Re: [Add] Warren Kumari's Discuss on draft-ietf-add-resolver-info-12: (with DISCUSS and COMMENT)

mohamed.boucadair@orange.com Wed, 17 April 2024 16:26 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8E26C14F69F; Wed, 17 Apr 2024 09:26:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8Q3D6aCundJI; Wed, 17 Apr 2024 09:26:41 -0700 (PDT)
Received: from smtp-out.orange.com (smtp-out.orange.com [80.12.210.121]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 51F87C14F605; Wed, 17 Apr 2024 09:26:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; i=@orange.com; q=dns/txt; s=orange002; t=1713371201; x=1744907201; h=to:cc:subject:date:message-id:references:mime-version: content-transfer-encoding:from; bh=ztMBWcoqqrjvOic5uF00FZwZtXc0fSXBBeiZrQXkVNw=; b=W9UPlGx6iT8Yhjh6aOdTkpTzhAf/nkQTuQbykZJMKaz13NHevrNURaUi NwuKqMZeRMOnox/hOvi/ZeDglrse57Hx6p7JH00Xz4oo19yGmM2aRnlgG HVkM54IJj2s2fgCPViIcadLP3nJkD+tfNfkcwdJo4vfAcOQg4bHv8GqEt B6qOUp6tGbJ3cevRSAd+XqRgvzZ88jwnfUy5G4KdLuiE95iAoXstkNgvE iMa1HFn6vUZadbT/ED7WDdxgw7ADvJtjA+ZaAVpRrPZeEsl+aYrrewHTi DgfsNT3kS6RTktAqz0KYhylZyloS2CwL353mzDBrbi6LtzvYf9RpBZ6Ok Q==;
Received: from unknown (HELO opfedv3rlp0h.nor.fr.ftgroup) ([x.x.x.x]) by smtp-out.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Apr 2024 18:26:36 +0200
Received: from unknown (HELO opzinddimail6.si.fr.intraorange) ([x.x.x.x]) by opfedv3rlp0h.nor.fr.ftgroup with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Apr 2024 18:26:36 +0200
Received: from opzinddimail6.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with SMTP id 836821229798; Wed, 17 Apr 2024 18:26:36 +0200 (CEST)
Received: from opzinddimail6.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id A4F041229391; Wed, 17 Apr 2024 18:26:14 +0200 (CEST)
Received: from smtp-out365.orange.com (unknown [x.x.x.x]) by opzinddimail6.si.fr.intraorange (Postfix) with ESMTPS; Wed, 17 Apr 2024 18:26:14 +0200 (CEST)
Received: from mail-vi1eur05lp2168.outbound.protection.outlook.com (HELO EUR05-VI1-obe.outbound.protection.outlook.com) ([104.47.17.168]) by smtp-out365.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Apr 2024 18:26:12 +0200
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com (2603:10a6:10:49b::6) by DB9PR02MB6699.eurprd02.prod.outlook.com (2603:10a6:10:218::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7472.37; Wed, 17 Apr 2024 16:26:12 +0000
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::18a0:3679:a134:1d02]) by DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::18a0:3679:a134:1d02%6]) with mapi id 15.20.7409.042; Wed, 17 Apr 2024 16:26:12 +0000
From: mohamed.boucadair@orange.com
X-TM-AS-ERS: 10.106.160.161-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-DDEI-TLS-USAGE: Used
