Re: [DNSOP] [Ext] Questions / concerns with draft-ietf-dnsop-svcb-https (in RFC Editor queue)

Ben Schwartz <bemasc@google.com> Fri, 26 August 2022 11:29 UTC

Return-Path: <bemasc@google.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C6D9C1522B3 for <dnsop@ietfa.amsl.com>; Fri, 26 Aug 2022 04:29:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -22.609
X-Spam-Level:
X-Spam-Status: No, score=-22.609 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D-pef2ufHuvi for <dnsop@ietfa.amsl.com>; Fri, 26 Aug 2022 04:29:20 -0700 (PDT)
Received: from mail-yw1-x1135.google.com (mail-yw1-x1135.google.com [IPv6:2607:f8b0:4864:20::1135]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7D33FC14F740 for <dnsop@ietf.org>; Fri, 26 Aug 2022 04:29:20 -0700 (PDT)
Received: by mail-yw1-x1135.google.com with SMTP id 00721157ae682-33da3a391d8so28554187b3.2 for <dnsop@ietf.org>; Fri, 26 Aug 2022 04:29:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc; bh=yyFyMD2nXpg34ycdimxCcDvLpzPnJwWvtuAvTGEmfCc=; b=qplAlCgBh3pzileElDLovuVpfKCo53ytXX0MrIog/TSJgtl8npOEgrVExSebRdx7h1 796JsCNZkghv6pfC5fiOFobwXTyH0J6N/apmq+kccdW0/DQZMl/s+uVmxIm4X4CKA1TJ 20+enafTIqxBS8/oFG27/oLlVnb3UAeSyAVxWjOwt1bKoV1LfppB2qmelMpuUDJsk0Hk C98wy0rXpX+wYDkkfp6dYCYIBDghKiGaTLZynQIxQdwYXRi7CX31sPxX8ZNLS0CBVt0x 3tOAhjIiBhSY8Qo+oscIUhBVkLwWAsniKdtXvE8+FMGPqQDC79UNSd7oU/bjUzTljEWT e5Gg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc; bh=yyFyMD2nXpg34ycdimxCcDvLpzPnJwWvtuAvTGEmfCc=; b=ZsdeEHhsNcHawSbLvzRU8JjBfzcD3dE8ACjpHj4kWU6+M+cmkw9g8/1Y+hk7++2dRb E0Ip419yEV+DzRAD2VbFoIH3YMPjZp0T1q/M2F4YqSwumZU4NoLFfEwP5M0OwN19itYG Ng/zlJP9gZLud1YsJ3jv2yOIMSDX7FTYKVYyPHRnWlWisNFSv5RrBfs+fN+1pYEZiEgp k70tTOuKyFfilFZbZCcUzxhIbVMOGyMV89JSFttd54kkDPGYb1OcT63SYAI0N+ZTd3Bt xUJ6MmfaxGELNIC2g5lrDt79ffJomWmf7vw/TgyzLeEBeihjweVZYblPRgfSKelrrIjP HVHQ==
X-Gm-Message-State: ACgBeo1Iig18qKsYNXRKuz2oyg2l36HgXxAAa+lSDxgksT0n46MbXtaS I1owPuU9iIl9aCwtfWgwApN/T+Q16wYc1uhuIPJxYhCwirk=
X-Google-Smtp-Source: AA6agR5Q7g5ui7GF+vY8uZ7bQ7YGIaZIQZ/JBb8IB9N6LdEmZf6A11jyjBj4LPnTWI8XFwRiWLpReYF+JnQtPE35eP4=
X-Received: by 2002:a81:9e47:0:b0:323:2897:aaf with SMTP id n7-20020a819e47000000b0032328970aafmr7993224ywj.43.1661513358923; Fri, 26 Aug 2022 04:29:18 -0700 (PDT)
MIME-Version: 1.0
References: <CAHw9_iKZJndu1100LBU3TiuhF9ACb0As2deA1oZWD2eA46tBbA@mail.gmail.com> <CAH1iCiqryY=u6MN2mkf7krHLmc7TQkoDaXe0k=ZZ+0e9uiMb-Q@mail.gmail.com> <YwaQrnoA3hifxCQW@straasha.imrryr.org> <CAMOjQcEcKQSWvb_LqmfkGwZ2dt_561jLZxHTMuMO0pMy2s9mbw@mail.gmail.com> <CAH1iCirnWdDY0p2-grQKN3PQWOM=JLevxbNskFFEzGwHvisGZA@mail.gmail.com> <B024358C-77FD-4E63-8E18-1CBCEA6C6B14@icann.org> <CAH1iCiry3VDS+dM+wEkPH5a_TSt5pEddxPjKOhL9_M20e_dR0A@mail.gmail.com> <8B970775-22CF-403B-9B8A-84DCC0932D76@icann.org> <CAHbrMsC_RO1J6qp_yOWOc3P4zpZ-cOCB6adXRwjoSQP7_yrWug@mail.gmail.com> <YwgDYnHiruOr3Kcv@straasha.imrryr.org>
In-Reply-To: <YwgDYnHiruOr3Kcv@straasha.imrryr.org>
From: Ben Schwartz <bemasc@google.com>
Date: Fri, 26 Aug 2022 07:29:06 -0400
Message-ID: <CAHbrMsDuMczyo+8eOP7VoWogrnU7q27-Q1RQWNFVKodbYwMftw@mail.gmail.com>
To: dnsop <dnsop@ietf.org>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="00000000000092f61505e7233994"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/rtwLI5zu3Ll5vZEwvYtK42w2RAU>
Subject: Re: [DNSOP] [Ext] Questions / concerns with draft-ietf-dnsop-svcb-https (in RFC Editor queue)
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Aug 2022 11:29:21 -0000

