On 4 Mar 2019, at 19:24, Kazuho Oku wrote:

2019年3月3日(日) 5:57 Eric Rescorla <e...@rtfm.com>:



On Fri, Mar 1, 2019 at 11:03 PM Mike Bishop <mbis...@evequefou.be> wrote:

Totally agree that we want to avoid the extra DNS round-trip as often as possible. However, I see the options in the opposite light – if all you need is #136, then you can put exact addresses into #137 and get the same behavior.


Sure, but if the error rate is too high, then people will just not do ESNI with the non-exact address version, so you've absorbed complexity for nothing.

i'd also like to hear from CDNs about whether their address ranges are really small enough to not make the list of ranges prohobitive.


The question is whether the additional capabilities of #137 are safe and needed. Depending how much later #137 is added, we may wind up needing to support both, which would be… suboptimal.


I actually don't think that's so bad. The complexity of the union of 136 and 137 isn't actually much more than the complexity of 137, especially if the client just omits step 1 of the 137 algorithm (for exact addresses).

I think what will swing the needle on safety – how often there’s divergence – lies in how the record is positioned. Two problems with the current approach that I see:

Correct me if I’m wrong, but I don’t believe the alias is allowed to have subdomains. If www.example.com is a CNAME, then _esni.www.example.com cannot exist, can it? Even presuming that it did, or that it weren’t a subdomain, it would follow its own CNAME chain which might not lead to the correct provider.


My understanding is that there was consensus to remove _esni, just that we didn't get around to it because of this issue.



If, however, the ESNIKeys RRType is resolved by following the CNAME from the host, it depends on how often two queries for two different RRTypes on the same hostname follow different CNAME chains. We have a ready-made way to test that – A and AAAA. I have an idea where we can get some data on that.


Great. I would be interested in seeing that.

FWIW, I am also looking forward to seeing the data, because if the
chances of responses getting out-of-sync is very low (e.g. 0.1%), I
think there's chance we might agree without having neither of #136 or
#137.

We could just use the ESNI key synchronization mechanism that was
introduced in #124 by using IP address-based certificates. That'd have
2 RT penalty (or 1 RT when TCP fast open is used), but that might be
tolerable if the probability is low.

Absent this data and objections to #136, I’ve merged the PR as a viable mitigation to the multi-CDN problem. We can continue iterating on #137 and work on collecting this critical data as needed in parallel.

Best,
Chris

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to