Re: [DNSOP] WGLC draft-ietf-dnsop-session-signal

"Bernie Volz (volz)" <volz@cisco.com> Wed, 14 February 2018 02:37 UTC

Return-Path: <volz@cisco.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 442C41270A3; Tue, 13 Feb 2018 18:37:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -13.423
X-Spam-Level:
X-Spam-Status: No, score=-13.423 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, LOCALPART_IN_SUBJECT=1.107, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6ma4arVfbpq6; Tue, 13 Feb 2018 18:36:59 -0800 (PST)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D9A7D12708C; Tue, 13 Feb 2018 18:36:58 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=30514; q=dns/txt; s=iport; t=1518575818; x=1519785418; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=RimlHGBYQZG8wampMdh995QIpKJs8X3sRThldrwjrzI=; b=SvMgtvn4B1+tL2d5TQMWstZtaG/4zWqDY4E70HV4yDrAz9K9fh2Y3evE Md4b8mDMWq8LB5enxoZUlSMijYyRMhrNekvptO0c+WcuLe8i7AFpPUPr+ dSKUtcSKjX2jWMMndw9wg7M1XVh82y3qen58+tUbop2Nja5XXkgMto+Z4 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0BTAQC3n4Na/5FdJa1dGQEBAQEBAQEBAQEBAQcBAQEBAYJaSy1mcCgKg1uKJI4mggKBF5ZBFYIDCh+FHAIPC4JOVBgBAgEBAQEBAQJrKIUjAQEBBCNPFwIBCBEDAQIhCgICAjAdCAIEARKJUWQQsA2CJyaIWYITAQEBAQEBAQEBAQEBAQEBAQEBAQEBGAWFAYIVgz8pgwWDLwEBA4FFEQIdGYJ3MYI0BYpTiXCPawkCiB6NZIIfkiWLFIJuiWkCERkBgTsBHzmBUHAVZwGCG4N7AQJ5eIxtgRkBAQE
X-IronPort-AV: E=Sophos;i="5.46,510,1511827200"; d="scan'208,217";a="137776639"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 14 Feb 2018 02:36:57 +0000
Received: from XCH-RCD-003.cisco.com (xch-rcd-003.cisco.com [173.37.102.13]) by rcdn-core-9.cisco.com (8.14.5/8.14.5) with ESMTP id w1E2av86004625 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 14 Feb 2018 02:36:57 GMT
Received: from xch-aln-003.cisco.com (173.36.7.13) by XCH-RCD-003.cisco.com (173.37.102.13) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Tue, 13 Feb 2018 20:36:57 -0600
Received: from xch-aln-003.cisco.com ([173.36.7.13]) by XCH-ALN-003.cisco.com ([173.36.7.13]) with mapi id 15.00.1320.000; Tue, 13 Feb 2018 20:36:56 -0600
From: "Bernie Volz (volz)" <volz@cisco.com>
To: "draft-ietf-dnsop-session-signal@ietf.org" <draft-ietf-dnsop-session-signal@ietf.org>, "dnsop@ietf.org" <dnsop@ietf.org>
Thread-Topic: WGLC draft-ietf-dnsop-session-signal
Thread-Index: AQHTpToky7RwTvwCQEa3THbh85MkpKOjP6qA
Date: Wed, 14 Feb 2018 02:36:56 +0000
Message-ID: <FE65001E-07DE-4F31-88BC-1D30D5A755E9@cisco.com>
References: <EBF6CCFB-C815-4D59-AEB6-29CA13F9DEFE@cisco.com>
In-Reply-To: <EBF6CCFB-C815-4D59-AEB6-29CA13F9DEFE@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/f.22.0.170515
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.86.253.42]
Content-Type: multipart/alternative; boundary="_000_FE65001E07DE4F3188BC1D30D5A755E9ciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/zExINiADYQ6Lh0QIDOs8S4JBLG8>
Subject: Re: [DNSOP] WGLC draft-ietf-dnsop-session-signal
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Feb 2018 02:37:01 -0000

Sorry, I forgot one additional comment.

While there seems not be a solid definition of what the “Updates” means in the RFC header, it always seems to me that “Updates” means you are changing something in those documents, rather than just extending them with new capabilities within the original documents framework.

I see nothing in the document that makes any changes (“updates”) RFC 1035 and RFC 7766.

RFC 5741 just has:


   [<RFC relation>: <RFC number[s]>]

      Some relations between RFCs in the series are explicitly noted in

      the RFC header.  For example, a new RFC may update one or more

      earlier RFCs.  Currently two relationships are defined: "Updates"

      and "Obsoletes" [RFC2223<https://tools.ietf.org/html/rfc2223>].  Alternatives like "Obsoleted by" are

      also used (e.g., in [RFC5143<https://tools.ietf.org/html/rfc5143>]).  Other types of relationships may

      be defined by the RFC Editor and may appear in future RFCs.

If you’ve already discussed this or believe the “Updates” to be in line with DNSOP / Ops Area practices, feel free to ignore this comment.


  *   Bernie

From: Bernie Volz <volz@cisco.com>
Date: Tuesday, February 13, 2018 at 9:18 PM
To: "draft-ietf-dnsop-session-signal@ietf.org" <draft-ietf-dnsop-session-signal@ietf.org>, "dnsop@ietf.org" <dnsop@ietf.org>
Subject: WGLC draft-ietf-dnsop-session-signal

Hi:

I have reviewed the document. In general, it is well written and ready to be advanced, though there are some nits that the authors should review and consider:

Section 1: Not sure why Stateful is capitalized in the following line:
transport protocol.  Each Stateful operation is communicated in its

Section 2: You probably should update this to the text in https://tools.ietf.org/html/rfc8174 and update the references accordingly.

Section 3: Do you want to add anything about Section 6 (and perhaps later sections)?

Section 4.2.2.3 (and perhaps other places similar text exists): When a connection is aborted because of an invalid message, is there any recommendation to be added about retrying? If the client terminates the connection, it would likely not be wise for it to immediately retry and repeat the operation as that can lead to an endless loop? Should some recommended backoff technique be provided? Or some other connection rate limiting warning?

Section 4.2.3, last paragraph: What should happen if a EDNS(0) TCP Keepalive option does appear? Should the connection be terminated? The message ignored?

Section 4.3: first paragraph: This text kind of conflicts with the text in 4.2.1 which says that whether a message is acknowledge or unacknowledged is determined only by the specification for the Primary TLV. I understand this may not be worth addressing, but perhaps a reference to 4.2.1 is worth considering?

Section 6.1: INACTIVITY TIMEOUT and KEEPALIVE INTERVAL. Is mention 0xffffffff (infinite) worth adding to this text?

For:

The Keepalive TLV is not used as a request message Additional TLV.
Would “MUST NOT be used” be better?

For:

A Keepalive TLV MUST NOT be added as to other responses a Response
I think “as” should be removed.

Section 6.2: I would assume 0xfffffff would not mean infinite.

Section 6.2.1: If a client were to receive a new RCODE but does not understand it (older version), should there be a statement as to how the client should react? Should it treat the unknown error code as if NOERROR were sent?

Section 9: Seems a bit light, but OK if it ends up being acceptable. For example, while it probably means you have bigger problems, but large timer values (such as in the Retry Delay TLV) could be a denial of service vector. Though if the server does that, it probably isn’t who you wanted to be talking to anyway and you should have used TLS.

Perhaps also saying that if DNS over TLS isn’t used (just plan TCP), then it may be possible for a man-in-the-middle to inject messages (such as with a large Retry Delay TLV)?


Again, nothing that likely MUST be fixed.


  *   Bernie