Re: [dns-privacy] Discovery of DNS over (not 53) and ALPN

Ted Hardie <ted.ietf@gmail.com> Fri, 13 December 2019 14:43 UTC

Return-Path: <ted.ietf@gmail.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A6E812011D for <dns-privacy@ietfa.amsl.com>; Fri, 13 Dec 2019 06:43:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fmRw8kT9daIR for <dns-privacy@ietfa.amsl.com>; Fri, 13 Dec 2019 06:43:35 -0800 (PST)
Received: from mail-io1-xd34.google.com (mail-io1-xd34.google.com [IPv6:2607:f8b0:4864:20::d34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5CAA012009E for <dns-privacy@ietf.org>; Fri, 13 Dec 2019 06:43:35 -0800 (PST)
Received: by mail-io1-xd34.google.com with SMTP id k24so2625905ioc.4 for <dns-privacy@ietf.org>; Fri, 13 Dec 2019 06:43:35 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=GEI96nti8njIR7xTin4jyntANJbQFVtqY61Jv/daWg0=; b=Z/q4ovqzzPs0SPqq/4am2lxRcpmtb3wRx1T5xlUaWf8IlNhxVem/zvocajbtGfKqJO LaiQstCENzzdNRdf4tEK8cFCQu8sGl5h5xwCsLidbv0JEINNCKAbaDdVxGRJ38PXaeom QdByXGjLSl1Lv2hFDmwAQxTx6udDYH7NddEP6WddUVLYVyjANu7eKl0HjnDu09kLYjR+ 3pN1FKQ4q2eyuJm/+HfwAp1YZIlStBYX4EZ1EH71fUaFIfnewz+mPuubuZ7iu4qyYmjv /dtWxzzrC6nY+FIQVNsvvsvypYR74OHQ7u1TxghHmy0wvvMUEMPnjxxF2nV8KBu1ix6Y wCPw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=GEI96nti8njIR7xTin4jyntANJbQFVtqY61Jv/daWg0=; b=uLxf7aa86AqGI6c9gFkroXW2g4l/0H45thcyRzCvTsympCp54jw4SMt/NSDxegrNzL cPeHX3qtQOeJGsa+T/XhtF1lzXMCfxCptV70US90Cmt8MidMVHR9+GAtBt0VWWL/xZ8I Kf/C//Vp2Msgn42F67Sz95n2cbmGKQ+SQhPIi4bV0kEYKIEJ1gMQczoWSMB47vRgd1SG 60bWhU5FUoNT14OsrPNBHwBs9c6tArUnHWUlJ5TB3O9U7GPJOckFrH7VaFj/jClLwOW/ bLTqbSD6KTXQiyEosuRK/H7banMa5tn3bMuypZi327VbED0DBDgycz4oh4CJevjC4RQq 4UlQ==
X-Gm-Message-State: APjAAAWm1HWLaf8zzcGcUTqhS/xejOAwjMw5jVO39S3GLJxpPATnvUHW t//CjfIRjG7SI7WoBlYHR18HxsCKjI0XqWtamY9EZB+lMZw=
X-Google-Smtp-Source: APXvYqyYr4EF4j4ul4yhWHJaBsEVXBk2adiRQRxrT+uxHKnpVkFI/5s7EwVLFs4P+G+AvB3Abe5nimproGD1L5BBT5g=
X-Received: by 2002:a5d:9a13:: with SMTP id s19mr8146650iol.139.1576248214551; Fri, 13 Dec 2019 06:43:34 -0800 (PST)
MIME-Version: 1.0
References: <CA+9kkMAmsK746ViRb9tXkJX+t_paOGpWCN3i78WK_t86bLGUnQ@mail.gmail.com> <CAKC-DJhiZAv8gESrhvUc5v86TcRXrfASq4ujQ3BxOYnuENrBjg@mail.gmail.com>
In-Reply-To: <CAKC-DJhiZAv8gESrhvUc5v86TcRXrfASq4ujQ3BxOYnuENrBjg@mail.gmail.com>
From: Ted Hardie <ted.ietf@gmail.com>
Date: Fri, 13 Dec 2019 14:43:08 +0000
Message-ID: <CA+9kkMA1LC2tMKjqF5Lvthhs+3iNS=hUZLoJXqZG9F8COutDUA@mail.gmail.com>
To: Erik Nygren <erik+ietf@nygren.org>
Cc: dns-privacy@ietf.org
Content-Type: multipart/alternative; boundary="000000000000e7ff79059996e2ae"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/-bAOplbXNri9gw_iCKFwSp_hLSk>
Subject: Re: [dns-privacy] Discovery of DNS over (not 53) and ALPN
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Dec 2019 14:43:38 -0000

Hi Erik,

On Fri, Dec 13, 2019 at 2:12 PM Erik Nygren <erik+ietf@nygren.org> wrote:

> Linking ALPN and port defeats the purpose of ALPN.
>

Unfortunately, ALPN's native "discovery" mechanism is more-or-less connect
and see what the list is.  That's pretty much what the original respondents
are trying to avoid.

If you have an external method, you can certainly make it more detailed
(and a set of tuples is a way to do that), but there is question of
synchronization of the addresses used in each.  If DHCP/RA are going to be
used for discovery, what I think that means is that if both the current DNS
option and a DNS-Tuple option are present, the DNS-Tuple option's
information would have to supersede any information in the current options.

So, let's back up a step:  are people interested in using DHCP and RA as
part of the discovery story here or not?

regards,

Ted

It would be preferable to have the discovery mechanism
> enumerate an preference-ordered list of tuples of {host/ip(s), port,
> proto/alpn, [uri_template]}.
> This is similar to what Alt-Svc in HTTP does as well as what SVCB does.
> For example:
>
>    { 192.168.1.2, 853, "doq" }
>    { 192.168.1.2, 853, "dot" }
>    { 192.168.1.3, 443, "dot" }
>    { "doh.example.com", 443, "h2", "https://doh.example.com/query/?{}" }
>    { 192.168.1.1, 53, "do53" }
>
> The main driving factor for having an ALPN token is for cases when there
> is a desire to configure dot and doh to share a port (especially 443)
> for some use-case.
>




> Regards, Erik
>
>
> On Fri, Dec 13, 2019 at 8:53 AM Ted Hardie <ted.ietf@gmail.com> wrote:
>
>> So this came up in an another thread, but it probably needs a separate
>> topic.
>>
>> The point being made was:
>>
>> We really need to figure out how to do DoWhatever discovery, preferably
>>> better than probe ports on the same IP as the port 53 server.
>>>
>>
>> I think one critical question is how discovery of DoT and DoH (and later
>> entrants)  servers is related to the discovery of port 53 servers.  One
>> possibility here, if we do define ALPN tokens for each of these, is to
>> combine that token with the base discovery methods.  So, DHCPv4 Option 6
>> (or DHCPv6 option 23) gives you the IP address of the server, and a new
>> DNS-ALPN option code gives you the ALPN(s), from which you derive the port.
>>
>> If the DNS-ALPN option code is absent, go to port 53.  If there is one
>> present, it is a list, like the ALPN next protocol list, of the tokens
>> corresponding to the list the server supports.  This implies that you would
>> need an ALPN token for DoT port 853 to be available and distinct from DoT
>> port 443.
>>
>> Router advertisements are a little trickier.  If someone is currently
>> using RFC 8106 style advertisements, I think it would be cleaner to have
>> those still present and a new option for DNS-over-not-53 options.  That
>> could still leverage the ALPN list as a way of making that a single option
>> (rather than a bunch of separate announcements).
>>
>> There are clearly operational environments that wouldn't follow this
>> (those that use the URI template in RFC 8484, for example), but something
>> that allows you to signal them together does seem useful.
>>
>> Note that this approach means that if you have a client that supports DNS
>> over 53 and doesn't understand the ALPN token in the new option, you can
>> run into a corner case.  If the network does not support DNS over 53, the
>> client will fail to see the alternatives to port 53.  It would then have to
>> interpret an ICMP destination unreachable (presuming that gets through).
>>
>> I'm not an expert on either DHCP or RA, of course, so I may have this
>> wrong way around.
>>
>> regards,
>>
>> Ted
>> _______________________________________________
>> dns-privacy mailing list
>> dns-privacy@ietf.org
>> https://www.ietf.org/mailman/listinfo/dns-privacy
>>
>