Thank you to the authors for having updated the document, and to the chairs
for having poked me.

I've requested IETF LC.

Thanks everyone.
W

On Tue, Jul 27, 2021 at 12:34 PM Warren Kumari <[email protected]> wrote:

> Dear Authors and WG,
>
> This document made me grumpy.
>
> Pointing out nits and similar in documents is one of the few times
> that I get to feel superior, and demonstrate my outstanding missing
> comma detection abilities... I feel that I've been robbed of this
> opportunity in this document -- I only found 4 (four) issues in 57
> pages, for a measly 0.07 errors per page...
>
> While they are just nits, I'd still appreciate it if the authors could
> address them and post a new version -- having the document as clean as
> possible before starting IETF LC helps things run smoothly.
>
> Please SHOUT LOUDLY once you've had a chance to address these (marked
> with [O] [P] notation), and I'll kick off LC.
>
> Thanks,
> W
>
>
>
>
> DNSOP Working Group                                          B. Schwartz
> Internet-Draft                                                    Google
> Intended status: Standards Track                               M. Bishop
> Expires: 18 December 2021                                      E. Nygren
>                                                      Akamai Technologies
>                                                             16 June 2021
>
>
>  Service binding and parameter specification via the DNS (DNS SVCB and
>                                HTTPS RRs)
>                      draft-ietf-dnsop-svcb-https-06
>
> Abstract
>
>    This document specifies the "SVCB" and "HTTPS" DNS resource record
>    (RR) types to facilitate the lookup of information needed to make
>    connections to network services, such as for HTTPS origins.  SVCB
>    records allow a service to be provided from multiple alternative
>    endpoints, each with associated parameters (such as transport
>    protocol configuration and keys for encrypting the TLS ClientHello).
>    They also enable aliasing of apex domains, which is not possible with
>    CNAME.  The HTTPS RR is a variation of SVCB for HTTPS and HTTP
>    origins.  By providing more information to the client before it
>    attempts to establish a connection, these records offer potential
>    benefits to both performance and privacy.
>
> 1.  Introduction
>
>    The SVCB ("Service Binding") and HTTPS RRs provide clients with
>    complete instructions for access to a service.  This information
>    enables improved performance and privacy by avoiding transient
>    connections to a sub-optimal default server, negotiating a preferred
>    protocol, and providing relevant public keys.
>
>    For example, when clients need to make a connection to fetch
>    resources associated with an HTTPS URI, they currently resolve only A
>    and/or AAAA records for the origin hostname.  This is adequate for
>    services that use basic HTTPS (fixed port, no QUIC, no [ECH]).  Going
>    beyond basic HTTPS confers privacy, performance, and operational
>    advantages, but it requires the client to learn additional
>
> [O] the client to learn
> [P] that the client learn
> [R] readability/grammar
>
>    information, and it is highly desirable to minimize the number of
>    round-trips and lookups required to learn this additional
>    information.
>
> [O] and it is highly desirable to minimize the number of
>
>    round-trips and lookups required to learn this additional
>    information.
> [R] Can this sentence be split? The "HTTPS confers ..., but ... and it
> is highly desirable..." gets a bit confusing unless you already know
> this :-)
>
> The SVCB and HTTPS RRs also help when the operator of a service
> wishes to delegate operational control to one or more other domains,
> e.g. delegating the origin "https://example.com"; to a service
> operator endpoint at "svc.example.net". While this case can
>    sometimes be handled by a CNAME, that does not cover all use-cases.
>    CNAME is also inadequate when the service operator needs to provide a
>    bound collection of consistent configuration parameters through the
>    DNS (such as network location, protocol, and keying information).
>
>    This document first describes the SVCB RR as a general-purpose
>    resource record that can be applied directly and efficiently to a
>    wide range of services (Section 2).  The HTTPS RR is then defined as
>    a special case of SVCB that improves efficiency and convenience for
>    use with HTTPS (Section 8) by avoiding the need for an Attrleaf label
>    [Attrleaf] (Section 8.1).  Other protocols with similar needs may
>    follow the pattern of HTTPS and assign their own SVCB-compatible RR
>    types.
>
>    All behaviors described as applying to the SVCB RR also apply to the
>    HTTPS RR unless explicitly stated otherwise.  Section 8 describes
>    additional behaviors specific to the HTTPS RR.  Apart from Section 8
>    and introductory examples, much of this document refers only to the
>    SVCB RR, but those references should be taken to apply to SVCB,
>    HTTPS, and any future SVCB-compatible RR types.
>
>    The SVCB RR has two modes: 1) "AliasMode" simply delegates
>    operational control for a resource;
>
> [O] 1) "AliasMode" simply delegates
>
>    operational control for a resource;
>
> [P] 1) "AliasMode", which simply delegates
>
>    operational control for a resource;
>
> [R] grammar/clarity. Suggest the same for #2 below.
>
>  2) "ServiceMode" binds together
>    configuration information for a service endpoint.  ServiceMode
>    provides additional key=value parameters within each RDATA set.
>
> 1.1.  Goals of the SVCB RR
>
>    The goal of the SVCB RR is to allow clients to resolve a single
>    additional DNS RR in a way that:
>
>    *  Provides alternative endpoints that are authoritative for the
>       service, along with parameters associated with each of these
>       endpoints.
>
>    *  Does not assume that all alternative endpoints have the same
>       parameters or capabilities, or are even operated by the same
>       entity.  This is important as DNS does not provide any way to tie
>
> [O] This is important as DNS
> [P] This is important, as DNS
> [R] grammar
>
>       together multiple RRs for the same name.  For example, if
>       www.example.com is a CNAME alias that switches between one of
>       three CDNs or hosting environments, successive queries for that
>       name may return records that correspond to different environments.
>
>    *  Enables CNAME-like functionality at a zone apex (such as
>       "example.com") for participating protocols, and generally enables
>       delegation of operational authority for an origin within the DNS
>       to an alternate name.
>
>    ----
> ... and I found no more errors or even nits below.
>
> Grump.
> W
>
>
> --
> Perhaps they really do strive for incomprehensibility in their specs.
> After all, when the liturgy was in Latin, the laity knew their place.
> -- Michael Padlipsky
>


-- 
The computing scientist’s main challenge is not to get confused by the
complexities of his own making.
  -- E. W. Dijkstra
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to