On Jul 5, 2015, at 6:16 PM, Mark Andrews <ma...@isc.org> wrote:
> 
> 
> In message <b3fdac88-1da8-4be3-9d75-115386f7d...@vpnc.org>, Paul Hoffman 
> writes
> :
>> Greetings. This is a WG LC review of draft-ietf-dnsop-cookies, which I had no
>> t looked at carefully in some time. In short: it looks great, the document is
>> complete and easy-to-read, and we probably should have done this nearly a de
>> cade ago when Donald started the work.
>> 
>> Substantial:
>> 
>> In Sections 4.1 and 4.2, it says that the cookies MUST NOT be the same for al
>> l recipients. This should be SHOULD NOT, to match the SHOULDs above. If an im
>> plementation does a stupid and uses the same cookies everywhere, it is no wor
>> se off for it, it just isn't getting as much protection as expected. (If I'm 
>> wrong about that latter bit, then the reason for the MUST NOT should be given
>> in both sections.)
>> 
>> Section 5.4 seems unnecessary and possibly harmful. Why have an additional me
>> ans to detect support other than "ask any question, even one that is going to
>> get a REFUSED or NXDOMAIN answer"? The new mechanism will wreak havoc on too
>> ls that are watching DNS requests, for no real reason. I propose that this se
>> ction be removed, or replaced with a simply "if you want to know whether the 
>> server supports cookies, ask anything".
> 
> "Wreak havoc" is a little bit over dramatic.  If the tools can't
> handle QCOUNT == 0 they are already broken.  This is the Internet
> and the tools should be expecting to get total garbage packets.
> Not sending QCOUNT == 0 won't help them.  QCOUNT == 0 is potentially
> useful for other things.  Existing nameservers mostly return FORMERR
> though Google's nameservers (8.8.8.8) just drop the query despite
> it being a legitimate RFC 103[45] query.  We looked to see if we
> needed a Updates RFC 103[45] and as far as we can tell we don't.

It really doesn't matter if they are "already broken" in your view: what 
matters is creating a protocol that doesn't unnecessarily cause damage to the 
DNS.

> As for sending a random query you then have to deal with all the
> different behaviours for sending a query to a server which is not
> expecting the QNAME on top of discovering if COOKIE is supported.

Why? As I described above, it is fine if the QNAME is nonsense to the server: 
it will still answer with the cookie.

> Additionally this is just the equivalent of syn / syn ack / ack at
> the DNS/UDP level.  I'm yet to extend dig to do this but it is on
> my to do list (dig +get-cookie-first (defaulting on) looks like a
> good option name).  "dig +cookie" will be on by default so that
> broken EDNS option behaviour by servers is made visible and it more
> closely matches what recursive servers supporting COOKIE will do.

It sounds like you want this protocol to purposely cause problems for servers 
that are not implemented the way you want. A less brittle design would not do 
that.

So, I again propose that this part of the new protocol be removed because it is 
unnecessary and possibly harmful.

>> The third paragraph of Section 5.3 gives a new scenario in which TCP SHOULD b
>> e used. Thus, I think this draft updates RFC 5966, and the draft should be ma
>> rked as such, even if it is only for this one important part. Also, this para
>> graph should refer to RFC 5966.
> 
> RFC 5966 has "or for other operational reasons," which covers this.
> Implementations have always been free to sent requests over TCP.
> e.g. netstat has been using TCP rather than UDP for decades.

Good catch. Ignore my request because 5966 already covers it.

--Paul Hoffman
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to