Re: [Add] Warren Kumari's Discuss on draft-ietf-add-resolver-info-12: (with DISCUSS and COMMENT)

mohamed.boucadair@orange.com Thu, 04 April 2024 07:56 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EB0CC14F6ED; Thu, 4 Apr 2024 00:56:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.093
X-Spam-Level:
X-Spam-Status: No, score=-7.093 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E6emOcQS9H3w; Thu, 4 Apr 2024 00:56:51 -0700 (PDT)
Received: from smtp-out.orange.com (smtp-out.orange.com [80.12.210.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 06DD2C14F6BF; Thu, 4 Apr 2024 00:56:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; i=@orange.com; q=dns/txt; s=orange002; t=1712217410; x=1743753410; h=to:cc:subject:date:message-id:references:in-reply-to: mime-version:from; bh=NWd1RumimsQLXvuV7P9T7abm0yNPKT7CnhGjJglf1N4=; b=OXsBUvCGNw+0n40hAVhDAGl2a/eEiDyKr0wZod/zSP1OqWF+Vs227rlL lnZERP6Bv3Rsu4tcVQwqnkeWol/bIoTT9KThSpPg0iB6lZwKJqYYWQZC2 R9y/aVDCa2rS2jCFsHLIT+uwsH/jDk5KY48AgKzjSQLCGBVD5p11ZQJc/ b5QW044mqv8GagiEBiOmV7k6BFwMQFUV7CZ0vmqNcp8byBB4jRx7fgDWx zU1JCoA/Uxj6gWg0NgpjpXe+qV0qfpeqOM5Ya5MXnnLAG3/0dTrIKkp0J MD2R6j2579YOLOruI6IVRt8RPD0z/q8qfJpjwt0Lbc6/ua9evkNXxNSAV g==;
Received: from unknown (HELO opfedv1rlp0d.nor.fr.ftgroup) ([x.x.x.x]) by smtp-out.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Apr 2024 09:56:47 +0200
Received: from unknown (HELO opzinddimail5.si.fr.intraorange) ([x.x.x.x]) by opfedv1rlp0d.nor.fr.ftgroup with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Apr 2024 09:56:48 +0200
Received: from opzinddimail5.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with SMTP id B8F3910642DA; Thu, 4 Apr 2024 09:56:47 +0200 (CEST)
Received: from opzinddimail5.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id B651210643B2; Thu, 4 Apr 2024 09:56:27 +0200 (CEST)
Received: from smtp-out365.orange.com (unknown [x.x.x.x]) by opzinddimail5.si.fr.intraorange (Postfix) with ESMTPS; Thu, 4 Apr 2024 09:56:27 +0200 (CEST)
Received: from mail-vi1eur04lp2051.outbound.protection.outlook.com (HELO EUR04-VI1-obe.outbound.protection.outlook.com) ([104.47.14.51]) by smtp-out365.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Apr 2024 09:56:27 +0200
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com (2603:10a6:10:49b::6) by AS2PR02MB10316.eurprd02.prod.outlook.com (2603:10a6:20b:648::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7409.46; Thu, 4 Apr 2024 07:56:24 +0000
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::18a0:3679:a134:1d02]) by DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::18a0:3679:a134:1d02%6]) with mapi id 15.20.7409.042; Thu, 4 Apr 2024 07:56:24 +0000
From: mohamed.boucadair@orange.com
X-TM-AS-ERS: 10.218.35.125-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-DDEI-TLS-USAGE: Used
Authentication-Results: smtp-out365.orange.com; dkim=none (message not signed) header.i=none; spf=Fail smtp.mailfrom=mohamed.boucadair@orange.com; spf=Pass smtp.helo=postmaster@EUR04-VI1-obe.outbound.protection.outlook.com
Received-SPF: Fail (smtp-in365b.orange.com: domain of mohamed.boucadair@orange.com does not designate 104.47.14.51 as permitted sender) identity=mailfrom; client-ip=104.47.14.51; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="mohamed.boucadair@orange.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 include:spfa.orange.com include:spfb.orange.com include:spfc.orange.com include:spfd.orange.com include:spfe.orange.com include:spff.orange.com include:spf6a.orange.com include:spffed-ip.orange.com include:spffed-mm.orange.com -all"
Received-SPF: Pass (smtp-in365b.orange.com: domain of postmaster@EUR04-VI1-obe.outbound.protection.outlook.com designates 104.47.14.51 as permitted sender) identity=helo; client-ip=104.47.14.51; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="postmaster@EUR04-VI1-obe.outbound.protection.outlook.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:40.92.0.0/15 ip4:40.107.0.0/16 ip4:52.100.0.0/14 ip4:104.47.0.0/17 ip6:2a01:111:f400::/48 ip6:2a01:111:f403::/49 ip6:2a01:111:f403:8000::/51 ip6:2a01:111:f403:c000::/51 ip6:2a01:111:f403:f000::/52 -all"
IronPort-Data: A9a23:B0QmD68qrvEIucYrOq2vDrUDTXmTJUtcMsCJ2f8bNWPcYEJGY0x3n DQaWjqHOfvZNzDxKopxOoqwpEpT78TVzd83GlBv+SsxFiIbosf7XtnIdU2Y0wF+jyHgoOCLy +1EN7Es+ehtFie0Si+Fa+Sn9z8lvU2xbuKUIPbePSxsThNTRi4kiBZy88Y0mYcAbeKRW2thg vus5ZWAULOZ82QsaD5Mt/rY8EkHUMna41v0gHRvPJing3eOzxH5PLpHTYmtIn3xRJVjH+LSb 44vG5ngows1Vz90Yj+Uuu6Tnn8iG9Y+DiDX4pZiYJVOtzAZzsAEPgTXA9JHAatfo23hc9mcU 7yhv7ToIesiFvWkdOjwz3C0HgkmVZCq9oMrLlC4iJ3U6G7EaULQ4O9fC14cJqYV+8toVDQmG fwwcFjhbziuutjunPeFa7Apgc4uas72IIkYp3dsiynDCuorSozCRKOM4sJE2DA3hYZFGvO2i 8gxMGIzKkifJUQTfApOYH49tL/Aan3XdjpYoVeYqew95HXYxQB40aLFN8DcfNOHA85Smy50o 0qdpTWnWE1LbLRzzxKv7E+0qb/yuxnwG7tNHeLg2L1n2GeMkzl75Bo+DgDh/abRZlSFc9FYL UAI+zAGoq079UjtRd74NzWnqWSesxg0WMdVGvc7rgeA1sL84guCCUAFQyJPLts8u6ceSSYj2 EPMnt71C3lmvLHQU3+G8bOKoCn3OC4bKkcDaDMKCwwf7LHLqY0/yxnPR9d5C4a0g8H7Xzbqz FiipSQyr7QekcBN0L+0lXjbhDChoIPhSw8+/ALMWWy5qAh+YeaYi5eA7FHa6bNeLd+UU0PZ4 HwcwZDDtaYJEI2HkzGLTKMVBra16v2ZMTrax1lyA50m8Dfr8HmmFWxN3N1gDEBQY4EjWj3zW XPwozJW+7VIF3arQLAiNupdFP8W5aTnEN3kUNXdYdxPfoV9eWe7EMdGNBb4M4fFwBlErE0vB ap3Z/pAGl4zNcxaINeeQu4c1fo1x3kz2HmLGZTjlUz6iPyZeWKfTqoDPB2WdOcl4aiYoQLTt