Not being on DNSOP, I may be missing context here, but this exchange jumped
out at me as especially wrong:


>       Applications that do not implement the Tor protocol
> >       SHOULD generate an error upon the use of .onion, and SHOULD NOT
> >       perform a DNS lookup.
> >
> >If an application does not implement tor, and is not tor aware, it
> >_will_ do a DNS lookup. You can't really go ask the world to stop
> >doing that. You need to deal with that fact.
>

The entire point of the special use domains registry is to tell general
clients how to behave with regard to special-use names.  It exists
precisely to tell the world the DNS names for which they should not do
lookups, because they require different handling.

--Richard



I understand your point, and reality is a good check; by analogy though,
> most (?) programmers are aware not to try looking up “192.168.1.1” in a
> the “.1” top-level domain, and I hope this “should not” phrasing will
> grow, with the establishment of “.onion” as a TLD, to reflect similar sane
> practice.
>
>
>
> >       Resolvers that implement the
> >       Tor protocol MUST either respond to requests for .onion names by
> >       resolving them (see [tor-rendezvous]) or by responding with
> >       NXDOMAIN.  Other resolvers SHOULD respond with NXDOMAIN.
> >
> >Again, stating what software that is not TOR aware should do is a lost
> >cause. They will just think it is a real DNS query and process it that
> >way.
>
>
> Quite. That is, indeed, how it currently works.
>
> When we launched the Facebook Tor Onion we were concerned that malicious
> people would seek to attack users by setting up local DNS resolvers to
> point a DNS address of “facebookcorewwwi.onion” to a malicious IP address,
> and then persuade users with non-Tor-capable browsers to access it.
>
> This concern was fortunately mitigated by our broad use of SSL; but this
> threat model understores the importance of proper SSL certification and
> putting “.onion” on a proper footing as a TLD and within DNS.
>
> With the aid of CA/B Forum Ballot 144, the first portion of that risk has
> been addressed - it should become astonishingly hard to generate an
> acceptable SSL certificate for an "onion address” for use on the IP-based
> network space.
>
> [deletia, apologies, I am going to skip some stuff and seek to revisit it
> later, due to time constraints.]
>
>
>
> >    Users must take special precautions to ensure that the .onion name
> >    they are communicating with is correct, as attackers may be able to
> >    find keys which produce service names that are visually or apparently
> >    semantically similar to the desired service.
> >
> >    Also, users need be aware of the difference between a .onion name
> >    used and accessed directly via Tor-capable software, versus .onion
> >    subdomains of other TLDs and providers (e.g., the difference between
> >    example.onion and example.onion.tld).
> >
> >I don't think an RFC can tell enduers what to do or expect?
>
>
> Actually, I feel that an RFC can tell users what to do and/or expect.
>
> That’s what “documentation” is *meant* to be for. :-)
>
> But, again, I think I take your point.  Do you feel the wording is perhaps
> too aggressive?
>
>     - alec
>
>
> --
> Alec Muffett
> Security Infrastructure
> Facebook Engineering
> London
>
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to