Re: [Doh] DNS Camel thoughts: TC and message size

Tony Finch <dot@dotat.at> Wed, 06 June 2018 14:18 UTC

Return-Path: <dot@dotat.at>
X-Original-To: doh@ietfa.amsl.com
Delivered-To: doh@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 59DF9130F20 for <doh@ietfa.amsl.com>; Wed, 6 Jun 2018 07:18:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hmUbuXxMsaCi for <doh@ietfa.amsl.com>; Wed, 6 Jun 2018 07:18:34 -0700 (PDT)
Received: from ppsw-33.csi.cam.ac.uk (ppsw-33.csi.cam.ac.uk [131.111.8.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A5FA6130F1F for <doh@ietf.org>; Wed, 6 Jun 2018 07:18:34 -0700 (PDT)
X-Cam-AntiVirus: no malware found
X-Cam-ScannerInfo: http://help.uis.cam.ac.uk/email-scanner-virus
Received: from grey.csi.cam.ac.uk ([131.111.57.57]:50089) by ppsw-33.csi.cam.ac.uk (ppsw.cam.ac.uk [131.111.8.139]:25) with esmtps (TLSv1:ECDHE-RSA-AES256-SHA:256) id 1fQZGi-000Um7-hw (Exim 4.91) (return-path <dot@dotat.at>); Wed, 06 Jun 2018 15:18:32 +0100
Date: Wed, 06 Jun 2018 15:18:32 +0100
From: Tony Finch <dot@dotat.at>
To: bert hubert <bert.hubert@powerdns.com>
cc: doh@ietf.org
In-Reply-To: <20180606093212.GA23880@server.ds9a.nl>
Message-ID: <alpine.DEB.2.11.1806061501340.10764@grey.csi.cam.ac.uk>
References: <20180606093212.GA23880@server.ds9a.nl>
User-Agent: Alpine 2.11 (DEB 23 2013-08-11)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"
Archived-At: <https://mailarchive.ietf.org/arch/msg/doh/OWf3ttdexzyPAj8F9cNwE1-bhaQ>
Subject: Re: [Doh] DNS Camel thoughts: TC and message size
X-BeenThere: doh@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: DNS Over HTTPS <doh.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/doh>, <mailto:doh-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/doh/>
List-Post: <mailto:doh@ietf.org>
List-Help: <mailto:doh-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/doh>, <mailto:doh-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Jun 2018 14:18:38 -0000

bert hubert <bert.hubert@powerdns.com> wrote:
>
> So, the DNS Camel has a suggestion. Specify that DNS messages carried over
> DOH can be up to 65536 bytes large and note that truncation should be
> handled as if the response was carried over TCP/53.
>
> Effectively this means that a TC response over DOH is almost always useless,
> but this is no loss of functionality since it did not work over TCP/IP
> either. We've not made anything worse here.
>
> And in general this is what I hope that DOH will restrict itself to: provide
> access to the DNS protocol over HTTPS and not change DNS itself.

Full agreement, and with the rest of your message. Thanks for writing it
so that I didn't have to!

I think the semantics of a DNS message transported over HTTPS should be
the same as for DNS-over-TCP, wrt truncation, EDNS buffer sizes, and so
forth.

Tony.
-- 
f.anthony.n.finch  <dot@dotat.at>  http://dotat.at/
Fisher, German Bight: Variable 3 or 4. Moderate at first in west Fisher,
otherwise slight. Fair. Moderate or good, occasionally poor.