Skip to main content

DNS Over HTTPS
charter-ietf-doh-01

Revision differences

Document history

Date Rev. By Action
2019-03-27
01 Cindy Morgan Responsible AD changed to Barry Leiba from Adam Roach
2017-09-29
01 Cindy Morgan New version available: charter-ietf-doh-01.txt
2017-09-29
00-13 Cindy Morgan State changed to Approved from External review
2017-09-29
00-13 Cindy Morgan IESG has approved the charter
2017-09-29
00-13 Cindy Morgan Closed "Approve" ballot
2017-09-29
00-13 Cindy Morgan Closed "Ready for external review" ballot
2017-09-29
00-13 Cindy Morgan WG action text was changed
2017-09-28
00-13 Adam Roach New version available: charter-ietf-doh-00-13.txt
2017-09-28
00-12 Benoît Claise
[Ballot comment]

In my first ballot, I mentioned "What I've been failing to understand from the charter is the rational for DNS over HTTPS? Can …
[Ballot comment]

In my first ballot, I mentioned "What I've been failing to understand from the charter is the rational for DNS over HTTPS? Can you expand on this." Because I'm not an Web browser and DNS expert, or most likely because the concerns were not clear in my head, I could not clearly express my thoughts.

So I watched the IETF mailing list with attention.
Mark Nottingham's email summarized the situation

    It's not a matter of constraining the work; the work isn't proposing to operate even remotely in the way that you describe. I think we're just having a misunderstanding, because people have multiple use cases in mind for this protocol, and properties thereof have been mixed up.

    AIUI those use cases are, roughly:

    1. Configure your browser/OS to use a DOH service for DNS resolution (as above) -- this will affect browser/OS state, because it's being used for DNS; however, it's not being done from JS.

    2. Call a DOH service from Javascript (for some reason) -- note this is just like any other HTTP request; it doesn't affect browser/OS state outside of the same origin model. Yes, you can still build a browser-in-a-browser and mess with things inside that context, but that's already true today.

    3. Future handwavy things like making DNS updates over HTTP -- very ill-defined and not important for this discussion

Expressing #1 and #2 in the charter would have helped me. #2 is kind of present now.
What about the addition the notion of "browser and/or OS" in the next sentence?

The primary focus of this working group is to develop a mechanism that
provides confidentiality and connectivity between DNS Clients and Iterative
Resolvers.
2017-09-28
00-12 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2017-09-27
00-12 Terry Manderson [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson
2017-09-27
00-12 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2017-09-27
00-12 Eric Rescorla
[Ballot comment]
I think this new text about JS is going in the right direction, but perhaps it straddles the line too much.

Say that …
[Ballot comment]
I think this new text about JS is going in the right direction, but perhaps it straddles the line too much.

Say that -- contra the text here -- we discovered some respect in which it was more convenient to design the protocol in a way that made JS break. Would the charter require us not to do that? I think the answer is "no", but I just want to verify that.
2017-09-27
00-12 Eric Rescorla [Ballot Position Update] New position, No Objection, has been recorded for Eric Rescorla
2017-09-27
00-12 Ben Campbell
[Ballot comment]
I'm balloting "yes", but I have a point of confusion on the following text:

"The primary focus of this working group is to …
[Ballot comment]
I'm balloting "yes", but I have a point of confusion on the following text:

"The primary focus of this working group is to develop a mechanism that
provides confidentiality and connectivity between DNS Clients and Iterative
Resolvers.  While access to DNS-over-HTTPS servers from JavaScript running in
a typical web browser is not the primary use case for this work, precluding
the ability to do so would require additional preventative design. The working
group will not engage in such preventative design."

I remember someone (Terry, maybe?) stating earlier that the justification for keeping this separate from DPRIVE was that confidentiality was _not_ the primary use case, and connection from JS in browsers _was_.  I see where people decided otherwise in the (95 entries so far) discussion thread--but does that change the relationship with DPRIVE? Especially since the first sentence comes directly from the DPRIVE charter?
2017-09-27
00-12 Ben Campbell [Ballot Position Update] New position, Yes, has been recorded for Ben Campbell
2017-09-27
00-12 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2017-09-27
00-12 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2017-09-27
00-12 Suresh Krishnan [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan
2017-09-27
00-12 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2017-09-27
00-12 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2017-09-27
00-12 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov
2017-09-26
00-12 Adam Roach New version available: charter-ietf-doh-00-12.txt
2017-09-26
00-11 Adam Roach New version available: charter-ietf-doh-00-11.txt
2017-09-26
00-10 Adam Roach [Ballot Position Update] New position, Yes, has been recorded for Adam Roach
2017-09-25
00-10 Spencer Dawkins
[Ballot comment]
(I would be a Yes, but I don't want to be the first one)

Thanks to everyone for the spirited review to date. …
[Ballot comment]
(I would be a Yes, but I don't want to be the first one)

Thanks to everyone for the spirited review to date. I think the changes are headed the right direction. I trust that will continue.

I have one nit. In this text,

"The specification of how to discover DOH servers via mechanisms currently used
to discover other DNS servers (e.g., DHCP and Router Advertisements) may be
considered by the working group if the chairs determine that a sufficiently
large mass of working group participants exist who are willing to edit and
comment on documents regarding such mechanisms."

is "large" the best word to describe what you're expecting the chairs to be assessing?

:-)
2017-09-25
00-10 Spencer Dawkins Ballot comment text updated for Spencer Dawkins
2017-09-25
00-10 Spencer Dawkins
[Ballot comment]
(I would be a Yes, but I don't want to be the first one)

Thanks to everyone for the spirited review to date. …
[Ballot comment]
(I would be a Yes, but I don't want to be the first one)

Thanks to everyone for the spirited review to date. I think the changes are headed the right direction. I trust that will continue.

I have one nit. In this text,

"
The specification of how to discover DOH servers via mechanisms currently used
to discover other DNS servers (e.g., DHCP and Router Advertisements) may be
considered by the working group if the chairs determine that a sufficiently
large mass of working group participants exist who are willing to edit and
comment on documents regarding such mechanisms."

is "large" the best word to describe what you're expecting the chairs to be assessing?

:-)
2017-09-25
00-10 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2017-09-25
00-10 Adam Roach New version available: charter-ietf-doh-00-10.txt
2017-09-25
00-09 Adam Roach New version available: charter-ietf-doh-00-09.txt
2017-09-25
00-08 Adam Roach New version available: charter-ietf-doh-00-08.txt
2017-09-25
00-07 Adam Roach New version available: charter-ietf-doh-00-07.txt
2017-09-15
00-06 Cindy Morgan Telechat date has been changed to 2017-09-28 from 2017-09-14
2017-09-15
00-06 Cindy Morgan Created "Approve" ballot
2017-09-15
00-06 Cindy Morgan State changed to External review from Internal review
2017-09-15
00-06 Cindy Morgan WG new work message text was changed
2017-09-15
00-06 Cindy Morgan WG review text was changed
2017-09-15
00-06 Cindy Morgan WG review text was changed
2017-09-15
00-06 Cindy Morgan WG review text was changed
2017-09-14
00-06 Adam Roach New version available: charter-ietf-doh-00-06.txt
2017-09-14
00-05 Terry Manderson [Ballot comment]
Thank you for the added text.
2017-09-14
00-05 Terry Manderson [Ballot Position Update] Position for Terry Manderson has been changed to No Objection from Block
2017-09-14
00-05 Eric Rescorla [Ballot Position Update] Position for Eric Rescorla has been changed to No Objection from Block
2017-09-14
00-05 Mirja Kühlewind [Ballot comment]
I would actually also like to have more information which protocol stack is exactly in scope.
2017-09-14
00-05 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2017-09-14
00-05 Warren Kumari
[Ballot comment]
I do not object to the work -- but I personally think that one of the main benefits is the potential for censorship …
[Ballot comment]
I do not object to the work -- but I personally think that one of the main benefits is the potential for censorship resistant DNS. I realize that listing all the justifications for doing something isn't really the job of the charter, but I was a bit surprised to not see it mentioned more prominently.

I also think that strong consultation with DNSOP will be very important - DNS has much hidden subtlety and it is easy to trip over the edges if you are not careful.
2017-09-14
00-05 Warren Kumari [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari
2017-09-14
00-05 Benoît Claise
[Ballot comment]
What I've been failing to understand from the charter is the rational for DNS over HTTPS? Can you expand on this.
My first …
[Ballot comment]
What I've been failing to understand from the charter is the rational for DNS over HTTPS? Can you expand on this.
My first reaction was: is it because HTTP(S) became the new transport? But obviously not.
So instead of fixing a DNS issue with UDP/TCP/DTLS, we're going to offer yet another choice (with, I guess, a different source of truth?)
Do we need to mention the connection with DNSSEC?
Why not DPRIV?
2017-09-14
00-05 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2017-09-14
00-05 Adam Roach New version available: charter-ietf-doh-00-05.txt
2017-09-14
00-04 Alvaro Retana
[Ballot comment]
Just a couple of nits:

(1) s/data may used/data may be used

(2) Given that the milestones reflect the intended date for completion, …
[Ballot comment]
Just a couple of nits:

(1) s/data may used/data may be used

(2) Given that the milestones reflect the intended date for completion, I don't think it is necessary to also include the date in the charter text.
2017-09-14
00-04 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2017-09-13
00-04 Suresh Krishnan [Ballot comment]
I also have concerns similar to Terry but Adam's proposed changes will resolve them.
2017-09-13
00-04 Suresh Krishnan [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan
2017-09-13
00-04 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2017-09-13
00-04 Adam Roach New version available: charter-ietf-doh-00-04.txt
2017-09-13
00-03 Terry Manderson
[Ballot block]
I would very much like to see explicit text in the charter that reinforces the need for cross area review to INT area …
[Ballot block]
I would very much like to see explicit text in the charter that reinforces the need for cross area review to INT area for DNS semantics and also to OPS (not speaking for the OPS ADs) for operational impacts of DNS over HTTPS on the aspects where normal/expected host (stub resolver->recursive resolver) behaviours are altered through browser HTTPS over DNS resolution.
2017-09-13
00-03 Terry Manderson Ballot discuss text updated for Terry Manderson
2017-09-13
00-03 Terry Manderson
[Ballot block]
I would very much like to see explicit text in the charter that reinforces the need for cross area review to INT area …
[Ballot block]
I would very much like to see explicit text in the charter that reinforces the need for cross area review to INT area for DNS semantics and also to OPS (not speaking for the OPS ADs) for operational impacts of DNS over HTTPS on the aspects where normal/expeted host (stub resolver->recursive resolver) behaviours are altered through browser HTTPS over DNS resolution.
2017-09-13
00-03 Terry Manderson [Ballot Position Update] New position, Block, has been recorded for Terry Manderson
2017-09-13
00-03 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2017-09-13
00-03 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2017-09-13
00-03 Ben Campbell [Ballot Position Update] New position, Yes, has been recorded for Ben Campbell
2017-09-12
00-03 Adam Roach New version available: charter-ietf-doh-00-03.txt
2017-09-12
00-02 Adam Roach
Changed charter milestone "Submit specification for performing DNS queries over HTTPS to the IESG for publication as PS", set due date to April 2018 from …
Changed charter milestone "Submit specification for performing DNS queries over HTTPS to the IESG for publication as PS", set due date to April 2018 from December 2017
2017-09-11
00-02 Adam Roach New version available: charter-ietf-doh-00-02.txt
2017-09-11
00-01 Adam Roach New version available: charter-ietf-doh-00-01.txt
2017-09-11
00-00 Spencer Dawkins
[Ballot comment]
I agree with Eric's BLOCK, that this charter should be really clear about HTTPS expectations.  If I was chairing this working group, I'd …
[Ballot comment]
I agree with Eric's BLOCK, that this charter should be really clear about HTTPS expectations.  If I was chairing this working group, I'd want to know whether specifying HTTP was in scope, up front.

I'm pretty sure I know what the answer is going to be, but I'll let people who understand more about DNS usage have that conversation before I express an opinion.
2017-09-11
00-00 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2017-09-09
00-00 Eric Rescorla
[Ballot block]
This charter seems oddly agnostic on whether or not we are defining
use over HTTP or over HTTPS. In 2017, I think its …
[Ballot block]
This charter seems oddly agnostic on whether or not we are defining
use over HTTP or over HTTPS. In 2017, I think its imperative that this
only be chartered for secure transports (which is, after all, implicit
in the value proposition).  I agree with Martin Thomson that "HTTPS"
is the right way to convey this point.
2017-09-09
00-00 Eric Rescorla
[Ballot comment]

I think I agree with MT's point that it would be best if this binding
were agnostic about HTTP/2 over TLS versus HTTPS …
[Ballot comment]

I think I agree with MT's point that it would be best if this binding
were agnostic about HTTP/2 over TLS versus HTTPS over QUIC (or
whatever we call it) and to the extent possible, agnostic about HTTP/2
versus HTTP/1.1 (i.e., the binding should be indifferent for the
functionality that don't depend on explicit HTTP/2 features like
push). However, I think we could send the charter out for review
w/o deciding that.
2017-09-09
00-00 Eric Rescorla [Ballot Position Update] New position, Block, has been recorded for Eric Rescorla
2017-09-07
00-00 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov
2017-09-06
00-00 Adam Roach
[Ballot comment]
Note: this charter has received review from the ART community on the DISPATCH mailing list. Comments ranged from neutral to supportive. See https://mailarchive.ietf.org/arch/search/?email_list=dispatch&gbt=1&index=XJRkCb3Yeu6_Asa5a3sFfrsvgac …
[Ballot comment]
Note: this charter has received review from the ART community on the DISPATCH mailing list. Comments ranged from neutral to supportive. See https://mailarchive.ietf.org/arch/search/?email_list=dispatch&gbt=1&index=XJRkCb3Yeu6_Asa5a3sFfrsvgac for details.
2017-09-06
00-00 Adam Roach Ballot comment text updated for Adam Roach
2017-09-06
00-00 Adam Roach [Ballot Position Update] New position, Yes, has been recorded for Adam Roach
2017-09-06
00-00 Adam Roach WG action text was changed
2017-09-06
00-00 Adam Roach WG review text was changed
2017-09-06
00-00 Adam Roach WG review text was changed
2017-09-06
00-00 Adam Roach Created "Ready for external review" ballot
2017-09-06
00-00 Adam Roach State changed to Internal review from Informal IESG review
2017-09-06
00-00 Adam Roach Placed on agenda for telechat - 2017-09-14
2017-09-06
00-00 Adam Roach Added charter milestone "Submit specification for performing DNS queries over HTTPS to the IESG for publication as PS", due December 2017
2017-09-06
00-00 Adam Roach Initial review time expires 2017-09-13
2017-09-06
00-00 Adam Roach State changed to Informal IESG review from Not currently under review
2017-09-06
00-00 Adam Roach New version available: charter-ietf-doh-00-00.txt