietf.org/html/draft-ietf-dnssd-hybrid-00
introduces the '.home' TLD.  Great for those handy with ASCII.

'.home' however is likely derived from user input. IPv6 Home
Networking Architecture Principles (RFC7368) suggests
Ambiguous Local Qualified Domain Name (ALQDN) space and
gives an example of '.sitelocal'. This seems to imply use of
a trailing '.' is acceptable.  Lack of 'xn--' prefix with
non-ASCII UTF-8 (more than 7 bit) and the lack of  A-Label
collision could indicate a sitelocal TLD.  A-Label versions
might leak to DNS so local services should authenticate
clients in some manner (likely by a sitelocal IP address).
Special handling of 'xn--" prefixes could offer non-ASCII
users a friendly DNS escape mechanism and not require
exhaustive lists of IDNA special use equivalent versions.

Regards,
Douglas Otis