On Mon, Jun 15, 2020 at 3:00 PM Tony Finch <d...@dotat.at> wrote:

> Paul Vixie <p...@redbarn.org> wrote:
> > On Monday, 15 June 2020 17:58:42 UTC Tim Wicinski wrote:
> > >
> > > or since domains are cheap, why not buy a new domain, and use that for
> the
> > > namespace?
> >
> > that makes internet viral, and private communications require global
> > allocations for no necessary reason. the above quite describes
> centralization
> > for the sake of centralization. nothing should be centralized unless
> there's
> > no other way to do what needs doing.
> >
> > reserving a corner of the namespace for decentralized operations makes
> sense.
>
> There are perhaps three contexts that you might want a private namespace:
>
> * enterprisey setups
>
> * home setups
>

No. Just No.

At most, home setups may not want dedicated registered domains (that they
pay money for directly to a registrar and indirectly to a registry).
However, they absolutely need to have functioning global DNS ability,
regardless of the parent domain(s) they might use.

As long as they are able to have a workable FQDN, regardless of whether it
is ephemeral or a stable name, that is the minimum requirement.

As your argument below points out, any decentralized thing can't be used
for this (regardless of whether it's anchored in 2-letter ISO space or
underneath some arpa child).


>
> * splendid isolation
>
> For both the enterprise and home case, you're probably going to want to do
> things beyond the DNS that are much easier if you're part of a global
> namespace - TLS certs are probably the main one. For the enterprise case,
> getting a suitable domain is normal. For the home case, it would make
> sense for manufacturers of home gateways / access points to allocate a
> per-customer subdomain. Then you can have IPv6 prefix delegation and
> managed access to your devices at home without everything being proxied
> via some cloud server. (I can dream?)
>

The enterprise case is not a single case, and is the exception that proves
the point.
As much as it may require more technically savvy operations, if there is a
need for both an internet-reachable
and a non-internet-reachable subsection of their infrastructure, having
different name spaces with different properties
is the answer that best fits their needs.

Internal-only use is not only satisfied with non-delegated name spaces, it
actually is a much better fit for everything.
Both DNSSEC and PKIX (or more likely, DANE/TLSA for X.509 certs) are better
fits for the internal-only case.
The goal for internal only, is to ensure it CANNOT work over the internet,
not just that it isn't guaranteed to work over the internet.
You WANT resolution to fail. You WANT certificate validation to fail. You
WANT DNSSEC validation to fail.
Anchoring all of these things in a non-global namespace (which is still
sufficiently well-defined to be highly collision resistant) is the ideal
choice.

This has NOTHING to do with the parts of an enterprisey setup for the parts
that are meant to be internet-reachable.

Trying to force the two things together for some perceived benefit is
unwise in the extreme.
As Randy Bush often says, to paraphrase, I encourage my competitors to do
this.
Except I'm not Randy, and I wouldn't encourage ANYONE to do this. That's
just mean.


>
> For splendid isolation, you're already committing to setting up your own
> CA and distributing keys, so you can probably set up your own fake root
> zone and whatever else. I don't think it's something that should be
> encouraged as a standard thing to do, though. How could it be made to work
> usefully for non-technical home users?
>

You don't want home users doing this, ever.
Even the most extreme cases in homenet WG still envision having their stuff
linked below the DNS equivalent of a prefix delegation, optionally.

If there is any ambiguity in the draft to the effect that anyone other than
the non-internet-reachable enterprisey or the splendid isolation use cases,
let's make the document better to that effect.

Respectfully,
Brian
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to