[162416] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: What do people use public suffix for?

daemon@ATHENA.MIT.EDU (Joe Abley)
Mon Apr 15 12:31:34 2013

From: Joe Abley <jabley@hopcount.ca>
In-Reply-To: <31546939.2275.1366041623873.JavaMail.root@benjamin.baylink.com>
Date: Mon, 15 Apr 2013 12:30:59 -0400
To: Jay Ashworth <jra@baylink.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On 2013-04-15, at 12:00, Jay Ashworth <jra@baylink.com> wrote:

> Seems to me that it's a crock because *it should be in the DNS*.
>=20
> I should be able to retrieve the AS (administrative split) record=20
> for .co.uk, and there should be one that says, "yup, there's an
> administrative split below me; nothing under there is mine unless=20
> you also get an exception record for a subdomain".

I've always quite liked that idea (if we accept for the point of =
discussion that there are use-cases like cookie naming that make =
identifying this kind of boundary useful).

There's a concern though that there are multiple ways to spoof such a =
DNS response, and do so in a distributed fashion that might not be easy =
to detect by an individual client application. If the AS (or whatever) =
record was signed, that would make things better. But only if you could =
rely upon clients to validate those responses (or have a sufficiently =
clean DNS path out that validation was even possible).

There's also the question of what to do with a TLD (or other part of the =
namespace) that doesn't include this record. Some of the zones we're =
talking about are generated by registry machinery with long software =
development lifecycles.

If your starting point is (a) the records might not be there, (b) we =
might not be able to find them even if they are there, and (c) if we get =
them we can't always be sure they are genuine, then the natural =
conclusion is that you can't rely on the mechanism to work and you look =
for another answer.

If you need the mechanism to work (say you're say a browser vendor who =
is going to get heat if cookie-leakage causes widespread privacy =
violations) then I can see why fetching and caching a browser list over =
SSL (and perhaps shipping with a baseline version of it) seems =
attractive.

And that I guess takes us back to where we are.


Joe



home help back first fref pref prev next nref lref last post