Re: [DNSOP] I-D Action: draft-ietf-dnsop-svcb-https-04.txt

"libor.peltan" <libor.peltan@nic.cz> Fri, 19 March 2021 08:05 UTC

Return-Path: <libor.peltan@nic.cz>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2CA663A1676; Fri, 19 Mar 2021 01:05:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.92
X-Spam-Level:
X-Spam-Status: No, score=-1.92 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Lmzx6-ffTqTx; Fri, 19 Mar 2021 01:05:28 -0700 (PDT)
Received: from mail.nic.cz (mail.nic.cz [217.31.204.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 444FC3A1675; Fri, 19 Mar 2021 01:05:28 -0700 (PDT)
Received: from [192.168.0.101] (mem-185.47.220.208.jmnet.cz [185.47.220.208]) by mail.nic.cz (Postfix) with ESMTPSA id 91218140BAB; Fri, 19 Mar 2021 09:05:14 +0100 (CET)
To: Mark Andrews <marka@isc.org>, Tommy Pauly <tpauly=40apple.com@dmarc.ietf.org>
Cc: Ben Schwartz <bemasc=40google.com@dmarc.ietf.org>, dnsop <dnsop@ietf.org>, i-d-announce@ietf.org
References: <161600103837.12472.4123883592260330100@ietfa.amsl.com> <CAHbrMsA3NzpY9RFNhWsvYgQ0hqcqEDuMUrw7HmGBJZ1+uaLtNA@mail.gmail.com> <600ED9AF-2C6F-429F-AF39-445E29E686EF@apple.com> <4DFDEFA6-4132-42CA-8DA7-D0537C5FC29A@isc.org>
From: "libor.peltan" <libor.peltan@nic.cz>
Message-ID: <99cdd98b-ac59-c96c-a73f-a58729c2ca52@nic.cz>
Date: Fri, 19 Mar 2021 09:05:14 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.1
MIME-Version: 1.0
In-Reply-To: <4DFDEFA6-4132-42CA-8DA7-D0537C5FC29A@isc.org>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-Virus-Scanned: clamav-milter 0.102.2 at mail
X-Virus-Status: Clean
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/lz9aLkQ0rPfAAIqnlTP4D0f4Rqs>
Subject: Re: [DNSOP] I-D Action: draft-ietf-dnsop-svcb-https-04.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Mar 2021 08:05:31 -0000

FYI in Knot DNS, the implementation is at exactly the same state: an 
existing merge request. For us, it's technically no issue if the 
presentation/wire format changes during next few weeks.

I'm saying nothing about ideological consequences of such approach.

/Libor

Dne 19. 03. 21 v 0:05 Mark Andrews napsal(a):
>
>> On 19 Mar 2021, at 04:42, Tommy Pauly <tpauly=40apple.com@dmarc.ietf.org> wrote:
>>
>>
>>
>>> On Mar 17, 2021, at 6:04 PM, Ben Schwartz <bemasc=40google.com@dmarc.ietf.org> wrote:
>>>
>>> Release notes for this revision:
>>>        *  Simplify the IANA instructions (pure First Come First Served)
>>>        *  Recommend against publishing chains of >8 aliases
>>>        *  Clarify requirements for using SVCB with a transport proxy
>>>        *  Adjust guidance for Port Prefix Naming
>>>        *  Minor editorial updates
>>>
>>> I'm only aware of one outstanding issue: a proposal to change the name of the "echconfig" key to "ech".  This key corresponds to a value that is an "ECHConfigList", which is a collection of "ECHConfig" structs, and some implementers have reported that the singular/plural name-value mismatch created confusion.  This issue is discussed in detail here: https://github.com/MikeBishop/dns-alt-svc/pull/299.
>>>
>>> This name has no effect on queries, responses, or zone transfers, but it does appear in zone files.  Zone files will not be portable between implementations that use different names.  This is true whether we "burn" the current codepoint and allocate a new one, or simply rename the current codepoint.  However, using a new codepoint would allow updated implementations to support both names, facilitating zone file portability in one direction.  It would also be possible to support the old name with special-case name aliasing logic.
>>>
>>> In my view, the temporary portability benefit is too small to justify the permanent registry pollution of a deprecated codepoint, especially because ECH itself is not yet finalized, and there are no deployments except for standards development purposes.  However, others have disagreed.  We'll need to reach consensus before making any changes here.
>> Personally, I’d prefer to see the name change, and not burn a codepoint, as long as we’re not breaking any zone files.
>>
>> I think the question is: does anyone have a zone that has actually deployed the echconfig parameter? I see many responses with SVCB/HTTPS records, but none with the echconfig in practice. If someone is aware of a production deployment that can’t move, please speak up!
>>
>> Tommy
> It’s not so much is it in use or not.  As I said this is a process issue.  When
> the code point was assigned the way it was the wire and presentation formats are
> supposed to be *frozen* as that allows DNS developer to deploy code without having
> to worry about the specification changing underneath them.
>
> For BIND we haven’t shipped code with SVBC / HTTPS code points yet even to the
> point of parsing the records.  We have merge request that has been tracking the
> draft.  I never felt the specification was stable enough to do that and unfortunately
> I was correct.  ALPN has had its parsing changed, the same presentation format produces
> different wire formats.  echconfig vs ech is minor compared to that.
>
> I have not looked to see what other DNS vendors have done so far.
>
> If we go ahead there needs to be a section that specified the differences in
> parsing between the draft when the code point was issued and when the RFC is
> published.
>
> Mark
>
>>> --Ben
>>>
>>> On Wed, Mar 17, 2021 at 1:11 PM <internet-drafts@ietf.org> wrote:
>>>
>>> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>>> This draft is a work item of the Domain Name System Operations WG of the IETF.
>>>
>>>          Title           : Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs)
>>>          Authors         : Ben Schwartz
>>>                            Mike Bishop
>>>                            Erik Nygren
>>>          Filename        : draft-ietf-dnsop-svcb-https-04.txt
>>>          Pages           : 48
>>>          Date            : 2021-03-17
>>>
>>> Abstract:
>>>     This document specifies the "SVCB" and "HTTPS" DNS resource record
>>>     (RR) types to facilitate the lookup of information needed to make
>>>     connections to network services, such as for HTTPS origins.  SVCB
>>>     records allow a service to be provided from multiple alternative
>>>     endpoints, each with associated parameters (such as transport
>>>     protocol configuration and keys for encrypting the TLS ClientHello).
>>>     They also enable aliasing of apex domains, which is not possible with
>>>     CNAME.  The HTTPS RR is a variation of SVCB for HTTPS and HTTP
>>>     origins.  By providing more information to the client before it
>>>     attempts to establish a connection, these records offer potential
>>>     benefits to both performance and privacy.
>>>
>>>     TO BE REMOVED: This document is being collaborated on in Github at:
>>>     https://github.com/MikeBishop/dns-alt-svc [1].  The most recent
>>>     working version of the document, open issues, etc. should all be
>>>     available there.  The authors (gratefully) accept pull requests.
>>>
>>>
>>> The IETF datatracker status page for this draft is:
>>> https://datatracker.ietf.org/doc/draft-ietf-dnsop-svcb-https/
>>>
>>> There are also htmlized versions available at:
>>> https://tools.ietf.org/html/draft-ietf-dnsop-svcb-https-04
>>> https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-svcb-https-04
>>>
>>> A diff from the previous version is available at:
>>> https://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-svcb-https-04
>>>
>>>
>>> Please note that it may take a couple of minutes from the time of submission
>>> until the htmlized version and diff are available at tools.ietf.org.
>>>
>>> Internet-Drafts are also available by anonymous FTP at:
>>> ftp://ftp.ietf.org/internet-drafts/
>>>
>>>
>>> _______________________________________________
>>> DNSOP mailing list
>>> DNSOP@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dnsop
>>> _______________________________________________
>>> DNSOP mailing list
>>> DNSOP@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dnsop
>> _______________________________________________
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop