On 7/5/15, 7:26, "DNSOP on behalf of Steve Crocker"
<dnsop-boun...@ietf.org on behalf of st...@shinkuro.com> wrote:

>3. (ICANN) Two letter Latin characters that have not yet been assigned by
>the ISO 3166 maintenance agency but might be in the future.  Names in
>this subset may move to subset 7 to become active ccTLDs.  Examples:
>
>       xq

'pq' is a better example.  'xq' is classified as User Assigned, which
means it has been assigned for use by anyone for their own purposes.  'pq'
is (using Wikipedia's term) unassigned.

In recognition of this, though, I'd lump all of the alpha-2 codes
([A-Z][A-Z]) into category 3, and call it informally "being at the mercy
of the ISO 3166-1 Maintenance Agency."

>4. (IETF) Names the IETF has formally recognized as reserved for
>particular non-DNS uses.  Names in this subset are effectively permanent.
> (“Effectively permanent” means they are expected to remain in this
>subset forever and there is no defined process for changing the status of
>names in this subset.)  Examples:
>
>       example, local

(Left in for the discussion later in this message.)

>7. (ICANN) ccTLDs, both Latin and IDN.  Names in this subset are expected
>to last indefinitely.  If they are taken out of service they move to
>subset 8.  Examples:
>
>       jp, uk, na, xn--fzc2c9e2c

The quirk I have here is the IDN Fast Track
[https://www.icann.org/resources/pages/fast-track-2012-02-25-en] and
trying to anticipate what names will be in that.   The Latin ccTLD codes I
can anticipate from category 3 above.  But the IDN ccTLD names aren't
distinguishable from other IDN names without consulting the Fast Track and
even so, well I'll put this under - I don't understand if a name coming
through the Fast Track might also be on a generic TLD track.

As far as I know, if the Fask Track the only source of IDN ccTLD names?

>8. (ICANN) Previously used TLDs that have been taken out of service.
>Names in this subset must remain out of service for a very long time,
>currently estimated at 50 years, to avoid unintended consequences.
>Examples:
>
>       cs

Perhaps there's an 8-1/2: I've been told that the 11 IDN test TLDs which
have been rescinded (NS records removed) are eligible to be reinstated if
needed for further testing.  "I've been told" means that I have never seen
this in print and thus have no citation to give.

>ISSUES
>
>o Should there be some sort of operational penalty for leakage of names
>in subsets 2, 4, 5 and 8 into the public DNS, e.g. a slow response from
>DNS servers?

For the e.g., no.  If just because that delaying an answer opens the time
a cache can be poisoned.  Others have mentioned this.

But there's a wider issue suggested by this specific suggestion.  What
reaction should name servers have upon seeing a name in a certain category?

Take category 4 - example and local.

When running a tutorial/demo, I would expect to be able to use "example."
as my TLD in live use of general purpose DNS software.  In that case,
example. should mean nothing special to the DNS.  However, in the universe
of registration, that as a TLD (application) is to be rejected.  (But the
name can be used 'down low' in the tree.)

I don't expect the same for "local."  When running the same tutorial/demo,
I may want to use the functionality of "local." while running a name
server on ::1 - using "local." in my name server configuration will cause
some confusion.

Are these categories "felt" in the DNS protocol layer or the registration
service above it?  Or in the resolution service?

 - - -

In thinking about this, I have a number of past influences, mostly coming
from DNSSEC development.

One is seeing the impact of dealing with "expedient operational short
cuts" that resulted in long-lasting architectural issues.  Round robin was
one (which I feel I keep harping about) that required DNSSEC validation to
be able know how to reset the order of the records for the digital
signature operation and then revert.  Then there are other oddities, like
CNAME processing's many quirks.  From this I always ask - will the change
be expected to be seen in name server code paths?  Or will anything
derived here be a registry accessed by applications inserting and/or
retrieving data from the system?

Another is the drive towards future proof-ness.  How can any improvement
drive towards a data-driven solution rather than a something that needs
more code paths?  Is the change compatible with current code paths, even
past code paths?

And, how much of this is about domain names and how much is about TLDs?
Isn't this all about TLDs as where name spaces are rooted?  (Or
sub-rooted?)

BTW, I've been trying to read back in time, as far back as RFC 799
"Internet Name Domains" and RFC 805.  If there are earlier discussions,
I'd like to know.  Some of the pre-1034 RFCs are close to today's
understanding, but Mill's 799 seems to have been passed by.  The purpose
of this is to determine what the intent of domain names were (originally),
whether applications have appropriately stuck to that, whether the DNS of
STD 13 is a subset of domain names or a superset of domain names, and how
host names of RFC 1123 applies to all of this.

In some sense, all of the problems are the use of host names in other
forms.  And in trying to put the horse in front of the cart, all of this
seems to date back to email (pre-SMTP even) and how to address a mailbox
somewhere.  The usual data structures I think of are URI, X.509, and email
headers and they are hostnames.  But Tor's onion isn't, I think.  This
makes me think less about the DNS rules for domain names as the place to
root all of this.  But I'm not sure.

To sum up, as much as the categorization is interesting, I'm not sure it
sets up the equation properly - as far as eventual impact on code.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to