FWIW, this was first broached on the AS112 operators ML. Thread here:
https://lists.dns-oarc.net/pipermail/as112-ops/2011-July/000209.html
Hope this contributes to the discussion.
On Thu, 14 Mar 2013, Joe Abley wrote:
On 2013-02-22, at 15:14, "Dickson, Brian" <[email protected]> wrote:
Instead of delegating to omniscient AS112 servers, what about doing a
DNAME to a specific target "foo" (replace "foo" with what you will) in the
DNS tree?
I've thought about this a bit, and I've decided that I quite like it.
So, if I can paraphrase to ensure we're talking about the same thing, the
current working omniscient plan involves:
- custom code
- some degree of discomfort, possibly unwarranted, with the NOERROR/no ANSWER
approach
Your idea, however, involves
- hosting a known, empty zone on known nameservers
- pseudo-delegating new worthy zones by provisioning a DNAME at a suitable
point in another zone
- no custom code
- no protocol discomfort, so long as we don't gag too badly on the use of DNAME
Your idea has advantages, then.
Anybody could decide to sink traffic for any name at AS112++ servers by
installing a similar DNAME. This would become a standard way to dispense with
and junk DNS traffic; perhaps we need to think about writing this up as
AS112.ARPA and make it a more general mechanism than just a place to sink
default-local-zones traffic.
Suppose AS112.ARPA is delegated to the nameservers BLACKHOLE-3.IANA.ORG and
BLACKHOLE-4.IANA.ORG, and the AS112.ARPA zone is empty apart from an SOA
(SOA.MNAME = PRISONER-2.IANA.ORG). The names of the servers don't matter much,
except that they need not to be named under AS112.ARPA (since that would
pollute the empty zone with A and AAAA RRSets).
We acquire an IPv4 /24 and an IPv6 /48 from which to number those three
servers. AS112++ operators listen on those addresses, announce the
corresponding routes and host an AS112.ARPA zone which is empty apart from apex
SOA and NS RRSets.
(Aside: if AS112++ servers were happy to slave the zone, e.g. from ICANN, we
could sign it and install a DS RRSet in the ARPA zone. This would have the side
benefit that we could track from ICANN's distribution masters who is retrieving
the zone, and hence where the AS112++ operators were. So, this is also AS112
with DNSSEC, and it's measurable.)
We want traffic for names under D.F.IP6.ARPA (RFC4291) to be handled in an
AS112 like way. We install a DNAME in the IP6.ARPA zone:
$ORIGIN IP6.ARPA.
D.F IN DNAME AS112.ARPA.
No changes are needed to the servers which serve AS112.ARPA. We can change our
minds about D.F.IP6.ARPA or add new bits of namespace to be treated similarly
at any time, with no coordination required by the AS112++ operators.
Once we have confidence that the AS112.ARPA zone is being hosted adequately, we
could re-provision 10.IN-ADDR.ARPA, 168.192.IN-ADDR.ARPA and
16.172.IN-ADDR.ARPA and friends with DNAME and the old AS112 system can be
retired.
RFC 6303 could be simplified by specifying that resolvers should host an empty
AS112.ARPA zone, which would give similar behaviour to hosting a long list of
empty zones (not as great a reduction in traffic for the zones mentioned in
6303, but with the benefit that other zones which are AS112++ified would get
caught locally without requiring updates to 6303 or resolver configuration).
RFC 6304 could be replaced with updated guidance (new addresses, just hosting
AS112.ARPA).
We can avoid re-enragement of the IESG by not re-proposing SINK.ARPA as a way
to avoid generating junk traffic, understanding that using AS112.ARPA wherever
SINK.ARPA might have been used is nearly as good.
This seems like a good, pragmatic path forward. I'm intrigued to hear the
reactions of others to the general idea or the details of this rambling thought
experiment.
Joe
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop
wfms
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop