Internet DRAFT - draft-tjw-dbound2-problem-statement
draft-tjw-dbound2-problem-statement
DBOUND2 T. Wicinski
Internet-Draft 10 July 2023
Intended status: Informational
Expires: 11 January 2024
Domain Boundaries 2.0 Problem Statement
draft-tjw-dbound2-problem-statement-01
Abstract
Internet clients attempt to make inferences about the administrative
relationship based on domain names. Currently it is not possible to
confirm organizational boundaries in the DNS. Current mitigation
strategies have there own issues. This memo attempts to outline
these issues.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 11 January 2024.
Copyright Notice
Copyright (c) 2023 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Wicinski Expires 11 January 2024 [Page 1]
Internet-Draft DBOUND2 Problem July 2023
Table of Contents
1. Introduction and Motivation . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Simplifying the list of possible Use Cases . . . . . . . . . 3
3.1. HTTP State management cookies . . . . . . . . . . . . . . 3
3.2. Service Boundaries in shared cloud environments . . . . . 4
3.3. Network resource boundaries in shared cloud
environments . . . . . . . . . . . . . . . . . . . . . . 4
4. Security Considerations . . . . . . . . . . . . . . . . . . . 5
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
6. Normative References . . . . . . . . . . . . . . . . . . . . 5
7. Informative References . . . . . . . . . . . . . . . . . . . 5
Appendix A. Acknowledgements . . . . . . . . . . . . . . . . . . 5
Appendix B. Appendix . . . . . . . . . . . . . . . . . . . . . . 5
Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 5
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 5
1. Introduction and Motivation
Working off of the earlier problem statement
[I-D.sullivan-dbound-problem-statement], which we still consider
valid. Various Internet protocols and applications require some
mechanism for determining whether two domain names have some
relation.
The concept of an administrative boundary is by definition not
present in the DNS. Relying on the DNS to divine administrative
structure thus renders such solutions unreliable and unnecessarily
constrained. For example, confirming or dismissing a relationship
between two domain names based on the existence of a zone cut or
common ancestry is often unfounded, and the notion of an upward "tree
walk" as a search mechanism is, therefore, unacceptable.
Currently, the most well known solution in existence is the Public
Suffix List (PSL). The PSL is maintained by and is kept current by
volunteers on a best-effort basis. It contains a list of points in
the hierarchical namespace at which registrations take place, and is
used to identify the boundary between so-called "public" names (below
which registrations can occur, such as ".com" or ".org.uk") and the
private names (organizational names) that domain registrars create
within them. When this list is inaccurate, it exposes a deviation
from reality that degrades service to some and can be exploited by
others. As the PSL is the de-facto resource, and as there is not a
more comprehensive, alternative solution for relationship
identification, the PSL has often been misused to accomplish things
beyond its capabilities. For example, there is no way to confirm the
relationship between two domain names -- the PSL may only signal that
Wicinski Expires 11 January 2024 [Page 2]
Internet-Draft DBOUND2 Problem July 2023
there is or is not a public boundary between the two. Additionally,
there are questions about the scalability, central management, and
third-party management of the PSL as it currently exists.
Applications and organizations impose policies and procedures that
create additional structure in their use of domain names. This
creates many possible relationships that are not evident in the names
themselves or in the operational, public representation of the names.
(This document is currently being edited at
https://github.com/moonshiner/draft-tjw-dbound2-problem-statement)
(https://github.com/moonshiner/draft-tjw-dbound2-problem-statement))
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP
14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here. DNS terminology is as described in
[RFC8499].
3. Simplifying the list of possible Use Cases
A main topic that immediately arises from this discussion is the
replacement of the Public Suffix List (PSL). Currently, this
document is not looking at the problem space with regards to it.
From the previous problem statement, the one use case which
3.1. HTTP State management cookies
* Cookies that have the same-site in browsers. For example:
allowing www.example.com to respond with a set-cookie for
example.com so *.example.com will work.
not allowing example1.co.uk to respond with a set-cookie for
example2.co.uk.
* CA wildcards: it's OK to sign a cert for *.example.co.uk or
*.example.com but not for .co.uk or *.com.
Other applications and organizations impose policies and procedures
that create additional structure to express many possible
relationships, such as in first-party-sets or IDN-UA. These are not
always evident in the names themselves, and any solutions developed
here may or may not suit these existing policies and procedures.
Wicinski Expires 11 January 2024 [Page 3]
Internet-Draft DBOUND2 Problem July 2023
3.2. Service Boundaries in shared cloud environments
A public cloud provider may have a large number of boundaries they
need to publish. Taking an example resource within an example
service, that resource might have a domain name that follows the
below pattern (2LD may vary):
"resource-id.cluster-id.servicename.region-name.example.com"
With the current PSL, the need may exist to publish 1+ records per
region per service. If there are many services across many more
regions, these updates do not scale. Putting this information into
DNS allows us to publish records, without manual updates.
3.3. Network resource boundaries in shared cloud environments
Network suffixes and resouces that are public, but not routable or
resolvable outside of one's network (public-like-PSL, not public-
like-pool). A good example is an internal zone within a virtual
private clouds (VPCs).
VPCs are resources customers can create, which reserves them a
logically-isolated portion of AWS's network. Within each VPC, there
is a VPC-internal DNS zone which contains DNS records for resources
within the VPC (suffix zone of "compute.internal" or equivalent),
which is separated per-VPC. Every network interface in a VPC will
have an associated per-interface record in this zone (for VPCs using
a default configuration).
These customers may chose to peer their VPC with another customer,
and these VPC-internal zone would now have multiple different
customers operating within it.
* Linking domains together
In terms of specific use cases, within the realm of email there is a
desire to link an arbitrary fully-qualified domain name (FQDN) to the
organizational domain name (at some point in the namespace above it),
in order to identify a deterministic location where some sort of
statement of policy regarding that FQDN can be found.
There is another growing use case within organizations that need to
identify relationships between different FQDNs, but also different
top level domains. However, there is also desire to reliably
identify relationships outside of the realm and constraints of the
namespace tree.
Wicinski Expires 11 January 2024 [Page 4]
Internet-Draft DBOUND2 Problem July 2023
4. Security Considerations
None at this time.
5. IANA Considerations
None at this time.
6. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
7. Informative References
[I-D.sullivan-dbound-problem-statement]
Sullivan, A., Hodges, J., and J. R. Levine, "DBOUND: DNS
Administrative Boundaries Problem Statement", Work in
Progress, Internet-Draft, draft-sullivan-dbound-problem-
statement-02, 18 February 2016,
<https://datatracker.ietf.org/doc/html/draft-sullivan-
dbound-problem-statement-02>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
[RFC8499] Hoffman, P., Sullivan, A., and K. Fujiwara, "DNS
Terminology", BCP 219, RFC 8499, DOI 10.17487/RFC8499,
January 2019, <https://www.rfc-editor.org/info/rfc8499>.
Appendix A. Acknowledgements
The author leans heavily on the initial problem statement and thanks
Andrew Sullivan, John Levine, Murray Kucherawy and Paul Vixie for
comments and suggestions.
Appendix B. Appendix
Acknowledgements
Author's Address
Tim Wicinski
Elkins, WV 26241
United States of America
Wicinski Expires 11 January 2024 [Page 5]
Internet-Draft DBOUND2 Problem July 2023
Email: tjw.ietf@gmail.com
Wicinski Expires 11 January 2024 [Page 6]