Network Working GroupJ. AbleyG. Huston Internet-DraftDyn, Inc.APNIC Intended status: Informational P. Koch Expires:September 21,November 25, 2016 DENIC eG A. Durand ICANN W. Kumari GoogleMarch 20,May 24, 2016 Problem Statement for the Reservation of Top-Level Domains in the Special-Use Domain Names Registrydraft-adpkja-dnsop-special-names-problem-02draft-adpkja-dnsop-special-names-problem-03 Abstract The dominant protocol for name resolution on the Internet is the Domain Name System (DNS). However, other protocols exist that are fundamentally different from the DNS, and may or may not share the same namespace. When an end-user triggers resolution of a name on a systemwhichthat supports multiple, different protocols (or resolutionmechanisms) for name resolution,mechanisms), it is desirable that the protocol used is unambiguous, and that requests intended for one protocol are not inadvertently answered using another. RFC 6761 introduced a framework bywhich, under certain circumstances,which a particular domain name could be acknowledged as being special.This framework has been used twice to reserve top- level domains (.local and .onion) that should not be used within the DNS, to avoid the possibility of namespace collisions in parallel use of non-DNS name resolution protocols.Various challenges have become apparent with this application of the guidance provided in RFC 6761. This document aims to document those challenges in the form of a problemstatement,statement in order to facilitate further discussion of potential solutions. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire onSeptember 21,November 25, 2016. Copyright Notice Copyright (c) 2016 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1.Terminology . . . . . .Introduction: DNS, Name space or Name Spaces, Name Resolution Protocols . . . . . . . . . . . . . . . . . . .3 2. Introduction. . . . . . . 2 2. IETF RFC6761 Special Names . . . . . . . . . . . . . . . . . 3 3.RFCIssues with 6761 . . . . . . . . . . . . . . . . . . . . . .. . . .4 4.Architectural Considerations . . . . . . . . . . . . . . . . 6 5. Technical Considerations . . . . . . . . . . . . . . . . . . 8 6. Organizational Considerations . . . . . . . . . . . . . . . . 9 6.1. External Organizational Considerations . . . . . . . . . 9 6.2. IETF Internal Considerations . . . . . . . . . . . . . . 10 6.2.1. Process . . . . . . . . . . . . . . . . . . . . . . . 10 6.2.2. Technical Criteria . . . . . . . . . . . . . . . . . 11 6.2.3. NameCandidate string evaluation. . . . . . . . . . . . . . . . . . . 12 6.3. Theand relationship with ICANNprocess to evaluate names . . . . . . . .. . .13 7.5 5. Security Considerations . . . . . . . . . . . . . . . . . . .14 8.6 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . .15 9.6 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . .15 10.6 8. References . . . . . . . . . . . . . . . . . . . . . . . . .15 10.1.6 8.1. Normative References . . . . . . . . . . . . . . . . . .15 10.2.6 8.2. Informative References . . . . . . . . . . . . . . . . .157 Appendix A. Editorial Notes . . . . . . . . . . . . . . . . . .167 A.1. Venue . . . . . . . . . . . . . . . . . . . . . . . . . .177 A.2.Pithy Quotes from History . . . . . . . . . . . . . . . . 17 A.3.Change History . . . . . . . . . . . . . . . . . . . . .17 A.3.1.7 A.2.1. draft-adpkja-special-names-problem-00 . . . . . . . .177 Appendix B. Change history . . . . . . . . . . . . . . . . . . .177 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . .188 1.Terminology Clear and unambiguous use of terminology is important for the clear formulation of any problem statement. TheIntroduction: DNS, Name space or Name Spaces, Name Resolution Protocols For a very long time, DNSprotocol suffers from impreciseandoverloaded terminology (for example, see [RFC7719]). The use of terms and concepts from other naming systems that are similar (but different) simply confuses matters further. In the interests of clarity, the following terms used in this document are to be interpreted as follows: Registry (n): the Special-Use Domain Names Registry created by [RFC6761] and published at [IANA-SPECIAL-USE]. [This section to be completed following review and refinement of the rest ofthetext.] 2. Introduction Some systems use the last label in anameto actspace have been perceived asa switch to a different, non-DNS resolution process - examples of such switches include: .local (to use mDNS) and .onion (to use Tor). This switch practice is not explicitly documented anywhere,one and themethod for accomplishingsame. However, thisvaries by implementation. As an interesting aside,has not always been thefull semantics of domain names isn't really documented anywhere either, although [I-D.lewis-domain-names] is a current attempt to rectify this. This technique of usingcase; in thelast label as a switch has a number of properties which make it attractive to people implementing alternatepast, other name resolutionsystems, including: o The namesprotocols were popular. One canfollowremember NIS, NIS+, host files, UUCP addresses... Most of those have been obsoleted by thecommonDNSsyntaxin the late 1990s. More information on the history ofLDH labels, separated by dots. This means that thesenames and namespaces can beenteredfound inany application which takes existing DNS names. o The switch to the[I-D.lewis-domain-names]. More recently, new name resolutionprocess can be implemented inprotocols have been proposed, each addressing anumber of ways, such as custom application code,particular need or ashim inparticular community. For example, thenormal DNS resolution process, or onDONA handle system has been used by thesystem's configured DNS servers. opublication industry. Thenames "look" like namesApple "Bonjour" set of protocols, inspired by what was available on Appletalk networks, has been developed tousers. Note that [RFC6303] defines "locally served zones".perform automatic name resolution on a local IP network. Theimportant differenceTOR project isthat in [RFC6303], the names get registered for special treatment if they are already special: they are not declared special by the registration. [RFC6761] defines ways to reserve domain names. This could be read to augment the technical uses exemption made in [RFC2860] (also called "the IETF-ICANN MoU"). [RFC2860] says: "Note that (a) assignments of domain names for technical uses (such as domain names for inverse DNS lookup), (b) assignments of specialized address blocks (such as multicast or anycast blocks), and (c) experimental assignments are not considered to be policy issues, and shall remain subject tousing theprovisions of this Section 4." The framework in [RFC6761] has recently been usedonion system toreserveobfuscate communications, the.onion label, allowing itGNU Name System (GNS) system is using block chains tobe used asbuild aswitchdecentralized name system tothe Toroffer "privacy and censorship resistance". Many more have been proposed. Those alternate name resolutionprocess, as described in [RFC7686]. Because the .onion label in the IANA "Special-Use Domain Names" registry [IANA-SPECIAL-USE], the Tor Project can be assured that there willprotocols do notbe a .onion TLD created in the IANA rooted DNS, and thus the possibility of collisions in the namespace will be avoided. The discussions in the DNSOP Working Group (WG) and the IETF Last Call processes for the .onion registrationexist inthe Special Use Domain Names registry (1,200 messages)a vacuum. Application developers havemade it apparent that clarity about if and how to treat this "protocol switching" practice would helpexpressed alotstrong desire to build their software so it will function indeciding the merit of future similar applications. One possible outcomeany of those universes with minimal changes. Doing so means that thediscussion would be to declinesoftware has to recognizesuch usagedeterministically what kind ofdomain names in the architecture; another possible outcome is to formalizename it is dealing with andbetter understand the issues that comeassociate it withit. An additional consideration is that names which followtheDNS syntax (including those which use alternatecorresponding nameresolutions processes to the DNS) are in the same namespace as names in the DNS. This means that currently both the IETF (through [RFC6761]) and ICANN are making allocations or reservations from a shared namespace. Ifresolution protocol. Because of thiscontinues to be the case, in orderdesired lack of explicit signaling, an algorithmic solution frequently chosen by application developers consists simply toavoid conflict, close coordination betweenuse a special tag padded at thetwo organizations is necessary. 3. RFC 6761 Section 5end of[RFC6761] describes seven questions to be answered to justify how and whyaparticular domainnameis special. These seven questions can be broadly categorized as follows: 1. impact on end-users; 2. impact on applications; 3. impact onto indicate an alternate name resolutionAPIs and libraries; 4. impact on recursive resolvers; 5. impact on authoritative DNS servers; 6. impact on DNS server operators; 7. impact on DNS registries and registrars. The intent of those seven questions was originally to serve as the justifications for why a proposed special-use registration should be granted, demonstrating that it (a) provides a result that the community judges to be good, and (b) the aforementioned good result cannot reasonably be achieved in another way. The rough consensus from significant discussion was that .onion did satisfy both (a) and (b), but this was not clearly demonstrated by the answers to the "seven questions". Furthermore, it is unclearmethod. Examples: ifand how these questions could reliably and unambiguously be used to make the determination, leading to the conclusion that they are generally inadequate for making the determination whetheraparticular domainnamequalifies as requiring special/different treatment. Applications which follow the [RFC6761] process are likely to devolve into a "beauty contest". Moreover, the answers to the seven questions are not availableends ina machine readable form to applications that want to follow [RFC6761]. So.local, theanswers to these seven questions can better be seen as providing guidance tosoftware uses thecorresponding seven audiencesApple Bonjour protocol based onhow to handle a special-use domain name once it has been reserved by inclusion inmulticast DNS; if theRegistry, and not as entrance filters for inclusionname ends in .onion, it uses theregistry. The answers toTOR protocol; if theseven questions specify desired behaviorname ends in .gnu, it uses theinternet for handling a particular domain name, not the basis for deciding whether the effort to implement special behavior across all of those audiences is worth the cost. This indifferenceGNS protocol, etc... One noteworthy exception tocosts is not necessarily scalable for making future decisions about potential inclusion in the registry. The justification in [RFC6761]this approach isconcerned withtherationale of reserving a domain nameDONA system thatprecludes its subsequent use as a top level domain name. However, the document fails to offer such a rationale,exists independently andinstead requireshas developed its own interoperability solution with thejustificationDNS. A result of thereserved name to include the provision of guidance toabove is that a number ofaudiences (users, application developers, DNS resolver applications, DNS resolution service operators, and name registries and registrars) as to how to handle namesapplications have been developed (and massively distributed) thatare listed in this registry. But this guidance is not, in and of itself, an adequate rationale for the selection ofhave encoded their favorite "tag" as aparticular name value to be reserved in this registry. What is missingDNS TLD in[RFC6761] is the consideration of the name itself. If one were to contrast the procedures relating to the admission ofaname to thefree-for-all, beginning their existence squatting on that DNS space... .local, .gnu, .onion started out like that. 2. IETF RFC6761 SpecialUse Name registry to the processes associated with the New gTLD Program operated by ICANN [NEW-GTLD], then it is evident that theNames The IETFprocess does not admit many considerations which appear to be areas of evaluation inused a provision from theNew gTLD program. More on this inIETF/ICANN MoU [RFC2860] sectionSection 6.3. This document proposes to categorize considerations related to the usage4.3 that says that "(a) assignments ofthe [RFC6761] registrydomain names forprotocol switches in 3 categories: Architectural, Technical and Organizational. This document then lists a number of questions to drive the discussion. The list of issues discussed heretechnical uses" isnon-exhaustive. However, some people have noted that [RFC6761] describes other alternative special handling aside from protocol switches. That alternative special handling mustto be consideredcarefully at the time of publication of the defining RFC, regardless ofthenaturepurview ofthe special use. 4. Architectural Considerations The first thing to consider in this discussion is that not all names (or domain names) are partIETF (as in, outside of theDomain Name System. See [I-D.lewis-domain-names] for an in-depth discussion on this topic. At the timescope ofwriting, two top-level domain names reserved by inclusion in the Registry went through the [RFC6761] process and are used by name resolution protocols other than the DNS: .local is used by the Multicast DNS protocol specifiedICANN) in[RFC6762] which is similar in some respects to the DNS, but which uses a different well-known port number and is limitedorder to create aparticular multicast scope; .onion is usedway toconstructreserve such namesthat designate services reachable via the Tor network using onion routing. These two name resolution protocols are, to varying degrees, different from the DNS, and the namespaces usedineach naming scheme are also different. The top-level label is effectively being used asaname resolution protocol identifier. At the core of the issue is that different "strings" that look like "domain names" (i.e. are within the same name space) but are not DNS names are used interchangeably in the URI (or URN). In particular, DNS imposes constraints on name syntax. An examplelist ofsuch constraints"special names". That process isthe 63 octet limit per label. Strings useddocumented inthe .onion domain do[RFC6761] (which curiously does nothave that constraint. It could be argued that indirectly refer theabsence of a more elegant alternative, a pragmatic choice to embed protocol selectors as namespace tokens has effectively already been made. The running codeIETF/ICANN MoU). It was first applied for .local andeffective consensusmore recently for .onion. When that process was put inhowplace, itshouldwas thought it would only be usedby significant user bases should not be discounted. Although the reservationa handful ofnames in the DNS namespace can betimes. However, a large number of applications have since been madeat any level, the two examples above demonstrate use-cases for reservation atto thetop-level, and hence that case must be considered.IETF. Theunderlying discussion here is the tussle between the applications.onion evaluation took almost a year and has started a massive (and often heated) discussion in thenetwork. Application architects see usingIETF. This [RFC6761] process to reserve special nametags (such as .onion) as an easy way to get new features deployed. They consider the hurdles of deploying new URI schemes such as http:/onion/onion-name as too onerous and too slow to deploy for their needs. Network architects worry of overloading the semantics of DNS names and/or creatinghas aname spacenumber of issues, thatis larger than the DNS namespace. They refer to bad precedents such as .uucp and .bitnet. The fundamental point to consider here iscan be grouped in two categories: o Issues with [RFC6761] itself, including issues discovered during theunicity (or multiplicity)evaluation ofthe name space. Are we talking about one namespace.onion o Higher level issues regarding candidate string evaluation and relationship withdifferent resolution protocols or independent name spaces?ICANN 3. Issues with 6761 1. Itmight itcan behelpfuluse topoint out that the property of interest here is the assurance of uniqueness of a name, and another way of thinking about the question is whether it applies across domain names as people expect or needreserve any names, not just TLDs. For example, itto? None of this would matter if people didn't expect names constructed according to whatever rules they're following tocould potentially beunique acrossused to forbid aset ofregistrar to register specific namesthat spans multiple operating environments and resolution protocols. In [RFC2826] the IAB noted that "To remain a global network, the Internet requires the existence of a globally unique public name space. The DNS name space is a hierarchical name space derived from a single, globally unique root." "Maintaining a globally-unique public namespace that supports different name resolution protocols is hence an architectural requirement, and some facility for reservation of top-level domainsinthe DNS is necessary." If we were to accept the notion that the last label of a domain name is actually a protocol switch, we are actually building a catalog of all top level domains and what resolution protocol each one invokes. Note that such a catalogany TLD. 2. [RFC6761] does notformally exist today, because [RFC6761] is an exception list tomention if thegeneral caseprotocol for which it issupposedrequested touse regular DNS as resolution protocol. Such a catalog may remainreserve aconcept to guide this discussion orstring should beimplementedpublished as anactual IANA registry [IANA-SPECIAL-USE]. In effect, it would associate TLDs with indications on howRFC document. Most applicationsand resolvers should treat them. However, such an approach would leave open the question of not-yet- defined TLDs. No resolution mechanism could be associated with those in advancehave, sothat systems would have to continue to assume that such names are part offar, come from outside organizations, and theDNS. For reasons of completeness it is noteddescribed protocols thatsuggestionshave not beenmade to help the distinctiondeveloped byusing special labels (as in IDNs). It should also be noted that there are choices for a protocol switch other than reserving labels. In particular, a proposal to move those protocol switches under a specific top level domain has been discussed (.ALT). If that architecture choice is made, some of the questions listed inthesections below would become moot. Note:IETF. 3. [RFC6761]mentions the reserved names could be any label in a domain name,does notjustprovide clear enough direction as to what party is responsible for carrying out therightmost one (or ones). However, this creates a number of complicationsevaluation. 4. There are ambiguities andhas not seen much support inno formal criteria on how thecommunity asIETF can (or even whether the IETF should) evaluate the merits ofnow. 5. Technical Considerations Eachapplicants to [RFC6761] reservations. Section 5 ofthe[RFC6761] describes seven questionsposedto be answered by an applicant for [RFC6761]hasstatus. However, running this process for thepotential to describe why it may be necessary.onion application showed that those seven questions are inadequate forspecial handling ofmaking therequested name(s) in applications bydetermination for whether a particularaudience. However, aside from reserving the name, it is not entirely clear what any of those audiences might further expectstrings qualifies as requiring special/different treatment. 5. Placing aresult of a successful request to add a top-level domain to the Registry. For example, reservation of a top-level domain bystring in theIETF[RFC6761] registry does not guarantee that DNS queries for names within a reserved domain will not be sent over the Internet.The requirements of the operators of recursive resolvers inAs such, theDNSapplicant for [RFC6761] status cannot berelied uponguaranteed that leakage will not occur and will need tobe implemented; the impact ontake this into account in theoperatorsprotocol design. Useful reservations ofDNS authoritative servers hence cannot be reliably assumed totop-level domains should bezero. In the caseaccompanied by documentation of[RFC7686], leakagerealistic expectations of.onion queries on the Internet might lead to disclosureeach ofprivate information that, in some cases, might pose a risk tothepersonal safetyseven audiences, and the evaluation ofend-users. Atparticular requests should consider thetimepractical likelihood ofwriting,those expectations being met and the implications if they are not. 6. The [RFC6761] registry lists the reserved names but does not include directguidanceguidance, neither in free text form nor in machine readable instructions, for any of the seven audiences, relying instead upon a reference for each entry in the Registry to the document that requested its insertion. Such documents might well be opaque to many readers; [RFC6762] is a seventy-page protocol specification, for example, which is arguably not the most effective way to set expectations of non-technicalend-users). Useful reservations of top-level domains should be accompanied by documentation of realistic expectations of each of the seven audiences, and theend-users 4. Candidate string evaluationof particular requests should consider the practical likelihood of those expectations being metandthe implications if they are not. Here is a non-exhaustive list of additional questions that have surfaced in discussion of requests for names to be added to the Special Use Names registry: What does it mean to have a "non-DNS" entry in the registry described above? Are applications supposed to check that registry to know what to do? Can, or should, applications do this check dynamically? What if an application makes this dynamic check and discovers the name contains a switch itrelationship with ICANN 1. IETF does notknow how to handle? Similar questions applies to resolvers (DNS and non-DNS); what is the expected behavior? One particular avenue of investigation would be to see if such considerations could be encoded in machine understandable code in an extension of the current [RFC6761] registry. 6. Organizational Considerations This section gives two categories of organizational considerations: external and internal. 6.1. External Organizational Considerations The policy surrounding the implementation and management of top-level domains in the DNS has been developed using a multi-stakeholderhave processconvened by ICANN accordingto evaluate theMoU between ICANN and IETF [RFC2860]. It is out of scope for this documentproposed strings candidate torevisit that MoU. While discussing the particular attributes that make a domain name special,[RFC6761]notes that "the act of defining such a specialstatus for things like trademark, IPR, namecreates a higher-level protocol rule, above ICANN's management of allocatable names oncollision, etc.. Instead, thepublic Internet." [RFC2860] draws a line between what is policy and what is technical. A variety of opinions have been expressed regarding whether [RFC6761] blurs this line. In particular, [HUSTON] has one viewpointIETF relies onthe topic. As noted earlier, it is out of scope for thisdocumentto analyse this issue beyond noting that such a variety of views exist. Taking a different perspective, it has been argued that [RFC6761] specifically extends the DNS protocol to include special treatment for names in the registry,reviews, working group andthat there's nothing in [RFC2860] at all that limits the IETF's authority to changeIETF-wide last call, and ultimately a decision is made by theprotocol. However, it shouldIESG. That decision can benoted that, if the IETF wereappealed, first toformalizetheconcept of protocol/name switch in the Internet architecture, coordination would be require between ICANNIAB andIETF on such names. Using the analogy described above of a catalog/registry of such switches, care must be takensecond tomake sure we do not end up with two process streams allowed to create entries without complete synchronization. 6.2. IETF Internal Considerations 6.2.1. Process [RFC6761] specifiestheway in which "anISOC board of trusties. 2. The IETF'Standards Action' or 'IESG Approval' document" should present answers to the questions described above (see Section 2), but does not describe the"review" processby which the answers to those questions should be evaluated. For example, itis notclear who is responsible for carrying out an evaluation. Afoolproof. [RFC7788] describing the "home networking control protocol" was recently published. That documentwhich requests additionsincludes text instructing devices tothe Registry might be performed by the IESG, by the IAB,use names terminating by default with theDNSOP WG, by an ad-hoc working group, by expert review or any combination of those approaches..home suffix. [RFC7788] did not reference [RFC6761]providesanywhere and had nodirection. As an illustration of the inconsistency that has been observed already, [RFC6762]IANA sections about this reservation. It was publishedas an AD-sponsored individual submission in the INT area, and the IESG evaluation record does not reveal any discussion of the reservation of the .local top-level domain inwithout anyone noticing this during theDNS. [RFC7686], however,entire review process. The issue waspublished as a working group document throughcaught after theDNSOP WG,publication, and anextensive discussion by both the participants of the DNSOP WG and the IESG on the merits of the request took place. The evaluation process, in the absence of clear direction, is demonstrably inconsistent. We should point to [RFC5226] and explicitly quote the definition of "Standards Action" or "IESG Approval": IESG Approval is not intended to be used often or as a "common case"; indeed, it has seldom been used in practice during the period RFC 2434errata wasin effect. Rather, it is intendedpublished. 3. There exists now at least 2 streams tobe available in conjunction with other policies as a fall-back mechanism in the case where onetake strings out of theother allowable approval mechanisms cannot be employed in a timely fashion or for some other compelling reason. IESG Approval is not intended to circumvent the public review processes implied by other policies that could have been employed for a particular assignment. IESG Approval would be appropriate, however, in cases where expediency is desiredglobal namespace: IETF RFC6761 "special names" andthere is strong consensus for making the assignment (e.g., WG consensus). So, while itICANN "gTLD program" (see [NEW-GTLD]). It isvery interestingimportant tonoteobserved that[RFC6761] was an AD sponsored individual submission in spite of two active DNS related WGs, [RFC6762] is probably clean: it defines the protocol and is itself on standards track. [RFC7686] however, while on standards track, does not define the TOR protocol, so it was used to fulfill the 'standards action' requirement bytheletter. It contains normative references to non-IETFprotocols, which is noteworthy. A comparison of the two "seven question forms" from [RFC6761] reveals thatRFC6761 reservations could happen in a ad-hoc fashion atleast the responses to questions 2, 3, and 4, differ significantlyany time, whilethere is no defined way to communicate the difference to the affected software entities. An alternate view has been expressed with regard to the protocol evaluation. It states that the authority belongs to the IESG to seek whatever support it likes, within the established process,ICANN delegations typically happen inmaking standards decisions, including delegating evaluation of a specific registry change proposal to a WG or a directorate. The IESG might have varied what guidance it sought, but that does not constitute "inconsistency" under the process. That being said, more complete evaluation guidance would be helpful to the IESGbatches, and thecommunity. 6.2.2. Technical Criteria Regardless of the actual name being proposed as protocol and/or namespace switch, itlatest gTLD round isalso not clear what technical criteria the evaluation body should use to examineclosed. Note: themerit of anICANN gTLD applicationfor such a reserved name/protocol switch. For example,process islarge scale prior deployment an acceptable criteria? A number of people have clearly answered "no" to that question as it would only encourage "squatting" on names. However, in the case of .local and .onion, those particular domain names were already in use by a substantial population of end-users at the time they were requested to be added to the Registry. Rightly or not, the practical cost of a transition away from the requested strings was argued as a justification for their inclusiondescribed in theregistry. 6.2.3. Name evaluation With regard to the actual choice of name, [RFC6761] is silent.applicant guide book [GUIDEBOOK]. 4. Theanswers to the seven questions are expected to tell how a name, presumably already chosen outside of the process, might be handled if it is determined to be a "special use" name. However, itmajor risk issilent on how to choose a name or how to evaluatehaving aspecific proposed name. Going back toconflict when both the IETFprocess used for the evaluation of .localand.onion, one might ask the following questions: For example, what consideration have there been in the intellectual property rights in the reservation of a name in this Special Use Name registry, and what procedures should be followed in the case of a dispute over the rightsICANN want to usea name in this manner? Also, to what extent could such a reservation of a name in this Special Use Names registry be used to block competing interests and/or competing technologies? What are the competition and consumer issues that need to be considered ifthereservation of a name in this registry causes some form of exclusive access and reduced competitive access,same orwhere there is no ability for consumers to exercise choice in a situation where providers compete in the offering of services? A related consideration is that the current process of admission to the Special Use Name registry appears to admitsimilar strings. There exist noformal assessment of environmental impact. Is the name that is proposed to be entered into this registry already being used in local contexts, with or without an association with DNS name resolution, such that its use as a reserved name through an entry in this registry, and its continued use in local contexts could cause harm to users? To what extent can this impact be assessed, and what level of impact is considered acceptable? While the "seven questions" relate to altered behaviors by specific audiencesdefined cooperation between ICANN andusers of names there is no explicit consideration of the security in this process. Is the registration of such a name a "safe" action for theIETF totake? To what extent could the use ofavoid thisreserved nameproblem. 