Internet-Draft | DNS Private Namespace Options | November 2020 |
Hardaker | Expires 6 May 2021 | [Page] |
This document discusses the trade-offs between various options about creating a private namespace within top level domains within the root zone.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 6 May 2021.¶
Copyright (c) 2020 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.¶
HATS: The author is not wearing any hats while writing this document.¶
Deployed DNS clients within the Internet typically communicate with upstream resolvers using their own in-application stub resolver. These upstream resolvers may be run by ISPs, or may be a customer-premises equipment (CPE) that may or may not forward requests to its upstream ISP.¶
In an entirely singular Internet DNS there would be no name collisions as all data is uniquely named. However, the prevalence of local private name spaces within companies, organizations, governments, home LANs, etc have shown that existence of a single, unique naming system rarely exists. The deployment of Internet of Things (IoT) devices is only accelerating this trend for private namespaces by devices that bootstrap their names with the easy solution of "just make one up until the customer provides us with a better one", followed by the customer never providing one. This document makes no judgment on whether this is right or wrong, and takes this assumption as simply the state of the current world.¶
The for special use names is well spelled out in [RFC6761]. [RFC8244] provides additional insight into areas that are still under discussion and where work is needed. Recently ICANN's SSAC has issued [SAC113] entitled "SSAC Advisory on Private-Use TLDs", wherein it suggests the creation of a private-use DNS TLD.¶
This document considers the aspects associated with DNSSEC and the potential choices for a private-use TLD (also see [RFC8244] bullet 21). Specifically, we consider the case where somewhere in the resolution path DNSSEC validation is in use, potentially at an end-device (phone, laptop, etc), a CPE, or at an ISP's resolver.¶
This document is not a fully complete analysis, but rather a starting point for discussion and continued analysis by both the author and others that wish to contribute.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
Note that this analysis is not (yet) exhaustive. It does describe some of the differences in the two approaches.¶
We make the following assumptions to begin:¶
Given these assumptions, we consider the cases where a private namespace TLD exists that is:¶
This document recognizes that .zz itself is actually not necessarily a normal special use domain, and [RFC6761] may not apply as its an ISO reversed name. However, in other aspects it will behave like a special-use registered domain and its under current consideration by dnsop so we leave it in here as the example name.¶
In summary:¶
The next two sections mix together DNSSEC validation at end-devices and resolvers; it would add significant more clarity to discuss them individually, which will be done in a future version.¶
An unsigned TLD such as .internal will:¶
A special-use TLD will:¶
During initial deployment of either of these, there is a fundamental difference for validating resolvers.¶
Specifically, until all validating resolvers are updated with a new TA for specific instances under a special-use TLD (e.g. .zz), the resolvers will fail to validate any names underneath as .zz is provable insecure. This could take a while to update all deployed validating resolvers.¶
On the other hand, deploying a newly allocated, unsigned TLD will take a long time in process both within the IETF and within ICANN.¶
And each may have impacts on what error processing results, based on the differing resolution characteristics (Section 2.2.2, Section 2.2.3).¶
This author recommends that the IETF take on both tracks simultaneously, and:¶
This leaves vendors the freedom to chose that path that best meets their specific requirements. Recommendations about how to best select one given their situation is hinted above, but should be more formally written down in this document or others.¶
Unfortunately, here be dragons. Selecting a good name has been discussed multiple times in the IETF, and has always resulted in a lack of consensus. In part, this is because the IETF doesn't have the skillsets needed to hold a discussion about what language element(s) would be best for universal adoption and usage.¶
Instead, this author recommends that we direct ICANN to select the names that should be used for both of these cases. ICANN has significant more skill breadth in the area of selecting names best suited to be understood by end-users. This discussion will not be faster, however, within ICANN but this author believes a resolution in that SDO will be more likely successful.¶
Thus, the IETF can make the technical recommendation and ICANN can implement these two choices.¶
TBD¶
(though much of this draft is a security considerations itself)¶
Large portions of the technical analysis in this document derives from a discussion with Roy Arends and Warren Kumari (back when we could stand in front of a whiteboard together).¶