<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.15 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-hardaker-dnsop-private-namespace-options-00" category="std">

  <front>
    <title abbrev="DNS Private Namespace Options">DNS Private Namespace Options</title>

    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>

    <date year="2020" month="November" day="02"/>

    
    
    

    <abstract>


<t>This document discusses the trade-offs between various options about
creating a private namespace within top level domains within the root
zone.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>HATS: The author is not wearing any hats while writing this document.</t>

<t>Deployed DNS clients within the Internet typically communicate with
upstream resolvers using their own in-application stub resolver.
These upstream resolvers may be run by ISPs, or may be
a customer-premises equipment (CPE) that may or may not forward
requests to its upstream ISP.</t>

<t>In an entirely singular Internet DNS there would be no name collisions
as all data is uniquely named.  However, the prevalence of local
private name spaces within companies, organizations, governments, home
LANs, etc have shown that existence of a single, unique naming system
rarely exists.  The deployment of Internet of Things (IoT) devices is
only accelerating this trend for private namespaces by devices that
bootstrap their names with the easy solution of “just make one up
until the customer provides us with a better one”, followed by the
customer never providing one.  This document makes no judgment on
whether this is right or wrong, and takes this assumption as simply
the state of the current world.</t>

<t>The for special use names is well spelled out in <xref target="RFC6761"/>.
<xref target="RFC8244"/> provides additional insight into areas that are still
under discussion and where work is needed.  Recently ICANN’s SSAC has
issued [SAC113] entitled “SSAC Advisory on Private-Use TLDs”, wherein
it suggests the creation of a private-use DNS TLD.</t>

<t>This document considers the aspects associated with DNSSEC and the
potential choices for a private-use TLD (also see <xref target="RFC8244"/> bullet
21).  Specifically, we consider the case where somewhere in the
resolution path DNSSEC validation is in use, potentially at an
end-device (phone, laptop, etc), a CPE, or at an ISP’s resolver.</t>

<section anchor="document-state" title="Document state">

<t>This document is not a fully complete analysis, but rather a starting
point for discussion and continued analysis by both the author and
others that wish to contribute.</t>

</section>
<section anchor="requirements-notation" title="Requirements notation">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
   “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”,
   and “OPTIONAL” in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>

</section>
</section>
<section anchor="analysis-of-choices" title="Analysis of choices">

<t>Note that this analysis is not (yet) exhaustive.  It does describe
some of the differences in the two approaches.</t>

<section anchor="assumptions" title="Assumptions">

<t>We make the following assumptions to begin:</t>

<t><list style="numbers">
  <t>A local environment needs to use both the Global Internet’s DNS
(GID), as well as at least one private name space as well.</t>
  <t>A end-device, a CPE and/or a resolver may choose to validate DNS requests.</t>
  <t>The validating resolver wishes to validate both responses from the
GID as well as local names using DNSSEC.</t>
  <t>The validating resolver will, thus, need Trust Anchors (TAs) for
both the GID and all private namespaces, or will need a list of
names which are assumed insecure and exemptions to the GID.</t>
  <t>The device may (unfortunately) move to another network where 
private namespace resolution is not available, and thus queries to
it will leak to the GID.  This is extremely common today.</t>
  <t>We take as accepted consensus that anything protocol needing a
private name space that is not user visible can be properly housed
under .arpa.  This document assumes a private-namespace TLD is
needed, as discussed in other documents ([SAC113, etc]) to aid in
user presentation and understanding.  This document does not make
judgment on whether this or user-education may be the right
approach to this problem.</t>
</list></t>

</section>
<section anchor="tld-choices" title="TLD choices">

<t>Given these assumptions, we consider the cases where a private
namespace TLD exists that is:</t>

<t><list style="numbers">
  <t>Is a special-use domain per <xref target="RFC6761"/>, and does not (and will
never) exist in the GID.  In this document, we refer to this as
“.internal” for discussion purposes only following conventions in
[draft-wkumari-dnsop-internal].</t>
  <t>Is an unsigned delegation within the (GID’s) DNS root, with NS
records likely pointing eventually to something like 127.0.53.53.
In this document, we refer to this as “.zz” following convention in
[draft-ietf-dnsop-private-use-tld].  We note that
[draft-ietf-dnsop-alt-tld] also proposed a private namespace
(“.alt”) that also fits into this category.</t>
</list></t>

<t>This document recognizes that .zz itself is actually not necessarily a
normal special use domain, and <xref target="RFC6761"/> may not apply as its an
ISO reversed name.  However, in other aspects it will behave like a
special-use registered domain and its under current consideration by
dnsop so we leave it in here as the example name.</t>

<t>In summary:</t>

<t><list style="symbols">
  <t>.internal is an unsigned TLD</t>
  <t>.zz is a special-use-like TLD that MUST never be assigned</t>
</list></t>

<section anchor="working-state-aside" title="Working state aside">

<t>The next two sections mix together DNSSEC validation at end-devices
and resolvers; it would add significant more clarity to discuss them
individually, which will be done in a future version.</t>

</section>
<section anchor="unsigned" title="Analysis of an unsigned TLD (eg .internal)">

<t>An unsigned TLD such as .internal will:</t>

<t><list style="symbols">
  <t>Exist within the DNS root</t>
  <t>have NS records pointing to something.arpa with on A/AAAA resolution</t>
</list></t>

<section anchor="non-validating-end-devices-querying-within-internal-will" title="non-validating end-devices querying within .internal will:">

<t><list style="symbols">
  <t>inside the private network the client will:
  <list style="symbols">
      <t>Believe the upstream resolver’s responses</t>
    </list></t>
  <t>outside the private network the client will:
  <list style="symbols">
      <t>Believe the upstream resolver’s NXDOMAIN responses for anything
deeper than .internal itself (IE, api.example.internal/A will
return NXDOMAIN)</t>
    </list></t>
</list></t>

</section>
<section anchor="validating-end-devices-querying-within-internal-will" title="validating end-devices querying within .internal will:">

<t><list style="symbols">
  <t>inside the private network the client will:
  <list style="symbols">
      <t>must be configured with a private TA to enable DNSSEC within
the private network (creating an island of trust)</t>
      <t>If unconfigured, it will believe the upstream resolver’s
responses because its delegated insecure, and therefore has
no basis to distrust the answers</t>
    </list></t>
  <t>outside the private network the client will:
  <list style="symbols">
      <t>if not configured with a TA, all answers to .internal will
either be NXDOMAIN or spoofable</t>
      <t>if configured with a TA, all answers will be detected as
BOGUS</t>
    </list></t>
</list></t>

</section>
</section>
<section anchor="specialuse" title="Analysis of a special-use TLD (eg .zz)">

<t>A special-use TLD will:</t>

<t><list style="symbols">
  <t>Not exist within the DNS root</t>
  <t>Proven by the root’s NSEC chain</t>
</list></t>

<section anchor="non-validating-end-devices-querying-within-zz-will" title="non-validating end-devices querying within .zz will:">

<t><list style="symbols">
  <t>inside the private network the client will:
  <list style="symbols">
      <t>Believe the upstream resolver’s responses</t>
    </list></t>
  <t>outside the private network the client will:
  <list style="symbols">
      <t>Believe the upstream resolver’s NXDOMAIN or spoofed answers for
all data within the .zz domain.</t>
    </list></t>
</list></t>

</section>
<section anchor="validating-end-devices-querying-within-zz-will" title="validating end-devices querying within .zz will:">

<t><list style="symbols">
  <t>inside the private network the client will:
  <list style="symbols">
      <t>with an upstream resolver</t>
      <t>self-resolving:
      <list style="symbols">
          <t>needs a configured TA or a configured negative trust anchor</t>
          <t>possibly automatically obtained configuration with a
bootstrapping mechanism, or-preconfigured in a ROM image</t>
        </list></t>
    </list></t>
  <t>outside the private network the client will:
  <list style="symbols">
      <t>if not configured with a TA, all answers to .internal will
either be NXDOMAIN or spoofable</t>
      <t>if configured with a TA, all answers will be detected as BOGUS</t>
    </list></t>
</list></t>

</section>
</section>
</section>
</section>
<section anchor="other-considerations" title="Other considerations">

<section anchor="a-unsigned-delegated-domain-internal" title="a unsigned delegated domain - .internal">

<t><list style="symbols">
  <t>configuration of new TAs</t>
  <t>requires collaboration between the IETF and ICANN , since the TLD
will exist and falls outside the scope of <xref target="RFC6761"/>.  This
process can be slow.</t>
</list></t>

</section>
<section anchor="a-special-use-domain-zz" title="a special-use domain - .zz">

<t><list style="symbols">
  <t>May require invoking <xref target="RFC6761"/> (depending on .zz or not .zz)</t>
  <t>may require more configuration per-device</t>
</list></t>

</section>
</section>
<section anchor="deployment-considerations" title="Deployment considerations">

<t>During initial deployment of either of these, there is a fundamental
difference for validating resolvers.</t>

<t>Specifically, until all validating resolvers are updated with a new TA
for specific instances under a special-use TLD (e.g. .zz), the
resolvers will fail to validate any names underneath as .zz is
provable insecure.  This could take a while to update all deployed
validating resolvers.</t>

<t>On the other hand, deploying a newly allocated, unsigned TLD will
take a long time in process both within the IETF and within ICANN.</t>

<t>And each may have impacts on what error processing results, based on
the differing resolution characteristics (<xref target="unsigned"/>, <xref target="specialuse"/>).</t>

</section>
<section anchor="recommendation" title="Recommendation">

<t>This author recommends that the IETF take on both tracks
simultaneously, and:</t>

<t><list style="numbers">
  <t>starts the process of communicating with ICANN and ISO about the
use of .zz, or selects another name to use under <xref target="RFC6761"/> as a
special-use name.</t>
  <t>Issues a request to the ICANN board via the IAB to follow the
guidance of [SAC113] and reserve a string or set of strings for
use as a private-namespace(s) as an unsigned TLD.  The ICANN board
can not act on their own, based on ICANN bilaws, but can take
requests from the IETF via the IAB to act.</t>
</list></t>

<t>This leaves vendors the freedom to chose that path that best meets
their specific requirements.  Recommendations about how to best select
one given their situation is hinted above, but should be more formally
written down in this document or others.</t>

<section anchor="selecting-good-tld-names" title="Selecting good TLD names">

<t>Unfortunately, here be dragons.  Selecting a good name has been
discussed multiple times in the IETF, and has always resulted in a
lack of consensus.  In part, this is because the IETF doesn’t have the
skillsets needed to hold a discussion about what language element(s)
would be best for universal adoption and usage.</t>

<t>Instead, this author recommends that we direct ICANN to select the
names that should be used for both of these cases.  ICANN has
significant more skill breadth in the area of selecting names best
suited to be understood by end-users.  This discussion will not be
faster, however, within ICANN but this author believes a resolution in
that SDO will be more likely successful.</t>

<t>Thus, the IETF can make the technical recommendation and ICANN can
implement these two choices.</t>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>TBD</t>

<t>(though much of this draft is a security considerations itself)</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>TBD</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC6761" target='https://www.rfc-editor.org/info/rfc6761'>
<front>
<title>Special-Use Domain Names</title>
<author initials='S.' surname='Cheshire' fullname='S. Cheshire'><organization /></author>
<author initials='M.' surname='Krochmal' fullname='M. Krochmal'><organization /></author>
<date year='2013' month='February' />
<abstract><t>This document describes what it means to say that a Domain Name (DNS name) is reserved for special use, when reserving such a name is appropriate, and the procedure for doing so.  It establishes an IANA registry for such domain names, and seeds it with entries for some of the already established special domain names.</t></abstract>
</front>
<seriesInfo name='RFC' value='6761'/>
<seriesInfo name='DOI' value='10.17487/RFC6761'/>
</reference>




    </references>

    <references title='Informative References'>





<reference  anchor="RFC8244" target='https://www.rfc-editor.org/info/rfc8244'>
<front>
<title>Special-Use Domain Names Problem Statement</title>
<author initials='T.' surname='Lemon' fullname='T. Lemon'><organization /></author>
<author initials='R.' surname='Droms' fullname='R. Droms'><organization /></author>
<author initials='W.' surname='Kumari' fullname='W. Kumari'><organization /></author>
<date year='2017' month='October' />
<abstract><t>The policy defined in RFC 6761 for IANA registrations in the &quot;Special-Use Domain Names&quot; registry has been shown, through experience, to present challenges that were not anticipated when RFC 6761 was written.  This memo presents a list, intended to be comprehensive, of the problems that have since been identified.  In addition, it reviews the history of domain names and summarizes current IETF publications and some publications from other organizations relating to Special-Use Domain Names.</t><t>This document should be considered required reading for IETF participants who wish to express an informed opinion on the topic of Special-Use Domain Names.</t></abstract>
</front>
<seriesInfo name='RFC' value='8244'/>
<seriesInfo name='DOI' value='10.17487/RFC8244'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>


<section anchor="acknowledgments" title="Acknowledgments">

<t>Large portions of the technical analysis in this document derives
from a discussion with Roy Arends and Warren Kumari (back when we
could stand in front of a whiteboard together).</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

