Re: [Add] Paul Wouters' Discuss on draft-ietf-add-dnr-11: (with DISCUSS)

mohamed.boucadair@orange.com Mon, 18 July 2022 09:08 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDC4CC13C535; Mon, 18 Jul 2022 02:08:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TtdsZz_EDcf8; Mon, 18 Jul 2022 02:07:59 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.41]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4DEACC13C508; Mon, 18 Jul 2022 02:07:59 -0700 (PDT)
Received: from opfedar07.francetelecom.fr (unknown [xx.xx.xx.9]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfedar20.francetelecom.fr (ESMTP service) with ESMTPS id 4Lmbhs6hcrz8sgr; Mon, 18 Jul 2022 11:07:57 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1658135277; bh=brxpHEl+oOw0p5e9wb0u8inscKv1nhnR1fG89vo3C/c=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=WIhb9YFmvbAKHqATrkU1rfCIsI5UPO/Vaa4aBS9N+ZKOKG8PSlj9GhzP0SSrKai0G XO9RFA/e16ecQlhEy+I2tPZ6izrnEmfWAIeDG7Be9Qr8qEAQ/mSKsG7uzYORxepCFt y3ogeGKQYUKQPZpEznkFpO4pS8+licRQPnAYFjaOXoG7G0+qOzy/9pLFjR7BNgft8f fLvWdlSy0tbYJ1tz05BU084RueY9iMDpUtawS4+LI6do+nHOAu3aoGDB1kntOPIAqn yja+w1WPyhGXxEUVlA6LxC2WVobIf4HQ5u21oTSOdn2CrqON3Bc+dZ2M/EP2EiSyri vVo7SjWrNOA8w==
From: mohamed.boucadair@orange.com
To: Paul Wouters <paul@nohats.ca>, tirumal reddy <kondtir@gmail.com>
CC: Paul Wouters <paul.wouters@aiven.io>, The IESG <iesg@ietf.org>, "draft-ietf-add-dnr@ietf.org" <draft-ietf-add-dnr@ietf.org>, "add-chairs@ietf.org" <add-chairs@ietf.org>, "add@ietf.org" <add@ietf.org>, "Andrew.Campling@419.consulting" <Andrew.Campling@419.consulting>
Thread-Topic: [Add] Paul Wouters' Discuss on draft-ietf-add-dnr-11: (with DISCUSS)
Thread-Index: AQHYmBOCU0OFdoNzmEeXf69jYaERha2A78IAgALl1NA=
Content-Class:
Date: Mon, 18 Jul 2022 09:07:57 +0000
Message-ID: <10060_1658135277_62D522ED_10060_230_1_03147c53fe8946359da61e68b16dfcda@orange.com>
References: <165774161599.52839.7342794318640205540@ietfa.amsl.com> <CAFpG3gc=Mpys9D3s8Eze=FUGXUbxHiHEzrQLnVDFST3HEQBYYg@mail.gmail.com> <bda8b587-06d-ceb2-ffb6-10aa9b33b56a@nohats.ca>
In-Reply-To: <bda8b587-06d-ceb2-ffb6-10aa9b33b56a@nohats.ca>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2022-07-18T08:47:05Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=5a7659e4-9d97-430f-9de4-c9cfac9aff43; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-originating-ip: [10.115.26.50]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/gF_9UmRK0GDeGbh9sKz0k_NNjYY>
Subject: Re: [Add] Paul Wouters' Discuss on draft-ietf-add-dnr-11: (with DISCUSS)
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Jul 2022 09:08:03 -0000

Paul,

(focusing on this specific part as many of your comments are related to the intended scope)

> If the document said "These are the new DHCP / DNR options, how or
> if the client uses them is out of scope", then I would agree.

The document focuses on discovery, not selection. That's why the normative behavior in the draft is drawn from the perspective of **DHCP clients/RA receiving hosts ** not ** DNS clients". In particular, Section 3.3 does not include any normative language. That section is provided for convenience to describe a typical usage.

Cheers,
Med

> -----Message d'origine-----
> De : Paul Wouters <paul@nohats.ca>
> Envoyé : samedi 16 juillet 2022 16:31
> À : tirumal reddy <kondtir@gmail.com>
> Cc : Paul Wouters <paul.wouters@aiven.io>; The IESG
> <iesg@ietf.org>; draft-ietf-add-dnr@ietf.org; add-chairs@ietf.org;
> add@ietf.org; Andrew.Campling@419.consulting
> Objet : Re: [Add] Paul Wouters' Discuss on draft-ietf-add-dnr-11:
> (with DISCUSS)
> 
> On Fri, 15 Jul 2022, tirumal reddy wrote:
> 
> > The policy of a client to select the discovered network-
> signalled
> > encrypted resolver is out of scope of the ADD WG charter. The
> client
> > may have a policy to select the discovered resolver only if it
> has
> > sufficient reputation (e.g.,  Comcast provided encrypted
> resolver
> > added to the TRR of Firefox,
> > seehttps://blog.mozilla.org/products/firefox/firefox-
> news/comcasts-xfi
> > nity-internet-service-joins-firefoxs-trusted-recursive-resolver-
> progra
> > m /). In deployments like home/mobile networks offering network
> > security services, Enterprise networks allowing the use of BYOD
> > (without
> > MDM) can only rely on DNR/DDR to signal the network-designated
> > encrypted resolver. The end-user may opt to use the network-
> signalled
> > encrypted resolver in trusted networks and use an external
> resolver in
> > untrusted networks. Further, DNR prevents on-path attack and
> pervasive monitoring of DNS messages in the local network
> by allowing local DNS to upgrade from plaintext to encrypted. In
> addition, it helps UX by using DNS names for the DNS servers
> (rather than IP addresses).
> 
> While the client policy is out of scope, the draft does mention
> different types of connections possible to encrypted DNS
> Resolvers, eg authenticated or opportunistic. It also offers
> advise on how clients respond when they can or cannot verify the
> TLS connection to the Encrypted DNS Resolver. So, it appears to be
> partially in and out of scope.
> 
> If the document said "These are the new DHCP / DNR options, how or
> if the client uses them is out of scope", then I would agree. But
> the document is more along the lines of "These are the new DHCP /
> DNR options, these options might be useful or less useful to the
> client, which can try these things to validate the encrypted DNS
> server and act differently based on the outcome". But without the
> required operational and security considerations.


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.