Re: [DNSOP] Public Suffix List

2008-06-11 Thread Gervase Markham
Florian Weimer wrote:
 * Jamie Lokier:
 (By the way, although we're talking about administrative divides in
 the DNS tree, a little thought might be given to administrative
 divides in URL trees.  There are a fair number of sites containing
 http://domain.com/user1/* and http://domain.com/user2/*, where those
 prefixes indicates separately administered URL spaces.  Do similar
 cookie issues apply?
 
 Yes.  I think Ebay suffers from these issues.

Indeed. This is one of the reasons that livejournal switched from
www.livejournal.com/name to name.livejournal.com. It prevented rogue
code on user sites stealing the cookies of other users.

Gerv
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Gervase Markham
Jelte Jansen wrote:
 won't they run into the very same problem if only tld's (and their
 sld's) are marked as don't-set-cookies-here? Or is livejournal.com also
 supposed to get on the list of public suffixes?

No. They can set cookies for www.livejournal.com or
admin.livejournal.com (as opposed to livejournal.com), and these will
not be shared with name.livejournal.com.

This is somewhat of a red herring; the problem they had is one they
could fix using existing technology. It's not what the public suffix
list addresses.

Gerv
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Jelte Jansen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Gervase Markham wrote:
 Florian Weimer wrote:
 * Jamie Lokier:
 Yes.  I think Ebay suffers from these issues.
 
 Indeed. This is one of the reasons that livejournal switched from
 www.livejournal.com/name to name.livejournal.com. It prevented rogue
 code on user sites stealing the cookies of other users.
 

won't they run into the very same problem if only tld's (and their
sld's) are marked as don't-set-cookies-here? Or is livejournal.com also
supposed to get on the list of public suffixes?

And will they care? (well, livejournal might, but i could imagine some
others not to care enough to get themselves on it)

Jelte
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIT4+T4nZCKsdOncURAqZkAKCOxkwMs6By3zxef2AhKU7nP9+0qgCbBJZd
sEApH+yga8r+DXQVN76qpMQ=
=SP/N
-END PGP SIGNATURE-
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Stephane Bortzmeyer
On Wed, Jun 11, 2008 at 10:15:19AM +0100,
 Gervase Markham [EMAIL PROTECTED] wrote 
 a message of 53 lines which said:

 Why should TLDs think they have an automatic right to have Firefox
 display domains they have issued which allow our users to be fooled
 or defrauded?

Interesting. It reminds me of the RIR which assign IP addresses
prefixes without being able to guarantee they will be routed.

I always assumed that the poor domain name registrant had only to
fight with the rules of the registrar/registry/ICANN/governement to
get his domain registered and used everywhere in the world. Now, I see
that besides registration rules (sometimes painful, see
http://www.afnic.fr/obtenir/chartes_en), registrants also have to
go through the filter of browser authors.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Gervase Markham
Henrik Nordstrom wrote:
 I seriously question this will break part. Sure, they will get
 annoyed, but in nearly all possible solutions layering ontop of the
 existing cookie system there will be easy ways for the owners of such
 sites to make them behave well, and a transition period giving them
 inciative and reasonable warning period to do so.

Other list participants were warning about the possibility of people
abandoning Firefox in droves if there were cookie-related problems
caused by its use of public suffix list. You, on the other hand, are
suggesting that we can just make changes to the way cookies work and
expect broken sites to fix themselves. These seem to be two
irreconcilable views of the future.

Long history and experience has shown us that we can't just break
people's websites like that.

Gerv
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Gervase Markham
Paul Hoffman wrote:
 For your IDN display technology, Mozilla decides which TLDs have a
 responsible attitude. Mozilla enforces these rules as a powerful
 incentive for TLDs to do as Mozilla wishes. 

As are Microsoft's rules - which, sadly, are both different and IMO much
more likely to retard the growth of IDN. But that's another discussion.

 In doing so, Mozilla
 degrades the user experience of TLDs that don't go along with the
 Mozilla rules, such as .com/.net and ccTLDs throughout the world. The
 Mozilla public suffix list may prove to be similar.

The difference is that the public suffix list is an (attempt at an)
expression of fact, not policy. If you are concerned that we will
withhold changes or issue known-incorrect lists in order to conduct some
sort of vendetta against a particular TLD, all I can say is why on
earth would we do that?

Gerv
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Gervase Markham
Dean Anderson wrote:
 That's unfortunate; but I must say this upset was not communicated to me.
 
 Probably that's because you are using SORBS to filter your email. SORBS
 has an unusually high number of false positives, and for example,
 falsely claims that that 130.105/16 and 198.3.136/21 are hijacked. You 
 can find more information about SORBS on http://www.iadl.org/

No-one can have control over and knowledge of everything their ISP does
with relation to the services they provide. I confess I've only ever
vaguely heard the name SORBS, and had no idea that my provider was using
it. But I don't believe that using it makes me uncontactable. My phone
number and address are on my personal web page.

I can hardly imagine some TLD administrator saying I'm so irritated
about Firefox's TLD IDN whitelist. I'm going to send Gerv a nasty email.
Hang on, my email's been rejected. Oh well, I guess I'll just have to
live with it.

 That policy of ours should have no effect whatsoever on TLDs with a
 responsible attitude to homographs. Our registration requirements are
 not onerous.
 
 ??? This statement doesn't seem very credible. What authority do you
 have to decide what a 'responsible attitude to homegraphs' would be?  

What's your answer to that question? (Hint: the answer no-one is
equivalent to the answer the registries, which has been shown not to
work. See http://www.shmoo.com/idn/ .)

 Mozilla.org doesn't represent the internet industry nor any government
 or governing organization. 

No, we represent our users, and we make all sorts of security decisions
for them on a regular basis. One of the reasons Firefox is popular is
precisely because it doesn't wimp out of security decisions with
user-irritating popup questions they have no information to answer. But,
as someone else has said, if people don't like the decisions we make,
they can either become part of we and seek to change them, or they can
change or build their copy, or can distribute an alternative browser.

 Why should TLD's think they need to register
 with Mozilla.org? 

They don't have to. Why should TLDs think they have an automatic right
to have Firefox display domains they have issued which allow our users
to be fooled or defrauded?

Gerv
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Gervase Markham
Florian Weimer wrote:
 Have a look at this file:
 
 /usr/share/apps/khtml/domain_info

Indeed. It looks like they do the same thing as us, but in a far more
approximate and erroneous fashion.

Persuading them to use the public suffix list would be an improvement.

Gerv
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Stephane Bortzmeyer
On Tue, Jun 10, 2008 at 11:31:00PM +0200,
 Stephane Bortzmeyer [EMAIL PROTECTED] wrote 
 a message of 16 lines which said:

 I assume it is a list of TLD which register at the third level. If so,
 it is questionable (.af, .dz, .fr register at the second and the
 third level and I do not know how Konqueror handles it).

Reported http://bugs.kde.org/show_bug.cgi?id=163774. Let's see if
Konqueror people react in the Mozilla way (We decided and your
opinion does not matter)
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Henrik Nordstrom
On ons, 2008-06-11 at 10:10 +0100, Gervase Markham wrote:

 Other list participants were warning about the possibility of people
 abandoning Firefox in droves if there were cookie-related problems
 caused by its use of public suffix list.

If you do this wronly yes.

 You, on the other hand, are
 suggesting that we can just make changes to the way cookies work and
 expect broken sites to fix themselves. These seem to be two
 irreconcilable views of the future.

No. Neither users or sites are completely static in nature.

 Long history and experience has shown us that we can't just break
 people's websites like that.

Sites do break in upgrades. Problems arise if you break too many of them
and neither the site operators of users have an easy way around, or when
they do not understand why things broke. Fortunately the area we are
discussing is fundamentally broken by design, and sites do break today
differently in different browsers.

If you want something positive to come out of discussions like this you
have to have a little more open mind in looking where to find solutions.
There is at least 10 different solutions to the cookie domain problem,
of varying complexity and feasibility. Your proposed list is one, and
not a competely bad one, but very incomplete and too static to be
feasible as the solution to this problem. But it's a reasonable
interim step to patch things up while discussing how the actual problem
should be addressed.

In short the cookie problem is threefold:

a) Receivers of a cookie have no way of knowing who issued that cookie.

b) Receivers of cookies have no means of indicating who is allowed to
set cookies for them.

c) Issuers of cookies often want to issue a cookie to multiple domains
all of which is under their administrative control, but often have to
figth the very blunt domain based filters. As result we have many
designs using URL based transfer of the cookie details when moving from
one site to another when better operation would be seen if the cookie
could be managed as a single cookie valid for multiple sites. These URL
based cookie tunnels is often installed as a way around broken browser
cookie policies, and I would suspect they often create gaping security
issues from lacking awareness of why these policies even exists.

Regards
Henrik


signature.asc
Description: This is a digitally signed message part
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Stephane Bortzmeyer
On Tue, Jun 10, 2008 at 09:22:27PM +0200,
 Florian Weimer [EMAIL PROTECTED] wrote 
 a message of 10 lines which said:

 In other words, Internet Explorer has got it's own list (and the
 operating system, too, for use in DNS devolution).

According to this blog post, IE does it the other direction (SLD are
the rule and registration under the TLD the exception):

http://crisp.tweakblogs.net/blog/ie-and-2-letter-domain-names.html
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Gervase Markham
Wes Hardaker wrote:
 * We, mozilla, obviously can't do this ourselves

On the contrary. We have done it for ourselves.

   so you must do it for
   us or else negative things will happen (and you'll be at fault, not
   us, mozilla).  Please continue to do this work for us till the end of
   time.  Oh, and we need it immediately.

We don't need it immediately. The first Firefox 3 security release will
probably be in six to eight weeks.

 * We, mozilla, won't work on any other solution because we don't think
   it'll work or it'll take too much effort and we refuse to help out in
   those ventures even if they might be better.  Please stop talking
   about alternatives as we don't want your opinions on them.

It's not true that we won't work on any other solution. This is what we
have now, and there have been no alternative proposals which (to my
mind) look like producing anything workable in the short term.

Half this list seems to think that getting all the TLDs to agree on or
do anything is an enterprise doomed to failure, and the other half seem
to think that we should be waiting for all the TLD operators to agree to
set up their own repositories of the data. There is a contradiction there.

Gerv
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Gervase Markham
Wes Hardaker wrote:
 * We, mozilla, obviously can't do this ourselves

On the contrary. We have done it for ourselves.

   so you must do it for
   us or else negative things will happen (and you'll be at fault, not
   us, mozilla).  Please continue to do this work for us till the end of
   time.  Oh, and we need it immediately.

We don't need it immediately. The first Firefox 3 security release will
probably be in six to eight weeks.

 * We, mozilla, won't work on any other solution because we don't think
   it'll work or it'll take too much effort and we refuse to help out in
   those ventures even if they might be better.  Please stop talking
   about alternatives as we don't want your opinions on them.

It's not true that we won't work on any other solution. This is what we
have now, and there have been no alternative proposals which (to my
mind) look like producing anything workable in the short term.

Half this list seems to think that getting all the TLDs to agree on or
do anything is an enterprise doomed to failure, and the other half seem
to think that we should be waiting for all the TLD operators to agree to
set up their own repositories of the data. There is a contradiction there.

Gerv
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Gervase Markham
Jeroen Massar wrote:
 If adserver.co.uk (as they are 'evil') sets a cookie for co.uk then
 indeed that cookie gets sent to mybank.co.uk too. What harm does/can
 this do? (Except that they might set a cookie identical of type to the
 bank one and maybe auto-login to their bank account!?)

sigh

Say adserver.co.uk has contracts with mybank.co.uk, mygrocer.co.uk,
mypetstore.co.uk to supply them with ads. adserver.co.uk can set the
ad-tracking cookie for .co.uk and build up a cross-site profile of a
particular user, perhaps augmented by information passed to them by one
or more of the sites concerned. This is a privacy issue. Therefore, they
should not be permitted to set such cookies. The only way to do that,
while continuing to allow foo.com to set cookies, is for the browser to
know the difference between co.uk and foo.com.

Gerv
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Jeroen Massar

Gervase Markham wrote:

Jeroen Massar wrote:

If adserver.co.uk (as they are 'evil') sets a cookie for co.uk then
indeed that cookie gets sent to mybank.co.uk too. What harm does/can
this do? (Except that they might set a cookie identical of type to the
bank one and maybe auto-login to their bank account!?)


sigh

Say adserver.co.uk has contracts with mybank.co.uk, mygrocer.co.uk,
mypetstore.co.uk to supply them with ads. adserver.co.uk can set the
ad-tracking cookie for .co.uk and build up a cross-site profile of a
particular user, perhaps augmented by information passed to them by one
or more of the sites concerned. This is a privacy issue. Therefore, they
should not be permitted to set such cookies. The only way to do that,
while continuing to allow foo.com to set cookies, is for the browser to
know the difference between co.uk and foo.com.


Thus you are going to break the contract that mybank.co.uk has with 
adserver.co.uk? wow, now you are really getting into something...


That privacy issue is not a privacy issue, that is an issue with the 
bank in question which is compromising the privacy of its users. Solve 
the problem at the bank.


Greets,
 Jeroen



signature.asc
Description: OpenPGP digital signature
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List - Please move discussion to dnsop

2008-06-11 Thread Mark Nottingham
While this thread isn't necessarily off-topic for ietf-http-wg list,  
it's more relevant IMO to dnsop, and cross-posted high-volume  
discussions tend to be distracting.

So, please try to move discussion onto the dnsop list (I've set Reply- 
To accordingly).

Thanks,


--
Mark Nottingham http://www.mnot.net/

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List - Please move discussion to dnsop

2008-06-11 Thread Edward Lewis
At 23:10 +1000 6/11/08, Mark Nottingham wrote:
While this thread isn't necessarily off-topic for ietf-http-wg list,
it's more relevant IMO to dnsop, and cross-posted high-volume
discussions tend to be distracting.

So, please try to move discussion onto the dnsop list (I've set Reply-
To accordingly).

Odd to see this, I was about to say what does this have to do with 
DNS operations? and suggest that it move back to the HTTP group. 
Cookies aren't part of the DNS protocol.

Is the issue that a cookie needs to state for what domains it is 
valid?  Are you trying to relate domain names to a registrant? 
That's not a DNS issue, that's a WhoIs/IRIS issue, if you want to pin 
that into a protocol.

-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Never confuse activity with progress.  Activity pays more.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Jamie Lokier
Gervase Markham wrote:
  Oh?  How is this reconciled with earlier comments that
  login.mybank.co.uk and accounts.mybank.co.uk are grouped together - or
  is the Public Suffix List only for history grouping in browsers, not
  for cookie sharing?

 under the current code ... www.mybank.co.uk can set cookies for
 ... co.uk (shared with adserver.co.uk but not with myorg.org.uk).

 It is this latter use we want to prevent. We can do so by stopping
 cookies being set for any domain which is a public suffix.

I'm not seeing how this is different from mybank.livejournal.com
setting cookies on livejournal.com which can be read by
adserver.livejournal.com.  livejournal.com needs to be on your Public
Suffix List to prevent that - if the content from subdomains can set
their own cookies.  Maybe not on Livejournal, but there are sites
where it's possible.

Even in mybank.co.uk, it's typical that login.mybank.co.uk and
thirdpartyinformation.mybank.co.uk will be somewhat independent.  The
latter should not be setting arbitrary cookies affecting the former,
imho - security, rather than privacy.

Regarding the break the contract with adserver argument, there are
plenty of ways for mybank.co.uk to pass tracking info to
adserver.co.uk by contract.  Banning cross-domain cookies in this case
just forces them to use another method.

 (Again, I comment that cookies are not the only way we are using this
 information.)

I don't think anybody minds how you use the information to present
History dialogs and such.  Just whether it breaks applications that
come to depend on the structure of the list, and whether it adds
another barrier for site publishers who serve public content in a way
which resembles NICs.

-- Jamie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List - Please move discussion to dnsop

2008-06-11 Thread Gervase Markham
Edward Lewis wrote:
 Is the issue that a cookie needs to state for what domains it is 
 valid?  

No.

 Are you trying to relate domain names to a registrant? 

No.

I must confess it is somewhat frustrating when, having put up a website
explaining what this is all about, and having had a long discussion on
this list, people continually misunderstand the point while having shown
no evidence of attempting to read the existing explanations.

I even got one (private) mail basically saying I can't be bothered to
read all that. Tell me, what are you trying to do?

http://publicsuffix/learn/ has more info (and I've just checked in
another update, which should be visible in the next day or so. There's a
human in the update loop).

Gerv
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List - Please move discussion to dnsop

2008-06-11 Thread bmanning
 
 http://publicsuffix/learn/ has more info (and I've just checked in
 another update, which should be visible in the next day or so. There's a
 human in the update loop).
 
 Gerv
 ___

that URL does not resolve in the way you might
expect.

--bill
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List - Please move discussion to dnsop

2008-06-11 Thread Gervase Markham
[EMAIL PROTECTED] wrote:
   that URL does not resolve in the way you might
   expect.

Sorry :-) Cut and pasted from my browser without checking. That's my
local testing copy, of course.

http://www.publicsuffix.org/learn/

Gerv
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Ted Lemon
On Jun 11, 2008, at 6:26 AM, Gervase Markham wrote:
 It's not true that we won't work on any other solution. This is what  
 we
 have now, and there have been no alternative proposals which (to my
 mind) look like producing anything workable in the short term.

Putting the list in the DNS instead of in the browser isn't  
workable?   Serious question.   I think several proposals have been  
advanced here that /could/ work.   Mine has the virtue of being  
completely under your control.   The other one, where subdomains are  
called out in the zones of the domains that contain them, is not under  
your control, and wouldn't be a good interim solution, but sounds like  
a good long-term solution because it puts correctness in the hands of  
the people who suffer or benefit from it.

So what I would personally like to see here is a staged transition.
In the first stage, mozilla.org would set up a TLD list in its own DNS  
space, or in some new subdomain they register with good anycast  
replication so that no individual server has to bear the entire  
load.   This list would be maintained by mozilla.org, using  
information from registries and domain owners, and also using your  
current ad-hoc system.

But you'd also implement the system that was proposed here where the  
registries themselves can publish this information in their own  
domains.   And over time, the hope would be that the number of TLDs  
you'd have to maintain in your list would slowly dwindle, to the point  
where it would become more of a quirks list than a registry of its  
own.  This could work because the incentives are in the right  
direction - sites that have problems with your ad-hoc registry can  
either contact you or fix their own DNS, and fixing their own DNS may  
well be easier.

I haven't heard you responding that either of these solutions wouldn't  
work, so I'm assuming they would, but perhaps I'm wrong.   It also may  
be the case that for reasons of practicality you need to start with a  
list embedded in the browser; as long as you have a plan to make the  
transition to a list that's maintained more dynamically, and as long  
as you actually execute that plan, it seems to me that this is harmless.

BTW, thanks for your reasoned responses to all these questions and  
accusations being thrown at you.   You seem to have really elicited a  
lot of energetic response with your initial request, and I hope that  
something good will come of it.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List - Please move discussion to dnsop

2008-06-11 Thread Ted Lemon
On Jun 11, 2008, at 11:06 AM, Joe Baptista wrote:
 Listening would you mind explaining something here.  Do we work for  
 you?  I'm pretty sure your being paid to promote your public suffix  
 idea but we are not.  There are many here who are too busy to spend  
 time reading your stuff, let alone go back to the web site for  
 updates.

Joe, the problem description on the web site contains five paragraphs,  
two of which are a single sentence.


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List - Please move discussion to dnsop

2008-06-11 Thread Gervase Markham
Joe Baptista wrote:
 Listening would you mind explaining something here.  Do we work for
 you?  I'm pretty sure your being paid to promote your public suffix idea
 but we are not.  There are many here who are too busy to spend time
 reading your stuff, let alone go back to the web site for updates.

That's fine. But please don't ask me questions about it then.

- I don't have time to understand this. - Fine.

- I do have time to understand this. Here is an intelligent question.
  - Fine.

- I don't have time to understand this so I'm going to ask uninformed
  questions. - Not fine. Not just here, but in any walk of life where
  people respect other people's time.

 Now Gerv focus.  You have come here for a reason and that is to promote
 a protocol.

No. I came here because Yngve suggested that the membership of this list
would appreciate a heads-up.

 Gerv focus.  Kindly remember your position in his affair.  You are here
 on behalf Mozilla to sell an idea and we are the people who have to be
 sold. 

No. I don't need to sell you the idea. The idea doesn't stand or fall on
the opinion of this mailing list.

 Incidentally - have you answered by question yet - or put it on the web
 site?  What happens to your web browsers behavior if I try to surf a TLD
 not on the list?

I've answered it once to you privately and once to the list. Third time:
the same thing as now.

Gerv


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List - Please move discussion to dnsop

2008-06-11 Thread Gervase Markham
Joe Baptista wrote:
 Listening would you mind explaining something here.  Do we work for
 you?  I'm pretty sure your being paid to promote your public suffix idea
 but we are not.  There are many here who are too busy to spend time
 reading your stuff, let alone go back to the web site for updates.

That's fine. But please don't ask me questions about it then.

- I don't have time to understand this. - Fine.

- I do have time to understand this. Here is an intelligent question.
  - Fine.

- I don't have time to understand this so I'm going to ask uninformed
  questions. - Not fine. Not just here, but in any walk of life where
  people respect other people's time.

 Now Gerv focus.  You have come here for a reason and that is to promote
 a protocol.

No. I came here because Yngve suggested that the membership of this list
would appreciate a heads-up.

 Gerv focus.  Kindly remember your position in his affair.  You are here
 on behalf Mozilla to sell an idea and we are the people who have to be
 sold. 

No. I don't need to sell you the idea. The idea doesn't stand or fall on
the opinion of this mailing list.

 Incidentally - have you answered by question yet - or put it on the web
 site?  What happens to your web browsers behavior if I try to surf a TLD
 not on the list?

I've answered it once to you privately and once to the list. Third time:
the same thing as now.

Gerv
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Brian Dickson
Gervase Markham wrote:
 The difference is that the public suffix list is an (attempt at an)
 expression of fact, not policy.

I think is where you are encountering resistance, even though you may 
not realize it.

What you are doing is *publishing* something, which alleges to be a 
factual list.

Who is on it, who is not on it, and who uses it and how, matter a great 
deal.

If the list is 100% complete and 100% accurate and 100% timely, there 
are no problems.
Any deviation from that situation, regardless of how much and in what 
manner the deviation occurs,
puts the publisher of alleged facts at risk.

And relying on authoritative sources to push data to you, is a reverse 
onus that hundreds of years of case
law quite likely present a formidable obstacle, if it becomes necessary 
to defend your choice.

Here's a concrete analogy that may be suitable for demonstrating the issue.

Imagine a magazine dedicated to Tires. It publishes an article on 
Tire Safety.
It contains a list of Tires (manufacturer/model) safe to use at 180 km/h.
Is the list accurate? Timely? Complete?

If a reader bases a safety decision (buys tires, drives 180 km/h) that 
goes badly, then what?

What about recalls?

Also: Publishing a list may be even *riskier* than publishing a single, 
but erroneous, fact.

E.g. what about manufacturers not listed?
They have been implicitly or even explicitly defamed, even if you 
include a footnote to the effect that this list is not complete.
 If you are concerned that we will
 withhold changes or issue known-incorrect lists in order to conduct some
 sort of vendetta against a particular TLD, all I can say is why on
 earth would we do that?
   

No malice is needed on your part, for publishing a list to cause 
problems, esp. for you and the publisher (Mozilla).
I think you might not have considered that, yet.

Conclusion:

Regardless of the benign intent of the list, publishing it means needing 
to keep it timely, accurate,
and complete, and that is why the notion of updates based on volunteered 
data from registries,
updated only when software updates are performed, is a particularly bad 
idea.

I happen to think that the idea of maintaining such a list is probably 
not a bad idea itself.

It is the means by which the list is built, and distributed, that are of 
great concern.

Brian
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List - Please move discussion to dnsop

2008-06-11 Thread Joe Baptista
On Wed, Jun 11, 2008 at 12:26 PM, Gervase Markham [EMAIL PROTECTED] wrote:


  Incidentally - have you answered by question yet - or put it on the web
  site?  What happens to your web browsers behavior if I try to surf a TLD
  not on the list?

 I've answered it once to you privately and once to the list. Third time:
 the same thing as now.


We must be having email issues.  Because I have neither received a private
email from you that I can find.  Will check my spam folder in case it ended
up there.  And I have not seen a response to my question on the list.  Its
been pretty busy here since you dropped this little bomb that has gotten us
so excited.

So please help me out here, I didn't get that answer.  So what is the answer
to the question ??? What happens to your web browsers behavior if I try to
surf a TLD not on the list?

Thanks in advance for your answer.
Joe Baptista

-- 
Joe Baptista
www.publicroot.org
PublicRoot Consortium

The future of the Internet is Open, Transparent, Inclusive, Representative 
Accountable to the Internet community @large.

Office: +1 (360) 526-6077 (extension 052)
Fax: +1 (509) 479-0084
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread David Conrad
Gervase,

On Jun 11, 2008, at 4:26 AM, Gervase Markham wrote:
 It's not true that we won't work on any other solution. This is what  
 we
 have now, and there have been no alternative proposals which (to my
 mind) look like producing anything workable in the short term.

I guess it depends on what you mean by 'workable'.

 Half this list seems to think that getting all the TLDs to agree on or
 do anything is an enterprise doomed to failure, and the other half  
 seem
 to think that we should be waiting for all the TLD operators to  
 agree to
 set up their own repositories of the data. There is a contradiction  
 there.

While I might agree that it is unlikely you'll get all the TLDs to  
agree on or do anything (they are a wildly varying bunch in pretty  
much every axis) I don't remember anyone suggesting you wait on the  
TLD operators to set up their own repositories.

What I do remember folks saying is that hardcoding a list in other  
contexts has caused lots of trouble in the past and that it is  
probably a mistake for you to do it in your product.  Some folks have  
even suggested alternatives (although I gather you do not consider  
them 'workable').

If I understand correctly, if there is no data (regardless of the  
solution), you get no change in behavior.   As such, doing a probe for  
policy data when it is needed would seem to be workable.  If there is  
no data available (for whatever reason), you get no change in  
behavior.  If there is data, you get the most up to date available.   
Whether or not you start with a static list that is then over-ridden  
by the response from the probe is an implementation choice that can be  
argued.

FWIW.

Regards,
-drc

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Florian Weimer
* Gervase Markham:

 Say adserver.co.uk has contracts with mybank.co.uk, mygrocer.co.uk,
 mypetstore.co.uk to supply them with ads. adserver.co.uk can set the
 ad-tracking cookie for .co.uk and build up a cross-site profile of a
 particular user, perhaps augmented by information passed to them by one
 or more of the sites concerned. This is a privacy issue.

I'd love to see an official statement from the Mozilla Foundation that
cross-domain ad correlation is evil, and should be stopped by
technology.  Certainly this is not what you're trying to say here.

I guess the real issue is that by setting a cookie for co.uk, it's
possible to exploit session fixation vulnerabilities in web sites under
co.uk.  Unfortunately, the Public Suffix List web site is a bit unclear
in this regard.  It does not list a single protocol spec which requires
this sort of data.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Ted Lemon
On Jun 11, 2008, at 3:16 PM, Florian Weimer wrote:
 I guess the real issue is that by setting a cookie for co.uk, it's
 possible to exploit session fixation vulnerabilities in web sites  
 under
 co.uk.  Unfortunately, the Public Suffix List web site is a bit  
 unclear
 in this regard.  It does not list a single protocol spec which  
 requires
 this sort of data.

It's kind of assumed that you would be aware of these issues, I  
guess.   Lots of web sites use cookies to associate a session with a  
particular user.   With cross-site cookie theft, a malicious web site  
can gain access to your session cookie even if it was protected by  
https encryption when you were talking to the legitimate site.

Of course there are ways to mitigate this risk, but the only knob the  
mozilla guys have to turn is preventing the cookie from being leaked  
in the first place.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Florian Weimer
* Ted Lemon:

 It's kind of assumed that you would be aware of these issues, I guess.

But hardly anybody seems to be.

 Lots of web sites use cookies to associate a session with a
 particular user.   With cross-site cookie theft, a malicious web site
 can gain access to your session cookie even if it was protected by
 https encryption when you were talking to the legitimate site.

Yes, but that's why cookies are associated with the host name of the
incoming request.  The cookie set operation controls which domains can
read the cookie.  No special data is required for that.

What's happening here is that a restriction is placed on the largest
possible subtree for which you can set a cookie.  Failure to do this
does not grant read access to arbitrary cookies in itself.  But as I
wrote, it might expose session fixation problems.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Ted Lemon
On Jun 11, 2008, at 3:30 PM, Florian Weimer wrote:
 Failure to do this
 does not grant read access to arbitrary cookies in itself.  But as I
 wrote, it might expose session fixation problems.

Right, the point is that the mozilla guys can't force web site  
implementors to do the right thing, but they still get dinged for a  
security flaw if the web site implementors do the wrong thing.   The  
only knob they can turn is this one.   So it makes a great deal of  
sense for them to try to turn it.

Also, you discounted the privacy issue in your previous message, but  
the point is that in some countries privacy is actually a legal  
requirement, one which the Mozilla folks, I think rightly, feel some  
obligation to honor.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread SM
Hi Gervase,
At 02:15 11-06-2008, Gervase Markham wrote:
They don't have to. Why should TLDs think they have an automatic right
to have Firefox display domains they have issued which allow our users
to be fooled or defrauded?

Does that mean that the new Firefox will never display domains that 
allow its users to be fooled or defrauded? :-)

At 04:25 11-06-2008, Gervase Markham wrote:
It's not true that we won't work on any other solution. This is what we
have now, and there have been no alternative proposals which (to my
mind) look like producing anything workable in the short term.

If you push aside all the negative views, you won't see any 
alternative proposals.

Half this list seems to think that getting all the TLDs to agree on or
do anything is an enterprise doomed to failure, and the other half seem

That's because there are some people on this list who have attempted 
that before.

to think that we should be waiting for all the TLD operators to agree to
set up their own repositories of the data. There is a contradiction there.

Maybe those people are not looking for a short-term fix.

By the way, the question of suffix lists has been discussed in other 
Internet areas before.  It's not restricted to cookies only.  The 
fact that nobody pointed you to a RFC suggests that there hasn't been 
an acceptable solution yet.

Quoting RFC 4085:

   Products that rely on such embedded IP addresses initially may appear
to be convenient to the product's designer and to its operator or user,
but this dubious benefit comes at the expense of others in the Internet
community.

Replace IP addresses with publish suffix and you'll see why your 
proposal generated so much controversy on this mailing list.

Regards,
-sm

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Public Suffix List

2008-06-11 Thread Dean Anderson
On Wed, 11 Jun 2008, Gervase Markham wrote:

 Dean Anderson wrote:
  That's unfortunate; but I must say this upset was not communicated to me.
  
  Probably that's because you are using SORBS to filter your email. SORBS
  has an unusually high number of false positives, and for example,
  falsely claims that that 130.105/16 and 198.3.136/21 are hijacked. You 
  can find more information about SORBS on http://www.iadl.org/
 
 No-one can have control over and knowledge of everything their ISP does
 with relation to the services they provide. 

Actaully, I looked into the 'Our ISP blocked our mail without our
knowledge' claim. [I'm always interested in the cases where this is
true]. In fact, Mozilla's email is handled by mailservers on
63.245.208/20, which is a /20 assigned to Mozilla.org. It struck me as
quite odd that quite strange that Mozilla.org has 4096 IP addresses, and
that it got this assignment in 2006, under what should have been very
strict usage and allocation rules...I wonder how Mozilla.org justifies
4k public IP addresses---Question for a different forum. Anyway, using
SORBS isn't a decision you can blame on your ISP. Its Mozilla.org's
mailserver, not an outsourced ISP mailserver.  Mozilla.org has control
over its email filtering, and it seems likely a Mozilla.org admin
configured SORBS. It was not their ISP.  This affects at least my view
of your credibility.

 I confess I've only ever vaguely heard the name SORBS, and had no idea
 that my provider was using it. But I don't believe that using it makes
 me uncontactable. My phone number and address are on my personal web
 page.

 I can hardly imagine some TLD administrator saying I'm so irritated
 about Firefox's TLD IDN whitelist. I'm going to send Gerv a nasty
 email. Hang on, my email's been rejected. Oh well, I guess I'll just
 have to live with it.

Well, somehow they managed to convey their upset'ness to ICANN, but not
convey that to Mozilla. I don't know exactly why that was.  But people
often don't try very hard to overcome communication problems to tell
someone that they are unreasonably off in the weeds.  A SORBS bounce
would tend to confirm the effort is pointless.

  That policy of ours should have no effect whatsoever on TLDs with a
  responsible attitude to homographs. Our registration requirements are
  not onerous.
  
  ??? This statement doesn't seem very credible. What authority do you
  have to decide what a 'responsible attitude to homegraphs' would be?  
 
 What's your answer to that question? (Hint: the answer no-one is
 equivalent to the answer the registries, which has been shown not to
 work. See http://www.shmoo.com/idn/ .)

I don't see that the answer is no-one, nor that the registries has
been shown not to work, as you claim.  However, if you think there is a
problem and you have a solution that should be imposed on the TLDs, you
should take the matter up with ICANN.  Your unilateral exercise is
certainly no solution.

  Mozilla.org doesn't represent the internet industry nor any
  government or governing organization.
 
 No, we represent our users, and we make all sorts of security
 decisions for them on a regular basis.

Hmm. Worrisome, given the apparent lack of serious thought put into some
of those security decisions, and the lack of credible, serious thought
put into even anti-spam choices, and the blaming of things on your ISP.

 One of the reasons Firefox is popular is precisely because it doesn't
 wimp out of security decisions with user-irritating popup questions
 they have no information to answer.

I also use firefox, but certainly not for those reasons. I use it
because it came with Linux, and it displays HTML pretty reasonably. I
didn't know it might have other dubious agendas hard-coded.

 But, as someone else has said, if people don't like the decisions we
 make, they can either become part of we and seek to change them, or
 they can change or build their copy, or can distribute an alternative
 browser.

Actually, I said that. Perhaps others did, too.

  Why should TLD's think they need to register with Mozilla.org?
 
 They don't have to. Why should TLDs think they have an automatic right
 to have Firefox display domains they have issued which allow our users
 to be fooled or defrauded?

You have no justification to form that conclusion. The TLDs aren't
defrauding anyone; The TLDs aren't aiding in the fraud of anyone. And
your scheme isn't even shown to stop fraudulent websites. So Mozilla.org
seems to have little to no justification whatsoever for its extremely
unilateral actions.  

The people who register their domains with any certified TLD do have an
automatic right to have Firefox display their websites.  You have no
right to assert they are fraudulent when they aren't and you have no
evidence they are.

I don't get a good feeling about Mozilla.org, anymore.  The unrealistic,
unilateral attitude reminds me of other kinds of similar extremism, that
was also found to be unsubstantiated, and a