I think it would be helpful if this document were more explicit about its 
motivation.  In my view, the underlying motivation for this draft is to enable 
seamless management of DNS service within a CoAP-centered deployment, by 
sharing key distribution, access controls, monitoring, etc.  The draft claims 
various performance benefits from DoC, but these are unproven and seem unlikely 
to be significant.
...
For our document, I think we
need at least confirmation or decline that the "coap" ALPN could be used
for DTLS, SVCB for OSCORE/EDHOC, I think is out of scope at the moment
anyways.
I'm not sure I follow, but using the same ALPN for multiple transports renders 
that ALPN permanently incompatible with SVCB.  I recommend keeping "coap" for 
TLS/TCP only, and defining a new ALPN ID for CoAP/DTLS.
Furthermore, there is still an open question, if DoC can or should be
translated at a CoAP-HTTP proxy to DoH. Namely, how the FETCH that DoC
uses should be translated into the POST/GET of DoH [3].
I don't think there is any need to specify this.  A DoC server could act as a 
forwarder to an upstream using DoH, DoQ, etc. in accordance with the relevant 
standards, without impacting its compliance as a DoC server.

However, this does resemble a concern I've previously raised: the draft does 
not explain why it is necessary to define a new DoC mechanism, rather than 
simply forwarding RFC 8484 DoH through a CoAP-HTTP proxy.
_______________________________________________
dns-privacy mailing list
dns-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to