Re: [Add] AD review of draft-ietf-add-dnr-08

mohamed.boucadair@orange.com Thu, 23 June 2022 09:40 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1318FC14F734 for <add@ietfa.amsl.com>; Thu, 23 Jun 2022 02:40:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qjjELveUggRN for <add@ietfa.amsl.com>; Thu, 23 Jun 2022 02:40:34 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.70.35]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F325C157B57 for <add@ietf.org>; Thu, 23 Jun 2022 02:40:34 -0700 (PDT)
Received: from opfednr00.francetelecom.fr (unknown [xx.xx.xx.64]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfednr21.francetelecom.fr (ESMTP service) with ESMTPS id 4LTFc01sTdz5vxY; Thu, 23 Jun 2022 11:40:32 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1655977232; bh=dmkTZ31cwCsUP4GgCCDuYBMwUIK0yQlLzninEQLSCz4=; h=From:To:Subject:Date:Message-ID:Content-Type:MIME-Version; b=FI6egwZIzXdOk2y5scWh4+Tac+mmPgzN1KiDu5AaaVOd+LC42UAagxCOIfwdzSCF5 Fyrt96S1ncJNnc7krpfPytWupQ3+BkWeOxiyVY7wPIjLv0WnvhClMKf5z34aLQukQY jEs9/1YmhsTwrTXaHhbxOdAfd9syaFuZOgtzbIoVNCWmMhK7szmj0Wnyn5HwW3CVEA EcrFkG9d3POmGk1mF91j1dsKna1xvnG5sFy9pe5jBCeELkdVFbWZKZtA0XOStdksgJ ndt6voLXtkTvqKDxpY2qmX0GvoXKGnFXnznPl1YvjRrqee6uTFruLIyQw7iFM0KIni zUOmIDKwg42QA==
From: mohamed.boucadair@orange.com
To: "Eric Vyncke (evyncke)" <evyncke=40cisco.com@dmarc.ietf.org>, "add@ietf.org" <add@ietf.org>
Thread-Topic: AD review of draft-ietf-add-dnr-08
Thread-Index: AQHYhs+io9y4HP8WnkCZ7FL+lvbjXK1cklyQ
Content-Class:
Date: Thu, 23 Jun 2022 09:40:31 +0000
Message-ID: <23893_1655977232_62B43510_23893_77_1_de1ff3cf3a8646848ef74e1edbf70fa3@orange.com>
References: <6513B2D7-1D0A-49B3-AAEB-3C17C2B7400A@cisco.com>
In-Reply-To: <6513B2D7-1D0A-49B3-AAEB-3C17C2B7400A@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2022-06-23T07:08:14Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=92db5f92-f689-4413-94d7-8bd9b3f3270e; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-originating-ip: [10.115.27.53]
Content-Type: multipart/alternative; boundary="_000_de1ff3cf3a8646848ef74e1edbf70fa3orangecom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/3RW6FUSwy545nOCHaN6_Up_bb_I>
Subject: Re: [Add] AD review of draft-ietf-add-dnr-08
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Jun 2022 09:40:39 -0000

Hi Éric,

Thank you for the review.

Please see inline.

Cheers,
Med

De : Add <add-bounces@ietf.org> De la part de Eric Vyncke (evyncke)
Envoyé : jeudi 23 juin 2022 09:06
À : add@ietf.org
Objet : [Add] AD review of draft-ietf-add-dnr-08

# Éric Vyncke, INT AD, comments for draft-ietf-add-dnr-08
CC @evyncke

Thank you for the work put into this document.

As usual, as the responsible AD for the ADD WG, I have done an AD review before the IETF Last Call. Please find a MD-formatted review below. Before going further, I am requesting the authors to act/reply/comment on all the points below. The end goal is to ease the rest of the publication process.

Regards,

-éric

## COMMENT

### 6MAN review of the RA option

The document shepherd write-up is explicit about the DHC WG review but what about the 6MAN review of the RA options ? Suggest to be clear in the doc shepherd document about this point, even if only writing "6MAN WG was not consulted" (then I will make it clear for the IETF last call).

[Med] I confirm that we solicited 6man + reach out individuals to seek feedback on the RA part.


### "DNS Server" could be ambiguous

The abstract, the introduction, and possibly other sections use "local DNS server" while I think that the authors' intent was rather "local recursive DNS server". If this is the case, then suggest changing the wording.

[Med] We are using the generic term “DNS server” on purpose as the options can also be used to discover forwarders. The subtleties between the various modes are covered in RFC8499. That’s why we have: “This document makes use of the terms defined in [RFC8499<https://datatracker.ietf.org/doc/html/rfc8499>].“


### Section 3.1 flow

```
   In order to allow for PKIX-based authentication between a DNS client
   and an encrypted DNS server,
```
While the above text is correct, the reader has only the explanation later. Suggest to change the flow to ease the reader's task.

[Med] Can you please indicate the change you have in mind? Thanks.


### Section 3.1 ADN

"ADN" is not expanded at first use.

[Med] This was already expanded in the introduction.


### Section 3.1 Global IPv4 address

```
   This IP address can be a
   private IPv4 address, a link-local address, a Unique Local IPv6
   unicast Address (ULA), or a Global Unicast Address (GUA).
```
What about global IPv4 address ? The wording seems to indicate an exhaustive list while it is not. What about anycast ?

[Med] The text you quoted was in reference to a specific example: “For example, a router embedding a recursive server or a forwarder has to include one single IP address pointing to one of its LAN-facing interfaces”. For such a case, the LAN-facing address is typically a private IPv4 address. The case of public (which includes anycast) is covered by this text in Section 5.1:

==

Both private and

      public IPv4 addresses can be included in this field.
==


### Section 3.1 round-robin

```
   If multiple IP addresses are to be returned in an Encrypted DNS
   option, these addresses are ordered in the preference for use by the
   client.
```
Should there be a recommendation somewhere for a round-robin to spread the load ?

[Med] We don’t include such aspects as that is more about selection than discovery.


### Section 3.1 RECOMMENDED vs. MUST vs. SHOULD

```
   At least the following service
   parameters are RECOMMENDED to be supported by a DNR implementation:
```
While "dohpath" is obviously applicable only to DoH, should the normative language be more than "RECOMMENDED", a "MUST" or "SHOULD" seems at the right level for "alpn" and "port" at least.

[Med] As you know, RECOMMENDED is equivalent to SHOULD. That’s said, we can’t use MUST for all the parameters because, for example, the support of ECH is not justified for the typical home case.

Later in `returning an ADN only can be considered` suggest using a 'MAY'

[Med] This is about configuration/use, not implementation support.

Beware that these changes are important and will need to be run again through the WG during the IETF Last Call.

### Section 4.1 reference to dnsop-svcb ?

```
      Service Parameters (SvcParams) (variable length):  Specifies a set of
      service parameters that are encoded following the rules in
      Section 2.1 of [I-D.ietf-dnsop-svcb-https].  Service parameters
```
is it section 2.1 (zone file) or section 2.2 (wire format)?

[Med] I confirm: 2.1. Particularly, this part:

==

  SvcParams are a

   whitespace-separated list, with each SvcParam consisting of a

   SvcParamKey=SvcParamValue pair or a standalone SvcParamKey.
==


### Section 5.1 example

To be consistent with section 4.1, please also use a figure similar to figure 2 rather than the existing figure 5.

[Med] Added a new sentence to refer to the example in Figure 2 and removed figure 5.


### Section 5.1 address length

```
   Addr Length:  Indicates the length of included IPv4 addresses in
      octets.  It MUST be a multiple of 4 for ServiceMode.
```
Unsure what "for ServiceMode" has to do here... Should it be removed ?

[Med] Because in the ServiceMode, an IP address must be returned. We don’t have that constraint for the ADN-only mode (as no address is returned).


### Section 6.1 address length

```
   Addr Length:  Indicates the length of included IPv6 addresses in
      octets.  It MUST be a multiple of 16 for ServiceMode.
```
Unsure what "for ServiceMode" has to do here... Should it be removed ?
[Med] Idem as above.

### Section 6.2

What happens when multiple RAs are received ? Either from different routers or from the same router ?

[Med] That’s covered by this text:

==

In addition, the host

   follows the procedure described in Section 5.3.1 of [RFC8106]<https://datatracker.ietf.org/doc/html/rfc8106#section-5.3.1> with

   the formatting requirements in Section 6.1<https://datatracker.ietf.org/doc/html/draft-ietf-add-dnr#section-6.1> substituted for the length

   validation.
==


Section 5.3.1 of 8106 says the following:

==

   In the case where the DNS information of RDNSS and DNSSL can be

   obtained from multiple sources, such as RAs and DHCP, the IPv6 host

   SHOULD keep some DNS options from all sources.
==


### Section 7.4 PSK

"pre-shared key", may I assume it is the WPA PSK ? Please be specific.

[Med] OK, updated the text to clarify this. Thanks.


### Section 7.4 station-to-station

If not mistaken (but I am far from being a IEEE 802.11 expert), the AP can be configured to prevent all station-to-station conversations, which will stop many of the above attacks. If confirmed, then suggest to mention it.

[Med] Will double check. Thanks.


### Section 8.3

"DNS Encrypted DNS Option" or "Encrypted DNS Option" ?

[Med] Fixed. Thanks.


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.