[DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to support Bundle Protocol RFC9171
Mark Andrews <marka@isc.org> Thu, 27 June 2024 02:38 UTC
Return-Path: <marka@isc.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87A36C151070; Wed, 26 Jun 2024 19:38:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.407
X-Spam-Level:
X-Spam-Status: No, score=-4.407 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isc.org header.b="F+MuDSoI"; dkim=pass (1024-bit key) header.d=isc.org header.b="BfrQjpul"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kxB8_9YmOGqy; Wed, 26 Jun 2024 19:38:42 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [149.20.2.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3D760C14CE5D; Wed, 26 Jun 2024 19:38:42 -0700 (PDT)
Received: from zimbrang.isc.org (zimbrang.isc.org [149.20.2.31]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx.pao1.isc.org (Postfix) with ESMTPS id AA1313AB009; Thu, 27 Jun 2024 02:38:41 +0000 (UTC)
ARC-Filter: OpenARC Filter v1.0.0 mx.pao1.isc.org AA1313AB009
Authentication-Results: mx.pao1.isc.org; arc=none smtp.remote-ip=149.20.2.31
ARC-Seal: i=1; a=rsa-sha256; d=isc.org; s=ostpay; t=1719455921; cv=none; b=Z2VvA+S/r6nJr/PgwA4FGHuA6w98xkA6JQ5JjJCXRkN2AfPsg7tNZ8abPlO4qMMPKfY1zoEEJGd/PuHQHdmVH/x/eWkGsB0BNZVoQRXgadGkyDKDU0bNYgjIBi8ya0gX/TRoNfV02erzWRk1KVgx4ZySON+L63Fvt8ftvI7Lg/k=
ARC-Message-Signature: i=1; a=rsa-sha256; d=isc.org; s=ostpay; t=1719455921; c=relaxed/relaxed; bh=WAHPe+x94mwTYnHK+ISCc/fmuuCZEQydXOe8n/EccXc=; h=DKIM-Signature:DKIM-Signature:Mime-Version:Subject:From:Date: Message-Id:To; b=JOBOx2CvuHD1drJXVcKXvz846gKOG3L2udzSaxLDQiZG4wKdJXenkYerwS8HTwIK8itA7ADFLxFRtNsHMbOGG3Om8RYnsBr7gna09Ov19hHklieBbvdp25/5a51Q8Qnpfd1agS3ns3TnaJJu7POKKTt+g6d1SLw6YZQEMOwC4ls=
ARC-Authentication-Results: i=1; mx.pao1.isc.org
DKIM-Filter: OpenDKIM Filter v2.10.3 mx.pao1.isc.org AA1313AB009
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=isc.org; s=ostpay; t=1719455921; bh=2VF19nn7oA/pAu7v6ErOAfXpQLZLN38MmnOX6TEnzCY=; h=Subject:From:In-Reply-To:Date:Cc:References:To; b=F+MuDSoImLzyUMBJgltbuug9pZ/Pde9ot+NjdES+kT2j8BAsAnYUsBxDov9aTK+n5 DTqnjg6wHMFFqfpbb8EcdjogTYKivFh2irWDsc1Z5ecPaV4kdiI2sslPg5FVfF0/sV sK4/11q4lp0i5yMEejO0JkFnEnuDClnR4DIhm9hw=
Received: from zimbrang.isc.org (localhost.localdomain [127.0.0.1]) by zimbrang.isc.org (Postfix) with ESMTPS id A42B211700D0; Thu, 27 Jun 2024 02:38:41 +0000 (UTC)
Received: from localhost (localhost.localdomain [127.0.0.1]) by zimbrang.isc.org (Postfix) with ESMTP id 800B4117011F; Thu, 27 Jun 2024 02:38:41 +0000 (UTC)
DKIM-Filter: OpenDKIM Filter v2.10.3 zimbrang.isc.org 800B4117011F
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isc.org; s=05DFB016-56A2-11EB-AEC0-15368D323330; t=1719455921; bh=WAHPe+x94mwTYnHK+ISCc/fmuuCZEQydXOe8n/EccXc=; h=Mime-Version:From:Date:Message-Id:To; b=BfrQjpulf8mCzofgNvc0OH0e4lTVm/oDhB/Vtz4lgaFyncgIVYkY3/dgSrqFwzfnG ep2yoVuAFbM8T6sUwo9LwS86hkfRiBAQGWvqsF/OkjexvdwXtFvxNKLHdfUaD4Ta/A yFYpNv5QfojO8Z7OOoGCrp91bSpcBHKSeR8IjtJw=
Received: from zimbrang.isc.org ([127.0.0.1]) by localhost (zimbrang.isc.org [127.0.0.1]) (amavis, port 10026) with ESMTP id iETW9r9MYwFy; Thu, 27 Jun 2024 02:38:41 +0000 (UTC)
Received: from smtpclient.apple (n49-187-18-238.bla1.nsw.optusnet.com.au [49.187.18.238]) by zimbrang.isc.org (Postfix) with ESMTPSA id 3387A11700D0; Thu, 27 Jun 2024 02:38:39 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6.1.1\))
From: Mark Andrews <marka@isc.org>
In-Reply-To: <f354954d-f41b-f1af-314c-7db6e4d86191@spacelypackets.com>
Date: Thu, 27 Jun 2024 12:38:27 +1000
Content-Transfer-Encoding: quoted-printable
Message-Id: <A8F570D7-CD30-4693-88EF-C6B977E95590@isc.org>
References: <fa28794e-d02b-aa93-56c8-082a3472c6e4@spacelypackets.com> <047a01dac6b8$43d70ca0$cb8525e0$@gmail.com> <57ca71b8-aa29-8a07-5154-e6b9c44bc64a@spacelypackets.com> <AC5B89B2-DD53-4A36-9B87-4136EC288851@isc.org> <2dec1732-841e-dd38-85a8-3263b1c59885@spacelypackets.com> <C363E260-22EA-43E9-97B6-D7A403C205ED@isc.org> <98976a58-b976-e82c-4b12-76edce92e691@spacelypackets.com> <CAMGpriUVcoJu1CWWLapwREN2NaHJFnVkGUpF45TJotm7uyAxyg@mail.gmail.com> <3cfc8b7c-9128-46b5-c458-ac0ebb9c79bc@spacelypackets.com> <38A5475DE83986499AEACD2CFAFC3F980273735D06@tss-server1.home.tropicalstormsoftware.com> <b3ee82da-ae38-5781-77eb-bab292d5c113@spacelypackets.com> <cca98f92-27ee-d372-b419-81c63777033b@spacelypackets.com> <38A5475DE83986499AEACD2CFAFC3F980273739166@tss-server1.home.tropicalstormsoftware.com> <24b5ed89-c7fa-8d2d-826b-f8e08779b6d8@spacelypackets.com> <38A5475DE83986499AEACD2CFAFC3F98027373928B@tss-server1.home.tropicalstormsoftware.com> <f354954d-f41b-f1af-314c-7db6e4d86191@spacelypackets.com>
To: Scott Johnson <scott@spacelypackets.com>
X-Mailer: Apple Mail (2.3731.700.6.1.1)
Message-ID-Hash: W23THETGHYBYZ3WZ3C6KBS3DLZEPJLT2
X-Message-ID-Hash: W23THETGHYBYZ3WZ3C6KBS3DLZEPJLT2
X-MailFrom: marka@isc.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Rick Taylor <rick@tropicalstormsoftware.com>, Erik Kline <ek.ietf@gmail.com>, dnsop <dnsop@ietf.org>, "sburleig.sb@gmail.com" <sburleig.sb@gmail.com>, "dtn@ietf.org" <dtn@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to support Bundle Protocol RFC9171
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/SJBRSc1-3U0zC6k846wTLuJsMyk>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>
> On 27 Jun 2024, at 09:57, Scott Johnson <scott@spacelypackets.com> wrote: > > Hi Rick, > > On Wed, 26 Jun 2024, Rick Taylor wrote: > >> Hi Scott, >> >> I would ask one change please. The wire format for ipn EID is well documented in RFC9171, and updated in the forthcoming ipn-update. Please can you use the CBOR encoding? > > > 4.2.5.1.2 of RFC9171 indeed documents ipn EID well: > "Encoding considerations: > For transmission as a BP endpoint ID, the scheme-specific part of a URI of the ipn scheme SHALL be represented as a CBOR array comprising two items. The first item of this array SHALL be the EID's node number (a number that identifies the node) represented as a CBOR unsigned integer. The second item of this array SHALL be the EID's service number (a number that identifies some application service) represented as a CBOR unsigned integer. For all other purposes, URIs of the ipn scheme are encoded exclusively in US-ASCII characters." > > The key point is in the first sentence; "For transmission as a BP endpoint ID..." As has been previously noted, no EID is being transmitted, only the (node-nbr) component. I initially considered this to read that we were restricted to US-ASCII only, but when I realized that these encoding standards only apply to fully formed URIs, it made sense that unsigned 64-bit integer