[Last-Call] Dnsdir last call review of draft-ietf-tls-esni-23

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Reviewer: R. Gieben
Review result: Ready with Nits

Hello,

I'm the designated reviewer from dnsdir and I've reviewed -23.

I have a bunch of nits and minor questions, but section 10.2 stood out as I had
trouble understanding the DNS bits in there. Though I think that those can be
fairly easy be fixed.

Note that I haven't read (or can't remember) any of the referenced RFCs or I-Ds.

In section 6.1.7 "Authenticating for the Public Name", this repeats the a
public_name should not have any ASCII dots in the wrong places and that all
labels 63 octects.

Nothing is said about the overall length of DNS name? I assume the referenced
RFC 5890 references older DNS RFCs about this? But if so, why call out the
ASCII dots and the label lengths?

At the end of that paragraph other limitations are layed out about the
"numbers" 0-9 and A-F.

    "This avoids public_name... interpreted as IPv4 literals"

Seeing A-F also being mentioned this is "IPv4/IPv6 literals"?  (Then again IPv6
would be weird, because there should dots in public_name).

In section 6.1.8, last paragraph,

    "...comply with any freshness rules (e.g., DNS TTLs)"

Fair, but how does the application get access to those TTLs? AFAIK the normal
resolving stack doesn't not hand out that information.

In section 8.1.1.

    "...provided the server is authoritative for the public name."

What is meant by this? Because in DNS a nameserver is authoritative for a zone
(and thus the names in that zone). Does this mean the DNS name points to this
server (via A or AAAA)?

Section 10.2

nit: "Resource Records" -> RRs (I saw RRs already being used in the document)

    "ECH records"

What are those? Are these the HTTPS record(s), mentioned in the beginning?

Further more,

    "... which is 1:1 with the DNS name that was looked up (modulo DNS
    wildcards)."

As a non-native English speaker, I have trouble understanding the "which is 1:1
with the DNS name".

Then

    "modula DNS wildcards"

Why is this mentioned? Because a DNS server (internally) knows about DNS
wildcards, but a client does not (well with DNSSEC you can figure it out), so
I'm not sure why this is said here, seems not relevant and even a bit wrong?

Nit:

    "Encrypted DNS"

Maybe put the references to the RFCs here again?

Section 10.3

    "... can help mitigate this problem by flushing and DNS or ECHConfig
    state..."

"flushing DNS state" is dropping the HTTPS record information that a client has
and performing a lookup again? Because I don't see how DNS state can be flushed
from, say the local resolving by such client, but I don't think that was meant.

Section 10.10.2

    "... further limit sharing.... different keys using a short TTL"

OK, yes, this will help a bit, put this information is being put in public DNS,
so it's as public as can be... which is the opposite of 'limit sharing'... ?

Section 10.10.6

    "ECH record"

used again.

    "trusted Recursive Resolver"

I'm unaware of a formal definition of "trusted recursive resolver", so you
might trust the resolver, but as this document also explains that sounds a bit
like hoping for the best? Unsure what to make of this. Or is this the Firefox
TRR thing? Which implies DoH/DoT querying?

Cheers,
Miek



-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux