Re: [DNSOP] Resolver behaviour in the presence of unrequested answer records

2024-01-18 Thread Eric Orth
As a what-one-stub-resolver-does data point... The resolver I'm most familiar with validates that all the CNAME records form a single chain from the query name, and that all answer records of the query type match the final name at the end of the CNAME chain. If that is not true, as in the case of

Re: [DNSOP] I-D Action: draft-ietf-dnsop-structured-dns-error-06.txt

2023-10-12 Thread Eric Orth
Advertisements would be annoying, but my biggest concern with this stuff has always been links to pages that mimic the page the user was trying to access in the first place. If the user types in social-network.com, I don't trust users to not click links in the result without reading them and go wi

Re: [DNSOP] I-D Action: draft-bellis-dnsop-qdcount-is-one-01.txt

2023-09-28 Thread Eric Orth
I think this generally resolves my main concerns about the previous draft hiding the normative changes behind all the history and justification. Thanks for the update. Minor remaining complaints (that I'm not going to fight over, so ignore if you really disagree): * I think all the stuff now in th

Re: [DNSOP] what could we do with 15 unused bits of QDCOUNT?

2023-07-26 Thread Eric Orth
In the general case, you can't do anything with those bits for the same practical reason why we can't decide to allow QDCOUNT > 1. Too many existing servers expect that those bits can never be validly non-zero and will have unpredictable behavior. It's already out-of-our-control ossified. If we

Re: [DNSOP] Questions on DNS HTTPS/SVCB spec and deployment

2023-07-24 Thread Eric Orth
On Mon, Jul 24, 2023 at 1:14 PM Hongying Dong wrote: > Hello,We are researchers at the University of Virginia studying some > aspects of the DNS HTTPS/SVCB specification and how it is deployed in > practice. We had a few questions we are hoping you can provide the answers > to. Primarily we are e

Re: [DNSOP] Private-use underscored DNS node name

2023-01-03 Thread Eric Orth
Am I interpreting the idea correctly that the goal here is to be able to create names that are only usable as alias targets? If so, interesting idea, but I'm not sure such a mechanism could actually be created and widely implemented. I don't think there's enough motivation for all the relevant im

Re: [DNSOP] [Ext] Questions / concerns with draft-ietf-dnsop-svcb-https (in RFC Editor queue)

2022-08-25 Thread Eric Orth
I still disagree with the arguments for such a change being the ideal behavior. But rather than debating that further here, I will instead just argue that I do not believe any of this rises to the level of necessity for making technical changes at this late stage. This is not a case of "OMG! That

Re: [DNSOP] IANA Policy for SVCB

2022-04-12 Thread Eric Orth
I'm happy as long as things are still fast and easy enough to support new/experimental/prototype usage. I think Expert Review with the proposed stuff for that expert to review is all reasonable for that goal. If we start getting into stricter bars than Expert Review, that's where we'd have to sta

Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-19 Thread Eric Orth
If you split presentation format records into one record per SvcParam, that necessitates either changing the wire format to match or structuring the presentation and wire formats fundamentally differently with a translation to merge those records into a single record for the wire format. What the

Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-12 Thread Eric Orth
On Wed, May 12, 2021 at 4:44 PM Brian Dickson wrote: > > > On Wed, May 12, 2021 at 12:28 PM Eric Orth 40google@dmarc.ietf.org> wrote: > >> >> I also oppose allowing multiple aliases within an RRSet. This would >> allow aliasing trees, unreasonably exp

Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-12 Thread Eric Orth
On Wed, May 12, 2021 at 4:28 PM Brian Dickson wrote: > > > On Wed, May 12, 2021 at 12:28 PM Eric Orth 40google@dmarc.ietf.org> wrote: > >> I have no strong opinions on any of the discussions regarding escaping in >> presentation mode because I don't have

Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-12 Thread Eric Orth
I have no strong opinions on any of the discussions regarding escaping in presentation mode because I don't have much involvement in dealing with presentation mode of DNS records. The client I work with parses wire format directly into its internal structures. >From my wire-format-only perspectiv

Re: [DNSOP] SVCB without A/AAAA records at the service name

2021-01-15 Thread Eric Orth
My preference would be the change in 289. Maximizes keeping things open for future protocols rather than attempting to predict the needs of the protocols. On Fri, Jan 15, 2021 at 2:02 PM Ben Schwartz wrote: > FWIW, I think this is really an editorial question. The SVCB draft lays > out how we

Re: [DNSOP] I-D Action: draft-ietf-dnsop-svcb-https-02.txt

2021-01-05 Thread Eric Orth
Besides future-proofing for potential changes, I think the current rule keeps us more flexible for handling obscure cornercases. If there's any reasonable chance that some obscure usecase in the future might make it difficult for an authoritative to ensure only one alias is in place, it seems to m

Re: [DNSOP] I-D Action: draft-ietf-dnsop-svcb-https-02.txt

2021-01-05 Thread Eric Orth
On Wed, Dec 30, 2020 at 4:39 AM libor.peltan wrote: > Hi Ben, all, > i'd like to ask for some clarification of expected Authoritative server > behaviour around Alias SVCB records: > > 1) when there are multiple Alias SVCB records for an owner name, should > the Authoritative server put targeted r

Re: [DNSOP] private-use in-meeting chat comments

2020-11-19 Thread Eric Orth
On Tue, Nov 17, 2020 at 4:46 PM Tony Finch wrote: > Brian Dickson wrote: > > > One potential approach is to say (in the RFC) that one of the two-letter > > reserved codes should avoid name collision by putting a > collision-resistant > > second-level label, below .zz and above the private use us

Re: [DNSOP] private-use in-meeting chat comments

2020-11-16 Thread Eric Orth
guidspace.arpa or similar seems like a good potential solution to any of the usecases around such "magic" negotiated systems where the user isn't going to need to type in or see the actual name. By generating a guid, any system could easily generate unique names without any registration. But it d

Re: [DNSOP] Multi-QTYPES (was: unsolicited HTTPSSVC responses)

2020-05-28 Thread Eric Orth
I lead engineering for the stub resolver built into Chrome browser, so while not an OS-level stub, maybe still prominent enough to count for the "any communication" requested above. My biggest concern with an approach like this is ossification from middleboxes (especially some old home routers) th

Re: [DNSOP] CNAME chain length limits

2020-05-27 Thread Eric Orth
I should also note though that Chrome's built-in stub won't do any followup queries if the full chain is not in the response from the recursive. On Wed, May 27, 2020 at 3:03 PM Eric Orth wrote: > > > On Wed, May 27, 2020 at 1:49 PM John R Levine wrote: > >> Wh

Re: [DNSOP] unsolicited HTTPSSVC responses

2020-05-27 Thread Eric Orth
On Wed, May 27, 2020 at 2:34 AM Petr Špaček wrote: > On 27. 05. 20 1:05, Paul Vixie wrote: > > so, this way lies madness, and the solution we see most often is a > host-level > > cache of DNS results. the old INN (usenet net news) server had one of > these, > > and all modern browsers have one. m

Re: [DNSOP] Comments on draft-ietf-dnsop-svcb-httpssvc-02

2020-04-20 Thread Eric Orth
On Fri, Apr 17, 2020 at 6:20 AM Alessandro Ghedini wrote: > Hello, > > First off, I have started implementing support for SVCB and HTTPSSVC as > part of > the dnspython library [0] and I'd be interested in doing some interop > testing > with other people's implementations. > > I also have a few c

Re: [DNSOP] I-D Action: draft-ietf-dnsop-extended-error-14.txt

2020-01-15 Thread Eric Orth
Took a look at the diff. I believe this resolves all my previous concerns. On Wed, Jan 15, 2020 at 12:11 PM wrote: > > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > This draft is a work item of the Domain Name System Operations WG of the > IETF. > >

Re: [DNSOP] Consensus suggestion for EDE and the TC bit

2019-12-02 Thread Eric Orth
I still have a soft preference (but am definitely not going to call it a hard blocker) for some way to avoid followup queries when the only thing causing truncation is EDE. My concern comes from the EXTRA-TEXT being an open-length field, and I imagine many operators would want to create long verbo

Re: [DNSOP] Call for Adoption: draft-nygren-dnsop-svcb-httpssvc

2019-10-07 Thread Eric Orth
On behalf of Chrome DNS, I support adoption and plan to stay engaged on this. While I don't think the draft is perfect yet, we like the general approach and are interested in exploring it further. ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.or