On 6/29/15, 13:43, "DNSOP on behalf of Andrew Sullivan" <[email protected] on behalf of [email protected]> wrote:
>In my view, the namespace is the logical space of all possible domain >names. That certainly narrows the discussion for me. >In those registries are two kinds of registrations: ones >that are there to enable further delegation (a "positive >registration", to give this a name), and ones that are there to >_prevent_ further delegation (a "negative registration"). In the sense that the DNS name space is bounded - there's only a finite set of names it can contain - there exists a complete roster of all names. You can then divide the list into names that have a responsible party and those that don't - and call that (positively registered) and not (or negatively) registered. I separate registration from delegation. Registration means I have entered the domain name in database (or register as a noun) with some characteristics. The characteristics include contact information (e.g., technical, abuse) and/or whether the name is available for some operations (etc., delegation, re-registration). Delegation refers to the "DNS as per STD 13" action of entering NS records and giving total control of the names below the name in the DNS namespace tree to an (possibly different) authority. Not all names in the register get to be delegated because of rules like reserved names, IDN variants, rules rooted in the policy of the registration activity. >Yes, but as I understand it the rule is that such names are also part >of the domain name space. (There could be a future time where some >names beneath onion. are actually longer than the DNS would permit, >and I don't know whether to call such things "domain names" or not; >but it's fortunately not a problem for us today so I'm going to ignore >it.) I'm not aware of "the rule" that declares Onion names as part of the domain name space. Not an argument, just a data point. I've always heard, and have been running on this, that Onion names are not part of the DNS name space. If Onion's namespace permits names that cannot be part of the finite roster of DNS name space, then I derail seeing how Onion names are domain names. With that, any sort of logic to meld the two name spaces falls apart. This isn't a criticism of either name space. >I claim that, because of the function of onion., a registration of it >in the special names registry effectively takes it out of the DNS name >space (while maintaining it in the domain name space). For that >reason, onion. MUST NOT be registered in the DNS root; but that's >because its name is excluded from the DNS namespace and not because of >something special it does with respect to DNS. This is different from >(say) ietf., which _is_ in the DNS name space (it's registered there, >though negatively). Let me go backwards. I asked the WhoIs server of IANA and it does not know of "IETF." "IETF." is in the finite roster of domain names, it is not delegated (owns no NS records) and is not present in a register as far as I can tell. Perhaps it is in a register as a name assigned to some entity and is not eligible for delegation, but I can't find the register (easily). And to throw this in the mix, the name is non-existent within the DNS protocol (RFC 4592) because it owns no resource records sets and has no descendants - yet it is a member of the finite roster of possible names. I think/assume/believe that Onion is name that has been deployed through out the network in such a way as to set up a potential conflict with the use of "onion." as a domain name. I say "think" because I am going on the list discussion, I have no hard evidence of it - only because I am a curmudgeon when it comes to technology. Given the apparent deployment of the name, it is probably wise that it not be delegated in the public DNS, i.e., the system that is in use where Tor also operates. (I.e., not in the protocol, but in operations.) The special-use domain names registry is apparently the right place to register the name. But to me that is an incomplete process. Who or what is the entity that is assigned/owns the name? (Okay, the registry identifies an RFC that ought to have that information.) Once registered in that way, should the name be delegated? What I hear is no. Is being an entry in the special-use domain names a barrier to delegation? I assume so. Is being an entry a barrier to being used in the DNS? This is not clear - I can ssh to a .local machine. >Does this make the distinction I'm trying for any clearer? Perhaps. (Despite the mangling of the question...;)...I've got a pretty clear distinction in my head how this works, I don't know whether we are converging though. >The first is a case where, if you match that label, you get a >signal that you are walking out of the >DNS name space and into some other protocol. My analogy is human spoken languages. I was once in Holland and approached by a waiter. I thought the waiter addressed me in German (which would be odd), so I responded in German. I then discovered it was German-influenced Dutch he was speaking. Just because something sounds like German doesn't mean it is, it might be Dutch. Just because something looks like a domain name doesn't mean it is, it might be an Tor identifier. Outside of trying one and failing, falling back to some other, I don't see a way to meld the two spaces. >The second case is where a name _is_ part of the DNS, but is >not registered in some special way. For that, and because you mentioned the special word "registered", there are registry database inspection protocols (WhoIs, IRIS, RDAP) that, at least by design, handle that distinction. Granted, IRIS went no where and RDAP is still wearing diapers, but I'm talking intent here. >Doesn't the existing registry (which gives a link to the defining >document) do that? Not programatically. Code can't read RFC. ;) I imagine I am a thread in java. I can use those cool RESTful interfaces and JSON notation to guide my way through code paths and libraries to decide how to transmit some information to an identifier. Obviously, an English parser isn't what I want to carry around. >I am claiming that there is a logical distinction here that can help >us make evaluations. For instance, one could argue that we ought to >distinguish between (say) corp. and onion.: the latter functions as a >protocol switch, and needs to be out of the DNS namespace. The former >is in fact in active use in DNS names all over the place, and that's >what makes it dangerous. It is not obvious that the evaluation >criteria in each case ought to be the same. Significantly, for >protocol-switch questions there is little in the way of positive >empirical evidence that ought to count. (Though if someone came along >and asked for a special-use registration of something already >registered in the DNS namespace, either positively or negatively, we >might want to ask different questions.) Alain Durrand and I talked about this a few weeks back. He made the point that you can distinguish the namespace of an identifier "on the right" or "on the left" imaging the use of names in URLs. I.e., there could be a "http-tor://tor-name.onion/path" and use http-onion to tag this as a Tor identifier or "http://tor-name.onion/path" and assume it's Tor because of the onion where I'd expect(*) a domain name to be. * - It is important to say that I only expect a domain name to be there - I never was able to find out whether the http method/schema/etc/I-forget-the-word expects the first part of the path name to be a domain name or not. Logically, yes, there is a distinction between Tor's name space and the DNS name space. I'm not sure though that the distinction is detectable in how we render in words or bits the identifiers. The special-use domain name registry is an attempt to do that but, in my opinion, it isn't a complete solution as it doesn't help code (for one). (And I do have non-specific concerns over the admission criteria to the registry, i.e., the corp/onion divide you mention.)
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ DNSOP mailing list [email protected] https://www.ietf.org/mailman/listinfo/dnsop
