DNAME was considered early in the IDN evaluations, so it's not exactly unknown in the Icann community
On Fri, Feb 3, 2017 at 15:33 Steve Crocker <steve.croc...@gmail.com> wrote: > We (ICANN) have no mechanism or process for inserting a DNAME record into > the root. We do have a process for considering the general issue, but, so > far as I know, no one has yet brought that idea into the ICANN/PTI arena. > > > > Steve Crocker > [I am having trouble sending from st...@shinkuro.com, but I am receiving > mail without trouble. Please continue to send mail to me at > st...@shinkuro.com] > > > > > > > > On Feb 3, 2017, at 12:28 PM, Brian Dickson <brian.peter.dick...@gmail.com> > wrote: > > > > On Fri, Feb 3, 2017 at 12:21 PM, Steve Crocker <steve.croc...@gmail.com> > wrote: > > And just to stir the pot a bit, what would you have ICANN do if someone > applies for .alt as a top level domain? Is it ok if we say yes and > delegate the name? If not, what is the basis for us to say no? > > > The insertion of the DNAME record in the root, instantiates the ALT > domain. It says the ALT domain exists. > > However, the DNAME target of an empty zone, assures (with DNSSEC > signatures) that no names below ALT exist. > > So, a query to a root server for "alt." would get the DNAME (if the query > was for type DNAME or type ANY), or would get "NODATA" for any other RRTYPE. > > And a query to a root server for "anything.alt" would get the DNAME to > AS112.ARPA, and the subsequent query (rewritten as anything.as112.arpa) > would get NXD. > > As to the question about applying for "alt": it means no one can apply for > .alt as a TLD, because it is taken. That is the basis for saying "no". > > Brian > > > > > > > Steve Crocker > [I am having trouble sending from st...@shinkuro.com, but I am receiving > mail without trouble. Please continue to send mail to me at > st...@shinkuro.com] > > > > > > > > On Feb 3, 2017, at 12:18 PM, Brian Dickson <brian.peter.dick...@gmail.com> > wrote: > > The DNAME has an effect similar to delegation, except that in the case of > the AS112++ RFC ( https://tools.ietf.org/html/rfc7535 ) , the target is a > well-known & published empty zone (as112.arpa.) > > (Delegation and DNAME cannot coexist for the same owner name - that is one > of the edicts for DNAME, similar to CNAME.) > > Any local configuration of something.alt (as an authoritatively served > zone) would be matched before checking the cache or attempting recursive > resolution, per 103[345]. > > I don't have any desire or intention of local something.alt, I'm just > pointing out that the existence of a signed NXD result (via DNAME to an > empty zone) doesn't break such a set-up. > > > > The reason for DNAME instead of delegation, is that it avoids the > operators of AS112 instances from having to configure the new zone(s) > whenever a new "delegation" occurs. > > If, instead, a delegation were done, the specific zone (.alt) would need > to be configured and served somewhere. > > RFC7535 is designed to avoid the need for coordination in configuring such > zones. > > (RFC7535 also allows authorities for other places in the DNS tree to make > use of AS112, but that is a non-sequitur.) > > Brian > > On Fri, Feb 3, 2017 at 12:06 PM, Steve Crocker <steve.croc...@gmail.com> > wrote: > > Are you also expecting ALT will never be delegated in the root? If it > were to be delegated in the root, what impact would that have on the uses > you have in mind? > > Steve Crocker > [I am having trouble sending from st...@shinkuro.com, but I am receiving > mail without trouble. Please continue to send mail to me at > st...@shinkuro.com] > > > On Feb 3, 2017, at 12:02 PM, Brian Dickson <brian.peter.dick...@gmail.com> > wrote: > > Stephane wrote: > > On Wed, Feb 01, 2017 at 03:28:29PM -0500, > > Warren Kumari <warren at kumari.net> wrote > > a message of 103 lines which said: > > > > > or 2: request that the IANA insert an insecure delegation in the > > > root, pointing to a: AS112 or b: an empty zone on the root or c" > > > something similar. > > > > Here, people may be interested by draft-bortzmeyer-dname-root (expired > > but could be revived). The main objection was the privacy issue > > (sending user queries to the "random" operators of AS112.) > > > My opinion on these issues are as follows, roughly: > > - I am in favor of AS112 for ALT > - For AS112, I prefer the AS112++ method (DNAME) > - I do not see why the DNAME would/should not be DNSSEC signed > - Any local use of ALT can be served locally and signed using an > alternative trust anchor > - I don't think there is any issue with having both the NXD from the > root, and the local assertion of existence, both present (in cache and > in > authoritative data respectively) > - Maybe there are issues with specific implementations? > - If anyone knows of such problems, it would be helpful to identify > them along with the implementation and version > - For AS112 privacy, perhaps someone should write up a recommendation > to set up local AS112 instances, to provide privacy, as an informational > RFC? > - Even simply through resolver configurations, without a full AS112 > "announce routes"? > - Do any resolver packages offer such a simple AS112 set-up? > - Maybe the efforts for privacy should start there (implement > first, then document)? > - Do any stub resolver packages include host-local AS112 > features/configurations? > > Overall, I'm obviously in favor of use of ALT, and for signing whatever is > done for ALT, and for use of DNAME for ALT. > > Brian "DNAME" Dickson > > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop > > > > > > > > > > > > > > > > _______________________________________________ > > DNSOP mailing list > > DNSOP@ietf.org > > https://www.ietf.org/mailman/listinfo/dnsop > >
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop