Re: [dnsext] Re: I-D ACTION:draft-vandergaast-edns-client-ip-00.txt

Paul Hoffman <paul.hoffman@vpnc.org> Fri, 29 January 2010 15:02 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E9D103A67DA; Fri, 29 Jan 2010 07:02:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.352
X-Spam-Level:
X-Spam-Status: No, score=-106.352 tagged_above=-999 required=5 tests=[AWL=0.247, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 65dizZmG91OC; Fri, 29 Jan 2010 07:02:02 -0800 (PST)
Received: from psg.com (psg.com [147.28.0.62]) by core3.amsl.com (Postfix) with ESMTP id 2897A3A67AC; Fri, 29 Jan 2010 07:02:02 -0800 (PST)
Received: from majordom by psg.com with local (Exim 4.71 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1NasGd-000COP-KC for namedroppers-data0@psg.com; Fri, 29 Jan 2010 14:56:15 +0000
Received: from [66.92.146.20] (helo=stora.ogud.com) by psg.com with esmtp (Exim 4.71 (FreeBSD)) (envelope-from <namedroppers@stora.ogud.com>) id 1NasGa-000CNy-Ui for namedroppers@ops.ietf.org; Fri, 29 Jan 2010 14:56:13 +0000
Received: from stora.ogud.com (localhost [127.0.0.1]) by stora.ogud.com (8.14.3/8.14.3) with ESMTP id o0TEuBEd007283 for <namedroppers@ops.ietf.org>; Fri, 29 Jan 2010 09:56:11 -0500 (EST) (envelope-from namedroppers@stora.ogud.com)
Received: (from namedroppers@localhost) by stora.ogud.com (8.14.3/8.14.3/Submit) id o0TEuBBk007282 for namedroppers@ops.ietf.org; Fri, 29 Jan 2010 09:56:11 -0500 (EST) (envelope-from namedroppers)
Received: from [192.245.12.227] (helo=balder-227.proper.com) by psg.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.71 (FreeBSD)) (envelope-from <paul.hoffman@vpnc.org>) id 1NafvZ-0008Oi-H0 for namedroppers@ops.ietf.org; Fri, 29 Jan 2010 01:45:41 +0000
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id o0T1jWvO024154 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 28 Jan 2010 18:45:33 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06240887c787ebb6dafa@[10.20.30.158]>
In-Reply-To: <BB12CD2F-7371-4A45-9FF1-322ABAE84418@hopcount.ca>
References: <7c31c8cc1001271556w4918093er6e94e07cb92c4dc4@mail.gmail.com> <BB12CD2F-7371-4A45-9FF1-322ABAE84418@hopcount.ca>
Date: Thu, 28 Jan 2010 17:45:17 -0800
To: Joe Abley <jabley@hopcount.ca>, Wilmer van der Gaast <wilmer@google.com>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [dnsext] Re: I-D ACTION:draft-vandergaast-edns-client-ip-00.txt
Cc: namedroppers@ops.ietf.org
Content-Type: text/plain; charset="us-ascii"
X-Scanned-By: MIMEDefang 2.67 on 66.92.146.20
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>
List-Unsubscribe: To unsubscribe send a message to namedroppers-request@ops.ietf.org with
List-Unsubscribe: the word 'unsubscribe' in a single line as the message text body.
List-Archive: <http://ops.ietf.org/lists/namedroppers/>

At 1:49 PM +1300 1/29/10, Joe Abley wrote:
>On 2010-01-28, at 12:56, Wilmer van der Gaast wrote:
>
>> To summarize the I-D: It specifies an EDNS0 option that carries IP
>> address information (by default only the first 24 bits to preserve
>> privacy) of the user that triggered a DNS resolution.
>
>My initial reading of the proposal suggests that the client that originates the DNS request is the one that MAY populate a client-address option, and that any other resolver or proxy in the chain between the client and a server (cache or authority) which supplies an answer MAY NOT change the client-address option data.
>
>Suppose most clients are numbered using RFC 1918 addresses behind a NAT, and have no trivial way of discovering a non-RFC1918 address that the world might see them as. In that case isn't the address information that ultimately arrives at cache or authority nameservers useless for any purpose other than identifying that RFC 1918 addresses are in use?

Section 4.1 says "An edns-client-ip option MUST never contain a non-public address." To me, that means two things:

- If I'm an end client and I know my address is non-public, I cannot include an edns-client-ip option in my request upstream.

- If I'm a recursive resolver and I get a query that erroneously includes an edns-client-ip option with a non-public address in it, I strip off that option before sending that request upstream.

If I have understood the draft correctly, then the concerns about private addresses their effects on authoritative resolvers are moot.

The biggest stumbling block here is the assumption that developers will know the correct list of non-public addresses. Given lots of deployed counter-examples, that seems like a bad assumption. Specific pointers to specific IANA registries are needed in this draft.

--Paul Hoffman, Director
--VPN Consortium