Authentication-Results: smtp-out365.orange.com; dkim=none (message not signed) header.i=none; spf=Fail smtp.mailfrom=mohamed.boucadair@orange.com; spf=Pass smtp.helo=postmaster@EUR05-VI1-obe.outbound.protection.outlook.com
Received-SPF: Fail (smtp-in365b.orange.com: domain of mohamed.boucadair@orange.com does not designate 104.47.17.168 as permitted sender) identity=mailfrom; client-ip=104.47.17.168; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="mohamed.boucadair@orange.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 include:spfa.orange.com include:spfb.orange.com include:spfc.orange.com include:spfd.orange.com include:spfe.orange.com include:spff.orange.com include:spf6a.orange.com include:spffed-ip.orange.com include:spffed-mm.orange.com -all"
Received-SPF: Pass (smtp-in365b.orange.com: domain of postmaster@EUR05-VI1-obe.outbound.protection.outlook.com designates 104.47.17.168 as permitted sender) identity=helo; client-ip=104.47.17.168; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="postmaster@EUR05-VI1-obe.outbound.protection.outlook.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:40.92.0.0/15 ip4:40.107.0.0/16 ip4:52.100.0.0/14 ip4:104.47.0.0/17 ip6:2a01:111:f400::/48 ip6:2a01:111:f403::/49 ip6:2a01:111:f403:8000::/51 ip6:2a01:111:f403:c000::/51 ip6:2a01:111:f403:f000::/52 -all"
IronPort-Data: A9a23:Ney7xqkkpoP2b3X6Oedm1ljo5gyyIURdPkR7XQ2eYbSJt1+Wr1Gzt xIaUW3VPf6OYmb0LtonYNi08h9UvJ+AztFhGVBvry82Qy4T+ZvOCOrCIxarNUt+DCFioGGLT Sk6QoOdRCzhZiaE/n9BCpC48T8mk/jgqoPUUIbsIjp2SRJvVBAvgBdin/9RqoNziLBVOSvV0 T/Ji5OZYADNNwJcaDpOt/rf8Uw35pwehRtD1rAATaES1LPhvylNZH4vDfnZB2f1RIBSAtm7S 47rpF1u1jqEl/uFIorNfofTKiXmcJaLVeS9oiM+t5yZv/R3jndaPpDXlhYrQRw/Zz2hx7idw TjW3HC6YV9B0qbkwIzxX/TEes1zFfUuxVPJHZSwmfy/6Xz4LCv1+dprFR5uJqwT/MN2WG4bo JT0KBhVBvyCr8+L+urmD9dN34EkJsStO54DsHZ9yz2fFewhXZ3IX6TN45lfwSs0gcdNW/3ZY qL1axI2NEiGP0IJYwhRUcxu9AurriGXnzlwrVWVrK867y7ZyxF62bTkMcD9fcaDQ8pY2E2fo woq+kyiWUtHZYzBlFJp9Fq8jczopSXGG74JTqbk5Kd0rHG0njUqXUh+uVyT+qLj1hHWt8hkA 1Md4DAjq4Ax6UmiVNi7WRCkyFaIpBcSR59RHvE0rQiBxu/O7h2eAnYJVHtAbtIhnM47WTJs0 UWG9/vgCTAqu72cSGiG3raZsT30PjIaRUcLaSMsTAYZ7Z/kuo5bpg7ITNtlC4awj9bvHir3z SzMpy87750SgNUE/6S24V6BhCijzqUlVSYw7wTTG3yktw5kftb4Y5TysAaLq/FdMIyeU1+N+ mAenNST5/wPCpfLkzGRROIKH/ei4PPt3CDgbUBHL7UHxgryq2eZUoVJv2llBUxvF8dddmq8C KPMgj956JhWNXqsSKZ4ZYOtFsgnpZQM8/y0Dpg4ifIeM/BMmB+7wc14WaKH90nR+HXAfIk6M JafNNitVHsHE/w6yCLsHrlNl7g22io52GXfA4jhyAiq2qafY3jTTqoZNFyJbaYy66bsTOTpH zR3ZpfiJ/Z3CbaWjszrHWg7cwxiwZ8TW82eliCvXrTfSjeK4Ul4YxMr/ZsvepZ+g4NenfrS8 3e2VydwkQWm3ieWc1/UNyE/MNsDuKqTS1pqZUTA2n75gxAejXqHsP1DL/PbgJF7qrM/lq4sH 5Hphe3ZWKkSEG+vF8shgWnV99c4KEvDafOmOiuuej8keJB8DwfO4MeMQ+cc3HhmM8ZDjuNn+ +fI/lqDH/IrHl0+ZO6IMq7H5w3q5hA1xrktN3Yk1/EIJC0ABqAxdnSt5hL2SulQQSj+Ksyyj lzGX0lF/LOS8ufYMrDh3Mi5kmtgKMMmdmIyIoURxe/e2fXyloZi/WNBbApMVR3gbjupvZuDP KBSxfy6N+AbllFXtYY6C6xs0a81+9roofld0xhgG3LIKV+sD9uM51GYiNJXuPQlKqBx4GOLt oCnorG2+oll/OviClcXKwdjZeOGvR3RsieH9uw7eS0W+wcrlIe6vZ1uAiSx
IronPort-HdrOrdr: A9a23:brvkVKi3/vTpcHUVN7fEV+ZvJXBQXuEji2hC6mlwRA09TyX4rb HMoB11726RtN98YhwdcLO7WJVoI0mzyXcd2+B4Vt2ftW/d1FdAR7sC0WKN+VLdMhy72upU1a JMaKhgBMa1KVRhl8717E2ZPr8bsby6GduT9IXj80s=
X-Talos-CUID: 9a23:AqrJYWkTa9n+MjgWh7davpCH+pbXOU3x6kbufB+hM0lsUeLNUn6b/oZlysU7zg==
X-Talos-MUID: 9a23:t1mDaA+mhdjn5buc/sDFYPuQf9djwIOWDn1OrY5coJWWbDJcFxDF1Q3iFw==
X-IronPort-AV: E=Sophos;i="6.07,209,1708383600"; d="scan'208";a="33259865"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VEj7qxBmEjSCVaeSbebhuIKVcTJ2Nm916odo9QBBlFrzWiA671imV6FBv4qRSG5dNbyqNgD5QogdQ55OINEzhY6kjw53je06vsTVMqyP269IT691sWnip4ED+phIJa1/zKtlZhiq81xczqFy2NTGmF6Q4NEUpUl42TmjA9Pd/pfSXM2tYRoLmPpgF9WfvAXQjLIAnfFKBNOsnLLJMC/zlJW4G6SuoVnRj0j0ix7UA56FohL0bq8YRM5nF8WNILvCmumZCx9j1rUOAxFFadwmGtLqtkJKYfUQB/ryDj3t6qkc7rR0Xn6O9wu2a6jF8zWJSuiS/nADhgs09fRU7ZdtSA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GpEPDSQyLPsQecpMJWBR1ijQuhnVgjkmy+MDVruD8tU=; b=IEhGltoBy4bNINopBtRJD5DX0FeC3f+765BuD6futxbPX6KJMHIMnudQWyeK14e2X/HFobyh2gm3CjUq5t8VhGbn8nSw9TCd8OtrRGFSsbC+JvT41IDtJNxdc23X8S5gHxOYjL5WcZg4CUGPQ+O9C2rE0l82Wr9wu7QCE8ZBCoe5IpqRjAQUcQVCpOGrZ3+Nv+eYmKvnH5gGFf6eID2teEzXJEwpT8YiXIkrYiYnxjP0Gn1C3SYpbywA6YhE+BeSIKTkaitHbeCbR+S0UQZriJBcED8DPDOLNZUevKXwSiiuaZ08qUCxRWZBvLXmDoH/9RrGw9VKIUfWS0y3am4hTw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=orange.com; dmarc=pass action=none header.from=orange.com; dkim=pass header.d=orange.com; arc=none
To: Warren Kumari <warren@kumari.net>
CC: "draft-ietf-add-resolver-info@ietf.org" <draft-ietf-add-resolver-info@ietf.org>, "add-chairs@ietf.org" <add-chairs@ietf.org>, "add@ietf.org" <add@ietf.org>, "tojens@microsoft.com" <tojens@microsoft.com>, The IESG <iesg@ietf.org>
Thread-Topic: Warren Kumari's Discuss on draft-ietf-add-resolver-info-12: (with DISCUSS and COMMENT)
Thread-Index: AQHahgLg65XBFbM1nEitrzJWAphK5bFXla1AgBUlHGA=
Date: Wed, 17 Apr 2024 16:26:12 +0000
Message-ID: <DU2PR02MB10160147D8E7946B0D43E1777880F2@DU2PR02MB10160.eurprd02.prod.outlook.com>
References: <171217498221.10117.2764285055937915803@ietfa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=67557e8f-3867-4c8d-994f-46544ffb88ac; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2024-04-17T16:24:50Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_ContentBits=0; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Enabled=true; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Method=Standard;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DU2PR02MB10160:EE_|DB9PR02MB6699:EE_
x-ms-office365-filtering-correlation-id: 0358ea9d-022d-487a-2fa7-08dc5efb1884
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2PR02MB10160.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(366007)(376005)(1800799015)(38070700009); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
MIME-Version: 1.0
X-OriginatorOrg: orange.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU2PR02MB10160.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0358ea9d-022d-487a-2fa7-08dc5efb1884
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Apr 2024 16:26:12.0795 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 90c7a20a-f34b-40bf-bc48-b9253b6f5d20
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Y0KtPHJq1DPkqKtDk1G0yEpMwK3WDEUrU2Fz83c+pEj+4L/jfrge9DdZ34D4SNBs5uQQv/JoGKlXoqJzH6hoyYW3yfo3ZPVx2VjNr94hAoQ=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR02MB6699
X-TM-AS-ERS: 10.106.160.161-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-TMASE-Version: DDEI-5.1-9.1.1004-28328.001
X-TMASE-Result: 10--49.682200-10.000000
X-TMASE-MatchedRID: hFbMlnd2lLORIcMttWNNnMhjol69azi+xkQABNmid9McDnAff/bXERA5 1mU/clLz/8Yy07M6kQvSctBSQCDO5ePaGGwUl2YV0MWGhVp0M3G5bvv/Lz3qyECTFBIxDzwKZRL +gCLSlhdrP6sFc4JGXKuU/Wq+kBcp5SEOGeIIsg6Cy6QpqEIA/fknCf5Y5jPYaXmdXF2Ym8e+y4 Y487IcAS2jzqspZtXYBAfYsmf6zhVvskGGlSg1NUEm5ovuh8tNvHKClHGjjr1Ers9MdsHhEuyJ6 ziH2AAjfd4xuFGlTT1VxlaESwssXcvY6bQdecIlPyFc0r7cUGFOKksNozKUfUEe5VjFzwNbAwUP lwYeGCVEotrrfbJfNDRLHEAwH0l8k4Q5CVb7RKxUP7Ek5cDANUgrYMYHLKzKyeUl7aCTy8hASVm amJze2uHTrDSrqn2s4j4vZDb5Kn4Y8O8z4cUR1urYriUFMfKTA9lly13c/gGSDjSTcryc1HROxy HvZdJsroD1/DaHllo+8wf4eIRLMC3EhW9j2erB9bPHgjnnomAbzCsRwPXnzWBKRtg9pHEaIbFAR zbooJSZC81IjBzGmyL3Glzn2kiO/Tnn5EXWEDy2vOTZlG4GynT7rnt3EYkYGIWadDcXDdfX45MW ooXn2Q5HywqGSmK9v/nLHkYI1ePVFe46FUMUAeqXDbz6GdxnCtzGvPCy/m6u2GmdldmiUK0GJL2 EV5pM8ivghmXVOo97R7ougs96Xp8+X0YWJ8qqJBgtEIxUn4EXfBDRy7VtM5naxzJFBx6v+a3bC2 tdCMyKNzlaILAGqf/dHLk1eWXPxHRRs2QzJWA3KXWd30Ii3cBX4Iey09T4Vb3rZjw/bpwUyRS/O CD9xeQD/sqqL0mZ9/6tBPDUrmpt1O49r1VEa8RB0bsfrpPI6T/LTDsmJmg=
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
X-TMASE-INERTIA: 0-0;;;;
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/LxQnFPUXzddnQgsbrNDeyqaIZXs>
Subject: Re: [Add] Warren Kumari's Discuss on draft-ietf-add-resolver-info-12: (with DISCUSS and COMMENT)
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Apr 2024 16:26:46 -0000

Hi Warren,

This is a kind nudge to check if the proposed changes [1] + clarification [2] address your concerns. 

Thank you 

Cheers,
Med

[1] https://author-tools.ietf.org/api/iddiff?doc_1=draft-ietf-add-resolver-info&url_2=https://boucadair.github.io/add-resolver-information/draft-ietf-add-resolver-info.txt  
[2] https://mailarchive.ietf.org/arch/msg/add/BZLE2i6h837Jaqg5x1ItwEw1jdw/

> -----Message d'origine-----
> De : BOUCADAIR Mohamed INNOV/NET
> Envoyé : jeudi 4 avril 2024 08:37
> À : 'Warren Kumari' <warren@kumari.net>; The IESG <iesg@ietf.org>
> Cc : draft-ietf-add-resolver-info@ietf.org; add-chairs@ietf.org;
> add@ietf.org; tojens@microsoft.com
> Objet : RE: Warren Kumari's Discuss on draft-ietf-add-resolver-info-
> 12: (with DISCUSS and COMMENT)
> 
> Hi Warren,
> 
> Thank you for the review. Much appreciated!
> 
> A diff to track the changes can be found at: https://author-
> tools.ietf.org/api/iddiff?url_1=https://boucadair.github.io/add-
> resolver-information/draft-ietf-add-resolver-
> info.txt&url_2=https://boucadair.github.io/add-resolver-
> information/boucadair-patch-2/draft-ietf-add-resolver-info.txt.
> 
> Please see inline for more context.
> 
> Cheers,
> Med
> 
> > -----Message d'origine-----
> > De : Warren Kumari via Datatracker <noreply@ietf.org> Envoyé :
> > mercredi 3 avril 2024 22:10 À : The IESG <iesg@ietf.org> Cc :
> > draft-ietf-add-resolver-info@ietf.org; add-chairs@ietf.org;
> > add@ietf.org; tojens@microsoft.com; tojens@microsoft.com Objet :
> > Warren Kumari's Discuss on draft-ietf-add-resolver-info-12:
> > (with DISCUSS and COMMENT)
> >
> > Warren Kumari has entered the following ballot position for
> > draft-ietf-add-resolver-info-12: Discuss
> >
> > When responding, please keep the subject line intact and reply to
> all
> > email addresses included in the To and CC lines. (Feel free to cut
> > this introductory paragraph, however.)
> >
> >
> > --------------------------------------------------------------------
> --
> > DISCUSS:
> > --------------------------------------------------------------------
> --
> >
> >
> > I'd like to start off by apologizing for the tone of this DISCUSS -
> I
> > know that you've put a lot of work into this document, and getting a
> > review like this is frustrating. I suspect that a fair bit of my
> > concern can be addressed by having the document be much clearer
> about
> > the intended use case / what the actual problem is that it is
> solving.
> 
> [Med] As a background, this specification covers the following item in
> the ADD WG Charter:
> 
> "Define a mechanism that allows communication of DNS resolver
> information to clients for use in selection decisions. This could be
> part of the mechanism used for discovery, above."
> 
> The draft sets the base for a mechanism for resolvers to explicitly
> reveal key properties that will be useful for server selection. An
> initial set of properties is defined here, but more can be registered
> in the future.
> 
> >
> > My DISCUSS is quite similar to Paul Wouters' -- there is much in
> this
> > document which seems unclear and/or underspecified and/or
> incomplete.
> >
> > As an initial example, the Introduction starts off with:
> > "Historically, DNS clients communicated with recursive resolvers
> > without needing to know anything about the features supported by
> these
> > resolvers.
> > However, recent developments (e.g., Extended Error Reporting
> [RFC8914]
> > or encrypted DNS) imply that earlier assumption no longer generally
> > applies."
> >
> > I don't really see how "that earlier assumption no longer generally
> > applies" -- my laptop is configured to use Google Public DNS
> 
> [Med] ... which I guess you configured manually, because you trust it
> at the first place. I don't know if you will maintain that same
> resolver, if for example, you have been told that resolver
> filters/blocks some specific queries, does not limit the amount of
> information it leaks upstream, etc.
> 
> , which happens to
> > support RFC
> > 8914 (Extended DNS Errors) and QNAME Minimization.
> 
> [Med] One would glean this info here and there, but there is no formal
> claim from the resolver itself that it supports those.
> 
>  My laptop happily
> > communicates with 8.8.8. without knowing **anything about the
> > "features supported by these resolvers"**. I *could* see an argument
> > being made that my laptop should know if the resolver supports
> various
> > flavors of encrypted DNS so that it knows to connect over an
> encrypted
> > transport, but that's what RFC9462,
> > RFC9463 are for, no?
> 
> [Med] That part is already covered by DNR/DDR and covered by this part
> of the charter:
> 
> "This could be part of the mechanism used for discovery, above."
> 
> >
> > "Instead of depending on opportunistic approaches, DNS clients need
> a
> > more reliable mechanism to discover the features that are supported
> by
> > resolvers."
> > Similar to the prior -- why do clients *need* this?
