Re: [IPsec] Paul Wouters' Discuss on draft-ietf-ipsecme-add-ike-11: (with DISCUSS and COMMENT)

mohamed.boucadair@orange.com Tue, 25 April 2023 09:21 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54EE2C1516FF; Tue, 25 Apr 2023 02:21:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.796
X-Spam-Level:
X-Spam-Status: No, score=-2.796 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DC1-q3M1BixW; Tue, 25 Apr 2023 02:21:27 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.39]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1BF20C151555; Tue, 25 Apr 2023 02:21:27 -0700 (PDT)
Received: from opfedar05.francetelecom.fr (unknown [xx.xx.xx.7]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfedar23.francetelecom.fr (ESMTP service) with ESMTPS id 4Q5Ghj0ZCxzBrvZ; Tue, 25 Apr 2023 11:21:25 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1682414485; bh=RcpJg1ydljskn7eRM6+Yn8jtQrhT7rRJIdjG/9W02lc=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=Kz5YrXd8z2jjnH15pKSF2x7nhs7TvTHkhF/+5/jhWL9NdT/O97UPs/OHa3JIfaF53 u8BueeH98lNIYjMMBVCS+/4nmY6jxZQ5d+LdJFddJ83uFpXF5lBE1HAclGaGurxwaS NKyW8k0hRfi1mNMiK4q+7JnfwGINvRgex/ANI0oIP57RP4LuSzYv9a+b1gyh1zIuXt WgmA18oZct/TZApj+HUPp2vylc4zANOwNvvblxOqSIpLI6X5G4VQ5cFVvyjbp94acm 83eihXD5pthgVjxeseW31xE+YQ2gWAooV628Gy7JY/io/UdVSHOPGbRWzwT9eVo2Et JNm1L5pGr07ow==
Received: from opzinddimail8.si.fr.intraorange (unknown [10.117.25.76]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by opfedar05.francetelecom.fr (ESMTP service) with ESMTPS id 4Q5Ghh6VHPz2xCF; Tue, 25 Apr 2023 11:21:24 +0200 (CEST)
Received: from opzinddimail8.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id 99E1277B29E; Tue, 25 Apr 2023 11:21:24 +0200 (CEST)
Received: from opzinddimail8.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id 74BC277A731; Tue, 25 Apr 2023 11:21:24 +0200 (CEST)
X-TM-AS-ERS: 10.107.176.75-127.5.254.253
X-TM-AS-SMTP: 1.0 b3BmZWRhbTMxLmZyYW5jZXRlbGVjb20uZnI= bW9oYW1lZC5ib3VjYWRha XJAb3JhbmdlLmNvbQ==
X-DDEI-TLS-USAGE: Used
Received: from opfedam31.francetelecom.fr (unknown [xx.xx.xx.75]) by opzinddimail8.si.fr.intraorange (Postfix) with ESMTPS; Tue, 25 Apr 2023 11:21:24 +0200 (CEST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05lp2113.outbound.protection.outlook.com [104.47.18.113]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by relais-m365.orange.com (ESMTP service) with ESMTPS id 4Q5Ghh1TDCz1xnK; Tue, 25 Apr 2023 11:21:24 +0200 (CEST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gQCJxaCzujwLRWcpnP8T5aZllplvXQzkwMWHrx/G1vWDu7LIF3h0TbLMH1bDIOPjy6gCUGZdzskOtaWCmuh7NCuhrCXLlEupcmK846ZXweSbeW8D7NYCEsX5zFsScLmYQUHQz068/WEbKQ7GjEX+vKi++yFOs2BWWqm8WsJkfnwJ0Czhei8O8YMANUfY99U/6hI+tUIGbKm8+poRrtlUxh8KijBXcy85YFrycqohDOSgGyqBFMTN8jSZBuzB1vzSWS39NjGZuQv+pr2L5aMGGTr6satN0PfnARpLdw9aooAr7RpS6ZfG2qDH76SBRBwf0u9gRoR/4pMT3c2Lt9Fo9Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=VFpWzyg4liGY7NPxJq6uxUrYlvR0VbA82Mlrp7XSDgY=; b=eB8BOhBZ1kw2skd5f10z4zgPkJu/Qsf9LXjiaJ3LO6/HwJAe8AgYfJHcgsnEyq1JbTcDY9Hv55xR4vjyYpveqFJRffbpbQXEdb1i+qgWDFqqprzegI24qKEO62/cjNGRSNjjFH6zr+ikftiXGkaVFXeSRgeqaxf0r6euZJgshIiZLjORa2jDOBdz2fs8WhRcoOsnYdNy/QWPrmpCyptEziuZZcOn02bg60CgCHPeO8QFrUFsbR0UgAfgMzsRT4APAWOyKzgp3MctqiNY4M5XkbKWCte2rqAxfNxQPiidUN/5En65YbicgoOx300bKl5Nr/Af6cFr+M8ZBa4CD3TfqA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=orange.com; dmarc=pass action=none header.from=orange.com; dkim=pass header.d=orange.com; arc=none
Received: from PAVPR02MB9673.eurprd02.prod.outlook.com (2603:10a6:102:319::5) by AS8PR02MB8296.eurprd02.prod.outlook.com (2603:10a6:20b:525::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6319.33; Tue, 25 Apr 2023 09:21:23 +0000
Received: from PAVPR02MB9673.eurprd02.prod.outlook.com ([fe80::dcd6:6396:fe64:e7bc]) by PAVPR02MB9673.eurprd02.prod.outlook.com ([fe80::dcd6:6396:fe64:e7bc%6]) with mapi id 15.20.6319.034; Tue, 25 Apr 2023 09:21:22 +0000
From: mohamed.boucadair@orange.com
To: Paul Wouters <paul.wouters@aiven.io>, The IESG <iesg@ietf.org>
CC: "draft-ietf-ipsecme-add-ike@ietf.org" <draft-ietf-ipsecme-add-ike@ietf.org>, "ipsecme-chairs@ietf.org" <ipsecme-chairs@ietf.org>, "ipsec@ietf.org" <ipsec@ietf.org>, "kivinen@iki.fi" <kivinen@iki.fi>
Thread-Topic: Paul Wouters' Discuss on draft-ietf-ipsecme-add-ike-11: (with DISCUSS and COMMENT)
Thread-Index: AQHZdwNzNa4xg60bZUSIE6qwSOPI2K87smrQ
Content-Class:
Date: Tue, 25 Apr 2023 09:21:22 +0000
Message-ID: <9682_1682414484_64479B94_9682_249_1_PAVPR02MB9673A0A0B8D302A2B2A0354088649@PAVPR02MB9673.eurprd02.prod.outlook.com>
References: <168237846356.6004.18418564180515702317@ietfa.amsl.com>
In-Reply-To: <168237846356.6004.18418564180515702317@ietfa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2023-04-25T08:30:54Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=d5aa1f26-fe15-481e-b28b-b16e98c462f1; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=orange.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PAVPR02MB9673:EE_|AS8PR02MB8296:EE_
x-ms-office365-filtering-correlation-id: afa33220-ab7f-49a6-63c2-08db456e6fcb
