On 7/7/25 15:06, Ben Schwartz wrote:
Quick thoughts:

1. I don't know what this is for.  Is it for firewall configuration?  Local firewalls or network firewalls? Configured by the client application or by a middlebox?  Is this for allowing unexpected inbound traffic, or locking down outbound traffic to unrecognized IPs?  Or is this really about annotating traffic for post-hoc analysis?

Most all of these, yes. Locking down outbound traffic to unrecognized IP addresses is a primary use case in my mind, though more generally firewall configuration to avoid domain name hacks like SNI inspection is desirable, and post-hoc analysis is always something that making data richer is a good thing (reaction to security events is just as important as trying to prevent them, since 100% prevention is impossible).

2. The mention of WebRTC is very puzzling.  Most WebRTC services allow direct connection between any pairs of peers in the world, so the CIDRS record would be 0.0.0.0/0.  Is that the intent?

Definitely not, as short prefixes are discouraged and /0 would be "right out". The example refers to the real-world practice of such applications to have fallback CIDRs that, if unblocked, will ensure the vendor's service always works even if arbitrary destinations are blocked which would otherwise result in more direct paths.

3. The draft mentions RFC 9000 server mobility as an example use case.  Is that a key motivation?  Server-initiated QUIC connection migration is basically impossible due to stateful firewalls (and symmetric NATs), so this is not something that anyone does on the open internet in practice, or could do in the foreseeable future.

No, it was just another example. It would be nice if implementations *could* do that, but if you think it's a low-value example, we can provide more practical examples (such as detail on the teleconferencing case).

--Ben
_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to