Hi,

>> What was the motivation for removing .lan from the list?
>> 
>> I can see where .localdomain and .domain indeed won't cause any
>> problems, but I think .lan is still a pretty common one in use.
> 
> It is a common fake TLD used by home gateways for their internal networks.

Yeah, so I've read this draft and have hesitated to comment as I'm aware there 
are folks who believe it inappropriate for ICANN staff to comment on anything 
having to do with top-level domains in the IETF. However, as I continue to 
believe participation in the IETF is based on the individual, not for whom the 
individual works, I'm going to throw in my 2 cents on this topic with an 
explicit "NO HAT" placed firmly on my head.  My apologies if my participation 
in this discussion raises political hackles.

While I would like to declare the proposed strings as reserved as I think it 
would be crazy dangerous for them ever to be delegated, I'm concerned about the 
lack of objective criteria.  The draft states:

  '[SAC045] reports the results of a CAIDA
   measurement study [RSSAC_DNS] which found that "NXDOMAIN responses
   account for more than 25 percent of the total responses from root
   name servers observed in the study, and the top ten such strings
   account for 10 percent of the total query load.'

While true, these values will vary over time, location of collection, and 
myriad other reasons, probably including phase of moon. If we're going to 
reserve strings from ever being delegated, I believe we need to come up with 
some rationale beyond "because they showed up a lot at some root servers at 
this point in time."  If that is the only criteria, it would be relatively easy 
to game the stats by hiring a few botnet zombies to pump queries with names 
you'd like to reserve with spoofed source addresses.

Perhaps some criteria would be a combination of lots of queries over a long 
period of time at multiple measuring points along with some rationale for those 
queries to be generated (e.g., I'm told long ago Microsoft recommended the use 
of .CORP for internal Active Directory configurations, pointers to that 
documentation would explain why those queries were being generated)?

FWIW.

Regards,
-drc
(Speaking only for myself. Really.)

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to