I’ve read this draft and began to reply a few times, but keep changing my mind on how to respond.
On Jan 5, 2015, at 19:32, hellekin <helle...@gnu.org> wrote: > On the other hand, if we want to keep a sane base, we'd rather identify, > circumscribe and announce the various existing strategies, and hope that > future strategies that may or may not appear will have a solid > foundation for incorporating their innovative strategy into the global > name space. Our group chose the latter. Here’s where I think a problem lies. “the global name space.” Specifically the word “the." What I read in the draft is that there are four different name spaces which are using identifiers that resemble the printed version of a DNS identifier. (The four being GNS, Tor, and the two for the latter two applications.) By “the printed version” of a DNS identifier I am differentiating from the on-the-wire form of a domain name (which has no dots in it). “Resemble” refers to the desire for general purpose applications to be able to treat, as commonly as possible, the names regardless of the appropriate mechanism for resolution in the correct name space. This kind of parallels the situation surrounding the DBOUND (not-yet-but-maybe-soon-WG) activity. That activity involves a set of applications using identifiers that happen to be based on domain names (a little stronger than resembling them). The significant difference between this draft and DBOUND is that this draft is about “resolving” the idenfitier to a service point, DBOUND is about “knowing what administrative/security properties” to apply to an identifier. >From what I’ve read in the draft, the rules for special use, and in the >thread, is that there’s a desire that identifiers in these four other (other >than DNS) name spaces to never touch the DNS. Not simply avoid collisions but >to outright and completely avoid the DNS packet stream, so that the queries >aren’t even witnessed by those who can see DNS packet traffic. And if for >some reason the queries do leak to the DNS, the DNS should act as if the >domain name corresponding to the identifier does not exist. Which the DNS >does today, meaning, the draft wants status quo for the DNS, in the protocol >and in allocation. I.e., the identifiers are not special to the DNS, the desire is that they are never added to any root zone - the global public Internet or any other. Most of the leaked traffic would go to the global public Internet, which is largely managed via the ICANN processes (I’ll skip the extensive caveats to apply here) so one can think to focus there. Anyone can stand up a DNS server and load their own root zone into it with the strings mentioned in the draft - and since there’s always “old code” around, nothning can stop the DNS protocol from serving up colliions with these names. Sorry for this path, but, I keep coming back to - there’s no reasonable change to the DNS protocol that can prevent (and I mean prevent) any mishaps - keeping in mind that the whole DNS angle here only comes in when the applications “leak” the identifiers. What is needed is a change to all applications that handle identifiers that resemble printed domain names so that they know how to resolve the names. They need to know when an identifier is a GNS identifier or a Tor identifier. (Would leaking a GNS identifier to Tor be as bad as leaking it to DNS?) That’s a problem to be solved, even if this draft is not the place to do it. WIthout this, it’s likely that identifiers will leak all over. What I’m commenting does not directly answer whether the draft fulfills the requirements for an application to the special needs registry. At some higher level I wonder that even if these names were listed there whether the problem of managing the identifiers will be solved. The desire to have name spaces besides the DNS name space is definitely legitimate, the technical barrier is how to know what space an identifier belongs to if the same syntax is shared. _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop