Re: [Last-Call] [OPSAWG] Dnsdir last call review of draft-ietf-opsawg-mud-iot-dns-considerations-12

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thank you for the review and kind words.
Nicolai Leymann via Datatracker <noreply@xxxxxxxx> wrote:
    > Minor issues: Section 3.1.2: - "This does not require access to all
    > on-path data, just to the DNS requests to the bottom level of the DNS
    > tree."

    NL> Data of DNS requests is only visible if a non encrypted
    NL> communication is being used. Protocols such as DoH or DoT provide
    NL> encryption,

Well.
1. recursive to authoritative requests are *not yet* ubiquitously encrypted.
   (we can root for RFC9539, but...)

2. unless the in-addr.arpa zone is part of a bigger entity (Amazon EC2...),
   then even just traffic analysis might show which reverse zone is being
   looked up.

So I'm not sure I know what to do with your comment.

    > Section 3.2: - I think the assumption is correct that there is a good
    > chance that in typical home network CPEs, MUD controller and recursive
    > resolver are running on the same deviced (the CPE).  ○ NL: I might be
    > worthwhile to mention that not all IoT devices necessarily use the DNS
    > server provided by the network (e.g., they may default to one of the
    > large open resolvers).

Section 6.5 explicitely recommends that they use the local resolver.
I've added, in section 3.2:

} If the IoT device did not use the same recursive servers as the MUD
} controller, then geofencing and/or truncated round-robin results could return
} a different, and non-overlapping set of addresses.

    > Section 3.2: - "Properly designed recursive servers should cache data
    > for at least some number of minutes, up to some number of days, while
    > the underlying DNS data can change at a higher frequency, providing
    > different answers to different queries!"  ○ NL: Not sure if I got
    > this. Can you be a bit more clear how "number of minutes/number of
    > days" is related to TTLs used in DNS?

Some operators change their DNS answers based upon load, geography, and some
of them do it at a rate faster than the TTL on the data.  That's usually
because the other answers aren't wrong, just not optimal.
Also, many recursive servers cache things for some minimum TTL, often 30s.

Given this, what text do you suggest I fix?

    > Section 6.1: - "Finally, the list of public resolvers that might be
    > contacted MUST be listed in the MUD file as destinations that are to be
    > permitted! This should include the port numbers (i.e., 53, 853 for DoT,
    > 443 for DoH) that will be used as well."

    nl> What is the difference between a public resolver (e.g. 8.8.8.8) and a
    nl> resolver provided by an ISP (sitting in network of ISP and being used
    nl> by end devices in home/local networks)? Is the assumption that the
    nl> public resolvers will be used in addition to resolvers provided by the network?

when an IoT device that uses the DHCP provided local IP addresses ("192.168.1.1",
fe80::1, etc.), it is a reasonable assumption that the MUD controller will
permit access to those IPs by default.
(Further , since the list of local resolvers can't be predicted, they can't
be put into the MUD file)

An IoT device that expects to be able to reach 8.8.8.8 will need to list
access to that IP address in it's MUD file.  Whether or not it actually uses
that address in a particular installation or not is a different thing.

    > Nits: Section 3.1: - "Attempts to map IP address to names …" ->
    > "attempts to map IP addresses to names …"

check.

    > - "the mapping are …" -> "the mappings are …"
check.

    > Section 4.1: - "avoid a IP address literal" -> "avoid
    > an IP address literal"

check

    > Section 5: - "For some users and classes of
    > device" -> "For some users and classes of devices"

check.

https://github.com/IETF-OPSAWG-WG/draft-ietf-opsawg-mud-iot-dns-considerations/pull/14/files

--
]               Never tell me the odds!                 | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works        |    IoT architect   [
]     mcr@xxxxxxxxxxxx  http://www.sandelman.ca/        |   ruby on rails    [







--
Michael Richardson <mcr+IETF@xxxxxxxxxxxx>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide




Attachment: signature.asc
Description: PGP signature

-- 
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux