On Fri, 7 Apr 2017 11:44:03 +0100
Alec Muffett <alec.muffett@xxxxxxxxx> wrote:
> If I was in charge, I would say that we risk overthinking this, and it
> would be better to:
>
> - mandate use of fully DNS-compliant syntax, including but not
> limited to: acceptable max length, max label length, charset and
> composition
Fully DNS-compliant only limits max length and max label length, unless
there's something that supersedes RFC 2181. I'm fine with both of
those restrictions.
> - declare a registry of short, valid labels, in the
> second-from-right position in the name
> - reserve "tor" and "name" in that registry (ie: *.tor.onion,
> *.name.onion)
> - park the entire issue for 12 months
I intentionally left a lot of this unspecified because one of the use
cases I envisioned was an "/etc/hosts" analog that lets users easily:
* Stick all their hidden services under their own name hierarchy.
eg: git.yawning -> <long public key>.onion
* Increase mobile quality of life by aliasing their HSes to addresses
consisting entirely of emojis.
eg: 💯👏💩👏🖕.😫 -> <long public key>.onion
* Force redirect any site to anything else, really.
eg: git.example.com -> <long public key>.onion
banner.ads.and.malware.example.com -> 127.0.0.1
social.spacebook.trackers.example.com -> 127.0.0.1
I could do this with MapAddress, but a plugin would make my life
easier, especially since it beats editing multiple torrc files.
(Going further into this rabbit hole, I assume most exits won't resolve
the OpenNIC TLDs... What do I do if I want to view `example.pirate`
or whatever over Tor?)
> Hence "parking" the issue because this is all meaningless until
> prop224 addresses ship, and there should be plenty of time in the
> next 12 months for people to think about how to fill the usability
> space with $PET_IDEA, and to my mind the changeover period between
> 80-bit and 256-bit addresses should be long enough that nobody need
> fret about it right now.
IMO the existing onion addresses already are a usability disaster. It
should be easy for researchers to experiment with designs to solve the
problem *now* before prop224 addresses make a bad situation worse.
There's also a world of difference between implementing/shipping the
capability to override the name resolution via plugins, and "Shipping
the YawningCoinNamezTLD plugin with Tor Browser, enabled by default".
Regards,
--
Yawning Angel
Attachment:
pgpdckAtlcNeB.pgp
Description: OpenPGP digital signature
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev