Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-03-15 Thread Olafur Gudmundsson

On Mar 14, 2013, at 6:55 PM, Joe Abley jab...@hopcount.ca wrote:

 
 On 2013-03-14, at 18:52, George Michaelson g...@apnic.net wrote:
 
 how many of the deployed resolvers can understand DNAME
 
 Good question, it would interesting to design an experiment to measure that.
 
 and whats the outcome for dns lookups where the intermediate systems dont 
 understand DNAME.
 
 CNAME synthesis, see RFC 6672 section 3.
 

You mean like 
test.dname-only.res.dnssecready.net  txt 
test.d-and-c.res.dnssecready.net txt 
test.d-bad-c.res.dnssecread.net txt 

The first name returns only dname, second one both, the third one has different 
targets for 
the C and D names. The txt record pointed to tells you if you 
the results tell you if the D or C name what happened. 

dhcp-606e:~/Code/evldns 23:09 dig test.d-bad-c.res.dnssecready.net txt 

;  DiG 9.8.3-P1  test.d-bad-c.res.dnssecready.net txt
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 12051
;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;test.d-bad-c.res.dnssecready.net. IN   TXT

;; ANSWER SECTION:
d-bad-c.res.dnssecready.net. 300 IN DNAME   good-Dname.dnssec-test.org.
test.d-bad-c.res.dnssecready.net. 300 IN CNAME  test.good-Dname.dnssec-test.org.
test.good-Dname.dnssec-test.org. 3600 IN TXTGOOD: DNAME followed

But the original server returned
;; ANSWER SECTION:
d-bad-c.res.dnssecready.net. 300 IN DNAME   good-Dname.dnssec-test.org.
d-bad-c.res.dnssecready.net. 1  IN  CNAME   bad-Cname.dnssec-test.org.

According to a large scale resolver/forwarder survey that I conducted recently 
DNAME is fully supported at least 
50% of resolvers/forwarders tested supported it. Im sure the number is higher 
today because 
Google has added DNAME support since then. Fully supported means that the 
resolver follows DNAME and includes the 
DNAME 's used 

Olafur


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-03-15 Thread Hugo Salgado

On 03/14/2013 07:44 PM, Joe Abley wrote:
 (Aside: if AS112++ servers were happy to slave the zone, e.g. from ICANN, we 
 could sign it and install a DS RRSet in the ARPA zone. This would have the 
 side benefit that we could track from ICANN's distribution masters who is 
 retrieving the zone, and hence where the AS112++ operators were. So, this is 
 also AS112 with DNSSEC, and it's measurable.)
 

Also has the benefit of penalizing when a slave becomes stalled,
going bogus when signatures expires.

A resolver which falls in a bogus nameserver should try with the
next one. So I think the organisations should host only one NS of the
complete set, giving the chance of diversity.

Hugo
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-03-15 Thread Steve Crocker

On Mar 15, 2013, at 11:21 AM, Hugo Salgado hsalg...@nic.cl wrote:

 
 On 03/14/2013 07:44 PM, Joe Abley wrote:
 (Aside: if AS112++ servers were happy to slave the zone, e.g. from ICANN, we 
 could sign it and install a DS RRSet in the ARPA zone. This would have the 
 side benefit that we could track from ICANN's distribution masters who is 
 retrieving the zone, and hence where the AS112++ operators were. So, this is 
 also AS112 with DNSSEC, and it's measurable.)
 
 
 Also has the benefit of penalizing when a slave becomes stalled,
 going bogus when signatures expires.
 
 A resolver which falls in a bogus nameserver should try with the
 next one. So I think the organisations should host only one NS of the
 complete set, giving the chance of diversity.

It feels like there are two distinct issues here.  If the signatures expire, 
all copies of those records will be affected, so diversity of name servers 
won't help.

Diversity of name servers is certainly helpful in countering operational 
failures of equipment or network connectivity.

Steve



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-03-15 Thread Joe Abley

On 2013-03-15, at 14:34, Steve Crocker st...@shinkuro.com wrote:

 It feels like there are two distinct issues here.  If the signatures expire, 
 all copies of those records will be affected, so diversity of name servers 
 won't help.

My assumption was that this was a reference to the signatures expired because 
zone transfers stopped working and nobody noticed problem.

 Diversity of name servers is certainly helpful in countering operational 
 failures of equipment or network connectivity.


Joe
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-03-15 Thread Hugo Salgado

On 03/15/2013 03:34 PM, Steve Crocker wrote:
 
 On Mar 15, 2013, at 11:21 AM, Hugo Salgado hsalg...@nic.cl wrote:
 

 On 03/14/2013 07:44 PM, Joe Abley wrote:
 (Aside: if AS112++ servers were happy to slave the zone, e.g. from ICANN, 
 we could sign it and install a DS RRSet in the ARPA zone. This would have 
 the side benefit that we could track from ICANN's distribution masters who 
 is retrieving the zone, and hence where the AS112++ operators were. So, 
 this is also AS112 with DNSSEC, and it's measurable.)


 Also has the benefit of penalizing when a slave becomes stalled,
 going bogus when signatures expires.

 A resolver which falls in a bogus nameserver should try with the
 next one. So I think the organisations should host only one NS of the
 complete set, giving the chance of diversity.
 
 It feels like there are two distinct issues here.  If the signatures expire, 
 all copies of those records will be affected, so diversity of name servers 
 won't help.
 

But the expiration affects only the instance that went stalled. The rest
of correctly-slaved secondaries should maintain fresh signatures.

Hugo


 Diversity of name servers is certainly helpful in countering operational 
 failures of equipment or network connectivity.
 
 Steve
 
 
 
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-03-15 Thread Tony Finch
Joe Abley jab...@hopcount.ca wrote:

 Once we have confidence that the AS112.ARPA zone is being hosted
 adequately, we could re-provision 10.IN-ADDR.ARPA, 168.192.IN-ADDR.ARPA
 and 16.172.IN-ADDR.ARPA and friends with DNAME and the old AS112 system
 can be retired.

What will be the consequences of this for validators that are trying
to use local versions of the RFC1918 zones? Will local zones have to be
signed and provide trust anchors for validating users?

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
Forties, Cromarty: East, veering southeast, 4 or 5, occasionally 6 at first.
Rough, becoming slight or moderate. Showers, rain at first. Moderate or good,
occasionally poor at first.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-03-14 Thread Joe Abley

On 2013-02-22, at 15:14, Dickson, Brian bdick...@verisign.com wrote:

 Instead of delegating to omniscient AS112 servers, what about doing a
 DNAME to a specific target foo (replace foo with what you will) in the
 DNS tree?

I've thought about this a bit, and I've decided that I quite like it.

So, if I can paraphrase to ensure we're talking about the same thing, the 
current working omniscient plan involves:

 - custom code
 - some degree of discomfort, possibly unwarranted, with the NOERROR/no ANSWER 
approach

Your idea, however, involves

 - hosting a known, empty zone on known nameservers
 - pseudo-delegating new worthy zones by provisioning a DNAME at a suitable 
point in another zone
 - no custom code
 - no protocol discomfort, so long as we don't gag too badly on the use of DNAME

Your idea has advantages, then.

Anybody could decide to sink traffic for any name at AS112++ servers by 
installing a similar DNAME. This would become a standard way to dispense with 
and junk DNS traffic; perhaps we need to think about writing this up as 
AS112.ARPA and make it a more general mechanism than just a place to sink 
default-local-zones traffic.

Suppose AS112.ARPA is delegated to the nameservers BLACKHOLE-3.IANA.ORG and 
BLACKHOLE-4.IANA.ORG, and the AS112.ARPA zone is empty apart from an SOA 
(SOA.MNAME = PRISONER-2.IANA.ORG). The names of the servers don't matter much, 
except that they need not to be named under AS112.ARPA (since that would 
pollute the empty zone with A and  RRSets).

We acquire an IPv4 /24 and an IPv6 /48 from which to number those three 
servers. AS112++ operators listen on those addresses, announce the 
corresponding routes and host an AS112.ARPA zone which is empty apart from apex 
SOA and NS RRSets.

(Aside: if AS112++ servers were happy to slave the zone, e.g. from ICANN, we 
could sign it and install a DS RRSet in the ARPA zone. This would have the side 
benefit that we could track from ICANN's distribution masters who is retrieving 
the zone, and hence where the AS112++ operators were. So, this is also AS112 
with DNSSEC, and it's measurable.)

We want traffic for names under D.F.IP6.ARPA (RFC4291) to be handled in an 
AS112 like way. We install a DNAME in the IP6.ARPA zone:

$ORIGIN IP6.ARPA.
D.F IN  DNAME   AS112.ARPA.

No changes are needed to the servers which serve AS112.ARPA. We can change our 
minds about D.F.IP6.ARPA or add new bits of namespace to be treated similarly 
at any time, with no coordination required by the AS112++ operators.

Once we have confidence that the AS112.ARPA zone is being hosted adequately, we 
could re-provision 10.IN-ADDR.ARPA, 168.192.IN-ADDR.ARPA and 
16.172.IN-ADDR.ARPA and friends with DNAME and the old AS112 system can be 
retired.

RFC 6303 could be simplified by specifying that resolvers should host an empty 
AS112.ARPA zone, which would give similar behaviour to hosting a long list of 
empty zones (not as great a reduction in traffic for the zones mentioned in 
6303, but with the benefit that other zones which are AS112++ified would get 
caught locally without requiring updates to 6303 or resolver configuration).

RFC 6304 could be replaced with updated guidance (new addresses, just hosting 
AS112.ARPA).

We can avoid re-enragement of the IESG by not re-proposing SINK.ARPA as a way 
to avoid generating junk traffic, understanding that using AS112.ARPA wherever 
SINK.ARPA might have been used is nearly as good.

This seems like a good, pragmatic path forward. I'm intrigued to hear the 
reactions of others to the general idea or the details of this rambling thought 
experiment.


Joe
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-03-14 Thread Joe Abley

On 2013-03-14, at 18:52, George Michaelson g...@apnic.net wrote:

 how many of the deployed resolvers can understand DNAME

Good question, it would interesting to design an experiment to measure that.

 and whats the outcome for dns lookups where the intermediate systems dont 
 understand DNAME.

CNAME synthesis, see RFC 6672 section 3.


Joe
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-03-14 Thread William F. Maton Sotomayor


FWIW, this was first broached on the AS112 operators ML.  Thread here:

https://lists.dns-oarc.net/pipermail/as112-ops/2011-July/000209.html

Hope this contributes to the discussion.

On Thu, 14 Mar 2013, Joe Abley wrote:



On 2013-02-22, at 15:14, Dickson, Brian bdick...@verisign.com wrote:


Instead of delegating to omniscient AS112 servers, what about doing a
DNAME to a specific target foo (replace foo with what you will) in the
DNS tree?


I've thought about this a bit, and I've decided that I quite like it.

So, if I can paraphrase to ensure we're talking about the same thing, the 
current working omniscient plan involves:

- custom code
- some degree of discomfort, possibly unwarranted, with the NOERROR/no ANSWER 
approach

Your idea, however, involves

- hosting a known, empty zone on known nameservers
- pseudo-delegating new worthy zones by provisioning a DNAME at a suitable 
point in another zone
- no custom code
- no protocol discomfort, so long as we don't gag too badly on the use of DNAME

Your idea has advantages, then.

Anybody could decide to sink traffic for any name at AS112++ servers by 
installing a similar DNAME. This would become a standard way to dispense with 
and junk DNS traffic; perhaps we need to think about writing this up as 
AS112.ARPA and make it a more general mechanism than just a place to sink 
default-local-zones traffic.

Suppose AS112.ARPA is delegated to the nameservers BLACKHOLE-3.IANA.ORG and 
BLACKHOLE-4.IANA.ORG, and the AS112.ARPA zone is empty apart from an SOA 
(SOA.MNAME = PRISONER-2.IANA.ORG). The names of the servers don't matter much, 
except that they need not to be named under AS112.ARPA (since that would 
pollute the empty zone with A and  RRSets).

We acquire an IPv4 /24 and an IPv6 /48 from which to number those three 
servers. AS112++ operators listen on those addresses, announce the 
corresponding routes and host an AS112.ARPA zone which is empty apart from apex 
SOA and NS RRSets.

(Aside: if AS112++ servers were happy to slave the zone, e.g. from ICANN, we 
could sign it and install a DS RRSet in the ARPA zone. This would have the side 
benefit that we could track from ICANN's distribution masters who is retrieving 
the zone, and hence where the AS112++ operators were. So, this is also AS112 
with DNSSEC, and it's measurable.)

We want traffic for names under D.F.IP6.ARPA (RFC4291) to be handled in an 
AS112 like way. We install a DNAME in the IP6.ARPA zone:

$ORIGIN IP6.ARPA.
D.F IN  DNAME   AS112.ARPA.

No changes are needed to the servers which serve AS112.ARPA. We can change our 
minds about D.F.IP6.ARPA or add new bits of namespace to be treated similarly 
at any time, with no coordination required by the AS112++ operators.

Once we have confidence that the AS112.ARPA zone is being hosted adequately, we 
could re-provision 10.IN-ADDR.ARPA, 168.192.IN-ADDR.ARPA and 
16.172.IN-ADDR.ARPA and friends with DNAME and the old AS112 system can be 
retired.

RFC 6303 could be simplified by specifying that resolvers should host an empty 
AS112.ARPA zone, which would give similar behaviour to hosting a long list of 
empty zones (not as great a reduction in traffic for the zones mentioned in 
6303, but with the benefit that other zones which are AS112++ified would get 
caught locally without requiring updates to 6303 or resolver configuration).

RFC 6304 could be replaced with updated guidance (new addresses, just hosting 
AS112.ARPA).

We can avoid re-enragement of the IESG by not re-proposing SINK.ARPA as a way 
to avoid generating junk traffic, understanding that using AS112.ARPA wherever 
SINK.ARPA might have been used is nearly as good.

This seems like a good, pragmatic path forward. I'm intrigued to hear the 
reactions of others to the general idea or the details of this rambling thought 
experiment.


Joe
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop



wfms
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-03-14 Thread Mark Andrews

I've got no objections to experimenting with DNAME like this.

DNAME and NXDOMAIN are QTYPE agnostic whereas NOERROR/NODATA is
not.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-03-01 Thread Roy Arends
On Feb 22, 2013, at 8:52 PM, P Vixie p...@redbarn.org wrote:

 Sorry to be late on this, missed it earlier.
 
 Nxd says there is no such name, no matter what the type was, and there are no 
 children.

RCODE=3 states that the name does not exist. 

no children might be implied from that, but that is just it, an implication.

A resolver assuming that no children exist is a resolver trying to be cute, and 
might be over-optimising. BIND9 (before 9.2.3) used to emit RCODE3 on empty 
non-terminals, and there are other implementations that currently still show 
this behaviour.  

Also see this message: 
http://www.ietf.org/mail-archive/web/dnsext/current/msg11084.html


 No data/noerror says there are either other types or children or both.

No, it really does not. Again this is implicit.

What Nodata/noerror says is that the type requested for a name does not exist.

NOERROR-NODATA is perfectly valid. There is no data to return for that QNAME, 
as the QTYPE does not exist. This is a negative response that, according to 
RFC2308 (NO DATA RESPONSE TYPE3) is a valid response.

This is not 'lying' or 'not true', as the type for that QNAME really does not 
exist.

 We know what the truth must be and we know which implications we want the 
 requestor to follow. Right? Is there any doubt at all or any ambiguity in 
 what we want said? … Paul

There is no ambiguity. You're trying to optimise query load, with the 
assumption that NXDOMAIN implies absence of children, while resolvers 
implementations should actually not use this assumption at all.

Roy



 
 Joe Abley jab...@hopcount.ca wrote:
 
 On 2013-02-22, at 07:57, Paul Vixie p...@redbarn.org wrote:
 
 if we can't return nxdomain, then i'm opposed to the omniscient spec,
 and we should continue as before, enumerating on the responding servers
 every zone to which we wish to delegate.
 
 noerror/nodata is the wrong answer.
 
 It does smell a bit wrong, but I'm interested in more details of why you 
 think that if it's more than just the smell.
 
 I'll note that the proposal is to assign new nameservers to be omniscient, 
 and not to convert the existing ones. We are then in a position to delegate 
 other local-zoneish zones to the new servers and review the impact.
 
 So, the suggestion is not to replace the existing AS112 servers (blackho
  le-1,
 blackhole-2 and prisoner) out of the gate. Any such replacement would happen 
 later, once there was some degree of comfort that it was safe to do that.
 
 
 
 Joe
 
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop
 
 -- 
 Sent from my Android phone with K-9 Mail. Please excuse my brevity.
 ___
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-27 Thread Chris Thompson

On Feb 26 2013, Tony Finch wrote:


Dickson, Brian bdick...@verisign.com wrote:

[...]

Instead of delegating to omniscient AS112 servers, what about doing a
DNAME to a specific target foo (replace foo with what you will) in the
DNS tree?


Like this?

We have had (afaik) one interop problem with this setup: there was a mail
server on a network with DNAMEd reverse DNS, and some recipient sites
objected to this.


Including in particular those for c*m*a*t.n*t, to whom we wrote in March 2011

| It appears that your servers fail to cope with this sort of result,
| and respond with an immediate
|
|   421 [hostname] comcast Reverse DNS failure : Try again later
|
| to an SMTP connection.
|
| What surprises us is that they do not behave like this if reverse
| lookup returns just a CNAME and a PTR record, in the style originally
| envisaged by RFC 2317. The extra DNAME seems to make the difference,
| but it ought to be ignored if not understood, and the synthesised
| CNAME acted on instead.

We never heard back from them, and we had to paper over the problem
by replacing the DNAME for 233.232.128.in-addr.arpa with 256 CNAMEs.

Still, this shouldn't be an issue if the intent is to generate
a negative answer to a reverse lookup. More to the current point
is that (unfortunately) few DNS registries support putting DNAMEs
in parent zones in place of delegations.

--
Chris Thompson   University of Cambridge Computing Service,
Email: c...@ucs.cam.ac.ukNew Museums Site, Cambridge CB2 3QH,
Phone: +44 1223 334715   United Kingdom.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-26 Thread SM

Hi Peter, Stephen,
At 14:48 25-02-2013, Warren Kumari wrote:
Yup -- the call for adoption on Saturday the 9th, and ended on 
Monday the 18th, which was a public holiday / long weekend in the 
USA. This means that US folk only had 4 or 5 working days to read 
and comment.  If it had been run for the more traditional 2 weeks 
(and if folk had realized that they specifically had to state that 
they would be a reviewer) thing might have gone differently.


There seems to have been a glitch during the call for adoption of 
draft-wkumari-dnsop-omniscient-as112-01.  Would it be possible for 
you to look into whether anything could be done?