5. There might beused in a hostile or malicious manner? What measures have been taken to mitigate or otherwise address such potential vulnerabilities? ICANN has created an entire set of groups, organizations, committees, processes and procedures to deal with the evaluation of applied for new TLDs, complete with a cadre of lawyers and policy people. Unless thelimited concerns if IETF werewillingtodo the same, it would have a hard time performing evaluation of the strings themselves, distinct from the evaluation of the technology behind the name resolution system. An alternate view has been expressed that such a process is not necessary because the IESG is the body that makes the decision on a specific name reserved by [RFC6761], and the IETF hasreserve aworkable appeal process to deal with any potential issues. However, looking at the level of contention created in the ICANN process around the choice of certain names, serious doubts have been expressed to the scalability and ultimate viabilitystring outside ofsuchanappeal process. 6.3. The ICANN process to evaluate names Section 4.3 of [RFC2860] says: Two particular assigned spaces present policy issues in addition to the technical considerations specified by the IETF: the assignment of domain names, and the assignment of IP address blocks. This remains as true today as when it was written (2000). Domain names have a number of considerations that have complex policy issues thatICANNdeals with and which the IETF may not be well equipped to handle.gTLD round. The next ICANNprocess applicant have to go through to get a name is described in thegTLD applicantguidebook[GUIDEBOOK], which is a 338 page document. It should however be noted that the current round of gTLD application is closed and rules may differ in the next round if and when it happens. Considerations include, but are not limited to: Geographical During the most recent round of new gTLD applications, there were a number of applications for so call "geographic" terms. These included applications for .amazon and .patagonia. The .amazon application in particular was controversial - the governments of Brazil and Peru requested that ICANN's Governmental Advisory Committee (GAC) to issue a warning that granting .amazon to Amazonwould"prevent the use of this domain for purposes of public interest related to the protection, promotion, and awareness raising on issues relatedsimply refer to theAmazon biome." The IETFexisting list at publication time. However, there isnot well suited to evaluating this sort of issue. Brands / Trademark law If Wile E. Coyote approached the IETF requesting that the IETF reserve .acme,atrademark held by a large corporation making anvils and giant slingshots, the IETF could become embroiled in trademark lawsuit - and evenpossibility of conflict ifthean IETF reservation werenot, we have enough armchair lawyers that the discussions would be extremely annoying :-). Closely relatedtothis issue is "protected designation of origin (PDO)" - for example, Champagne. String similarity ICANN hashappen during anentire process for evaluating the string similarity / confusability between applied for (and current) strings - for example, under what conditions would the IETFICANN gTLD round. A hypothetical case study could beable to makesomebody trying adetermination if someone attempted to use [RFC6761] to reserve .c0m? International Organization Names Certain names and organizations get additional protection under trademark law - well known examplesdenial ofthis are the RedCross/RedCrescent and the International Olympic Committee (IOC). Whether or not this should beservice attack early in thecase is well outside anything thatICANN application process by asking the IETFshould have an opinion on but, undoubtedly, there are many within the community who will have an opinion (and will wanttoargue it at length). Offensive Terms There arereserved ahuge range of these, from the obscure / archaic (waesucks, gadsbudlikins) to the more obvious and current. Certain terms are sufficiently offensive that the IETF would havestring sought after by ahard time coming to any useful consensus (other then "Eeeew!") 7.competitor. 5. Security Considerations This document aims to provide a problem statement that will inform future work. While security and privacy are fundamental considerations, this document expects that future work will include such analysis, and hence no attempt is made to do so here. See among other places [SAC-057] Reserving names has been presented as a way to prevent leakage into the DNS. However, instructing resolvers to not forward the queries (and/or by instructing authoritative servers not to respond) is not a guarantee that such leakage will be prevented. The security (or privacy) of an application MUST NOT rely on names not being exposed to the Internet DNS resolution system.8.6. IANA Considerations This document has no IANA actions.9.7. Acknowledgements Thanks to Paul Hoffman for a large amount of editing.10.8. References10.1.8.1. Normative References [IANA-SPECIAL-USE] IANA, "Special-Use Domain Names", 2016, <https://www.iana.org/assignments/special-use-domain- names>.[RFC1034] Mockapetris, P., "Domain names - concepts and facilities", STD 13, RFC 1034, DOI 10.17487/RFC1034, November 1987, <http://www.rfc-editor.org/info/rfc1034>. [RFC1035] Mockapetris, P., "Domain names - implementation and specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, November 1987, <http://www.rfc-editor.org/info/rfc1035>.[RFC2860] Carpenter, B., Baker, F., and M. Roberts, "Memorandum of Understanding Concerning the Technical Work of the Internet Assigned Numbers Authority", RFC 2860, DOI 10.17487/RFC2860, June 2000, <http://www.rfc-editor.org/info/rfc2860>. [RFC6761] Cheshire, S. and M. Krochmal, "Special-Use Domain Names", RFC 6761, DOI 10.17487/RFC6761, February 2013, <http://www.rfc-editor.org/info/rfc6761>. [RFC6762] Cheshire, S. and M. Krochmal, "Multicast DNS", RFC 6762, DOI 10.17487/RFC6762, February 2013, <http://www.rfc-editor.org/info/rfc6762>.[RFC7686] Appelbaum, J.[RFC7788] Stenberg, M., Barth, S., andA. Muffett, "The ".onion" Special-Use Domain Name",P. Pfister, "Home Networking Control Protocol", RFC7686,7788, DOI10.17487/RFC7686, October 2015, <http://www.rfc-editor.org/info/rfc7686>. 10.2.10.17487/RFC7788, April 2016, <http://www.rfc-editor.org/info/rfc7788>. 8.2. Informative References [GUIDEBOOK] ICANN, "gTLD Application Guidebook", June 2012, <https://newgtlds.icann.org/en/applicants/agb/guidebook- full-04jun12-en.pdf>. [HUSTON] Huston, G., "What's in a Name?", December 2015, <http://www.circleid.com/posts/20151222_whats_in_a_name/>. [I-D.lewis-domain-names] Lewis, E., "Domain Names", draft-lewis-domain-names-02 (work in progress), January 2016. [NEW-GTLD] ICANN, "New Generic Top-Level Domains", 2016, <https://newgtlds.icann.org/>.[RFC1918] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G., and E. Lear, "Address Allocation for Private Internets", BCP 5, RFC 1918, DOI 10.17487/RFC1918, February 1996, <http://www.rfc-editor.org/info/rfc1918>. [RFC2826] Internet Architecture Board, "IAB Technical Comment on the Unique DNS Root", RFC 2826, DOI 10.17487/RFC2826, May 2000, <http://www.rfc-editor.org/info/rfc2826>. [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA Considerations Section in RFCs", BCP 26, RFC 5226, DOI 10.17487/RFC5226, May 2008, <http://www.rfc-editor.org/info/rfc5226>. [RFC6303] Andrews, M., "Locally Served DNS Zones", BCP 163, RFC 6303, DOI 10.17487/RFC6303, July 2011, <http://www.rfc-editor.org/info/rfc6303>. [RFC7719] Hoffman, P., Sullivan, A., and K. Fujiwara, "DNS Terminology", RFC 7719, DOI 10.17487/RFC7719, December 2015, <http://www.rfc-editor.org/info/rfc7719>.[SAC-057] ICANN Security and Stability Advisory Committee, "SSAC Advisory on Internal Name Certificates", March 2013, <https://www.icann.org/en/system/files/files/sac- 057-en.pdf>. Appendix A. Editorial Notes This section (and sub-sections) to be removed prior to publication. A.1. Venue An appropriate forum for discussion of this draft is for now the DNSOP WG. A.2.Pithy Quotes from History The question has arisen as to how the toplevel naming authority decides who gets a toplevel name and who must get by with a non- toplevel name. The suggestion was made by MOCKAPETRIS@USC-ISIF that perhaps the existing toplevel nameholders might vote on whether the applicant for a new toplevel name should be granted, with a majority needed for approval. It seems to me this might produce a clique whereby whoever initially gains power will hold it and prevent its "enemies" from getting in too. This will make the toplevel rather less than universal. (E-mail from Robert Elton Maas to the namedroppers mailing list on 9 November 1983) My basic point is that as a world-wide network evolves it is ridiculous to force people to name resources in terms of one static hierarchy which very closely resembles the current internetwork topology (as the current scheme does). What we are eventually going to require is a distributed expert for making sense out of a name someone hands it. There will be no simple algorithm to be written on one page of an RFC that will suffice to resolve a name. Rather, a number of heuristics will let a resolver make sense out of a given name by querying other experts which it suspects may be more knowledgeable about the name than it is, or by forwarding a piece of mail to an expert which is at least one level closer to the destination in some hierarchy. (E-mail from Peter Karp to the namedroppers mailing list on 8 February 1984) A.3.Change HistoryA.3.1.A.2.1. draft-adpkja-special-names-problem-00 Initial draft circulated for comment. Appendix B. Change history [ RFC Editor: Please remove this section before publication] -01 to -02: o A very large number of readability / grammar / reference fixes from Paul Hoffman. -00 to -01: o Significant readability changes. -00: o Initial draft circulated for comment. Authors' AddressesJoe Abley Dyn, Inc. 103-186 Albert Street London, ON N6A 1M1 Canada Phone: +1 519 670 9327Geoff Huston APNIC Email:jabley@dyn.comgih@apnic.net Peter Koch DENIC eG Kaiserstrasse 75-77 Frankfurt 60329 Germany Email: pk@denic.de Alain Durand ICANN Email: alain.durand@icann.org Warren Kumari Google Email: warren@kumari.net