Re: [Add] Agenda and Revised Charter for the ABCD BoF

"Livingood, Jason" <Jason_Livingood@comcast.com> Mon, 18 November 2019 02:57 UTC

Return-Path: <Jason_Livingood@comcast.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 198A3120841 for <add@ietfa.amsl.com>; Sun, 17 Nov 2019 18:57:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=comcast.com header.b=lfldaOim; dkim=pass (2048-bit key) header.d=comcast.com header.b=twMP8vJS; dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=comcastcorp.onmicrosoft.com header.b=MTe2+AgZ
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BQLTTwqn2Uge for <add@ietfa.amsl.com>; Sun, 17 Nov 2019 18:57:12 -0800 (PST)
Received: from mx0a-00143702.pphosted.com (mx0a-00143702.pphosted.com [148.163.145.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6129D120013 for <add@ietf.org>; Sun, 17 Nov 2019 18:57:12 -0800 (PST)
Received: from pps.filterd (m0184893.ppops.net [127.0.0.1]) by mx0a-00143702.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id xAI2uDQD008060 for <add@ietf.org>; Sun, 17 Nov 2019 21:57:11 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.com; h=from : to : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=20190412; bh=g2kRIa4fH/eu/H5AHnGkd9QK8qZLQC4BA1jBI+ViE5Q=; b=lfldaOim7I6KpwwftTRMSM7TPeP7sAd32XzN+in6PSU1FwD2Wi7+RNKpTtsE1IXMsgYC a5Ni6m8LuN2trKRpZ8HK83HqIObM50yTK25dyJkg3uy/CXbHa6OSf1E/2WZ80/Wsofd9 dZeSOkg6lAFz7+KEx1XWXwm3nnMWdUbZgZKmoGI9jSfrYkiPRbQ1aF6Ga8wvoC7B/gkg jGdYy7c6gtux6TlGd8gcyZQ84fnZzPW7HRuoMEibEA4Gn2jSbcW1wxEsaDpPcyO9Dlje Pd9W/Hr7xtz5KzCagsjdh567P7bfVkW/+SBAej9viDWDvshRLN9IcQn2rJlNAsjKzmbu nw==
Received: from vaadcmhout02.cable.comcast.com (vaadcmhout02.cable.comcast.com [96.114.28.76]) by mx0a-00143702.pphosted.com with ESMTP id 2wad5k1gwq-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <add@ietf.org>; Sun, 17 Nov 2019 21:57:11 -0500
DKIM-Signature: v=1; a=rsa-sha256; d=comcast.com; s=20190412; c=relaxed/simple; q=dns/txt; i=@comcast.com; t=1574045830; x=2437959430; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=g2kRIa4fH/eu/H5AHnGkd9QK8qZLQC4BA1jBI+ViE5Q=; b=twMP8vJSnrBjl8iz4uSaZBUN0/6tLu+FRuv6X3ZUDAn7QcpqQv7r8RI3mTvB+CDI sTE9JlKpKq9snNjUAzuX3rv1LqybdNd4dZ8F0hcGI5FcWhaLHAkEsVqjO14LuXGk T47cJa2jT6tOUt9Ta8bgJbjfRtO+P5hICaWP2on4t1jiJAdOM9ViYRCm7phrD2RF ZZuHY5/6NbunEY9GZnxpY39ipqlaPBbsHQAw2xL2GPV2dR41QlxBZQwHNoDNndGr mMeiYCY70KmRL7k+SYWtB56dB/MSJnjUVU0sDvbhMFxoKdEnKwq6Iv3KqA0zDWab rJ1FIpDs9VINKIAeet+o6w==;
X-AuditID: 60721c4c-a33ff70000003748-44-5dd208855e70
Received: from PACDCEX10.cable.comcast.com (vaadcmhoutvip.cable.comcast.com [96.115.73.56]) (using TLS with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client did not present a certificate) by vaadcmhout02.cable.comcast.com (SMTP Gateway) with SMTP id A0.60.14152.68802DD5; Sun, 17 Nov 2019 21:57:10 -0500 (EST)
Received: from PACDCEX23.cable.comcast.com (24.40.1.146) by PACDCEX10.cable.comcast.com (24.40.1.133) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sun, 17 Nov 2019 21:57:08 -0500
Received: from PACDCEXEDGE01.cable.comcast.com (76.96.78.71) by PACDCEX23.cable.comcast.com (24.40.1.146) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Sun, 17 Nov 2019 21:57:08 -0500
Received: from NAM01-SN1-obe.outbound.protection.outlook.com (104.47.32.57) by webmail.comcast.com (76.96.78.71) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sun, 17 Nov 2019 21:57:08 -0500
Received: from BY5PR11MB4403.namprd11.prod.outlook.com (52.132.252.96) by BY5PR11MB4119.namprd11.prod.outlook.com (10.255.163.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2430.25; Mon, 18 Nov 2019 02:57:07 +0000
Received: from BY5PR11MB4403.namprd11.prod.outlook.com ([fe80::c15e:699c:749e:790a]) by BY5PR11MB4403.namprd11.prod.outlook.com ([fe80::c15e:699c:749e:790a%7]) with mapi id 15.20.2451.029; Mon, 18 Nov 2019 02:57:07 +0000
From: "Livingood, Jason" <Jason_Livingood@comcast.com>
To: ADD Mailing list <add@ietf.org>
Thread-Topic: [Add] Agenda and Revised Charter for the ABCD BoF
Thread-Index: AQHVnDttw5Xi8KlSJ0qQiU8WuHP22aeP47wA
Date: Mon, 18 Nov 2019 02:57:07 +0000
Message-ID: <A5F1D3AD-73D7-4491-99A8-3CCA02F49EF4@cable.comcast.com>
References: <CAHbrMsCcmFH2Kk2fEPeUvW25HBz22YUczYebfia5ofLqHcDkqA@mail.gmail.com> <254AEFB0-F930-466B-8BB6-707D5CE72657@fl1ger.de> <CAHbrMsBH+2zem_BmQjAvMzSNSi+cSAPm75sGX+rx-BKz4GHotA@mail.gmail.com> <CAOdDvNq5iHxGVEOPM15orO+K4FOv8v0BrxuWFWgkaQLs9i=O0A@mail.gmail.com>
In-Reply-To: <CAOdDvNq5iHxGVEOPM15orO+K4FOv8v0BrxuWFWgkaQLs9i=O0A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.1e.0.191013
x-originating-ip: [2001:67c:1232:144:fcaa:fd79:9cb8:c6a7]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8eb9143a-0386-4177-191b-08d76bd2ffc7
x-ms-traffictypediagnostic: BY5PR11MB4119:
x-microsoft-antispam-prvs: <BY5PR11MB41194F1CB7EBE39E62668797C74D0@BY5PR11MB4119.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0225B0D5BC
