[dns-privacy] Dnsdir last call review of draft-ietf-dprive-unilateral-probing-11

Florian Obser via Datatracker <noreply@ietf.org> Wed, 09 August 2023 11:49 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: dns-privacy@ietf.org
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 8721AC15E3FC; Wed, 9 Aug 2023 04:49:20 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Florian Obser via Datatracker <noreply@ietf.org>
To: dnsdir@ietf.org
Cc: dns-privacy@ietf.org, draft-ietf-dprive-unilateral-probing.all@ietf.org, last-call@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 11.5.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <169158176053.61618.9149967821439713552@ietfa.amsl.com>
Reply-To: Florian Obser <fobser@ripe.net>
Date: Wed, 09 Aug 2023 04:49:20 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/uhRlb8zEjwTNsoxn3suTyI-L3Is>
Subject: [dns-privacy] Dnsdir last call review of draft-ietf-dprive-unilateral-probing-11
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.39
List-Id: Addition of privacy to the DNS protocol <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Aug 2023 11:49:20 -0000

Reviewer: Florian Obser
Review result: Ready with Issues

Unfortunately -11 introduced two issues Which I've already raised on the dpriv mailing list.

This is the text I sent to dpriv yesterday:
------------------------------------------------------------------------
   For example, consider an authoritative server named ns0.example.com
   that is served by two installations (with two A records), one at
   192.0.2.7 that follows this guidance, and one at 2001:db8::8 that is
   a legacy (cleartext port 53-only) deployment.

It doesn't have two A records. It has an A and AAAA record. I know
that Éric asked for a non-legacy IP example, but I don't think this makes
things better. I find it very confusing, usually the server would be
dual stacked so why would it do different things depending on the
address family? Maybe just go v6 only, thusly?

   For example, consider an authoritative server named ns0.example.com
   that is served by two installations (with two AAAA records), one at
   2001:db8::7 that follows this guidance, and one at 2001:db8::8 that is
   a legacy (cleartext port 53-only) deployment.  A recursive client who
   associates state with the NS name and reaches 2001:db8::7 first will

Same in 4.5:

   For example, if a recursive resolver can send a packet to
   authoritative servers from IP addresses 192.0.2.100 and
   2001:db8::200, it could keep two distinct sets of per-authoritative-
   IP state, one for each source address it uses, if the recursive
   resolver knows the addresses in use.  Keeping these state tables
   distinct for each source address makes it possible for a pooled
   authoritative server behind a load balancer to do a partial rollout
   while minimizing accidental timeouts (see Section 3.1).

It seems unlikely that the load balancer would do a address family
translation. Maybe:

   For example, if a recursive resolver can send a packet to
   authoritative servers from IP addresses 2001:db8::100 and
   2001:db8::200, it could keep two distinct sets of per-authoritative-
------------------------------------------------------------------------