Re: [DNSOP] I-D Action: draft-ietf-dnsop-svcb-https-04.txt

Willem Toorop <willem@nlnetlabs.nl> Fri, 19 March 2021 10:15 UTC

Return-Path: <willem@nlnetlabs.nl>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 07D5B3A0C31 for <dnsop@ietfa.amsl.com>; Fri, 19 Mar 2021 03:15:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.8
X-Spam-Level:
X-Spam-Status: No, score=-2.8 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nlnetlabs.nl
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id epWb9MyqlTbT for <dnsop@ietfa.amsl.com>; Fri, 19 Mar 2021 03:14:57 -0700 (PDT)
Received: from outbound.soverin.net (outbound.soverin.net [116.202.65.218]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3EF43A0C30 for <dnsop@ietf.org>; Fri, 19 Mar 2021 03:14:56 -0700 (PDT)
Received: from smtp.soverin.net (unknown [10.10.3.28]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by outbound.soverin.net (Postfix) with ESMTPS id C1367600C1; Fri, 19 Mar 2021 10:14:52 +0000 (UTC)
Received: from smtp.soverin.net (smtp.soverin.net [159.69.232.142]) by soverin.net
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=nlnetlabs.nl; s=soverin; t=1616148892; bh=Jl8jwYsxVXYAQX/kV+M2c2FNMWwfSGSFew/tukI3UA8=; h=To:References:From:Cc:Subject:Date:In-Reply-To:From; b=rka7BzclEmI1mxYks5bwaMvSeK0zJKOF7JwCJbpuGYCBotX1y82xRCkIVfQXdNe6y 1BKjLJL02yeh484x8jgtBLMFZXlT+jePLnpYCPkLHqT4K3P9EkGf5V72nV93/2o9dq Qw4HDA2XH9r9S8OoO/hTK7C2JselsoZKwMiAr2yN/xmf4ZE7Z8rEpaR/drhYRDxYlY ci59KWh4bUYNEHm9DH1uxI1YoNXhaxr4sn2treOg2ppn3qrWZMRvUZtQx2pIc/Jtcq GJNdCBXIX+0rjQNJQByH/RedEGwhUIAWV0UmNbpRqFjuh7BUQvcmyl6XqSuQF0JNaz PpxJ9CWW+seWg==
To: dnsop@ietf.org
References: <161600103837.12472.4123883592260330100@ietfa.amsl.com> <CAHbrMsA3NzpY9RFNhWsvYgQ0hqcqEDuMUrw7HmGBJZ1+uaLtNA@mail.gmail.com> <600ED9AF-2C6F-429F-AF39-445E29E686EF@apple.com> <4DFDEFA6-4132-42CA-8DA7-D0537C5FC29A@isc.org> <99cdd98b-ac59-c96c-a73f-a58729c2ca52@nic.cz>
From: Willem Toorop <willem@nlnetlabs.nl>
Cc: Dick Franks <rwfranks@acm.org>
Message-ID: <fbeb99ad-9ccc-1050-a0d2-3b6e5287ed7a@nlnetlabs.nl>
Date: Fri, 19 Mar 2021 11:14:50 +0100
MIME-Version: 1.0
In-Reply-To: <99cdd98b-ac59-c96c-a73f-a58729c2ca52@nic.cz>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/dPxSrWQv-IaWCYiKac6R_XvhFCY>
Subject: Re: [DNSOP] I-D Action: draft-ietf-dnsop-svcb-https-04.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Mar 2021 10:15:00 -0000

No version of NSD, Unbound, ldns and getdns with SVCB and HTTPS support
has been released yet, so no problem for us to change the name of
SvcParamKey 5 to ech for us there, but ...

The Net::DNS perl library does have parsing and printing of SVCB and
HTTPS based on draft-ietf-dnsop-svcb-https-01 since version 1.26
(released on August 6, 2020). @Dick, what is your position on this?

I am aware of only 1 deployed HTTPS RR with echconfig:

crypto.cloudflare.com.	300	IN	HTTPS	1 . alpn=h2
ipv4hint=162.159.135.79,162.159.136.79
echconfig=AEf+CQBDABNjbG91ZGZsYXJlLWVzbmkuY29tACAjs5LfHm27uMBFmLDI++shXFnrIB3tDgU6gMZfkJoFYAAgAAQAAQABAAAAAA==
ipv6hint=2606:4700:7::a29f:874f,2606:4700:7::a29f:884f

Also, it would have been nice to have some test-vectors of RR's in
presentation format and wire format (in hexdump) in an appendix in the
document, to assist in the creation of interoperable implementations.
Maybe this can still be added?

-- Willem

Op 19-03-2021 om 09:05 schreef libor.peltan:
> FYI in Knot DNS, the implementation is at exactly the same state: an
> existing merge request. For us, it's technically no issue if the
> presentation/wire format changes during next few weeks.
> 
> I'm saying nothing about ideological consequences of such approach.
> 
> /Libor
> 
> Dne 19. 03. 21 v 0:05 Mark Andrews napsal(a):
>>
>>> On 19 Mar 2021, at 04:42, Tommy Pauly
>>> <tpauly=40apple.com@dmarc.ietf.org> wrote:
>>>
>>>
>>>
>>>> On Mar 17, 2021, at 6:04 PM, Ben Schwartz
>>>> <bemasc=40google.com@dmarc.ietf.org> wrote:
>>>>
>>>> Release notes for this revision:
>>>>        *  Simplify the IANA instructions (pure First Come First Served)
>>>>        *  Recommend against publishing chains of >8 aliases
>>>>        *  Clarify requirements for using SVCB with a transport proxy
>>>>        *  Adjust guidance for Port Prefix Naming
>>>>        *  Minor editorial updates
>>>>
>>>> I'm only aware of one outstanding issue: a proposal to change the
>>>> name of the "echconfig" key to "ech".  This key corresponds to a
>>>> value that is an "ECHConfigList", which is a collection of
>>>> "ECHConfig" structs, and some implementers have reported that the
>>>> singular/plural name-value mismatch created confusion.  This issue
>>>> is discussed in detail here:
>>>> https://github.com/MikeBishop/dns-alt-svc/pull/299.
>>>>
>>>> This name has no effect on queries, responses, or zone transfers,
>>>> but it does appear in zone files.  Zone files will not be portable
>>>> between implementations that use different names.  This is true
>>>> whether we "burn" the current codepoint and allocate a new one, or
>>>> simply rename the current codepoint.  However, using a new codepoint
>>>> would allow updated implementations to support both names,
>>>> facilitating zone file portability in one direction.  It would also
>>>> be possible to support the old name with special-case name aliasing
>>>> logic.
>>>>
>>>> In my view, the temporary portability benefit is too small to
>>>> justify the permanent registry pollution of a deprecated codepoint,
>>>> especially because ECH itself is not yet finalized, and there are no
>>>> deployments except for standards development purposes.  However,
>>>> others have disagreed.  We'll need to reach consensus before making
>>>> any changes here.
>>> Personally, I’d prefer to see the name change, and not burn a
>>> codepoint, as long as we’re not breaking any zone files.
>>>
>>> I think the question is: does anyone have a zone that has actually
>>> deployed the echconfig parameter? I see many responses with
>>> SVCB/HTTPS records, but none with the echconfig in practice. If
>>> someone is aware of a production deployment that can’t move, please
>>> speak up!
>>>
>>> Tommy
>> It’s not so much is it in use or not.  As I said this is a process
>> issue.  When
>> the code point was assigned the way it was the wire and presentation
>> formats are
>> supposed to be *frozen* as that allows DNS developer to deploy code
>> without having
>> to worry about the specification changing underneath them.
>>
>> For BIND we haven’t shipped code with SVBC / HTTPS code points yet
>> even to the
>> point of parsing the records.  We have merge request that has been
>> tracking the
>> draft.  I never felt the specification was stable enough to do that
>> and unfortunately
>> I was correct.  ALPN has had its parsing changed, the same
>> presentation format produces
>> different wire formats.  echconfig vs ech is minor compared to that.
>>
>> I have not looked to see what other DNS vendors have done so far.
>>
>> If we go ahead there needs to be a section that specified the
>> differences in
>> parsing between the draft when the code point was issued and when the
>> RFC is
>> published.
>>
>> Mark
>>
>>>> --Ben
>>>>
>>>> On Wed, Mar 17, 2021 at 1:11 PM <internet-drafts@ietf.org> wrote:
>>>>
>>>> A New Internet-Draft is available from the on-line Internet-Drafts
>>>> directories.
>>>> This draft is a work item of the Domain Name System Operations WG of
>>>> the IETF.
>>>>
>>>>          Title           : Service binding and parameter
>>>> specification via the DNS (DNS SVCB and HTTPS RRs)
>>>>          Authors         : Ben Schwartz
>>>>                            Mike Bishop
>>>>                            Erik Nygren
>>>>          Filename        : draft-ietf-dnsop-svcb-https-04.txt
>>>>          Pages           : 48
>>>>          Date            : 2021-03-17
>>>>
>>>> Abstract:
>>>>     This document specifies the "SVCB" and "HTTPS" DNS resource record
>>>>     (RR) types to facilitate the lookup of information needed to make
>>>>     connections to network services, such as for HTTPS origins.  SVCB
>>>>     records allow a service to be provided from multiple alternative
>>>>     endpoints, each with associated parameters (such as transport
>>>>     protocol configuration and keys for encrypting the TLS
>>>> ClientHello).
>>>>     They also enable aliasing of apex domains, which is not possible
>>>> with
>>>>     CNAME.  The HTTPS RR is a variation of SVCB for HTTPS and HTTP
>>>>     origins.  By providing more information to the client before it
>>>>     attempts to establish a connection, these records offer potential
>>>>     benefits to both performance and privacy.
>>>>
>>>>     TO BE REMOVED: This document is being collaborated on in Github at:
>>>>     https://github.com/MikeBishop/dns-alt-svc [1].  The most recent
>>>>     working version of the document, open issues, etc. should all be
>>>>     available there.  The authors (gratefully) accept pull requests.
>>>>
>>>>
>>>> The IETF datatracker status page for this draft is:
>>>> https://datatracker.ietf.org/doc/draft-ietf-dnsop-svcb-https/
>>>>
>>>> There are also htmlized versions available at:
>>>> https://tools.ietf.org/html/draft-ietf-dnsop-svcb-https-04
>>>> https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-svcb-https-04
>>>>
>>>> A diff from the previous version is available at:
>>>> https://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-svcb-https-04
>>>>
>>>>
>>>> Please note that it may take a couple of minutes from the time of
>>>> submission
>>>> until the htmlized version and diff are available at tools.ietf.org.
>>>>
>>>> Internet-Drafts are also available by anonymous FTP at:
>>>> ftp://ftp.ietf.org/internet-drafts/
>>>>
>>>>
>>>> _______________________________________________
>>>> DNSOP mailing list
>>>> DNSOP@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dnsop
>>>> _______________________________________________
>>>> DNSOP mailing list
>>>> DNSOP@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dnsop
>>> _______________________________________________
>>> DNSOP mailing list
>>> DNSOP@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dnsop
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop