Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-17 Thread SM

Hello,
At 18:13 16-10-2012, Olafur Gudmundsson wrote:

It was not explicitly discussed.


The IESG received a request from the DNSEXT WG to create an Internet 
Standard [1].  The IESG solicited comments.  As this is the second 
last Call I presume that someone might know whether that Internet 
Standard will be STD 13 or something else.  Could the  information be shared?


Are there any guidelines about the publication of Internet Standards, 
i.e. how are STDs assigned and who does the assignment?


Regards,
-sm

P.S. According to mx.ams1.isc.org mgr...@isc.org is not a valid email address.

1. http://www.ietf.org/mail-archive/web/ietf-announce/current/msg10742.html  



Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-16 Thread SM

Hi Olafur,

I posted the following question about the draft about two weeks ago [1]:

  On publication of draft-ietf-dnsext-rfc2671bis-edns0-09, will it be
   part of STD 13?

I did not see any comments from the WG about that.  I had an off-list 
exchange with the RFC Series Editor about STDs.  The question seems 
like an IETF matter.  Has this question been discussed by the WG, and 
if so, what was the conclusion?


Regards,
-sm

1. http://www.ietf.org/mail-archive/web/ietf/current/msg75156.html



Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-16 Thread Olafur Gudmundsson

On 16/10/2012 17:43, SM wrote:

Hi Olafur,

I posted the following question about the draft about two weeks ago [1]:

  On publication of draft-ietf-dnsext-rfc2671bis-edns0-09, will it be
   part of STD 13?

I did not see any comments from the WG about that.  I had an off-list 
exchange with the RFC Series Editor about STDs.  The question seems 
like an IETF matter.  Has this question been discussed by the WG, and 
if so, what was the conclusion?




It was not explicitly discussed.

Olafur



Regards,
-sm

1. http://www.ietf.org/mail-archive/web/ietf/current/msg75156.html





Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-05 Thread João Damas

On 2 Oct 2012, at 19:31, SM wrote:

 At 08:09 02-10-2012, John C Klensin wrote:
 off bad or frivolous ideas), but closing is a big step.  Telling
 implementers that they don't need to pay attention to the
 relevant codes and fields (and might even be able to use them
 for a different, even if private, purpose) is an even more
 serious step.
 
 Yes.
 
 In Section 6.1.2:
 
  OPTION-CODE
 Assigned by the Expert Review process as defined by the dnsext
 working group and the IESG.
 
 It's odd to keep this defined by a working group which is being closed.

The process is (has been) defined by the wg. The assignment is done by the 
Expert Review process, not the wg.

  Section 9.1 does not provide much information.  One significant change in 
 the draft is the inclusion of requirements for middleboxes.  It's not 
 mentioned under in Appendix A.2.

OK, can add mention in there, no problem.

 
 BTW, the RFC 2119 reference could be normative.
 
 Regards,
 -sm 



Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-05 Thread João Damas

On 3 Oct 2012, at 14:10, John C Klensin wrote:

 
 
 --On Wednesday, October 03, 2012 10:43 +0200 João Damas
 j...@bondis.org wrote:
 
 I believe you are saying the same things when you are both
 saying that for this to work there may be more than one way to
 do it but all options require completely new functionality in
 implementations (either by implementing support for new labels
 types or by implementing new fall back behavior). The
 conclusion is still the same.
 
 Hmm.  I'm not completely sure who you was intended to include,

Yourself and Olafur

 but my conclusion from the above is that there is no substantial
 justification for eliminating, at this time, a capability that
 might prove better on balance when and if new capabilities are
 considered and tradeoffs evaluated.
 
 To summarize my perspective on this as of now:
 
 (1) No one is making a case for retaining binary labels
 
 (2) The case has not been made, at least in the document, for
 eliminating label types.  An argument that there are other ways
 to do a particular type of label is not persuasive unless there
 is a comprehensive and written analysis of what other labels
 might be considered and what the tradeoffs among approaches
 would be.  And an argument that almost any significant added
 functionality would be very slow and costly to deploy may be an
 argument for not approving such functionality, but it is not an
 argument for eliminating one, but not all, of the underlying
 capabilities.

fair enough. The groups consensus over the last years and after the experience 
with binary labels has been that new label types are basically undeployable 
because they require a complete renewal of all deployed resolvers.
On the other hand the use of EDNS extension mechanisms can be incrementally 
deployed (e.g. see some of DNSSEC features that leverage EDNS)

 IMO, this discussion has turned up two ways in which the case
 for eliminating the possibility of additional label types could
 be made:
 
 (2.1) Demonstrating that simply having the capability defined
 and available in principle is somehow harmful.
 

People here can correct me, as my memory is fuzzy, but binary labels did cause 
harm to several deployed implementations. Don't know if this is just case in 
favour of natural selection.

 (2.2) The WG has consensus on a bright line that defines the
 nature of proposals that would require going to DNSng rather
 than EDNSx-type extensions to the current model, has concluded
 that any extensions or alterations to the label definition of
 1034/1035 would require crossing that line, and is prepared to
 document that line and get IETF consensus on it (either as part
 of this document or one normatively referenced from it).

Pretty much, that is my understanding. It is quite possible that this has been 
a position reached over many iterations of discussions and is not actually 
documented anywhere.

Joao

Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-05 Thread João Damas
I believe you are saying the same things when you are both saying that for this 
to work there may be more than one way to do it but all options require 
completely new functionality in implementations (either by implementing support 
for new labels types or by implementing new fall back behavior). The conclusion 
is still the same.

Joao

On 3 Oct 2012, at 03:15, Mark Andrews wrote:

 
 Labels only work when all the severs for a zone that has a new label type,
 in ADDITION sufficient fraction servers in all zones above that zone 
 MUST understand the new
 label type.
 
 Not true. Binary labels could have been made to work by removing
 the left hand label until the remaining suffix consisted of only
 RFC 1035 labels, looking up the servers for that domain, then
 resuming query processing using those servers similar to what we
 do with DS lookups.
 
 Such processing would be required for any new label type used in a
 QNAME and would be a significant change to the standard query logic.
 
 Mark
 -- 
 Mark Andrews, ISC
 1 Seymour St., Dundas Valley, NSW 2117, Australia
 PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org



Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-05 Thread John C Klensin


--On Friday, October 05, 2012 10:29 +0200 João Damas
j...@bondis.org wrote:

...
 IMO, this discussion has turned up two ways in which the case
 for eliminating the possibility of additional label types
 could be made:
 
 (2.1) Demonstrating that simply having the capability defined
 and available in principle is somehow harmful.

 People here can correct me, as my memory is fuzzy, but binary
 labels did cause harm to several deployed implementations.
 Don't know if this is just case in favour of natural selection.

Again, I'm not defending binary labels.  Many people thought
they were a good idea at the time.  But, just as binary labels
failed is a good argument for deprecating binary labels but not
a good argument for deprecating label types generally, binary
labels caused harm (assuming that is the case) would not be a
basis for inferring that all labels types would cause harm, much
less that retaining the capability for using extended label
types would be harmful.

Just as some cows are brown and all cows are animals doesn't
tell you a thing about the color of all animals, binary labels
were a bad idea and binary labels are an instance of extended
label types doesn't constitute an argument for deprecating
label types.

 (2.2) The WG has consensus on a bright line that defines the
 nature of proposals that would require going to DNSng rather
 than EDNSx-type extensions to the current model, has concluded
 that any extensions or alterations to the label definition of
 1034/1035 would require crossing that line, and is prepared to
 document that line and get IETF consensus on it (either as
 part of this document or one normatively referenced from it).
 
 Pretty much, that is my understanding. It is quite possible
 that this has been a position reached over many iterations of
 discussions and is not actually documented anywhere.

