Re: [DNSOP] Multiplexing DNS & HTTP over TLS

Shane Kerr <shane@time-travellers.org> Thu, 14 February 2019 13:24 UTC

Return-Path: <shane@time-travellers.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D2E0313106D for <dnsop@ietfa.amsl.com>; Thu, 14 Feb 2019 05:24:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id izva_9oo6Nce for <dnsop@ietfa.amsl.com>; Thu, 14 Feb 2019 05:24:01 -0800 (PST)
Received: from time-travellers.org (c.time-travellers.nl.eu.org [IPv6:2a02:2770::21a:4aff:fea3:eeaa]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C305131059 for <dnsop@ietf.org>; Thu, 14 Feb 2019 05:24:01 -0800 (PST)
Received: from [2001:470:78c8:2:6574:697d:933d:dea9] by time-travellers.org with esmtpsa (TLS1.2:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <shane@time-travellers.org>) id 1guGzh-0008Cz-4F for dnsop@ietf.org; Thu, 14 Feb 2019 13:24:01 +0000
To: dnsop@ietf.org
References: <C5525DE2-DCF3-43E5-8C41-BAA58049DC3A@verisign.com> <edc1d393-ad19-2f8e-5f58-367d9b7e3290@nic.cz> <20190214080508.zab7r6hzkbj7kp54@nic.fr> <3baf795c-46ff-3993-4cb1-fff10295bc0a@time-travellers.org> <01d20441-8533-9a35-70f1-58cb4b6d8960@knipp.de>
From: Shane Kerr <shane@time-travellers.org>
Message-ID: <9a7b4bc4-018a-9f8c-d3fd-2428356d6605@time-travellers.org>
Date: Thu, 14 Feb 2019 14:23:59 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0
MIME-Version: 1.0
In-Reply-To: <01d20441-8533-9a35-70f1-58cb4b6d8960@knipp.de>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/-fzcacPIdMA8e8nzkI67BGA630c>
Subject: Re: [DNSOP] Multiplexing DNS & HTTP over TLS
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2019 13:24:03 -0000

Klaus,

On 14/02/2019 14.00, Klaus Malorny wrote:
> On 14.02.19 11:03, Shane Kerr wrote:
> 
>> Is there a write-up on this?
>>
>> Thinking about it naively, a demultiplexer really only needs to say 
>> "is there a non-ASCII character in the first 2 or 3 bytes of a TLS 
>> session?".
>>
> please think of HTTP/2, which is a binary protocol (although I don't 
> know what the first bytes are). But I guess ALPN (RFC 7301) would do the 
> trick.

I think that HTTP/2 preserves the initial handshake of HTTP/1.1.

But looking at ALPN, it was designed for exactly this the multiplexing 
use case. In principle all that would be needed is adding an identifier 
to the ALPN protocol IDs:

https://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml#alpn-protocol-ids

It would also address Joe's concerns about other protocols.

Maybe creating an ALPN protocol ID for DNS-over-TLS is something for the 
DPRIVE working group? 🤔

Cheers,

--
Shane