Hi Warren!

> "instead of using the DNS infrastructure, .onion names functionally
> correspond to the identity of a given service, thereby combining
> location and authentication."
> to be very confusing.
> After a while I went and looked at the diff and saw that this used to be:
> ".onion names are hashes that correspond to the identity of a given service,"
> 
> I'm guessing that you changed this because of some comment? Anyway,
> this is in the introduction section, and so I think a little more, um,
> introductory text would be helpful. Perhaps saying that they are
> hashes of the key, and functionally correspond to <handwave, handwave>
> ?


That's very observant of you; the reason it was changed away from specifics of 
hashing-and-truncation are because the Tor project are currently in the process 
of overhauling hidden services, and it's entirely possible that the next 
mechanism may be substantially different - hence wanting to keep the 
description abstract and forestall arguments that the (eventual) RFC might be 
invalidated by evolution of technical details - the Tor Project will drive the 
implementation details, not the RFC.


> Also:
> "In this way, .onion names are "special" in the sense defined by
> [RFC6761] Section 3; they require hardware and software
> implementations to change their handling, ..."
> I'm not really sure if this is completely true -- I agree that
> software implementations would need to change, but I don't see how
> *hardware* implementations would need to change -- largely because I
> don't actually understand the concept of a hardware implementation of
> the DNS / .onion resolution stuff. Sure, some CPE runs *software* that
> does DNS, and some hardware accelerators run some DNS stuff in FPGAs,
> but I still don't see this a "hardware" implementation.
> I'd suggest just making that be:  "In this way, .onion names are
> "special" in the sense defined by [RFC6761] Section 3; they require
> implementations to change their handling, ..."


That's an interesting point which I shall bounce off Richard Barnes for my 
clarity; my reading of the text was any device - software (e.g.: Browser) or 
hardware (e.g.: printer, IPMI, wifi router, etc...) - which wants to resolve a 
".onion" name, must create ".onion" differently and eschew DNS in favour 
punting the connections to a Tor (SOCKS) server.  QED.


> Also:
> Throughout the document you state that thingies should return
> NXDOMAIN. Personally I think that this is a well enough known term
> that it is fine, but it isn't really defined (hoffman-terminology only
> sorta, kinda does). I'd think having a "should respond with NXDOMAIN
> (RCODE 3 - Name Error)" (or 'Non-Existent Domain') the first time it
> is used would head off future comments....


Noted.  Thank you.  Thank you also for the extensive help.  :-)

    - alec


Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to