On Tue, 21 Mar 2017, Suzanne Woolf wrote: [also speaking as individual only]
I see no justification in draft-ietf-homenet-dot for a single-label name, except an implicit suggestion in Sec. 2 para. 2 that the specific string was chosen to be memorable in cases where homenet names are exposed to users.
That seems good enough for me. The problem of DNS being the only real name space for endusers is very well understood. And I still regularly have to refind my printer based on checking my dhcp server logs, something not available to regular endusers. The requirement is very real.
I *strongly* suggest that if this document is to be used as justification to create an entirely new process for updating the root zone, coordinated between the IETF and the external body that controls the root zone, the justification should be *much* more explicit.
This .home / .homenet issue has already been going on for a very long time. The longer we wait with resolving this issue, the worse the deployment situation will be of software mixing .home vs .homenet. Suggesting we postpone .homenet while figuring out a new IETF/ICANN process, something that can take years, would basically doom this rename and install .home as the defacto standard. Once this new process would be completed, it would lead to new breakage, and the new software would be forced to look into both domains, or if the install base is big enough for .home, would be better of ignoring a new .homenet altogether. As for requiring an insecure entry in the root, I'm still not convinced it buys us that much. Resolvers on the stub that bypass the local DHCP supplied DNS servers need to be modified anyway to use the local DNS servers to request .homenet entries, whether they support DNSSEC or not. So that leaves DNSSEC capable DNS resolvers that use the DHCP supplied servers as forwarder entries in need of such an unsigned entry only. I do think that such DNSSEC capable software tends to be maintained by the OS and could gain special handling of the .homenet domain. And if not, I seriously wonder if those enduser DNS stubs/servers implement RFC-5011 well enough to survive the upcoming KSK rollover. Or any other homenet protocol update in the future. So I would say an insecure delegation would be nice to have but not required. And if it would shave of a year of creating a new process between IETF, ICANN and the MoU, then I'd say for the deployment as a whole, it would be better to get the Special Use Domain ASAP without an entry in the root. Paul _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop