Thank you very much for your detailed and thoughtful review of the draft,
and for sharing valuable insights from the ISP deployment perspective. We
would like to clarify that the scope of this draft is not limited to
enterprise networks. It is designed to support structured error response
signaling across a wide range of deployment scenarios, including home
networks, BYOD use in enterprise networks, and mobile networks. The
examples provided in the draft are intended to be illustrative.

We have already received similar feedback and are working to update the
document to explicitly include EDE Code 16 (Censored) alongside Blocked,
Filtered, and Forged Answer. Fields such as j, c, o, and l can be conveyed
along with EDE 16. We are being careful not to expand sub-error codes
beyond this scope at this time, as there is currently no WG consensus on
doing so, and the IETF does not endorse censorship policies. The purpose of
this mechanism is to enable transparency and interoperability, not to
promote any censorship behavior. That said, the draft does include a
provision via registration procedure for adding new sub-error codes
through IETF review, should future consensus support their inclusion.

Regarding localization: the "j" field is intended solely for IT diagnostic
purposes and is not meant for end-user display. Based on WG discussion, we
avoided introducing URLs or arbitrary free-form fields to reduce the risk
of misuse by resolvers.

The rationale behind introducing the new "Blocked by Upstream DNS Server"
EDE is to distinguish filtering performed by local routers (e.g., home or
enterprise gateways) from filtering by upstream recursive resolvers. This
distinction is important in deployments where DNS filtering may occur at
multiple layers. It is worth noting that home routers are increasingly
capable of supporting DoT/DoH, as demonstrated in deployments such as dnsdist
in router environments
<https://blog.open-xchange.com/dnsdist-as-a-router-ready-solution>.

-Tiru

On Mon, 28 Apr 2025 at 04:40, Asbjørn Sloth Tønnesen <a...@fiberby.net>
wrote:

> Hi,
>
> Sorry that I haven't commented earlier, I wasn't aware of this draft until
> recently.
> This review is based on draft-ietf-dnsop-structured-dns-error-14.txt
>
> I work for an ISP in Denmark, and I have previously worked on an EDE
> propagation
> testbed at some of the RIPE/DNS-OARC DNS hackathons: https://ede.dn5.dk/
> (I am happy to add some I-JSON based endpoints as well)
>
> I am currently conducting a survey of how sanctioned domains are blocked
> across
> the EU, and will present my findings in a session at the DNS WG at RIPE90
> in a few weeks, incl. EDE propagation tests and RFC 7725 adoption.
>
> In general the enterprise use-case seams to take up most of this I-D,
> where as
> the ISP use-cases doesn't seams to have studies as closely, and therefore
> seams
> less coherent when read from an ISP's point of view.
>
> In the introduction, in the first paragraph "filtering required by law
> enforcement"
> and "requirement imposed by an external entity" is hinting towards that
> this I-D
> should also be usable with the "EDE code 16 - Censored".
>
> https://datatracker.ietf.org/doc/html/rfc8914#name-extended-dns-error-code-16-
>
> In section 1: "can return extended error codes Blocked, Filtered, or
> Forged Answer"
> and in other places: Why is "Censored" not included? The censored error
> code is
> highly relevant for adoption of this I-D for ISPs.
>
> In controlled enterprise deployments, I assume that Blocked, Filtered and
> Forged is relevant.
> For residential ISP's Blocked, Filtered, Censored and Forged can be
> relevant.
> Blocked if the provider has a mandatory malware/phishing filter.
> Filtered if the provider has a voluntary malware/phishing filter.
> Censored for governmental mandates.
> Forged forged for any of the above, when accompanied by a HTTP-only block
> page.
>
> In Denmark, block pages are expected, and design/content is often a part
> of the blocking order. The governmental agencies like to promote their
> logo's.
> (served with 451 Unavailable For Legal Reasons - RFC 7725).
>
> List of affected domains in Denmark:
> https://www.teleindu.dk/brancheholdninger/blokeringer-pa-nettet/
>
> We would rather send a "Censored" EDE, than "Forged Answer", but
> politically
> it is not so easy to get rid of the HTTP block pages.
>
> There should also be some sub-error codes related to the "Censored" EDE.
> In Denmark, we have the following kinds of censored sites:
>    sanctions (rt.com, etc.), copyright, unlicensed gambling,
>    product safety, security and CP.
>
> Given the use-cases listed in the introduction I think that these
> sub-errors should be included in this I-D, rather than a follow-up.
>
> In section 3, I agree that HTTP block pages are not a good fit in the
> modern
> HTTPS-by-default world, but "certificate validation error" is not
> commonplace.
> But "Connection refused" is since block pages are hosted on a dedicated IP
> where TCP/443 (HTTPS) is greated with an ICMP rejection message.
>
> Section 6 seams thin, considering all the obstacles to deployment.
> It might be easy in a controlled enterprise setup, but for it to work in
> a FTTB ISP setup, with BYOD / regular of-the-shelf home routers, then it
> will require propagation to work. Currently EDE propagation is only
> described
> as a MAY in RFC8914 and I believe that this should be changed to a SHOULD.
> In practice EDE propagation is currently very limited.
>
> I like Mark's proposal to move localization data over to HTTP, as the
> alternative for us would be to try and cram both Danish and English in
> there.
>
> I don't get the need for the new EDE "Blocked by Upstream DNS Server".
> If we have a field with a operator ident, as Mark suggests. Then when a
> request is received over an unencrypted channel, e.g MITM'ed by a dumb home
> router, can be authenticated by the application, by re-attempt the request
> with DoT directly towards the resolver. Requiring the whole chain to be
> encrypted, is not realistic in to be deployed in residential ISP networks
> in
> the near future. I think it would be better to add a field indicating that
> it
> was received over an unencrypted channel, rather than discarding the
> EXTRA-TEXT data.
>
> Lastly, thank you for trying to fix this technological gap, I hope that you
> find some of these ISP / deploy-ability notes useful.
>
> --
> Best regards
> Asbjørn Sloth Tønnesen
> Network Engineer
> Fiberby - AS42541
>
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to