Re: [DNSOP] Fwd: HTTPSSVC record draft

2019-07-26 Thread Christian Huitema
Erik, In that case you should take a hard look at caching. The ESNI lookup needs to retrieve the name and the SNI key of the published server. It will remain valid as long as the key or the relationship between published and private does not change. If it is cached, the only required real time

Re: [DNSOP] Fwd: HTTPSSVC record draft

2019-07-26 Thread Erik Nygren
The need to bootstrap ESNI (encrypted SNI) keys via DNS is the forcing function here for clients. They need to do something new here to address that, and if that requires an additional lookup then there is opportunity if other problems can be solved at the same time as long as we don't slow down

Re: [DNSOP] Fwd: HTTPSSVC record draft

2019-07-26 Thread 神明達哉
At Tue, 23 Jul 2019 17:04:43 +0200, Matthijs Mekking wrote: > But as soon as clients start querying for ANAME (and not address > records) meaning it will chase the target itself, the DNS server > actually does not have to do a target lookup anymore. True, but my understanding is that the key

Re: [DNSOP] Fwd: HTTPSSVC record draft

2019-07-23 Thread Matthijs Mekking
I was too late to join the virtual queue in the dnsop meeting (fighting with the Meetecho UI), so I'll send a mail to the list: Slide 5 of the presentation (Alias form) basically covers the ANAME case, but still relies on the client to chase the target. The ANAME record is flexible where the

Re: [DNSOP] Fwd: HTTPSSVC record draft

2019-07-09 Thread Tim Wicinski
Will AWS Support this? That seems to be all I see deployed now On Tue, Jul 9, 2019 at 8:44 PM Paul Vixie wrote: > > > Joe Abley wrote on 2019-07-09 17:35: > > On Jul 9, 2019, at 20:11, Paul Vixie wrote: > > > >> everything other than HTTPS can just use SRV. > >> > >> ANAME is (should be)

Re: [DNSOP] Fwd: HTTPSSVC record draft

2019-07-09 Thread Paul Vixie
Joe Abley wrote on 2019-07-09 17:35: On Jul 9, 2019, at 20:11, Paul Vixie wrote: everything other than HTTPS can just use SRV. ANAME is (should be) toast(ed). Didn't we get to this point by acknowledging that there was a gap between now and the glorious future where SRV and unnamed

Re: [DNSOP] Fwd: HTTPSSVC record draft

2019-07-09 Thread Joe Abley
On Jul 9, 2019, at 20:11, Paul Vixie wrote: > everything other than HTTPS can just use SRV. > > ANAME is (should be) toast(ed). Didn't we get to this point by acknowledging that there was a gap between now and the glorious future where SRV and unnamed alternatives for HTTPS, and that the gap

Re: [DNSOP] Fwd: HTTPSSVC record draft

2019-07-09 Thread Paul Vixie
On Tuesday, 9 July 2019 21:49:50 UTC Mark Andrews wrote: > Which invariable ends up being needed to be split over multiple machines for > different protocols. ANAME can’t do that splitting. > > ANAME if it continues to exist needs rules like MX. It also needs to be > explicitly looked for by the

Re: [DNSOP] Fwd: HTTPSSVC record draft

2019-07-09 Thread Mark Andrews
Which invariable ends up being needed to be split over multiple machines for different protocols. ANAME can’t do that splitting. ANAME if it continues to exist needs rules like MX. It also needs to be explicitly looked for by the application. Add a flag to getaddrinfo() if one wants to make

Re: [DNSOP] Fwd: HTTPSSVC record draft

2019-07-09 Thread Tim Wicinski
Erik Speaking as myself and not a chair, I see way too many use cases which are API end points using ANAME like features. Those aren't browser based. I would hope for a solution which would work across all solution spaces - not just web browsers. Tim (speaking only as myself) On Mon, Jul 8,

Re: [DNSOP] Fwd: HTTPSSVC record draft

2019-07-08 Thread Erik Nygren
Thanks for the feedback. I'll add the DNAME clarification in the next version, as well as better explain the FQDN separation motivation. The alt-svc ALPN values come from rfc7838 (Alt-Svc) and rfc7301 (ALPN).

Re: [DNSOP] Fwd: HTTPSSVC record draft

2019-07-08 Thread Brian Dickson
Hi, Erik, One minor issue is that wherever CNAME is referenced, you probably want to also include a reference to DNAME, including any implied or explicit chaining of CNAMEs (which could be sequences of CNAME and/or DNAME modulo their respective behavior.) It might be a little clearer if the list

Re: [DNSOP] Fwd: HTTPSSVC record draft

2019-07-08 Thread Ray Bellis
On 08/07/2019 22:17, Erik Nygren wrote: For DNSOP folks, and ANAME proponents in-particular, I/we are especially interested in understanding if this would address enough of the customer use-cases driving ANAME were major browsers to implement support for HTTPSSVC, or would any limitations

Re: [DNSOP] Fwd: HTTPSSVC record draft

2019-07-08 Thread Erik Nygren
Ray, thanks for introducing this to dnsop! I've published a -03 with some of the feedback received so far: https://tools.ietf.org/html/draft-nygren-httpbis-httpssvc-03 For DNSOP folks, and ANAME proponents in-particular, I/we are especially interested in understanding if this would address

[DNSOP] Fwd: HTTPSSVC record draft

2019-07-08 Thread Ray Bellis
For those not paying attention to the HTTP-bis working group, this DNS RR was proposed there last week. It appears to subsume the ALT-SVC proposal and also covers the use case I had in mind with my HTTP Record draft (i.e. CNAME at the apex). Given that it has someone from at least major