Re: [DNSOP] Some thoughts on special-use names, from an application standpoint

2015-11-26 Thread George Michaelson
I have a different perspective on this question Mark.

Firstly, I find use of .magic as the extreme RHS of a name, to force
special behaviour architecturally disqueting.

I really do worry about what we think we're building when we encode this
behaviour into name strings. It leads to all kinds of bad places. Some of
them, like the homoglyph problems John Klensin has raised, simply don't
have good answers (the assumption the string .onion is the literal ASCII
'o' 'n' 'i' 'o' 'n' is not well founded)

We were here a long time ago, when we had pre-Internet mail and used things
like .UUCP as magic break-out signals in email. This rapidly becomes the
problem: its bound to applications-level decisions about when to honour
magic, and when not, and it certainly doesn't avoid lower level
gethostbyname() calls everywhere. So the .magic label winds up being
half-true, depending.

Secondly, While I think  I now understand some of the problems you have in
web/apps layer (from talking to Wendy Seltzer) and I have sympathies about
the syntactic constructs welded into code around URL forms, I think these
problems are different to the architectural/layer violation explicit in
forcing .magic names into the namespace.

What really got me floored, was the qualities of cryptographic protection
which a project like TOR needs, and the implication a public/commercial CA
service embedded in the browser TA set is the right path. I'm frankly
horrified, even under certificate pinning, that we've gone to a space where
any TA can claim to sign over .onion, and excluding the pinned
applications, lead people into paths where their assumptions of TLS backed
security are simply not true.

As I understand things, TOR *wanted* .onion to get X509 PKI over the label
in a browser, and the CA community refused unless its TLD status was
confirmed. Is this the kind of rigour in technical process we expect, to
make technical calls to pre-empt the namespace? (which btw, we passed
otherwise to another body, reserving an RFC backed process to get names,
but I think that was a hugely unwise decision)

To protect .onion certs, the TOR developers are going to have to code in
cert pinning behaviour, all kinds of things, which frankly sound to me a
lot like the cost of not having the name, or having a name buried under a
2LD instead.

So I come to a different place. I come to a place where requests for magic
names look like violations of any spirit of an architectural view of the
network, and where retaining some technical basis to reserve them looks
like violations of the separation of functional roles between ICANN and
IETF, absent very very clear, strong reasons to have the name held back.

I don't entirely see these reasons emerging. I see the opposite. I see
expediency from apps communities, seeking to use .magic tricks to avoid
cost explicitly in their layer, but at a cost of polluting the public
commons.

I am pretty firmly in the camp which says the revision of the RFC should be
complete: we stop doing this, and people who want names go into ICANN
process to establish them.

-G


On Thu, Nov 26, 2015 at 9:59 PM, hellekin  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 11/26/2015 06:38 AM, Mark Nottingham wrote:
> >
> > Given this context, I was disturbed to hear the design team presentati
> on
> > in Yokohama
> >
>
> So you mean there's an already working team on the revision of RFC6761,
> and that team had the time to prepare a presentation, while the DNSOP
> chairs didn't have the time to respond to volunteers nor to announce
> this team.  This is simply unacceptable.  I concur that the revision of
> RFC6761 should go to another group where "Internet community" makes some
> sense and corporate dissent is not silenced by ignoring legitimate
> requests.  Please don't expect any apologies from me for telling the
> truth.  This is a carnival of an inclusive process.
>
> Thank you Mark for the heads up.
>
> ==
> hk
>
> -BEGIN PGP SIGNATURE-
>
> iQJ8BAEBCgBmBQJWVvQ8XxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
> ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRFQ0IyNkIyRTNDNzEyMTc2OUEzNEM4ODU0
> ODA2QzM2M0ZDMTg5ODNEAAoJEEgGw2P8GJg9ewoQALD1dF/Wqyh2Lo5qZ35PUANA
> bvq2k5BZd1UsN488+V4v7PnAHxO7XgR8IQSYYnp1oYNaZl5WbFEPjT6HOSR3O4lr
> 7iSVeSxPux8hssSxorkWtBVk8oAnImGEPyIlYunBLcTyasXLY5+2fzmR1+P4/9Kk
> ahjHvuQa6dOAXhqTMBizwb3kZ2PC2hFlM5LKMIBcf9GfTVmH//fbEalHYPYEwMCY
> AvX9mkMvvWcWhn15OXRi50r3kQl65d0KQA2euQ8mUIe5qafDHASBtZLc81t0rAXv
> fjaWT4REu+KUHexWKgI7NFF3uZ0M0Cm7imYN6+YG+AWFtPrr4SPh1BA0L4td93q8
> bGxGEJrDTWRVaW2c98UO5bFxm3kqcM4oTdBD1Rg4yC1OatvuKzZp6nPrFG09G5rn
> PjorrqoNx0MHxwejrTHkkhnmvmgTfPUTvkT/7zUYLTwRITDrjzOyj932COrZV+A3
> dak5M5hRLhR8jswx/lh+SmY1RFAtCuNDcoFuXTOJygwSpj7WvigIORiT6ATLFlfW
> mxYxkVP/Tc76anRTk5O/AIu87c5K9fr6TPiFRIL/0eKnFBEMn2qbaW7TLvAl6o89
> kgYYp4u59ve0vCL6gE2sn1w1EYnctFVxpzcg9HkFl/MFuQyWdc4yb5OdFWW8sema
> 8hpTT/KiW1/KDHGj0kcB
> =IZoh
> -END PGP SIGNATURE-
>
> ___
> DNSOP mailing 

