Re: [Doh] Dedicated DoH port

Daniel Kahn Gillmor <dkg@fifthhorseman.net> Thu, 11 April 2019 19:27 UTC

Return-Path: <dkg@fifthhorseman.net>
X-Original-To: doh@ietfa.amsl.com
Delivered-To: doh@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 832DC120604 for <doh@ietfa.amsl.com>; Thu, 11 Apr 2019 12:27:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=fifthhorseman.net header.b=lgdtDX9g; dkim=pass (2048-bit key) header.d=fifthhorseman.net header.b=rM34V0p1
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iXMYUH9MGqSf for <doh@ietfa.amsl.com>; Thu, 11 Apr 2019 12:27:29 -0700 (PDT)
Received: from che.mayfirst.org (che.mayfirst.org [162.247.75.118]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 04AB01203AB for <doh@ietf.org>; Thu, 11 Apr 2019 12:27:29 -0700 (PDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019; t=1555010847; h=from : to : subject : in-reply-to : references : date : message-id : mime-version : content-type : from; bh=0vgp24qMN8iwNb568USfvldxpHszkkH3vcvU0TsOTwQ=; b=lgdtDX9gT7t9NKQxkv4O6hujQPrfXfa/+CN7jGLfDEf0OIS/Yy99qpGz VhFtUD79VFaPXWuqCzyRjA9N4pNyCQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019rsa; t=1555010847; h=from : to : subject : in-reply-to : references : date : message-id : mime-version : content-type : from; bh=0vgp24qMN8iwNb568USfvldxpHszkkH3vcvU0TsOTwQ=; b=rM34V0p1sfl/8Syw7L5/OZ46WLjS5GebvoR9jSiv2OeY0asLHgHqvtmG 2Bls+0YmR/fMrh2JoLvywlWzh95q7alyfSsLWycWFx6ikWNy7UyK+LAg3q AC0/TEiSv3rFIVeSzvoyHjIOvUnGK1SCzajMvD7njvT6jlRXs/oLtc1+Js NKino+7NmCWGfq5C+EiUc79NB/E7c4I1Rn+UpUKY2N3EJeFLqlYoh03vaH Sry3OLjxzQCvFL15pwYHVWlO6vMqvMaiDYNG1jqKUxGuuXHPMSCE+tXQ5s 6shFTRsqH29d0pekYNA/K/fY5fQvIQFZ3NzCs9Iwrp7++7G79mVpTg==
Received: from fifthhorseman.net (unknown [38.109.115.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by che.mayfirst.org (Postfix) with ESMTPSA id 50B2EF99E; Thu, 11 Apr 2019 15:27:26 -0400 (EDT)
Received: by fifthhorseman.net (Postfix, from userid 1000) id A5896200D8; Thu, 11 Apr 2019 15:23:06 -0400 (EDT)
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: Tomas Krizek <tomas.krizek@nic.cz>, doh@ietf.org
In-Reply-To: <d74add8f-8964-1c0f-cd2e-f10867390883@nic.cz>
References: <d74add8f-8964-1c0f-cd2e-f10867390883@nic.cz>
Autocrypt: addr=dkg@fifthhorseman.net; prefer-encrypt=mutual; keydata= mDMEXEK/AhYJKwYBBAHaRw8BAQdAr/gSROcn+6m8ijTN0DV9AahoHGafy52RRkhCZVwxhEe0K0Rh bmllbCBLYWhuIEdpbGxtb3IgPGRrZ0BmaWZ0aGhvcnNlbWFuLm5ldD6ImQQTFggAQQIbAQUJA8Jn AAULCQgHAgYVCgkICwIEFgIDAQIeAQIXgBYhBMS8Lds4zOlkhevpwvIGkReQOOXGBQJcQsbzAhkB AAoJEPIGkReQOOXG4fkBAO1joRxqAZY57PjdzGieXLpluk9RkWa3ufkt3YUVEpH/AP9c+pgIxtyW +FwMQRjlqljuj8amdN4zuEqaCy4hhz/1DbgzBFxCv4sWCSsGAQQB2kcPAQEHQERSZxSPmgtdw6nN u7uxY7bzb9TnPrGAOp9kClBLRwGfiPUEGBYIACYWIQTEvC3bOMzpZIXr6cLyBpEXkDjlxgUCXEK/ iwIbAgUJAeEzgACBCRDyBpEXkDjlxnYgBBkWCAAdFiEEyQ5tNiAKG5IqFQnndhgZZSmuX/gFAlxC v4sACgkQdhgZZSmuX/iVWgD/fCU4ONzgy8w8UCHGmrmIZfDvdhg512NIBfx+Mz9ls5kA/Rq97vz4 z48MFuBdCuu0W/fVqVjnY7LN5n+CQJwGC0MIA7QA/RyY7Sz2gFIOcrns0RpoHr+3WI+won3xCD8+ sVXSHZvCAP98HCjDnw/b0lGuCR7coTXKLIM44/LFWgXAdZjm1wjODbg4BFxCv50SCisGAQQBl1UB BQEBB0BG4iXnHX/fs35NWKMWQTQoRI7oiAUt0wJHFFJbomxXbAMBCAeIfgQYFggAJhYhBMS8Lds4 zOlkhevpwvIGkReQOOXGBQJcQr+dAhsMBQkB4TOAAAoJEPIGkReQOOXGe/cBAPlek5d9xzcXUn/D kY6jKmxe26CTws3ZkbK6Aa5Ey/qKAP0VuPQSCRxA7RKfcB/XrEphfUFkraL06Xn/xGwJ+D0hCw==
Date: Thu, 11 Apr 2019 15:23:06 -0400
Message-ID: <87tvf48hyd.fsf@fifthhorseman.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Archived-At: <https://mailarchive.ietf.org/arch/msg/doh/LMcTmrSEtIhrUHPbDvRONA07Dus>
Subject: Re: [Doh] Dedicated DoH port
X-BeenThere: doh@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: DNS Over HTTPS <doh.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/doh>, <mailto:doh-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/doh/>
List-Post: <mailto:doh@ietf.org>
List-Help: <mailto:doh-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/doh>, <mailto:doh-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Apr 2019 19:27:30 -0000

On Thu 2019-04-11 19:41:42 +0200, Tomas Krizek wrote:
> Service Name:         [domain-doh]
> Desired Port Number:  [44353]
> Description:          [DNS query-response protocol over HTTPS]

i agree with other commenters that this seems like it might not a useful
allocation for a number of reasons.

For knot-resolver specifically, i'd much rather it ship with DoH
disabled by default.

In terms of integration into a modern GNU/Linux system, an interested
admin can do "systemctl enable kresd-doh.socket" to turn it on on port
443.  Or, you could imagine providing a separate OS-level
"knot-resolver-doh" package that depends on knot-resolver, supplies the
necessary module and .socket unit file, and explicitly conflicts with
the other OS-level packages that would typically listen on port 443.

Either of these solutions seems better to me (and easier for an
administrator) than establishing a distinct TCP port for DoH.

         --dkg