On Fri, Sep 18, 2020 at 03:51:11PM +0300, Valery Smyslov wrote:
> Hi Paul,
> 
> > Why is this using a seperate CP payload type per encrypted DNS type?
> > This means that for a DNS server supporting DoT, DoH and DoQ, it needs
> > to send 3 separate payloads. Why not send 1 CP payload that contains a
> > bitmask specifying which services it supports?
> 
> Well, from my understanding of ADD (I'm not an expert),
> there must not be substantial difference between different
> types of encrypted DNS servers in terms of provided service
> (ADD folks use term "equivalent" reolvers, emphasizing 
> that no matter which resolver the client reaches the 
> response will be the same). 
> 
> If my understanding is correct, then I see little sense in 
> configuring all types of encrypted DNS servers.
> So, DoT, DoH, DoQ is more a capability negotiation:
> the client asks for those types of encrypted DNS
> it supports and the server returns server(s) of one type,
> based on its configuration.

I would expect there to be some people pushing to have this be a capability
negotiation that honors the client's preference, not the server's; the
scenario you describe is one where the server's preference is used.
(To be fair, I'm not following ADD much at all, though, so I could be
wrong.)

-Ben

> In this case there is no difference in message size if we use 
> separate attributes or a single attribute with bitmask.
> And several simple attributes are a bit easier to process...
> 
> > The only reason I can think of for this choice is because these might
> > be running on non-standard ports, but I think that reason is rather
> > weak. DoT and DoQ will run on standard defines ports and DoH's protocol
> > aims at blending in as web traffic so it really is only getting deployed
> > on port 443.
> > 
> > So if I build a single server that can do unencrypted and all encrypted
> > flavours, I'd prefer to send and receive just 1 CP payload covering
> > everything.
> 
> Please, see above.
> 
> > We _could_ leave the port there for non-standard ports, but then we
> > should add a specific port attribute for each bitmask entry. But honestly,
> > the whole non-default port part seems like overengineering.
> > 
> > For those who care a lot about minimizing bytes exchanged over IKE,
> > my above proposal would save a lot of bytes.
> 
> Again, see above.
> 
> > I would also like to see more clarification about split-DNS and how a
> > list of domains is conveyed via IKE as the only domains to be resolved
> > via the given encrypted DNS servers.
> 
> What problems are with the current text? I believe almost all from RFC8598
> remains valid, we only replace Do53 servers IP addresses with Encrypted 
> DNS ones.
> 
> > I would like to see something in the Security Considerations about handing
> > out well known non-VPN reachable encrypted DNS servers.  Eg I'd like to
> > avoid that this document can instruct VPN users to use DoT at 8.8.8.8 if
> > it is not going to offer a VPN that covers 8.8.8.8. If we don't do this,
> > then VPN profiles might end up abusing/redirecting users without offering
> > any actual VPN service - like overriding the system or application
> > specific configuration without offering actual VPN servers to the user.
> 
> What is your proposal? Restrict DNS servers IP addresses 
> to always be within Tri/TSr ranges?
> 
> > I'm also considered about possive abuse by the specification of the
> > authentication domain name. Eg a VPN provider setting up a tunnel
> > covering 1.1.1.1 (dns.cloudflare.com) with an authentication name of
> > "dns.google.com" and basically redirecting all 1.1.1.1 traffic over the
> > VPN to 8.8.8.8.
> 
> How can you prevent it?
> 
> Regards,
> Valery.
> 
> > Paul
> > 
> > 
> > 
> > 
> > > Please review and share your comments.
> > >
> > > Thank you.
> > >
> > > Cheers,
> > > Med
> > >
> > > -----Message d'origine-----
> > > De : internet-dra...@ietf.org [mailto:internet-dra...@ietf.org]
> > > Envoyé : mercredi 9 septembre 2020 14:03
> > > À : Dan Wing <dwing-i...@fuggles.com>; Valery Smyslov <s...@elvis.ru>; 
> > > BOUCADAIR Mohamed TGI/OLN
> > <mohamed.boucad...@orange.com>; Tirumaleswar Reddy.K 
> > <tirumaleswarreddy_ko...@mcafee.com>;
> > Tirumaleswar Reddy <tirumaleswarreddy_ko...@mcafee.com>
> > > Objet : New Version Notification for draft-btw-add-ipsecme-ike-01.txt
> > >
> > >
> > > A new version of I-D, draft-btw-add-ipsecme-ike-01.txt has been 
> > > successfully submitted by Mohamed
> > Boucadair and posted to the IETF repository.
> > >
> > > Name:             draft-btw-add-ipsecme-ike
> > > Revision: 01
> > > Title:            Internet Key Exchange Protocol Version 2 (IKEv2) 
> > > Configuration for Encrypted DNS
> > > Document date:    2020-09-09
> > > Group:            Individual Submission
> > > Pages:            11
> > > URL:            https://www.ietf.org/id/draft-btw-add-ipsecme-ike-01.txt
> > > Status:         
> > > https://datatracker.ietf.org/doc/draft-btw-add-ipsecme-ike/
> > > Htmlized:       
> > > https://datatracker.ietf.org/doc/html/draft-btw-add-ipsecme-ike
> > > Htmlized:       https://tools.ietf.org/html/draft-btw-add-ipsecme-ike-01
> > > Diff:           
> > > https://www.ietf.org/rfcdiff?url2=draft-btw-add-ipsecme-ike-01
> > >
> > > Abstract:
> > >   This document specifies a new Internet Key Exchange Protocol Version
> > >   2 (IKEv2) Configuration Payload Attribute Types for encrypted DNS
> > >   with a focus on DNS-over-HTTPS (DoH), DNS-over-TLS (DoT), and DNS-
> > >   over-QUIC (DoQ).
> > >
> > >
> > >
> > >
> > > Please note that it may take a couple of minutes from the time of 
> > > submission until the htmlized version and
> > diff are available at tools.ietf.org.
> > >
> > > The IETF Secretariat
> > >
> > >
> > >
> > >
> > ____________________________________________________________________________________________
> > _____________________________
> > >
> > > Ce message et ses pieces jointes peuvent contenir des informations 
> > > confidentielles ou privilegiees et ne
> > doivent donc
> > > pas etre diffuses, exploites ou copies sans autorisation. Si vous avez 
> > > recu ce message par erreur, veuillez le
> > signaler
> > > a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
> > > electroniques etant susceptibles
> > d'alteration,
> > > Orange decline toute responsabilite si ce message a ete altere, deforme 
> > > ou falsifie. Merci.
> > >
> > > This message and its attachments may contain confidential or privileged 
> > > information that may be protected
> > by law;
> > > they should not be distributed, used or copied without authorisation.
> > > If you have received this email in error, please notify the sender and 
> > > delete this message and its
> > attachments.
> > > As emails may be altered, Orange is not liable for messages that have 
> > > been modified, changed or falsified.
> > > Thank you.
> > >
> > > _______________________________________________
> > > IPsec mailing list
> > > IPsec@ietf.org
> > > https://www.ietf.org/mailman/listinfo/ipsec
> > 
> > _______________________________________________
> > IPsec mailing list
> > IPsec@ietf.org
> > https://www.ietf.org/mailman/listinfo/ipsec
> 
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to