Re: [DNSOP] what's in .alt, was Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread David Cake
It seems to me to be a situation similar to that with MIME types - there is value in having a well understood part of the namespace for unregistered experimentation on an FCFS basis. David > On 19 Jul 2015, at 3:08 am, John R Levine wrote: > >> the ietf's stated purpose is to ensure interoper

Re: [DNSOP] Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread David Cake
As someone with moderate experience in both DNS and web server configuration, FWIW I found the meaning relatively obvious. The notion that HTTP Host headers might be used to change web server response independent of name resolution (e.g. that two names that return identical responses to every po

Re: [DNSOP] Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread David Cake
> On 17 Jul 2015, at 10:52 pm, hellekin wrote: > > On 07/17/2015 11:32 AM, David Conrad wrote: >> >> No. .LOCAL was not already in the root zone. .FOO is. >> > *** Therefore the .FOO label is not available for Special-Use anymore, > end of story. A Special-Use name cannot be an already registe

Re: [DNSOP] Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread David Cake
There are plausible, if unlikely, circumstances in which a fork, not just of the Tor project software itself, but of the entire project including the specific URL, might happen. While this argument is an attempt at a reductio ab absurdum, I do not think it is - the circumstance described is unli

Re: [DNSOP] Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread David Cake
> On 16 Jul 2015, at 3:35 am, Francisco Obispo wrote: > > +1. > > I don’t think IETF should be chasing around widely used TLDs and trying to > block them, it will be a never ending chase. > > We are trying to mitigate against unknowns and perhaps the best solution is > to have the TOR folks

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-19 Thread Mark Andrews
In message <001201d0c288$317fe330$947fa990$@rozanak.com>, "Hosnieh Rafiee" writes: > > > When the clients are not seen, I just wonder how the attacker can > > > target them?? > > > > Clients talks to things other than DNS servers. The attacker gets the > address of > > the address of the client

Re: [DNSOP] Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread David Cake
> On 15 Jul 2015, at 8:42 pm, Edward Lewis wrote: > 4. Caching DNS Servers and > 5. Authoritative DNS Servers > > I really believe that for DNS elements, there should be no change. By > intent, the onion names are not to be presented to the DNS by what's in > category 2 and 3 (Applications and

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-19 Thread Hosnieh Rafiee
> > When the clients are not seen, I just wonder how the attacker can > > target them?? > > Clients talks to things other than DNS servers. The attacker gets the address of > the address of the client from those transactions. This is not highlighted in the draft which makes it confusing for the

Re: [DNSOP] Request for Comments on Internet Draft about IoT DNS Name Autoconf

2015-07-19 Thread Mr. Jaehoon Paul Jeong
Manning, I will add this thread to DNSOP WG and 6lo WG. This is because a good target application area of my draft is 6lo environment. Today I discussed my draft with Samita, who is a co-chair of 6lo WG. She recommended to me that I can announce my draft to 6lo WG. DNSOP WG and 6lo WG, if you have

Re: [DNSOP] what's in .alt, was Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread Paul Vixie
David Conrad wrote: > ... > > With an exclusive registry: > > Them: "Hey IANA, we're using .PAUL and here's the docs describing who we are > and how." > IANA: "Um, sorry. Someone else is already using that label." > Them: "But we really like .PAUL and we have deployed a zillion instances that >

Re: [DNSOP] [Gen-art] review: draft-ietf-dnsop-onion-tld-00

2015-07-19 Thread Tom Ritter
On 18 July 2015 at 04:25, Joel M. Halpern wrote: > Major issues: It seems to this reviewer that at least the definition of how > to use these names, reference tor-rendezvous, needs to be a normative > reference. It appears likely that tor-address also ought to be a normative > reference. > > Mino

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-19 Thread Mark Andrews
In message <01d0c225$8c4d0260$a4e70720$@rozanak.com>, "Hosnieh Rafiee" writes: > > > So, you want such mechanism is implemented in NAT devices to protect > > > all clients in that network, right? If not, the implementation of that > > > in a single client behind the NAT, doesn't help all the

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-19 Thread Hosnieh Rafiee
> > So, you want such mechanism is implemented in NAT devices to protect > > all clients in that network, right? If not, the implementation of that > > in a single client behind the NAT, doesn't help all the clients inside > > that NAT network because the target is a public address of this device >

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-19 Thread Mark Andrews
In message <001501d0c1ec$52898050$f79c80f0$@rozanak.com>, "Hosnieh Rafiee" writes: > Mark, > > Thanks for your explanation. My comments are inline... > > > -Original Message- > > From: DNSOP [mailto:dnsop-boun...@ietf.org] On Behalf Of Mark Andrews > > > > > If the victim node is behi

Re: [DNSOP] Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread Florian Weimer
* Stephane Bortzmeyer: > On Wed, Jul 15, 2015 at 02:22:58PM -0700, > Francisco Obispo wrote > a message of 48 lines which said: > >> Well, even worse, what happens if decides >> to create a new dns-like protocol that uses .foo, does that mean >> that we should automatically block it? > > No n

Re: [DNSOP] what's in .alt, was Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread David Conrad
Paul, On Jul 19, 2015, at 6:01 AM, Paul Vixie wrote: > there are no hoops here. > people will register if they want to, and people will > check the registry if they want to. For the people who want to register, an exclusive registry explicitly creates a discussion for everyone but the first reg

Re: [DNSOP] what's in .alt, was Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread Patrik Fältström
On 19 Jul 2015, at 10:02, Steve Crocker wrote: > When I was chair of ICANN’s Security and Stability Advisory Committee (SSAC) > we noted that .belkin was one of the undelegated names that shows up quite > frequently at the root. If .belkin were delegated in the root, it would > instantly chang

Re: [DNSOP] Fwd: New Version Notification for draft-wkumari-dnsop-multiple-responses-01.txt

2015-07-19 Thread Tim WIcinski
On 7/19/15 10:47 AM, Stephane Bortzmeyer wrote: On Mon, Jul 06, 2015 at 03:48:13PM -0400, Warren Kumari wrote a message of 68 lines which said: A number of people approached me at DNS-OARC and the RIPE DNS track in Amsterdam asking what became of this draft, and could we please update it

Re: [DNSOP] Fwd: New Version Notification for draft-wkumari-dnsop-multiple-responses-01.txt

2015-07-19 Thread Stephane Bortzmeyer
On Mon, Jul 06, 2015 at 03:48:13PM -0400, Warren Kumari wrote a message of 68 lines which said: > A number of people approached me at DNS-OARC and the RIPE DNS track > in Amsterdam asking what became of this draft, and could we please > update it. It's not on the agenda on monday, isn't it?

Re: [DNSOP] what's in .alt, was Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread Paul Vixie
John R Levine wrote: > But here's the two options: > > A) registry says "ONION.ALT exists, see http://someplace and/or > http://someplace_else";, you say hm, two different packages, I better > look at both of them to see which one is installed on my computer. > > B) registry says "ONION.ALT exist

Re: [DNSOP] what's in .alt, was Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread Steve Crocker
Hugo, et al, I think the experience is exactly the opposite, i.e. these names will *always* show up in the DNS. As a consequence, I would argue that names being used for any of these purposes should not be delegated into the DNS root unless it’s for the same purpose. Thus, if the village of E

Re: [DNSOP] what's in .alt, was Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread Steve Crocker
Hugo, et al, I think the experience is exactly the opposite, i.e. these names will *always* show up in the DNS. As a consequence, I would argue that names being used for any of these purposes should not be delegated into the DNS root unless it’s for the same purpose. Thus, if the village of E

Re: [DNSOP] what's in .alt, was Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread Christian Grothoff
On 07/19/2015 05:27 AM, John R Levine wrote: >>> >> >> By this logic, using a FCFS 'registry' model implies at least enough >> information (if not a requirement) for some of tracking the registrant >> to confirm continued use, transfer, release or abandonment at the very >> least, no? > > To the e

Re: [DNSOP] what's in .alt, was Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread Andrew Sullivan
On Sat, Jul 18, 2015 at 11:27:21PM -0400, John R Levine wrote: > But once again, if we start inventing hoops for people to jump through, they > won't. That's counterproductive since we have no control over what they're > doing, so we'd like them to voluntarily tell us. Yes. The point of the alt s

Re: [DNSOP] what's in .alt, was Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread Hugo Maxwell Connery
Hi, My reflections on this interesting discussion: Software using names under *.alt (or whatever it will be) do not use DNS, by definition. Thus, there can never be a DNS name collision. It will be up to the alternate name resolution software, and its users, to deal with the name collision pr