Re: [dns-privacy] [Ext] WGLC : draft-ietf-dprive-unilateral-probing

Paul Hoffman <paul.hoffman@icann.org> Tue, 06 June 2023 15:21 UTC

Return-Path: <paul.hoffman@icann.org>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7461C151B29 for <dns-privacy@ietfa.amsl.com>; Tue, 6 Jun 2023 08:21:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level:
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QTem3DubT8BS for <dns-privacy@ietfa.amsl.com>; Tue, 6 Jun 2023 08:21:54 -0700 (PDT)
Received: from ppa2.lax.icann.org (ppa2.lax.icann.org [192.0.33.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 01E4AC1519B1 for <dns-privacy@ietf.org>; Tue, 6 Jun 2023 08:21:53 -0700 (PDT)
Received: from MBX112-W2-CO-1.pexch112.icann.org (out.mail.icann.org [64.78.33.5]) by ppa2.lax.icann.org (8.17.1.19/8.17.1.19) with ESMTPS id 356FLqTb005651 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 6 Jun 2023 15:21:53 GMT
Received: from MBX112-W2-CO-1.pexch112.icann.org (10.226.41.128) by MBX112-W2-CO-2.pexch112.icann.org (10.226.41.130) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.26; Tue, 6 Jun 2023 08:21:51 -0700
Received: from MBX112-W2-CO-1.pexch112.icann.org ([10.226.41.128]) by MBX112-W2-CO-1.pexch112.icann.org ([10.226.41.128]) with mapi id 15.02.1118.026; Tue, 6 Jun 2023 08:21:51 -0700
From: Paul Hoffman <paul.hoffman@icann.org>
To: Philip Homburg <pch-ietf-dprive@u-1.phicoh.com>
CC: "dns-privacy@ietf.org" <dns-privacy@ietf.org>
Thread-Topic: [dns-privacy] [Ext] WGLC : draft-ietf-dprive-unilateral-probing
Thread-Index: AQHZkAIFa64t/3ey40OqazMThvYUVq99Hf4A//+LIuCAAHi3AIAABMUAgAAOUwCAAGnTAIAAsGwA//+h2FKAAHmKgA==
Date: Tue, 06 Jun 2023 15:21:51 +0000
Message-ID: <3B79D45A-1F95-4A4A-9F8D-D3D9C424B4B2@icann.org>
References: <64e17d73-ea1a-00cb-a8a5-b5cfb39c37ae@innovationslab.net> <45ada5a8-b483-dae7-eb56-88411fb2f75c@innovationslab.net> <7a3cd83a-b80d-f00d-b050-0a1d4845146b@innovationslab.net> <D7C916AC-E47D-45FE-9976-188DAE0775EF@icann.org> <CADyWQ+HMj5NH1g_oCTNxYkGDmp2L3EwmMyOv2-bXeXvp5kvm0A@mail.gmail.com> <6B55CCC0-069F-43DD-B9DA-024E4334D6F4@icann.org> <20c5ac1666e4428b8ffa70c7b9e8a19c@verisign.com> <CADyWQ+HJ7ZLWfwxr6vb9HsERMJXuu-1zD_=cr4S+mZ1ieWrYwQ@mail.gmail.com> <0007CDA7-ADD3-43BB-B5D3-3B1810206E0E@icann.org> <8fbed8926b3f4e28b9f3f76a85e0b619@verisign.com> <CANMuhxt5cE--GUtapEL69dFkAFSU5dF3psMCgNRKj8_dXpsFLA@mail.gmail.com> <ABE27A4A-BA96-4505-A3E3-1FE83CAA5A63@icann.org> <m1q6YGM-0000KoC@stereo.hq.phicoh.net>
In-Reply-To: <m1q6YGM-0000KoC@stereo.hq.phicoh.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [192.0.32.234]
x-source-routing-agent: True
Content-Type: text/plain; charset="us-ascii"
Content-ID: <BAFAF2F6BEDE2A46AF38B0A5CFD6A99B@pexch112.icann.org>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.573,FMLib:17.11.176.26 definitions=2023-06-06_10,2023-06-06_02,2023-05-22_02
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/4FpUcOnD-EY8N9Fej3eMZSxHaNs>
Subject: Re: [dns-privacy] [Ext] WGLC : draft-ietf-dprive-unilateral-probing
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Addition of privacy to the DNS protocol <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Jun 2023 15:21:54 -0000

On Jun 6, 2023, at 8:06 AM, Philip Homburg <pch-ietf-dprive@u-1.phicoh.com> wrote:
> 
>> One large problem with publishing a protocol as "experimental" is
>> there is not objective way to exit that status. There are no criteria
>> that say "this experiment succeeded" or "this experiment failed".
>> 
>> It will take much less IETF effort to fix the charter now than it
>> will to move the already-deployed protocol to standards track. We
>> might as well bit the bureaucratic bullet now and just fix the
>> charter. If most folks agree, I can do that work.
> 
> This draft seems fine as an experiment, but as standard, maybe there are
> some operational considerations that need to be addressed.

We still have time to add those known operational considerations. In fact, we should be listing those even if this is an experimental RFC.

> The first is that at the moment some people are serving different content on
> port 853, from what they are serving on port 53.

If so, they are not following the draft:

An authoritative server implementing DoT or DoQ MUST authoritatively serve the same zones over all supported transports.
If both DoT and DoQ are offered, a nameserver's reply to a particular query MUST be the same on both transports
(with the possible exception of how the TC bit is set).

Which authoritative servers are serving different content on 853, and what are the differences? We should certainly discuss that in the draft.

> I can't quickly find
> anything in this draft on how to reach those people or how to deal with
> that.

How to reach them: no idea. How to deal with that: it's prohibited with MUST-level language.

> Current users of port 853 are not implementing this draft. So it
> may take then considerable time to sort out this issue.

Are you talking about authoritative servers or the client-facing side of recursive resolvers? If the latter, that's very clearly out of scope for this document (or any document other than the DoT spec). But if it authoritative servers doing something else on 853, we should certainly cover it.

> If this draft becomes a standard, 'almost overnight' traffic seen by
> authoritative servers may switch from almost exclusively UDP to port 53, to
> TLS or QUIC to port 853. It seems that the draft is rather weak in looking at
> the operational impact that could have.

If you have suggestions for what more could be said, we'd be happy to add them. Note that the DNS traffic will not automatically switch to TLS or QUIC: probe traffic will increase. The DNS traffic will only switch if the authoritative server operators turn on the service. The increase in probe traffic is covered throughout the document, but if you think that adding more in a particular place would help reduce negative impacts, please say where and we can add it.

> We also don't know much on how this affects recursive resolvers. The draft
> says in Section 4.6.10: "a recursive resolver following this guidance may
> also choose not to initiate new connections for encrypted transport". It
> is not great to have security related standards where the implementor may or
> may not implement the feature that is discussed.

I don't understand this. All security protocols are optional. The existence of this draft, when it becomes an RFC, does not force any client to use it, just as no resolver is forced to set the DO bit on queries and then interpret the DNSSEC material in the responses.

> Maybe we should first experiment, and then create an updated document that
> becomes a standard.

Yep, that's what we are discussing. What criteria would you use to determine the success of the experiment?

--Paul Hoffman