On Mon, May 11, 2015 at 7:21 PM, Alec Muffett <al...@fb.com> wrote: > Hi Hellekin! > > >Since Alec Muffett seems to have better things to do > > I'm sorry if you've been waiting for my input - I am not the primary > author of the document; Jacob Appelbaum's name is in the document's > title for a good reason, and my involvement has been one of tuning a > few paragraphs, providing some wordsmithing, and cheerleading loudly. > > Jake is - as I am sure you are aware - working for Tor, and is a busy > guy (last I heard was off in China doing something amazing) hence I > mailed out the latest draft when there was in extended (and ongoing) > lull in the desire for anyone on our editorial maillist to tweak it. > > I'll do my best to respond to your points, albeit Jake and other > (wiser?) heads may have additional insights that I may miss by dint of > this being dropped on me at 10pm the night before the big phone call > to discuss such matters. > > On that basis, you'll also please forgive me excising brevity. > > > > 1. the users considerations pretend that users must use onion-aware > >software in order to access Onionspace, but I assert that you and I > >can use an ordinary Web browser, type in a .onion address, and > >access the requested service. > > > If you are consciously running TAILS, I suppose so [ED: TAILS is a > Linux distribution which funnels almost all communication through Tor] > albeit that Tor would likely recommend against using a vanilla browser > in default configuration to access any part of Tor, let alone ".onion" > addresses, because risk of deanonymisation is too high with normal > browsers. Hence the imprecations in favour of informed users, > reflecting Tor user-policy. > > If you are not talking about running TAILS (or similar) then I must be > misapprehending what you mean by "can use an ordinary Web browser, > type in a .onion address, and access the requested service" because > your average browser - say Chrome - cannot access ".onion" without Tor > software help and some fiddly configuration. > > > > 2. more importantly, where P2PNames imposes NXDOMAIN response to > >authoritative name servers, OnionTLD makes it a soft requirement, > >thus leaving the possibility for name servers to hijack Onionspace > >without user consent nor awareness. > > > Yeah, we tossed that one back and forth a bit, and eventually if > slightly grudgingly went with the "SHOULD" on the basis that we wanted > the draft to be adopted more than we wanted to be thinking wishfully. > > > > 3. this error is confirmed for DNS server operators, where OnionTLD > >makes it a soft requirement not to override responses. > > > This might be an issue so long as your threat model includes blindly > unaware users who are typing ".onion" addresses into non-Tor-capable > browsers in the (presumably first-time) expectation that it will work, > and using resolver libraries which don't honour the imprecation that: > > [draft-appelbaum-dnsop-onion-tld-01] > Resolvers that implement theTor protocol MUST either respond to > requests for .onion names by resolving them (see [tor-rendezvous] > [ED: A TOR-INTERNAL THING]) or by responding with NXDOMAIN. > > ...on a network infrastructure which is thoroughly pwned by a capable > bad actor. Not totally impossible, I'll grant you, but threat models > which start from the assumption of a wholly ignorant userbase are > (joking aside) pretty flawed. > > Continuing... > > [DELETIA] > > > >Since there is no central authority necessary or possible for > >assigning .onion names, and those names correspond to cryptographic > >keys, users need to be aware that they do not belong to regular DNS, > >but are still global in their scope." > > > >OnionTLD contradicts this: "Users: human users are expected to > >recognize .onion names as having different security properties, and > >also being only available through software that is aware of onion > >addresses." > > Please explain the contradiction, I fail to see it? > > [DELETIA] > > > >This is the main conflicting point: OnionTLD does not recognize > >.onion as special and allows Authoritative DNS servers to respond > >for .onion ("SHOULD"). From the P2PNames perspective, this is > >unacceptable, and a complete failure to address the privacy concerns > >set forth by the draft. If OnionTLD would be accepted in that form, > >it would allow the root servers to capture leaked onion requests AND > >RESPOND POSITIVELY FOR THEM ! * > > There are entire papers about that. Thank you for raising that point, > I wanted an excuse to post this URL to the DNSOP list: > > https://petsymposium.org/2014/papers/Thomas.pdf > > Measuring the Leakage of Onion at the Root - A measurement of > Tor’s .onion pseudo-top-level domain in the global domain name > system > > ...to help drive home the need for making ".onion" special. >
To save some time, the headline number is: The rate of .onion requests hitting the A and J roots is ~200k requests per day and growing. --Richard > > > As before, ignoring the potential for privacy-leakage of which site > you are seeking to connect to, this notion of "ZOMG THEY COULD HIJACK > THE SITE!!!!" is not a problem if you're using Tor-enabled software > and have awareness of the issue, per the draft security > considerations. > > > [DELETIA - I WANT TO GO TO BED I HAVE A VERY LONG DAY TOMORROW] > > > Your conclusions mostly seem to be a matter of what you want the RFC > to look like; that's a matter upon which I shall punt. > > You also use the word "competitive" which (at the risk of overcooking > my interpretation) is a feeling that I have not felt during the > development of this draft. > > I do want to address that, though. > > There is no politics being played here. This is not a race between > RFC drafts, this is a matter of considering a small, neat document > that delineates how to address one small, and fairly clear, "Special > Name" problem, seeking to address it properly in the time allotted > before November 1st swings by and Ballot-144 kills ".onion", possibly > forever. > > I was brought in to help with a largely pre-written draft which - > as-above - I've merely helped edit a bit. Come to that, Mark > Nottingham has played possibly an equal role in keeping us on the path > and helping wordsmith things up to IETF standards, though he seems to > not want direct credit. > > I can't address your larger feelings about the two drafts and the time > that you committed to one of them, but having been invited to become > involved with _this_ one, and having edited it a little bit, and > having pushed it into the queue, I am proud to say that I have been > involved. > > And - speaking as the engineering lead for one of the newest and > arguably most notorious ".onion" addresses - I feel that it's a pretty > good document, and one that is fit for purpose. > > - alec > > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop > >
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop