On Mon, May 11, 2015 at 09:29:02PM -0300, hellekin wrote:
> >
> *** How can you fail to see that P2PNames says "Users can use these
> names as they would other domain names", while OnionTLD says they cannot
> ?
> 

I think people can see that, and they disagree with you.

If you put an onion name into an application and your system (somehow)
is onion-aware, it will behave differently than if it is
onion-unaware.  If you put a com name into an application, it Just
Works, because DNS resolvers are basically universal.  That's an
important difference.  (Note that I picked com on purpose.  Ask the
users of info domains how many problems they still have, 14 years
after that TLD was first delegated.)

> *** So you recognize that if your Tor setup is wrong, and you're not
> aware of this, then it could happen that a malicious entity could serve
> a copy of the original site, but resolved over the DNS.  This to me,
> sounds like the well-documented--not hypothetical--abuses of NXDOMAIN
> that were historically performed by Verisign, Comcast, and others.  Are
> you sure you still don't see any difference at all between MUST and SHOU
> LD?

Not every network is a public-access one.  For instance, there might
be a local policy at my employer that onion names are not to be
resolved.  I can certainly imagine them installing a resolver that
captured and redirected onion resolution attempts.  (That is not, of
course, a policy at _my_ employer, but I can imagine such a case
without trouble.)

Best regards,

A

-- 
Andrew Sullivan
a...@anvilwalrusden.com

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to