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(346002)(39860400002)(376002)(366004)(136003)(396003)(199004)(189003)(5660300002)(66946007)(66446008)(66476007)(33656002)(76176011)(6916009)(64756008)(66556008)(53546011)(102836004)(81166006)(81156014)(66574012)(186003)(6506007)(8936002)(14444005)(256004)(99286004)(76116006)(91956017)(86362001)(7736002)(8676002)(71190400001)(71200400001)(11346002)(446003)(2616005)(606006)(6486002)(316002)(46003)(58126008)(25786009)(6436002)(478600001)(6512007)(14454004)(790700001)(6116002)(236005)(54896002)(6306002)(6246003)(966005)(2906002)(80792005)(476003)(486006)(229853002); DIR:OUT; SFP:1102; SCL:1; SRVR:BY5PR11MB4119; H:BY5PR11MB4403.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cable.comcast.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: aPMeN8FZBBr/ViUgPCGQyxfKe4yngVembke/F9H4S7QJrMT14e769uvyBYGG0LW4lzO9vjCtMevScp8E/EPkLE3FBMtRvAtYDGfnmmlo2z28IDlVGkfUf+xPVOmn+JeY6AyekF42OYeSAPbET5lh3DLu++PqV4G76lavTy6wC7SSy6X5t++DYeMkETIpDS4UW+7HmPmaQVqmCcAmtSbZSKJ8im2lHQFjc/1tIKHAzxJ4VGCGNR8+IeKjWa0btzurwOiw9q94G7Z9Fu8VSDEksIRSqWE8SWjf3umQ4F0gIgKq4O5B8qwBPaSeqeIG0nW4YzAGFy3bxjr8nVle5VysfiLuusqEWf4MHqi2Bzlqp6C0Rs+QWwzRMZiwn4I5g8r3ogevaMnf7HXkvwPWgGa44LbYbyzVppvqzEhC6zf5V3RdbxCH3ENNlXL5rAU+TfKK
x-ms-exchange-transport-forked: True
arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Shpek6OXMdta5New3lp7w8HhJo4t2SkTa1cf7a7sX8BG+qziJy/CXMWzLCh0iXqwYsVOj23jnA5ujux0hB2a3l9c4DTMCTnZO4sC37E1o4zUAdMNRrNEnfeB72ax6W48cU7b1Tui1JAJVBvzA1R73oN/4+IPU7Acx3FDwH/2ZKuYqMAVT5qKYCLFB9ICjl50SV8JNmSbB3eVmjxRtwaQiRMV80jWHz3PyhyAaoSNBL12FXRcccPt9m8fRTonohb6X0eEpCcTQ3QHAGkB7N7WJ2HONVSnaPWruPHUdUHHV8HIqf01OJ9A776QBemy9kfZ3Z3tDe37ujhTutiA7JuxfQ==
arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HBmVwMPqvKvbx9UbkISHainaJSdgZDSXURDMsI4Bsps=; b=CsE2CfDkpMkn8vO4myuXy5533B39kNUAb36++CeZDuxeS+vsAOFOxpEcL7HDFTD4v6ItcNh6elZqyBvxaGiiidjZTW4HD/iQ/OFRbYKfVzs4oQIsLHzrjmfEJg6F92X6yBrFOI3XvL4QOaLCzHmhfIXhyCLd4C+0wMNz6IbdQ/SwJpr3Ezn4jJ5cktU66EMdff3kbYjLA2SDKhYhRl6shrcXuinBfUYlOGa/i4/f+C/PafuFiAvN47UCsW6kxwTQEt5pwL3qjXrrus7z3ZM4gX5R9ru6CwPZscJGtQGgoiTe+DS2VJzmfSo+BgYBN1+ZTK3BOuhf82WvGaaq28IdMQ==
arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cable.comcast.com; dmarc=pass action=none header.from=cable.comcast.com; dkim=pass header.d=cable.comcast.com; arc=none
dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcastcorp.onmicrosoft.com; s=selector1-comcastcorp-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HBmVwMPqvKvbx9UbkISHainaJSdgZDSXURDMsI4Bsps=; b=MTe2+AgZ+Yg8FOJ00EnE5q+mXdQxxY57a4ZOpOfbxEiYvY1Rm4BP8/h9JYMrH/tQDauY/zZztySfCTEY655S5gg89ZgtSkkDwPiqvgHO66up6ETxa2FphcIaxK22183ID1gITSks2SmO1e1c1O8elyD0wXHGGHKMetJ8g9DOc6g=
x-ms-exchange-crosstenant-network-message-id: 8eb9143a-0386-4177-191b-08d76bd2ffc7
x-ms-exchange-crosstenant-originalarrivaltime: 18 Nov 2019 02:57:07.2268 (UTC)
x-ms-exchange-crosstenant-fromentityheader: Hosted
x-ms-exchange-crosstenant-id: 906aefe9-76a7-4f65-b82d-5ec20775d5aa
x-ms-exchange-crosstenant-mailboxtype: HOSTED
x-ms-exchange-crosstenant-userprincipalname: dNQ4giYzOw7lo4yhDDCay0N6hVXFBt4KYM8u6VH5HeJQmnWtPEDcxHW6u9f5hrpYy0mXfQLTEy9jC1m3myA2hf/mOEV9DA2GxVKhI2jEMf4=
x-ms-exchange-transport-crosstenantheadersstamped: BY5PR11MB4119
x-originatororg: cable.comcast.com
Content-Type: multipart/alternative; boundary="_000_A5F1D3AD73D7449199A83CCA02F49EF4cablecomcastcom_"
MIME-Version: 1.0
X-CFilter-Loop: Forward
X-Brightmail-Tracker: H4sIAAAAAAAAA22Sf0yMcRzHfZ/nueu5OPt2yn3kmM4sQlctucxilsnIwvijLTz0Telc9ty5 ic3KyjhMlB8VXfrB3PXDFJG2VhNTcv1kIinNz9IP0rRVeu7JZtP3r9fn/Xl/3vvssy9LKy5J 3dkYvZHwek6nljozewwbtctPsk0RPmPpM7XjdUXStSgkL+83FYbCE9BqYzRPOGMwiSJ6Awly XvDfW72XRMXxZD3H6+K3ER3hprYJzkiiizERXjNljGbKnD0tVPSTp7X0oZeD1JHKF4V0Ahr/ TJkRywL2B8vpDWbkzCpwFQXv7EOUWJQjaK6yOZmRbKJoRfDEFis2ahCk36xHYpFKQVFlz+RI F4LO3gKJMCLFAdB+o4UW2BUvhPz2MkrgWTgI+q5+kor6GvjwrdCxhyv2g6LncwSZwYug7Y1V IshyHAyJF7Vi/AUKbp+/54iR4a3w0VbGCIzwbBiuLXDoNFZCW7fFwYAx5FXYaZHd4MuHMUem G9ZA1WioOBoJueacSXsg5I42IpHnQZPlDBIvFAr13+JF2QvSvpoZkWOhv/jeZLonJA1kSURW QU5Zg5OwMuARCbxKyZQKOQp8AHpbg0TPfLCe62RSkF/GP0tnTLhovB+aS0IEWY5d4Fl6NyPK S6C4XCO6PSDtTKeTyIsh+dr1SQ6B+j4b9a8nG7FWNCMwwNvX19/bT+u9MuAuEj4rr9r8AA1e DqlGmEXqGfL1HY0RCglnMsQfrEbA0mpX+ZauhgiFPJKLP0r4uN38YR0xVKO5LKNWyqcVZkco 8H7OSGIJOUT4v12KlbknoLoetx2vU35pv/cGn1iiutDnk+xTSycqSzd1H3e94xuYvNf4fmf2 dP3wUMXMZ2Wx9l3rTrU+0g9s32ftv5//c9XSh5/HaxQmz7PHZMoknbIEZS2DtyYPl/BKS8aV kegVTU/La8Iyh7pMcXHPjbM6erTSZP+Exz9U6bdSSzm7ZixngZoxRHO+XjRv4P4AQbxZrKgD AAA=
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,18.0.572 definitions=2019-11-17_05:2019-11-15,2019-11-17 signatures=0
X-Proofpoint-Spam-Reason: safe
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/rXCqE4EAOlJX3e0PXCy1kFNgDdk>
Subject: Re: [Add] Agenda and Revised Charter for the ABCD BoF
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Nov 2019 02:57:17 -0000

After reflecting on the list discussion, I agree there are aspects of the proposed charter on which it will be difficult to achieve consensus (LOL). So maybe let’s just set aside the stuff where we all know that is the case and try to focus more narrowly on those areas where getting a few things done might be possible. So for example – here are some off-the-cuff thoughts which may or may not be well considered on my part. ;-) (with apologies to people that view this in plaintext mode vs. HTML - since I have added strikethrough and colored text markup – blue text is new):

This working group will consider technical drafts on DNS client
configuration, especially with a focus on the following items where
technical consensus seems obtainable:

- Communicating configuration between the network, operating system, and
Applications How resolvers can signal their configuration and/or practices to operating systems and applications (and users?), to support decision-making or selection behaviors by those parties.

- Automated discovery & selection Discovery of resolvers, with selection potentially made based on detected resolver and their capabilities and behaviors (based on OS, app and/or user preferences)

- Query routing in a multi-resolver environment

- Multiple non-equivalent query paths, such as split-horizon DNS or
geo-sensitive answers

- Determination / detection of split-horizon DNS environments and standardized uses of ‘canary domains’ or other methods to enable detection of such environments

- Potential use of alternative application port numbers in some controlled environments (e.g. managed enterprise environments), including the pros/cons and implications of security downgrade and/or detectability in these environments

- Local DNS caches (e.g. partitioning, use of stale records)

- Resilience and fault-tolerance (e.g. single points of failure modes from encrypted DNS to Do53 or from a primary encrypted DNS resolvers to secondary or tertiary resolvers – or something like that)

- Support Standards / approaches for debugging and analysis (e.g. to support development of OS and application-layer diagnostic troubleshooting tools, a la dig, whether software-driven or user-prompted)

- DNS Push (accepting responses to queries that have not yet been issued) [JL comment: not sure why this would not be a client-driven activity, such as looking at all possible FQDNs on a site that a user is likely to ask for and sending all those queries from the client when the app/site first opens, based on prior user behavior or likely pathways through an app/site]

- Ossification and evolvability

The following topics are also relevant, but represent areas that are
significantly more challenging for consensus-building:

- End-user privacy and pervasive surveillance
- Detection and suppression of malware
- Use of records from untrusted sources
- Policy enforcement and control of the stub resolver configuration
- Use and impacts of large recursive resolution services

The working group will not attempt to resolve disagreements on these topics,
and will require full consensus on any statements regarding these areas.

This working group will coordinate with dnsop (OPS Area), capport (ART
Area), dprive, dhc, and homenet (INT Area). All last-call announcements will
be copied to the relevant working groups to ensure thorough and careful
review. The working group will also coordinate with the SEC Area, and will
be assigned a security advisor.



From: Add <add-bounces@ietf.org> on behalf of Patrick McManus <mcmanus@ducksong.com>
Date: Saturday, November 16, 2019 at 1:06 PM
To: Ben Schwartz <bemasc=40google.com@dmarc.ietf.org>
Cc: ADD Mailing list <add@ietf.org>, Ralf Weber <dns@fl1ger.de>
Subject: Re: [Add] Agenda and Revised Charter for the ABCD BoF

This charter just seems like a suggestion for a perpetual forum to argue and, afaict, isn't actually expected to produce anything... it just has some things that if they were published would belong in the proposed wg.

Please don't make us collectively relive the ADD side meeting every full meeting.

My suggestion: If the proponents believe that a group can publish a document on (e..g.) "Communicating configuration between the network, operating system, and applications" please write a charter with that as the goal of the group and the BoF can do the usual thing of deciding whether that is a problem worth solving, is well understood, and has a chance of success. If it works out - recharter the group for new work.


As is the charter fails those tests by putting everything in scope but requiring nothing at the same time.


-Patrick



On Thu, Nov 14, 2019 at 1:14 PM Ben Schwartz <bemasc=40google.com@dmarc.ietf.org<mailto:40google.com@dmarc.ietf.org>> wrote:


On Thu, Nov 14, 2019 at 7:42 AM Ralf Weber <dns@fl1ger.de<mailto:dns@fl1ger.de>> wrote:
Moin!

On 13 Nov 2019, at 2:32, Ben Schwartz wrote:
> Please review the agenda and proposed charter, and join us next week
> for a
> full discussion.
 From the proposed charter:
> This working group will consider technical drafts on DNS client
> configuration, especially with a focus on the following items where
> technical consensus seems obtainable:
>
> - Communicating configuration between the network, operating system,
> and
> applications
> - Discovery of resolvers and their capabilities and behaviors
> - Query routing in a multi-resolver environment
This is ambiguous.

