Hi there, On Mon, May 11, 2015 at 06:15:47PM -0300, hellekin wrote:
> draft-appelbaum-dnsop-onion-tld-01 came as way to fast-track the > processing of .onion special-use TLD, as the P2PNames draft was > considered too controversial (and maybe too complicated?). As one of the people who has objected to the p2pnames draft, I would say that appelbaum-dnsop-onion is an attempt to break out one of the candidate special names from the others, so that all the applications don't share fate. > A simple comparison of the IANA Considerations for the P2PNames and the > OnionTLD drafts highlights critical flaws in the OnionTLD draft that > curiously didn't receive any attention at all so far (except my own, but > I reserved my comments up until now for others to come up with this, in > vain.) Well, they're different drafts, and therefore it's not completely surprising that they don't agree. I suspect part of the issue here is that appelbaum-dnsop-onion has been adjusted because of some comments some of us made. > 1. the users considerations pretend that users must use onion-aware > software in order to access Onionspace, but I assert that you and I can > use an ordinary Web browser, type in a .onion address, and access the > requested service. Not only OnionTLD conflicts with P2PNames on that > point, it also confuses users' awareness and application software > responsibility (and possibly the scope of IANA Considerations' first > question). I've asked about this issue several times, and I keep getting different answers. What isn't clear to me is whether there is somewhere in the user's stack -- maybe it's the resolver, maybe it's the application, whatever -- that knows that onion is special and therefore shouldn't be looked up in the public DNS. I assume there has to be _somewhere_ that is special, or the alternative resolution obviously wouldn't work. I think that needs to be indicated somewhere, because this fact is what makes onion a candidate under 6761, I think. > 2. more importantly, where P2PNames imposes NXDOMAIN response to > authoritative name servers, OnionTLD makes it a soft requirement, thus > leaving the possibility for name servers to hijack Onionspace without > user consent nor awareness. Yes. That is in fact a possibility. There is no way for a protocol document to make it impossible for someone to redirect this name, and if your queries for onion leak into the public DNS you have to be prepared for the possibility that someone will provide a local answer. It's a plain fact of working on the Internet, and trying to legislate this in a protocol document provides inoperative assurances. In fact, the way that onion was deployed without a registration with the policy authority over the root zone rather nicely illustrates this fact about the DNS: the global DNS only works because everyone uses the same root. If people start fraying that use, then the DNS itself is in trouble. > 3. this error is confirmed for DNS server operators, where OnionTLD > makes it a soft requirement not to override responses. But again, you simply can't legislate that. People do this all the time. Indeed, some people pay for services in which the answers from their resolvers are munged to prevent access to "bad" sites and so on. You could make this sort of fiddling with the data possible to detect using something like DNSSEC, but you can't make it impossible to do. > That the P2PNames draft remains controversial should not remove from its > qualities, and notably its technical fitness and attention to detail. Issues 2 and 3 were problems with the p2pnames draft when it first surfaced, and I believe I included them in the comments I sent on it in the first place. If I didn't I apologise. > The OnionTLD interpretation is wrong. I want for proof that I can > browse Onionspace with an ordinary Web browser that does not treat > .onion sites any differently from a .org or a .net. Well, surely _this_ isn't what you want, because if that were the case then the onion TLD would fail to resolve at all, since it isn't delegated. > OnionTLD contradicts this: "Users: human users are expected to recognize > .onion names as having different security properties, and also being > only available through software that is aware of onion addresses." But the point is, you need to know whether you have an onion-aware resolution path available, or else you will leak your queries to the public DNS. I think that's all it says. > OnionTLD says: "Application Software: Applications that implement the > Tor protocol MUST recognize .onion names as special by either accessing > them directly, or using a proxy (e.g., SOCKS [RFC1928]) to do so. > Applications that do not implement the Tor protocol SHOULD generate an > error upon the use of .onion, and SHOULD NOT perform a DNS lookup." What's the problem with this? Isn't this what you want, that the onion queries don't leak? > > * > In P2PNames, "immediate negative responses" is not specified yet (for > lack of discussion about it across domain names) as negative responses > might be different than NXDOMAIN in some case (e.g. for .gnu domains). > * Yes, that difference is precisely why some of us have claimed that p2pnames can't go ahead as written, because the considerations are not identical for every name. Asking for "negative responses" gets us back into the kind of imprecision that has vexed the DNS for years. What kind of negative response do you want for each case? > * > This is the main conflicting point: OnionTLD does not recognize .onion > as special and allows Authoritative DNS servers to respond for .onion > ("SHOULD"). "SHOULD" doesn't mean, "This would be a nice idea." It means, "You better do this, or have a pretty good reason why you don't." One possible local reason could be that a local authoritative server (or rather more likely, resolver) is overloading onion -- for instance, to catch queries that were going to the DNS that shouldn't be. It's certainly going to be necessary to have some authoritative servers respond to onion queries if we hope to sink that traffic AS112 style. And I presume that, as onion's popularity increases, we'll need to do that. > Until now the debate has been in opposition to a single P2PNames draft > covering more than one domain, and this argument mostly suspended actual > criticism of the contents of the draft itself. I seem to recall writing quite a long series of comments about p2pnames a long time ago. I didn't send additional comments when the document didn't get broken up, becuase I said in the first place that I thought it was a fatal flaw. > I'm looking forward to break this opportunistic behavior to play > politics and satisfy administrative formalities I think that's just an _ad hominem_ argument. There are good reasons for the changes in appelbaum-dnsop-onion as compared to p2pnames, as outlined above. Best regards, A -- Andrew Sullivan a...@anvilwalrusden.com _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop