Re: [Add] Warren Kumari's Discuss on draft-ietf-add-resolver-info-12: (with DISCUSS and COMMENT)

mohamed.boucadair@orange.com Thu, 04 April 2024 06:37 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E17B8C14F5FD; Wed, 3 Apr 2024 23:37:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LsavwZ_JAhmz; Wed, 3 Apr 2024 23:37:40 -0700 (PDT)
Received: from smtp-out.orange.com (smtp-out.orange.com [80.12.126.238]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9249CC14F5F6; Wed, 3 Apr 2024 23:37:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; i=@orange.com; q=dns/txt; s=orange002; t=1712212660; x=1743748660; h=to:cc:subject:date:message-id:references:in-reply-to: mime-version:content-transfer-encoding:from; bh=Q+lOmRf7onRRTxCL4wxv8BDvDH1f8QlHkk9fKpuvh58=; b=QG1uvzx5Kvn6rbg+ha8t2TKdSduP+qYZGkEzMBt+6zcP9ozBaQPFQaHx v4vUNCkE2VDZmesmr9zTDBuAnV6TjZ4q0xS8Mv8g50csqaOPQLgN0B4OF 2qfSbVqODRh0g+Pnlxay08V6mtn748LklVZL3Ou1BKGRrtdEh8V0ZkNJZ mfQvEjEqtTv2/FiQ6mMTu3Qtu+JYaQ+gnNsROr1yTHHWH9vKj/pbEn9K2 tqXCtFE9+HGGnRDZVODYsd6qmTwDQiAsbZQY2kISUlTN0mxqOiCMBsEbj w644RguZ0EPD9i5ELyoLy0dok5UBK97MG1xv72c88K+bwZleYWQE39nY+ A==;
Received: from unknown (HELO opfedv1rlp0d.nor.fr.ftgroup) ([x.x.x.x]) by smtp-out.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Apr 2024 08:37:37 +0200
Received: from unknown (HELO opzinddimail7.si.fr.intraorange) ([x.x.x.x]) by opfedv1rlp0d.nor.fr.ftgroup with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Apr 2024 08:37:37 +0200
Received: from opzinddimail7.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with SMTP id 3D07922EE43; Thu, 4 Apr 2024 08:37:36 +0200 (CEST)
Received: from opzinddimail7.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id A70CE22EE22; Thu, 4 Apr 2024 08:37:05 +0200 (CEST)
Received: from smtp-out365.orange.com (unknown [x.x.x.x]) by opzinddimail7.si.fr.intraorange (Postfix) with ESMTPS; Thu, 4 Apr 2024 08:37:05 +0200 (CEST)
Received: from mail-he1eur04lp2050.outbound.protection.outlook.com (HELO EUR04-HE1-obe.outbound.protection.outlook.com) ([104.47.13.50]) by smtp-out365.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Apr 2024 08:37:07 +0200
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com (2603:10a6:10:49b::6) by AM0PR02MB5937.eurprd02.prod.outlook.com (2603:10a6:208:188::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7409.46; Thu, 4 Apr 2024 06:37:03 +0000
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::18a0:3679:a134:1d02]) by DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::18a0:3679:a134:1d02%6]) with mapi id 15.20.7409.042; Thu, 4 Apr 2024 06:37:03 +0000
From: mohamed.boucadair@orange.com
X-TM-AS-ERS: 10.218.35.126-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-DDEI-TLS-USAGE: Used
Authentication-Results: smtp-out365.orange.com; dkim=none (message not signed) header.i=none; spf=Fail smtp.mailfrom=mohamed.boucadair@orange.com; spf=Pass smtp.helo=postmaster@EUR04-HE1-obe.outbound.protection.outlook.com
Received-SPF: Fail (smtp-in365b.orange.com: domain of mohamed.boucadair@orange.com does not designate 104.47.13.50 as permitted sender) identity=mailfrom; client-ip=104.47.13.50; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="mohamed.boucadair@orange.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 include:spfa.orange.com include:spfb.orange.com include:spfc.orange.com include:spfd.orange.com include:spfe.orange.com include:spff.orange.com include:spf6a.orange.com include:spffed-ip.orange.com include:spffed-mm.orange.com -all"
Received-SPF: Pass (smtp-in365b.orange.com: domain of postmaster@EUR04-HE1-obe.outbound.protection.outlook.com designates 104.47.13.50 as permitted sender) identity=helo; client-ip=104.47.13.50; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="postmaster@EUR04-HE1-obe.outbound.protection.outlook.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:40.92.0.0/15 ip4:40.107.0.0/16 ip4:52.100.0.0/14 ip4:104.47.0.0/17 ip6:2a01:111:f400::/48 ip6:2a01:111:f403::/49 ip6:2a01:111:f403:8000::/51 ip6:2a01:111:f403:c000::/51 ip6:2a01:111:f403:f000::/52 -all"
IronPort-Data: A9a23:1KMhCq1uWiEMpdg/MfbD5eJ2kn2cJEfYwER7XKvMYLTBsI5bp2FVy DcYUD3SMvvbZGDweY9yOYW1oxxSsMTSnN5rGQRlqSg9HnlHl5HIVI+TRqvS04J+DSFhoGZPt Zh2hgzodZhsJpPkjk7xdOKn9BGQ7InQLpLkEunIJyttcgFtTSYlmHpLlvUw6mJSqYDR7zil5 5Wq/KUzBHf/g2Qoaj5MsPrZwP9SlK+aVA0w7wVWic9j7Ae2e0k9VPo3Oay3Jn3kdYhYdsbSq zHrlezREsvxpn/BO/v9+lrJWhRiro36ZGBivkFrt52K2XCukMCQPpETb5LwYW8P49mAcksYJ N9l7fRcQi9xVkHAdXh0vxRwS0lD0aN6FLDvP1i9ldHK1Vz9I1TNnahjVUoWBKcC07MiaY1O3 aRwxDElQy25377z4J/iD+5mi4IkMdXhO54Ztjd41zbFAP06QJfFBaLX+dtf2zR2jcdLdRrcT 5NBNXwzM1KZOFsSYj/7C7pm9Ausrnz4czRdpV7Tr60q6GHfxQ1r+L/3Odzad5qBQsA9ckOw/ TiXoz2pW01y2Nq37hms4n6Tn/L1vRzBU7I/K+GF8OBgjwjGroAUIEZNDwfkyRWjsWahUshFJ ko8+TcrpLIzskqmUrHVXhCjr1aFswISHd1KHIUS5BuExLaR4guFCC0NQjIEctE9s8soSCZv1 1mHmPvoCCBh9rqPRhq1/7uY6DiyMCkPNkcDaDMKCwwf7LHLqY0/phPCUtglF7S65vXpHjP9x SuiqSk1nbIIisAXka68+Dj6bymEo5HISks161zaQ3j9sgdhPtb4P8qv9ETR6utGIMCBVF6ds XMYms+YqucTEZWKky/LS+IIdF202xqbGCP8g3pyRoMwzGSC2iD+cNlbwAhUPm48Z67oZgTVS EPUvApQ4rpaM32rcbJ7buqN5yICnPCI+TPNBqG8UzZeXqWdYjNr6wlARCatM43FlUEtleQ/N M6WbNz0UXICU/w6lHyxWvsX1qItymYm32TPSJvnzhOhl72DeHqSTrRDO1yLBgzY0E9miFSJm zq8H5LRo/m6bAEYSneKmWL0BQ5XRUXX/bis96Rqmhere2KK4l0JBf7L2q8GcId4halTneqg1 ijiAxUBlgun2yOfdl/ihpVfhFXHDM4XQZUTbHREALpU8yR6Ot/HAFo3K8VoIeJ3rLwLIQBcF qNbJJzZahiwdtg3029GN8WixGCTXBGqjhiJJC2rfHA0eIR4LzElCfe1FjYDABImV3Lt3eNn+ +PI/lqCHfIrGV4+ZO6IM6jH5w3q4hAgdBdaBBagzi97Ixm3r+CH6kXZ0pcKHi37AU+TnGTEi l3IUX/1Z4Dl+ucIzTUAvojcx6/BLge0NhMy87XzhVp3CcXbwoZn6aJ9ar7UOBDwDSbz8qjkY vhJxfbhNvFBhExNr4d3D7dsy+Q5+sfroLhZiA9jGR0nqny1X6h4LCDuMdZn78VwKn1x4WNam X5jPvFdI7yPN86jG1kUTObgRvrWzukaw1E+8txpSHjHCPdLwYe6
IronPort-HdrOrdr: A9a23:y0Yrm6HWRa4LDBw0pLqFtZLXdLJyesId70hD6qkvc3Fom52j/f xGws5x6fatskdrZJkh8erwW5VoMkmsj6KdgLNhdYtKOTOLhILGFvAE0WKP+Vzd8mjFh5ZgPM RbAuND4b/LfD5HZK/BiWHWferIguP3iZxA7t2urUuFODsaD52ImD0JbzpzfHcXeCB2Qb4CUL aM7MtOoDStPV4NaN6gO3UDV+/f4/XWiZPPe3c9dlMawTjLqQntxK/xEhCe0BtbeShI260e/W /MlBG8zrm/ssu81gTX2wbonthrcZrau5R+7f63+4kowwbX+0aVjUNaKv6/VQUO0a+SAZAR4Z vxSlkbToFOAjjqDxyISFPWqnXdOXAVmjXf4E7djn35rcPjQjUmT8JHmIJCaxPcr1Etpddmzc twrhWkXrdsfGb9dR7Glqz1fgAvklDxrWspkOYVgXAaWYwCaKVJpYha+E9OCp8PEC/z9YhiSY BVfYjhzecTdUnfY2HSv2FpztDpVnMvHg2eSkxHvsCOyTBZkH1w0kNdzs0CmXUL8o47VvB/lp L5G7UtkKsLQt4dbKp7CutEScyrCnbVSRaJK26WKUSPLtB0B5rnw6SHn4ndJNvaC6Ag3d83gt DMQVlYvWk9dwb1CMWU0JBO+hDJS2OtGS/q1txf4JZwtLH6Wf7zKiuIREo1n8bImYRuPiSAYY fMBHt/OY6TEVfT
X-Talos-CUID: 9a23:e5sqtWDCCh8UjVX6EzdH9moJQ9o0SS3y7SmNLhazKV9DUpTAHA==
X-Talos-MUID: 9a23:XqtcvwppgwL0S2sYB/wezxZBHddk3L2zMmAyq542lvbYCCpuMTjI2Q==
X-IronPort-AV: E=Sophos;i="6.07,178,1708383600"; d="scan'208";a="32941814"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mwM/McUq83thxc9QuHpwg/vZAGKWZbJrqlJux4i7M2+uaY+qypG26HzNIWALeVNQgQpwk5BG5N53hTnQXk7XO0RBdN7rzpHSuHJxHxWZiA2vGu9Bs/oAQUI+th/XObtFcE91zZSZArIXFGBAmkdh2P0+Xg3FQ+55wostYUzLOPfUtz6qSDxyT2UYVZpWv+H9cNonyPbuJ7vVdLhc7RhAowJUUyra0j6ro8h79J69y30tIG9c3EyvTbaaZ2Y7nk+NRfLvHS9Xd0niTpH7WLLLYe00AB4HnGEeKW8bBO8F6qmOwbV03Imgha/nZXYpOmukWETgGT72d8apO70J32ExhQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cQwm6LnKoNdoJbzy2n/FWY2KRQMoC9MlbfU5RxXTuG4=; b=OyHHpYf2n4du8RkHMQgkzbQK+4JKGtsHdDeD9gHtAtt1CTojhRSAnDP3VH8KDJkao2P/C8rk+Lq2CMaTbarnABdo4a6g/MRbbLdd5SbrBRRiou1WUgHHdOVOPSwOJXSZDfJwqajLu+ffzFRW1y2OUBbfAdZy6Qs/BvEdqOGncK4maiPb0QzPV4uLC/aMKbUf+SsMUobrQ7TsfOffKSZsxf2VDbNzZTd+1/DPxJ85Fl6GrKHxsO5Mvslk/lMavPNV5L5NkREk6V8i4ZHXIG2a1EylwzAeFUkATpvF5Ug6q9fruRRrrq8Z1EqUAE99VUVTNYh3NqItOOJmxSQWxnVLSw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=orange.com; dmarc=pass action=none header.from=orange.com; dkim=pass header.d=orange.com; arc=none
To: Warren Kumari <warren@kumari.net>, The IESG <iesg@ietf.org>
CC: "draft-ietf-add-resolver-info@ietf.org" <draft-ietf-add-resolver-info@ietf.org>, "add-chairs@ietf.org" <add-chairs@ietf.org>, "add@ietf.org" <add@ietf.org>, "tojens@microsoft.com" <tojens@microsoft.com>
Thread-Topic: Warren Kumari's Discuss on draft-ietf-add-resolver-info-12: (with DISCUSS and COMMENT)
Thread-Index: AQHahgLg65XBFbM1nEitrzJWAphK5bFXla1A
Date: Thu, 04 Apr 2024 06:37:03 +0000
Message-ID: <DU2PR02MB10160F8A69F319B223A1E9F0D883C2@DU2PR02MB10160.eurprd02.prod.outlook.com>
References: <171217498221.10117.2764285055937915803@ietfa.amsl.com>
In-Reply-To: <171217498221.10117.2764285055937915803@ietfa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=4191330c-28cb-4f74-9162-0087c313fe5d; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2024-04-04T06:30:47Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_ContentBits=0; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Enabled=true; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Method=Standard;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DU2PR02MB10160:EE_|AM0PR02MB5937:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2PR02MB10160.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(366007)(376005)(1800799015); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: ls5CbiZuiIlk5rV6yxcChmCGayOTts3g0LIZVXGfk9oxTy+vgDtNnYXqUKyT9U6Hzpa+bOHHVu80MKqW1yT/1p+0FLlK+XqpRp0gCMGtd9SFpu1XQI0Tm/Yu+0SNW0wZHl9zUoMUGsHnHvdiitFZ6VnVVOGydaPFe+MO6Wr084plFZYe4FJ/rbpAkFuusQOiDvW9ul5SBOIeVrcycbfxTQZJ6P0cJhHuSFoKYH3/cEZRfjIAjuIIFYRtTXTyCx7B8MsbG7Zupc1Qnn1p7dxHEskCoCuF1FmgR+IFs5Bd2vbUBZCeYjl7UQ4/ikZpaUhtLahgcmTb7MAQaxQPVAVBXYDz4IuxKVttHH5iFlFhokjViMRtaZsqcGL6tb5Y6ZzfH+DHUmOs2ewAWTR1L/mRcATm/RkPFXQvYVC0AJdBLR/2DiJVvPHuBzwuiFwayigOfkkpJb5N2i0YpeCN2JwD472fJcpVvTphCfTIhy3vMNQasa8NMO51JyHO1Cb1QVKseSN6h7XzsAPFDmjK7LlmVhR2sXnIoDAMD6Rsn8766yDMEp4jFAtzCJIkM6F0Nye3E7+one9JJkWJRI/gr+5EvFvMTyys+66JoV51qUZWhfF5zDYE/JQcmnuctiLmr6UCTmKYIdbAcJD01wOkqEmzGL9lS9CYYAzzhMUmTQUdjl0QayS8KJRQpTl1it51Px+6AvEThmCWMKYT5+H4ofFvG0sfIy3GLN1kb86WkQeQ2pB4tOt+QGApup/VjbWNzUC7erHTIo09hYeI5s6UJm20gIYik5WHYjYohx3408Ozn9q54NGH0nkoibrVkPEZf//LyHN2TX0ypfYsEKD96QpSPzCkZo6Iat4NspH6mqwdSnBxloV/DgQmxLQUdJTd6pqyPMP07X4eBrHwZMkdLloNncOsJ/Tqp0cUv2cytmmPw35JcEzOHEPunzkCAjjNTRqcMdHMTDUZsdHogF5kw+Z/Pv02SewQZzUgpAVMEfWQBLAZHeHT9en87e+i7mRaaU1jFJXUZnpzKD8s1XBOqvYdyBK8ipAFkq67dl9uS0fCYShOuaPNQ9Z36Gj49CT5t7sO/hvWITPK2n1ml9VlqpAFzlFM4lqr59S/ug1tQoausatupzZVSpZ01zG3AW5HpqYjv/rgjd24/26asp7PicywPdqKqkxUHyCcXQqyBRD+0kBsg+tvEAzq5RffCEIfcOttyQYE4h1xl24i8tdBgqrz+D9OD/k5yEdOmmE3gNVGdaHQmvLGjFN0QTf3nBkW4glz/DPkr2ryBQQHFrgkiEmsyynx8tSG2zJnLsRGseZ+EQR5nmNNeVSNNzi1FSFtxARTEpECjJ7u6cbmTXEZTJoL6iEQNd9ajOSTKvyLrItWXA/nyf3bk+yNqrsVlRZEinwklICCxMBRkon0DTQ3foVu4rVdZfTgQFL5jn8T6wXjj9pX+c1qbD5sbzg2nTC2D3TYg8Te2e5C156YyY6UomTbNz6kIkA/OMKjJoIN6WNj33o30Ai0nFUZDiKd3nZ4zGBv7XyBcSrhIlEIhuxN/NHbcxJ6qtjthb1E2j3Nx2qsbAtmAWjOZdvJigzuLMv5BvUN2WNjEHUVHgj++kTCYlKB+g==