Re: [DNSOP] I-D Action: draft-andrews-dns-no-response-issue-16.txt

2015-11-26 Thread Mark Andrews

Most of the tests now contain references to the relevent sections
of the RFCs being tested.

Seperated the tests that cover Basic DNS behaviour and Extended DNS
behaviour into two sub sections.

Yes, the references to RFC5395 needs to be updated to the latest
RFC6195 before anyone tells me.

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] I-D Action: draft-andrews-dns-no-response-issue-16.txt

2015-11-26 Thread internet-drafts

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Domain Name System Operations Working Group 
of the IETF.

Title   : A Common Operational Problem in DNS Servers - Failure 
To Respond.
Author  : M. Andrews
Filename: draft-andrews-dns-no-response-issue-16.txt
Pages   : 16
Date: 2015-11-26

Abstract:
   The DNS is a query / response protocol.  Failure to respond or to
   respond correctly to queries causes both immediate operational
   problems and long term problems with protocol development.

   This document identifies a number of common classes of queries to
   which some servers either fail to respond or else respond
   incorrectly.  This document also suggests procedures for TLD and
   other similar zone operators to apply to help reduce / eliminate the
   problem.

   The document does not look at the DNS data itself, just the structure
   of the responses.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-andrews-dns-no-response-issue/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-andrews-dns-no-response-issue-16

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-andrews-dns-no-response-issue-16


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] New Version Notification for draft-adpkja-dnsop-special-names-problem-00.txt

2015-11-26 Thread Patrik Fältström
On 26 Nov 2015, at 18:05, Joe Abley wrote:

> On 25 Nov 2015, at 0:40, Patrik Fältström wrote:
>
>> I have read this draft and have a number of comments. I can not say these 
>> are the only ones, but at least some :-)
>>
>> The dominant protocol for name resolution on the Internet is the
>> Domain Name System (DNS).  However, other protocols exist that are
>> fundamentally different from the DNS, but which have syntactically-
>> similar namespaces.
>>
>> I claim that if it is syntactically similar and the names are used 
>> interchangeable in protocols (see below) we actually DO talk about use of 
>> the same namespace. This is the camel in the tent, and I think we should 
>> just admit, or say clearly whether we do talk about, which I think we do, 
>> one name space with multiple resolution mechanisms.
>
> That's a possible direction. However, I don't know how far we will get with 
> that approach, since every additional example of a name resolution protocol 
> comes with an attendant list of exceptions, e.g.
>
> - LOCALHOST -- it's a single, dotless name, and there's no hierarchy
> - LOCAL -- child labels can contain spaces and UTF-8-encoded symbols, 
> single-label depth
> - ONION -- a single, fixed-width second-level label (base32-encoded first 80 
> bits of a SHA-1 hash) and anything at all under that (not relevant to the 
> name resolution protocol, but perhaps useful to applications)
>
> I think the useful point to make is that the intersection of all these sets 
> of possible names is non-empty -- that is, you can trivially find examples of 
> names that are legitimate to more than one name resolution protocol, and 
> hence a potential source of confusion to end-users and applications.

