Christian,

> On Jan 6, 2015, at 12:47 AM, Christian Grothoff <christ...@grothoff.org> 
> wrote:
>> The DNS implementation of the
>> singular hierarchical domain name namespace does not preclude the use of
>> any portion of that namespace outside of the DNS (for example, see
>> nsswitch).
> 
> Well, I believe that while you are technically right, an nnswitch plugin
> hijacking ".com" today to do something very different from DNS
> resolution is typically not merely bad design, but most likely malware.

I meant to provide nsswitch as one (generic) example of a way to implement a 
portion of the domain name namespace outside of the DNS. It obviously is not 
the only means -- /etc/hosts would be another (less generic) example.

> This is what we mean by usability: we need to satisfy user's
> expectations, and just grabbing some TLD that ICANN has already
> allocated is likely to cause usability problems by confusing users.

I understand and that is, I believe, what RFC 6761 was trying to facilitate. 
The question isn't whether grabbing some TLD is a good idea (it isn't) but 
rather, is a TLD actually necessary.  So far, as far as I've seen, the only 
concrete justification you've provided appears to be that a TLD (as opposed to 
a second-level name in a sub-tree dedicated to non-DNS domain names) means 
fewer characters to type. I'd note that in the case of TOR, something like 
T.ALT or O.ALT would be the same number of characters as .ONION.

> Correctly configured installations of the P2P name
> systems must never contact DNS servers about these pTLDs.

It might be worthwhile stating this explicitly as in:

"Installations of the P2P name systems MUST NOT contact DNS servers about these 
pTLDs."

perhaps adding that exposure to the DNS of these P2P names would constitute a 
potential privacy/security risk.

However, as I understand it, this wouldn't appear to apply to GNS and Namecoin 
("GNS and Namecoin domains MAY use [the DNS tree hierarchy], as they return 
DNS-compatible results; ..."), so I presume I'm misunderstanding something -- 
apologies for not having time to delve into the details of how those systems 
actually work (that's on my list of things to do).

> Yes, except thinking about it 'cannot ... administratively' also has not
> exactly the right ring to it.  I'll change it to:
> 
> "Names within pTLDs are not allocated by some designated administration"
> would be more precise.

That's clearer, at least to me.

> However, if say the socks proxy is "off", or the NSS is missconfigured,
> then the requests may unintentionally be leaked to DNS.

OK. My concern was that I had somehow inferred that a potential algorithm for 
transition to a P2P system was:

get domain name
query DNS for domain name
if response is NXDOMAIN then
        query P2P system for domain name
        P2P domain name handling
else
        DNS domain name handling
endif

(which would obviously be bad)

Perhaps in section 2, around (or replacing) the third bullet on starting page 
3, you could say something along the lines of:

"o When a pTLD protocol has been implemented, existing software libraries and 
APIs MUST intercept queries intended for the DNS and MUST NOT extend regular 
DNS operation to ensure P2P names cannot leak into the DNS."

>> "A pTLD is mentioned in capitals, and within double quotes to mark
>> the difference with a regular DNS gTLD."
>> 
>> Presumably you mean "TLD" not "gTLD" as "gTLD" is a specific type of
>> top-level domain (generic as opposed to country code (ccTLD)).
> 
> Well, we don't have ccTLDs in the text, and in my view "TLD" includes
> "gTLD", "ccTLD" and "pTLD".

Right, the nit I was picking was there was no need to specify the type of DNS 
TLD.

Regards,
-drc

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to