That's a great feedback Jonathan! Thanks

Manu

On Fri, Jul 20, 2018 at 6:40 AM Jonathan Reed <jr...@akamai.com> wrote:

>
> On Tue, 17 Jul 2018, manu tman wrote:
>
> > I'd like to see this standardized too.
> > Side note: I would also be interested to get a return of experience from
> people operating qname minimization at scale,
>
> I suspect you're looking for feedback from recursive operators, but I'd
> like to share our experience as an authoritative operator.  Supporting
> QNAME minimization as an authoritative implies correctly responding
> NOERROR to empty-non-terminals (ENTs) within the zone.  RFC 4592 clarifies
> the interaction between wildcards and ENTs, however this poses a problem
> with customer-provided zone data.
>
> RFC 4592's behavior is not intuitive to most of our customers, and given
> that many other authoritative operators did not (and perhaps still don't)
> correctly handle interaction between wildcards and ENTs, we received
> significant customer pushback when we started correctly handling ENTs and
> wildcards.  In short, as far as customers are concerned, '*' should always
> match "across" dots.  _We_ all understand why it doesn't, but it's not
> intuitive to our customers, and it is no longer the case that the person
> managing a company's zone has an extensive background in DNS.  (Nor,
> frankly, should it be the case).
>
> Here's a common example:  Consider a SaaS/cloud provider that onboards
> customers through CNAMEs.   For example, cloudco.biz would onboard
> example.com by creating "example.com.cloudco.biz" and CNAMEing it to some
> internal name.   The SaaS provider also typically has a wildcard at/below
> the apex of their zone (*.cloudco.biz) to gracefully handle their
> customers who may put the CNAME in place before they have been
> fully provisioned.
>
> Such a zone, by definition, potentially has ENTs at every possible TLD.
> Thus, www.notyetprovisioned.com.clouco.biz will never match the wildcard
> at the apex, because of the ENT at com.cloudco.biz.  The SaaS provider is
> now causing a significant outage for their in-the-process-of-onboarding
> customers, and the provider is rightly very unenthusiastic about copying
> that apex wildcard down to every TLD.  The problem is further compounded
> with ccTLDs (www.example.co.uk.cloudco.biz creates two ENTs: one at uk,
> one at co.uk).  This rapidly becomes an untenable solution for our
> customers, and they're likely to seek out another authoritative provider.
>
> I realize this is a somewhat a special case, but there were (still are?)
> many large authoritative DNS providers in this position, and our effort to
> support QNAME minimization pushed a large operational problem onto our
> customers.
>
> -Jon
>
> --
> Jonathan Reed
> Senior Performance Engineer
> Akamai Technologies
>
> > the type of issues encountered, what are the ratios of such errors....
> hint @marek :)
> >
> > Manu
> >
> > On Tue, Jul 17, 2018 at 2:35 PM Paul Wouters <p...@nohats.ca> wrote:
> >       On Tue, 17 Jul 2018, tjw ietf wrote:
> >
> >       > Subject: Re: [DNSOP] QNAME minimisation on the standards track?
> >       >
> >       > I’d like to see a more fleshed out operational considerations
> section.
> >
> >       That would be good indeed. Especially with respect to broken DNS
> load
> >       balancers.
> >
> >       I have enabled it in Fedora from the start and did run into a few
> problem
> >       domains, and some people turning it off. But that happened less
> than I
> >       had expected. Red Hat did not yet enable this in RHEL7 but it is
> planned
> >       to be enabled in RHEL8.
> >
> >       But I do believe qname minimisation is an important privacy
> enhancing
> >       technology that we should strongly promote as a standards track
> >       document.
> >
> >       Paul
> >
> >       _______________________________________________
> >       DNSOP mailing list
> >       DNSOP@ietf.org
> >       https://www.ietf.org/mailman/listinfo/dnsop
> >
> >
> >
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to