I think this is very closely related to the next entry on the list, so we should understand them together.  Perhaps they should be combined

If it describes the current /etc/resolv.conf that’s
fine,

That would be in-scope (and there has been some innovation here related to retry behavior, load spreading, etc. which could be documented).

but I fear that it describes something where you ask “resolver
A” for example.com<https://urldefense.com/v3/__http:/example.com__;!rx_L75ITgOQ!QpYiYmLfw5x0GNCzn55qgsVeik8Scqtt7RQzzTGhG4peCplTE5ij67Tt1xPomd9ytuQ_Ug$> and “resolver B” for example.net<https://urldefense.com/v3/__http:/example.net__;!rx_L75ITgOQ!QpYiYmLfw5x0GNCzn55qgsVeik8Scqtt7RQzzTGhG4peCplTE5ij67Tt1xPomd-IwSWjYg$>.

I think designs of this kind would also be in-scope.

I don’t think that there is consensus for such an approach.

I don't think there is a single approach here; it seems to me that there is a vast range of possible client behaviors related to multiple resolvers.  Recommending a single behavior universally might be controversial, but I think there is plenty of room for productive technical discussion in this area without triggering reflexive disagreement.

> - Multiple non-equivalent query paths, such as split-horizon DNS or
> geo-sensitive answers

As an example of the kinds of issues that come up here, consider Mozilla's default behavior [1], in which an NXDOMAIN response from the primary resolution path triggers a retry of the query on a second resolution path.  This is an interesting choice with particular privacy, security, compatibility, and performance properties.  Perhaps it's worth specifying this solution in more detail, or perhaps defining a range of solutions with different properties.  I believe we can discuss the properties of different stub state-machines without debating Mozilla's method for choosing the primary resolver.

[1] https://support.mozilla.org/en-US/kb/dns-over-https-doh-faqs#w_how-does-firefox-handle-split-horizon-dns<https://urldefense.com/v3/__https:/support...mozilla.org/en-US/kb/dns-over-https-doh-faqs*w_how-does-firefox-handle-split-horizon-dns__;Iw!rx_L75ITgOQ!QpYiYmLfw5x0GNCzn55qgsVeik8Scqtt7RQzzTGhG4peCplTE5ij67Tt1xPomd-lJFnTqg$>

> - Local DNS caches (e.g. partitioning, use of stale records)
> - Resilience and fault-tolerance (e.g. single points of failure)
> - Support for debugging and analysis
> - DNS Push (accepting responses to queries that have not yet been
> issued)
Same thing I don’t think that there is consensus on this.

We don't need consensus that a topic is worthwhile in order to include it in a working group charter.  We merely need to believe that there is some positive interest and potential for a technical consensus to emerge without derailing the working group's other topics.

I personally
think it is a bad idea, but I seem to recall from earlier discussions
that others agreed with me. IMHO this belongs in the relevant, but more
challenging for  consensus building category.

I don't think this topic is particularly controversial, and versions of this idea have been considered previously without major incident, e.g. [2].  This is purely a performance question; there is little security relevance, because we are speaking about answers delivered from the same resolver and query path as all the other DNS responses.

In any case, RFC 8484 DoH already defines DNS Push (Section 5.3), along with some rules about when it cannot be used.  It does not, however, provide any additional guidance that might support practical use, and has some significant limitations.  Including this topic would allow us to improve the specification of DNS Push, or indeed deprecate it if that is the technical consensus.

[2] https://tools.ietf.org/html/draft-wkumari-dnsop-multiple-responses-05<https://urldefense.com/v3/__https:/tools.ietf.org/html/draft-wkumari-dnsop-multiple-responses-05__;!rx_L75ITgOQ!QpYiYmLfw5x0GNCzn55qgsVeik8Scqtt7RQzzTGhG4peCplTE5ij67Tt1xPomd8TK2_YaQ$>

So long
-Ralf
—--
Ralf Weber
--
Add mailing list
Add@ietf.org<mailto:Add@ietf.org>
https://www.ietf.org/mailman/listinfo/add<https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/add__;!rx_L75ITgOQ!QpYiYmLfw5x0GNCzn55qgsVeik8Scqtt7RQzzTGhG4peCplTE5ij67Tt1xPomd-iZisPzQ$>