On Tue, 18 May 2021, Ben Schwartz wrote:

That's essentially correct.  A client that only supports the default ALPN has no use for 
the "alpn" SvcParam.

Does the "default ALPN" mean "no support for the ALPN extension" ? Or
does it mean "Supports ALPN with the default XXXX" ? If so, what is
XXXX?

My point is that SVCB mappings are IETF documents, complete with guidance, 
normative language, deviations, exceptions,
etc.  The summary table in Appendix B is non-normative, and not connected to 
IANA in any way.  There is no registry of
mappings.

This really looks like you are creating an IANA registry for keywords
used within SVCB records.

Here is the same pair of records, using the two different encoding schemes:
;; pool HTTPS 1 h3pool alpn=h2,h3 ech="123..."

Why wouldn't this use:

        pool HTTPS 1 h3pool alpn="h2,h3" ech="123..."

or:

        pool HTTPS 1 h3pool alpn="h2,h3", ech="123..."

It is a little strange to me that some values are within quotes are
others are not. That really makes parsing (the presentation format)
harder.

It also creates significant complexity for any future value that takes the form 
of an ordered list.

Security protocols are usually in the form of the initiator represents a
list (in whatever order) and the responder decides which it picks and
prefers from that set and uses that. Putting ordered lists in seems like
something the client in this case would mostly ignore as they will just
pretend not to support that is ordered at a higher preference in a list
in the DNS record?

But I did indicate already before that this RRtype is basically a
"security TXT" free flow record and it will surely lead to issues, yet
it seems unstoppable at this point anyway because of the milliseconds
for the advertisement auction gods.

I did a quick test implementation, and the wire overhead was not a substantial 
increase, about 40%. 

This seems like a considerable increase for a high-traffic record type.

Well, you basically build a security protocol demultiplexer server HELLO
record that's not protected by a Finished message, whose protection
comes from DNSSEC but the people who want to run this at scale don't
want to do DNSSEC. As long as the message size is well within common
EDNS UDP packet size (with RRSIGs), then I think the size does not
matter.

Paul

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to