Re: [dns-privacy] DNS over DTLS

Tariq Saraj <tariqsaraj@gmail.com> Fri, 02 December 2016 06:22 UTC

Return-Path: <tariqsaraj@gmail.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EEF2129B8B for <dns-privacy@ietfa.amsl.com>; Thu, 1 Dec 2016 22:22:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kt9VqcUNiI4G for <dns-privacy@ietfa.amsl.com>; Thu, 1 Dec 2016 22:22:42 -0800 (PST)
Received: from mail-io0-x231.google.com (mail-io0-x231.google.com [IPv6:2607:f8b0:4001:c06::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E75B612953D for <dns-privacy@ietf.org>; Thu, 1 Dec 2016 22:22:41 -0800 (PST)
Received: by mail-io0-x231.google.com with SMTP id j65so465914085iof.0 for <dns-privacy@ietf.org>; Thu, 01 Dec 2016 22:22:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=L6qk9yqGKSpCnC2yaKIwpRj64iUGtJbEnopsrRo4/2M=; b=w6fsCfDG+xOz/ttYeQ/j236dfON9z5wtA47+4iOpd3sMgcys8JkQ8s7Q8sXbdz1zd9 xeUfmkYmOvGj2uBL/kW0G0Lg1laOR/HbCcv3hQOYnCZd1QWQBtlAC7pgW+BEy8z5Jfsq vPpVZFuEtLsd+R+hN4GqKmE8JjYinG2kDaJgdzvnyGs33WsblAUYlqEGCt3iDSkX1cK/ ulen/mcI/Q42V1+YmwK8m8SICTZ77uvFkgZgro8LkXr0tES9qC0f7lDpI/BshKlw5DS2 lz7+rihD+TOVniAz3GSLw26aQ5GvTddaa6pqbJxUh0q8mAlavv44lkS1kgFn2uAjLGeG lh/g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=L6qk9yqGKSpCnC2yaKIwpRj64iUGtJbEnopsrRo4/2M=; b=jYkAiIaAyevj8cRoI1o2laHRFZd9AHDOGpDAFxcJRncxZ99WrAtZFdVMfj1vqz+uO3 M3xjqNyEFyfEaI/IpbvN9kOAS9J3dxq2EzGET/ar2nxqtg0eJNKDjFe3YgqoCgQSO644 1BCRC9EKjX1u9lbMIUlXnyPRqwBq+CYQh6zJJGjGbvyrN7yp0p7INXJmfEA9XdkosG/D R8BPGpDRgtE+oawxx7IEnih6r4gDCdxA106naJks+9+6FWcc79T7Wi2etxmYatvI+jFQ kJI2OK2w+r/tK6kxUfO2RB61zokOPYe/RPSuTpCobqSUO9oo+cfQ6xpSD0ycbreh0w+l 0WGg==
X-Gm-Message-State: AKaTC037AVZF204kTkJOTLZyIDLJ5D5i6TbEsSdewd4MBIlpWfcoZ0xhQyX4fZ2ivBaSv3xAkWu2jspvmvUHWw==
X-Received: by 10.36.245.9 with SMTP id k9mr1324909ith.65.1480659761238; Thu, 01 Dec 2016 22:22:41 -0800 (PST)
MIME-Version: 1.0
Received: by 10.36.200.137 with HTTP; Thu, 1 Dec 2016 22:22:40 -0800 (PST)
In-Reply-To: <20161201150121.5be7b162@pallas.home.time-travellers.org>
References: <CAAdbxrrgKRvUUgWQUFvxQiwua_DsochdZm83pi_Zgx_wo4-GPg@mail.gmail.com> <20161201150121.5be7b162@pallas.home.time-travellers.org>
From: Tariq Saraj <tariqsaraj@gmail.com>
Date: Fri, 02 Dec 2016 11:22:40 +0500
Message-ID: <CAAdbxro1Cu-MAW+kYe3YE0YPb27TjVPOdLtA_jF=0=OQgmCcHw@mail.gmail.com>
To: Shane Kerr <shane@time-travellers.org>
Content-Type: multipart/alternative; boundary="94eb2c03596e1a175f0542a6f774"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/EPPLCsmLVeSCarZqJdEnEBqNuuk>
Cc: dns-privacy@ietf.org
Subject: Re: [dns-privacy] DNS over DTLS
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Dec 2016 06:22:45 -0000

Hi Shane,
Thanks for your detailed reply, the point I am trying to highlight is the
changes in TCP for DNS which is "TCP out of order packet delivery, i.e. the
OOOP".

On Thu, Dec 1, 2016 at 7:01 PM, Shane Kerr <shane@time-travellers.org>
wrote:

> Tariq,
>
> At 2016-12-01 12:50:16 +0500
> Tariq Saraj <tariqsaraj@gmail.com> wrote:
>
> > My question is that, at one side "Specification for DNS over Transport
> > Layer Security (TLS) i.e. RFC7858" is a proposed standard now.
> > Whereas, on the other side in the "draft-ietf-dprive-dnsodtls-13",
> > The motivations for proposing DNS-over-DTLS are that
> >
> >    o  TCP suffers from network head-of-line blocking, where the loss of
> >       a packet causes all other TCP segments to not be delivered to the
> >       application until the lost packet is re-transmitted.  DNS-over-
> >       DTLS, because it uses UDP, does not suffer from network head-of-
> >       line blocking.
> > In the very next point of this draft it is also mentioned that " However,
> > with TCP Fast Open [RFC7413], the implementation can achieve the same RTT
> > efficiency as DTLS."
> > In addition to that, in the recent IETF97 meeting regarding the DNS
> privacy
> > they have presented a technique of OOOP for TCP.
> > So, why the community still need DTLS for DNS?
>
> TCP Fast Open does not work for the first connection between hosts.
> This makes it effective in cases where you expect repeated connections
> (such as in the stub to resolver case), but possibly less effective in
> cases where you do not expect repeated connections, or where you
> expect connections to happen a long time apart.
>
> Further, the specific drawback is about the case of lost packets. Since
> TCP (and thus TLS) is a stream-oriented protocol, it cannot deliver
> data until all packets in the sequence are available. So if packet #2 is
> lost, packets #3, #4, and all later packets cannot be delivered to the
> application until packet #2 is re-sent. DTLS, since it is a datagram
> protocol, does not have this limitation.
>
> To be honest, there has not been a strong push for DNS over DTLS. Even
> with DNS over DTLS, we need DNS over TLS as a fallback in the case of
> truncation. So adding DNS over DTLS is always an extra cost. It might
> be that DNS over DTLS is worth the extra code and complexity, but I
> think it is safe to say that we do not have enough operational
> experience yet to know for sure.
>
> Cheers,
>
> --
> Shane
>



-- 
Regards
Tariq Saraj
Riphah Institute of Systems Engineering, Islamabad