Re: [IPsec] Paul Wouters' Discuss on draft-ietf-ipsecme-add-ike-11: (with DISCUSS and COMMENT)

mohamed.boucadair@orange.com Wed, 10 May 2023 05:29 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D500C153CA1; Tue, 9 May 2023 22:29:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.796
X-Spam-Level:
X-Spam-Status: No, score=-2.796 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VDJVYKk7ho_y; Tue, 9 May 2023 22:29:53 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.70.35]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 251BEC14CE29; Tue, 9 May 2023 22:29:53 -0700 (PDT)
Received: from opfednr04.francetelecom.fr (unknown [xx.xx.xx.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfednr21.francetelecom.fr (ESMTP service) with ESMTPS id 4QGNrZ6nynz5vmG; Wed, 10 May 2023 07:29:50 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1683696591; bh=r0QG+2uZmP1aAcKmjBaSe8HZelXeR49rDKOqT0xyU7Y=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=UxciI4KOtajy2Me3JFyw9VAy0xv1HsysyAQienxqPeP3rRmb5SPI4XtK0GKi2UOp1 y73+srWyCtkQz+J24ROW3+R3mRo5RDl40P/x4M2FFO5c4nHSXyN9nqfhiRKfTnM+0w mZ85aiP07JWAwzmfRRqWfrtI4W//1SSjf8O9TR5bbnN/Lowglrg3bl2rEi1jJC9bIz /OP7XRIi8TKdzsLA6jgwcyEnPj6tFLxkEPbQk6IFEyyexMYSwpoMt6zPt6yUE45JUN HgVxH2cKMECf+am0fnbOVP+sPlJzDxEyMeAtgJAXSFIgUSca6jtyaw9Jo4b9gnzYb7 DfUFXphAmgFYg==
X-TM-AS-ERS: 10.218.34.17-127.5.254.253
X-TM-AS-SMTP: 1.0 b3BmZWRubTMyLmZyYW5jZXRlbGVjb20uZnI= bW9oYW1lZC5ib3VjYWRha XJAb3JhbmdlLmNvbQ==
X-DDEI-TLS-USAGE: Used
Received: from opfednm32.francetelecom.fr (unknown [xx.xx.xx.17]) by opzinddimail1.si.francetelecom.fr (Postfix) with ESMTPS; Wed, 10 May 2023 07:29:50 +0200 (CEST)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-he1eur04lp2059.outbound.protection.outlook.com [104.47.13.59]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by relais-m365.orange.com (ESMTP service) with ESMTPS id 4QGNrZ196QzFpVm; Wed, 10 May 2023 07:29:50 +0200 (CEST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=n0m2PsmDXjFvEAPRz3RWIxwvE3t3A18gJx5N69B52PW2Bq1jDfeLyfm0FeM4OWyhRO3AK/K5bRRGKyikQjfT12qIar+tyKLBFQDkP0ADxDGraCmmJUNQq2AXGm2zF32EbGg3BkP/0mKa2pdA+8C92iOr3Kk7T3jSTBe2FyHC7waZ9du0GEBJRyG17hqp/L9ANot5o9dFzgPtkH8EV/H7/Ci/b+9AMNS3bJjyDbhGONd7qDJaVLa8jxc0vjlvaw4/G0bCKuNx5sTPGVMHW7uB55T4J8UkRZAsYOGwreOgT9TiH7Zd3/C8A9Wnq2MdhNj8aaqDpEiyoFUrpYdQ+7HbfQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ewnZokxVhcLo2R/XUCnaC0bpJMqSecBhbHK4LfA6NNw=; b=J+CJIfThpj+VYJ2acPL/uUEzU5tXjc35a0zOvU3m4TRT9kGXv7B/RsUKS6Q9r+Mkoq4l2yz3g0amAPT58yv4N7PoDnpNGJJDJu4ruoBKJByJ8mtzw2222H+/5rZ8lyXmkKZFf1dCQBOlTmuTkNCVAlm8AOR1HnFcbJObDIcD4E65Lc6gHON8mCgDXswa/2l+/xMF34V7+EzMGEicdhWFmUxJE90amOq5IjTdnw/5tQfI0rEg8ijvv1waYmH3ZsTYmqB6BQqilXOwLV4plt1nZIIdJVjnYLyLUcZHDarTvBZbCTUhdwAzKyldmxrldnFhnLq45Ck376xLiS8azsbmpw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=orange.com; dmarc=pass action=none header.from=orange.com; dkim=pass header.d=orange.com; arc=none
Received: from PAVPR02MB9673.eurprd02.prod.outlook.com (2603:10a6:102:319::5) by AS8PR02MB6696.eurprd02.prod.outlook.com (2603:10a6:20b:239::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6387.18; Wed, 10 May 2023 05:29:48 +0000
Received: from PAVPR02MB9673.eurprd02.prod.outlook.com ([fe80::dcd6:6396:fe64:e7bc]) by PAVPR02MB9673.eurprd02.prod.outlook.com ([fe80::dcd6:6396:fe64:e7bc%5]) with mapi id 15.20.6363.033; Wed, 10 May 2023 05:29:47 +0000
From: mohamed.boucadair@orange.com
To: Paul Wouters <paul@nohats.ca>
CC: Paul Wouters <paul.wouters@aiven.io>, The IESG <iesg@ietf.org>, "draft-ietf-ipsecme-add-ike@ietf.org" <draft-ietf-ipsecme-add-ike@ietf.org>, "ipsecme-chairs@ietf.org" <ipsecme-chairs@ietf.org>, "ipsec@ietf.org" <ipsec@ietf.org>, "kivinen@iki.fi" <kivinen@iki.fi>
Thread-Topic: [IPsec] Paul Wouters' Discuss on draft-ietf-ipsecme-add-ike-11: (with DISCUSS and COMMENT)
Thread-Index: AQHZgRw47ALRRbN2I0eFLiUiXoNQ569S+k0w
Content-Class:
Date: Wed, 10 May 2023 05:29:47 +0000
Message-ID: <6893_1683696590_645B2BCE_6893_314_1_PAVPR02MB9673915862F8722735A9F9C888779@PAVPR02MB9673.eurprd02.prod.outlook.com>
References: <168237846356.6004.18418564180515702317@ietfa.amsl.com> <9682_1682414484_64479B94_9682_249_1_PAVPR02MB9673A0A0B8D302A2B2A0354088649@PAVPR02MB9673.eurprd02.prod.outlook.com> <e1165220-3ed2-74bb-50bb-65c560d08646@nohats.ca>
In-Reply-To: <e1165220-3ed2-74bb-50bb-65c560d08646@nohats.ca>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2023-05-10T05:14:23Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=910606ba-fd5c-472f-bf9f-b2d103754c7f; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=orange.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PAVPR02MB9673:EE_|AS8PR02MB6696:EE_
x-ms-office365-filtering-correlation-id: 7243ed23-daa6-4d52-afd2-08db511791fc
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAVPR02MB9673.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(396003)(366004)(346002)(39860400002)(136003)(376002)(451199021)(71200400001)(478600001)(316002)(76116006)(52536014)(41300700001)(2906002)(54906003)(7696005)(4326008)(66446008)(6916009)(5660300002)(66946007)(64756008)(8936002)(66476007)(66556008)(8676002)(186003)(83380400001)(66899021)(38070700005)(33656002)(86362001)(38100700002)(122000001)(26005)(9686003)(6506007)(55016003); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: orange.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PAVPR02MB9673.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7243ed23-daa6-4d52-afd2-08db511791fc
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 May 2023 05:29:47.7879 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 90c7a20a-f34b-40bf-bc48-b9253b6f5d20
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: QH/rcGFmPl0piHJtMw6m90akucWlQQG2arri4MXyNCAWPRRxjng6LG3Q4qAY9mhKmoXyqyXGrdiwKemt5mhWA4Gvefm1nS3xJpAtnuNRmjA=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR02MB6696
X-TM-AS-ERS: 10.218.34.17-127.5.254.253
X-TM-AS-SMTP: 1.0 b3BmZWRubTMyLmZyYW5jZXRlbGVjb20uZnI= bW9oYW1lZC5ib3VjYWRha XJAb3JhbmdlLmNvbQ==
X-TMASE-Version: DDEI-5.1-9.0.1002-27616.004
X-TMASE-Result: 10--63.289800-10.000000
X-TMASE-MatchedRID: IeZYkn8zfFr/9O/B1c/QywEaayJtYZNt5D9EeoeHUZwM74Nf6tTB9t9q V1RzMGoXrpyextBSI2t3ZVcbJy0H7hRLQnD6pjPPk4nP+tQi+rZlRzZAkKRGDawBH1NnTw69DB8 FjIZjOlYz3TJWI0hsNXdpZTmN1jrYQn/BYVF69lDQTKbcQcZuuIIQEf4Arh717lLGlTAoyS2yuh piqaRnaoI8oAi4ebjTgdYLVBj0vXVAFy8fbGrYnWG/OR9TL3/uW1VjHhznmWie9toQ6h6LE8wil 6AxcZWLu8VKDO6dgUbVsBNB+zMi6qRNH6as+EmUL7p//vLv4bP7YiXdeggqyUJsNXD374+pmmP5 c2pTo3vNY+9Kn8uNfEUDJUViESX5U/WcGp2wpfwFxov+3JYvYwo3vTZ5J1QyW4MsP8I8Y6OfzNx qW8720Bab+AC2MJ3sidUZM6kRhoGJD329j4iIzPSG/+sPtZVkcV3n4J/0zUPKUAGJEFJZ7f/6Rw rmf2vU6uvObtC2ZR51zp07qTSCIJwwyKA1PQCC0e7jfBjhB8e/yN2q8U674nzOjQyTlMDOVdFV2 K8lXxhMigpEz1DHhjTCduvzGcCjFt7FRmEjL4nDJnf/I/XWymIw13TP8dlTQ6Cj3EXWBE2cPOEf 1b2eKuP5TPw/XdYTFKSVkeuYLQ+tZmE9gjMaXZrqyNtBcV3XmRmIQ3pIBcFGMe+tDjQ3Fow9gMr Okf60t/w+sxk1xuN46zVHWyCjqup0MbEb2inAWTWEh5N2a9HIlPL1nAKsI/meUmKVLlSR6uIqcK Pp5BOukHMrfLfXwHvQAA/KJu3HXOxJ61hzipaeAiCmPx4NwGNn8XPiALIb+gD2vYtOFhgqtq5d3 cxkNfAxRSAc0OENIuJieNVvzvp+3BndfXUhXQ==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
X-TMASE-INERTIA: 0-0;;;;
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/49GNGzojSDhWc_4JmVG0QY26fxE>
Subject: Re: [IPsec] Paul Wouters' Discuss on draft-ietf-ipsecme-add-ike-11: (with DISCUSS and COMMENT)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 May 2023 05:29:59 -0000

Hi Paul, 

Thank you for the follow-up.

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Paul Wouters <paul@nohats.ca>
> Envoyé : dimanche 7 mai 2023 21:44
> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>
> Cc : Paul Wouters <paul.wouters@aiven.io>; The IESG
> <iesg@ietf.org>; draft-ietf-ipsecme-add-ike@ietf.org; ipsecme-
> chairs@ietf.org; ipsec@ietf.org; kivinen@iki.fi
> Objet : Re: [IPsec] Paul Wouters' Discuss on draft-ietf-ipsecme-
> add-ike-11: (with DISCUSS and COMMENT)
> 
> On Tue, 25 Apr 2023, mohamed.boucadair@orange.com wrote:
> 
...
> >> #3 Security Considerations
> >>
> >>         The initiator may trust the encrypted DNS resolvers
> supplied
> >> by
> >>         means of IKEv2 from a trusted responder more than the
> locally
> >>         provided DNS resolvers, especially in the case of
> connecting
> >>         to unknown or untrusted networks (e.g., coffee shops or
> hotel
> >>         networks).
> >>
> >> This does not seem to be a "Security Consideration".
> >> Also, before this draft, receiving an (unencrypted) DNS server
> >> supplied by IKEv2 would also be more trusted. In general, VPN
> clients
> >> trust the "VPN provided nameserver" more than the local network
> one,
> >> irrespective of transport encryption. Perhaps this sentence can
> just
> >> be deleted?
> >>
> >
> > [Med] The intent of the text is to remind the precedence of IKE
> supplied data over local supplied resolvers (even if those are
> encrypted resolvers).
> 
> Nothing this draft does changs that from before. I still don't
> think it adds anything and in the case of split vpn is not
> entirely true either. But it is not my hill to die on.
> 

[Med] OK, removed that sentence.  

> > I do not understand the point that
> >> A.2 is
> >> trying to make?
> >>
> >
> > [Med] In addition to the answer from Valery, another point of
> this appendix is that some app may not fall back to Do53.
> 
> I still do not understand. I doubt you can talk about what VPN
> providers "expect".
> 
> 
> >> Similarly, I don't understand Appendix A.3. The VPN service is
> not
> >> involved in "allowing" an application to send traffic through
> the
> >> tunnel.
> >
> > [Med] This is not what the text says.
> 
> 
> >> It is the
> >> VPN client that decided whether or not to send its traffic
> through
> >> the tunnel or not. Also VPNs typically are configured to be
> either
> >> split- tunnel or not.
> >
> > [Med] The text focuses on the case of split-tunnel VPN
> configuration.
> >
> >> This can be, be hardly ever is, dynamic.
> >
> > [Med] The text does not say that.
> >
> > I don't understand what
> >> A.3 is trying
> >> to convey as example use related to the encrypted dns
> capability of
> >> the document.
> >>
> >
> > [Med] This is to provide some background to motivate the
> discussion about INTERNAL_DNS_DOMAIN in Section 4.
> 
> If the section is about setting or not setting INTERNAL_DNS_DOMAIN
> to
> certain values, then it should do so.
> 
> I still don't think A2 or A3 provides anything useful to the
> document.
> 

[Med] We removed A1/A2/A3.

> >> Which explains one of the number "1"s in the Figure which is
> >> otherwise
> >> unreferenced.
> 
> The idea here is that the other "1" should also be described here.
> 

[Med] That other "1" is about the address count. This is why we are referring to an "address" not "addresses". Made this change "s/Its IPv6 address (2001:db8:99:88:77:66:55:44)/Its single IPv6 address (2001:db8:99:88:77:66:55:44)".

> >> The placement of "AliasMode" confuses me. It appears as part of
> >> the
> >> Service Priority as a field name, but it is not a mode or value
> of
> >> that. Perhaps the text should be moved somewhat down, after the
> >> listing od fields? (It is also somewhat confusing in the
> reference
> >> document I-D.ietf-dnsop-svcb-https.
> >>
> >
> > [Med] svcb says "SvcPriority is a number in the range 0-65535".
> We have that text there to explain why 0 is not allowed. I suggest
> to leave the text there. Thanks.
> 
> Then make it part of the previous paragraph so it is clear what
> value
> is talked about

[Med] OK.

, eg:
> 
> CURRENT:
> 
>  	Service Priority (2 octets) - The priority of this attribute
>  	compared to other ENCDNS_IP* instances. This 16-bit unsigned
>  	integer is interpreted following the rules specified in
> Section
>  	2.4.1 of [I-D.ietf-dnsop-svcb-https].
> 
>  	AliasMode (Section 2.4.2 of [I-D.ietf-dnsop-svcb-https]) is
> not
>  	supported because such a mode will trigger additional Do53
> queries
>  	while the data can be supplied directly in the IKE response.
> As
>  	such, this field MUST NOT be set to 0.
> 
> NEW:
> 
>  	Service Priority (2 octets) - The priority of this attribute
>  	compared to other ENCDNS_IP* instances. This 16-bit unsigned
>  	integer is interpreted following the rules specified in
> Section
>  	2.4.1 of [I-D.ietf-dnsop-svcb-https]. As AliasMode (Section
> 2.4.2
>  	of [I-D.ietf-dnsop-svcb-https]) is not supported, this field
>  	MUST NOT be set to 0.
> 
> 
> 
> >> Note that, VPN clients might have code that specifically
> prohibits
> >> the
> >> use of DNS servers on IP addresses that are not covered by the
> VPN
> >> tunnel.
> 
> Thanks for adding a warning note about this.
> 

[Med] The following comments do not apply anymore as we removed the appendices.

> >> I also have some concern with the word plausible, as that seems
> to
> >> only take
> >> encryption into account and not redirection or privacy concerns
> >> towards
> >> the encrypted DNS server, or what could be monitored from an
> >> adversary
> >> seeing the encrypted DNS stream not protected by the VPN to a
> DNS
> >> server.
> >
> > [Med] These privacy concerns fall under this part of the
> security considerations "the use of encrypted DNS does not reduce
> the data available in the DNS resolver".
> 
> That's not entirely true as there is a connection between what to
> trust more, the local network or the VPN. You always seem to
> assume
> the VPN is more trustworthy (from an encryption and privacy point
> of
> view) which does not take into account other views. Again, this is
> not my hill to die on, but I find the text punting to a non-VPN
> encrypted DNS case not really matching what is required in this
> document's security and privacy considerations.
> 
> >> This example does not make it clear if the encrypted DNS
> resolver
> >> can be
> >> used for all DNS or not.
> >
> > [Med] I guess you are referring to the example in A.1. Isn't
> this explicit in this text right before the one you quoted: " For
> both split- and non-split-tunnel configurations, the use of
> encrypted DNS instead of Do53 provides privacy and integrity
> protection ..."?
> 
> No it does not. In a split-tunnel, it could be that only DNS
> lookups for
> the internal domains are allowed. Or it could be that ALL DNS
> lookups
> are allowed, even for non-enterprise use cases. But this is not
> signaled
> in any way AFAIK. The extreme case is a VPN service whose only
> supported
> traffic is DNS (eg think ExpressVPN SmartDNS). It is a "split
> tunnel"
> but it is meant to get all DNS traffic.
> 
> 
> > It appears to say there is a limitation
> >> to only
> >> use it for internal-only domain names. I do not think such a
> >> protocol
> >> limitation should be implied by this example?
> 
> So the problem is your clarifying text in split/no-split implies a
> protocol feature that is not actually part of the defined
> protocol.
> ("split tunnel means only send DNS for INTERNAL_DNS_DOMAINS")
> 
> Is "." a valid INTERNAL_DNS_DOMAINS ?
> 
> Paul

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.