Re: [DNSOP] Review of draft-ietf-dnsop-structured-dns-error-03

mohamed.boucadair@orange.com Fri, 07 July 2023 08:26 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1463C14CE54 for <dnsop@ietfa.amsl.com>; Fri, 7 Jul 2023 01:26:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.083
X-Spam-Level:
X-Spam-Status: No, score=-2.083 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w4l8eIC4HnvC for <dnsop@ietfa.amsl.com>; Fri, 7 Jul 2023 01:26:40 -0700 (PDT)
Received: from smtp-out.orange.com (smtp-out.orange.com [80.12.210.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0ADEAC14CE31 for <dnsop@ietf.org>; Fri, 7 Jul 2023 01:26:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; i=@orange.com; q=dns/txt; s=orange002; t=1688718399; x=1720254399; h=to:subject:date:message-id:references:in-reply-to: mime-version:content-transfer-encoding:from; bh=kFHiUE5KV+KmEUug48j/SeCE5uccurXtJJAvLl8xMsA=; b=oSUQ6LW88UuYOf0myLdToWICpaUwxFmR5w0MDyVDJ2rMAVNl0OYsGMAc SaDS/PebQ8hTV5z/EzIck+WG5R5+X4JlWHPO88s3Am1cHLOtJZuDsE3ci JfPYLp9sIIzJgzeljFDoUNasBlF7pcFnzvwbJIh2TepffAMBGLDoxYc20 vQMxAwb7jCUHTAYZnGDfyfcvbaVMU8f/Lovbq691Tc9LmGNi21FKJmneS trLNIRh5V77Uo9IFE0Pl/wZ53uPDL2qhtlpexhFJV9L6BEIIK3lyk9PDP sxw/9ZlBMAp0lbw3o5WVbJxVzMkpkusG1N3n4U+xz9wccxedh/6j8ItHb g==;
Received: from unknown (HELO opfedv3rlp0a.nor.fr.ftgroup) ([x.x.x.x]) by smtp-out.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Jul 2023 10:26:37 +0200
Received: from unknown (HELO opzinddimail6.si.fr.intraorange) ([x.x.x.x]) by opfedv3rlp0a.nor.fr.ftgroup with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Jul 2023 10:26:38 +0200
Received: from opzinddimail6.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id 854581225A71 for <dnsop@ietf.org>; Fri, 7 Jul 2023 10:26:37 +0200 (CEST)
Received: from opzinddimail6.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id 6802B1224E73 for <dnsop@ietf.org>; Fri, 7 Jul 2023 10:26:37 +0200 (CEST)
Received: from smtp-out365.orange.com (unknown [x.x.x.x]) by opzinddimail6.si.fr.intraorange (Postfix) with ESMTPS for <dnsop@ietf.org>; Fri, 7 Jul 2023 10:26:37 +0200 (CEST)
Received: from mail-he1eur04lp2058.outbound.protection.outlook.com (HELO EUR04-HE1-obe.outbound.protection.outlook.com) ([104.47.13.58]) by smtp-out365.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Jul 2023 10:26:36 +0200
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com (2603:10a6:10:49b::6) by AS8PR02MB7255.eurprd02.prod.outlook.com (2603:10a6:20b:3f1::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6565.17; Fri, 7 Jul 2023 08:26:34 +0000
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::58f3:64de:5ef8:aba]) by DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::58f3:64de:5ef8:aba%5]) with mapi id 15.20.6565.016; Fri, 7 Jul 2023 08:26:34 +0000
From: mohamed.boucadair@orange.com
X-TM-AS-ERS: 10.218.35.126-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-DDEI-TLS-USAGE: Used
Authentication-Results: smtp-out365.orange.com; dkim=none (message not signed) header.i=none; spf=Fail smtp.mailfrom=mohamed.boucadair@orange.com; spf=Pass smtp.helo=postmaster@EUR04-HE1-obe.outbound.protection.outlook.com
Received-SPF: Fail (smtp-in365b.orange.com: domain of mohamed.boucadair@orange.com does not designate 104.47.13.58 as permitted sender) identity=mailfrom; client-ip=104.47.13.58; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="mohamed.boucadair@orange.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:80.12.66.32/28 ip4:80.12.210.96/28 ip4:80.12.70.34/31 ip4:80.12.70.36 include:spfa.orange.com include:spfb.orange.com include:spfc.orange.com include:spfd.orange.com include:spfe.orange.com include:spff.orange.com include:spf6a.orange.com include:spffed-ip.orange.com include:spffed-mm.orange.com -all"
Received-SPF: Pass (smtp-in365b.orange.com: domain of postmaster@EUR04-HE1-obe.outbound.protection.outlook.com designates 104.47.13.58 as permitted sender) identity=helo; client-ip=104.47.13.58; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="postmaster@EUR04-HE1-obe.outbound.protection.outlook.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:40.92.0.0/15 ip4:40.107.0.0/16 ip4:52.100.0.0/14 ip4:104.47.0.0/17 ip6:2a01:111:f400::/48 ip6:2a01:111:f403::/49 ip6:2a01:111:f403:8000::/50 ip6:2a01:111:f403:c000::/51 ip6:2a01:111:f403:f000::/52 -all"
IronPort-Data: A9a23:ftwwOa0zd94MHj77m/bD5cZ2kn2cJEfYwER7XKvMYLTBsI5bp2EPn 2YbCm+Ob6zbZGb8L9EkPoXn8E5QuZWHydA1SlQ5qSg9HnlHl5HIVI+TRqvS04J+DSFhoGZPt Zh2hgzodZhsJpPkjk7xdOKn9BGQ7InQLpLkEunIJyttcgFtTSYlmHpLlvUw6mJSqYDR7zil5 5Wq+qUzBHf/g2Qvaj1MtPrawP9SlK+aVA0w7wVWic9j7Ae2e0k9VPo3Oay3Jn3kdYhYdsbSq zHrlezREsvxpn/BO/v9+lrJWhRiro36ZGBivkFrt52K2XCukMCSPpETb5LwYW8P49mAcksYJ N9l7fRcQi9xVkHAdXh0vxRwS0lD0aN6FLDvIWaRneXK/m//I2avyfdeLxtqLcoy5bMiaY1O3 aRwxDElQy25377z4J/iD+5mi4IkMdXhO54Ztjd41zbFAP06QJfFBaLX+dtf2zR2jcdLdRrcT 5NBNXwzM1KZOFsSaj/7C7pm9Ausrnz4czRdpV7Tr60q6GHfxQ1r+L/3Odzad5qBQsA9ckOw/ TqdpzmmX3n2MvSUl3mX6ViG3dTxtiXEW70JE76f36N11Qj7Kms7U0RNDgPi+5FVkHWWXs9cM GQR5ykzq6R081akJvHxWQa/uFaFswISHd1KHIUHBBqlz6PV50OZCzEJUyQZNNg+7pdrFXoty 0ODmM7vCXp3qrqJRHmB97CS6zSvJSwSKmxEbigBJecY3zX9iIEtoD7mF+dBKf6ozdf3KRKqn yDNhjdr0t3/kvU3/6m8+FnGhRelqZ7IUhM5623rsoSNv1sRiGmNN93A1LTL0RpTBNjBFwbQ4 hDoj+DEsLFVUc3leDmlGr1lIV2/2xqSGBP96bKFN7ks8y+s/X2iFWy7yGkmfRwwWiroUQL0e 07WsAo52XO+FH6jbKsyY4/oBtkwlfTkDY69C6CSacdSaJ9scgPB5DtpeUObw2Hqlg4rjL07P pCYN82rCB726JiLLhLpFo/xMpdymUjSIF8/o7ilk3xLNpLAPhaopU8tagfmUwzAxPrsTP/p2 9heLdCW7B5UTffzZCLamaZKcwBacyZrX8qn+pEOHgJmHuaAMDB4YxM26eJ5E7GJY4wPy48kA 1nhBRcGkAaj2hUr1y3TNiozNu2HsWlDQYITZnV3Zg7xgRDPkK6q7awFcIAwc6Vv/f5+1/Mcc hX2U5ToPxi7cRyeo251RcCl8uRKLU337SrQZXbNSGZkJfZIGVeWkuIIiyO0qUHi+ALs6ZBhy 1BhvyuHKac+q/NKVpiGMKv1kQPv7RDwWotaBiP1HzWaQ220mKACFsA7pqZfzx0kQfkC+teb6 +pSKToln7GR5q8YqZzOj63CqJq1GexjGEYcB3Pc8bu9KSjd+Cyk3JNEV+GLOzvaUQsYPY28M P5NwaiU3OIvxT53X0hUS96HDp7SI/PovbZcwQkiF3LOB7huIq01OWGIhKGjqYURroJkVdOKZ 3+y
IronPort-HdrOrdr: A9a23:OE21L6pUtybUYQgP2SVJeQ8aV5u/L9V00zEX/kB9WHVpm5Oj+v xGzc5w6farsl0ssSkb6Km90dq7MAvhHP9OkMAs1NiZLWzbUQeTQr2KqLGSpQEIeBeOvtK1t5 0QF5SWYeeYZTQUsS+52njeLz9K+rm6GdWT9IXjJgBWPGJXgs9bjjtRO0K+KAlbVQNGDZ02GN 63/cxcvQetfnwRc4CSGmQFd/KrnayAqLvWJTo9QzI34giHij2lrJTgFQKD4xsYWzRThZ8/7G n+lRDj7KnLiYD39vac7R6e031loqqu9jJxPr3MtiHTEESttu+cXvUvZ1RFhkF3nAjg0idprD CGmWZaAy060QKqQojym2qn5+Co6kdT15fvpGXo/EfLsIj3Qik3BNFGgp8cehzF61A4tNU5y6 5T2XmF3qAneS8osR6NleQgbSsa43acsD4ni6oennZfWYwRZPtYqpEe5lpcFNMFEDjh4I4qHe FyBIWEjcwmB2+yfjTcpC1i0dasVnM8ElOPRVUDoNWc13xTkGpix0UVycQDljML9Y47SZND++ PYW54Y441mX4sTd+ZwFe0BScy4BijERg/NKnubJRD9GKQOKxv22u3KCXUOlZGXkbAzveoPcc 76ISxlXEYJCjzTNfE=
X-Talos-CUID: 9a23:HL4tIm/ajwOgHfZ4xmqVv04KNOwMK0z/9SfNYEW6OUUzFK3SY0DFrQ==
X-Talos-MUID: 9a23:2P4+ewm+Fs3iJr2XduLJdnppaoR6+I6EU3szupM5uPafMi9XEmqC2WE=
X-IronPort-AV: E=Sophos;i="6.01,187,1684792800"; d="scan'208";a="3030575"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RmbOa6yUm4zYAnAFvL5NfVNbeD1W+Z/6HTt5ehpFCEwBgGZOGEmEvaKUKSV4L5E7CJjYZrXkbZq4zHJgjGzjJLgpuf1Upi/9gasNqQ56EyOPGWjw1itQReb40Hejbn63v35hxbgsrCe7FbPL2EsJsbVUneB3qpmhuCct64lxlybcjeSp6LTB+5uDSXd3Dvscu8rhbbFW9Snp0KzLtf4GRdxT4Pluwkp06pfkByU3GkAPxy6F8eZ3kAtY8s5buxhCjBmYZ/p3s9FsKpXRIn8DYqZrZM6sqssghJEujW7BkP+NM+V1CR8gKvw9Hi1PI1FO7yybY4Ib6CvCAoHrmO1IMA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Z66S6Qmo2IkE+5tqkTTAHl/Cpx+riM6Me/zmTcjRRqg=; b=JC5SLii7xMX51RjcwHfGqdovzmCAAI8+/XvRHt6qyxHdteMHZXdDTifL177zTVwdD1YVtAWl6tJppcZ2VG85sh2mP0RpPoJ9eNe0DYFf8DaXcGcUaBEmipeYtXYRueuvG083mE8Al8KMrXEZf5I5snqCm4RI9noVQ9WQ3EViO4zcZAAf6pgEc6qJ0Fm39tkqrd23Gze/NEhYzMqmJkIq0RhQYmtfKilmxUyYr0+QWLAg0kw44XpmPjh37xQ2rXtdXDy8D2l52cpCMGW1bh56SLAMOoFwonMKfkg8uEbVEAZ43h/5jivrCpuoGEFr/OCHEotfnayU5vcde0T3hvgwIw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=orange.com; dmarc=pass action=none header.from=orange.com; dkim=pass header.d=orange.com; arc=none
To: Mukund Sivaraman <muks@mukund.org>, "dnsop@ietf.org" <dnsop@ietf.org>
Thread-Topic: [DNSOP] Review of draft-ietf-dnsop-structured-dns-error-03
Thread-Index: AQHZqR0BHJx7oyrTv0GsHT3JrrX146+uBPaw
Content-Class:
Date: Fri, 07 Jul 2023 08:26:34 +0000
Message-ID: <DU2PR02MB101601552EE2CBCE7AF407598882DA@DU2PR02MB10160.eurprd02.prod.outlook.com>
References: <ZJscd47Flc11FXdM@w2>
In-Reply-To: <ZJscd47Flc11FXdM@w2>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2023-07-07T08:18:29Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=30d0f411-287c-4738-9026-cd94f3eac935; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DU2PR02MB10160:EE_|AS8PR02MB7255:EE_
x-ms-office365-filtering-correlation-id: f3f19500-0e7a-4c1c-c388-08db7ec3e016
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2PR02MB10160.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(346002)(39860400002)(396003)(376002)(366004)(136003)(451199021)(2906002)(71200400001)(316002)(66476007)(86362001)(966005)(7696005)(55016003)(76116006)(64756008)(66446008)(478600001)(33656002)(122000001)(66946007)(5660300002)(66574015)(110136005)(66556008)(52536014)(83380400001)(38100700002)(8936002)(8676002)(66899021)(9686003)(30864003)(186003)(38070700005)(26005)(41300700001)(6506007)(579004)(559001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
MIME-Version: 1.0
X-OriginatorOrg: orange.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU2PR02MB10160.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f3f19500-0e7a-4c1c-c388-08db7ec3e016
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Jul 2023 08:26:34.5811 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 90c7a20a-f34b-40bf-bc48-b9253b6f5d20
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: A/EDdk7KPBXgvRpcgJ0wEEGm9CH3b2hkRlPxXpZ2XLph9yC3lP1P/ChnNALjPJ0BA9Bl1mFEv2t478YqfT8uzx09MW1Mw8RYgvUr6ywy3HE=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR02MB7255
X-TM-AS-ERS: 10.218.35.126-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-TMASE-Version: DDEI-5.1-9.0.1002-27736.004
X-TMASE-Result: 10--54.366700-10.000000
X-TMASE-MatchedRID: hFbMlnd2lLNI8cDIi5gIDdLYKRd+gtJeQQ5+hY6u+44rYYq12IWZOd7p 0Ru8jKvFKJa9kszJz6tZXKsi4nksFsI8a+iNHcSeBXY0oXpqJ16dVNZaI2n6/8XXUa56bTnnZRL +gCLSlhdrP6sFc4JGXCeqwCNxDcPsyqkJEmzh70S90n1t4eAkYGnmCQLJ/HnwWQ3R4k5PTnBLSF 8QxjX7VbBUpHHLYQpmN2sidPm7TK/nw9N2aDgj59NHudoru5Sg5PTak5rnadQejl8XURi8fI0nZ yQtGDZRQ0rE18rDtKJuqbWjKBTk5s9ZBllnOboNjHFMyUt7B90RyVsAxhhjrNL5WpA78Ye8dE7H Ie9l0mxoUakBxO9ClwRnVsVmk81QddjfiD7DQhkYsgf0x8DpEKi4iJ+LRwVcPsGG+kQsvKg2Jxg qT664ElvERHbdZaePNzvt/peN6L69fOntr8UbINok9tQkrLIoWTWEh5N2a9FZYlrUyCRLW8+ylq DwXEGy2d8mtRIRsUNKtJ3Eo6FvJwhYq1FzlQPMQsrSjmN9x0PAtiT41LFzmvlkNPFT5kyu592Sw rd60UkAuwGUpXiTDbuB40RziFsj+Bb1Wo7XcLZfbrztwqMDw/i9hrAKwILaZLpphRlxYD7RjBmB Wsa9ROqOSOOdRR5aZzMduL5Mnz9AO+ZCMzaRsaNOXIxVDeaExzNaeDaFsoOEINBehBwNqJiKkmh P0ZwenULNgN42j5P+LGdgqClBAdYCQbjtidupWJLwyeGJcWkXfBDRy7VtM1rhZu06i+HhCuSPuS VW5+5jzs3BYHFK+HSmZC8Cq3Y83FvhW7EWo6nlRxm3A2wKusBX4Iey09T4Vb3rZjw/bpwUyRS/O CD9xeQD/sqqL0mZq7rFUcuGp/Hfd+P6wwCt8xoxTJ4LSy1oSRUA+vRNdLw=