> 
> [Med] because you care about privacy, filtering, etc.
> 
>  My laptop is
> > currently
> > working just fine without it. The document seems to have this base
> > assumption throughout, but it doesn't really seem to justify it --
> I'm
> > hoping / assuming that this is sufficiently obvious within the WG
> that
> > it was just omitted because "everyone knows".
> 
> [Med] Tweaked the intro to make this clearer:
> https://github.com/boucadair/add-resolver-
> information/pull/30/commits/9ab541c54c1b6a4ade7583953cdc075823dab157
> 
> >
> > "Retrieved information can be used to feed the server selection
> > procedure.
> > However, that selection procedure is out of the scope of this
> > document." -- is this the justification for all of the above
> > assertions? If so, I think that A:
> > the document needs to be much more explicit about this (don't "bury
> > the lede") and B: some sort of advice about *how* is would be used
> > seems needed -
> > - I get
> > that you don't want to specify the whole selection procedure, but
> > something like "the server selection procedure could use this to
> > prioritize privacy-preserving resolvers over those that don't do
> QNAME
> > minimization" or similar...
> 
> [Med] Thanks.
> 
> NEW:
> 
> "For example, the resolver selection procedure may use the retrieved
> information to prioritize privacy-preserving resolvers over those that
> don't enable QNAME minimization. However, that selection procedure is
> out of the scope of this document."
> 
> >
> > Section 3:
> > "If the Special-Use Domain Name "resolver.arpa", defined in
> [RFC9462],
> > is used to discover an encrypted DNS resolver, the client can
> retrieve
> > the resolver information using the RESINFO RR type and QNAME of
> > "resolver.arpa". In this case, a client has to contend with the risk
> > that a resolver does not support RESINFO. The resolver might pass
> the
> > query upstream, and then the client can receive a positive RESINFO
> > response either from a legitimate DNS resolver or an attacker. The
> DNS
> > client MUST set the Recursion Desired (RD) bit of the query to 0.
> The
> > DNS client MUST discard the response if the AA flag in the response
> is
> > set to 0, indicating that the encrypted DNS resolver is not
> > authoritative for the response." This says "In this case, a client
> has
> > to contend with the risk that a resolver does not support RESINFO."
> --
> > but surely that is true for the other cases too? Many clients live
> > behind DNS forwarders / middle- boxes, which will happily pass
> unknown
> > RR types upstream, but won't necessarily pass e.g EDNS responses
> back.
> > If one of these clients sees that the "resolver"
> > supports EDE, but the forwarder drops these, the client is being
> lied
> > to.
> > Perhaps the techniques in this document are only allowed to be used
> > over encrypted DNS transports?
> 
> [Med] This excerpt is specific to DDR as called out it explicitly in
> the text:
> 
>    If the Special-Use Domain Name "resolver.arpa", defined in
> [RFC9462],
>    is used to discover an encrypted DNS resolver,
> 
>  This might be implied by the fact that you
> > are
> > supposed to use "resolver.arpa" or "the QNAME of the domain name
> that
> > is used to authenticate the DNS resolver", but if so, this is really
> > not clear in the document. If that is indeed the case, the document
> > needs to be much much more explicit about this, and also discuss
> what
> > happens if you query for this over a non-encrypted protocol (which
> > many resolvers won't actually know).
> 
> [Med] We wanted to avoid redundant statements in the document, but the
> security section states the following:
> 
>    DNS clients communicating with discovered DNS resolvers MUST use
> one
>    of the following measures to prevent DNS response forgery attacks:
> 
>    1.  Establish an authenticated secure connection to the DNS
> resolver.
> 
>    2.  Implement local DNSSEC validation (Section 10 of [RFC8499]) to
>        verify the authenticity of the resolver information.
> 
> >
> > In addition, this says: "The DNS client MUST set the Recursion
> Desired
> > (RD) bit
> > of the query to 0. The DNS client MUST discard the response if the
> AA
> > flag in the response is set to 0, indicating that the encrypted DNS
> > resolver is not authoritative for the response." - is the
> "indicating
> > that the
> > *encrypted* DNS
> > resolver" (and this section) implying that the RD bit must only be
> set
> > to 0 when using the RFC9462 resolver.arpa mechanism, or whenever
> > looking up RESINFO?
