Re: [Add] [Ext] Draft Posting: CNAME Discovery of Local DoH Resolvers

Eric Rescorla <ekr@rtfm.com> Mon, 29 June 2020 23:16 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B87EE3A0E19 for <add@ietfa.amsl.com>; Mon, 29 Jun 2020 16:16:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lduTQWJt1cqm for <add@ietfa.amsl.com>; Mon, 29 Jun 2020 16:16:00 -0700 (PDT)
Received: from mail-lf1-x141.google.com (mail-lf1-x141.google.com [IPv6:2a00:1450:4864:20::141]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C14653A0E18 for <add@ietf.org>; Mon, 29 Jun 2020 16:15:59 -0700 (PDT)
Received: by mail-lf1-x141.google.com with SMTP id c21so10210248lfb.3 for <add@ietf.org>; Mon, 29 Jun 2020 16:15:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Dez+s9Lf4oGn/cajkfFD7edkyecUJt5E2M+ye+5S/Is=; b=yxyxI7MsXmfOX0U1svBi948v3KpUXsUo1a9bDkFoqHoxh/imYV7vtWNnFz6x06sfv4 fHJ0xVnDWONNKRzSkvrmu1fNyWMXl2E2OyU7S3Rj3yYLBNy+PEGGbhWtAYDUrKuX3MYW BYRZ3l3OYZHjwgys4Xlat05fHtbAgLVT3OEqtxN0iGLg9N97Aaa2C3lFKgrJCZjR421f zb7bY8S1BBO8LNWSyEjYAWDveuk6PPjUQ9PS8sHFr+FIek90MlIOBET8zYaST8Zuf3P6 V8OQd+6chPjs+/BMpcVbAD1v77h7ShM4xdXWKA+UH6PqkUR4O4zxKo0iAlpqHWlPTXaa D2Nw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Dez+s9Lf4oGn/cajkfFD7edkyecUJt5E2M+ye+5S/Is=; b=G8ER3GpQ7604qxmmfznajDLGpkR4vBy1QZ0ukIfflSBAwJE/TL5QYh3hExml/LAlBZ EgaG9w6xZ8a+xbKovxPJdVFPyq52oQzrTSsaXLV23DvTWgBlnlqxDwqXBeRyj+LiRAIH iGMykUPRqB8XBtNwV5+HGRWwutnUa3a2rVQXDNecpvFzzO3v0HaiQU0xFFqE3iH1F4Vu Jh46jGgJAmj0E5e3LU02Qfv/B0tl9pHtjU/uBbIcYuDzYJ3b1V/F4OI7M3C/Z27B33q1 ORglMqXdcunxE5LKig9X7Uzw3LoLILsmksJ7SD770Tc7FGnH0Il5phWvXpF2B5K/k1ft L1zQ==
X-Gm-Message-State: AOAM532JVMcvTcTO+oFg/ladV7lC9Yx7+xNRbbIIqV+c+J0SdVwQ/o3U fk6K+7ySW4gCwX5rFI2vw0AELiA3VRHKXDIcZt+9VQ==
X-Google-Smtp-Source: ABdhPJxtRMvcGUykAmZNeMw0fI/ueGXMQsYmJRLEGL+tZYz8PtCZ+ZZlftZjO4ATQuX4CmO6TG5JZsvNtc8ejWcldzc=
X-Received: by 2002:a19:ca48:: with SMTP id h8mr10429533lfj.161.1593472557519; Mon, 29 Jun 2020 16:15:57 -0700 (PDT)
MIME-Version: 1.0
References: <CABcZeBPTkWeB40wpTowKvEJ-gXA3AL2e-BE+C_FC7Js7-D0DZQ@mail.gmail.com> <14119.1593367594@localhost> <alpine.OSX.2.22.407.2006281428200.79151@ary.qy> <3615321.ADK9YsXCiF@linux-9daj> <CADZyTkm82y=H48e7TL+wBMN67jrCG2T96kHOdovX0Ds3m_nguw@mail.gmail.com>
In-Reply-To: <CADZyTkm82y=H48e7TL+wBMN67jrCG2T96kHOdovX0Ds3m_nguw@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Mon, 29 Jun 2020 16:15:21 -0700
Message-ID: <CABcZeBMRYRoMVLr937=9T4dyVGzGHYapcrTRZ7nYghdAqzhqOQ@mail.gmail.com>
To: Daniel Migault <mglt.ietf@gmail.com>
Cc: Paul Vixie <paul@redbarn.org>, Michael Richardson <mcr+ietf@sandelman.ca>, ADD Mailing list <add@ietf.org>, John R Levine <johnl@taugh.com>
Content-Type: multipart/alternative; boundary="000000000000c0290805a9413dbb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/R--Q67Sy0ETs5XUxJ9QlsAPpK60>
Subject: Re: [Add] [Ext] Draft Posting: CNAME Discovery of Local DoH Resolvers
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jun 2020 23:16:07 -0000

On Mon, Jun 29, 2020 at 2:40 PM Daniel Migault <mglt.ietf@gmail.com> wrote:

> Hi,
>
> I believe the proposal presents some
> similarities to draft-mglt-drdp [1] that is
> using the DNS to proceed to the
> discovery. I see drdp as more generic,
> and would be happy to improve it.
>
> I would be happy to understand why HTTP
> is a better stack to perform the
> discover as opposed to DNS. I think that
> DNS is better as it is the common
> protocol to DoT DoH and DNS, but I might
> be missing something.
>

I don't quite follow this, as we do not use HTTP.


>
> I believe that CNAME is to restrictive
> and would not make possible for example
> to have multiple resolvers
>

This goes back to use case. In our use case, the multiple resolvers would
be supplied by manual configuration of the client. the CNAME is just a
lookup key.

>
> CNAME does not provide useful necessary
> parameters that may also be useful for a
> DoH resolver DRDP lists among others:
> alpn, ensiconfig, uri template, user
> display, auth_domain, filtering,
> ip_subnet, dnssec, ....
>
> My understanding is that BCP 17 saw SRV
> as a long term solution for CNAME which
> is now superseded by HTTPSVC/SVCB. I see
> SRV as very common in home networks with
> service discovery.
>
> I believe that using a generic is
> problematic as is prevents its resoltion
> to be secured with DNSSEC.
>

As I said earlier, this goes back to threat model. Please describe the
thrat model where you think DNSSEC helps.

-Ekr




> In DRDP [1], the list of resolvers is
> associated to a resolving domain. In the
> case of an ISP the resolving domain is
> derive with a reverse resolution from
> the IP address announced by the ISP .
> Note that other means may be provided.
> With the resolving domain - in your case
> resolver.example, the application will
> retrieve the resolvers associated to the
> resolving domain.  In your case you are
> exclusively focused on DoH server, so
> your application will them perform
> _443_dns.example.com. SVCB.
>
> Note that an early version of DRDP was
> using SRV/TXT instead of SVCB.
>
> Yours,
> Daniel
>
> [1]
> https://github.com/mglt/draft-mglt-abcd-dofoo-discovery/blob/master/draft-mglt-add-rdp.mkd
>
> On Sun, Jun 28, 2020 at 3:23 PM Paul Vixie <paul@redbarn.org> wrote:
>
>> On Sunday, 28 June 2020 18:29:22 UTC John R Levine wrote:
>> > On Sun, 28 Jun 2020, Michael Richardson wrote:
>> > >    > Beyond that I gather there is still concern about SOHO routers
>> with
>> > >    > poorly implemented DNS forwarders that only handle some kinds of
>> > >    > queries.
>> > >
>> > > I believe that the majority of devices on the market are now based
>> upon
>> > > versions of openwrt which, even if 10 years out of date, now have
>> only 15
>> > > year old DNS forwarding code.  And that's new enough.
>> >
>> > It's not what's on sale now, it's what's installed.  People tend to keep
>> > what they have unless it breaks in ways that are obvious to them.
>>
>> as we learned with EDNS, we should have broken more stuff sooner. being
>> liberal in what we accept and conservative in what we generate has not
>> scaled
>> and won't.
>>
>> --
>> Paul
>>
>>
>> --
>> Add mailing list
>> Add@ietf.org
>> https://www.ietf.org/mailman/listinfo/add
>>
>
>
> --
> Daniel Migault
> Ericsson
> --
> Add mailing list
> Add@ietf.org
> https://www.ietf.org/mailman/listinfo/add
>