I appreciate the thought :) I think where we differ is on where we believe the trade offs should be on perceived privacy versus censorship resistance and centralization.By having a limited number of proxies people need to go through to easily implement, be it the 4 you recommend, or 53, you actually have a very limited number of actors for an authority or hacker to go to in order to be able to install/force logging, or censorship. This very centralization forces us back to a model where we need to trust a very small number of actors in order for the system to operate as designed. This, to me, appears to be the opposite of the goals of the bitcoin ecosystem. To ensure this point is clear, I strongly believe recommending people focus all lookups through 4 centralized "proxies" is a bad idea and counter to bitcoin's ideals.The fact that hackers or state actors need to corrupt only a small number of servers/services in order to gain global visibility into all queries, I believe, breaks any perceived privacy gains from using DNSCrypt. A very small number of hacks or subpoenas and everyone's records are fair game in one place.
For the highly privacy conscious they can, today do their DNS lookups over a non logging VPN connection without forcing everyone else through a handful of centralized servers. Or they can use DNSCrypt optionally themselves. All of our tools have always been open source and folks can modify them for their own desired uses, or submit pull requests with their own ideas.
We'd love to hear others thoughts on this. While I believe that for now the centralization trade offs required to use DNSCrypt today (via a limited number of proxies) outweigh any perceived privacy benefits it provides, we are always open to what others in the community believe and have made modifications to how things work before as a result of feedback from industry participants.
I think DANE is a great idea. We were just discussing that with Andreas S., and are currently looking at whether we want to add this as optional versus mandatory, based on how widely available DANE is for folks using services like Cloudflare, Akamai, etc for their DNS, which many providers in the space today are.Of course, the security conscious could setup DANE on the URL we use AS IS. There is no need to create a special kv pair for this as is done in OpenAlias. As you know, DNSSEC and HTTPS support this today out of the box.
The CA validation, in our case, is an ADDITIONAL signature based validation to the DNSSEC chain, not a replacement for it.
We looked at doing this in a single lookup as you did. With one or two currencies this can be potentially more efficient. As the number of supported currencies and addresses under a single name grows, however, this solution becomes potentially more problematic. Please follow the use cases below:
Many currencies and colored coin addresses are supported under the same name, lets say 100. When you count different currencies and colored coin types, it could easily be hundreds, or over a thousand.
While you may end doing "less lookups" under Open Alias, as it scales, you end up causing a significant amount of extra, unnecessary traffic.
In addition to the obvious impact of being orders of magnitude more wasteful than necessary, it also creates privacy "leakage" by returning someone 100 different addresses when they only asked for one.
Finally, because a single packet UDP transaction for a DNS lookup can create possibly hundreds of packets in response, the service can essentially become an amplifier for DDoS attacks. (If I spoof the source address of my target with a query to a lookup that issues hundreds of packets in response to one packet, and I can have a real impact :( )
It is important to note, that ICANN has "required" for some years that registrars and registries support DNSSEC on the domains they register. I personally believe we shouldn't delay use of DNSSEC until their registries had come up to current required Internet standards. (Here are ICANN's registrar requirements showing the DNSSEC requirement, btw: https://www.icann.org/resources/pages/approved-with-specs-2013-09-17-en#operation)
That said, what do others in the industry think? We are basing our current standard on our believed best practices, and defaulted to "first, lose no money", given the irreversibility of bitcoin.
I think "DNSSEC is hard" is a bit of a boogey man that's not really true. We are working on developing registrar by registrar instructions of how to do this, and we have typically found that if you are setting up DNS by yourself, adding DNSSEC doesn't take a lot of additional time, maybe an hour or so depending on your registrar.
This known concern, however, is why when we launched our product (based on our standard record formats) that we wanted to launch it with a variety of options for people.
That's some interesting data, and runs counter to the research of the IETF DNS working group. If you are willing to share your data, I can put you in touch with the appropriate folks there to share your research. I'd also love to see it!
I'd argue that we aren't locking "huge portions" of the Internet. You are correct that about 15% of TLD's are not yet signed, even though they were required to be by ICANN.
As I said above, I believe the requirement to not lose money and the fact that other options are available for those running on TLD's that are out of compliance, is worth the trade off that some existing names won't work until their TLD's come into compliance with current Internet standards.
I'm a little confused by these closing statements. Our system has, from the beginning been open in terms of the fact that anyone could both serve names or do lookups without ever touching our servers, talking to us, or us even knowing that they did it or that they even exist. Our system has NEVER been one where folks were required to use us for any portion of the service, and from our first beta product launch our open source tools did all lookups against DNS records and the blockchain, never any proprietary servers or interfaces on our side.
I'd love to know where you got information that we were in some way a closed and centralized system so that we can have an opportunity to clarify that misconception.