Content-Type: text/plain; charset="iso-8859-1"
MIME-Version: 1.0
X-OriginatorOrg: orange.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU2PR02MB10160.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4664dd72-e726-4bd1-43d9-08dc5471a3ec
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Apr 2024 06:37:03.7549 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 90c7a20a-f34b-40bf-bc48-b9253b6f5d20
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: JgEEPVwg8ZoHmV/dKhDAVW+PQFL1s7hSLPLE24wD5kwz1juu1O8J5L3f9ItMa3BcZ79cqB1FYjj9IxHS4S6POQpvEj+G+0JvjIW17XoxdJA=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR02MB5937
X-TM-AS-ERS: 10.218.35.126-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-TMASE-Version: DDEI-5.1-9.0.1002-28296.005
X-TMASE-Result: 10--41.294700-10.000000
X-TMASE-MatchedRID: 7u3eoxEoplCRIcMttWNNnPuTB8mJF8HKQQ5+hY6u+4406PrU0YucBMC5 DTEMxpeQhIualSoKckk6GXnjOtHn8sI3KsN4RNfkvWpFctURopaqFx2c/3V5cdDEMPvvoocvf4m dWjbGBu6U62zvc1Dlo8LnqBU8vRHq25W0z2blJhlDQYe+1GQPNbhnIdsRfnZzb04uIQZycc1mbh 0iAtvPyAwfBYyGYzpWL2EYbInFI5uqoYavcamf/KnL54M5CzEQzfqlpbtmcWg10wJPYcToKC99T +uJIleRLhd6ma7WE8tuqbWjKBTk5suHgW1QxPEafYgoHl6iERI4ZNXh8UPrIAK0ZgbTOeKUWsMv 01sS8mJKKQ/kQgkQZKe76VC6sRoKpiyHHPSCnbBta0+wzEmWSVheX9txfBto+INzkPGTt0ffUZT 83lbkEKuh8RiDcI8dayDsErw/KBidIZooubDs77uiz7x1IS/hfS4VoVRdGCu/yN2q8U674gJFmi Te2v8rPZUgKS5CKkRKyUpDbUpQyk2EQBGQ3rkAEBp1CsCJevKiVU7u7I4INW7BSyDZmAnxfL8fH UCAmuuP6+yJxjaKiPFS4TFv1me49476zw8HRMD9u77cJ0N/QAihQ5NZCXsSkYC3rjkUXRJYC5LP d7BvbYfraCyyl8ERq9YyptElK5dT20Dy27f9PlABg26Z45x9rltvlARhKR2ycrvYxo9Kp8K+joM 7FGIaRtUL4XifTnsy1wZlOdC/gSxwRHceBBbLbZxWTwL68j5oMLOoNHsM9lpjn692i6cIjSdnJC 0YNlFTfVTRgF5agm3EI6RpNPLUK6ElxKNvMkstpgq1T2vTSJ4CIKY/Hg3A8gGd4jv8zaP9a7Q38 w1tP7Yh47+6UnDR4Vgz4iPA9/OScoiX+LYwHa0hbOeGOMG1+gtHj7OwNO0CpgETeT0ynA==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
X-TMASE-INERTIA: 0-0;;;;
X-TMASE-XGENCLOUD: 252458f9-9e7d-4afa-bf4f-946bb8f18056-0-0-200-0
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/znDqG8yfZq_mx4lEzilnpBXxyeU>
Subject: Re: [Add] Warren Kumari's Discuss on draft-ietf-add-resolver-info-12: (with DISCUSS and COMMENT)
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Apr 2024 06:37:45 -0000

Hi Warren,

Thank you for the review. Much appreciated!

A diff to track the changes can be found at: https://author-tools.ietf.org/api/iddiff?url_1=https://boucadair.github.io/add-resolver-information/draft-ietf-add-resolver-info.txt&url_2=https://boucadair.github.io/add-resolver-information/boucadair-patch-2/draft-ietf-add-resolver-info.txt.

Please see inline for more context.

Cheers,
Med

> -----Message d'origine-----
> De : Warren Kumari via Datatracker <noreply@ietf.org>
> Envoyé : mercredi 3 avril 2024 22:10
> À : The IESG <iesg@ietf.org>
> Cc : draft-ietf-add-resolver-info@ietf.org; add-chairs@ietf.org;
> add@ietf.org; tojens@microsoft.com; tojens@microsoft.com
> Objet : Warren Kumari's Discuss on draft-ietf-add-resolver-info-12:
> (with DISCUSS and COMMENT)
> 
> Warren Kumari has entered the following ballot position for
> draft-ietf-add-resolver-info-12: Discuss
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut
> this introductory paragraph, however.)
> 
> 
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
> 
> 
> I'd like to start off by apologizing for the tone of this DISCUSS - I
> know that
> you've put a lot of work into this document, and getting a review like
> this is
> frustrating. I suspect that a fair bit of my concern can be addressed
> by having
> the document be much clearer about the intended use case / what the
> actual
> problem is that it is solving.

[Med] As a background, this specification covers the following item in the ADD WG Charter: 

"Define a mechanism that allows communication of DNS resolver
information to clients for use in selection decisions. This could be
part of the mechanism used for discovery, above."

The draft sets the base for a mechanism for resolvers to explicitly reveal key properties that will be useful for server selection. An initial set of properties is defined here, but more can be registered in the future.

> 
> My DISCUSS is quite similar to Paul Wouters' -- there is much in this
> document
> which seems unclear and/or underspecified and/or incomplete.
> 
> As an initial example, the Introduction starts off with:
> "Historically, DNS clients communicated with recursive resolvers
> without
> needing to know anything about the features supported by these
> resolvers.
> However, recent developments (e.g., Extended Error Reporting [RFC8914]
> or
> encrypted DNS) imply that earlier assumption no longer generally
> applies."
> 
> I don't really see how "that earlier assumption no longer generally
> applies" --
> my laptop is configured to use Google Public DNS

[Med] ... which I guess you configured manually, because you trust it at the first place. I don't know if you will maintain that same resolver, if for example, you have been told that resolver filters/blocks some specific queries, does not limit the amount of information it leaks upstream, etc.

, which happens to
> support RFC
> 8914 (Extended DNS Errors) and QNAME Minimization.

[Med] One would glean this info here and there, but there is no formal claim from the resolver itself that it supports those.

 My laptop happily
> communicates with 8.8.8. without knowing **anything about the
> "features
> supported by these resolvers"**. I *could* see an argument being made
> that my
> laptop should know if the resolver supports various flavors of
> encrypted DNS so
> that it knows to connect over an encrypted transport, but that's what
> RFC9462,
> RFC9463 are for, no?

[Med] That part is already covered by DNR/DDR and covered by this part of the charter:

"This could be part of the mechanism used for discovery, above."

> 
> "Instead of depending on opportunistic approaches, DNS clients need a
> more
> reliable mechanism to discover the features that are supported by
> resolvers."
> Similar to the prior -- why do clients *need* this?

[Med] because you care about privacy, filtering, etc. 

 My laptop is
> currently
> working just fine without it. The document seems to have this base
> assumption
> throughout, but it doesn't really seem to justify it -- I'm hoping /
> assuming
> that this is sufficiently obvious within the WG that it was just
> omitted
> because "everyone knows".

[Med] Tweaked the intro to make this clearer: https://github.com/boucadair/add-resolver-information/pull/30/commits/9ab541c54c1b6a4ade7583953cdc075823dab157

> 
> "Retrieved information can be used to feed the server selection
> procedure.
> However, that selection procedure is out of the scope of this
> document." -- is
> this the justification for all of the above assertions? If so, I think
> that A:
> the document needs to be much more explicit about this (don't "bury
> the lede")
> and B: some sort of advice about *how* is would be used seems needed -
> - I get
> that you don't want to specify the whole selection procedure, but
> something
> like "the server selection procedure could use this to prioritize
> privacy-preserving resolvers over those that don't do QNAME
> minimization" or
> similar...

[Med] Thanks. 

NEW:

"For example, the resolver selection procedure may use the retrieved information to prioritize privacy-preserving resolvers over those that don't enable QNAME minimization. However, that selection procedure is out of the scope of this document."

> 
> Section 3:
> "If the Special-Use Domain Name "resolver.arpa", defined in [RFC9462],
> is used
> to discover an encrypted DNS resolver, the client can retrieve the
> resolver
> information using the RESINFO RR type and QNAME of "resolver.arpa". In
> this
> case, a client has to contend with the risk that a resolver does not
> support
> RESINFO. The resolver might pass the query upstream, and then the
> client can
> receive a positive RESINFO response either from a legitimate DNS
> resolver or an
> attacker. The DNS client MUST set the Recursion Desired (RD) bit of
> the query
> to 0. The DNS client MUST discard the response if the AA flag in the
> response
> is set to 0, indicating that the encrypted DNS resolver is not
> authoritative
> for the response." This says "In this case, a client has to contend
> with the
> risk that a resolver does not support RESINFO." -- but surely that is
> true for
> the other cases too? Many clients live behind DNS forwarders / middle-
> boxes,
> which will happily pass unknown RR types upstream, but won't
> necessarily pass
> e.g EDNS responses back. If one of these clients sees that the
> "resolver"
> supports EDE, but the forwarder drops these, the client is being lied
> to.
> Perhaps the techniques in this document are only allowed to be used
> over
> encrypted DNS transports?

[Med] This excerpt is specific to DDR as called out it explicitly in the text:

   If the Special-Use Domain Name "resolver.arpa", defined in [RFC9462],
   is used to discover an encrypted DNS resolver,

 This might be implied by the fact that you
> are
> supposed to use "resolver.arpa" or "the QNAME of the domain name that
> is used
> to authenticate the DNS resolver", but if so, this is really not clear
> in the
> document. If that is indeed the case, the document needs to be much
> much more
> explicit about this, and also discuss what happens if you query for
> this over a
> non-encrypted protocol (which many resolvers won't actually know).

[Med] We wanted to avoid redundant statements in the document, but the security section states the following:

   DNS clients communicating with discovered DNS resolvers MUST use one
   of the following measures to prevent DNS response forgery attacks:

   1.  Establish an authenticated secure connection to the DNS resolver.

   2.  Implement local DNSSEC validation (Section 10 of [RFC8499]) to
       verify the authenticity of the resolver information.

> 
> In addition, this says: "The DNS client MUST set the Recursion Desired
> (RD) bit
> of the query to 0. The DNS client MUST discard the response if the AA
> flag in
> the response is set to 0, indicating that the encrypted DNS resolver
> is not
> authoritative for the response." - is the "indicating that the
> *encrypted* DNS
> resolver" (and this section) implying that the RD bit must only be set
> to 0
> when using the RFC9462 resolver.arpa mechanism, or whenever looking up
> RESINFO?
> I'd assume the latter, but that conflicts with the "*encrypted* DNS
> resolver"
> bit.

