Hi, Joe. Just as you said, the need of flushing cache exists to a certain
extent. But maybe first we should check
why the cache needs to be flushed. Is it due to errors in zone file, other
configuration errors in authority servers
or the inefficiency of TTL mechanism? For the first two reasons, it is better
to do other work to avoid such kinds
of errors and then cache flushing is bypassed. For the third reason, shortening
the TTL may be a potential approach,
and also DNS FLUSH can be taken as an effective supplement of TTL mechanism.
Fundamentally, TTL mechanism is based
on "pull" fashion while DNS FLUSH somehow is based on "push" fashion. And then
how to effectively bring them together
is not an easy job. Anyway, this draft brings a new choice for authority server
operators and resolver server operators.
Guangqing Deng
CNNIC
From: Joe Abley
Date: 2013-06-25 21:10
To: dengguangqing
CC: [email protected]
Subject: Re: [DNSOP] Fwd: New Version Notification for
draft-jabley-dnsop-dns-flush-00.txt
Hi Guangqing,
On 2013-06-25, at 08:02, "Guangqing Deng" <[email protected]> wrote:
> Hi, Joe, I like this draft, though I am puzzled by some questions. First, the
> change of
> the zone content of an authority server does not mean that a corresponding
> recursive server
> has to flush its cache, since a recursive server usually just cache a small
> part of zone content
> of an authority server but not all. Also, an authority server does not know
> which RRs of its
> zone content are cached in recursive servers. So such mechanism of DNS FLUSH
> may bring about
> some additional traffic between authority and recursive servers with no
> benefit.
I agree that in many cases this is a fairly coarse mechanism; however, arguably
there are situations where incurring that overhead is better than enduring bad
data that is widely-cached.
Following the recent incident affecting various .COM names there were
widespread pleas to resolver operators to "flush your cache". It seems likely
that some people interpreted that request on face-value, and flushed all
records from their caches. Flushing just the COM domain (or specific
sub-domains) would have been better. This mechanism would facilitate either of
those.
I appreciate the previous paragraph is less than entirely convincing :-)
The BIZ event whereby (it appears from the outside) an apex DNSKEY RRSet was
published that did not include a key corresponding to the BIZ DS RRSet in the
root zone would have been another example where flushing the entire BIZ domain
would have been overkill, but arguably better (for validators) than doing
nothing.
I agree that it would make little sense for an authority server operator in the
absence of a problem to flush remote caches every time a new zone was
published. I would expect specific hooks to be in place to allow flush
directions to be propagated under manual operator control, rather than
automatically, triggered by a SOA serial bump.
There is a discontinuity here between the current use of DNS NOTIFY and the
proposed new use; the former is based on zones, while the latter is based on
domains. There is an argument here for a new opcode; the reuse of NOTIFY seemed
expedient when I wrote the draft, but perhaps it's not the best way.
> Second, how
> does the authority server obtain the IPs of recursive servers? From query
> logs? Then the
> authority server sends DNS FLUSH to all or part of recursive servers? It
> seems that there
> are big differences between DNS NOTIFY and so called DNS FLUSH and thus more
> things need to
> be clarified.
I can think of various models for this.
Bilateral agreements between authority server operators and recursive server
operators would involve sharing of TSIG secrets as well as server addresses. A
set of bilats will not scale to the whole Internet, obviously, but perhaps is
good enough to deal with particular known resolvers that serve large
communities of users (e.g. Google DNS, OpenDNS, Comcast DNS).
A mechanism such as this would enable a clearinghouse style business model
where resolver operators and authority server operators could subscribe to a
service that mediated the flush directions between authority servers and
recursive servers, acting as a trusted intermediary.
Joe
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop