Re: [DNSOP] Should we try to work on DNS over HTTP in dnsop?

"Paul Hoffman" <paul.hoffman@vpnc.org> Mon, 21 December 2015 16:18 UTC

Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D18FF1A90A7 for <dnsop@ietfa.amsl.com>; Mon, 21 Dec 2015 08:18:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.347
X-Spam-Level:
X-Spam-Status: No, score=-1.347 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_MISMATCH_COM=0.553] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tLjpGeqa5A0s for <dnsop@ietfa.amsl.com>; Mon, 21 Dec 2015 08:18:51 -0800 (PST)
Received: from hoffman.proper.com (Opus1.Proper.COM [207.182.41.91]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E9691A90A4 for <dnsop@ietf.org>; Mon, 21 Dec 2015 08:18:50 -0800 (PST)
Received: from [10.32.60.126] (50-1-98-110.dsl.dynamic.fusionbroadband.com [50.1.98.110]) (authenticated bits=0) by hoffman.proper.com (8.15.2/8.14.9) with ESMTPSA id tBLGIfXZ065541 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 21 Dec 2015 09:18:42 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
X-Authentication-Warning: hoffman.proper.com: Host 50-1-98-110.dsl.dynamic.fusionbroadband.com [50.1.98.110] claimed to be [10.32.60.126]
From: Paul Hoffman <paul.hoffman@vpnc.org>
To: Tony Finch <dot@dotat.at>
Date: Mon, 21 Dec 2015 08:18:40 -0800
Message-ID: <8033857D-FD32-4609-9FD2-65402B7304BD@vpnc.org>
In-Reply-To: <alpine.LSU.2.00.1512211307360.959@hermes-2.csi.cam.ac.uk>
References: <20151217020754.6915b71c@pallas.home.time-travellers.org> <1999755.oExeQdjcfZ@linux-85bq.suse> <20151220220358.52594.qmail@f5-external.bushwire.net> <1999760.RBe1cJlAWr@linux-85bq.suse> <alpine.LSU.2.00.1512211307360.959@hermes-2.csi.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"
X-Mailer: MailMate (1.9.3r5187)
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsop/NBvk9MpNUvlmxE1oF8IN1bx6iME>
Cc: dnsop@ietf.org
Subject: Re: [DNSOP] Should we try to work on DNS over HTTP in dnsop?
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Dec 2015 16:18:52 -0000

On 21 Dec 2015, at 5:13, Tony Finch wrote:

> Paul Vixie <paul@redbarn.org> wrote:
>>
>> any HTTP initiator who wants out of order response processing will 
>> have
>> to negotiate for it (see mogul's 2001 RID draft) and will then have 
>> new
>> responsibilities for matching up the out of order HTTP responses with
>> then-outstanding HTTP requests.
>
> The current way to deal with out-of-order responses and head-of-line
> blocking in HTTP is HTTP/2.
>
> If you do DNS over HTTP then there has to be an exact correspondence
> between HTTP requests and responses and DNS requests and responses -
> anything else would be madness. This implies that DNS over HTTP/1 only
> supports in-order pipelined queries and responses in each connection; 
> to
> avoid head-of-line blocking you need either multiple connections or
> HTTP/2.

+1. If the authors of the document want to keep using HTTP 1.1 and thus 
lose the ability to do out-of-order responses, that's fine, but they 
have to be explicit about it.

As to the question in the Subject of this thread: I'm in favor of doing 
this in the DNSOP WG if the result will use modern IETF standards like 
HTTP/2 and TLS.

--Paul Hoffman