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAVPR02MB9673.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(376002)(366004)(39860400002)(136003)(346002)(396003)(451199021)(8676002)(8936002)(54906003)(38070700005)(110136005)(66899021)(478600001)(66476007)(66556008)(55016003)(64756008)(66446008)(76116006)(66946007)(4326008)(122000001)(316002)(41300700001)(2906002)(38100700002)(52536014)(5660300002)(86362001)(186003)(966005)(26005)(6506007)(9686003)(33656002)(7696005)(71200400001)(83380400001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: orange.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PAVPR02MB9673.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: afa33220-ab7f-49a6-63c2-08db456e6fcb
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Apr 2023 09:21:22.6790 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 90c7a20a-f34b-40bf-bc48-b9253b6f5d20
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: GClAXBhOMGXkhAQPWrR0W4jTwHo4xEuNDCJtGtsTOj3EzhBXJTz2Ccf/DCdrEs8lM+EYb+gH7w7l+jxy4QFcTwvoWXkkAVW/5TrbMMT8LPA=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR02MB8296
X-TM-AS-ERS: 10.107.176.75-127.5.254.253
X-TM-AS-SMTP: 1.0 b3BmZWRhbTMxLmZyYW5jZXRlbGVjb20uZnI= bW9oYW1lZC5ib3VjYWRha XJAb3JhbmdlLmNvbQ==
X-TMASE-Version: DDEI-5.1-9.0.1002-27586.004
X-TMASE-Result: 10--56.902500-10.000000
X-TMASE-MatchedRID: IeZYkn8zfFr/9O/B1c/Qy461Z+HJnvsOYi1nZ7WB6LEM74Nf6tTB9t9q V1RzMGoX8Xo3NKXpyhfblbTPZuUmGUNBh77UZA81uGch2xF+dnNvTi4hBnJxzQUNrTtb8ygNIF/ dnT8oz+qHIhFGaFX5NENziVKCujCl9R7dwXny/bf6zT5BlgBw38ZiegX8JN5l31GU/N5W5BDpue 97brGY0P/pF1obWB+zpPNUSWHeO4dkHsVpDopD3/gWrMZvbmeHedRtLq6EVMd8i9rpXhiyZ51Cz YDeNo+TUNRbIfx+Uhk/u1ynZtJsQw7auG4bYkxbmqdQuKXkmosIRGdp3SjqDfmt2wtrXQjMq+Y4 9dGqjtFs/k3HuydUVQWxgTM2bhchi1S0n1RgFfvHM1p4NoWygxKvFacTVVSJHOUhijZNQhvFQMo Sxgh+8pPgxV9krWmB0TTgowSeLursFRrfLa9xruMobH1h01ziALR/3svM0acH8UzOewTxw2iaeG oxOZryHolz7Ce+8DXVhNbgze5ng4XrWsM9VUpTpuJvuu5sA29PnKxAOPp4WQ6QlBHhBZuw96xot FNhK+5vMKZRZNFpwHfpNeNSjGALHavnAOE5xFVkBXeGzp60+utC+5cqKLdj6DfA0qKLWvkWWg76 IlE/zBRgfDlt1RtlU+rdldD9RhwumHyO4Y/CAwrcxrzwsv5u2NFIRsHl1EpYfsHHDgAMI5VDWRX I5n3IZ/+vkUwNRnV6F2X61voLPCVG4RQK0So5+CjwEqX1p7myzcnjmIvqXzG479dj1oXHgVPoCB F7LwBLq8iydnb2+YbQoR8TxlUIPJGiZnfi1YSeAiCmPx4NwGNn8XPiALIb+gD2vYtOFhgqtq5d3 cxkNfAxRSAc0OENIuJieNVvzvp+3BndfXUhXQ==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
X-TMASE-INERTIA: 0-0;;;;
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/NlfDM4xSIOzmyQYRqmV6CPt10ao>
Subject: Re: [IPsec] Paul Wouters' Discuss on draft-ietf-ipsecme-add-ike-11: (with DISCUSS and COMMENT)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Apr 2023 09:21:31 -0000

Hi Paul, all, 

Thanks for the review. 

Please see inline. Skipped the comments to which Valery replied. 

Cheers,
Med

> -----Message d'origine-----
> De : Paul Wouters via Datatracker <noreply@ietf.org>
> Envoyé : mardi 25 avril 2023 01:21
> À : The IESG <iesg@ietf.org>
> Cc : draft-ietf-ipsecme-add-ike@ietf.org; ipsecme-chairs@ietf.org;
> ipsec@ietf.org; kivinen@iki.fi; kivinen@iki.fi
> Objet : Paul Wouters' Discuss on draft-ietf-ipsecme-add-ike-11:
> (with DISCUSS and COMMENT)
> 
> Paul Wouters has entered the following ballot position for
> draft-ietf-ipsecme-add-ike-11: Discuss
> 
> When responding, please keep the subject line intact and reply to
> all email addresses included in the To and CC lines. (Feel free to
> cut this introductory paragraph, however.)
> 
> 
...
> 
> 
> 
> ------------------------------------------------------------------
> ----
> DISCUSS:
> ------------------------------------------------------------------
> ----
> 
> I have a few important items I believe needs fixing, but I believe
> those are
> still fairly easy to address.
> 
...
> #2 Updates RFC 8598
> 
>         Note: [RFC8598] requires INTERNAL_IP6_DNS (or
> INTERNAL_IP4_DNS)
>         attribute to be mandatory present when INTERNAL_DNS_DOMAIN
> is
>         included. This specification relaxes that constraint
> 
> This clearly updates RFC8598, but the document is lacking an
> Update: clause.
> Please add the Update clause and mention the update in the
> abstract/introduction.
> 

[Med] Please refer to this thread: https://mailarchive.ietf.org/arch/msg/ipsec/1Mi1_ygETzgA4t1OGbArbn9eqBk/

> #3 Security Considerations
> 
>         The initiator may trust the encrypted DNS resolvers
> supplied by
>         means of IKEv2 from a trusted responder more than the
> locally
>         provided DNS resolvers, especially in the case of
> connecting
>         to unknown or untrusted networks (e.g., coffee shops or
> hotel
>         networks).
> 
> This does not seem to be a "Security Consideration".
> Also, before this draft, receiving an (unencrypted) DNS server
> supplied
> by IKEv2 would also be more trusted. In general, VPN clients trust
> the
> "VPN provided nameserver" more than the local network one,
> irrespective
> of transport encryption. Perhaps this sentence can just be
> deleted?
> 

[Med] The intent of the text is to remind the precedence of IKE supplied data over local supplied resolvers (even if those are encrypted resolvers).

> #4 Appendix A.2 and A.3
> 
>         Legacy VPN service providers usually preserve end-users'
> data
>         confidentiality by sending all communication traffic
> through an
>         encrypted tunnel.
> 
> What is "legacy" about this? 

[Med] We mean traditional VPN providers. The word is now removed.

I do not understand the point that
> A.2 is
> trying to make?
> 

[Med] In addition to the answer from Valery, another point of this appendix is that some app may not fall back to Do53.  

> Similarly, I don't understand Appendix A.3. The VPN service is not
> involved
> in "allowing" an application to send traffic through the tunnel.

[Med] This is not what the text says.

> It is the
> VPN client that decided whether or not to send its traffic through
> the tunnel
> or not. Also VPNs typically are configured to be either split-
> tunnel or not.

[Med] The text focuses on the case of split-tunnel VPN configuration.

> This can be, be hardly ever is, dynamic.

[Med] The text does not say that. 

 I don't understand what
> A.3 is trying
> to convey as example use related to the encrypted dns capability
> of the
> document.
> 

[Med] This is to provide some background to motivate the discussion about INTERNAL_DNS_DOMAIN in Section 4. 

> 
> ------------------------------------------------------------------
> ----
> COMMENT:
> ------------------------------------------------------------------
> ----
> 
> Appendix A and B are marked as "example". This is confusing. I
> would rename
> Appendix B to "Configuration Payload examples".
> 
> The Figure 5 text should add the line:
> 
>         * Its Service Priority is 1
> 

[Med] ACK.

> Which explains one of the number "1"s in the Figure which is
> otherwise
> unreferenced.
> 
> The placement of "AliasMode" confuses me. It appears as part of
> the
> Service Priority as a field name, but it is not a mode or value of
> that. Perhaps the text should be moved somewhat down, after the
> listing od fields? (It is also somewhat confusing in the reference
> document I-D.ietf-dnsop-svcb-https.
> 

[Med] svcb says "SvcPriority is a number in the range 0-65535". We have that text there to explain why 0 is not allowed. I suggest to leave the text there. Thanks.

> 
>         Note that, for many years, typical designs have often
> considered
>         that the DNS resolver was usually located inside the
> protected
>         domain, but could be located outside of it. With encrypted
> DNS,
>         the latter option becomes plausible.
> 
> Note that, VPN clients might have code that specifically prohibits
> the
> use of DNS servers on IP addresses that are not covered by the VPN
> tunnel.
> 
> I also have some concern with the word plausible, as that seems to
> only take
> encryption into account and not redirection or privacy concerns
> towards
> the encrypted DNS server, or what could be monitored from an
> adversary
> seeing the encrypted DNS stream not protected by the VPN to a DNS
> server.

[Med] These privacy concerns fall under this part of the security considerations "the use of encrypted DNS does not reduce the data available in the DNS resolver". 

> (eg an adversay sees an encrypted DNS packet to 192.1.2.1, and
> then sees
> a plaintext query to the root server for ohnoos.org from IP
> 192.1.2.1).
> Note that based on this reasoning, perhaps a consideration for
> this should
> be added to the Privacy Considerations section.
> 
> I would remove this note or rewrite it as a caution note instead,
> eg:
> 
>         Note that existing VPN client implementations might not
> expect
>         the new use case of an obtained DNS server IP being
> outside of
>         the covered IP ranges of the VPN tunnel.
> 

[Med] Makes sense. Went with this reworded text: 

NEW:
Note that existing VPN client implementations might not expect that the discovered DNS resolver IP address to be outside of the covered IP address ranges of the VPN tunnel.  

> 
> 
> This example does not make it clear if the encrypted DNS resolver
> can be
> used for all DNS or not.

[Med] I guess you are referring to the example in A.1. Isn't this explicit in this text right before the one you quoted: " For both split- and non-split-tunnel configurations, the use of encrypted DNS instead of Do53 provides privacy and integrity protection ..."?


 It appears to say there is a limitation
> to only
> use it for internal-only domain names. I do not think such a
> protocol
> limitation should be implied by this example?
> 
>         Enterprise networks are susceptible to internal and
> external
>         attacks. To minimize that risk all enterprise traffic is
> encrypted
>         (Section 2.1 of [I-D.arkko-farrell-arch-model-t]).
> 
> I'm not sure if this sentence is relevant to the document in
> question? Or
> actually, if all enterprise network is encrypted anyway, why cant
> one just
> send "unencrypted DNS", encrypted over the VPN to the VPN server?
> The VPN
> server would then encrypt that traffic to the target internal DNS
> server
> using its regular "all enterprise traffic is encrypted" model. I
> suggest
> to just remove this sentence.

[Med] OK. 

> 
> 
>         Hosting encrypted DNS resolvers even in case of split-VPN
>         configuration minimizes the attack vector (e.g., a
> compromised
>         network device cannot monitor/modify DNS traffic).
> 
> I think "minimizes" should be changed to "can minimize". For
> example, if the
> encrypted DNS is hosted on the VPN server itself, the above claim
> is not true.
> 

[Med] Changed. 

> 
>         In this example, the initiator uses the ENCDNS_DIGEST_INFO
>         attribute to indicate that the encrypted DNS client
> supports
>         SHA2-256 (2), SHA2-384 (3), and SHA2-512 (4) hash
> algorithms.
> 
> Can we add "for certificate digests" to this sentence. I was a bit
> confused
> when I read this and saw support for hash algorithms and wondered
> what
> the list of hash algorithms was for again.
> 

[Med] ACK.

> 
>         In this example, no ADN is included ...
> 
> Because this sentence is between two examples, it is really
> confusing as to which
> example it belongs to. how about:
> 
>         In the following example, no ADN is included ...
> 
> 

[Med] The sentence refers to the previous, not the following example. Added a pointer to avoid confusion. Thanks. 


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.