another positive feature of ports in this record is that it provides some
address space independent of the origin security model of the URI. By this
I mean that https://www.foo.com(implicit :443) and https://www.foo.com:555
are different origins with different web security boundaries. While two
different httpssvc records for 443 and 555 (both for  https:// www.foo.com)
are in the same origin.. this level of indirection can be used for A/B
testing or even for encoding load balancing information in a IP constrained
space. Just like the address is distinct from the URL, the port separates
the 'what' from the 'how' and that's good.

On Mon, Mar 9, 2020 at 10:42 PM Erik Nygren <erik+i...@nygren.org> wrote:

> On Mon, Mar 9, 2020 at 10:32 PM Paul Vixie <p...@redbarn.org> wrote:
>
>> On Monday, 9 March 2020 20:56:39 UTC Ben Schwartz wrote:
>> > It occurs to me that I hit "publish" on this draft without updating the
>> > release notes, so I'll mention some of the many changes since -01 here
>> > instead:
>> >
>> >  ...
>> >
>> > As always, please review and send comments.  We also expect to do a
>> > presentation on this draft (remotely) in the DNSOP session.
>>
>> i propose that section 6.2 for "port", and all references to same, be
>> removed.
>>
>
> We discussed this some on one of our authors' calls following
> my seeing you allude to this a few weeks ago.
>
> The rationale for keeping port is that HTTPS is not just about the "web"
> use-case.
> While for Web use-cases it is common for most things to always tcp/443,
> there
> are plenty of non-"Web" use-cases (such as API calls in data centers,
> service meshes, etc.)
> where non-standard ports are commonly used.  I know that Tim keeps
> highlighting
> a desire to make sure we consider these use-cases.
>
> There's a default when port is left out (perhaps that should be clarified
> better?)
> but there are cases when being able to switch to an alternate port has
> value.
> Another case where this applies is QUIC/UDP where udp/443 is commonly
> used but where operators may wish to situationally use different ports.
>
> Adding a warning that the use of non-default ports could have
> operational challenges might be warranted.  (There are also
> some confused deputy risks around non-default ports for servers
> that don't validate the port in the Host header, but others convinced
> me that that's a problem for another day.)
>
> A closely related issue is this one:
>
> https://github.com/MikeBishop/dns-alt-svc/issues/111
>
> (regarding clarifying the default port.)
>
> Does this help address the concern?
> It's helpful to know the historical context.
>
>        Erik
>
>
>
>
>
>
>> this is:
>>
>> ---
>>
>> 6.2.  "port"
>>
>>    The "port" SvcParamKey defines the TCP or UDP port that should be
>>    used to contact this alternative service.
>>
>>    The presentation format of the SvcParamValue is a numeric value
>>    between 0 and 65535 inclusive.  Any other values (e.g. the empty
>>    value) are syntax errors.
>>
>>    The wire format of the SvcParamValue is the corresponding 2 octet
>>    numeric value in network byte order.
>>
>> ===
>>
>> in the SRV RR (from RFC 2782) we specified a port number as part of the
>> RData
>> because a client would otherwise have to have an up-to-date /etc/services
>> file
>> (or local equivalent) to know what (TCP) port number a listener would
>> listen
>> on, and this seemed archaic.
>>
>> for HTTPSSVC and SVCB, the service is a constant (HTTPS) and its
>> transport
>> layer port number (443) is known. inviting listener operators to specify
>> a
>> different port number will result in unpredictable (other than
>> wide-spread)
>> failures for those accessors behind NAT, firewalls, or ALG's.
>>
>> please leave out this legacy from DNS SRV as you go forward with HTTPSSVC.
>>
>> --
>> Paul
>>
>>
>> _______________________________________________
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop
>>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to