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
X-TMASE-INERTIA: 0-0;;;;
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/duH2VPRxlnP8V4Ky4qTUeepXY5w>
Subject: Re: [DNSOP] Review of draft-ietf-dnsop-structured-dns-error-03
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jul 2023 08:26:44 -0000

Hi Mukund, 

Many thanks for the detailed review. 

We updated the spec to address many of your suggestions. We added in particular text to explain the rationale for having c/j mandatory for IT teams and also added text to explain why suberr is defined rather than consuming ede codes. However, no changes were made for your comments about, e.g., translation/TTL, as that part of the text was added to address previous comments we received from the WG. 

FWIW, a diff can be seen at: https://author-tools.ietf.org/iddiff?url1=draft-ietf-dnsop-structured-dns-error-03&url2=draft-ietf-dnsop-structured-dns-error-05&difftype=--html

Thanks again. 

Cheers,
Med

> -----Message d'origine-----
> De : DNSOP <dnsop-bounces@ietf.org> De la part de Mukund Sivaraman
> Envoyé : mardi 27 juin 2023 19:29
> À : dnsop@ietf.org
> Objet : [DNSOP] Review of draft-ietf-dnsop-structured-dns-error-03
> 
> We're implementing RFC 8914 for error reporting from NIOS's DNS
> features, and so I read this draft today:
> 
> > DNS Operations Working Group
> D. Wing
> > Internet-Draft
> Citrix
> > Updates: 8914 (if approved)
> T. Reddy
> > Intended status: Standards Track
> Nokia
> > Expires: 28 November 2023
> N. Cook
> >
> Open-Xchange
> >                                                             M.
> Boucadair
> >
> Orange
> >                                                              27
> May
> > 2023
> 
> 
> >                  Structured Error Data for Filtered DNS
> >                 draft-ietf-dnsop-structured-dns-error-03
> 
> > Abstract
> 
> >    DNS filtering is widely deployed for various reasons,
> including
> >    network security.  However, filtered DNS responses lack
> information
> >    for end users to understand the reason for the filtering.
> 
> What is claimed in this introduction does not appear entirely
> accurate after RFC 8914.
> 
> * RFC 8914 allows filtered DNS responses to contain the EDE EDNS
> option
>   that can contain a populated EXTRA-TEXT field specifically for
>   end-users.
> 
> * Whether the EXTRA-TEXT field is populated, and what is entered
> there
>   is optional. Several of our customers would not even want to
> indicate
>   that responses have been filtered (we've had trouble with even
>   returning an SOA record in RPZ-rewritten answers), so the
> optional
>   nature of this field is fine.
> 
> It appears the authors want to structure it so it can be used to
> display a generated error-page within a web-browser, to avoid
> loading an error-page via HTTPS, which is a fine goal.
> 
> > Existing mechanisms to provide explanatory details to end users
> cause
> >    harm especially if the blocked DNS response is to an HTTPS
> server.
> 
> I suggest rewording this sentence as it reads as though the
> blocked DNS response is sent to a HTTPS server. Instead, I assume
> what the authors are attempting to state is that blocked DNS
> responses may cause harm if they contain address records that
> cause web traffic for a web-domain to be directed to a different
> local HTTPS server.
> 
> 
> > 1.  Introduction
> 
> >    DNS filters are deployed for a variety of reasons, e.g.,
> endpoint
> >    security, parental filtering, and filtering required by law
> >    enforcement.
> 
> I suggest keeping the above part of the paragraph ...
> 
> > Network-based security solutions such as firewalls and
> >    Intrusion Prevention Systems (IPS) rely upon network traffic
> >    inspection to implement perimeter-based security policies and
> operate
> >    by filtering DNS responses.  In a home network, DNS filtering
> is used
> >    for the same reasons as above and additionally for parental
> control.
> >    Internet Service Providers (ISPs) typically block access to
> some DNS
> >    domains due to a requirement imposed by an external entity
> (e.g., law
> >    enforcement agency) also performed using DNS-based content
> filtering.
> 
> ... and removing the part above as it's unnecessary extra detail,
> which may not age well.
> 
> >    Users of DNS services that perform filtering may wish to
> receive more
> >    explanatory information about such a filtering to resolve
> problems
> 
> s/such a filtering/such filtering/
> 
> >    with the filter -- for example to contact the administrator
> to
> >    allowlist a DNS domain that was erroneously filtered or to
> > understand
> 
> s/allowlist/allow/
> 
> >    the reason a particular domain was filtered.  With that
> information,
> >    a user can choose another network, open a trouble ticket with
> the
> > DNS
> 
> s/a user can choose another network/a user can choose to use
> another network/
> 
> >    administrator to resolve erroneous filtering, log the
> information, or
> >    other uses.
> 
> s/or other uses/or do something else with it/
> 
> >    For the DNS filtering mechanisms described in Section 3 the
> DNS
> >    server can return extended error codes Blocked, Filtered, or
> Forged
> >    Answer defined in Section 4 of [RFC8914].  However, these
> codes only
> >    explain that filtering occurred but lack detail for the user
> to
> >    diagnose erroneous filterings.
> 
> >    No matter which type of response is generated (forged IP
> address(es),
> >    NXDOMAIN or empty answer, even with an extended error code),
> the user
> >    who triggered the DNS query has little chance to understand
> which
> >    entity filtered the query, how to report a mistake in the
> filter, or
> >    why the entity filtered it at all.  This document describes a
> >    mechanism to provide such detail.
> 
> This has to be reworded, because the user can understand what
> happened from the EXTRA-TEXT field of RFC 8914 if the information
> is provided.
> This draft's purpose appears to be about structuring such
> information for display in a UI, so the authors should describe it
> so.
> 
> >    One of the other benefits of the approach described in this
> document
> >    is to eliminate the need to "spoof" block pages for HTTPS
> resources.
> >    This is achieved since clients implementing this approach
> would be
> >    able to display a meaningful error message, and would not
> need to
> >    connect to such a block page.  This approach thus avoids the
> need to
> >    install a local root certificate authority on those IT-
> managed
> >    devices.
> 
> This is a fine goal and I like it, but:
> 
> (1) Is the need to spoof a website gone? What about clients that
> do not support this draft? They may still receive e.g. address
> records from a resolver that performs filtering, and attempt to
> use those addresses.
> 
> (2) Are web-browser developers on board with implementing such a
> draft?
> 
> >    This document describes a format for computer-parsable data
> in the
> >    EXTRA-TEXT field of [RFC8914].  It updates Section 2 of
> [RFC8914]
> >    which says the information in EXTRA-TEXT field is intended
> for human
> >    consumption (not automated parsing).
> 
> This is the abstract of the draft that describes its purpose
> neatly; I suggest placing this text in the abstract.
> 
> >    This document does not recommend DNS filtering but provides a
> >    mechanism for better transparency to explain to the users why
> some
> >    DNS queries are filtered.
> 
> > 2.  Conventions and Definitions
> 
> >    The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
> NOT",
> >    "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
> "MAY", and
> >    "OPTIONAL" in this document are to be interpreted as
> described in
> >    BCP 14 [RFC2119] [RFC8174] when, and only when, they appear
> in all
> >    capitals, as shown here.
> 
> >    This document uses terms defined in DNS Terminology
> [RFC8499].
> 
> >    "Requestor" refers to the side that sends a request.
> "Responder"
> >    refers to an authoritative, recursive resolver or other DNS
> component
> >    that responds to questions.
> 
> >    "Encrypted DNS" refers to any encrypted scheme to convey DNS
> >    messages, for example, DNS-over-HTTPS [RFC8484], DNS-over-TLS
> >    [RFC7858], or DNS-over-QUIC [RFC9250].
> 
> >    The document refers to an Extended DNS Error (EDE) using its
> purpose,
> >    not its INFO-CODE as per Table 3 of [RFC8914].  "Forged
> Answer",
> >    "Blocked", and "Filtered" are thus used to refer to "Forged
> Answer
> >    (4)", "Blocked (15)", and "Filtered (17)".
> 
> > 3.  DNS Filtering Techniques and Their Limitations
> 
> >    DNS responses can be filtered by sending a bogus (also called
> >    "forged") A or AAAA response, NXDOMAIN error or empty answer,
> or an
> >    Extended DNS Error code defined in [RFC8914].
> 
> Does this enumerate all the cases? RPZ and some other lying
> features in DNS implementations allow returning forged answers for
> other types too. I suggest removing the "A or AAAA" part, or
> starting the paragraph as "DNS responses to address queries can be
> filtered...".
> 
> I don't understand the last part, i.e., "DNS responses can be
> filtered by sending ... an Extended DNS Error code defined in
> [RFC8914]". How are responses filtered by sending an EDE EDNS
> option?
> 
> > Each of these methods have advantages and disadvantages that are
> >    discussed below:
> 
> 
> 
> 
> 
> > Wing, et al.            Expires 28 November 2023
> [Page 4]
> >
> 
> 
> > Internet-Draft            Structured DNS Error
> May 2023
> 
> 
> >    1.  The DNS response is forged to provide a list of IP
> addresses that
> >        points to an HTTP(S) server alerting the end user about
> the
> >        reason for blocking access to the requested domain (e.g.,
> >        malware).  When an HTTP(S) enabled domain name is
> blocked, the
> >        network security device (e.g., Customer Premises
> Equipment (CPE)
> >        or firewall) presents a block page instead of the HTTP
> response
> >        from the content provider hosting that domain.  If an
> HTTP
> >        enabled domain name is blocked, the network security
> device
> >        intercepts the HTTP request and returns a block page over
> HTTP.
> >        If an HTTPS enabled domain is blocked, the block page is
> also
> >        served over HTTPS.  In order to return a block page over
> HTTPS,
> >        man in the middle (MITM) is enabled on endpoints by
> generating a
> >        local root certificate and an accompanying (local)
> public/private
> >        key pair.  The local root certificate is installed on the
> >        endpoint while the network security device stores a copy
> of the
> >        private key.  During the TLS handshake, the on-path
> network
> >        security device modifies the certificate provided by the
> server
> >        and (re)signs it using the private key from the local
> root
> >        certificate.
> 
> >        *  However, configuring the local root certificate on
> endpoints
> >           is not a viable option in several deployments like
> home
> >           networks, schools, Small Office/Home Office (SOHO), or
> Small/
> >           Medium Enterprise (SME).  In these cases, the typical
> behavior
> >           is that the filtered DNS response points to a server
> that will
> >           display the block page.  If the client is using HTTPS
> (via a
> >           web browser or another application) this results in a
> >           certificate validation error which gives no
> information to the
> >           end-user about the reason for the DNS filtering.
> 
> >        *  Enterprise networks do not assume that all the
> connected
> >           devices are managed by the IT team or Mobile Device
> Management
> >           (MDM) devices, especially in the quite common Bring
> Your Own
> >           Device (BYOD) scenario.  In addition, the local root
> >           certificate cannot be installed on IoT devices without
> a
> >           device management tool.
> 
> >        *  An end user does not know why the connection was
> prevented
> >           and, consequently, may repeatedly try to reach the
> domain but
> >           with no success.  Frustrated, the end user may switch
> to an
> >           alternate network that offers no DNS filtering against
> malware
> >           and phishing, potentially compromising both security
> and
> >           privacy.  Furthermore, certificate errors train users
> to click
> >           through certificate errors, which is a bad security
> practice.
> >           To eliminate the need for an end user to click through
> >           certificate errors, an end user may manually install a
> local
> >           root certificate on a host device.  Doing so, however,
> is also
> >           a bad security practice as it creates a security
> > vulnerability
> 
> >           that may be exploited by a MITM attack.  When a
> manually
> >           installed local root certificate expires, the user has
> to
> >           (again) manually install the new local root
> certificate.
> 
> The above is a good explanation, but it appears excessive,
> deviating from the gist of the draft. Instead, the authors could
> concisely write that a client may see certificate errors when
> attempting to browse error pages due to the redirection of HTTPS
> traffic to an unauthentic webserver.
> 
> 
> >    2.  The DNS response is forged to provide a NXDOMAIN response
> to
> >        cause the DNS lookup to terminate in failure.  In this
> case, an
> >        end user does not know why the domain cannot be reached
> and may
> >        repeatedly try to reach the domain but with no success.
> >        Frustrated, the end user may use insecure connections to
> reach
> >        the domain, potentially compromising both security and
> privacy.
> 
> This appears to be a good example where having a structured error
> is an advantage over the current practice.
> 
> >    3.  The extended error codes Blocked and Filtered defined in
> >        Section 4 of [RFC8914] can be returned by a DNS server to
> provide
> >        additional information about the cause of a DNS error.
> 
> >    4.  These extended error codes do not suffer from the
> limitations
> >        discussed in bullets (1) and (2), but the user still does
> not
> >        know the exact reason nor he/she is aware of the exact
> entity
> 
> I suggest removing "he/she"; it reads well without it.
