On Wed, Feb 27, 2019 at 5:24 PM Stephen Farrell <stephen.farr...@cs.tcd.ie>
wrote:

>
> Hiya,
>
> First, I think both are wrong:-)
>
> If there are really different ESNI private value holders,
> then each of those should provide separate ESNIKeys RR value
> instances


Yes, this is the idea


and the set of all of those should be in the RRset
> returned when the ESNIKeys are queried.
>

I think you're misunderstanding the scenario here: we have two CDNs A and
B, and some switching service in front, so that when you lookup example.com,
you get a CNAME to A or B, and then you get the ESNIKeySet for A or B as
the case may be. So you're not going to get both ESNIKeys values.



> Requiring different private value holders to find some
> entity to wrap up all their crap into one single TLS blob
> is not, IMO, a good design.
>

That's not the way this works.




> On 27/02/2019 16:18, Christopher Wood wrote:
> > Hi folks,
> >
> > Below are two PRs that seek to address the multi-CDN issue discussed
> > on this list and in meetings:
> >
> >    1. https://github.com/tlswg/draft-ietf-tls-esni/pull/136
> >    2. https://github.com/tlswg/draft-ietf-tls-esni/pull/137
>
> I'm not sure of the details of #137 but I think I prefer
> that one a bit. I suspect either of them will be a pain to
> code given how we'll be mixing names and addresses.
>
> #136 seems broken to me in that it gives the new AddressSet
> invention priority over A/AAAA resolution. I think that'd
> need much more justification as it essentially calls for
> duplicating A/AAAA information over two administrative
> domains which seems like a recipe for failure.
>

This is not correct for the reasons I indicated above. What happens is that
the terminal CDN is responsible for publishing a record with its keys and
its A/AAAA values. Indeed, the source of the problem we are trying to solve
is that you might in successive resolutions get the CNAME for A and B, thus
having a keys/A mismatch.




>
> My reason for preferring #137 is that (if I'm reading it
> right, and I'm not sure!), it resolves a CNAME and then
> compares the resulting A/AAAA acquired via normal CNAME
> chasing to a mask from the ESNIKeys stuff. I think that
> is a better approach than replicating A/AAAA values inside
> a novel repetitive structure like ESNIKeys.
>
> Lastly, we will need to fix the TLS-developer-friendly
> but DNS-admin-unfriendly ESNIKeys structure,


[Citation needed]



IMO the way to do
> that is for each ESNI private value holder's stuff to be
> a separate RR value in the RRset (and so each is likely a
> separate stanza in a zone file).


This seems to rest on the same misunderstanding of the scenario in question.

-Ekr


So in summary:
>
> - both are wrong:-)
> - if I had to pick one to proceed with temporarily,
>   I'd go with #137 despite it being unclear
> - I'd rather we fix the ESNIKeys to be DNS friendly
>   now too and not wait to have to inevitably fight
>   that battle later (but fight I will:-)
>
> Cheers,
> S.
>
> >
> > #136 implements the combined or stapled record approach discussed
> > several times, most recently in [1]. It includes these via an ESNIKeys
> > extension. #137 builds on this design with a mechanism that lets
> > clients detect and recover from A/AAAA and ESNI mismatch (if desired).
> > It is certainly more complex in several respects. A third variant,
> > which is not (yet) in PR form, is a simplification of #137 wherein
> > ESNIKeys addresses are only used as filters, instead of filters *or*
> > complete addresses.
> >
> > We are asking for feedback on these PRs, as we would like to merge one
> > of them for the next draft version. As #136 is simpler and permits
> > extensibility, that is the current preference.
> >
> > Thanks in advance for your feedback.
> >
> > Best,
> > Chris (no hat, on behalf of the authors)
> >
> > [1]
> https://mailarchive.ietf.org/arch/msg/tls/WXrPgaIsIPItDw3IQthmJk9VRlw
> >
> > _______________________________________________
> > TLS mailing list
> > TLS@ietf.org
> > https://www.ietf.org/mailman/listinfo/tls
> >
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to