Re: [DNSOP] I-D Action: draft-ietf-dnsop-dns-error-reporting-00.txt

Petr Špaček <pspacek@isc.org> Tue, 26 October 2021 10:02 UTC

Return-Path: <pspacek@isc.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5704F3A0A3B for <dnsop@ietfa.amsl.com>; Tue, 26 Oct 2021 03:02:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.429
X-Spam-Level:
X-Spam-Status: No, score=-5.429 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-3.33, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isc.org header.b=D6EHD+4M; dkim=pass (1024-bit key) header.d=isc.org header.b=eCFq3pRq
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iCAV5qiLcLuL for <dnsop@ietfa.amsl.com>; Tue, 26 Oct 2021 03:02:15 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0B1D33A0A10 for <dnsop@ietf.org>; Tue, 26 Oct 2021 03:02:14 -0700 (PDT)
Received: from zimbrang.isc.org (zimbrang.isc.org [149.20.1.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx.pao1.isc.org (Postfix) with ESMTPS id D244E3AB087 for <dnsop@ietf.org>; Tue, 26 Oct 2021 10:02:12 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=isc.org; s=ostpay; t=1635242532; bh=D1H3+5x6Krg8pvlfUBtthbwM107X8vbebEwsxYOYGzo=; h=Date:To:References:From:Subject:In-Reply-To; b=D6EHD+4MmaY+mbI8yzPg5+UKFSSN5Nm0rCe6MYnOnTQy1MpRisHX64gafegHbY0Sv 28GFWhXbbbIIpdtSmAl5n6Yr9tjklIstRFIiGDMaUCprJvX0OSLrkLzbYPbTE1zQg2 bjDbVdUZ+TbN9bmbwYd8KYLKXQktTFYYEpuff22Y=
Received: from zimbrang.isc.org (localhost.localdomain [127.0.0.1]) by zimbrang.isc.org (Postfix) with ESMTPS id C60ABEC9F3B for <dnsop@ietf.org>; Tue, 26 Oct 2021 10:02:12 +0000 (UTC)
Received: from localhost (localhost.localdomain [127.0.0.1]) by zimbrang.isc.org (Postfix) with ESMTP id 9F9CCEC9F5B for <dnsop@ietf.org>; Tue, 26 Oct 2021 10:02:12 +0000 (UTC)
DKIM-Filter: OpenDKIM Filter v2.10.3 zimbrang.isc.org 9F9CCEC9F5B
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isc.org; s=05DFB016-56A2-11EB-AEC0-15368D323330; t=1635242532; bh=v9su5ZiQ578yPfDu0CDFFAna07x9xiAZJD19kgiNE1E=; h=Message-ID:Date:MIME-Version:To:From; b=eCFq3pRqTPdT1VhIF23pA1WXH6Ock29rwKx0w6YVMVPXCgeLMJKBZT9XkdpMcukIT mMd14Tda+DZbVIvoMKCti+xASPJinvOcaPU5oFt2mNGCgRcrmFBVPXfSuvAPW2rz8A +QLim92OFEbY/CpIxMh40Yr9A3BsSLeHzMCDCiEY=
Received: from zimbrang.isc.org ([127.0.0.1]) by localhost (zimbrang.isc.org [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id uCTMieMa4uA7 for <dnsop@ietf.org>; Tue, 26 Oct 2021 10:02:12 +0000 (UTC)
Received: from [192.168.0.157] (ip-86-49-254-49.net.upcbroadband.cz [86.49.254.49]) by zimbrang.isc.org (Postfix) with ESMTPSA id 36968EC9F3B for <dnsop@ietf.org>; Tue, 26 Oct 2021 10:02:12 +0000 (UTC)
Message-ID: <a896a7c2-881f-b197-320c-9c53511b9b63@isc.org>
Date: Tue, 26 Oct 2021 12:02:10 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.2.1
Content-Language: en-US
To: dnsop@ietf.org
References: <161953482575.7668.10479553059119648994@ietfa.amsl.com> <f3fca741-373e-c32d-9dbc-354cff3dfc9b@nic.cz>
From: Petr Špaček <pspacek@isc.org>
In-Reply-To: <f3fca741-373e-c32d-9dbc-354cff3dfc9b@nic.cz>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/JROuk0RclB64TLu-5CUjHgA_iwQ>
Subject: Re: [DNSOP] I-D Action: draft-ietf-dnsop-dns-error-reporting-00.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Oct 2021 10:02:20 -0000

On 26. 10. 21 11:14, Vladimír Čunát wrote:
> Hello.
> 
>> DNS Error reporting SHOULD be done using DNS Query Name Minimization
>> [RFC7816  <https://datatracker.ietf.org/doc/html/rfc7816>] to improve privacy.
> 
> It's just a detail and "SHOULD" isn't strong, but I expect it might be 
> worth elaborating here.  The name used in the reporting query adds a few 
> labels to the failing QNAME and the whole reporting agent domain, so 
> together that's lots of labels, and expending a packet for *each* of 
> those labels would seem quite wasteful.  Perhaps we could agree on some 
> boundary (e.g. around the "_er" label) under which minimization isn't 
> recommended anymore, and put that as a suggestion into the text?

We need to consider & document interaction between Query Name 
Minimization and NXDOMAIN processing as per RFC 8020. If minimization & 
RFC 8020 are on default then it might very easily happen that most of 
_er subtrees (which are presumably empty) will be cut out by cache and 
nothing will be sent out when an error is detected.

All in all, I think the text should warn about this interaction instead 
of mandating query name minimization on/off.


>> The reporting resolver MUST NOT report about queries and responses
>> from an encrypted channel (such as DNS over TLS [RFC7858  <https://datatracker.ietf.org/doc/html/rfc7858>] and DNS
>> over HTTPS [RFC8484  <https://datatracker.ietf.org/doc/html/rfc8484>]).
> 
> I believe this needs some explanation at least (in the text, ideally).  
> The failing query triggering the report is towards an authoritative 
> server (i.e. unencrypted), and the reporting queries do not really carry 
> more information.  They may travel by a different path, but on the whole 
> I can't see significant motivation for the paragraph, especially in 
> "MUST NOT" form.

I will use stronger language: This is under-specified to the point where 
it starts causing confusion.
* Is the paragraph considering channel from stub to resolver?
* From resolver to auth?
* Both?
* What to do with queries executed by resolver on its own (prefetch)?
* What if multiple clients are waiting for the same query, using 
different channels? (query deduplication in the resolver)
etc.

I think this should go to Security Considerations section and be left 
for implementations to decide. MUST mandate is way too strong and does 
not accommodate implementation- and deployment- specific circumstances.


>> This method MUST NOT
>> be deployed by default on reporting resolvers and authoritative
>> servers without requiring an explicit configuration element.
> 
> I'm not so sure about forbidding this on resolvers so strongly, but 
> certainly OK if the WG prefers it that way.  (On auths it wouldn't make 
> sense to enable by default; what agent?)  If the error-reporting is 
> meant really seriously, I'd rather improve the mechanism to never induce 
> significant overhead and encourage enabling it by default on resolvers 
> (at some point).
> 
> To make the error-reporting work, you need noticeable commitment to 
> deploy on both sides, because otherwise the perceived benefit from 
> deploying might be quite low.  On resolver side, I believe that it will 
> be quite rare for operators to tweak such highly technical options[*].  
> So if this MUST be off by default, you at least need commitment from 
> some significant operators - say, I'm not even sure if Quad9 by 
> themselves would suffice to bootstrap this.

I agree. Mandating "disabled by default" configuration on _resolvers_ 
sounds like a way to get to a working-but-never-deployed protocol.

-- 
Petr Špaček  @  ISC