Hi Hellekin!

 >Since Alec Muffett seems to have better things to do

I'm sorry if you've been waiting for my input - I am not the primary
author of the document; Jacob Appelbaum's name is in the document's
title for a good reason, and my involvement has been one of tuning a
few paragraphs, providing some wordsmithing, and cheerleading loudly.

Jake is - as I am sure you are aware - working for Tor, and is a busy
guy (last I heard was off in China doing something amazing) hence I
mailed out the latest draft when there was in extended (and ongoing)
lull in the desire for anyone on our editorial maillist to tweak it.

I'll do my best to respond to your points, albeit Jake and other
(wiser?) heads may have additional insights that I may miss by dint of
this being dropped on me at 10pm the night before the big phone call
to discuss such matters.

On that basis, you'll also please forgive me excising brevity.


 > 1. the users considerations pretend that users must use onion-aware
 >software in order to access Onionspace, but I assert that you and I
 >can use an ordinary Web browser, type in a .onion address, and
 >access the requested service.


If you are consciously running TAILS, I suppose so [ED: TAILS is a
Linux distribution which funnels almost all communication through Tor]
albeit that Tor would likely recommend against using a vanilla browser
in default configuration to access any part of Tor, let alone ".onion"
addresses, because risk of deanonymisation is too high with normal
browsers.  Hence the imprecations in favour of informed users,
reflecting Tor user-policy.

If you are not talking about running TAILS (or similar) then I must be
misapprehending what you mean by "can use an ordinary Web browser,
type in a .onion address, and access the requested service" because
your average browser - say Chrome - cannot access ".onion" without Tor
software help and some fiddly configuration.


 > 2. more importantly, where P2PNames imposes NXDOMAIN response to
 >authoritative name servers, OnionTLD makes it a soft requirement,
 >thus leaving the possibility for name servers to hijack Onionspace
 >without user consent nor awareness.


Yeah, we tossed that one back and forth a bit, and eventually if
slightly grudgingly went with the "SHOULD" on the basis that we wanted
the draft to be adopted more than we wanted to be thinking wishfully.


 > 3. this error is confirmed for DNS server operators, where OnionTLD
 >makes it a soft requirement not to override responses.


This might be an issue so long as your threat model includes blindly
unaware users who are typing ".onion" addresses into non-Tor-capable
browsers in the (presumably first-time) expectation that it will work,
and using resolver libraries which don't honour the imprecation that:

    [draft-appelbaum-dnsop-onion-tld-01]
    Resolvers that implement theTor protocol MUST either respond to
    requests for .onion names by resolving them (see [tor-rendezvous]
    [ED: A TOR-INTERNAL THING]) or by responding with NXDOMAIN.

...on a network infrastructure which is thoroughly pwned by a capable
bad actor.  Not totally impossible, I'll grant you, but threat models
which start from the assumption of a wholly ignorant userbase are
(joking aside) pretty flawed.

Continuing...

[DELETIA]


 >Since there is no central authority necessary or possible for
 >assigning .onion names, and those names correspond to cryptographic
 >keys, users need to be aware that they do not belong to regular DNS,
 >but are still global in their scope."
 >
 >OnionTLD contradicts this: "Users: human users are expected to
 >recognize .onion names as having different security properties, and
 >also being only available through software that is aware of onion
 >addresses."

Please explain the contradiction, I fail to see it?

[DELETIA]


 >This is the main conflicting point: OnionTLD does not recognize
 >.onion as special and allows Authoritative DNS servers to respond
 >for .onion ("SHOULD").  From the P2PNames perspective, this is
 >unacceptable, and a complete failure to address the privacy concerns
 >set forth by the draft.  If OnionTLD would be accepted in that form,
 >it would allow the root servers to capture leaked onion requests AND
 >RESPOND POSITIVELY FOR THEM !  *

There are entire papers about that.  Thank you for raising that point,
I wanted an excuse to post this URL to the DNSOP list:

    https://petsymposium.org/2014/papers/Thomas.pdf

    Measuring the Leakage of Onion at the Root - A measurement of
    Tor’s .onion pseudo-top-level domain in the global domain name
    system

...to help drive home the need for making ".onion" special.


As before, ignoring the potential for privacy-leakage of which site
you are seeking to connect to, this notion of "ZOMG THEY COULD HIJACK
THE SITE!!!!" is not a problem if you're using Tor-enabled software
and have awareness of the issue, per the draft security
considerations.


[DELETIA - I WANT TO GO TO BED I HAVE A VERY LONG DAY TOMORROW]


Your conclusions mostly seem to be a matter of what you want the RFC
to look like; that's a matter upon which I shall punt.

You also use the word "competitive" which (at the risk of overcooking
my interpretation) is a feeling that I have not felt during the
development of this draft.

I do want to address that, though.

There is no politics being played here.  This is not a race between
RFC drafts, this is a matter of considering a small, neat document
that delineates how to address one small, and fairly clear, "Special
Name" problem, seeking to address it properly in the time allotted
before November 1st swings by and Ballot-144 kills ".onion", possibly
forever.

I was brought in to help with a largely pre-written draft which -
as-above - I've merely helped edit a bit.  Come to that, Mark
Nottingham has played possibly an equal role in keeping us on the path
and helping wordsmith things up to IETF standards, though he seems to
not want direct credit.

I can't address your larger feelings about the two drafts and the time
that you committed to one of them, but having been invited to become
involved with _this_ one, and having edited it a little bit, and
having pushed it into the queue, I am proud to say that I have been
involved.

And - speaking as the engineering lead for one of the newest and
arguably most notorious ".onion" addresses - I feel that it's a pretty
good document, and one that is fit for purpose.

  - alec

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to