[Med] Good catch. Fixed at: https://github.com/boucadair/add-resolver-information/pull/30/commits/fcc293e88b9b75887923d3207740afd9a7f628db

> 
> Why is it useful / important for a client to know that a resolver
> supports
> specific EDE errors? E.g If RESINFO says that Resolver X supports
> "exterr=15,16,17", and the resolver suddenly sends back Extended DNS
> Error Code
> 5 - DNSSEC Indeterminate, what should the client *do*? Is it a
> violation to
> send back an EDE Code not covered by the capability list?

[Med] Added this NEW:

"Once a resolver is selected, this document does not interfere with DNS operations with that resolver." 

 What if I
> run a
> resolver, and advertise "exterr=42", and then add additional support
> for codes
> 1, 2 and 3? I guess I have to wait for the TTL to expire before
> advertising
> these? Seeing as the document doesn't really explain what the
> information is
> used for, it's not clear when (other than at initial connection) a
> client would
> re-query for it. Many resolvers are also anycast at this point -- what
> capabilities should be advertised if the set is not uniform across all
> members?
> The minimum enclosing set? The maximal set?

[Med] We already added this text per Erik's review: 

"If a group of resolvers is sharing the same ADN and/or anycast address, then these instances SHOULD expose a consistent RESINFO."

> 
> The document also lists qnamemin and exterr as the supported
> capabilities -
> it's not at all clear why those ones were selected as important
> capabilities
> and not e.g 0x20, port randomization, jurisdiction, logging level and
> retention, favorite flavor of ice-cream, etc. If it is just that these
> happened
> to be two capabilities that you happened to choose, I think that it
> would be
> worth clarifying this

[Med] Already added this text to address other reviews:

NEW:
That information is scoped to cover properties that are used to infer privacy and transparency policies of a resolver. Other information can be registered in the future per the guidance in {{key-reg}}.


 -- the document does say "New keys can be
> defined as per
> the procedure defined in Section 8.2.", but the focus on qname and EDE
> in the
> text makes it sound like these are the primary uses.
> 
> infourl:
> "It is not intended for end user consumption as the URL can possibly
> provide
> misleading information. A DNS client MAY choose to display the URL to
> the end
> user, if and only if the encrypted resolver has sufficient reputation,
> according to some local policy" -- so, which is it?

[Med] This provided in the sec cons:

"local policy (e.g., user configuration, administrative configuration, or a built-in list of reputable resolvers)"

 If a DNS client
> does
> display this to the end user, they will consume it (and possibly be
> misled).
> This also seems like it is ripe for phishing / advertising -- "Welcome
> to
> BestHotels, thank you for using our wonderful Encrypted DNS server.
> For only
> $19.95 per day, you can get the DNSSEC validating version of this
> service,
> enter your Credit Card Below!!!"
> 
> Security Considerations:
> "An encrypted resolver may return incorrect information in RESINFO. If
> the
> client cannot validate the attributes received from the resolver, that
> will be
> used for resolver selection or displayed to the end-user, the client
> should
> process those attributes only if the encrypted resolver has sufficient
> reputation according to local policy (e.g., user configuration,
> administrative
> configuration, or a built-in list of reputable resolvers). " This
> feels very
> hand-wavey / underspecified - "If the client cannot validate the
> attributes
> received from the resolver, [...] the client should process those
> attributes
> only if the encrypted resolver has sufficient reputation according to
> local
> policy." I don't really understand this -- how could a client validate
> the
> attributes?
 Surely not because they are DNSSEC signed / delivered over
> encrypted DNS? (That doesn't prove that the data is correct, only that
> it is
> what the resolver operator sent) So, how would a client validate that
> Resolver
> X supports e.g EDE Codes 9, 10, 11? Does this just boil down to "Don't
> trust
> any of this unless local policy says to?"
> 
> 

[Med] Will double check that part.

____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.