On Mon, Dec 29, 2014 at 5:22 PM, Brian Dickson
<brian.peter.dick...@gmail.com> wrote:
> I'm a big fan of this.
>
> These comments are meant to be constructive, and with the goal of improving
> the draft quality and/or quality of the underlying protocol.
>
> And, of course, I speak only for myself.
>
> In no particular order:
>
> - In section 3, it might be good to add a paragraph about the implications
> for HAMMER. Specifically, in addition to pre-fetching records that would
> otherwise expire, it is probably worth probing for the introduction of zone
> cuts where none previously existed (i.e. confirm their continued absence, or
> discover them.)
>
> - Another comment for Section 4 (other advantages), it may be worth
> mentioning improved look-up performance for TLD operators, which offsets the
> loss of query data. A 2-label QNAME query is optimal for finding the
> delegation owner name in a delegation-only TLD.
>
> - Another thing to possibly call out is the behavior of some name servers
> when the QNAME is an Empty Non-Terminal, e.g. a non-zone-cut with a child,
> but no RRs at the owner name. I seem to recall something along those lines
> but don't recall details, e.g. which software, version, etc., has this
> issue.
>
> Hope this is helpful.

... and below are some nits. I'd originally sent them off-list
(because they were just minor) but it was requested that I send them
onlist, so...


------

Below are some nits for draft-ietf-dnsop-qname-minimisation.

They are in Original, Proposed, Comment format.
Feel free to accept, reject or ignore them :-)

They were minor enough that I didn't try edit them in GitHub.

W

1.  Introduction and background

   The problem statement is exposed in
   [I-D.bortzmeyer-dnsop-dns-privacy].  The terminology ("qname",
   "resolver", etc) is also defined in this companion document.  This
   specific solution is not intended to completely solve the problem,
   far from it.  It is better to see it as one tool among a toolbox.
[O] specific solution is not intended to completely solve the problem,
far from it.  It is better to see it as one tool among a toolbox.
[P] specific solution is not intended to fully solve the problem;
instead, it should be viewed as one tool amongst many.

   It follows the principle explained in section 6.1 of [RFC6973]: the
   less data you send out, the less privacy problems you'll get.

2.  Qname minimisation

   The idea is to minimise the amount of data sent from the DNS
   resolver.  When a resolver receives the query "What is the AAAA
   record for www.example.com?", it sends to the root (assuming a cold
   resolver, whose cache is empty) the very same question.  Sending
   "What are the NS records for .com?"  would be sufficient (since it
   will be the answer from the root anyway).  To do so would be
   compatible with the current DNS system and therefore could be easily
   deployable, since it is an unilateral change to the resolvers.

   If "minimisation" is too long, you can write it "m12n".




Bortzmeyer               Expires April 25, 2015                 [Page 2]
Internet-Draft             Qname minimisation               October 2014


   To do such minimisation, the resolver needs to know the zone cut
   [RFC2181].  There is not a zone cut at every label boundary.  If we
[O] There is not a zone cut at every label boundary.
[P] Zone cuts do not necessarily exist at every label boundary.
[R] Readability
   take the name www.foo.bar.example, it is possible that there is a
   zone cut between "foo" and "bar" but not between "bar" and "example".
   So, assuming the resolver already knows the name servers of .example,
   when it receives the query "What is the AAAA record of
   www.foo.bar.example", it does not always know if the request should
   be sent to the name servers of bar.example or to those of example.
   [RFC2181] suggests a method to find the zone cut (section 6), so
   resolvers may try it.

   Note that DNSSEC-validating resolvers already have access to this
   information, since they have to find the zone cut (the DNSKEY record
   set is just below, the DS record set just above).

   It can be noted that minimising the amount of data sent also
   partially addresses the case of a wire sniffer, not just the case of
   privacy invasion by the servers.

[O]  It can be noted that minimising the amount of data sent also
   partially addresses the case of a wire sniffer, not just the case of
   privacy invasion by the servers.
[P] Minimising the amount of data sent also, in part, addresses the
case of a wire sniffer as well the case of privacy invasion by the
servers.
[R] Readability.


   One should note that the behaviour suggested here (minimising the
   amount of data sent in qnames) is NOT forbidden by the [RFC1034]
   (section 5.3.3) or [RFC1035] (section 7.2).  Sending the full qname
   to the authoritative name server is a tradition, not a protocol
   requirment.

3.  Operational considerations

   The administrators of the forwarders, and of the authoritative name
   servers, will get less data, which will reduce the utility of the
   statistics they can produce (such as the percentage of the various
   qtypes).  On the other hand, it will decrease their legal
   responsability, in many cases.

[O] responsability
[P] responsibility
[R] spelling
   Some broken name servers do not react properly to qtype=NS requests.
   As an example of today, look at www.ratp.fr (not ratp.fr), which is
   delegated to two name servers that reply properly to "A www.ratp.fr"
   queries but send REFUSED to queries "NS www.ratp.fr".  This behaviour
   is a gross protocol violation and there is no need to stop improving
   the DNS because of such brokenness.  However, qname minimisation may
[O] This behaviour is a gross protocol violation and there is no need
to stop improving
   the DNS because of such brokenness.
[P] This behaviour  is a gross protocol violation, and there is no
need to stop improving
   the DNS because of such brokenness.
[R] Added comma before "and" to prevent run on sentence.
   still work with such domains since they are only leaf domains (no
   need to send them NS requests).  Anyway, such setup breaks many
   things (besides qname minimisation), it breaks negative answers as
   the servers don't return the correct SOA.  It also breaks anything
   that depends on NS and SOA records existing at the top of the zone.
[O] Anyway, such setup breaks many
   things (besides qname minimisation), it breaks negative answers as
   the servers don't return the correct SOA.  It also breaks anything
   that depends on NS and SOA records existing at the top of the zone.
[P]Such setup breaks more than just qname minimisation. It breaks
negative answers, since the servers don't return the correct SOA, and
it also breaks anything dependent upon NS and SOA records existing at
the top of the zone.
[R] Grammar and readability



   Another way to deal with such broken name servers would be to try
   with A requests (A being choosen because it is the most common and
[O] choosen
[P] chosen
[R] spelling

   hence the least revealing qtype).  Instead of querying name servers



Bortzmeyer               Expires April 25, 2015                 [Page 3]
Internet-Draft             Qname minimisation               October 2014


   with a query "NS example.com", we could use "A _.example.com" and see
   if we get a referral.

   Other strange and illegal practice may pose a problem: for instance,
[O] practice
[P] practices
   there is a common DNS anti-pattern used by low-end web hosters that
   also do DNS hosting that exploits the fact that the DNS protocol
   (pre-DNSSEC) allows certain serious misconfigurations, such as parent
   and child zones disagreeing on the location of a zone cut.
   Basically, they have a single zone with wildcards like:

  [ SNIP ]

4.  Other advantages

   The main goal of qname minimisation is to improve privacy, by sending
[O] privacy, by sending
[P] privacy by sending
[O] readability; no comma needed
   less data.  However, it may have other advantages.  For instance, if
   a root name server receives a query from some resolver for A.CORP
   followed by B.CORP followed by C.CORP, the result will be three
   NXDOMAINs, since .CORP does not exist in the root zone.  Under query


>
> Brian Dickson
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>



-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to