Re: HTTP Proxy-Status Parameter for Next-Hop Aliases

Erik Nygren <erik+ietf@nygren.org> Thu, 01 December 2022 17:34 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D564DC14CF14 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 1 Dec 2022 09:34:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.646
X-Spam-Level:
X-Spam-Status: No, score=-2.646 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xZrWgmJBX1GO for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 1 Dec 2022 09:34:47 -0800 (PST)
Received: from lyra.w3.org (lyra.w3.org [128.30.52.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 274C6C14CE45 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Thu, 1 Dec 2022 09:34:46 -0800 (PST)
Received: from lists by lyra.w3.org with local (Exim 4.94.2) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1p0nSB-006MOM-QO for ietf-http-wg-dist@listhub.w3.org; Thu, 01 Dec 2022 17:34:31 +0000
Resent-Date: Thu, 01 Dec 2022 17:34:31 +0000
Resent-Message-Id: <E1p0nSB-006MOM-QO@lyra.w3.org>
Received: from mimas.w3.org ([128.30.52.79]) by lyra.w3.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <nygren@gmail.com>) id 1p0nS9-006MNE-H7 for ietf-http-wg@listhub.w3.org; Thu, 01 Dec 2022 17:34:29 +0000
Received: from mail-wr1-f50.google.com ([209.85.221.50]) by mimas.w3.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94.2) (envelope-from <nygren@gmail.com>) id 1p0nS7-0055pD-Fc for ietf-http-wg@w3.org; Thu, 01 Dec 2022 17:34:29 +0000
Received: by mail-wr1-f50.google.com with SMTP id x17so3880840wrn.6 for <ietf-http-wg@w3.org>; Thu, 01 Dec 2022 09:34:27 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=ZDv2Xiove13d8gz0VwxMV1i9ZLi8WGQolSMiC14cWwc=; b=CihfDWIMUAzUl8xG1il6I6uXN5E/TyL8rmqZGatRn/6fw+MSNbnqeSfM2R6FWnWvQ8 tq7KJIav2r3dEdAiArcVYYuPx/YqiUO36oc9dG+5rW6Yw4/ODulKUyGvCk+NSgPUrZ+/ at9byaX6DKU+diLINdpWcqwoSEN/YX4Ti9Fgz2xvEvRheJ7ETUKWeN9TLn8vcOCMvEBN Wx2Sjs5HyWUrlH5TeZjSUaNExUEUBSdFHbyiAOxz09KgzHm4f97CeEqmhhJy0KSbJc9f bx7JCfeIXa4ayIVuAow8J8gK5FYPsAqEOe/lQmNEeVZX2yxDtS7p7SRVNHPVtO0SiJry Sdyw==
X-Gm-Message-State: ANoB5pnVFQIo8Szx0rHHKfPaoER8G4nDuYsKqDTh0LQCEvsXDchMOvts Uokads5nFndD8EfMgOkSx7X1QGD26iCAhC2pH/uS6Qir9mg=
X-Google-Smtp-Source: AA0mqf5Wp6Lubq+fdIAWXPVVgXr+xvw1aXShrdoLqIME2G5vXjASVkW63s0x3Jp7KI30cMEs844EbuJ+HFi/QaYjrgc=
X-Received: by 2002:a5d:4852:0:b0:241:e62c:e405 with SMTP id n18-20020a5d4852000000b00241e62ce405mr28899653wrs.257.1669916055768; Thu, 01 Dec 2022 09:34:15 -0800 (PST)
MIME-Version: 1.0
From: Erik Nygren <erik+ietf@nygren.org>
Date: Thu, 01 Dec 2022 12:34:04 -0500
Message-ID: <CAKC-DJj3OWTRjDjp_E9S1BMnRcKPh9oc04Ugh8Hxuty-64CUxQ@mail.gmail.com>
To: "ietf-http-wg@w3.org Group" <ietf-http-wg@w3.org>
Cc: Tommy Pauly <tpauly@apple.com>
Content-Type: multipart/alternative; boundary="0000000000004f127905eec7a16b"
Received-SPF: pass client-ip=209.85.221.50; envelope-from=nygren@gmail.com; helo=mail-wr1-f50.google.com
X-W3C-Hub-Spam-Status: No, score=-0.6
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.001, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, W3C_NW=1
X-W3C-Scan-Sig: mimas.w3.org 1p0nS7-0055pD-Fc 4ab481d6dbb4b35488a796f091c32f6f
X-Original-To: ietf-http-wg@w3.org
Subject: Re: HTTP Proxy-Status Parameter for Next-Hop Aliases
Archived-At: <https://www.w3.org/mid/CAKC-DJj3OWTRjDjp_E9S1BMnRcKPh9oc04Ugh8Hxuty-64CUxQ@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/40595
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

I'd agree that HTTP makes more sense since this seems generally useful for
proxies.