> > I'd assume the latter, but that conflicts with the "*encrypted* DNS
> > resolver"
> > bit.
> 
> [Med] Good catch. Fixed at: https://github.com/boucadair/add-resolver-
> information/pull/30/commits/fcc293e88b9b75887923d3207740afd9a7f628db
> 
> >
> > Why is it useful / important for a client to know that a resolver
> > supports specific EDE errors? E.g If RESINFO says that Resolver X
> > supports "exterr=15,16,17", and the resolver suddenly sends back
> > Extended DNS Error Code
> > 5 - DNSSEC Indeterminate, what should the client *do*? Is it a
> > violation to send back an EDE Code not covered by the capability
> list?
> 
> [Med] Added this NEW:
> 
> "Once a resolver is selected, this document does not interfere with
> DNS operations with that resolver."
> 
>  What if I
> > run a
> > resolver, and advertise "exterr=42", and then add additional support
> > for codes 1, 2 and 3? I guess I have to wait for the TTL to expire
> > before advertising these? Seeing as the document doesn't really
> > explain what the information is used for, it's not clear when (other
> > than at initial connection) a client would re-query for it. Many
> > resolvers are also anycast at this point -- what capabilities should
> > be advertised if the set is not uniform across all members?
> > The minimum enclosing set? The maximal set?
> 
> [Med] We already added this text per Erik's review:
> 
> "If a group of resolvers is sharing the same ADN and/or anycast
> address, then these instances SHOULD expose a consistent RESINFO."
> 
> >
> > The document also lists qnamemin and exterr as the supported
> > capabilities - it's not at all clear why those ones were selected as
> > important capabilities and not e.g 0x20, port randomization,
> > jurisdiction, logging level and retention, favorite flavor of
> > ice-cream, etc. If it is just that these happened to be two
> > capabilities that you happened to choose, I think that it would be
> > worth clarifying this
> 
> [Med] Already added this text to address other reviews:
> 
> NEW:
> That information is scoped to cover properties that are used to infer
> privacy and transparency policies of a resolver. Other information can
> be registered in the future per the guidance in {{key-reg}}.
> 
> 
>  -- the document does say "New keys can be
> > defined as per
> > the procedure defined in Section 8.2.", but the focus on qname and
> EDE
> > in the text makes it sound like these are the primary uses.
> >
> > infourl:
> > "It is not intended for end user consumption as the URL can possibly
> > provide misleading information. A DNS client MAY choose to display
> the
> > URL to the end user, if and only if the encrypted resolver has
> > sufficient reputation, according to some local policy" -- so, which
> is
> > it?
> 
> [Med] This provided in the sec cons:
> 
> "local policy (e.g., user configuration, administrative configuration,
> or a built-in list of reputable resolvers)"
> 
>  If a DNS client
> > does
> > display this to the end user, they will consume it (and possibly be
> > misled).
> > This also seems like it is ripe for phishing / advertising --
> "Welcome
> > to BestHotels, thank you for using our wonderful Encrypted DNS
> server.
> > For only
> > $19.95 per day, you can get the DNSSEC validating version of this
> > service, enter your Credit Card Below!!!"
> >
> > Security Considerations:
> > "An encrypted resolver may return incorrect information in RESINFO.
> If
> > the client cannot validate the attributes received from the
> resolver,
> > that will be used for resolver selection or displayed to the end-
> user,
> > the client should process those attributes only if the encrypted
> > resolver has sufficient reputation according to local policy (e.g.,
> > user configuration, administrative configuration, or a built-in list
> > of reputable resolvers). " This feels very hand-wavey /
> underspecified
> > - "If the client cannot validate the attributes received from the
> > resolver, [...] the client should process those attributes only if
> the
> > encrypted resolver has sufficient reputation according to local
> > policy." I don't really understand this -- how could a client
> validate
> > the attributes?
>  Surely not because they are DNSSEC signed / delivered over
> > encrypted DNS? (That doesn't prove that the data is correct, only
> that
> > it is what the resolver operator sent) So, how would a client
> validate
> > that Resolver X supports e.g EDE Codes 9, 10, 11? Does this just
> boil
> > down to "Don't trust any of this unless local policy says to?"
> >
> >
> 
> [Med] Will double check that part.

____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.