Hi Geoff,

On 5 Feb 2025, at 13:16, Geoff Huston <g...@apnic.net> wrote:

> Obviously, the text in the draft in section 5.1 differs here from your 
> assertion about "nothing special" in a number of points, but It would be 
> kinda pointless here for me to cut and paste, as its already in the draft. 
> The draft also helpfully notes how this case is aligned to similar previous 
> cases (RFC6762, and  sec 6.5 RFC6761).

I was paraphrasing in the hope that you would explain which of my 
interpretations you disagreed with. So thank you for the following:

> I found the text in the draft that describes the user expectation regarding 
> non-uniqueness of these names, the particular caveat about applications' use 
> of cookies, the advice that server operators should configure that auth DNS 
> servers to act as authoritative for these domains if they are using such 
> domains, and the strictures placed on DNS registries/registrars to be 
> substantive in terms of requirements for special handling, and based on 
> previous cases used for listing in RFC6761 it forms an adequate case that 
> meets the criteria as described in RFC6761. But even this paraphrasing falls 
> perhaps too close to merely cutting and pasting from the draft so I'll stop 
> here.

RFC 6761's first question in full is:

       Are human users expected to recognize these names as special and
       use them differently?  In what way?

RFC 6762's answer to this question for .LOCAL is:

       Users may use these names as they would other DNS names,
       entering them anywhere that they would otherwise enter a
       conventional DNS name, or a dotted decimal IPv4 address, or a
       literal IPv6 address.

In other words, for .LOCAL the answer is no, there is nothing special about how 
users use those names.

RFC 6762 also goes on to describe the impact of these names not being unique, 
and ways in which users might think differently about .LOCAL names before 
deciding to use them, but the manner in which they are used (if the user 
chooses to use them) is not described above as being special.

In draft-davies-internal-tld-02 the text in response to the same question only 
focuses on that second topic, and to my eye the question that is asked in 6761 
is not actually answered at all:

       Users SHOULD understand that .internal names are not expected
       to be globally unique, and may resolve to different addresses
       and services on different networks. Since there is no central
       authority responsible for assigning .internal names, users
       SHOULD be aware of this and SHOULD exercise appropriate
       caution.  In an untrusted or unfamiliar network environment,
       users SHOULD be aware that using a name like "www.internal"
       may not actually connect them to the web site they expected,
       and could easily connect them to a different web page, or even
       a fake or spoof of their intended web site, designed to trick
       them into revealing confidential information.  As always with
       networking, end-to-end cryptographic security can be a useful
       tool.  For example, when connecting with ssh, the ssh host key
       verification process will inform the user if it detects that
       the identity of the entity they are communicating with has
       changed since the last time they connected to that name.

(To be clear, this seems like good advice and it is surely great that the same 
risk is described in the Security Considerations section.)

I think the for .INTERNAL the answer to RFC 6761's question is indeed no, just 
as it is in RFC 6762. That's what I was attempting to say in my previous list 
of paraphrased answers.

You mentioned a couple of other things that had caused you to consider INTERNAL 
to be special; here are some notes about those, again just in the interests of 
showing my working:

 - The criteria for whether a domain name is special does not include 
considerations of non-uniqueness or adjacent issues in other protocols like 
care around the use of HTTP cookies.

 - The advice that you should configure an authoritative DNS server to be 
authoritative for a zone if you want the server to produce authoritative 
responses for it (which you also mentioned) is surely true for every zone in 
every domain. That doesn't make INTERNAL sound special.

 - The advice that registries and registrars should not allow domain 
registrations for TLDs that don't exist similarly sounds completely normal (and 
in any case it's not clear what standing the IETF has to tell a registry or 
registrar what to do).

Whether or not .INTERNAL gets inserted into the special use names registry is 
hardly the biggest question we need to concern ourselves about in this working 
group, or in life. :-) However, I'm mildly concerned that if INTERNAL winds up 
in that registry, at least some operators and implementers will decide that it 
needs some kind of special handling. I think that would be actively harmful, 
since it would add complexity where none is needed, and unnecessarily 
complexity always seems like it is worth avoiding.


Joe
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to