Re: [apps-review] apps-team review of draft-ietf-mif-dns-server-selection

"Murray S. Kucherawy" <msk@cloudmark.com> Wed, 14 September 2011 18:18 UTC

Return-Path: <msk@cloudmark.com>
X-Original-To: apps-review@ietfa.amsl.com
Delivered-To: apps-review@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAAD121F8C58 for <apps-review@ietfa.amsl.com>; Wed, 14 Sep 2011 11:18:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.698
X-Spam-Level:
X-Spam-Status: No, score=-101.698 tagged_above=-999 required=5 tests=[AWL=-1.699, BAYES_00=-2.599, J_CHICKENPOX_51=0.6, J_CHICKENPOX_52=0.6, J_CHICKENPOX_53=0.6, J_CHICKENPOX_54=0.6, J_CHICKENPOX_55=0.6, J_CHICKENPOX_56=0.6, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2vUH1oRzQugP for <apps-review@ietfa.amsl.com>; Wed, 14 Sep 2011 11:18:47 -0700 (PDT)
Received: from ht1-outbound.cloudmark.com (ht1-outbound.cloudmark.com [72.5.239.35]) by ietfa.amsl.com (Postfix) with ESMTP id AA1B221F8BA9 for <apps-review@ietf.org>; Wed, 14 Sep 2011 11:18:47 -0700 (PDT)
Received: from EXCH-C2.corp.cloudmark.com ([172.22.1.74]) by malice.corp.cloudmark.com ([172.22.10.71]) with mapi; Wed, 14 Sep 2011 11:20:57 -0700
From: "Murray S. Kucherawy" <msk@cloudmark.com>
To: "teemu.savolainen@nokia.com" <teemu.savolainen@nokia.com>
Date: Wed, 14 Sep 2011 11:20:56 -0700
Thread-Topic: apps-team review of draft-ietf-mif-dns-server-selection
Thread-Index: AcxyrBw6zVCShQsaRQaFoCi5Am4oqAALTEuAAAtSoYA=
Message-ID: <F5833273385BB34F99288B3648C4F06F13512DFC58@EXCH-C2.corp.cloudmark.com>
References: <F5833273385BB34F99288B3648C4F06F13512DFC2A@EXCH-C2.corp.cloudmark.com> <916CE6CF87173740BC8A2CE44309696202573D36@008-AM1MPN1-032.mgdnok.nokia.com>
In-Reply-To: <916CE6CF87173740BC8A2CE44309696202573D36@008-AM1MPN1-032.mgdnok.nokia.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "apps-ads@tools.ietf.org" <apps-ads@tools.ietf.org>, "apps-review@ietf.org" <apps-review@ietf.org>
Subject: Re: [apps-review] apps-team review of draft-ietf-mif-dns-server-selection
X-BeenThere: apps-review@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Apps Area Review List <apps-review.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/apps-review>, <mailto:apps-review-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/apps-review>
List-Post: <mailto:apps-review@ietf.org>
List-Help: <mailto:apps-review-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/apps-review>, <mailto:apps-review-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Sep 2011 18:18:49 -0000

> -----Original Message-----
> From: teemu.savolainen@nokia.com [mailto:teemu.savolainen@nokia.com]
> Sent: Wednesday, September 14, 2011 6:56 AM
> To: Murray S. Kucherawy
> Cc: apps-review@ietf.org; apps-ads@tools.ietf.org; mif@ietf.org
> Subject: RE: apps-team review of draft-ietf-mif-dns-server-selection
> 
> Thank you very much for your extensive review, I have replied and commented
> inline. I cc'd mif, apps-ads, and apps-review - hope it is ok.

Fine with me, though I can't reply to mif since I'm not on it so I've dropped it from this reply.  Feel free to forward this as well.

> Minor Issues:
> . The IANA Considerations section seems to be a little understated.  I would
> suggest copying the one from RFC3646 and modifying it accordingly.
> 
> Teemu>Roger that, I updated my -05 candidate IANA considerations section to
> look following (as of now):
> --
>    This memo requests IANA to assign two new option codes.  First option
>    code is requested to be assigned for DHCPv4 DNS Server Selection
>    option (TBD) from the DHCP option code space defined in section "New
>    DHCP option codes" of RFC 2939.  Second option code is requested to
>    be assigned to the DHCPv6 DNS Server Selection option (TBD) from the
>    DHCPv6 option code space defined in section "IANA Considerations" of
>    RFC 3315.
> --

That's probably good enough.  It will be replaced again by the RFC Editor when IANA does the assignment, but it's more clear here what you are requesting.

> . The use of "domain" in the first paragraph of Section 1 is ambiguous.  The
> word "domain" is unfortunately overloaded to mean management domain, DNS
> domain, and probably some others, plus the usual dictionary definition.  I
> recommend simply saying "a solution for IPv6."  Don't be surprised if a DNS
> Directorate reviewer complains about this as well.
> 
> Teemu>It now says:".multi-interfaced nodes and provides a solution", as the
> solution is proposed for both IPv4 and IPv6.

OK.

> . The document in general makes use of the term "DNS suffix".  It could be
> that I've simply never encountered the term before, but it took me a while
> of reading to realize this actually meant "domain name".  I would suggest
> clarifying this up front someplace, or changing it to "domain name"
> throughout.
> 
> Teemu>It was changed to "domain" throughout. However, for section 4.1 (where
> this is introduced) I added further clarification that "domain" is referring
> to "DNS domain name suffixes":
> --
> ...matching to specific DNS domain name suffixes or reverse (PTR record) lookup
>           requests matching to specific network addresses (later referred as
> "domain" and "network").
> --

I still think the use of "suffix" is odd, though it's hard to argue that it's technically incorrect.  For foobar.nokia.com, I would think "nokia.com" is the domain name, not a suffix attached to the name "foobar".  I'd be more comfortable with calling "foobar" a prefix, but even that doesn't seem right to me.

If you really like the term "suffix", I suggest putting a paragraph somewhere early on saying "When we use the term 'DNS suffix', we actually mean a domain name that is the root of future queries in common" or something like that.

> . The last paragraph of Section 2.4 is confusing.  It says "After the
> interface change[,] a host could have both positive and negative DNS cache
> entries no longer valid on the new network interface."  Should that
> "both.and" be "either.or"?  I'm not clear on how a single node can have both
> positive and negative DNS cache entries no longer valid on the new
> interface, unless you mean some of its cache will be positive and wrong and
> some of its cache will be negative and wrong (about different names) after
> the move.  This should be clarified.
> 
> Teemu> Section 2.2..  It tries to say any cached entry may or may not be
> valid after interface change - as you guessed. How about:
> --
> A thing worth noting is that network specific IP addresses can cause
> problems also for a single-homed node, if the node retains DNS cache during
> movement from one network to another. After the network change, a node may
> have both wrong positive and wrong negative entries in its DNS cache.> --

I suggest:

It is worth noting is that network specific IP addresses can cause
problems also for a single-homed node, if the node retains DNS cache during
movement from one network to another. After the network change, a node may
have entries in its DNS cache that are no longer correct or appropriate for its
new network position.

> . I found it strange to read RFC2119 normative language Section 4.1 which
> describes an internal-use algorithm for collecting and organizing data
> learned from DHCP and DHCPv6 to build up a set of rules for deciding which
> nameserver(s) to use for which queries.  The same sort of thing appeared
> later in Sections 4.5 and 4.6.  My understanding is that, since DHCP and
> DHCPv6 are the wire protocols used and this section describes an
> internal-use mechanism, these bits of the text shouldn't include any RFC2119
> language; there is nothing here that affects interoperability between two
> nodes implementing this protocol.  If a node implementing this gets it
> wrong, it only hurts itself; the wire protocols don't break.  If this
> section were to be separated into its own document, it would be
> Informational, not Standards Track.  This isn't a showstopper for me, but I
> did find it unusual.
> 
> Teemu>The normative text for this algorithm is there mostly due concerns
> that otherwise this option could open a new attack vector. By describing how
> a node MUST handle the information it receives, the risk of attacks should
> be decreased. The normative text is there also so that if a node claims
> compliancy to RFC, network operator who provides such options (to build a
> system) could expect a node to behave as is described.

OK.  In that case, I suggest that this be stated either before the normative stuff begins, or along with it, to show how important it is that this be the way things are done.

Another approach would be to spell out the security implications of not precisely following the algorithm later on in Section 10.

> . There are a few places in the document, the Introduction and Section 4.1
> for example, that talk about PTR lookup requests matching specific IPv6
> prefixes.  However, the abstract mentions IPv4 support, and the mechanism is
> also described for IPv4.  I suggest making a quick pass through the document
> to be sure it doesn't appear as if IPv6 is the focus and IPv4 was added in
> as an after-thought.
> 
> Teemu>Well IPv4 was after-thought as I would have settled for IPv6-only but
> WG wanted IPv4 option as well:-)

I'm afraid I agree with the working group then.  :-)

> The -04 version should have cleared several
> of these "IPv6 focus" issues (by talking about network addresses instead of
> prefixes), but I guess checking again would not hurt. On the other hand,
> IPv6 really is the focus here, as multi-interface behavior with IPv4 anyway
> is terrible mess due widespread usage of RFC1918 addressed networks (and
> that's why I'm secretly hoping DHC WG would say they don't want to use DHCP
> option code for this option and hence this technology must be IPv6-
> only:-D.

This is also text you might want to add in there, perhaps in a later section or an appendix, explaining why doing this in IPv4 space is more challenging.  Referring to another document that already discusses this is fine as well.

> . The normative language in Section 4.1 around DNSSEC seems to be the kind
> of thing that should be left for local policy.  I can envision environments
> where the client isn't doing anything sensitive enough to demand DNSSEC, so
> the first reply it gets from any nameserver it queried is probably fine.
> The same sort of thing reappears in Section 4.4.
> 
> Teemu>This document should already allow such local policy. Section 4.4.
> describes possibility of "unless the node is specifically configured to do
> so.". The DNSSEC requirement has been very hard on MIF WG mailing list
> discussions in order to fight against creation of new attack vectors, hence
> easing that requirement requires restarting of those discussions. See also
> section 4.4 for cases where DNSSEC is not required - like the option 1:"The
> server selection option is delivered across a secure, trusted channel."

I think the thing that's nagging me the most about 4.1 is this: "Therefore, a DNSSEC-aware resolver MUST NOT proceed with a reply that cannot be validated using DNSSEC if DNS queries sent to other servers are still pending."  If my node is DNSSEC-aware and connected simultaneously to the public internet and a corporate VPN, but neither the public nameserver nor the one on the corporate VPN use DNSSEC, then by this rule my node can't use any reply at all.  It seems to me that ought to be a SHOULD NOT, because this is a case where my resolver can just use whatever replies it gets.

It could also be that you're saying you SHOULD NOT use any replies until (a) you get a DNSSEC one back or (b) you get all of them back and none of them are DNSSEC-protected in which case you can use any of them at your discretion.  If that's the case, then you should say so.

> . In Section 4.2, the paragraph starting "If the OPTION_DNS_SERVER_SELECT
> contains." was a little confusing to read.  It says in general that when
> learning about DNS servers available, the node can update what it knows but
> can't forget what it's learned, however it can ignore things it chooses to
> ignore.  I found this difficult to follow.  Some expansion of this
> paragraph, perhaps with examples, might help.
> 
> Teemu>I wonder if it would be actually wiser just to keep one instance of
> the option contents in memory (from most trusted network interface?), and
> ensure all legitimate DHCP servers have the same content for the same DNS
> server option?

You might just keep everything and rank them in decreasing order of trust, evaluated through some appropriate means (known friendly networks first, secured networks second, public networks third), and then search top-to-bottom when you're preparing to send a query.  That's just off the top of my head though; you guys are the experts here.  :-)

> . Section 4.4 says a node MUST NOT use the feature being described here
> unless specifically configured to do so.  That seems odd.  Is the intent to
> have implementations force this feature off-by-default?
> 
> Teemu>Pretty much so, due security concerns. Please note that other SDOs or
> organizations that create profiles may say that in their environments the
> feature shall be on-by-default.

Fair enough.  It's a minor point, but I would probably be more comfortable with:

Use of OPTION_DNS_SERVER_SELECT is ideal in the following environments, but SHOULD NOT be enabled by default otherwise:

<and then put your list here>

> . I didn't understand this sentence in Section 4.5: "When both options are
> received from the same network interface ., the resolver MUST make the
> decision which one to prefer based on preferences."
> 
> Teemu>modified to:"...decision which one to prefer based on DNS preference
> field value.". Better?

Yes.

> . Section 7 says "To ensure nodes' routing . works correctly, network
> administrators should also deploy related technologies for that purpose."
> Are there any that can be suggested or referenced here?
> 
> Teemu>I actually removed that sentence on -04 as it is probably better to
> tie different solution documents together in some other document (like at
> draft-ietf-v6ops-ipv6-multihoming-without-ipv6nat ). The reference could
> have been to RFC4191 and MIF DHCPv6 route option (at least).

Your call; removing it is fine, pointing the reader to a useful technology to fill that gap is fine too.

> . Appendix A is called "Best Current Practice", but the first section starts
> out "A possible current practice."  Where's the best one, and why is it
> best?
> 
> Teemu>well.. changed title of Appendix A to "Possible alternative practices
> for DNS server selection". Better?

Yes.

> Nits:
> . In Section 5, the explanation bullets under Figure 7 include two DHCPv6
> replies.  The second one covered "example.com" and a specific IPv6 suffix,
> but it's not clear that there was no overlap with the first one (i.e., the
> first one could've said the same thing).  It should be made clear that they
> had disjoint replies.
> 
> Teemu>Ok.. changed to:
> ---
>    2.  The node obtains domain 'domain1.example.com' and IPv6 network
>        '0.8.b.d.0.1.0.0.2.ip6.arpa' for the new interface 1 from DHCPv6
>        server
> ....
>    5.  The node obtains domain 'domain2.example.com' and IPv6 network
>        information, say '1.8.b.d.0.1.0.0.2.ip6.arpa' for the new
>        interface 2 from DHCPv6 server
> ---
> and  later in fig 8:
> --
>    1.  An application makes a request for resolving an FQDN, e.g.
>        'private.domain2.example.com'
> --

Perfect.

> . Appendix A.1 uses the term "hotspot" which is colloquial and might even be
> trademarked.  I suggest "wireless network".
> 
> Teemu>That part was removed at the same time the text talking about leaking
> names was removed..

Why was that removed?  I thought it was a good point.

Good work, thanks for your response!

-MSK