Re: [dnssd] Adoption call for draft-sctl-advertising-proxy

Ted Lemon <mellon@fugue.com> Fri, 13 August 2021 20:07 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 661393A24C1 for <dnssd@ietfa.amsl.com>; Fri, 13 Aug 2021 13:07:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YxRB6k0NJnhl for <dnssd@ietfa.amsl.com>; Fri, 13 Aug 2021 13:07:13 -0700 (PDT)
Received: from mail-oi1-x236.google.com (mail-oi1-x236.google.com [IPv6:2607:f8b0:4864:20::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 990433A24BC for <dnssd@ietf.org>; Fri, 13 Aug 2021 13:07:13 -0700 (PDT)
Received: by mail-oi1-x236.google.com with SMTP id t35so17575173oiw.9 for <dnssd@ietf.org>; Fri, 13 Aug 2021 13:07:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20150623.gappssmtp.com; s=20150623; h=from:in-reply-to:references:mime-version:date:message-id:subject:to :cc; bh=rJWyypvg6mgwGFMJj9/9thFtzhnI8JuoUdAsBfVn26c=; b=aG5mnGAFs4UW6NnUv3TXph7MlUH/LAEkQ1L5Nvcn4L2fTdO51Ejzi8eeEjCc9vOnPd ERIa/j9sTUkuaL0WUu0WyjziFrHNmw2wPEsRXpbfmQc98Y4eR7QtNh3hjzsSkbmJLi8S bksRJmvHfdHCW3hGj1DM9cz1W56FxFvMWkkVY2Q77Z3+zNa0YrTVjPYTNENwKVKJ9MX8 mk/DUBh9gSeclhqeBAM4UianPwr8FVYgdTx+/bqKlKUVRMwxXf152x9xJ+djAaqtxB8v SirMClV9i6i/Jf0J8GqCd82S09JB9QlF3GHXZiGmF5TLmBabbMdcS2WhAKyVhNS3fv3N UXSQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:in-reply-to:references:mime-version:date :message-id:subject:to:cc; bh=rJWyypvg6mgwGFMJj9/9thFtzhnI8JuoUdAsBfVn26c=; b=ItkAwTjUldisLcmpk2/KlTNLnouEI5cMh/la5CoFibUWn7d2LNc8W8VON6GCEqL6vv 6WCBGbrQsi7CMceQWKxsmNsRZcmIsIuY8wJTUdRhvTz9vDhgsgDufGgw+ARgZKF8uRm5 Ui8oUGUwNDCr7kvC80vEaEwYyttlg6fH0p8/Z910BY5iK12b1MUdCaCykbFY8pwz0KdY aKgbs6s5fvroyBrQP0U6lbaAFhzW2FuQB1aLXYs57++/IWBaONsKCf9Dc2gfVZo4fN/e mNHtNajNT2VajbyNDqf4BDMX63VnMC5JfGP9IJC/Ng0nNJ9gG275anYGvLD43ugQNqQ+ VHTw==
X-Gm-Message-State: AOAM533eNV5bVhkW+NvEY1yj4cnxpGX1vTrpFkhsEMXIt0Vp03cR/UeQ 7dpbNwJQ5VfD51ZJH+DsvwHGqid63XGgnyDfNuWHhg==
X-Google-Smtp-Source: ABdhPJxbZGVpULeP8ohkFLBX/90oSUUnzf4tsmieZvMlYir+JcVMqglfhtHyFx6mM5Enn1NLJ8weUGgmyKZHoIzbqys=
X-Received: by 2002:aca:2b05:: with SMTP id i5mr3459081oik.55.1628885231851; Fri, 13 Aug 2021 13:07:11 -0700 (PDT)
Received: from 1058052472880 named unknown by gmailapi.google.com with HTTPREST; Fri, 13 Aug 2021 13:07:11 -0700
From: Ted Lemon <mellon@fugue.com>
In-Reply-To: <CAGwZUDsWat3yPFt49t-YYdEee9Ck9bq=Fq+c-mgorocfUN22bQ@mail.gmail.com>
References: <CADPZrgTu8QeR=yAM+9w0zDJ45Uz7Lgs12-6PKzutTW_p1RkA4Q@mail.gmail.com> <CAPt1N1=NgRRVnD1L_dJ_mZYuE5ReXOv0sK_cL6RcjcmpdQZOYg@mail.gmail.com> <CAGwZUDsWat3yPFt49t-YYdEee9Ck9bq=Fq+c-mgorocfUN22bQ@mail.gmail.com>
MIME-Version: 1.0
Date: Fri, 13 Aug 2021 13:07:11 -0700
Message-ID: <CAPt1N1nhNeXPOidkJRGEM=D-Nd+Nb8zndCCGhMJoTXS6POBbUA@mail.gmail.com>
To: Jonathan Hui <jonhui@google.com>
Cc: dnssd@ietf.org
Content-Type: multipart/alternative; boundary="0000000000009feca605c976651c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnssd/5bkk5r7OF_xpLODtNjXx8cszs30>
Subject: Re: [dnssd] Adoption call for draft-sctl-advertising-proxy
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion of extensions to DNS-based service discovery for routed networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>, <mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>, <mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Aug 2021 20:07:18 -0000

On August 13, 2021 at 1:49:37 PM, Jonathan Hui (jonhui@google.com) wrote:

On Wi-Fi, the device needs to discover the SRP server. Why can't
dnssd-zone-discover help with that? If there is a single SRP server in the
network and it is servicing both Wi-Fi and Thread networks, we don't need
to deal with conflicts. If there are multiple SRP servers, then I hope SRP
replication will address the vast majority of cases.

dnssd-zone-discover lets you discover DNSSD zones that you can browse. It
doesn't tell you about the SRP server. We need a different DNSSD
advertisement for that. Not a big deal.


> > The only other alternative is to rename. I think this is too heavy of a
>
> > solution, but I'm open to debate.
>
> It increases the complexity on every device that needs to browse for
> mDNS services. I would prefer SRP replication to renaming.
>
> This is a good point—SRP replication also increases complexity, but it
> constrains it nicely to the more capable nodes on the network—the ones that
> are acting as ad-hoc infrastructure and not as end nodes.
>
I hope SRP replication will eliminate the need for end devices to handle
conflicts directly. Hopefully we can get some operational experience as to
whether other mitigations are necessary.

Yes. Well, FWIW, my current code does both SRP replication _and_ doesn't
defend names, so we may be getting operational experience on both. :)

Another thing to be aware of is that because of the way mDNS works, if you
are using mDNS for discovery, a name conflict when names aren't being
defended will sit around in the cache for a few minutes. If names are
defended, this doesn't happen; one alternative is to just defend names and
count on SRP to deal with conflicts, but the downside of this is that now
there is a delay before the new information appears.

This delay could potentially be minimized by retrying to register as soon
as the SRP replication update has been acknowledged by all SRP replication
peers—right now my code (when name defense is enabled) just waits two
minutes before re-attempting, which is a lot longer than should be
necessary.