Re: [Doh] Authoritative DoT or DoH

Ian Swett <ianswett@google.com> Fri, 15 March 2019 14:56 UTC

Return-Path: <ianswett@google.com>
X-Original-To: doh@ietfa.amsl.com
Delivered-To: doh@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A9893130DDA for <doh@ietfa.amsl.com>; Fri, 15 Mar 2019 07:56:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.5
X-Spam-Level:
X-Spam-Status: No, score=-17.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2c3lJRWxRcBM for <doh@ietfa.amsl.com>; Fri, 15 Mar 2019 07:56:48 -0700 (PDT)
Received: from mail-wm1-x343.google.com (mail-wm1-x343.google.com [IPv6:2a00:1450:4864:20::343]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D5433131265 for <doh@ietf.org>; Fri, 15 Mar 2019 07:56:47 -0700 (PDT)
Received: by mail-wm1-x343.google.com with SMTP id e16so6418959wme.1 for <doh@ietf.org>; Fri, 15 Mar 2019 07:56:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=G5OvWzQfLgNdEdvzUaBYbTzTV2wRqWeDOU4ff8Qdxdw=; b=J0l/aoc9xHDiab+HCQb9gwMF0MuUR97mSXNJjX0NA69NLHIvyjnG8syVpbSQv2kb/W UtpYNz63qoakIMlxehJbC3DJeY4Samn1aIbrGVc9Dvodi0DDxlm99WcTdgGGHhg6D/W3 C6XslA2NrroY22rvzVpmSUHveYQE+LilLPWbIBLN1w2hj7b+CspLX0VHSxL3OSvi4DOC dO6GfuqtBT/WmMGerLOAMXHBfW7Kc8lFjHT8xMzKgSYCOYRhVQ3reifquC25Z4xoWKQa H726bGv8VQ3GNN3/Z2i6D385Sqagbtv7YuQeN/z9j1L+DVWii0MVLWWMEmaIOY3aTGZw XWpQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=G5OvWzQfLgNdEdvzUaBYbTzTV2wRqWeDOU4ff8Qdxdw=; b=oLGBtbYVum0W8vLENFJnpk0d76mDch57dLieizQyYHPFqpDGO0pnB6F6zSgk7U3inH /KmDyYrUROS6lKWE4M3/J8F320udjn1V2hPnt2O3JczLaVOi56YwesFoYA2PydmnUMBG uTMs4GFT0GWMNsIfz4WZ1CW5Bxm/K3YoPIgep8sZnBJqrvhW3tOzzCWVERCMgeXkUjnw L+d4GHEu+mQ8fvMEax76LoGrgV2QX/fByOalNA5ju8ZGPvmro8gzJ0L+PAEb02HO2AB2 cEH5UkBq/Kxlaad1HNMNLtp0br/aJVLgZUSUvNPw3nVs8aWpEAPpBXSmGATEQ+LlbLec zK8w==
X-Gm-Message-State: APjAAAUmByjSz51C9m6gCeGAMBnQgjEZ4L4+0bn9QLz8A8FXkGIvkYcq /59U+ziBvd0IUuSflu9QryTIg95xVasuvLP2g1ml2g==
X-Google-Smtp-Source: APXvYqxdygYXIqzAB7lCo2q4bzwC+WYlF8PmL5JigX6nYcdXC6vYcT+cAU+dBMpZ/iwMv3V7EKFxlj8JzFdTP0Jhw9s=
X-Received: by 2002:a1c:9c0e:: with SMTP id f14mr2553012wme.78.1552661806127; Fri, 15 Mar 2019 07:56:46 -0700 (PDT)
MIME-Version: 1.0
References: <C8284F2D-F46A-484E-A145-99C0D8ADBC58@verisign.com> <73eb005a-da34-41cb-a05d-1cb8268060d2@www.fastmail.com> <CAAedzxqFMe_tZkBbXSWjfAgajaO1v=sX6umzcpfv+OaaQKOn6g@mail.gmail.com> <2f18ea6a-89e7-418b-82cf-70a8af70e8c1@www.fastmail.com>
In-Reply-To: <2f18ea6a-89e7-418b-82cf-70a8af70e8c1@www.fastmail.com>
From: Ian Swett <ianswett@google.com>
Date: Fri, 15 Mar 2019 10:56:33 -0400
Message-ID: <CAKcm_gPyE6DaWc4YrTO3_-dRrBpnZA2GUW9aK=Lse-7gM_U8Sg@mail.gmail.com>
To: Martin Thomson <mt@lowentropy.net>
Cc: Erik Kline <ek@loon.co>, doh@ietf.org
Content-Type: multipart/alternative; boundary="00000000000069b6f60584233fd7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/doh/5lUf98ioQTRkv3o_XMjc7DF2l7A>
Subject: Re: [Doh] Authoritative DoT or DoH
X-BeenThere: doh@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: DNS Over HTTPS <doh.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/doh>, <mailto:doh-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/doh/>
List-Post: <mailto:doh@ietf.org>
List-Help: <mailto:doh-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/doh>, <mailto:doh-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Mar 2019 14:56:51 -0000

For a DNS or DoH heavy workload, I'd expect QUIC CPU usage to be very
comparable to DoT or DoH over HTTP/2, but obviously crypto isn't free, so
it would be more expensive than plain DNS.

QUIC CPU really suffers when sending(and to a lesser extent receiving) huge
payloads.

On Fri, Mar 15, 2019 at 7:04 AM Martin Thomson <mt@lowentropy.net> wrote:

> DNS over QUIC (either directly, or as DoH with HTTP/3) will likely
> exacerbate load problems.  QUIC isn't great about its CPU usage at the
> current time.  That comes with some advantages, like sharing an encryption
> context for multiple requests without the head of line blocking inherent in
> HTTP/2, but it's unlikely to be a total slam dunk.
>
> On Fri, Mar 15, 2019, at 14:23, Erik Kline wrote:
> > And on account of the load management issues I would expect some folks
> > to prefer to try out DoQ (DNS over QUIC), does actually bring things
> > back around to DoH.
> >
> > On Thu, 14 Mar 2019 at 19:27, Martin Thomson <mt@lowentropy.net> wrote:
> > > There is far less reason to use DoH for connections to authoritative
> servers. DoT seems far more appropriate (than both DoH and the unencrypted
> variants).
> > >
> > >  I expect there to be a lot of discussion about DoS (not DNS over
> SCTP, sadly) and load management in any such document. I don't see much of
> the stuff that has generated so much heat lately to be relevant in the
> authoritative context.
> > >
> > >  On Fri, Mar 15, 2019, at 06:18, Henderson, Karl wrote:
> > >  >
> > >  > In the last couple of days there has been a lot of activity
> concerning
> > >  > DNS over HTTPS (DoH) - Hoffman and Alibaba presentations at ICANN
> and
> > >  > IETF drafts:
> > >  >
> draft-reid-doh-operator/draft-livingood-doh-implementation-risks-issues/draft-betola-bcp-doh-clients.
> > >  >
> > >  >
> > >  > These discussions have focused on DoH for client (typically web
> > >  > browser) communication with recursive resolvers, and its
> comparisons
> > >  > with DoT for this purpose.
> > >  >
> > >  >
> > >  > Is there any compelling reason at this point to be considering DoH
> for
> > >  > recursive resolver-to-authoritative name server communications?
> > >  >
> > >  >
> > >  > As I noted at the DPRIVE interim meeting, the working group needs
> > >  > empirical studies looking at performance and attack vectors for
> > >  > authoritative DNS encryption.
> > >  >
> > >  >
> > >  > Unless there are compelling reasons to consider Authoritative DoH,
> I
> > >  > propose the working group focus its authoritative DNS encryption
> > >  > assessments around Authoritative DoT.
> > >  >
> > >  >
> > >  > In support, I am willing to co-author an Authoritative DoT
> operational
> > >  > consideration draft in order to outline the operational challenges
> the
> > >  > community needs to address - similar to the draft-reid-doh-operator
> > >  > draft between client and recursive.
> > >  >
> > >  >
> > >  > _______________________________________________
> > >  > Doh mailing list
> > >  > Doh@ietf.org
> > >  > https://www.ietf.org/mailman/listinfo/doh
> > >  >
> > >
> > >  _______________________________________________
> > >  Doh mailing list
> > > Doh@ietf.org
> > > https://www.ietf.org/mailman/listinfo/doh
>
> _______________________________________________
> Doh mailing list
> Doh@ietf.org
> https://www.ietf.org/mailman/listinfo/doh
>