Hmm...I think I understand what you mean here. What I was after was that the 
strings are replaceable in the various protocol definitions where "domain name" 
is supposed to be. Then of course certain combination of octet values are not 
possible depending on various rules. By the protocol where the string is in 
use, and (as you point out) because of the different resolution mechanisms.

When thinking of what comes below, what do you say about EXAMPLE? What are the 
rules for that? ;-)

>> It is not so much different protocols as different resolution mechanisms. If 
>> you say "protocol" here, it might sounds like if with the DNS protocol you 
>> can not use multiple different resolution mechanisms (which I think one can 
>> -- one of them using the root managed by ICANN).
>
> Yes, I think it would be better to choose a distinct phrase for what we're 
> talking about here and define it early. I've used "name resolution protocol" 
> for this, but no doubt there are better alternatives.

Hmm...if I knew a good name, I would suggest it. I just stumbled myself over 
the word "protocol".

>> What about EXAMPLE?
>
> I think (but have no citations handy to support my thinking) that EXAMPLE is 
> a reserved top-level label in the DNS, not an example of what Alain called a 
> protocol switch.

;-)

To some degree it is a protocol switch, right? It should never ever be used. 
/dev/null comes to mind... :-)

>> Well...in the architecture we have both the URI scheme and if you look 
>> further the URN definition to manage all different kind of switches. And we 
>> do not have to wake up the old discussion again whether HTTP://EXAMPLE.COM/ 
>> in reality should be URI:HTTP://EXAMPLE.COM/
>
> I think we were imagining that if we could go back in time and insist that 
> URIs such as
>
> http://blah-blah-base32-blah-blah!onion/index.html
>
> unambiguously referred to the onion name resolution protocol, then there 
> would be little chance that these names would leak into other name resolution 
> protocols' infrastructure (like the DNS) and that might provide the basis of 
> some kind of solution to the problem of random (e.g.) e-mailed URLs causing 
> leakage when encountered by end-users and robots that don't know about (say) 
> onion names.
>
> Unfortunately, all attempts to confirm that time travel will be available to 
> me in the future have failed, to date. So either returning to the past to 
> change the URI specification would cause a world-ending rift in space-time, 
> or time travel is fictional. Just quietly, I suspect it's the former.

...or of course ask whether all HTTP scheme URIs use DNS, which imply one 
should place the switch regarding resolution in the URI scheme...

> So, given that it's too dangerous to cross the time streams to fix the URI 
> format, let's go with the ugly but de-facto identifier we have, which is the 
> top label. We don't have to like it, we just have to acknowledge begrudgingly 
> that it exists. That's the intended message in the text.

Yes.

>> What about not-yet-allocated strings in this catalog?
>
> The problem space includes the problem of how a future name resolution 
> protocol architect should register a selector ("switch") for her protocol, 
> how that registration should be han

Re: [DNSOP] New Version Notification for draft-adpkja-dnsop-special-names-problem-00.txt

2015-11-26 Thread Joe Abley
Hi Patrik,

On 25 Nov 2015, at 0:40, Patrik Fältström wrote:

> I have read this draft and have a number of comments. I can not say these are 
> the only ones, but at least some :-)
>
> The dominant protocol for name resolution on the Internet is the
> Domain Name System (DNS).  However, other protocols exist that are
> fundamentally different from the DNS, but which have syntactically-
> similar namespaces.
>
> I claim that if it is syntactically similar and the names are used 
> interchangeable in protocols (see below) we actually DO talk about use of the 
> same namespace. This is the camel in the tent, and I think we should just 
> admit, or say clearly whether we do talk about, which I think we do, one name 
> space with multiple resolution mechanisms.

That's a possible direction. However, I don't know how far we will get with 
that approach, since every additional example of a name resolution protocol 
comes with an attendant list of exceptions, e.g.