On Thu, Aug 25, 2022 at 7:19 PM Viktor Dukhovni <ietf-dane@dukhovni.org>
wrote:

> On Thu, Aug 25, 2022 at 04:35:39PM -0400, Ben Schwartz wrote:
>
> > Relatedly, the results presented by EKR [1] at the most recent DNSOP
> > meeting measure that 6.5% of Firefox users are unable to retrieve HTTPS
> > records through their local resolver.  To me, this implies that
> functional
> > origin endpoints are likely to be required even if client software gains
> > SVCB/HTTPS support.
>
> This is why my suggested client behaviour was cognisant of this impediment.
>
>     - If the client's *initial* SVCB lookup succeeds, *then* fallback is
>       no longer an option.
>
>     - If initial SVCB resolution fails (SERVFAIL, timeout, ...)
>       then the client behaves as though the SVCB record does not exist.
>
> This results in more predictable behaviour, without optimising for
> failure.


I don't think "more predictable" is really a desirable or achievable
outcome in this case.  Sophisticated clients (e.g. web browsers for HTTP,
iterative resolvers for DNS) tend to develop highly tuned heuristics and
state machines in pursuit of performance and reliability within their
particular constraints.  I think an instruction not to fall back in this
case would likely be ignored.  It also strikes me as questionable from a
standards perspective: if SVCB itself is optional, surely the client always
has the right to change its mind and disable its support for SVCB?


>   If the origin zone directs the service elsewhere, and there
> are no last-mile DNS lookup roadblocks, then the protocol becomes
> "reliable" (optimises for success and predictability, over fallback
> recovery leading to potentially/eventually undesirable outcomes).
>
>
> > I believe this balance could be revisited in several years' time, if
> "HTTPS
> > Record" support becomes sufficiently universal.
>
> Indeed it is a possible position to say that the Internet is not yet
> ready for semantically distinct services seen by SVCB-aware and legacy
> clients.


In addition to the deployment concerns I've mentioned earlier, a deployment
of this kind would be intrinsically insecure: a hostile intermediary could
override the choice of which semantically distinct service is seen by the
client.  That's another reason why this configuration is not permitted.

  But I think that latching on success of the initial lookup
> largely addresses the present impediments to reliance on SVCB.
>

The same could have been said of EDNS0 fallback, but the IETF wisely did
not attempt to leap straight to that configuration in the initial RFC.
Instead, we gave client implementors plenty of room to tune their own
fallback behaviors, and came back to tighten the system up much later when
it became safe to do so.

> Viktor notes with concern that AliasMode is a "non-deterministic
> > redirect".  Instead, the draft attempts to model the client behavior as a
> > preference ordered stack of endpoints:
> >
>
> I also noted an issue around the initial $QNAME having prefix labels (in
> the case of SVCB rather than HTTPS), and so this is likely not the name
> you want appended as a fallback to the target list.
>

Indeed, I think this is a clarity/precision problem that we should
correct.  Specifically, this "final value of $QNAME" endpoint is only used
if it is not the initial value of $QNAME (i.e. if an AliasMode record was
found).

Similarly, if an AliasMode target has attrleaf labels, RFC1123 seems to
> preclude publishing A/AAAA records there, making some of the example
> configurations in the draft impractical.
>

I don't agree with this reading of RFC 1123.  There is no requirement that
address records only be placed on hostnames, and there is no requirement
that TargetName be a hostname.  If I were making an argument here, it might
be about compatibility with RFC 8553 (Attrleaf), but hopefully this is
mostly moot per the above.