Thanks Stephane for the review. Please see inline

On Sat, 2 Nov 2024 at 22:59, Stephane Bortzmeyer <bortzmeyer=
40nic...@dmarc.ietf.org> wrote:

> On Sat, Oct 26, 2024 at 10:10:43PM +0200,
>  Benno Overeinder <be...@nlnetlabs.nl> wrote
>  a message of 25 lines which said:
>
> > This initiates the Working Group Last Call (WGLC) for
> > draft-ietf-dnsop-structured-dns-error, "Structured Error Data for
> Filtered
> > DNS."
>
> The draft is very useful (users need to be informed) and I think the
> solution chosen (I-JSON in the EXTRA-TEXT) is reasonable. The draft is
> clear. But there are two issues, one being serious.
>
> The "j" field is in natural language but there is no way to tag it wth
> the language used. (RFC 2277, section 4.2). There is a note "If the
> text is displayed in a language not known to the end user, browser
> extensions to translate to user's native language can be used." which
> is useless (the text will probably be short and therefore detecting
> the langague used will be a challenge; also, there are not only
> browsers in the field). I suggest to delete the sentence and either to
> add a field to tag the language (RFC 5646) or, if it's a too important
> change, add a sentence like "The text will be in natural language,
> chosen by the DNS administrator to match its expected audience".
>

Good point, we updated the draft
https://github.com/ietf-wg-dnsop/draft-ietf-dnsop-structured-dns-error/blob/main/draft-ietf-dnsop-structured-dns-error.md
to address both the comments. "l" field is added to indicate the language
used for the JSON-encoded "j" and "o" fields. The text related to browser
extension is deleted.


>
> Less serious, when discussing the alternative (forged IP address and a
> Web page to explain the censorship), the draft says "If an HTTPS
> enabled domain is blocked, the block page is also served over HTTPS.
> In order to return a block page over HTTPS, man in the middle (MITM)
> is enabled on endpoints by generating a local root certificate and an
> accompanying (local) public/private key pair. " All the arguments in
> the draft against using a Web page to inform the user are for
> HTTPS. But the draft should add that, even with HTTP, this "solution"
> raises a privacy problem: the HTTP server will see the IP address of
> the client and the host name requested. (If you read french, this page
> from the government
> <
> https://www.interieur.gouv.fr/Archives/Archives-des-actualites/2016-Actualites/Redirection-vers-la-page-de-blocage-des-sites-terroristes-pour-les-clients-de-l-operateur-orange
> >
> discusses what happened after a configuration error redirecting many
> users to a governement page accusing them of trying to access
> terrorist resources. The governement claims it requested the deletion
> of the HTTP server logfile. Note that this governement promised years
> ago to not log this data.)
>

Thanks, added the privacy issue of sharing the endpoint IP address and
domain name accessed by the user with the HTTPS server.

Cheers,
-Tiru


>
> _______________________________________________
> DNSOP mailing list -- dnsop@ietf.org
> To unsubscribe send an email to dnsop-le...@ietf.org
>
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to