Hi Duane!

> -----Original Message-----
> From: iesg <iesg-boun...@ietf.org> On Behalf Of Wessels, Duane
> Sent: Thursday, October 28, 2021 5:58 PM
> To: Roman Danyliw <r...@cert.org>
> Cc: draft-ietf-dnsop-dns-tcp-requireme...@ietf.org; dnsop@ietf.org; Suzanne
> Woolf <suzworldw...@gmail.com>; dnsop-cha...@ietf.org; The IESG
> <i...@ietf.org>
> Subject: Re: Roman Danyliw's Discuss on draft-ietf-dnsop-dns-tcp-
> requirements-13: (with DISCUSS and COMMENT)
> 
> Hi Roman, thanks for the review.  My responses are inline.
> 
> > On Oct 25, 2021, at 3:02 PM, Roman Danyliw via Datatracker
> <nore...@ietf.org> wrote:
> >
> >
> >
> > ----------------------------------------------------------------------
> > DISCUSS:
> > ----------------------------------------------------------------------
> >
> > This document has a dedicated section for DNS over TLS, makes a number
> > of configuration recommendations for DoT, and notes it in the Privacy
> > Considerations.  However, there is no mention of DNS over HTTPS (DoH).
> > It seems like DoH should get similar treatment.
> 
> Speaking only for myself, I am reluctant to include DoH in this draft.  I 
> feel that
> TCP and TLS are similar enough that it makes sense to cover both, but DoH is
> quite a bit different.

No argument that DoH is a bit unlike the others.

> If there is a concern that mentioning DoT is unfair and DoH should get equal
> time then I would be in favor of discussing encrypted DNS transports more
> generally, or perhaps even cutting back on encrypted transport references.

I believe that if this draft is going to be the BCP to discuss DNS over TCP, 
all of the flavors of DNS over TCP need to be covered.  I think it would be a 
disservice to the existing guidance to cut out discussion of encrypted 
transport.  As you propose, I don't see a reason why the different encrypted 
transports couldn't be discussed together.  I leave it to the deep expertise in 
the WG to ensure that nuances between DoT and DoH, when relevant, are called 
out.

> But if Im in the minority here and the working group and IESG would like to 
> see
> DoH included then we can figure out what to say.
> 
> >
> >
> > ----------------------------------------------------------------------
> > COMMENT:
> > ----------------------------------------------------------------------
> >
> > Thank you to Alan DeKok for the SECDIR review.
> >
> > ** Section 2.2.
> >   Yet, defying some expectations, DNS over TCP remained little-used in
> >   real traffic across the Internet around this time.
> >
> > This section doesn’t define a time period to associate with “… around
> > this time”.
> 
> Does “…in the late 1990s” work for you?

Yes, thanks.

> 
> >
> > ** Section 2.2.
> >   Around the time
> >   DNSSEC was first defined, another new feature helped solidify UDP
> >   transport dominance for message transactions.
> >
> > Is that “new feature” EDNS(0) per Section 2.3?
> 
> Yes, its a lead-in to the next section.  Do you think the text needs to be
> different here?

No, you can leave the text as is.

> >
> > ** Section 2.5
> >   Today, the majority of the DNS community expects, or at least has a
> >   desire, to see DNS over TCP transactions occur without interference.
> >
> > Is there a citation for this assertion?
> 
> How about the 2020 DNS flag day?  Https://dnsflagday.net/2020/

Works for me.

> > ** Section 2.5.  Per the use of [CHES94] and [DJBDNS] to motivate the
> > position that DNS over TCP is not needed, are there more modern
> > references?  The former is from 1994, and the latter appears to be last
> updated in 2002.
> 
> I’m not aware of any newer, better references.  It does show how long held
> these beliefs are.

No problem.  I wanted to check.

> >
> > ** Section 3.
> >   Lastly, Section 1 of [RFC1536] is updated to eliminate the
> >   misconception that TCP is only useful for zone transfers.
> >
> > With what text is Section 1 of [RFC1536] updated?
> 
> I suppose my suggestion would be to strike this sentence:
> 
>    UDP is, therefore, the chosen protocol for communication
>    though TCP is used for zone transfers.
> 
> Later in section 1 there is a "Since UDP is used," which could be changed to
> "When UDP is used," if necessary.

Could you make it cleared exactly what is the old and new text relative to 
RFC1536.

> 
> >
> > ** Section 4.1.  Consider adding a reference of SYN cookies.
> 
> I added a reference to https://en.wikipedia.org/wiki/SYN_cookies

I would recommend using Section 3.6 of RFC4987 instead.

Everything else below looks good.  Thanks.

Regards,
Roman

> >
> > ** Section 5.1.  Does the term “DNS Wedgie” have to be used here given
> > its use in American English as the name for a bullying practice?
> > Judging from a google search
> > (https://www.google.com/search?q="dns+wedgie";), this document appears
> to be inventing the term in the context of DNS.
> 
> I’d like my coauthor John to chime in on this.
> 
> >
> > ** Section 6.  Per “Furthermore, as with real TCP, …”, what is “real TCP”?
> 
> Removed “as with real TCP”
> 
> 
> >
> > ** Section 9.
> >   Because TCP is somewhat more complex than UDP, some characteristics
> >   of a TCP conversation may enable fingerprinting and tracking that is
> >   not possible with UDP.
> >
> > Recommend being clearer on who is being fingerprinted –
> > s/fingerprinting/DNS client fingerprinting/
> 
> Done.
> 
> 
> >
> > ** Section 9.  The text “DNS over TLS or DTLS is the recommended way
> > to achieve DNS privacy” seems rather soft on recommending encrypted DNS
> of any flavor.
> > Was there any WG conversation to same something stronger?
> 
> I do not recall any discussions like that, especially that werent 
> incorporated into
> the draft.
> 
> IMO making (stronger) recommendations about DNS privacy is starting to stray
> from the purpose of this draft.
> 
> 
> 
> >
> > ** Section 9.  The text mentions that TCP is more susceptible to
> > fingerprinting.  It would be also be worth mentioned that using DoH
> > reduces susceptibility to traffic analysis.
> 
> 
> This is tied to your DISCUSS point above.
> 
> DW
> 

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to