I'd be in-favor of the HTTP WG doing this.  I think it will be important
to loop in DNSOP and/or the new DNS Directorate in as well since there
may be some important corner-cases from them to consider.

Some thoughts also opened at:
https://github.com/tfpauly/privacy-proxy/issues/229
https://github.com/tfpauly/privacy-proxy/issues/230

1) Per draft-ietf-dnsop-svcb-https-11 section 3.2 clients MUST send the
final TargetName to proxies:
https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-svcb-https-11#section-3.2
Proxies themselves shouldn't be doing SVCB/HTTPS RR lookups to get A/AAAA
records.
As such, draft-pauly-httpbis-alias-proxy-status only needs to look at CNAME
chains.

2) Is any special handling needed for exposing DNAMEs? Or are those not
visible to resolver libraries.  I think the latter, but not sure.

These might also be worth considering, although we might decide they are
too much complexity:

3) One of the use-cases for draft-pauly-httpbis-alias-proxy-status may be
for influencing connection coalescing behaviors. Since some clients use "is
the IP address that the proxy is connecting to overlapping with the
rrset(s) used by other connections" having the full IP address rrset lists
for A and AAAA responses might be worthwhile.

4) We may want to allow listing all IP addresses tried before establishing
the connection. (eg, a TCP proxy might implement happy eyeballs and/or
fail-over between multiple IP addresses.) Knowing which others were tried
but not used (when possible) might help for some of the abuse/use cases.

Best, Erik





> Hello HTTP,
>
> Following up on this discussion, I presented this at Masque at IETF 115, and got the feedback that this would be fit more in HTTP, and also that it should just be a simpler proxy-status parameter to include only the alias name chain (generally, the CNAME chain).
>
> I’ve revised the document, and it’s super short — just defining a “next-hop-aliases” parameter, which is a list of names.
>
> https://www.ietf.org/archive/id/draft-pauly-httpbis-alias-proxy-status-00.htmlhttps://datatracker.ietf.org/doc/draft-pauly-httpbis-alias-proxy-status/
>
> There was also discussion in the meeting about having more work on broader solutions to get rich and complex DNS information back from proxies, but I’d like to get this simple proxy-status parameter registered separately. I’d appreciate people’s reviews and thoughts.
>
> Thanks,
> Tommy
>
> On Oct 12, 2022, at 4:02 PM, Mark Nottingham <mnot@mnot.net <mnot@mnot.net?Subject=Re%3A%20HTTP%20Proxy-Status%20Parameter%20for%20Next-Hop%20Aliases&In-Reply-To=%3CBC9076D0-8F74-4D2D-B933-81BE5D1ED52B%40apple.com%3E&References=%3CBC9076D0-8F74-4D2D-B933-81BE5D1ED52B%40apple.com%3E>> wrote:
>
> Speaking personally -- I don't have any strong feelings either way, as long as appropriate communication happens. If the use cases are for non-MASQUE proxying too (and it seems like they are), that might tilt it slightly towards HTTP.
>
> Cheers,
>
>
>> On 11 Oct 2022, at 2:46 am, Tommy Pauly <tpauly@apple.com <tpauly@apple.com?Subject=Re%3A%20HTTP%20Proxy-Status%20Parameter%20for%20Next-Hop%20Aliases&In-Reply-To=%3CBC9076D0-8F74-4D2D-B933-81BE5D1ED52B%40apple.com%3E&References=%3CBC9076D0-8F74-4D2D-B933-81BE5D1ED52B%40apple.com%3E>> wrote:
>>
>> Hi HTTP,
>>
>> I wanted to share this draft with this group, which I’ve initially started discussion on in MASQUE.
>>
>> It’s a simple parameter addition to proxy-status, to let the proxy send back the IP and CNAME/alias chain it used to reach the next hop. This is useful for clients of CONNECT/CONNECT-UDP proxies that want to apply policies to specific IPs and CNAMEs (for tracker detection, cookie rules, etc).
>>
>> In addition to any reviews and feedback on the technical content, we’d like to know if this is something that the HTTPbis WG would like to own, or if it is fine letting the work happen in MASQUE and get review from HTTP.
>>
>> Best,
>> Tommy
>>
>>> Begin forwarded message:
>>>
>>> From: Tommy Pauly <tpauly=40apple.com@dmarc.ietf.org <tpauly=40apple.com@dmarc.ietf.org?Subject=Re%3A%20HTTP%20Proxy-Status%20Parameter%20for%20Next-Hop%20Aliases&In-Reply-To=%3CBC9076D0-8F74-4D2D-B933-81BE5D1ED52B%40apple.com%3E&References=%3CBC9076D0-8F74-4D2D-B933-81BE5D1ED52B%40apple.com%3E>>
>>> Subject: [Masque] HTTP Proxy-Status Parameter for DNS Information
>>> Date: October 4, 2022 at 12:29:33 PM PDT
>>> To: masque@ietf.org <masque@ietf.org?Subject=Re%3A%20HTTP%20Proxy-Status%20Parameter%20for%20Next-Hop%20Aliases&In-Reply-To=%3CBC9076D0-8F74-4D2D-B933-81BE5D1ED52B%40apple.com%3E&References=%3CBC9076D0-8F74-4D2D-B933-81BE5D1ED52B%40apple.com%3E>
>>>
>>> Hello MASQUErs,
>>>
>>> I wanted to share this document with this group, since it is mainly applicable to MASQUE-style (CONNECT/CONNECT-UDP) proxies.
>>>
>>> Right now, when a client connects to a TCP or UDP server via the proxy using a hostname in the request, it doesn’t perform its own DNS, and thus doesn’t learn about the IP address of the server it ultimately is connected to, or the CNAME / AliasMode chain that was used to get to the IP address of the server. That’s generally fine, but there are use cases where clients may want to know the IP address or CNAMEs to detect cases where trackers are performing CNAME cloaking, etc.
>>>
>>> So, this is a very simple proposal to define a new, optional proxy-status parameter that can let MASQUE-style proxies tell clients about the IP address and CNAME chain from DNS.
>>>
>>> https://www.ietf.org/archive/id/draft-pauly-masque-dns-proxy-status-00.html
>>>
>>> This certainly does not solve all of the use cases where clients may want to know more DNS details (SVCB/HTTPS records for ECH, alpn support, etc), and I expect more work to be needed for those use cases. However, I believe this extra bit of information is something that is incrementally useful, easy to implement, and simple to define.
>>>
>>> Thoughts and feedback welcome!
>>>
>>> Thanks,
>>> Tommy
>>>
>>>> Begin forwarded message:
>>>>
>>>> From: internet-drafts@ietf.org <internet-drafts@ietf.org?Subject=Re%3A%20HTTP%20Proxy-Status%20Parameter%20for%20Next-Hop%20Aliases&In-Reply-To=%3CBC9076D0-8F74-4D2D-B933-81BE5D1ED52B%40apple.com%3E&References=%3CBC9076D0-8F74-4D2D-B933-81BE5D1ED52B%40apple.com%3E>
>>>> Subject: New Version Notification for draft-pauly-masque-dns-proxy-status-00.txt
>>>> Date: October 4, 2022 at 11:01:29 AM PDT
>>>> To: Tommy Pauly <tpauly@apple.com <tpauly@apple.com?Subject=Re%3A%20HTTP%20Proxy-Status%20Parameter%20for%20Next-Hop%20Aliases&In-Reply-To=%3CBC9076D0-8F74-4D2D-B933-81BE5D1ED52B%40apple.com%3E&References=%3CBC9076D0-8F74-4D2D-B933-81BE5D1ED52B%40apple.com%3E>>
>>>>
>>>>
>>>> A new version of I-D, draft-pauly-masque-dns-proxy-status-00.txt
>>>> has been successfully submitted by Tommy Pauly and posted to the
>>>> IETF repository.
>>>>
>>>> Name:		draft-pauly-masque-dns-proxy-status
>>>> Revision:	00
>>>> Title:		HTTP Proxy-Status Parameter for DNS Information
>>>> Document date:	2022-10-04
>>>> Group:		Individual Submission
>>>> Pages:		5
>>>> URL:            https://www.ietf.org/archive/id/draft-pauly-masque-dns-proxy-status-00.txt
>>>> Status:         https://datatracker.ietf.org/doc/draft-pauly-masque-dns-proxy-status/
>>>> Html:           https://www.ietf.org/archive/id/draft-pauly-masque-dns-proxy-status-00.html
>>>> Htmlized:       https://datatracker.ietf.org/doc/html/draft-pauly-masque-dns-proxy-status
>>>>
>>>>
>>>> Abstract:
>>>>  This document defines an HTTP Proxy-Status Parameter that contains
>>>>  the IP address and CNAME chain received over DNS that was used to
>>>>  establish the connection to the next hop.
>>>>
>>>> Discussion Venues
>>>>
>>>>  This note is to be removed before publishing as an RFC.
>>>>
>>>>  Source for this draft and an issue tracker can be found at
>>>>  https://github.com/tfpauly/privacy-proxy.
>>>>
>>>>
>>>>
>>>>
>>>> The IETF Secretariat
>>>>
>>>>
>>>
>>> --
>>> Masque mailing list
>>> Masque@ietf.org <Masque@ietf.org?Subject=Re%3A%20HTTP%20Proxy-Status%20Parameter%20for%20Next-Hop%20Aliases&In-Reply-To=%3CBC9076D0-8F74-4D2D-B933-81BE5D1ED52B%40apple.com%3E&References=%3CBC9076D0-8F74-4D2D-B933-81BE5D1ED52B%40apple.com%3E>
>>> https://www.ietf.org/mailman/listinfo/masque
>>
>
> --
> Mark Nottingham   https://www.mnot.net/
>