1. the users considerations pretend that users must use onion-aware
software in order to access Onionspace, but I assert that you and I can
use an ordinary Web browser, type in a .onion address, and access the
requested service.  Not only OnionTLD conflicts with P2PNames on that
point, it also confuses users' awareness and application software
responsibility (and possibly the scope of IANA Considerations' first
question).

I've asked about this issue several times, and I keep getting
different answers.  What isn't clear to me is whether there is
somewhere in the user's stack -- maybe it's the resolver, maybe it's
the application, whatever -- that knows that onion is special and
therefore shouldn't be looked up in the public DNS.  I assume there
has to be _somewhere_ that is special, or the alternative resolution
obviously wouldn't work.  I think that needs to be indicated
somewhere, because this fact is what makes onion a candidate under
6761, I think.

To put this to bed for Andrew’s benefit, I have uploaded a picture at:

http://i.imgur.com/tvXrD8N.png

The top is standard Firefox (for clarity it has also a BBC News tab open)

The bottom is Tor Browser, which is Firefox hardwired to a Tor SOCKS daemon 
that performs resolution.

On the Tor-enabled browser, you have access to extra sites in the “.onion” TLD, 
as illustrated.

For clarity of my terminology, I “used" both browsers in the same way: pasted 
the URL “https://www.facebookcorewwwi.onion/“ into both, hit “return”, clicked 
the mouse, etc, the same way I would “use” most browsers.

They are the same core codebase - Firefox - after all.

One of them - the Tor Browser - is using a SOCKS daemon which knows that 
“.onion” is special and shouldn’t be looked up in the public DNS.

The other has received NXDOMAIN from DNS.

I believe that this demonstrates the condition you were looking for?

The Tor browser also has special modifications (e.g.: plugins elided, features 
tweaked) to attempt to inhibit traffic ever hitting the internet except via the 
Tor SOCKS daemon, although these are more for privacy and consistency than for 
access.

    - alec

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to