dFCK8+NzBYZW+r7CsU2zWLxBQFRRZTYLcmtwyCySgJlClQ7cI3GI6GMqY7Ng6Q/w8xoeh7gp xlRoHNwxlvlnmHgIg6XcH1lY76Hdc8g9ChiY310YwjwhCJLjWOTAEE3JsNfkV4PpbQL8BKIZ 6VcIJzo7glnFmqYp29NNcmVQHJKLU712lvXV8ZaXNTPV8U7HVCWkjMVVg7u/zMJFS25qYM1p Ke4vj43srJSLzmO+P3+Mar1p3vo5SZ1sLsrAyPgfIMPEG2yq9ICA3Kq3pcKzzQkc0WrKs2yj FnHXn/1ZIDl/+cIzTU+rfnY99/zSrYhQRQy8quyxe/eCBQ2N1GLmedoONtktxiEPI8o0M1Op Nm5zs0Q9NUqoWwS789CMu8uyqgzodzyu7Vd0wJoWm3RaEimAa9hJX/A2tRTsqpKxflSvg7et oen5IxBIbvQUC/6OAd5GebnRrzrOTIodv366u48Jkr3oiRw+dJrlG1MagKUhnU1wKRdbOsY/ Av5hPMr1g==
IronPort-HdrOrdr: A9a23:y2dWTqm0Gt6H69iGil5wnp5WuFfpDfOzimdD5ihNYBxZY6Wkfp +V8cjzhCWftN9OYhodcIi7SdG9qXO1z/5ICPoqTMyftWjdyR2Vxe5ZnO/fKlHbdREWs9QtrJ uIEJIOQeEYb2IK6voSiTPQe7pO/DDEytHPuQ609QYPcegeUdAE0+4PMHf4LqQZfmh7LKt8MK DZyttMpjKmd3hSRN+8HGM5U+/KoMCOvI76YDYdbiRXozWmvHeN0vrXAhKY1hARX3dk2rE561 XIlAT/++GKr+y78BnBzGXehq4m0ucJi+EzSfBkuPJlZQkEuTzYKriJnIfy/QzdldvfpGrCVu O84yvIcf4DqE85NVvF2ycFkzOQrQrGrUWSgWNxjRbY0LDEbSN/BMxbiY1DdBzFr0ImodFnya pOm3mUrpxNEHr77VHADvXzJmJXf3CP0AgfuP9Wi2YaXZoVabdXo4Ba9ERJEI0YFCa/7Iw8Cu FhAMzV+f4TKDqhHgfkl3gqxMbpUmU4Hx+ATERHssuJ0yJOlHQ8y0cD3sQQknoJ6Zp4QZhZ4O bPNLhuidh1P7srRLM4AP1ETdq8C2TLTx6JOGWOIU7/HKVCIH7Jo46f2sRE2AhrQu148HJpou W/bLpxjx9NR37T
X-Talos-CUID: 9a23:1qIgTG3xpcED9Rahf/fTp7xfHfl0NVr+zm3pH2yiOGF2Yqa+RF695/Yx
X-Talos-MUID: 9a23:QI6k0AkP32S9CjPr/ONxdnpIKvpwzPSTLnoG0qxZspbcG299Yw2C2WE=
X-IronPort-AV: E=Sophos;i="6.07,178,1708383600"; d="scan'208,217";a="32962490"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gmsNXPFGGoNW/Dms4LacmActyANzJ8RvmrUJjIrqiWpTqijyUkrV6KGykBdLOZ9AAY6TvJGtxN2WRMaPM0bi67CInFgWSbJMAcSCbsXcBx+Um3xomf8EDO+FTRxBOMvTSguYs5fkXz/zQo8gHm1yITrLEQVeP7wDO/9Urr5oF/mDsJ6vqi/D7hbgRYCcBs8ErHKcYb7MXMJLgaFzm6yPmtOfogAJd5gwD71UY7sVW+sTZdQUddPncbwqEVd7Wk3xgIE02KTd3b043JeW/rbkcJ5AdHyclBpHu4I0R+5caeaoKB1w0EhAhig6ez+HdOXIVewhs1I1hFPvfX3n4WDbRw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=guOXOf8jUJ3L4JUXYGuspRE/v3QNtg67SnMJkejEwDk=; b=Q44YKc3lxng3eG3lA7yLVJtLT9NwiRGoYRdg5BOqzzK3hQU/zNfUkc+ViUSvkSy1eTewY8Kemk0aL/KKODX91juOJ28UrY099WT5/2i9l+CjToBaKEWZMQQzUve8JjSq9D1oZs1mxC6xeTTtIwE8ePqH2aGAnaV77D9UxLjrgPDlRGdjErmlWVCEH9qiOPs1CX8y4Sw5m7gCCdxwD37b4vNYEKZGQBDtcvp6R3v8Lg9BrDjnKksv3rO4vzJ/5z376Cq2H+2Aho7V+RaaPBpGYJ4pHraEuA7NHBuTe57Jg6oLjsDS1/aD8l15plqxci+CasOp+G7HeUrKpc/RXaexAA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=orange.com; dmarc=pass action=none header.from=orange.com; dkim=pass header.d=orange.com; arc=none
To: tirumal reddy <kondtir@gmail.com>, Warren Kumari <warren@kumari.net>
CC: The IESG <iesg@ietf.org>, "draft-ietf-add-resolver-info@ietf.org" <draft-ietf-add-resolver-info@ietf.org>, "add-chairs@ietf.org" <add-chairs@ietf.org>, "add@ietf.org" <add@ietf.org>, "tojens@microsoft.com" <tojens@microsoft.com>
Thread-Topic: [Add] Warren Kumari's Discuss on draft-ietf-add-resolver-info-12: (with DISCUSS and COMMENT)
Thread-Index: AQHahmRjg7qKEmjoKkiU/L7F3zwAR7FXvbsA
Date: Thu, 04 Apr 2024 07:56:24 +0000
Message-ID: <DU2PR02MB10160F014D95E86542120AAE9883C2@DU2PR02MB10160.eurprd02.prod.outlook.com>
References: <171217498221.10117.2764285055937915803@ietfa.amsl.com> <DU2PR02MB10160F8A69F319B223A1E9F0D883C2@DU2PR02MB10160.eurprd02.prod.outlook.com> <CAFpG3gcjLcoian9KJhtr3n8m4=Sz4x4ZmYsGq1B76jt4c49WgQ@mail.gmail.com>
In-Reply-To: <CAFpG3gcjLcoian9KJhtr3n8m4=Sz4x4ZmYsGq1B76jt4c49WgQ@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=b9020b61-b9fb-45b0-a5a9-d103c4aeccc9; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2024-04-04T07:56:09Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_ContentBits=0; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Enabled=true; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Method=Standard;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DU2PR02MB10160:EE_|AS2PR02MB10316:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2PR02MB10160.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(376005)(1800799015)(366007); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: ZmJcKZpqHLC1jWMwsdxaM/IwdbYyz/qJ31KC++ihhk9pKLNrkD35Hb9/Fe09HYaDhfItYKmDw6o3xAFSxiqYqtwrSV0G8tD2CZ5bmaUdHWfXQIou+5FJaFsdFe715IdZ8RGMCFO70+mAyvyCvi+iTS1cdHgRX78goIKutOa1uK/48eIi3kUa7ugycm8NFWtvtTeTeYk+Kl0/2mpWfpwO6AiYL7wla+WdXIDiXuHadmAwSqp44lMGzcarXTU1PtOBXwXV4csWudO+MBwnE9iPtPGiUgBjUQUNjVhnSLqWhsTsF67teFapMilvQ2ulauJogHkPFy+pjLEApavqDYG0AD9OuOHSHDGp+XgMIvEzXJ40k/siwOyDMIzn/yXvJX0qFYy8+aYwgARqndAP46Yv+PUrTQPbwANZRwqK8q+wpZ676UeQXWMNSldJysf58dHKQKzXH4Izh4a6nA4GA3rYmpU78dgnai14YpmgOhRlrJ8KUZPNIIeKykuucN4grTNNaNHpZjJWdlWTsCAz82bm5K/8BcWmEWYJEIGJjMuerR6pDwUCi0YbbfnLpRQE2lXO2EJHbUlJefy6SWWCVWk3GVP5wVAo94S8B5O4tm91/eZOJS3/heKjbiZB5VARMFdhvw20UE8JCzuvIzdoSrBknixSoQSwRXDGCW2GclPlMRbJZVVH4nNp5IrkyOcJDRmsKNFmyT+WqoPkK41t2eNMD3ggcFL0p94XKr7JiGl2sp6o/oXezhKi+RM12DYQjJU0Ftu9HRGTlg+qzuIYPOkiiVxG9oDYfQH6CZJGCzNJ8lHwUokIgJlxvxi1Va9tIe81NQ51n5KYShlHdfxN2JzotU52kGjK2BOl8FTqfJ772lMBvQ/J+Uxx+yTbF6kPruk3O5oYHpc+OH2PX5MxBFsi8vq8tOZSdFq7HuZ0Z25zlUy+x26FY8R9yBL3QP/GqfOa6cmUzE3qocCCNYrMdk/saypSeBZVpmwjHq6wsRvYU9uFvUZLIv0fGsa4kPtfDdbCdP42KyJ0pBC7570HUrtlUksqSE4OcoFx0w7ZbDn5+IOQvTCBOvR3sjGm4i9FQRFdeNPRGsMT+8Y+0swERTCt/0MProSzTsv5MIYex6Tut3r4MXEHIgzxihPIPQOVp9koYRaKTlodDUm6QLBU/4GRQuNGCOlltfQXXUVDE/0iA7kz9FyYGxwRL5SOjt2gi9qJHSlAbB5xWTJHQzyZWJiwUqR4kIlAfI2JZyBT+zWgAGwjtBYAzrvYzT/zRxb3tBZsj9gGktt8Y9OfPFcdsnNXWBwWsOs1phFko2CdlEqSSThdxObGF79HpKLVpnKthu3INgqvlb5c6vCLvqTWAhcEKSy8oRhAZRFdC725b6/TUlZs97IGcoHj2LPJz0ccTWh9uSACvWL91wMY+AayMqAPhfuuQRrt8GiDlCUSi7eNoE2VaoKT7GCTBwXLb+gLoMEk5bQOJh077Ts5qhcGymKrhMmDasF+9mkpcYXppCwiG5/FKyMSfj+wy5E4y7bFkBcmNZa0ykfJV6uwOmX12QPrsXOF1+Y1ZpCi80FlDCul/O5+50ISSvOQg2+MqL55U6Jut+jpmXyZZPyJzEmShmAQHg==
Content-Type: multipart/alternative; boundary="_000_DU2PR02MB10160F014D95E86542120AAE9883C2DU2PR02MB10160eu_"
MIME-Version: 1.0
X-OriginatorOrg: orange.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU2PR02MB10160.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: cd7280a7-6221-4de2-5209-08dc547cb983
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Apr 2024 07:56:24.4584 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 90c7a20a-f34b-40bf-bc48-b9253b6f5d20
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Qgn6jROMfaPMbYKYtMZIzH/FzB7rowRRx480GcfkqjUFbbOG/glrG+vFUgS85rz9EDpbjWhQYOcCM2guK3BY+u7Q0iDI4dHEGw6aDa7tNTU=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS2PR02MB10316
X-TM-AS-ERS: 10.218.35.125-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-TMASE-Version: DDEI-5.1-9.0.1002-28296.006
X-TMASE-Result: 10--52.178100-10.000000
X-TMASE-MatchedRID: vJMTL+QvMTdBYmUAdSZaCKKAP+IzMHPSMp+us10bfgD0UVCWIpL1p/Gt Nab7feaETuctSpiuWyUXivwflisSrLw1PWikdTTn5wMPMqdPNSydpM1xQKg2JUv2cVJqd1+brWd 6mzUt7wEMb/56lDFzRrDeJMB5o2kwQ+ON76Cnm7lY8HmAnvYQ1mawocwifVZso4vCb3thAW2HQk gbISV/iTzHAJTgtKqw1QQ6Jx/fflby58LQwEBxsE1NJ2MN+nPk3L9bAWfzbS+9t+0bhae11/UWM vmk6jMFlVHM/F6YkvSU1sgHARX+Hrqln+jYe7ZhqHC+QmJ4xwKEkt/L8HtAJ9sWOtYAlnTXHJ8Z inTspZl9Rz+ChTbKECH2Y0Xxk8nY1nkLa3J3C33U1XogwQ8ZWn0/a5OFhscukbb8cUjSe92McUz JS3sH3WQFd4bOnrT6eu0IOt9l7/TijbkQBoso65wkFnjb5BbWM90yViNIbDU+ta/415QhvtIUKE cXjyBBgWGmFGX9CBUsvqYk4iz+9gE57LYNyf+fimzWYYKiqn/igzn1VKbcQQ7fAyDSHjPA+oYKz 1GsRghmD6WMQxhqLrJOtZXi/DJfUCgEErrUGFxbqkxrhGcsT4UKZ31ik9exWrbAxgAsPieyQMxm 96OyeN+pUF0HsjxRHLMdyB+LKtzrQGUex1PL9Y1EI8AWiw6UvUdV7V1iwqnw5FAAxuqtqXd1dm8 glWRQgazMQSGvUyBAiHzYF8aIt4c5XWJfryoppPpQIi8rib7+ZiOJ1P2npCbP1mM61aqrlj4Bbu tl2xsA2c2jAAMCOyRfLRRLTnarIRFqMSEj1tGjxYyRBa/qJSiPO7+OFFZNAosvhn4dUcl1H8bw6 8oiDxM0JxSxHjFJIhbI4bdUUePoo4+3XKH7oNfbpOoaDV5xkGUtrowrXLg=
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
X-TMASE-INERTIA: 0-0;;;;
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/xZ5YkyLT7pQEQm4YXWOaHM_ERGE>
Subject: Re: [Add] Warren Kumari's Discuss on draft-ietf-add-resolver-info-12: (with DISCUSS and COMMENT)
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Apr 2024 07:56:55 -0000

Warren,

Please use this link to track all the changes: Diff: draft-ietf-add-resolver-info-12.txt - draft-ietf-add-resolver-info.txt<https://author-tools.ietf.org/api/iddiff?doc_1=draft-ietf-add-resolver-info&url_2=https://boucadair.github.io/add-resolver-information/draft-ietf-add-resolver-info.txt>.

Cheers,
Med

De : Add <add-bounces@ietf.org> De la part de tirumal reddy
Envoyé : jeudi 4 avril 2024 09:45
À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>
Cc : Warren Kumari <warren@kumari.net>; The IESG <iesg@ietf.org>; draft-ietf-add-resolver-info@ietf.org; add-chairs@ietf.org; add@ietf.org; tojens@microsoft.com
Objet : Re: [Add] Warren Kumari's Discuss on draft-ietf-add-resolver-info-12: (with DISCUSS and COMMENT)

On Thu, 4 Apr 2024 at 12:07, <mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>> wrote:
Hi Warren,

Thank you for the review. Much appreciated!

A diff to track the changes can be found at: https://author-tools.ietf.org/api/iddiff?url_1=https://boucadair.github.io/add-resolver-information/draft-ietf-add-resolver-info.txt&url_2=https://boucadair.github.io/add-resolver-information/boucadair-patch-2/draft-ietf-add-resolver-info.txt.

Please see inline for more context.

Cheers,
Med

> -----Message d'origine-----
> De : Warren Kumari via Datatracker <noreply@ietf.org<mailto:noreply@ietf.org>>
> Envoyé : mercredi 3 avril 2024 22:10
> À : The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>
> Cc : draft-ietf-add-resolver-info@ietf.org<mailto:draft-ietf-add-resolver-info@ietf.org>; add-chairs@ietf.org<mailto:add-chairs@ietf.org>;
> add@ietf.org<mailto:add@ietf.org>; tojens@microsoft.com<mailto:tojens@microsoft.com>; tojens@microsoft.com<mailto:tojens@microsoft.com>
> Objet : Warren Kumari's Discuss on draft-ietf-add-resolver-info-12:
> (with DISCUSS and COMMENT)
>
> Warren Kumari has entered the following ballot position for
> draft-ietf-add-resolver-info-12: Discuss
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut
> this introductory paragraph, however.)
>
>
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>
>
> I'd like to start off by apologizing for the tone of this DISCUSS - I
> know that
> you've put a lot of work into this document, and getting a review like
> this is
> frustrating. I suspect that a fair bit of my concern can be addressed
> by having
> the document be much clearer about the intended use case / what the
> actual
> problem is that it is solving.

[Med] As a background, this specification covers the following item in the ADD WG Charter:

"Define a mechanism that allows communication of DNS resolver
information to clients for use in selection decisions. This could be
part of the mechanism used for discovery, above."

The draft sets the base for a mechanism for resolvers to explicitly reveal key properties that will be useful for server selection. An initial set of properties is defined here, but more can be registered in the future.

>
> My DISCUSS is quite similar to Paul Wouters' -- there is much in this
> document
> which seems unclear and/or underspecified and/or incomplete.
>
> As an initial example, the Introduction starts off with:
> "Historically, DNS clients communicated with recursive resolvers
> without
> needing to know anything about the features supported by these
> resolvers.
> However, recent developments (e.g., Extended Error Reporting [RFC8914]
> or
> encrypted DNS) imply that earlier assumption no longer generally
> applies."
>
> I don't really see how "that earlier assumption no longer generally
> applies" --
> my laptop is configured to use Google Public DNS

[Med] ... which I guess you configured manually, because you trust it at the first place. I don't know if you will maintain that same resolver, if for example, you have been told that resolver filters/blocks some specific queries, does not limit the amount of information it leaks upstream, etc.

, which happens to
> support RFC
> 8914 (Extended DNS Errors) and QNAME Minimization.

[Med] One would glean this info here and there, but there is no formal claim from the resolver itself that it supports those.

 My laptop happily
> communicates with 8.8.8. without knowing **anything about the
> "features
> supported by these resolvers"**. I *could* see an argument being made
> that my
> laptop should know if the resolver supports various flavors of
> encrypted DNS so
> that it knows to connect over an encrypted transport, but that's what
> RFC9462,
> RFC9463 are for, no?

[Med] That part is already covered by DNR/DDR and covered by this part of the charter:

"This could be part of the mechanism used for discovery, above."

>
> "Instead of depending on opportunistic approaches, DNS clients need a
> more
> reliable mechanism to discover the features that are supported by
> resolvers."
> Similar to the prior -- why do clients *need* this?

[Med] because you care about privacy, filtering, etc.

 My laptop is
> currently
> working just fine without it. The document seems to have this base
> assumption
> throughout, but it doesn't really seem to justify it -- I'm hoping /
> assuming
> that this is sufficiently obvious within the WG that it was just
> omitted
> because "everyone knows".

[Med] Tweaked the intro to make this clearer: https://github.com/boucadair/add-resolver-information/pull/30/commits/9ab541c54c1b6a4ade7583953cdc075823dab157

>
> "Retrieved information can be used to feed the server selection
> procedure.
> However, that selection procedure is out of the scope of this
> document." -- is
> this the justification for all of the above assertions? If so, I think
> that A:
> the document needs to be much more explicit about this (don't "bury
> the lede")
> and B: some sort of advice about *how* is would be used seems needed -
> - I get
> that you don't want to specify the whole selection procedure, but
> something
> like "the server selection procedure could use this to prioritize
> privacy-preserving resolvers over those that don't do QNAME
> minimization" or
> similar...

[Med] Thanks.

NEW:

"For example, the resolver selection procedure may use the retrieved information to prioritize privacy-preserving resolvers over those that don't enable QNAME minimization. However, that selection procedure is out of the scope of this document."

>
> Section 3:
> "If the Special-Use Domain Name "resolver.arpa", defined in [RFC9462],
> is used
> to discover an encrypted DNS resolver, the client can retrieve the
> resolver
> information using the RESINFO RR type and QNAME of "resolver.arpa". In
> this
> case, a client has to contend with the risk that a resolver does not
> support
> RESINFO. The resolver might pass the query upstream, and then the
> client can
> receive a positive RESINFO response either from a legitimate DNS
> resolver or an
> attacker. The DNS client MUST set the Recursion Desired (RD) bit of
> the query
> to 0. The DNS client MUST discard the response if the AA flag in the
> response
> is set to 0, indicating that the encrypted DNS resolver is not
> authoritative
> for the response." This says "In this case, a client has to contend
> with the
> risk that a resolver does not support RESINFO." -- but surely that is
> true for
> the other cases too? Many clients live behind DNS forwarders / middle-
> boxes,
> which will happily pass unknown RR types upstream, but won't
> necessarily pass
> e.g EDNS responses back. If one of these clients sees that the
> "resolver"
> supports EDE, but the forwarder drops these, the client is being lied
> to.
> Perhaps the techniques in this document are only allowed to be used
> over
> encrypted DNS transports?

[Med] This excerpt is specific to DDR as called out it explicitly in the text:

   If the Special-Use Domain Name "resolver.arpa", defined in [RFC9462],
   is used to discover an encrypted DNS resolver,

In case of DDR (RFC9462), authenticated encrypted connection is mandatory to the resolver, please see Section 7 of the draft.

<snip>


   DNS clients communicating with discovered DNS resolvers MUST use one

   of the following measures to prevent DNS response forgery attacks:



   1.  Establish an authenticated secure connection to the DNS resolver.



   2.  Implement local DNSSEC validation (Section 10 of [RFC8499]) to

       verify the authenticity of the resolver information.



   It is important to note that, of these two measures, only the first

   one can apply to queries for 'resolver.arpa.



</snip>


 This might be implied by the fact that you
> are
> supposed to use "resolver.arpa" or "the QNAME of the domain name that
> is used
> to authenticate the DNS resolver", but if so, this is really not clear
> in the
> document. If that is indeed the case, the document needs to be much
> much more
> explicit about this, and also discuss what happens if you query for
> this over a
> non-encrypted protocol (which many resolvers won't actually know).

[Med] We wanted to avoid redundant statements in the document, but the security section states the following:

   DNS clients communicating with discovered DNS resolvers MUST use one
   of the following measures to prevent DNS response forgery attacks:

   1.  Establish an authenticated secure connection to the DNS resolver.

   2.  Implement local DNSSEC validation (Section 10 of [RFC8499]) to
       verify the authenticity of the resolver information.

>
> In addition, this says: "The DNS client MUST set the Recursion Desired
> (RD) bit
> of the query to 0. The DNS client MUST discard the response if the AA
> flag in
> the response is set to 0, indicating that the encrypted DNS resolver
> is not
> authoritative for the response." - is the "indicating that the
> *encrypted* DNS
> resolver" (and this section) implying that the RD bit must only be set
> to 0
> when using the RFC9462 resolver.arpa mechanism, or whenever looking up
> RESINFO?
> I'd assume the latter, but that conflicts with the "*encrypted* DNS
> resolver"
> bit.

[Med] Good catch. Fixed at: https://github.com/boucadair/add-resolver-information/pull/30/commits/fcc293e88b9b75887923d3207740afd9a7f628db

>
> Why is it useful / important for a client to know that a resolver
> supports
> specific EDE errors? E.g If RESINFO says that Resolver X supports
> "exterr=15,16,17", and the resolver suddenly sends back Extended DNS
> Error Code
> 5 - DNSSEC Indeterminate, what should the client *do*? Is it a
> violation to
> send back an EDE Code not covered by the capability list?

[Med] Added this NEW:

"Once a resolver is selected, this document does not interfere with DNS operations with that resolver."

 What if I
> run a
> resolver, and advertise "exterr=42", and then add additional support
> for codes
> 1, 2 and 3? I guess I have to wait for the TTL to expire before
> advertising
> these?

Added text to explain how the scenario can be handled:
If the resolver's capabilities are updated to include new error codes, the resolver can terminate the TLS session, prompting the client to initiate a new TLS connection. This allows the client to become aware of the resolver's updated capabilities.

Seeing as the document doesn't really explain what the
> information is
> used for, it's not clear when (other than at initial connection) a
> client would
> re-query for it. Many resolvers are also anycast at this point -- what
> capabilities should be advertised if the set is not uniform across all
> members?
> The minimum enclosing set? The maximal set?

[Med] We already added this text per Erik's review:

"If a group of resolvers is sharing the same ADN and/or anycast address, then these instances SHOULD expose a consistent RESINFO."

>
> The document also lists qnamemin and exterr as the supported
> capabilities -
> it's not at all clear why those ones were selected as important
> capabilities
> and not e.g 0x20, port randomization, jurisdiction, logging level and
> retention, favorite flavor of ice-cream, etc. If it is just that these
> happened
> to be two capabilities that you happened to choose, I think that it
> would be
> worth clarifying this

[Med] Already added this text to address other reviews:

NEW:
That information is scoped to cover properties that are used to infer privacy and transparency policies of a resolver. Other information can be registered in the future per the guidance in {{key-reg}}.


 -- the document does say "New keys can be
> defined as per
> the procedure defined in Section 8.2.", but the focus on qname and EDE
> in the
> text makes it sound like these are the primary uses.
>
> infourl:
> "It is not intended for end user consumption as the URL can possibly
> provide
> misleading information. A DNS client MAY choose to display the URL to
> the end
> user, if and only if the encrypted resolver has sufficient reputation,
> according to some local policy" -- so, which is it?

[Med] This provided in the sec cons:

"local policy (e.g., user configuration, administrative configuration, or a built-in list of reputable resolvers)"

 If a DNS client
> does
> display this to the end user, they will consume it (and possibly be
> misled).
> This also seems like it is ripe for phishing / advertising -- "Welcome
> to
> BestHotels, thank you for using our wonderful Encrypted DNS server.
> For only
> $19.95 per day, you can get the DNSSEC validating version of this
> service,
> enter your Credit Card Below!!!"

We can remove the text to display this info to the end-user even for trusted resolvers.

>
> Security Considerations:
> "An encrypted resolver may return incorrect information in RESINFO. If
> the
> client cannot validate the attributes received from the resolver, that
> will be
> used for resolver selection or displayed to the end-user, the client
> should
> process those attributes only if the encrypted resolver has sufficient
> reputation according to local policy (e.g., user configuration,
> administrative
> configuration, or a built-in list of reputable resolvers). " This
> feels very
> hand-wavey / underspecified - "If the client cannot validate the
> attributes
> received from the resolver, [...] the client should process those
> attributes
> only if the encrypted resolver has sufficient reputation according to
> local
> policy." I don't really understand this -- how could a client validate
> the
> attributes?
 Surely not because they are DNSSEC signed / delivered over
> encrypted DNS? (That doesn't prove that the data is correct, only that
> it is
> what the resolver operator sent) So, how would a client validate that
> Resolver
> X supports e.g EDE Codes 9, 10, 11? Does this just boil down to "Don't
> trust
> any of this unless local policy says to?"
>
>

The attributes ("qnamemin" and "exterr") defined in this spec cannot be validated by the client but attributes defined in future specifications could possibly be validated by the client.

Cheers,
-Tiru
____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.