Hi!

Please see an response to below to Michael’s email:

From: Daniel Migault <mglt.i...@gmail.com>
Sent: Monday, October 31, 2022 9:02 AM
To: Michael Richardson <mcr+i...@sandelman.ca>
Cc: Roman Danyliw <r...@cert.org>; The IESG <i...@ietf.org>; 
draft-ietf-homenet-front-end-naming-delegat...@ietf.org; 
homenet-cha...@ietf.org; homenet@ietf.org; stephen.farr...@cs.tcd.ie
Subject: Re: [homenet] Roman Danyliw's Discuss on 
draft-ietf-homenet-front-end-naming-delegation-21: (with DISCUSS and COMMENT)

Hi Roman,

This is just a follow-up. Currently we believe we have addressed your concerns, 
but we would like to double check if there are any other concerns/questions you 
would like us to address.

Yours,
Daniel

On Thu, Oct 27, 2022 at 3:43 PM Daniel Migault 
<mglt.i...@gmail.com<mailto:mglt.i...@gmail.com>> wrote:


On Thu, Oct 27, 2022 at 5:32 AM Michael Richardson 
<mcr+i...@sandelman.ca<mailto:mcr%2bi...@sandelman.ca>> wrote:

Roman Danyliw via Datatracker <nore...@ietf.org<mailto:nore...@ietf.org>> wrote:
    > [per -18] I’m not sure if this my misreading of the behavior of
    > internal clients.  To clarify, the (internal) Homenet DNSSEC Resolver
    > will “... resolves the DS record on the Global DNS and the name
    > associated to the Public Homenet Zone (myhome.example) on the Public
    > Authoritative Servers.”?  Why would the internal resolver serving a
    > request for an internal client for an internal service go to the Global
    > DNS if the information if it could come from the internal Homenet Zone
    > it is already configured with?

Because it needs the glue records to prove it is authoritative.
There are cases - quite common - where the Homenet Authoritative server does 
not exist. In such cases, the Homenet Resolvers just caches what is published 
outside.

    > As an operational consideration, why go
    > outside of the network if you don’t need to?  As a privacy
    > consideration, why leak the request to an outside entity if the network
    > already has the information.
We do mention in the version 21 that going outside has some privacy 
implications. Note also that the resolver only goes outside once the TTL has 
exceeded so that is not every time a DNS request is received.

    > [per -20] Thanks for the revised text: On the other hand, to provide
    > resilience to the Public Homenet Zone in case of WAN connectivity
    > disruption, the Homenet DNSSEC Resolver SHOULD be able to perform the
    > resolution on the Homenet Authoritative Servers.

    > -- Is there a reason this can’t be a MUST?

If the resolver and cache have been offline for long enough, any cached chain
of DS/NS/DNSKEY records from . down to the myhome.example might have expired.
(Consider a DNSSEC resolver on a host behind the gateway)

What to do in this situation has many answers with different tradeoffs.
Yes. answers and tradeoffs are indeed quite numerous and we can hardly go 
beyond such a recommendation. Consider that the homenet an authoritative server 
may not exist or the Homenet Naming Authority may play multiple roles. Also 
keep in mind that our document is mostly focused on the Homenet Naming 
Authority and Distributed Manager, not so much on the naming architecture of 
the home network. As a result, strong recommendations regarding the resolver 
may be a bit out of scope of the document.


[Roman] I’m not sure that I follow all of the trade-offs. Let me try to restate 
things at a higher-level.

“Pre-HOMENET”
Without HOMENET, home users relied on a approaches such as those described in 
Section 1.2 of -18 of this draft (this text has now been removed).  One way I 
understood such configurations to work is that you might use dynamic DNS to map 
the carrier provided publicly routable IP address to a hostname.  With IPv4, 
the CPE would then do “port forwarding” for that service to be accessible 
remotely since the home network likely only got one IP address.  With IPv6, the 
home network would get a prefix so the machines behind the CPE would each have 
publicly routable IP addresses.  CPEs might also provide an internal resolver 
to answer for the names assigned to the devices on the home network to serve 
users on the home network.

DNS resolution for clients on the home network to access a home network server:
-- … visible outside of the home network: NO
-- … usable if CPE-to-carrier link goes down: YES

“HOMENET solution”

With all of the proposed roles and flexibility in the architecture, isn’t there 
increased visibility of previously private network behavior and reduced 
resiliency.

DNS resolution for clients on the home network to access a home network server:
-- … visible outside of the home network: YES
-- … usable if CPE-to-carrier link goes down: NO

I’m wondering if this name delegation approach could be deployed in a way to 
keep the “Pre-HOMENET” properties as described above?

Roman


_______________________________________________
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to