On 3/17/15, 21:53, "Richard Barnes" <r...@ipv.sx> wrote:

>The only nit I would pick with the above is that it's perfectly possible
>to *specify* what should be done, but of course one should not expect
>that to instantly change everyone's behavior.

A preamble - I don't think what is "perfectly possible" matters.  In an
environment that has an unbounded population it's a waste of time to
document a rule saying "this is how you must/should/ought to behave if
only because enforcement (testing) is impractical.  What you can do, in
such an environment, is focus on individual reactions to the stimuli -
like - when you get asked a question, reply like this.

If you are writing to a bounded population of actors, you can spell out
rules that define membership and what it means to be a member.
Nevertheless, you have to account for the unbounded population of
non-members knowingly or unwittingly getting in the way.

Sometimes the underlying concept is perfectly reasonable but the way it is
described has flaws and sometimes the recipe contains poor assumptions.

>From the draft 
(https://tools.ietf.org/html/draft-appelbaum-dnsop-onion-tld-00)

   1.  Users: human users are expected to recognize .onion names as
       having different security properties, and also being only
       available through software that is aware of onion addresses.

I don't know what to make of that.  It's fine, but, to me an onion is
something I buy at the supermarket so if asked about an onion address, I'd
guess a farm.  (Take this lightly, I'm not sure what would be an
appropriate answer - and I couldn't resist.)

   2.  Application Software: Applications that implement the Tor
       protocol MUST recognize .onion names as special by either
       accessing them directly, or using a proxy (e.g., SOCKS
       [RFC1928 <https://tools.ietf.org/html/rfc1928>])
       to do so.  Applications that do not implement the Tor protocol
       SHOULD generate an error upon the use of .onion, and SHOULD NOT
       perform a DNS lookup.

The first part of the answer is spot-on.  The latter is wrong - for
example, my mail client allowed be to type in .onion and it didn't and
shouldn't complain.  (I turned off spell checking too.)  Trying to specify
what non-Tor-protocol elements will do is kind of useless.

   3.  Name Resolution APIs and Libraries: Resolvers that implement the
       Tor protocol MUST either respond to requests for .onion names by
       resolving them (see [tor-rendezvous...) or by responding with
       NXDOMAIN.  Other resolvers SHOULD respond with NXDOMAIN.

This is tricky.  Again, Tor-protocol elements are fair game.  Other
resolvers will fall into two camps, one that would always return NXDOMAIN
so long as .onion is not delegated in the root zone.  It's possible I
stand up a test DNS with .onion, .tomato, .lettuce for testing in my
private lab and that should be okay (until I connect the lab with the
outside world - which I have seen happen).

   4.  Caching DNS Servers: Caching servers SHOULD NOT attempt to look
       up records for .onion names.  They SHOULD generate NXDOMAIN for
       all such queries.

Same comment as for #3.

   5.  Authoritative DNS Servers: Authoritative servers SHOULD respond
       to queries for .onion with NXDOMAIN.

Same comment as for #3 and #4.

   6.  DNS Server Operators: Operators SHOULD NOT configure an
       authoritative DNS server to answer queries for .onion.  If they
       do so, client software is likely to ignore any results (see
       above).

I would drop the latter sentence, the first is a reasonable "suggested
practice" for operators.  I worked at an operator that would let you
configure any domain you wanted, so long as it didn't conflict with others
in its own system.  This had the same pitfalls as certificate authorities
issuing certificates for resources whose responsibility was impossible to
trace, with actually less consequences.  (I'll avoid the temptation to
justify that here.)

   7.  DNS Registries/Registrars: Registrars MUST NOT register .onion
       names; all such requests MUST be denied.

This goes along with my responses to #3, #4, #5 - as far as there never
being a .onion in the root zone.

(Somewhere in this writing, I remind myself that the Special-Use Domain
Name registry is a little bit of an unknown to me, mentioned in another
email earlier today.)

Elsewhere in the draft is this:

"The Tor network is designed to not be subject to any central
   controlling authorities with regards to routing and service
   publication, so .onion names cannot be registered, assigned,
   transferred or revoked.  "Ownership" of a .onion name is derived
   solely from control of a public/private key pair which corresponds to
   the algorithmic derivation of the name.

   Users must take special precautions to ensure that the .onion name
   they are communicating with is correct, as attackers may be able to
   find keys which produce service names that are visually or apparently
   semantically similar to the desired service."

And to me that clearly distinguished these names from the DNS.  "Special
precautions" to me includes the Tor elements protecting themselves from
non-tor-elements either knowingly or unwittingly interfering.  The notion
of a tor name not being subject to an authority hierarchy distinguishes
these identifiers from the DNS model.  It's probably possible to have two
names clash (if I read correctly how the names are derived) which runs up
against the uniqueness principle in DNS, something enforced in IDNA too,
if I believe correctly. I use believe here on purpose because I'm usually
wrong whenever I make any statement about IDNA.

In summary, the draft really ought to address this, and prehaps by
reference - how Tor protocol elements are to behave with the names, what
is requested of external systems to help the Tor protocol, and how the
elements of the protocol protect themselves from non-(compliant-)elements
interfering.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to