 - LOCALHOST -- it's a single, dotless name, and there's no hierarchy
 - LOCAL -- child labels can contain spaces and UTF-8-encoded symbols, 
single-label depth
 - ONION -- a single, fixed-width second-level label (base32-encoded first 80 
bits of a SHA-1 hash) and anything at all under that (not relevant to the name 
resolution protocol, but perhaps useful to applications)

I think the useful point to make is that the intersection of all these sets of 
possible names is non-empty -- that is, you can trivially find examples of 
names that are legitimate to more than one name resolution protocol, and hence 
a potential source of confusion to end-users and applications.

> When an end-user triggers resolution of a name on a system which
> supports multiple, different protocols for name resolution, it is
> desirable that the protocol to be used is unambiguous, and that
> requests intended for one protocol are not inadvertently addressed
> using another.
>
> It is not so much different protocols as different resolution mechanisms. If 
> you say "protocol" here, it might sounds like if with the DNS protocol you 
> can not use multiple different resolution mechanisms (which I think one can 
> -- one of them using the root managed by ICANN).

Yes, I think it would be better to choose a distinct phrase for what we're 
talking about here and define it early. I've used "name resolution protocol" 
for this, but no doubt there are better alternatives.

> Such usage, which a few commenters have referred to as "protocol
> switching," is not limited to "protocol switch" in the strict sense
> of indicating specific protocols on the wire.  It could indicate to
> switch to another name space (eg .onion), use a different protocol
> (eg tor, or mdns), or indicate to use a local DNS scope by not using
> the DNS root for name resolution (eg .home in homenet) or something
> else altogether.
>
> It is important (which I think also Stephane indicated) that we talk about 
> different resolution mechanisms for the name itself. We do not talk about how 
> to access the service in question.

I agree.

> At the time of writing, three top-level domain names reserved by
> inclusion in the Registry are used by name resolution protocols other
> than the DNS:
>
>LOCALHOST is used to refer to the host on which the name
>resolution takes place, without reference to the DNS;
>
>LOCAL is used by the Multicast DNS protocol specified in [RFC6762]
>which is similar in some respects to the DNS, but which uses
>different well-known port number and is limited to a particular
>multicast scope;
>
>ONION is used to construct names that designate anonymous hidden
>services reachable via the Tor network using onion routing.
>
> I think a better text to describe ONION would be:
>
>ONION is used to construct names that designate
>services reachable via the Tor network using onion routing.
>
> What about EXAMPLE?

I think (but have no citations handy to support my thinking) that EXAMPLE is a 
reserved top-level label in the DNS, not an example of what Alain called a 
protocol switch.

> The lack of a more elegant way to specify a
> name resolution protocol in (for example) a URI amounts to an
> architectural oversight.
>
> Well...in the architecture we have both the URI scheme and if you look 
> further the URN definition to manage all different kind of switches. And we 
> do not have to wake up the old discussion again whether HTTP://EXAMPLE.COM/ 
> in reality should be URI:HTTP://EXAMPLE.COM/

I think we were imagining that if we could go back in time and insist that URIs 
such as

  http://blah-blah-base32-blah-blah!onion/index.html

unambiguously referred to the onion name resolution protocol, then there would 
be little chance that these names would leak into other name resolution 
protocols' infrastructure (like the DNS) and that might provide the basis of 
some kind of solution to the problem of random (e.g.) e-mailed URLs causing 
leakage when encountered b

Re: [DNSOP] Some thoughts on special-use names, from an application standpoint

2015-11-26 Thread hellekin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 11/26/2015 06:38 AM, Mark Nottingham wrote:
> 
> Given this context, I was disturbed to hear the design team presentati
on
> in Yokohama
>

So you mean there's an already working team on the revision of RFC6761,
and that team had the time to prepare a presentation, while the DNSOP
chairs didn't have the time to respond to volunteers nor to announce
this team.  This is simply unacceptable.  I concur that the revision of
RFC6761 should go to another group where "Internet community" makes some
sense and corporate dissent is not silenced by ignoring legitimate
requests.  Please don't expect any apologies from me for telling the
truth.  This is a carnival of an inclusive process.

Thank you Mark for the heads up.

==
hk

-BEGIN PGP SIGNATURE-
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=IZoh
-END PGP SIGNATURE-

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop