Yes, this is a problem. But I don't like any of the discussed solutions. I
don't think that is surprising, I figure they are just ideas and unfortunately
they all have bad side effects.
(Possible Solution#) 1 - There are zones that promise new delegations to appear
in less than X minutes. Argue whether you think this is an abomination of
nature or not, but it is a requirement from the business world that has been
met by DNS for a decade. DNSSEC can't take away a "feature" like this anymore
that it could take away round-robining answers.
2 & 3 - The document hints at this already : impractical. DNS has got to
maintain it's loose management nature. A sync'd DNS will sink.
4 - Add a dummy DS won't work because that kills opt-out. You can throw
scaling to 100% out the window.
My thoughts, based on the DNS-OARC presentation, was that this can be better
treated at the "client" side.
The trouble is we caved in and allowed recursive servers to use the NSEC{3}
record to infer when they can send back an NXDOMAIN. Instead of allowing a
cache to only use the NSEC(3) proof for the (name,class,type) - which is what
it should be for - we allow recursives to make use is the span in the NSEC{3)
to say that nothing would be there so I'm not going to ask.
What I would suggest is restricting recursive servers to only using the proof
for the name/class/type and in the case of the DS, in this rare case, boost the
TTL used for the DS ncache'd answer to that of the NS set. And I mean the
remaining TTL of the NS set already in the cache (elsewhere).
Listening to the talk, I quickly realized that we have no degrees of freedom on
the authority side, this has to be solved on the caching side. In the spirit
of a quick response, the above is offered as a suggestion, it might have holes
in it.
On Jun 7, 2013, at 2:37, <[email protected]> <[email protected]> wrote:
> JPRS observed that DS queries for JP registered domain names have been
> increasing and 3.5% of queries are qtype DS now.
>
> I make a presentation about it at DNS-OARC 2013 Spring workshop and I
> wrote a draft as a DNSSEC side effect.
>
> Presentation material is here:
>
> https://indico.dns-oarc.net/indico/getFile.py/access?contribId=14&resId=0&materialId=slides&confId=0
>
> Do you observe an increase of DS queries ?
>
> Comments appreciated.
>
> A new version of I-D, draft-fujiwara-dnsop-ds-query-increase-00.txt
> has been successfully submitted by Kazunori Fujiwara and posted to the
> IETF repository.
>
> Filename: draft-fujiwara-dnsop-ds-query-increase
> Revision: 00
> Title: Side effect of DNSSEC: an increase of DS queries
> Creation date: 2013-06-07
> Group: Individual Submission
> Number of pages: 5
> URL:
> http://www.ietf.org/internet-drafts/draft-fujiwara-dnsop-ds-query-increase-00.txt
> Status:
> http://datatracker.ietf.org/doc/draft-fujiwara-dnsop-ds-query-increase
> Htmlized:
> http://tools.ietf.org/html/draft-fujiwara-dnsop-ds-query-increase-00
>
>
> Abstract:
> A significant increase of periodic DS queries is observed at top
> level domain (TLD) DNS servers. Currently, almost all of periodic DS
> queries come from DNSSEC validators and are queries for unsigned
> delegations. The reason of the increase is low NCACHE TTL value and
> DS nonexistence. This phenomena is DNSSEC protocol and DNS parameter
> issue. DS queries will increase as DNSSEC validators will increase.
>
> --
> Kazunori Fujiwara, JPRS <[email protected]>
> _______________________________________________
> DNSOP mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/dnsop
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar You can leave a voice message at +1-571-434-5468
There are no answers - just tradeoffs, decisions, and responses.
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop