[DNSOP] (no subject)

Wes Hardaker <wjhns1@hardakers.net> Sat, 10 August 2019 05:23 UTC

Return-Path: <wjhns1@hardakers.net>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CC181200E5 for <dnsop@ietfa.amsl.com>; Fri, 9 Aug 2019 22:23:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KnRhfKf5F8XT for <dnsop@ietfa.amsl.com>; Fri, 9 Aug 2019 22:23:08 -0700 (PDT)
Received: from mail.hardakers.net (mail.hardakers.net [168.150.192.181]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 75BAC12004D for <dnsop@ietf.org>; Fri, 9 Aug 2019 22:23:08 -0700 (PDT)
Received: from localhost (unknown [10.0.0.3]) by mail.hardakers.net (Postfix) with ESMTPA id 0A75D2AFC6; Fri, 9 Aug 2019 22:23:08 -0700 (PDT)
From: Wes Hardaker <wjhns1@hardakers.net>
To: Puneet Sood <puneets=40google.com@dmarc.ietf.org>
Cc: dnsop@ietf.org
Date: Fri, 09 Aug 2019 22:23:07 -0700
Message-ID: <yblo90xiog4.fsf@w7.hardakers.net>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/r3nLaR8lEAtGP2jVuwDayxWCJU0>
Subject: [DNSOP] (no subject)
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 10 Aug 2019 05:23:11 -0000

Thanks for your feedback about the extended errors draft.  Below are
responses to some of your previously raised points in email to dnsop:


8.1 Puneet Sood
~~~~~~~~~~~~~~~

  My comments on the latest version.

  General: Thanks for writing this - it provides useful information for
  our public DNS resolver implementation.


8.1.1 NOCHANGE > Section 1. Introduction and background
-------------------------------------------------------

  > Para 4. "Authoritative servers MAY parse and use them ..."  Comment:
  Why talk about auth servers parsing this since this field is only
  meant to be present in responses?

  + Response: because we are trying to specify what an authoritative
    server *should* do when it receives one, even if it doesn't expect
    them.  IE, the DNS protocol doesn't prohibit clients from sending
    them so we should at least mention that servers should be prepared
    to receive them (even if useless).


8.1.2 DONE > Section 3.1 The R (retry) flag
-------------------------------------------

  > Para 2. "implementations may receive EDE codes that it does not
  >   understand.  The R flag allows implementations to make a decision
  >   as to what to do if it receives a response with an unknown code -
  >   retry or drop the query."

  Comment: It is unclear what should be done if a response contains
  multiple EDE options and the R flag value is different across them.

  + Response: good question.  Due to popular request, the R bit has now
    been dropped so this issue goes away.


8.1.3 NOCHANGE multiple EDE vs single
-------------------------------------

  Comment: On a related note, what is the reasoning for allowing
  multiple instance of the EDE option in a response versus encoding all
  the (Response-CODE, INFO-CODE, EXTRA-TEXT) tuples in a single EDE
  option? A single EDE option would avoid having different values for
  the R flag and any new flag in the future. 16-bit length field means
  that total size of all EDE options should fit in a single option.

  + Response: Implementations already need to parse multiple extra EDE
    options (to avoid crashing, over-writing, etc).  And the parsing
    structure is significantly easier if they can take the option
    record, pull off the 16 bit option and take the rest as text.  If we
    added a length record for both the number of options and the number
    of text fields (of different lengths), this seems more complex to us
    than adding multiple options instead.  Feel free to try to convince
    us otherwise, or better get all the implementations to prefer it.


8.1.4 DONE > Section 4.1.3 and 4.1.3.1 NOERROR Extended DNS Error Code 3 - Stale Answer
---------------------------------------------------------------------------------------

  Comment: 4.1.3.1 should be 4.1.3?

  + Response: I (Wes) just rewrote that section and ensured everything
    is consistent.  Thanks for the catch though.


8.1.5 NOCHANGE DNSSEC bit
-------------------------

  > Section 4.2 INFO-CODEs for use with RESPONSE-CODE: SERVFAIL(2)
  Comment: There are a number of INFO-CODEs here for DNSSEC failures.
  Over time it will be extra work for implementations to stay up to date
  with new INFO-CODEs added for DNSSEC failures. The R bit signals
  whether a resolution should be retried. Do we want also want a bit for
  signalling DNSSEC validation failures? Only needed if some DNSSEC
  related behavior needs to be different from the R bit value.

  + Response: 1) we've now removed the R bit, and 2) interesting idea...
    It seems premature without a worked example/need.  Do you have an
    exact use case where this would prove beneficial.


8.1.6 NOCHANGE dnssec protection opts
-------------------------------------

  > Section 6. Security Considerations Para 2: "but until we live in an
  > era where all DNS answers are authenticated via DNSSEC or other
  > mechanisms, there are some tradeoffs."  Comment: Not clear how
  > DNSSEC would help here since the OPT RR is not protected by any
  > DNSSEC mechanism.

  + Response: Yes, that's true.  But the sentence is talking
    generically, and refers to "other mechanisms" too...  DNSSEC won't
    help with opt codes, you're right.  But I don't think that was the
    point of the sentence.  If you have specific text you'd like to
    propose, I'd love to see it!


8.1.7 NOCHANGE > Appendix A.
--------------------------

  Editorial: Missing diff summaries for new versions.

  + Response: very true.  Sigh.  I'm (Wes) horrible at remembering to
    write those, and I never put them in my drafts in the first place.
    With the advent of online diffs I don't find them as useful either.
    Since we're nearing last call (again), I'll likely not try to go
    back and retrofit them.




-- 
Wes Hardaker
USC/ISI