On 6/28/23, 10:24 AM, "Martine Sophie Lenders" <m.lend...@fu-berlin.de> wrote:
Hi Ben,

On 23.06.23 22:23, Ben Schwartz wrote:
> I think it would be helpful if this document were more explicit about
> its motivation.  In my view, the underlying motivation for this draft is
> to enable seamless management of DNS service within a CoAP-centered
> deployment, by sharing key distribution, access controls, monitoring,
> etc.  The draft claims various performance benefits from DoC, but these
> are unproven and seem unlikely to be significant.

We have a paper on the performance benefits just accepted for CoNEXT,
which we will cite once it is published. An early pre-print (the final
paper underwent some major revisions though) is available on arXiv [5].

This paper appears to be focused on DNS performance, but DNS is usually only a 
small component of overall system performance.

BTW, this reminds me that referring to OSCORE as “end-to-end” in this context 
is confusing, since the logical “endpoints” are the stub resolver and the 
authoritative nameserver.

> ...
>
>     For our document, I think we
>     need at least confirmation or decline that the "coap" ALPN could be
>     used
>     for DTLS, SVCB for OSCORE/EDHOC, I think is out of scope at the moment
>     anyways.
>
> I'm not sure I follow, but using the same ALPN for multiple transports
> renders that ALPN permanently incompatible with SVCB.  I recommend
> keeping "coap" for TLS/TCP only, and defining a new ALPN ID for CoAP/DTLS.

That makes things clearer for us. In the next version we will word the
draft in accordance to that: only the "coap" is ALPN for TLS/TCP is
available at the moment. For DTLS and OSCORE alternative approaches need
to be created (see [1] and [2] in my original mail) which are, however,
out of scope of the DoC document, in my opinion.

That’s fine with me.

>     Furthermore, there is still an open question, if DoC can or should be
>     translated at a CoAP-HTTP proxy to DoH. Namely, how the FETCH that DoC
>     uses should be translated into the POST/GET of DoH [3].
>
> I don't think there is any need to specify this.  A DoC server could act
> as a forwarder to an upstream using DoH, DoQ, etc. in accordance with
> the relevant standards, without impacting its compliance as a DoC server.
>
> However, this does resemble a concern I've previously raised: the draft
> does not explain why it is necessary to define a new DoC mechanism,
> rather than simply forwarding RFC 8484 DoH through a CoAP-HTTP proxy.

This question was raised in reaction to your concern, actually. Note,
that if a proxy is used, the target resource needs to be mentioned in
the CoAP header, increasing the overall packet size, so a proxy should
be kept optional. Forwarding DoH through a C-H-proxy would make the
proxy mandatory. In addition, DoC is greatly benefiting from its usage
of the CoAP-only FETCH method (see [5]).

I think this explanation should be included in the draft.

The question is more a CoRE question, I think. RFC 8132 does not really
specify, how FETCH should be translated via a C-H-proxy, so I assume it
to be use-case dependent. Should the draft specify this for the DoC use
case, and if yes which method should be used, or should the DoC server
just act as a recursive resolver, using DoH towards the DNS infrastructure?

The DNS protocol is role-independent, so a DoC server could (in principle) be a 
recursive resolver, a forwarder, or an authoritative nameserver.  If it is a 
forwarder, it could use DoH, DoC, or any other transport of its choice to reach 
its upstream resolver.

Best
Martine

[5] https://arxiv.org/abs/2207.07486

_______________________________________________
dns-privacy mailing list
dns-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to