Hi Brian,

Thanks for the input. It seems new TLDs for deployment on other worlds is the general consensus on how to accomplish this. I will amend the draft to indicate this.

Thanks,
ScottJ

On Fri, 26 Jul 2024, Sipos, Brian J. wrote:

Scott,
Yes, new qualified names (identifiers) for new things will disambiguate from existing 
names. The important thing is to avoid a truly "split horizon" DNS situation 
where the same qualified name means different things in different contexts (the lack of 
specific records visible from a context is different than records with different meaning 
though). The DNS already provides a facility to have human-facing relative/unqualified 
names while the tools resolve to and manage qualified names, so there isn't a need for 
new terms or techniques here.

-----Original Message-----
From: Scott Johnson <[email protected]>
Sent: Thursday, July 25, 2024 12:24 PM
To: Sipos, Brian J. <[email protected]>
Cc: Marc Blanchet <[email protected]>; Lorenzo Breda
<[email protected]>; DTN WG <[email protected]>; dnsop <[email protected]>
Subject: Re: [DNSOP] Re: [EXT] [dtn] Re: An Interplanetary DNS Model

APL external email warning: Verify sender [email protected] before
clicking links or attachments

Hi Brain,

Are you in concurrance that using new, dedicated TLDs only for off world use
(and discrete to a single world) solves this issue?

Thanks,
ScottJ

On Thu, 25 Jul 2024, Sipos, Brian J. wrote:

All,
I'm replying to a non-specific message in this chain just to mention that, 
similar
to what Lorenzo brought up, any translation of identifiers (names or addresses)
will be fraught with problems related to security and should not be done. There
can be translation or mapping that happens in a way not visible to 
users/clients,
but whatever identifiers are visible to the user/client need to have stable
meaning across any network.

Naming authorities, such as PKIX CAs, need to rely on the fact that once a user
proves ownership of a specific identifier that same identifier will not be used 
by
other users (at least not simultaneously over a short time interval). Part of 
the
reason why public CAs such as Let's Encrypt will not issue certificates for IP
addresses is the prevalence of IP NATs, even though IP identifiers are allowed 
by
the CA/Browser TLS baseline [1].

[1]
https://cabforum.org/working-groups/server/baseline-requirements/docum
ents/CA-Browser-Forum-TLS-BR-2.0.5.pdf

-----Original Message-----
From: Scott Johnson <[email protected]>
Sent: Wednesday, July 24, 2024 4:44 PM
To: Marc Blanchet <[email protected]>
Cc: Lorenzo Breda <[email protected]>; DTN WG <[email protected]>; dnsop
<[email protected]>
Subject: [EXT] [dtn] Re: [DNSOP] An Interplanetary DNS Model

APL external email warning: Verify sender
[email protected] before clicking links or attachments

Hi Marc,

On Wed, 24 Jul 2024, Marc Blanchet wrote:



      Le 24 juill. 2024 à 11:42, Lorenzo Breda
      <[email protected]> a écrit :


Why are you against leaving the current TLDs implicitly on Earth by
default?


Right. One do not need a special TLD for space. We can use what we
have and it just works fine.

I do not disagree with this notion as respects my proposed architecture.
3rd level domains mapped to off-world domains works just fine, for
the low low price of annual domain renewal.  a tld representing each
remote world is preferable, however, because it is just "cooler;"
easier to use and more memorable than a much longer domain.  This,
however, assumes we are talking about the same proposal, which we are
not.

One has just to be careful on remote resolution so that it contains
what is needed: trust chain, local names, ...


Lets be clear here, Marc.  You are talking about a completely
different solution than I am; one predicated on IP only.  Your
comment on this thread, without context, only serves to confuse the other
participants.

For example, you are talking about using F-root, right?  That is a
very different thing than the functionality which I am describing,
with significantly more network resource usage requirements.  My
solution uses BP in some network segments.  Personally, I don't think
your method will ever fly, primarily due to security reasons, but I
don't troll your threads about it in a manner which would muddy the
waters of those considering your proposal.  I don't mind healthy
competition of ideas, but I do expect fair play.  If you wish to
contrast the two methods, thats fine, yet unproductive, IMHO.  Just make
sure the reader knows you are talking about your proposal, and not mine.

ScottJ



This is discussed in:
- running IP in deep space (noBP<->IP):
https://www.ietf.org/archive/id/draft-many-deepspace-ip-asse
ssment-01.txt
- running DNS in remote places:
https://www.ietf.org/archive/id/draft-many-dnsop-dns-isolated-networ
k
s-01.txt


Regards, Marc.



--
Lorenzo Breda
_______________________________________________
dtn mailing list -- [email protected]
To unsubscribe send an email to [email protected]





_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to