Re: [dnsext] draft-mohan-dns-query-xml-00.txt

Paul Vixie <vixie@isc.org> Sat, 01 October 2011 17:40 UTC

Return-Path: <dnsext-bounces@ietf.org>
X-Original-To: namedroppers-archive-gleetwall6@lists.ietf.org
Delivered-To: ietfarch-namedroppers-archive-gleetwall6@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D0DFB21F90E3; Sat, 1 Oct 2011 10:40:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1317490813; bh=uTfEA+ep5qJn+PCActPMrMtO9tTg0hwznHM52+XUDzk=; h=From:To:Date:References:In-Reply-To:MIME-Version:Message-Id: Subject:List-Id:List-Unsubscribe:List-Archive:List-Post:List-Help: List-Subscribe:Content-Type:Content-Transfer-Encoding:Sender; b=wMi9NRaHF3qyYaP0P1dVZowp1wdbIcvaB378hMohBQCTmS3ABU7Qs/AuLUGHn+uZK kzy4FNOGugiB+WRo3j87X65/FRK7skbs1yjzEngvf8Ubzel74EYOcZX2AbAHHvDITk 3hWIJ1bJF3IHRb7y0rPahEYua/nmEIlpNo1nxhVE=
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1BBDA21F90E3 for <dnsext@ietfa.amsl.com>; Sat, 1 Oct 2011 10:40:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.525
X-Spam-Level:
X-Spam-Status: No, score=-2.525 tagged_above=-999 required=5 tests=[AWL=0.075, BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x181zC9-PogC for <dnsext@ietfa.amsl.com>; Sat, 1 Oct 2011 10:40:12 -0700 (PDT)
Received: from ss.vix.com (ss.vix.com [IPv6:2001:559:8000:cb::2]) by ietfa.amsl.com (Postfix) with ESMTP id A9EAE21F90E2 for <dnsext@ietf.org>; Sat, 1 Oct 2011 10:40:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at redbarn.org
Received: from ww.vix.com (ww.vix.com [IPv6:2001:559:8000:cb:215:17ff:fed4:730a]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by ss.vix.com (Postfix) with ESMTPS id 06916EE51C for <dnsext@ietf.org>; Sat, 1 Oct 2011 17:43:04 +0000 (UTC) (envelope-from vixie@isc.org)
From: Paul Vixie <vixie@isc.org>
Organization: Internet Systems Consortium
To: dnsext@ietf.org
Date: Sat, 1 Oct 2011 17:43:03 +0000
User-Agent: KMail/1.13.5 (FreeBSD/8.1-RELEASE; KDE/4.4.5; amd64; ; )
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <alpine.DEB.2.00.1110011322430.20645@mail.xelerance.com>
In-Reply-To: <alpine.DEB.2.00.1110011322430.20645@mail.xelerance.com>
MIME-Version: 1.0
Message-Id: <201110011743.03563.vixie@isc.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: dnsext-bounces@ietf.org
Errors-To: dnsext-bounces@ietf.org

On Saturday, October 01, 2011 05:33:29 pm Paul Wouters wrote:
> If you truly think you are addressing the middlebox problem, most likely
> you could just run the DNS over port 54 or 80/443.

no, because all-that-is-not-allowed-is-denied for most firewalls.  random udp 
ports especially low numbered ones just don't work in a lot of places.  it's 
not that UDP/53 is special by being middleboxed, it's that UDP/53 is special 
by being allowed to work at all (where "work" and "middlebox" are at odds.)

> ... (with 80/443 having a slightly better chance then a random port.

indeed, 80 and 443 are often cleaner.  especially 443 with private keys (no 
CA).  especially if the request is a POST.

> Doing DNS-over-HTTP is still going to get broken results in captive
> portals.

alas, you are right, there is no universal way to get our packets through, 
since just about everybody between the dns requestor and the dns responder 
wants a piece of the action these days, or thinks they know better, or both.  
however, TCP/80 and TCP/443 are "the RS232 of the new millenium" and i expect 
good results on average from making these available as a fallback to the long 
corrupted UDP/53 and TCP/53.

> Doing dns-over-http for broken middlewhere alone is going to be a partial
> solution that is not going to be very useful on its own.

right, agreed, but the things it will work better alongside are also useful in 
their own right, like "send me the trust chain from the QNAME back to the 
deepest trust anchor i've currently validated".  therefore that proposal is 
going to come separately.

paul
_______________________________________________
dnsext mailing list
dnsext@ietf.org
https://www.ietf.org/mailman/listinfo/dnsext