Re: [Doh] No truncation for DNS over HTTPS

Andrew Sullivan <ajs@anvilwalrusden.com> Thu, 22 March 2018 13:37 UTC

Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: doh@ietfa.amsl.com
Delivered-To: doh@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 56E281272E1 for <doh@ietfa.amsl.com>; Thu, 22 Mar 2018 06:37:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=yitter.info header.b=cVY6mC2C; dkim=pass (1024-bit key) header.d=yitter.info header.b=TKvmlZE+
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pBoo0Bmj-JJl for <doh@ietfa.amsl.com>; Thu, 22 Mar 2018 06:37:28 -0700 (PDT)
Received: from mx4.yitter.info (mx4.yitter.info [159.203.56.111]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1AF331200C5 for <doh@ietf.org>; Thu, 22 Mar 2018 06:37:28 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mx4.yitter.info (Postfix) with ESMTP id 4F956BE780 for <doh@ietf.org>; Thu, 22 Mar 2018 13:37:27 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yitter.info; s=default; t=1521725847; bh=ekwUfIRC7mipNfXhI8YWNm6ALJk3GkStMoAOStAFBVQ=; h=Date:From:To:Subject:References:In-Reply-To:From; b=cVY6mC2CbCNpZcJeH73sAYKzu1YqYNYkbWSJFu6ZjUEKQRVDc28iqyPxoMNs0X/ti 1dcF+unetwT5Tw7xxGXDgZ2WcseDpSD8vLIvYkk2qu5usLKtHUDMtHRJbHPukRpvZD KYFlK3or5K5UmfVhkvj1AqazJ5qyeudUkF6xdcV4=
X-Virus-Scanned: Debian amavisd-new at crankycanuck.ca
Received: from mx4.yitter.info ([127.0.0.1]) by localhost (mx4.yitter.info [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LXRFbf7Rn1F0 for <doh@ietf.org>; Thu, 22 Mar 2018 13:37:23 +0000 (UTC)
Date: Thu, 22 Mar 2018 09:37:17 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yitter.info; s=default; t=1521725843; bh=ekwUfIRC7mipNfXhI8YWNm6ALJk3GkStMoAOStAFBVQ=; h=Date:From:To:Subject:References:In-Reply-To:From; b=TKvmlZE+0wdA1h8ucqhkmUui2oAkNRFXUrtetnIo9ZGj+hyv6q2kGQT9WW2en191K FrsA72ukKRgnsF6j3wEQRMn8dmxQ+0jm6Kxa+4OlDwPGhOxOYN0FZrxFzajjQPlXaa +zZp9jdeAaePIpqOUKKXtPP5jksmCg1H8YeGoqlE=
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: doh@ietf.org
Message-ID: <20180322133717.hxsqb53brrivn75q@mx4.yitter.info>
References: <CAAObRXJDV5Oa_d_S12HT2jqBuO=-AHOuMH8eKrac3BZ2bDxixw@mail.gmail.com> <alpine.DEB.2.11.1803221302420.2781@grey.csi.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <alpine.DEB.2.11.1803221302420.2781@grey.csi.cam.ac.uk>
Archived-At: <https://mailarchive.ietf.org/arch/msg/doh/CzSfat8kUeAuqYj9OIHnVQcXncw>
Subject: Re: [Doh] No truncation for DNS over HTTPS
X-BeenThere: doh@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DNS Over HTTPS <doh.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/doh>, <mailto:doh-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/doh/>
List-Post: <mailto:doh@ietf.org>
List-Help: <mailto:doh-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/doh>, <mailto:doh-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Mar 2018 13:37:29 -0000

On Thu, Mar 22, 2018 at 01:05:18PM +0000, Tony Finch wrote:
> 
> The implementation I would like (when DOH is implemented by a proxy in
> front of an old-transport DNS server) has a pool of TCP connections from
> the proxy to the back-end DNS server(s), over which incoming requests can
> be multiplexed.

That sounds like an implemntation decision or maybe a policy, not a
protocol decision.

Best regards,

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com