Re: Last Call: <draft-cheshire-dnsext-dns-sd-07.txt> (DNS-Based Service Discovery) to Proposed Standard

Stuart Cheshire <cheshire@apple.com> Thu, 23 December 2010 23:15 UTC

Return-Path: <cheshire@apple.com>
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C33A83A68BB for <ietf@core3.amsl.com>; Thu, 23 Dec 2010 15:15:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.723
X-Spam-Level:
X-Spam-Status: No, score=-106.723 tagged_above=-999 required=5 tests=[AWL=-0.124, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NX8tXfmj1rns for <ietf@core3.amsl.com>; Thu, 23 Dec 2010 15:15:02 -0800 (PST)
Received: from mail-out3.apple.com (mail-out.apple.com [17.254.13.22]) by core3.amsl.com (Postfix) with ESMTP id EDBAD3A68B6 for <ietf@ietf.org>; Thu, 23 Dec 2010 15:15:02 -0800 (PST)
Received: from relay16.apple.com (relay16.apple.com [17.128.113.55]) by mail-out3.apple.com (Postfix) with ESMTP id 3E10FC1F768D for <ietf@ietf.org>; Thu, 23 Dec 2010 15:16:39 -0800 (PST)
X-AuditID: 11807137-b7bfaae000004d31-08-4d13d8576689
Received: from elliott.apple.com (elliott.apple.com [17.151.62.13]) by relay16.apple.com (Apple SCV relay) with SMTP id E2.67.19761.758D31D4; Thu, 23 Dec 2010 15:16:39 -0800 (PST)
MIME-version: 1.0
Content-transfer-encoding: 7bit
Content-type: text/plain; charset="us-ascii"
Received: from [10.0.1.2] (173-164-252-149-SFBA.hfc.comcastbusiness.net [173.164.252.149]) by elliott.apple.com (Sun Java(tm) System Messaging Server 6.3-7.04 (built Sep 26 2008; 32bit)) with ESMTPSA id <0LDW008BELZQI730@elliott.apple.com> for ietf@ietf.org; Thu, 23 Dec 2010 15:16:39 -0800 (PST)
Subject: Re: Last Call: <draft-cheshire-dnsext-dns-sd-07.txt> (DNS-Based Service Discovery) to Proposed Standard
From: Stuart Cheshire <cheshire@apple.com>
In-reply-to: <alpine.LRH.2.02.1012230922040.12004@netcore.fi>
Date: Thu, 23 Dec 2010 15:16:38 -0800
Message-id: <E873410C-4607-4178-BCB5-38900BD1FD0F@apple.com>
References: <20101026145701.22996.35291.idtracker@localhost> <alpine.LRH.2.02.1011180925350.17374@netcore.fi> <DAECA2EE-CC94-41DE-9CA7-9A371A956A7A@apple.com> <alpine.LRH.2.02.1012161030580.366@netcore.fi> <EDC0852D-413E-4DE6-9890-22292B79A296@apple.com> <alpine.LRH.2.02.1012230922040.12004@netcore.fi>
To: Pekka Savola <pekkas@netcore.fi>
X-Mailer: Apple Mail (2.1082)
X-Brightmail-Tracker: AAAAAA==
Cc: draft-cheshire-dnsext-dns-sd@tools.ietf.org, ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Dec 2010 23:15:03 -0000

On 22 Dec 2010, at 23:33, Pekka Savola wrote:

> What I'm saying is that having to manually pre-configure the hostname in DNS goes against what appears to be one of the main DNS-SD goals, i.e., the host can invent the hostname or use it in a zero-conf fashion.
> 
> I don't think it's possible to integrate DNS-SD with secure DNS without losing at least some of the properties DNS-SD was designed to address.  So it would be unrealistic to require this from the protocol, especially given its background.
> 
> What I would have wanted to see is more truth in advertising how in practise using security impedes the use of DNS-SD.  Which usage modes of DNS-SD can be made to work and at what cost.

I see the confusion. Multicast DNS is intended to be zero-configuration. DNS-SD is not necessarily. I have added this to the introduction which should hopefully clarify this:

   When used with Multicast DNS, DNS-SD can provide zero-configuration
   operation -- just connect a DNS-SD/mDNS device and its services are
   advertised on the local link with no further user interaction.

   When used with conventional unicast DNS, some configuration will
   usually be required -- such as configuring the device with the DNS
   domain(s) in which it should advertise its services, and configuring
   it with the DNS Update [RFC 2136] keys to give it permission to do
   so. In rare cases, such as a secure corporate network behind a
   firewall where no DNS Update keys are required, zero-configuration
   operation may be achieved by simply having the device register its
   services in a default registration domain it learns from the network
   (See Section 12 "Discovery of Browsing and Registration Domains")
   but usually security credentials will be required to perform DNS
   Updates.

Stuart Cheshire <cheshire@apple.com>
* Wizard Without Portfolio, Apple Inc.
* www.stuartcheshire.org