lsd0001

LSD0001: GNU Name System
Log | Files | Refs | README

commit 40d0e28b5be15ff798a94b993dcf48de52393f7c
parent 8d8134fb7d41748bca8510055ba7f56fdc64017f
Author: Martin Schanzenbach <schanzen@gnunet.org>
Date:   Mon,  7 Mar 2022 19:45:59 +0100

-leakage consideration

Diffstat:
Mdraft-schanzen-gns.xml | 41+++++++++++++++++++++++++++++++++++++++--
1 file changed, 39 insertions(+), 2 deletions(-)

diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml @@ -15,7 +15,7 @@ <!ENTITY RFC5890 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5890.xml"> <!ENTITY RFC5895 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5895.xml"> <!ENTITY RFC6234 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6234.xml"> -<!-- <!ENTITY RFC6781 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6781.xml"> --> +<!ENTITY RFC6761 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6761.xml"> <!ENTITY RFC6895 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6895.xml"> <!ENTITY RFC6979 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6979.xml"> <!ENTITY RFC7363 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7363.xml"> @@ -2538,6 +2538,41 @@ NICK: john (Supplemental) zone keys do become public during revocation. </t> </section> + <section> + <name>Name Leakage</name> + <t> + GNS names are indistiguishable from DNS names or other special-use + domain names <xref target="RFC6761"/>. + This poses a risk when trying to resolve a name through DNS when + it is actually a GNS name. + In such a case, the GNS name would be leaked as part of the DNS + resolution. + This risk is also present for special-use domain names which must be + handled before starting a DNS resolution request by the application. + </t> + <t> + Any application MUST take into consideration the user configuration + of resolution precedence when trying to resolve a name. + One example of such a configuration which at the same time allows + applications to delegate the resolution itself is the + Name Service Switch (NSS) of Unix-like operating systems. + It allows system administrators to configure host name resolution + precedence and is integrated with the system resolver implementation. + </t> + <t> + The order of resolution mechanisms to try is under the discretion + of the user or system administrator. + In the absence of an explicit configuration it is + <bcp14>RECOMMENDED</bcp14> that applications try to resolve + a given name in GNS before any other method in order to honor + potential TLD overrides in GNS by the user. + If no suffix-to-zone mapping for the name exists, resolution + <bcp14>MAY</bcp14> continue with other methods. + If a suffix-to-zone mapping exists for the name and the query + succeeds, fails or returns no results, resolution <bcp14>MUST NOT</bcp14> + continue by other means. + </t> + </section> </section> <section anchor="gana" numbered="true" toc="default"> <name>GANA Considerations</name> @@ -2682,7 +2717,6 @@ Purpose | Name | References | Comment &RFC6234; &RFC6895; &RFC6979; - &RFC7706; &RFC7748; &RFC8032; &RFC8126; @@ -2788,6 +2822,9 @@ Purpose | Name | References | Comment <!-- &RFC6781; --> &RFC7363; &RFC8324; + &RFC7706; + &RFC6761; + <!-- &RFC3912;--> <reference anchor="Tor224" target="https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt#n2135">