> 
> >        blocking the access to the domain.  For example, a DNS
> server may
> >        block access to a domain based on the content category
> such as
> >        "Malware" to protect the endpoint from malicious
> software,
> >        "Phishing" to prevent the user from revealing sensitive
> >        information to the attacker, etc.  A user needs to know
> the
> >        contact details of the IT/InfoSec team to raise a
> complaint.
> 
> A user does not "need to know". "A user may want to know" is
> perhaps better text here. Depending on the feature implementing
> filtering (e.g., RPZ vs. parental control) I doubt if some of our
> customers would even indicate if rewriting/filtering occurred
> going by past activity. So all this is optional.
> 
> >    5.  When a DNS resolver or forwarder forwards the received
> EDE
> >        option, the EXTRA-TEXT field only conveys the source of
> the error
> >        (Section 3 of [RFC8914]) and does not provide additional
> textual
> >        information about the cause of the error.
> 
> This claim does not appear accurate. RFC 8914 section 3 mentions
> "the source of the error SHOULD be attributed in the EXTRA-TEXT
> field" in the context of forwarding only, and just that the source
> is also included alongside any other text that may also be
> present. I don't see that there are any limitations on what may be
> included in the EXTRA-TEXT field, and there could even be multiple
> EDE options.
> 
> > 4.  I-JSON in EXTRA-TEXT Field
> 
> >    DNS servers that are compliant with this specification send
> I-JSON
> >    data in the EXTRA-TEXT field [RFC8914] using the Internet
> JSON
> >    (I-JSON) message format [RFC7493].
> 
> Reword as "DNS servers that are compliant with this specification
> send data in the EXTRA-TEXT field [RFC8914] encoded using the
> Internet JSON
> (I-JSON) message format [RFC7493]."
> 
> However, using some kind of binary encoding may reduce the size of
> the EDE option. DNS client software can decode the binary encoding
> for human-readable presentation.
> 
> >       Note that [RFC7493] was based on [RFC7159], but [RFC7159]
> was
> >       replaced by [RFC8259]
> .
> >    This document defines the following JSON names:
> 
> >    c: (contact)  The contact details of the IT/InfoSec team to
> report
> >       mis-classified DNS filtering.  This field is structured as
> an
> >       array of contact URIs (e.g., tel, sips, https).  At least
> one
> >       contact URI MUST be included.  This field is mandatory.
> 
> I suggest not making it mandatory. The operator may wish to
> indicate that filtering occurred without attracting flak from some
> users.
> 
> Also, just how many IT teams respond or take action when something
> is reported to them? Not all do.
> 
> >    j: (justification)  'UTF-8'-encoded [RFC5198] textual
> justification
> 
> >       for this particular DNS filtering.  The field should be
> treated
> >       only as diagnostic information for IT staff.  This field
> is
> >       mandatory.
> 
> I suggest not making it mandatory. If it is mandatory, some
> operators may put whitespace or "N/A" in the field's value.
> 
> >    s: (suberror)  the suberror code for this particular DNS
> filtering.
> >       This field is optional.
> 
> There are 16 bits in RFC 8914's INFO-CODEs, allowing a total of
> 65536 values. I suggest adding more values there than starting
> another registry. Try to keep text and constructs as simple as it
> can be.
> There's already an RCODE, and an EDE INFO-CODE, and the draft's
> proposing a 3rd level of suberror code. This is excessive.
> 
> >    o: (organization)  'UTF-8'-encoded human-friendly name of the
> >       organization that filtered this particular DNS query.
> This field
> >       is optional.
> 
> >    New JSON names can be defined in the IANA registry introduced
> in
> >    Section 11.2.  Such names MUST consist only of lower-case
> ASCII
> >    characters, digits, and hyphens (that is, Unicode characters
> U+0061
> >    through 007A, U+0030 through U+0039, and U+002D).  Also,
> these
> >    names MUST be 63 characters or shorter and it is RECOMMENDED
> they
> >    be as short as possible.
> 
> >    The text in the "j" and "o" names can include international
> >    characters.  If the text is displayed in a language not known
> to the
> >    end user, browser extensions to translate to user's native
> language
> >    can be used.
> 
> I suggest deleting this paragraph. It has already been mentioned
> elsewhere that the fields are UTF-8 encoded. Describing browser
> extentions to translate strings deviates from the topic of this
> draft.
> 
> >    To reduce packet overhead the generated JSON SHOULD be as
> short as
> >    possible: short domain names, concise text in the values for
> the "j"
> >    and "o" names, and minified JSON (that is, without spaces or
> line
> >    breaks between JSON elements).
> 
> s/packet overhead/DNS message size/
> 
> It isn't exactly "overhead" if it's the contents.
> 
> >    The JSON data can be parsed to display to the user, logged,
> or
> >    otherwise used to assist the end-user or IT staff with
> >    troubleshooting and diagnosing the cause of the DNS
> filtering.
> 
> > 5.  Protocol Operation
> 
> > 5.1.  Client Generating Request
> 
> >    When generating a DNS query the client includes the EDE
> option
> >    (Section 2 of [RFC8914]) in the OPT pseudo-RR [RFC6891] to
> elicit the
> >    EDE option in the DNS response.
> 
> Is this what this draft requires, or is the sentence above
> claiming that RFC 8914 requires it as well?
> 
> > It SHOULD use an OPTION-LENGTH of 2,
> >    the INFO-CODE field set to "0" (Other Error), and an empty
> EXTRA-TEXT
> >    field.  This signal indicates that the client desires that
> the server
> >    responds in accordance with the present specification.
> 
> Why?
> 
> This draft appears to describe a simple extension of EDE, limited
> to structuring the value in the EXTRA-TEXT field.
> 
> > 5.2.  Server Generating Response
> 
> >    When the DNS server filters its DNS response to an A or AAAA
> record
> >    query, the DNS response MAY contain an empty answer,
> NXDOMAIN, or
> >    (less ideally) forged A or AAAA response, as desired by the
> DNS
> >    server.
> 
> Again, limiting to A/AAAA is not correct. Other RR types are also
> filtered by filtering features in implementation today.
> 
> > In addition, if the query contained the OPT pseudo-RR the DNS
> server
> >    MAY return more detail in the EXTRA-TEXT field as described
> in
> >    Section 5.3.
> 
> >    Servers may decide to return small TTL values in filtered DNS
> >    responses (e.g., 2 seconds) to handle domain category and
> reputation
> >    updates.
> 
> Suggesting TTLs here appears off-topic. The draft is just about
> structuring the EDE.EXTRA-TEXT field.
> 
> >    Because the DNS client signals its EDE support (Section 5.1)
> and
> >    because EDE support is signaled via a non-cached OPT resource
> record
> >    (Section 6.2.1 of [RFC6891]) the EDE-aware DNS server can
> tailor its
> >    filtered response to be most appropriate to that client's EDE
> >    support.  If EDE support is signaled in the query the server
> MUST NOT
> >    return the "Forged Answer" extended error code because the
> client can
> >    take advantage of EDE's more sophisticated error reporting
> (e.g.,
> >    "Filtered", "Blocked").  Continuing to send "Forged Answer"
> even to
> >    an EDE-supporting client will cause the persistence of the
> drawbacks
> >    described in Section 3.
> 
> Why? What if forged-answer info-code is returned? A web user-agent
> can ignore the answer section and use the structured EXTRA-TEXT
> field anyway. The paragraph above is not very clear.
> 
> > 5.3.  Client Processing Response
> 
> >    On receipt of a DNS response with an EDE option from a DNS
> responder,
> >    the following actions are performed on the EXTRA-TEXT field:
> 
> >    *  Verify the field contains valid JSON.  If not, the
> requestor MUST
> >       discard data in the EXTRA-TEXT field.
> 
> >    *  The response MUST be received over an encrypted DNS
> channel.  If
> >       not, the requestor MUST discard data in the EXTRA-TEXT
> field.
> 
> Why is this additional requirement present over RFC 8914? RFC 8914
> does not prevent unencrypted DNS transports from carrying a human
> readable EXTRA-TEXT field (which may be displayed by a client
> program such as 'dig').
> 
> >    *  Servers which don't support this specification might use
> plain
> >       text in the EXTRA-TEXT field so that requestors SHOULD
> properly
> 
> s/in the EXTRA-TEXT field so that/field, and so/
> 
> 
> > 6.  Interoperation with RPZ Servers
> 
> >    This section discusses operation with an RPZ server [RPZ]
> that
> >    indicates filtering with a NXDOMAIN response with the
> Recursion
> >    Available bit cleared (RA=0).
> 
> >    When a DNS client supports this specification it includes the
> EDE
> >    option in its DNS query.
> 
> >    If the server does not support this specification and is
> performing
> >    RPZ filtering, the server ignores the EDE option in the DNS
> query and
> >    replies with NXDOMAIN and RA=0.  The DNS client can continue
> to
> >    accept such responses.
> 
> >    If the server does support this specification and is
> performing RPZ
> >    filtering, the server can use the EDE option in the query to
> identify
> >    an EDE-aware client and respond appropriately (that is, by
> generating
> >    a response described in {#server-response}) as NXDOMAIN and
> RA=0 are
> >    not necessary when generating a response to such a client.
> 
> If NXDOMAIN is not necessary, what RCODE will be returned in RPZ-
> rewritten responses where NXDOMAIN is returned today?
> 
> 
> Thank you for attempting this. Some of what is described appears
> as an improvement over what is practised currently.
> 
> The review above may seem overly critical because it mostly
> contains suggestions to correct/change text, rather than praise
> for what is good.
> 
> However, overall, after reading the draft till the end and
> considering what it proposes, I think that based on the INFO-CODE,
> having a web browser display the EXTRA-TEXT field of RFC 8914 as a
> text string would serve the purpose of displaying information
> (whatever the operator desires to show) about what filtering
> occurred, and any other free-text such as contact information.
> Perhaps additional EDE INFO-CODEs may be added to the RFC 8914
> registry as required, and it may be prescribed that browsers avoid
> loading web-pages with address records from forged answers and
> instead display the EXTRA-TEXT field.
> 
> This JSON encoding of the same and adding a registry for fields
> within it appears excessive for the purpose it aims to serve.
> 
> 		Mukund
____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.