On Thu, Feb 28, 2019 at 2:50 AM Stephen Farrell <stephen.farr...@cs.tcd.ie> wrote:
> > Hiya, > > On 28/02/2019 02:40, Eric Rescorla wrote: > > On Wed, Feb 27, 2019 at 5:56 PM Stephen Farrell < > stephen.farr...@cs.tcd.ie> > > wrote: > > > >> > >> Hiya, > >> > >> On 28/02/2019 01:41, Eric Rescorla wrote: > >>> I think you're misunderstanding the scenario here: we have two CDNs A > and > >>> B, and some switching service in front, so that when you lookup > >> example.com, > >>> you get a CNAME to A or B, and then you get the ESNIKeySet > >> > >> (ESNIKeySet is a type you've just invented I guess?) > >> > > > > No. I forgot it was named ESNIKeys > > > > Phew:-) > > >>> for A or B as > >>> the case may be. So you're not going to get both ESNIKeys values. > >> > >> Yes, that's not the model I had in mind. I don't recall that having > >> been written down but maybe I missed it. (Where should I look?) > >> > > > > I believe this was discussed in Bangkok during the discussion of problems > > with the current structure. > > FWIW, I didn't take from that discussion that we only want > that model to be supported, but it may have passed me by > if that was stated. > No, it's merely the most challenging. > >> The model I had in mind was where the hidden site has it's own DNS > >> operator but >1 CDN/front-site with each of those having a private > >> ESNI value. (And if there's some front-end DNS cleverness, it'd > >> kick in when the CNAME from #137 is being chased down.) > >> > > > > I don't see how this is conflicts with what I said above, as that server > > still needs to ensure consistency. > > I don't think mine conflicts with the model you describe, > but I do think it has different consequences for how we > ought structure the ESNIKeys stuff. > > To be more specific, say in my model I have example.com > and want to see ESNI used for www.example.com and I > publish the zone for example.com including ESNIKeys. > > Now I want browsers to be able to use either cdn1.example > or cdn2.example to front for www.example.com where those > are independent CDNs. > > So I need to update my DNS zone periodically whenever > one or other CDN changes their ESNI public key share. > In my tiny little case doing this for a few domains, I > already have a small infrastructure that allows me to > do that kind of thing because of the need for regular > DNSSEC re-signing. (Mine currently works at a weekly > or daily cadence, but doing it hourly would be fine.) > > I'd like to do that via a simple update to my zone files > without having to unpack and re-pack the data structures > I get from cdn1 or cdn2. Now sure, I could write a new > tool to munge together what I get from the CDNs but > that's more work (that could go wrong) and doesn't match > my current work flows. And I suspect others may operate > similarly. > The vast majority of people have someone else manage their DNS, so I'm sure some others do, but I doubt many. > That's what leads me to think that we'd be better off > to have multi-valued answers when a browser looks up > the RRset at _esni.www.example.com with each separate > value matching one ESNI public share (or one CDN, > though I'd argue for one share per zone file stanza). > I don't really understand your point, because this *is* the expected design. > >> PS: I nonetheless maintain my points about the current ESNIKeys > >> structure - it's over generic and over complex and these PRs can > >> only make that worse:-) > >> > > > > Yes, I am aware this is your opinion, but I don't agree. > Fair enough:-) Personally I think that if we support > the kind of model above, such simplifications may well > naturally fall out of that work but we'll see I guess. > For example, I think that'd allow re-structuring the > ESNIKeys thing so the host_pointer in #137 no longer > needs to be an extension and hence we don't need the > concept of mandatory/critical extensions at all. > Well, obviously if you bake all the functionality into the record from the start, you won't need extensions, mandatory or otherwise. But I don't think this piece of functionality is well enough understood to tdo that with. -Ekr > Cheers, > S. > > > > > > > -Ekr > > >
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls