On Fri, Aug 26, 2022 at 11:54 AM Tommy Pauly <tpauly= 40apple....@dmarc.ietf.org> wrote:
> > > On Aug 26, 2022, at 4:29 AM, Ben Schwartz <bemasc= > 40google....@dmarc.ietf.org> wrote: > > > > > On Thu, Aug 25, 2022 at 7:19 PM Viktor Dukhovni <ietf-d...@dukhovni.org> > wrote: > >> On Thu, Aug 25, 2022 at 04:35:39PM -0400, Ben Schwartz wrote: >> >> > Relatedly, the results presented by EKR [1] at the most recent DNSOP >> > meeting measure that 6.5% of Firefox users are unable to retrieve HTTPS >> > records through their local resolver. To me, this implies that >> functional >> > origin endpoints are likely to be required even if client software gains >> > SVCB/HTTPS support. >> >> This is why my suggested client behaviour was cognisant of this >> impediment. >> >> - If the client's *initial* SVCB lookup succeeds, *then* fallback is >> no longer an option. >> >> - If initial SVCB resolution fails (SERVFAIL, timeout, ...) >> then the client behaves as though the SVCB record does not exist. >> >> This results in more predictable behaviour, without optimising for >> failure. > > > I don't think "more predictable" is really a desirable or achievable > outcome in this case. Sophisticated clients (e.g. web browsers for HTTP, > iterative resolvers for DNS) tend to develop highly tuned heuristics and > state machines in pursuit of performance and reliability within their > particular constraints. I think an instruction not to fall back in this > case would likely be ignored. > > > I definitely agree with all the points that Ben is making here and > elsewhere. The practical realities of dealing with new record types, and > the evolving heuristics on clients, will determine how the records are > used. > > It makes sense for informational documents to talk about techniques and > best practices—like an updated Happy Eyeballs algorithm to include SVCB > logic, but that shouldn’t block anything in the base specification or add > overly restrictive requirements today. > > Tommy > > I don't disagree with your comment about "overly restrictive requirements".. However, if you can take a look at one of my responses, I go into how/why *fallback is itself an overly restrictive requirement.* This draft, with fallback, asserts/requires that apex A/AAAA records, if they exist, MUST be used to serve the same service and content as the corresponding HTTPS record. This assertion/requirement is also exclusive of other potential SVCB-compatible apex records' potential requirement for their own fallback to A/AAAA records. Legacy support really needs to be stated as a "MAY", explicitly, and zone owners MUST be able to publish A/AAAA records used for other purposes (as indeed they may already be doing.) Legacy support is good, but cannot be a strict requirement for deployment of HTTPS, IMNSHO. (The current draft, with fallback, makes it a strict conditional requirement.) Brian
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop