Hi all,

As for the experimental/standard discussion I have a maybe naive observation, but if this draft is experimental and the experiment succeeds (whatever succeeds means, in my view gathering useful operational experience and paving the road for DoT/DoQ on authoritatives) I don't expect this to become a standard afterwards.

If the experiment succeeds and we know how to run authoritatives with encryption and that the world will not end, I expect the standard following this document to be about explicitly signaling support and thus adhering to the security/privacy aspect of encryption.

(I see now that this is more or less what Philip also said earlier)

On 05/06/2023 21:31, Paul Hoffman wrote:
> We have turned in -07, which covers Yorgos' issues (thanks!) and the int-dir review (thanks!). We believe it is ready to move to IETF Review.
>
> --Paul Hoffman

Paul,

Thanks for addressing this but I do believe this is not quite right yet.
It may even be more confusing now since when a Do53 answer is received, the resolver proceeds to act as if an encrypted answer was also received.

Maybe a better approach are the following changes:

Text in "4.6.2. Receiving a Response over Do53" could change

FROM
------------------------------------------------------------------
If R is successful:
  If Q is in Do53-queries[X]:
    R is further processed by the resolver
  For each supported encrypted transport E:
    If Q is in E-queries[X]:
      Proceed to the steps in Section 4.6.9
------------------------------------------------------------------

TO
------------------------------------------------------------------
If R is successful and Q is not already processed:
  If Q is in Do53-queries[X]:
    R is further processed by the resolver
  For each supported encrypted transport E:
    If Q is in E-queries[X]:
      Mark Q as already processed
------------------------------------------------------------------

Text in  "4.6.9. Receiving a Response over Encrypted Transport" could
change

FROM
------------------------------------------------------------------
If Q is not in E-queries[X]:
  Discard R and process it no further (do not respond to an encrypted
  response to a query that is not outstanding)
Otherwise:
  Remove Q from E-queries[X]
  Set E-last-activity[X] to T5
  Set E-last-response[X] to T5
If R is successful:
  R is further processed by the resolver
  For each supported encrypted transport N other than E:
    If Q is in N-queries[X]:
      Remove Q from N-queries[X]
  If Q is in Do53-queries[X]:
    Remove Q from Do53-queries[X]
------------------------------------------------------------------

TO
------------------------------------------------------------------
If Q is not in E-queries[X]:
  Discard R and process it no further (do not respond to an encrypted
  response to a query that is not outstanding)
Otherwise:
  Remove Q from E-queries[X]
  Set E-last-activity[X] to T5
  Set E-last-response[X] to T5
If R is successful and Q is not already processed:
  R is further processed by the resolver
  For each supported encrypted transport N other than E:
    If Q is in N-queries[X]:
      Mark Q as already processed
  If Q is in Do53-queries[X]:
    Mark Q as already processed
------------------------------------------------------------------

These changes add an extra step of marking the waiting query as already processed by another transport reply, so the resolver can do the necessary bookkeeping for the current transport (if any) and ignore the "late" reply from the current transport.

Best regards,
-- Yorgos

_______________________________________________
dns-privacy mailing list
dns-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to