On 19. 03. 26 5:59, tirumal reddy wrote:
addresses comments received during WGLC, particularly those raised by Petr Špaček.

First, I apologize for the mangled review text! Apparently Datatracker ate some of the newlines and it made it really hard to read even for me, which I unfortunately noticed only today.

I went through -18 and my -17 review and I think this mess contributed to skipping over several points I raised. The first one is crucial as the format under-specification was not addressed:

-18 says:
 4. I-JSON in EXTRA-TEXT Field

... data in the EXTRA-TEXT field [RFC8914] encoded using the Internet JSON 
(I-JSON) message format [RFC7493].

It is still missing a specification the data must be a JSON Object (emphasis on the capital O). I-JSON message could be an array, even null/false/true. I suggest replacing the sentence above with something like:

"... data in the EXTRA-TEXT field [RFC8914] as JSON Object encoded using the Internet JSON (I-JSON) message format [RFC 8259 section 4]."


5.2. Server Generating Response If the SDE option was not present in the DNS request, the DNS server MUST NOT include structured JSON data.

What if an implementation does not produce humand-readable version? Does that mean it MUST NOT give back any information at all? Returning unsolicited SDE does not result in any interoperability problem, it just might be less convenient for a person to read it. But having something is certainly better than not returning anything at all.

I suggest change to something like this:
"If the SDE option was not present in the DNS request, the DNS server SHOULD include human-readable EXTRA-TEXT accordance with [RFC8914]."


5.3. Client Processing Response 8. If the DNS client has enabled the opportunistic privacy profile for DoT (Section 5 of [RFC8310]) and the identity of the DNS server cannot be verified, ...

This paragraph has leftover over-specification for DoT which was corrected in other places. Simply shortening it would address this issue. E.g."If the identity of the DNS server cannot be verified, ..."

If you really want to single out DoT, then perhaps something like:

"If the identity of the DNS server cannot be verified (e.g. with opportunistic privacy like Section 5 of [RFC8310]), ..."


> 5.3. Client Processing Response
In opportunistic discovery [RFC9462], where only the IP address of the DNS 
server is validated and the server identity is not authenticated, the DNS 
client MUST ignore ...

Same here. There might be a different mechanism in use which is similar but different than RFC 9462.

I suggest:
"If only the IP address of the DNS server is validated and the server identity is not authenticated (e.g. with opportunistic discovery [RFC9462]), ..."

> 5.3. Client Processing Response
> 10. If a DNS client has enabled strict privacy profile (Section 5 of [RFC8310]) for DoT, the DNS client requires an encrypted connection and successful authentication of the DNS server. In doing so, this mitigates both passive eavesdropping and client redirection (at the expense of providing no DNS service if an encrypted, authenticated connection is not available). If the DNS client has enabled strict privacy profile for DoT, the DNS client MAY process the EXTRA-TEXT field of the DNS response.

This seems to over-specify things again. E.g. an ordinary Firefox browser today, doing DoH to a selected DoH resolver, will not fulfill this specification!

I suggest simplifying it to:

"If the connection to a DNS server is authenticated and integrity protected, the DNS client MAY process the EXTRA-TEXT field of the DNS response."

That's technology neutral and focuses on the important properties the SDE protocol relies on - authentication and integrity protection. (For the fun of it, TLS with NULL cypher-suite would suffice as it provides integrity protection without encryption :grin:)


10.1. Authentication and Confidentiality This specification assumes the use of encrypted DNS transports and recommends authenticated connections to the DNS server.

After the changes above, this would read better as e.g.

"This specification assumes the use of integrity-protected DNS transports and recommends authenticated connections to the DNS server."


Nit:
I suggest adding "SDE" acronym definition into section 2. Conventions and Definitions .

Thank you for patience with me.

--
Petr Špaček

_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to