If there is a bright line, it would definitely benefit the
broader community to be able to see a description and discuss
it.  If there is only a general feeling in the WG... well, that
doesn't count for much, especially given the history of
disagreements about what the base DNS specifications say and
what assorted terminology means.

   john



Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-04 Thread Olafur Gudmundsson

On 02/10/2012 21:15, Mark Andrews wrote:

Labels only work when all the severs for a zone that has a new label type,
in ADDITION sufficient fraction servers in all zones above that zone
MUST understand the new
label type.


Not true. Binary labels could have been made to work by removing
the left hand label until the remaining suffix consisted of only
RFC 1035 labels, looking up the servers for that domain, then
resuming query processing using those servers similar to what we
do with DS lookups.

Such processing would be required for any new label type used in a
QNAME and would be a significant change to the standard query logic.

Mark



Mark,

This will only work if all the recursive resolvers that consumers for
this new label types have been updated AND the new label type is the 
left most label(s) in the name.



Olafur



Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-04 Thread Mark Andrews

In message 506dbe9b.3070...@ogud.com, Olafur Gudmundsson writes:
 On 02/10/2012 21:15, Mark Andrews wrote:
  Labels only work when all the severs for a zone that has a new label type,
  in ADDITION sufficient fraction servers in all zones above that zone
  MUST understand the new
  label type.
 
  Not true. Binary labels could have been made to work by removing
  the left hand label until the remaining suffix consisted of only
  RFC 1035 labels, looking up the servers for that domain, then
  resuming query processing using those servers similar to what we
  do with DS lookups.
 
  Such processing would be required for any new label type used in a
  QNAME and would be a significant change to the standard query logic.
 
  Mark
 
 
 Mark,
 
 This will only work if all the recursive resolvers that consumers for
 this new label types have been updated AND the new label type is the 
 left most label(s) in the name.

This works regardless of the position of the label.  If a TLD label
is a binary label then you strip back the labels until you reach
the root.

Resolvers involved in the lookup need to be updated and I didn't
dispute that.

 Olafur
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org


Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-03 Thread SM

From Section 7 of the draft:

 Responders which choose not to implement the protocol extensions
  defined in this document MUST respond with a return code (RCODE) of
  FORMERR to messages containing an OPT RR in the additional section
  and MUST NOT include an OPT record in the response.

That looks like a change [1] to STD 13.  Responders which respond 
with a return code of 4 would not be compliant.


On publication of draft-ietf-dnsext-rfc2671bis-edns0-09, will it be 
part of STD 13?


From RFC 3225:

  In the event a server returns a NOTIMP, FORMERR or SERVFAIL response
   to a query that has the DO bit set, the resolver SHOULD NOT expect
   DNSSEC security RRs and SHOULD retry the query without EDNS0 in
   accordance with section 5.3 of [RFC2671].

There's a normative reference [2] to that RFC in this draft.

In Section 1:

 This document deprecates Extended Labels, and therefore Binary Labels,
   obsoleting [RFC2673].

draft-ietf-dnsext-rfc6195bis-04 mentions that:

 The Binary label type is Historic [RFC2671bis].

The IETF might wish to consider whether it is necessary to align the 
text in the two drafts.


Regards,
-sm

1. Whether it is a change or not depends upon how one reads RFC 
6410.  The write-up mentions that there are no unused features in the 
specification that greatly increase implementation complexity.  It is 
unclear whether this document is a minor revision of RFC 2671.


2. http://www.ietf.org/mail-archive/web/weirds/current/msg01668.html



Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-03 Thread John C Klensin


--On Wednesday, October 03, 2012 10:43 +0200 João Damas
j...@bondis.org wrote:

 I believe you are saying the same things when you are both
 saying that for this to work there may be more than one way to
 do it but all options require completely new functionality in
 implementations (either by implementing support for new labels
 types or by implementing new fall back behavior). The
 conclusion is still the same.

Hmm.  I'm not completely sure who you was intended to include,
but my conclusion from the above is that there is no substantial
justification for eliminating, at this time, a capability that
might prove better on balance when and if new capabilities are
considered and tradeoffs evaluated.

To summarize my perspective on this as of now:

(1) No one is making a case for retaining binary labels

(2) The case has not been made, at least in the document, for
eliminating label types.  An argument that there are other ways
to do a particular type of label is not persuasive unless there
is a comprehensive and written analysis of what other labels
might be considered and what the tradeoffs among approaches
would be.  And an argument that almost any significant added
functionality would be very slow and costly to deploy may be an
argument for not approving such functionality, but it is not an
argument for eliminating one, but not all, of the underlying
capabilities.

IMO, this discussion has turned up two ways in which the case
for eliminating the possibility of additional label types could
be made:

(2.1) Demonstrating that simply having the capability defined
and available in principle is somehow harmful.

(2.2) The WG has consensus on a bright line that defines the
nature of proposals that would require going to DNSng rather
than EDNSx-type extensions to the current model, has concluded
that any extensions or alterations to the label definition of
1034/1035 would require crossing that line, and is prepared to
document that line and get IETF consensus on it (either as part
of this document or one normatively referenced from it).

best,
john



Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-03 Thread John C Klensin

--On Tuesday, October 02, 2012 23:39 -0700 SM s...@resistor.net
wrote:

  From Section 7 of the draft:
 
   Responders which choose not to implement the protocol
 extensions
defined in this document MUST respond with a return code
 (RCODE) of
FORMERR to messages containing an OPT RR in the additional
 section
and MUST NOT include an OPT record in the response.
 
 That looks like a change [1] to STD 13.  Responders which
 respond with a return code of 4 would not be compliant.
...
 The IETF might wish to consider whether it is necessary to
 align the text in the two drafts.
...

One observation on this part of the thread...

While I'm much more concerned about the substantive impact of
deprecating a possibly-useful (even if painful to use) feature
without adequate justification and documentation, I believe that
documents being processed for classification as Internet
Standard should be held to a very high standard for editorial
quality and clarity and consistency of relationships to other
specifications.  If others agree with that belief, SM's analysis
appears to represent a strong case that the current version of
this draft (and possibly draft-ietf-dnsext-rfc6195bis-04) are
not ready for prime time.

   best,
john




Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-02 Thread John C Klensin


--On Tuesday, October 02, 2012 13:32 +1000 Mark Andrews
ma...@isc.org wrote:

 Closing the registry is not irreversable if it needs to be
 reversed. It's not like we can forget that there were assigned
 code points and anything that attempted to use those code
 points would have to consider the fact that they were used at
 one time.

Actually, Mark, we very rarely close registries if there is any
possibility of reopening them.  We may raise the threshold for
registration, etc. (in this case, new types already require
standards action, which should make it adequately easy to head
off bad or frivolous ideas), but closing is a big step.  Telling
implementers that they don't need to pay attention to the
relevant codes and fields (and might even be able to use them
for a different, even if private, purpose) is an even more
serious step.

But I'd like to ask that this discussion move up a level.  My
question was about what the WG considered and whether, in the
light of those discussions, there was really justification to
take the serious step of abandoning a facility and consensus on
that justification.  It seems to me that your responses have
addressed different questions entirely: your opinion about
alternate approaches in the earlier note and a suggestion about
the possibility of reopening registries in this one. 

Because the questions I asked are tightly connected to what the
WG discussed and on what basis the presumably-consensus decision
was made, I would hope that I (and, more important, the IESG and
the community) would hear from the WG Chairs and other
participants, not only from someone who, coincidentally or not,
is part of the same organization as the three authors of the
draft (a draft that does not indicate the active participation
of any other people or organizations by the presence of an
Acknowledgments section).

best regards,
   john






Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-02 Thread SM

At 08:09 02-10-2012, John C Klensin wrote:

off bad or frivolous ideas), but closing is a big step.  Telling
implementers that they don't need to pay attention to the
relevant codes and fields (and might even be able to use them
for a different, even if private, purpose) is an even more
serious step.


Yes.

In Section 6.1.2:

  OPTION-CODE
 Assigned by the Expert Review process as defined by the dnsext
 working group and the IESG.

It's odd to keep this defined by a working group which is being 
closed.  Section 9.1 does not provide much information.  One 
significant change in the draft is the inclusion of requirements for 
middleboxes.  It's not mentioned under in Appendix A.2.


BTW, the RFC 2119 reference could be normative.

Regards,
-sm 



Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-02 Thread Olafur Gudmundsson

My original message was not copied to ietf mailing list.

John quoted all of my text so I'm sending this follow-up to ietf as well 
as dnsext

mailing lists.


On 02/10/2012 12:38, John C Klensin wrote:


--On Tuesday, October 02, 2012 11:01 -0400 Olafur Gudmundsson
o...@ogud.com wrote:


...

The IESG has received a request from the DNS Extensions WG
(dnsext) to consider the following document: - 'Extension
Mechanisms for DNS (EDNS(0))'
draft-ietf-dnsext-rfc2671bis-edns0-09.txt as Internet
Standard

...
John,
no-hat
We learned two main things from binary labels:
a) the specification of them caused expensive processing, and
the
 utility of binary labels w/o A6 record was none.

Huh?  While I certainly agree that the binary label experiment
failed, RFC 2673 didn't seem to me to have anything to do with
A6 records and a quick review just now doesn't convince me
otherwise.  As I recall, it came out of the period in which we
were evolving to classless IPv4 addresses (with prefix
lengths/netmasks on arbitrary bit boundaries) and was intended
to permit address delegation entities to easily delegate ranges
of reverse-mapping records to the appropriate address-holding
entities for management.  The failure of that idea (for the
reasons you outline) contributed, IMO, to PTR records being much
less useful today than they were pre-CIDR.

Conversely, if a significant reason for getting rid of binary
labels was the link to A6 records, why doesn't the document just
say these existed solely to support A6 records, A6 records have
been deprecated, therefore these are too.  All of us could be
spared the discussion of why they failed relative to deployment
issues, etc.  But the question of whether it is appropriate to
get rid of label types would remain.


b) In order to introduce a new label type: All DNS
infrastructure
 needs to understand the new label type before it is can be
 reliability used. Lots of DNS processing elements barf at
labels that
 they do not expect. For example number of firewalls drop
answers
 if the name of the first answer record is not compressed (a
 protocol violation)

Understood.  Of course, some of the same things could be said
about EDNS0 itself.


Based on this experience the DNSEXT felt that the best message
to send
out is new label types do not work, in the current Internet.
Deploying a new label type requires an effort similar to what
we are
going through right now with DNSSEC, upgrade all DNS protocol
processing elements, plus systems and processes that feed and
operate the DNS systems.

But, coming back to my example, this is exactly the problem with
internationalization.  If one is willing to settle for keeping
ASCII primary and applying a hack to accommodate non-ASCII
characters, then one can avoid that very long and expensive
transition effort.  We have such a solution in IDNA.  Some parts
of the external community (including, albeit largely for
historical reasons, a couple of very significant vendors) do not
believe that is a satisfactory solution and that it would be
better to have all characters that are considered valid treated
equally.

That puts your DNSSEC comparison into an interesting light.  I
believe that, when the DNSSEC effort started, the community
would have been appalled at how long deployment would take and
how painful it would be (with or without allowances were made
for reduced expectations).  But, as far as I know, we didn't
have a good alternative way to do the job even in retrospect,
so, presumably, the community decided that the pain and slow
deployment associated with DNSSEC was (and is) worth it. Is a
clean i18n model on a par with that?  I don't know (and I'm
personally willing to live with IDNA forever if we have to).
But I'm sure that some people would be willing to make the case
that such an i18n model is at least as important as DNSSEC and
worth whatever effort it would take.

As I've tried to say to Mark, based on the experience with
binary labels, I would have no problem if the document
deprecated binary labels, noted that deployment of different
label types is horrendously difficult and/or very slow and hence
not recommended unless the requirement is really important and
there are no plausible alternatives, and then just moved on.
There just doesn't seem to be nearly enough documented support
for moving beyond we had a bad experience to completely
discard the feature/ capability.

I also note that part of what you said is ...do not work, in
the current Internet.  I'm not sure what that means.  If it
means that the WG has reached the conclusion that there are some
set of possible extensions that are sufficiently problematic
(including different label interpretation models) that they are
simply incompatible with the current DNS, i.e., that those who
want them should be working on a plausible strategy for what is
variously called DNSng or DNS2, I think that would be great and
an extremely useful contribution, especially as 

Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-02 Thread Mark Andrews

 Labels only work when all the severs for a zone that has a new label type,
 in ADDITION sufficient fraction servers in all zones above that zone 
 MUST understand the new
 label type.

Not true. Binary labels could have been made to work by removing
the left hand label until the remaining suffix consisted of only
RFC 1035 labels, looking up the servers for that domain, then
resuming query processing using those servers similar to what we
do with DS lookups.

Such processing would be required for any new label type used in a
QNAME and would be a significant change to the standard query logic.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org


Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-01 Thread Mark Andrews

In message 56db6fe506a144d1183b9...@jck-hp8200.jck.com, John C Klensin writes
:
 
 
 --On Sunday, September 30, 2012 07:53 -0700 The IESG
 iesg-secret...@ietf.org wrote:
 
  
  The IESG has received a request from the DNS Extensions WG
  (dnsext) to consider the following document:
  - 'Extension Mechanisms for DNS (EDNS(0))'
draft-ietf-dnsext-rfc2671bis-edns0-09.txt as Internet
  Standard
  
  The IESG plans to make a decision in the next few weeks, and
  solicits final comments on this action. Please send
  substantive comments to the ietf@ietf.org mailing lists by
  2012-10-29. Exceptionally, comments may be sent to
  i...@ietf.org instead. In either case, please retain the
  beginning of the Subject line to allow automated sorting.
  
  Abstract
  
  
 The Domain Name System's wire protocol includes a number of
  fixedfields whose range has been or soon will be exhausted
  and does notallow requestors to advertise their
  capabilities to responders.  Thisdocument describes
  backward compatible mechanisms for allowing theprotocol to
  grow.
  
 This document updates the EDNS(0) specification (and
  obsoletes RFC2671) based on feedback from deployment
  experience in severalimplementations.  It also closes the
  IANA registry for extendedlabels created as part of RFC
  2671 and obsoletes RFC 2673 (BinaryLabels in the Domain
  Name System) which depends on the existence ofextended
  labels.
 ...
 
 Hi.  Apologies for not noticing this earlier, but this
 specification's deprecation of label types raises an issue that
 the document doesn't seem to address.
 
 Deprecating RFC 2673 is one thing.  Given deployment and
 operational experience, I don't know of anyone who would offer a
 strong defense of binary labels today.   However, the document
 doesn't offer a strong justification for deprecating label types
 entirely other than, it seems, that there has been only one
 example of their use and that failed.   If that were the only
 motivation, it would be a rather weak one, especially since
 having a capability that we don't use (but conceivably might in
 the future) would not appear to cause any harm.
 
 With the understanding that this is an example, not a proposal,
 it may be useful to review some of the history and context for
 IDNs.  IDNA represents community consensus as to the right way
 to proceed, but that consensus includes both people who believe
 it is a good permanent strategy and people who believe it is a
 good temporary/transition strategy until a better plan can be
 developed and deployed.   In particular, some of that latter
 group were painfully aware of the rate at which EDNS0 was
 deploying in the first half of the last decade, making them more
 receptive to IDNA (or other strategies that did not depend on
 changes to DNS servers or resolvers).
 
 So suppose the community really does decide that it wants
 DNS-based IDNs and that it wants to see if they can be developed
 and deployed within the existing DNS rather than moving to what
 some have called DNSng.  It is reasonably clear that what would
 be called just send 8 in the email community would not be
 acceptable if only because there are DNS uses outside the public
 network that use UTF-8 directly and others that use ISO 8859-1
 or other character coding and repertoires (RFC 6055 discusses
 some related issues).  The proposal/thought piece I produced in
 2001-2002 (with urging from some DNS-expert colleagues) to
 transition to a new, i18n-sensitive, Class might be part of the
 solution, but it is now clear that it would not be sufficient
 (at least without considerable special-casing that would violate
 both 1034/1035 and current trends).  A different label type that
 would permit specialized interpretations of the labels might be
 an important part of the puzzle.
 
 Would that be a good idea?  I don't know.  Personally, I believe
 that some of the expectations of and demand for IDNs cannot be
 met in the current DNS and that we should not try to go much
 further than IDNA: if more is really needed, then it should be
 accomplished either in an above DNS solution or by designing
 and deploying DNS2.  But I think it would be terribly unwise to
 eliminate a facility that might be useful for i18n simply
 because someone tried to use it for something entirely different
 and that effort did not succeed.
 
 Therefore:
 (1)  Did the WG consider i18n and other issues and possibilities
 before deciding to deprecate extended label types entirely?  If
 so, why aren't those considerations described in the document?
 We don't have a lot of codes left in the RFC 1035 space on which
 other label type models might be constructed.
 
 (2) Is there strong justification for deprecating extended label
 types, e.g., evidence that they would cause harm?
 
 (3) If the answer to either of both of the above questions is
 no, wouldn't it be wiser to simply deprecate the use of binary
 labels, urge great caution 

Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-01 Thread John C Klensin


--On Tuesday, October 02, 2012 12:22 +1000 Mark Andrews
ma...@isc.org wrote:

 Therefore:
 (1)  Did the WG consider i18n and other issues and
 possibilities before deciding to deprecate extended label
 types entirely?  If so, why aren't those considerations
 described in the document? We don't have a lot of codes left
 in the RFC 1035 space on which other label type models might
 be constructed.
 
 (2) Is there strong justification for deprecating extended
 label types, e.g., evidence that they would cause harm?
 
 (3) If the answer to either of both of the above questions is
 no, wouldn't it be wiser to simply deprecate the use of
 binary labels, urge great caution in allocating and using
 other label types, and then move on rather than eliminating
 the facility?
...
 I don't think we need to do this in label types.  An EDNS
 option would be sufficient to specify alternate normalisation
 rules should be applied to the QNAME when looking for data and
 when normalising the owner names when performing DNSSEC
 validation.

Mark,

First, it was just an example.   As I thought I made clear, my
main concern is about completely eliminating a facility because
one instance of trying to use it had not turned out to be as
useful as expected.  Absent demonstration that all possible uses
of the facility are actually useless or that the facility is
harmful, I don't think the case has been made for deprecating
it.   As far as that example is concerned, I don't think this is
the right place to review everything we've learned about i18n,
identifiers, and comparisons in the last couple of decades, but
normalization is just not a very large fraction of the problem.

john



Re: [dnsext] Last Call: draft-ietf-dnsext-rfc2671bis-edns0-09.txt (Extension Mechanisms for DNS (EDNS(0))) to Internet Standard

2012-10-01 Thread Mark Andrews

Closing the registry is not irreversable if it needs to be reversed.
It's not like we can forget that there were assigned code points
and anything that attempted to use those code points would have to
consider the fact that they were used at one time.

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org