On 5/9/15, 1:10, "Suzanne Woolf" <suzworldw...@gmail.com> wrote:

>I share David’s reservations about this— how do we objectively and
>reproducibly distinguish “people are using these in private networks”
>from “people are generating arbitrary traffic to the roots for these”?

One good characterization of the technical problem, although I'd modify
the former to "people...networks and leaking the queries to the root".  A
recipient of a DNS query cannot know why it was asked (no context).  So
whether this is a leak or a gaming cannot be determined in-band.

>Is there any concern for the IETF in a policy that says “If you start
>using an arbitrary name that isn’t currently in the root zone, you can
>just get the IETF to protect it for you”?

I find this above statement a little unclear.  Whose policy (as in ICANN
policy/IETF policy/someone else's policy)?

>Furthermore, given that ICANN has already said they won’t delegate these
>names in particular, how is it helpful for the IETF to also add them to
>the Special Use Names registry?

I'll throw out what is in my personal mental model on this topic (as
opposed to something explicitly documented elsewhere):

For the non-DNS software using identifiers.

If a layer in the software stack sees an identifier matching an entry in
the Special Use Names registry, it should avoid trying to resolve the name
using DNS.

This issue is about more than the DNS.  As far as the DNS, I believe it's
really only about how it can be kept from harming other identifier
systems[0] and not meant to be a way to "shape/prune" the DNS name space
tree.

[0] As in "name.onion." isn't a domain name, it's a string that happens to
have dots in it.  And at the end of it and otherwise appears to conform
with the "BNF" in RFC 103-something - but that's just coincidental.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to