-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 01/07/2015 12:38 AM, Andrew Sullivan wrote:
> 
> Some of these proposals are in fact using names in domain name slots
> as ways of indicating that the protocol itself ought to be
> different. The hint a name below onion is giving is, "Not really the
> protocol you think it is."  It's a protocol-redirection trick.
> 
*** Not exactly.  As I understand it, Tor says: until you reach the exit
node, the actual protocol is hidden from the intermediate participants
and observers.  At the exit node, HTTP is used if that is what you
intended to use.

The case for using tor:// or onion:// (let's say it's tor:// to
simplify), is to be able to indicate that the transport to destination
should be the Tor network.  In such case, you could use
tor://example.com/ in your Web browser, and your Web browser would know
that you intend to use HTTP(S?) to reach example.com via the Tor
network, or you'd type: `ssh tor://example.net` to use SSH over Tor
instead of `torsocks ssh example.net`, etc.

Similarly, tor://facebookcorewwwi.onion/ would be redundant on a system
running Tor only with https://facebookcorewwwi.onion/ but useful on a
system running GNS and not Tor as the GNS resolver may know how to pass
it on over the Tor network in the future.

> In the other case, it's an indication that the _namespace_ is
> different: that if you resolve that name on the Internet without
> special enabled software, you aren't getting the service you desired,
> regardless of the protocol you happen to be using.
>
*** This is true for all 6 pTLDs: special software is required to reach
the desired service.  Otherwise, NXDOMAIN is returned after hitting the
DNS root.  The problem resides in the fact that IANA may assign one of
the 6 pTLDs to some registrar, and then conflicts start happening.  Once
IANA has assigned the pTLDs to P2P Systems, such conflict is known to be
an error, or a malicious attempt, as the DNS cannot resolve such names
without specific changes to implementations.

> In theory, these kinds of applications actually ought to want
> a new DNS class
>
*** A new DNS class would neither solve the privacy issue nor the
censorship issue P2P systems want to address.

> But they're different kinds of
> problems, and so ought to be evaluated differently.
> 
*** At least we shared that feeling, if not the scope of "kinds of
problems" :)

> Moreover, I wonder
> whether using the special-names registry at the top level is justified
> in every case, given that in principle we've already assumed that
> top-level name space is managed by someone else.
>
*** The main issue I foresee with packing widely different name
assignment and resolution strategies at levels below the top-level,
e.g., under an .alt TLD, is one of complication.  Who is managing name
assignment and conflicts under .alt?  Is that IETF via RFC 6761?  Is
that weird wild west?

Now we're talking about 6 pTLDs, each one using its own strategy.  They
have in common to use innovative name assignment and resolution
strategies independent from a centralized assignation authority.  Why
would such strategies appear lower than top-level, especially
considering that they're even different strategies from each other?

There might be others appearing but it's quite unlikely that they would
flourish.  On the other hand, opening .alt would give an incentive to
rush for foo.alt and each new case would have to be treated separately
by each application--without any way to know whether it fails because
the target host name does not exist or because the domain name is not
assigned.

Imagine that we have .bit.alt.  Applications start supporting .bit.alt,
and it works, and everybody is happy.  I can request a web page from
example.bit.alt, and I retrieve it.  I can request a web page from
non-existent.bit.alt and receive an NXDOMAIN.  Perfect.  Now I mistype,
or the person creating the QR code I used to connect mistyped:
wrong.example.b1t.alt. Bee One Tee.  Hardly visible.  Still returns
NXDOMAIN.  Is that because the wrong.example.bit.alt does not exist, or
because the b1t.alt does not exist, or is it not supported by my system?
 Things become complicated and confusing.  20 naming strategies later,
implementors ask: was it .bit.alt or .but.alt that used the digital Arab
telephone strategy?  Or was it .bot.alt?  Are you sure .bot.alt exists?
 Where can I verify what sub-domains of .alt exist?  Who controls the
list?  Should Apple re-deploy .local under .local.alt?  Why .invalid.?

Six pTLDs in one RFC fosters clarity: these names are not assigned using
regular DNS delegation to registrars; each has its own peer-to-peer way
of assigning and/or resolving domains, outside the DNS tree ; they
enable protection against arbitrary censorship.  The message is both
clear and simple.  It becomes complicated when trying to eliminate the
assignment/resolution specificity of P2P name systems.  It becomes
complicated if you have to look them up in various RFCs to figure out
which P2P domains do not follow the regular DNS delegated registration
rules.

Regards,

==
hk
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=z5kQ
-----END PGP SIGNATURE-----

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to