was acceptable for RR look-up wire encoding of (node-nbr), since no BPA would be using this representation in an actual bundle. > > Regarding draft-ietf-dtn-ipn-update, it appears that the wire format described fully and precisely complies with Two-Element Scheme-Specific Encoding in section 6.1.1. > > I broached the possibility of CBOR in discussion on DNSOP before DTN was CCed, making the above point to Scott Burleigh. Our conclusion there, along with Mark Andrews, was that the current verbiage is the current best course of action. I have no personal objection to wire format for the IPN RRTYPE being CBOR, if ScottB and Mark agree that there is gain to be had over using 64-bit unsigned int. > > That said, it is unclear if appropriate CBOR functions/libraries already exist/are used inside nameserver implementations. If not, that could substantially delay deployment, and/or add burden to implementers. There is an active draft which specifically treats CBOR encoding of RRs ( https://datatracker.ietf.org/doc/draft-lenders-dns-cbor section 3.2.1), but that document is still an Individual Draft at this point as well. > > Mark, ScottB, opinions? What real benefit would CBOR bring over a raw 8 byte value other than saying it was entered via X or X.X? The CBOR encoding is going to be as long or longer in most cases on an internet wide scale. It’s also going to require more complicated validators other than the record length is 8. 0.0 -> 82 00 00 0 -> 00 3467.8979 -> 82 19 34 67 19 23 13 70000.500 -> 82 1a 00 01 11 70 19 01 f4 I hope I’ve got the hand encoding right. This is not to say that CBOR couldn’t be used. I’m just not seeing the benefit. We already do stuff like this so CBOR complexity itself isn’t a issue. static isc_result_t check_private(isc_buffer_t *source, dns_secalg_t alg) { isc_region_t sr; if (alg == DNS_KEYALG_PRIVATEDNS) { dns_fixedname_t fixed; RETERR(dns_name_fromwire(dns_fixedname_initname(&fixed), source, DNS_DECOMPRESS_DEFAULT, NULL)); /* * There should be a public key or signature after the key name. */ isc_buffer_activeregion(source, &sr); if (sr.length == 0) { return (ISC_R_UNEXPECTEDEND); } } else if (alg == DNS_KEYALG_PRIVATEOID) { /* * Check that we can extract the OID from the start of the * key data. */ const unsigned char *in = NULL; ASN1_OBJECT *obj = NULL; isc_buffer_activeregion(source, &sr); in = sr.base; obj = d2i_ASN1_OBJECT(NULL, &in, sr.length); if (obj == NULL) { ERR_clear_error(); RETERR(DNS_R_FORMERR); } ASN1_OBJECT_free(obj); /* There should be a public key or signature after the OID. */ if (in >= sr.base + sr.length) { return (ISC_R_UNEXPECTEDEND); } } return (ISC_R_SUCCESS); } >> As an a side, could you describe the needs of your application, I didn't quite understand your HTTP request analogy, as that is a early-bind usage, and BP is built on the concept of late-binding. > > Again, sorry, but per the Note Well, the information I placed in the "Purpose" section of the draft, per your request, is all I am at liberty and willing to disclose at this time. > > Thanks, > ScottJ -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: marka@isc.org
- [DNSOP] IPN and CLA RRTYPEs to support Bundle Pro… Scott Johnson
- [DNSOP] Re: IPN and CLA RRTYPEs to support Bundle… Mark Andrews
- [DNSOP] Re: IPN and CLA RRTYPEs to support Bundle… Scott Johnson
- [DNSOP] Re: IPN and CLA RRTYPEs to support Bundle… Scott Johnson
- [DNSOP] Re: IPN and CLA RRTYPEs to support Bundle… Mark Andrews
- [DNSOP] Re: IPN and CLA RRTYPEs to support Bundle… Scott Johnson
- [DNSOP] Re: IPN and CLA RRTYPEs to support Bundle… sburleig.sb
- [DNSOP] Re: IPN and CLA RRTYPEs to support Bundle… Scott Johnson
- [DNSOP] Re: IPN and CLA RRTYPEs to support Bundle… Mark Andrews
- [DNSOP] Re: IPN and CLA RRTYPEs to support Bundle… Mark Andrews
- [DNSOP] Re: IPN and CLA RRTYPEs to support Bundle… Scott Johnson
- [DNSOP] Re: IPN and CLA RRTYPEs to support Bundle… Erik Kline
- [DNSOP] Re: IPN and CLA RRTYPEs to support Bundle… Scott Johnson
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Rick Taylor
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Scott Johnson
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Scott Johnson
- [DNSOP] Re: [dtn] Re: [EXT] Re: Re: IPN and CLA R… Scott Johnson
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Rick Taylor
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Adam Wiethuechter
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Rick Taylor
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Scott Johnson
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Rick Taylor
- [DNSOP] Re: [EXT] [dtn] Re: Re: IPN and CLA RRTYP… Scott Johnson
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Scott Johnson
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Marc Blanchet
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Scott Johnson
- [DNSOP] Re: [EXT] [dtn] Re: Re: IPN and CLA RRTYP… Sipos, Brian J.
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Mark Andrews
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Scott Johnson
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Rick Taylor
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Paul Vixie
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Rick Taylor
- [DNSOP] Re: [dtn] Re: Re: Re: Re: IPN and CLA RRT… Rick Taylor
- [DNSOP] Re: [dtn] Re: Re: Re: Re: IPN and CLA RRT… Rick Taylor
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … sburleig.sb
- [DNSOP] Re: [dtn] Re: Re: Re: Re: IPN and CLA RRT… Scott Johnson
- [DNSOP] Re: [dtn] Re: Re: Re: Re: IPN and CLA RRT… Sauli Kiviranta
- [DNSOP] Re: [dtn] Re: Re: Re: Re: IPN and CLA RRT… Joe Abley
- [DNSOP] Re: [dtn] Re: Re: Re: Re: IPN and CLA RRT… Rick Taylor
- [DNSOP] Re: [dtn] Re: Re: Re: Re: IPN and CLA RRT… Alberto Montilla (SPATIAM)
- [DNSOP] Re: [dtn] Re: Re: Re: Re: IPN and CLA RRT… Scott Johnson
- [DNSOP] Re: [dtn] Re: Re: Re: Re: IPN and CLA RRT… Rick Taylor
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Mark Andrews
- [DNSOP] Re: [dtn] Re: Re: Re: Re: Re: Re: IPN and… Jorge Amodio
- [DNSOP] Re: [dtn] Re: Re: Re: Re: Re: Re: IPN and… Rick Taylor
- [DNSOP] Re: [dtn] Re: Re: Re: Re: IPN and CLA RRT… Rick Taylor
- [DNSOP] Re: [EXT] [dtn] Re: RE: Re: IPN and CLA R… Sipos, Brian J.
- [DNSOP] Re: [EXT] [dtn] Re: RE: Re: IPN and CLA R… Scott Johnson
- [DNSOP] Re: [dtn] Re: Re: Re: Re: IPN and CLA RRT… Scott Johnson
- [DNSOP] Re: [EXT] [dtn] Re: Re: IPN and CLA RRTYP… Marc Blanchet
- [DNSOP] Re: [dtn] Re: Re: Re: Re: Re: Re: IPN and… Scott Johnson
- [DNSOP] Re: [dtn] Re: [EXT] Re: RE: Re: IPN and C… Sauli Kiviranta
- [DNSOP] Re: [dtn] Re: Re: IPN and CLA RRTYPEs to … Rick Taylor