Thanks,
-sm 


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-26 Thread Dickson, Brian
On 2/25/13 7:29 PM, Tony Finch d...@dotat.at wrote:

Dickson, Brian bdick...@verisign.com wrote:

 However, there is another UGLY, EVIL way that might achieve what you're
 thinking of:

 Instead of delegating to omniscient AS112 servers, what about doing a
 DNAME to a specific target foo (replace foo with what you will) in
the
 DNS tree?

Like this?

Yes. Except, of course, for AS112 domains, and for some agreed-upon target.

While mail servers doing PTR look-up having problems is a potential
concern,
keep in mind that AS112 is meant to be used for local-ish zones, like
10.in-addr.arpa.

If a mail server is doing PTR look-up for net-10, in a way that leaks,
IMHO,
failure _is_ an option. :-)

(Hint - public mail servers establishing TCP to/from a net-10 address is
already pretty bad.
Behind firewalls/closed-doors, net-10 is fine, but reverse DNS on that
should be handled
both privately and properly.)

Brian



We have had (afaik) one interop problem with this setup: there was a mail
server on a network with DNAMEd reverse DNS, and some recipient sites
objected to this.

;  DiG 9.9.2-vjs340.03-P1  @authdns0.csx.cam.ac.uk -x
128.232.255.255
; (2 servers found)
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 47436
;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 1, ADDITIONAL: 1
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;255.255.232.128.in-addr.arpa. IN  PTR

;; ANSWER SECTION:
255.232.128.in-addr.arpa.
86400  IN  DNAME   255.232.128.in-addr.arpa.cam.ac.uk.
255.255.232.128.in-addr.arpa. 86400
IN CNAME   255.255.232.128.in-addr.arpa.cam.ac.uk.

;; AUTHORITY SECTION:
in-addr.arpa.cam.ac.uk.14400   IN  SOA authdns0.csx.cam.ac.uk.
hostmaster.ucs.cam.ac.uk. 1361480354 14400 3600 604800 14400

;; Query time: 0 msec
;; SERVER: 2001:630:212:8::d:a0#53(2001:630:212:8::d:a0)
;; WHEN: Tue Feb 26 00:25:59 2013
;; MSG SIZE  rcvd: 187

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
Forties, Cromarty: East, veering southeast, 4 or 5, occasionally 6 at
first.
Rough, becoming slight or moderate. Showers, rain at first. Moderate or
good,
occasionally poor at first.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-26 Thread Tony Finch
Dickson, Brian bdick...@verisign.com wrote:

 While mail servers doing PTR look-up having problems is a potential
 concern, keep in mind that AS112 is meant to be used for local-ish
 zones, like 10.in-addr.arpa.

Right. I probably should have said more clearly that it works pretty well
if that is the worst interop problem.

I just remembered another problem, that many unices have antediluvian stub
resolvers that write to syslog when they see a DNAME record, e.g.

gethostby*.getanswer: asked for 42.143.232.128.in-addr.arpa IN PTR, got type 
39

Apart from logging, the code ignores the DNAME record and happily
processes the synthesized CNAME record, so it is mostly a benign bug apart
from the annoying noise in the logs. If AS112 were to use DNAME this is
likely to become a tiresome FAQ.

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
Forties, Cromarty: East, veering southeast, 4 or 5, occasionally 6 at first.
Rough, becoming slight or moderate. Showers, rain at first. Moderate or good,
occasionally poor at first.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-25 Thread Warren Kumari

On Feb 22, 2013, at 4:25 PM, P Vixie p...@redbarn.org wrote:

 I think your requirement is wrong, or misstated.
 
 You ought not want to imply there could be other types, except at the apex. 
 
 The semantics of an empty riot zone in a disconnected name space suit you 
 perfectly.
 
 If I get ambitious and revive resimprove then the no children exist signaling 
 will also matter.
 
 Why get cute?

Were not trying to get cute -- the initial version of the draft had an empty 
root (http://tools.ietf.org/html/draft-wkumari-dnsop-omniscient-as112-00 
Section 6.2 Fig 3 ), but, as Mark correctly pointed out, the answers were not 
cached.

I'll retest with minimal responses soon, but for now will simply 
s/NOERROR/NXDOMAIN/ in the draft (so I can squeeze it in before the revision 
cutoff).

W
 
 Paul
 
 Joe Abley jab...@hopcount.ca wrote:
 We want the absence of (qname, qtype) to be cached by resolvers who follow a 
 delegation to an omniscient as112 server for all (qname, qtype).
 
 Given that requirement the thought was that NOERROR/no data and NXDOMAIN were 
 equally plausible. However, I see now that the lack of no children 
 signalling has the potential to cause increased query load, since resolvers 
 will re-query for children despite an earlier query for a parent. My feeling 
 is that this is not a big deal and the ability to add/drop with no 
 coordination with server operators represents a greater win, but I have no 
 science behind my words. 
 
 The current scheme (witness Warren's code) seems to do this (modulo extra 
 queries for children) for all (qname, qtype) where qtype != SOA. Which is not 
 perfect, but, I think pretty good. We could servfail on qtype == SOA I guess, 
 which is crazy nasty but which I think for all practical purposes would work. 
 
 I like your other message's minimal response notion, though. When I'm not 
 sitting on a plane headed for a beach, I will play with that. 
 
 
 Joe
 
 Aue Te Ariki! He toki ki roto taku mahuna!
 
 On 2013-02-22, at 16:53, P Vixie p...@redbarn.org wrote:
 
 Sorry to be late on this, missed it earlier.
 
 Nxd says there is no such name, no matter what the type was, and there are 
 no children. No data/noerror says there are either other types or children 
 or both. We know what the truth must be and we know which implications we 
 want the requestor to follow. Right? Is there any doubt at all or any 
 ambiguity in what we want said? ... Paul
 
 Joe Abley jab...@hopcount.ca wrote:
 
 On 2013-02-22, at 07:57, Paul Vixie p...@redbarn.org wrote:
 
 
 if we can't return nxdomain, then i'm opposed to the omniscient spec,
 
 and we should continue as before, enumerating on the responding servers
 every zone to which we wish to delegate.
 
 noerror/nodata is the wrong answer.
 
 
 It does smell a bit wrong, but I'm interested in more details of why you 
 think that if it's more than just the smell.
 
 I'll note that the proposal is to assign new nameservers to be omniscient, 
 and not to convert the existing ones. We are then in a position to delegate 
 other local-zoneish zones to the new servers and review the impact.
 
 
 So, the suggestion is not to replace the existing AS112 servers (blackhole-1,
 blackhole-2 and prisoner) out of the gate. Any such replacement would happen 
 later, once there was some degree of comfort that it was safe to do that.
 
 
 
 Joe
 
 DNSOP mailing list
 DNSOP@ietf.org
 
 https://www.ietf.org/mailman/listinfo/dnsop
 
 -- 
 Sent from my Android phone with K-9 Mail. Please excuse my brevity.
 
 -- 
 Sent from my Android phone with K-9 Mail. Please excuse my brevity.
 ___
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop

--
Credo quia absurdum est.



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-25 Thread Warren Kumari

On Feb 22, 2013, at 3:47 PM, P Vixie p...@redbarn.org wrote:

 Sounds like you want it to return the nxd with no 2308 proof which means most 
 receives will cache it because the erroneous delegation isn't present. Bind 
 calls this a minimal response I think. … Paul


Hmmm… 'minimal-responses yes' doesn't seem to change the response -- the ARM 
says:
If yes the server will only add records to the authority and additional data 
sections when they are required, for instance, delegations and negative 
responses. This may improve the performance of the server by reducing outgoing 
data volumes. The BIND default is no. This statement may be used in a view or a 
global options clause.
Couldn't find any other hopeful sounding options, but will look a little more / 
poke the code...

I tried testing anyway, but answer didn't seem to get cached. Did it all in a 
bit of a rush, so entirely possible my testing is flawed (it often is :-P)

I have a box configured with 'minimal-responses yes' at 
minimal.superficialinjurymonkey.com. (204.194.22.106) if folk want to test 
against it…

W 

 
 Joe Abley jab...@hopcount.ca wrote:
 Hi Paul,
 
 That was our starting point; however, it turned out that resolvers wouldn't 
 cache the name error, I think because the SOA returned with the name error in 
 the authority section was clearly bogus (i.e. conflicted with the root zone 
 SOA presumably already cached by the resolver client).
 
 I too have always preferred the idea of specifying configuration for standard 
 software over custom code (neat though the custom code Warren is running is). 
 We just couldn't figure out how to do it. 
 
 Did we miss something?
 
 
 Joe
 
 Aue Te Ariki! He toki ki roto taku mahuna!
 
 On 2013-02-22, at 16:39, P Vixie p...@redbarn.org wrote:
 
 I'd like to be able to implement this with a standard authority server, no 
 special code, just a root zone that's empty other than its apex. So please 
 no requirements for the soa other than that it be at or above the qname. 
 
 Paul
 
 Warren Kumari war...@kumari.net wrote:
 
 On Feb 22, 2013, at 6:57 AM, Paul Vixie p...@redbarn.org wrote:
 
 
 if we can't return nxdomain, then i'm opposed to the omniscient spec,
 
 and we should continue as before, enumerating on the responding servers
 every zone to which we wish to delegate.
 
 
 If the WG consensus is NXDOMAIN, we can do that. *We* felt that NOERROR was 
 more appropriate, but 'its entirely possible we are wrong.
 
 
 W
 
 (If folk feel sufficiently strongly we *could* even strip a label off, so 
 that the synthesized SOA is not the same as the NXD. *This* feel really 
 hacks, but putting it out there...) 
 
 noerror/nodata is the wrong answer.
 
 
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop
 
 
 
 --
 I think perhaps the most important problem is that we are trying to 
 understand the fundamental workings of the universe via a language devised 
 for telling one another when the best fruit is. --Terry Prachett 
 
 
 
 
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop
 
 -- 
 Sent from my Android phone with K-9 Mail. Please excuse my brevity.
 
 -- 
 Sent from my Android phone with K-9 Mail. Please excuse my brevity.

-- 
Do not meddle in the affairs of wizards, for they are subtle and quick to 
anger.  
-- J.R.R. Tolkien


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-25 Thread SM

Hi Joe,
At 14:35 24-02-2013, Joe Abley wrote:

The most recent decision that I saw from the chairs was that it should
not be adopted. I do not agree that that is the best path forward.


The draft might have crossed the review threshold after the 
deadline.  Authors are usually given an opportunity to cross that 
threshold.  That tends to fail when there isn't adequate socialization.


Regards,
-sm

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-25 Thread Warren Kumari

On Feb 25, 2013, at 4:52 PM, SM s...@resistor.net wrote:

 Hi Joe,
 At 14:35 24-02-2013, Joe Abley wrote:
 The most recent decision that I saw from the chairs was that it should
 not be adopted. I do not agree that that is the best path forward.
 
 The draft might have crossed the review threshold after the deadline.  
 Authors are usually given an opportunity to cross that threshold.  That tends 
 to fail when there isn't adequate socialization.
 

Yup -- the call for adoption on Saturday the 9th, and ended on Monday the 18th, 
which was a public holiday / long weekend in the USA. This means that US folk 
only had 4 or 5 working days to read and comment.  If it had been run for the 
more traditional 2 weeks (and if folk had realized that they specifically had 
to state that they would be a reviewer) thing might have gone differently.
But yes, fully agree that we could have socialized this better….

W




 Regards,
 -sm
 
 ___
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop
 

--
It is impossible to sharpen a pencil with a blunt axe.  It is equally vain
to try to do it with ten blunt axes instead.
--  E.W Dijkstra, 1930-2002



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-25 Thread Tony Finch
Dickson, Brian bdick...@verisign.com wrote:

 However, there is another UGLY, EVIL way that might achieve what you're
 thinking of:

 Instead of delegating to omniscient AS112 servers, what about doing a
 DNAME to a specific target foo (replace foo with what you will) in the
 DNS tree?

Like this?

We have had (afaik) one interop problem with this setup: there was a mail
server on a network with DNAMEd reverse DNS, and some recipient sites
objected to this.

;  DiG 9.9.2-vjs340.03-P1  @authdns0.csx.cam.ac.uk -x 128.232.255.255
; (2 servers found)
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 47436
;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 1, ADDITIONAL: 1
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;255.255.232.128.in-addr.arpa.  IN  PTR

;; ANSWER SECTION:
255.232.128.in-addr.arpa. 86400 IN  DNAME   
255.232.128.in-addr.arpa.cam.ac.uk.
255.255.232.128.in-addr.arpa. 86400 IN  CNAME   
255.255.232.128.in-addr.arpa.cam.ac.uk.

;; AUTHORITY SECTION:
in-addr.arpa.cam.ac.uk. 14400   IN  SOA authdns0.csx.cam.ac.uk. 
hostmaster.ucs.cam.ac.uk. 1361480354 14400 3600 604800 14400

;; Query time: 0 msec
;; SERVER: 2001:630:212:8::d:a0#53(2001:630:212:8::d:a0)
;; WHEN: Tue Feb 26 00:25:59 2013
;; MSG SIZE  rcvd: 187

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
Forties, Cromarty: East, veering southeast, 4 or 5, occasionally 6 at first.
Rough, becoming slight or moderate. Showers, rain at first. Moderate or good,
occasionally poor at first.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-25 Thread Tony Finch
Joe Abley jab...@hopcount.ca wrote:

 I too have always preferred the idea of specifying configuration for
 standard software over custom code (neat though the custom code Warren is
 running is). We just couldn't figure out how to do it.

Why not something like Paul's metazone idea to automate the configuration
of which zones the server should answer for?

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
Forties, Cromarty: East, veering southeast, 4 or 5, occasionally 6 at first.
Rough, becoming slight or moderate. Showers, rain at first. Moderate or good,
occasionally poor at first.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-25 Thread Paul Vixie
...

Tony Finch wrote:
 ...
 Why not something like Paul's metazone idea to automate the configuration
 of which zones the server should answer for?

for reference:
http://www.ietf.org/mail-archive/web/dnsop/current/msg05192.html

paul
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-25 Thread Paul Vixie
...

Paul Vixie wrote:
 ...

 Tony Finch wrote:
 ...
 Why not something like Paul's metazone idea to automate the configuration
 of which zones the server should answer for?
 for reference:
 http://www.ietf.org/mail-archive/web/dnsop/current/msg05192.html


that message's pdf attachment appears to have been corrupted. another
copy is here: http://ss.vix.su/~vixie/mz.pdf

paul
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-24 Thread Joe Abley
The most recent decision that I saw from the chairs was that it should
not be adopted. I do not agree that that is the best path forward.

Aue Te Ariki! He toki ki roto taku mahuna!

On 2013-02-24, at 13:15, SM s...@resistor.net wrote:

 At 11:27 22-02-2013, Warren Kumari wrote:
 If the WG consensus is NXDOMAIN, we can do that. *We* felt that NOERROR was 
 more appropriate, but 'its entirely possible we are wrong.

 The subject line says Adoption as WG item.  Has 
 draft-wkumari-dnsop-omniscient-as112-01 been adopted yet?

 Regards,
 -sm
 ___
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Nick Hilliard
On 22/02/2013 05:47, Mark Andrews wrote:
 For much the same reason that *.COM was bad.

*.com was certainly evil, but I don't think it's necessarily fair to
compare the two, given the different usage scope of forward and reverse
domains.

 You *will* break things that you are unaware of.

can you quantify / clarify any things which you think it will break?

Nick

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Joe Abley

On 2013-02-22, at 01:47, Mark Andrews ma...@isc.org wrote:

 In message f42adb61-fcf4-47b3-8062-745d136d8...@algebras.org, George 
 Michaels
 on writes:
 
 On 21/02/2013, at 6:46 AM, Mark Andrews ma...@isc.org wrote:
 
 * it changes the response from NXDOMAIN to NOERROR NODATA.
 
 And why is that wrong ? I dont understand what you see as the outcomes. 
 more query? bad DNS? load?
 
 For much the same reason that *.COM was bad.  You *will* break things
 that you are unaware of.

For clarity, the reason why the spec specifies NOERROR NODATA rather than 
NXDOMAIN is that the enclosing SOA is synthesised from the QNAME.

Returning an NXDOMAIN with an SOA owner name of . was where we started, and (as 
pointed out by many) that breaks negative caching for most/all resolvers which 
is the opposite of what we want.

Returning an NXDOMAIN with SOA owner name == QNAME seems wrong, since we're 
simultaneously saying that the name doesn't exist and returning an RRSet with 
the same name.

Guessing at a different owner name for the SOA seems bad because at this point 
we're just making stuff up and surely it'll be wrong at least some of the time, 
and break negative caching again.

Returning NOERROR NODATA with SOA owner name == QNAME seemed like the best 
option. It's still a form of negative response, which (according to our 
testing) is cached in a way that makes sense.

For the record, we realise this is a hack. But it's a hack that facilitates new 
delegations to AS112 without risking lame delegations, which would be bad in 
their own way (lame delegations are to be expected when we have no central 
control over AS112 operators, and don't even know where they are in general, 
never mind how to contact the people who run them or check that they are not 
lame).


Joe
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Paul Vixie
if we can't return nxdomain, then i'm opposed to the omniscient spec,
and we should continue as before, enumerating on the responding servers
every zone to which we wish to delegate.

noerror/nodata is the wrong answer.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Måns Nilsson
Subject: Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt 
as a WG work item? Date: Fri, Feb 22, 2013 at 03:57:45AM -0800 Quoting Paul 
Vixie (p...@redbarn.org):
 if we can't return nxdomain, then i'm opposed to the omniscient spec,
 and we should continue as before, enumerating on the responding servers
 every zone to which we wish to delegate.
 
 noerror/nodata is the wrong answer.

As Randy Bush suggested, some 10 years ago, accept dynupdates, and serve that 
;-) 

An U-turn for fertilizer. 

-- 
Måns Nilsson primary/secondary/besserwisser/machina
MN-1334-RIPE +46 705 989668
Hand me a pair of leather pants and a CASIO keyboard -- I'm living for today!


signature.asc
Description: Digital signature
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Joe Abley

On 2013-02-22, at 07:57, Paul Vixie p...@redbarn.org wrote:

 if we can't return nxdomain, then i'm opposed to the omniscient spec,
 and we should continue as before, enumerating on the responding servers
 every zone to which we wish to delegate.
 
 noerror/nodata is the wrong answer.

It does smell a bit wrong, but I'm interested in more details of why you think 
that if it's more than just the smell.

I'll note that the proposal is to assign new nameservers to be omniscient, and 
not to convert the existing ones. We are then in a position to delegate other 
local-zoneish zones to the new servers and review the impact.

So, the suggestion is not to replace the existing AS112 servers (blackhole-1, 
blackhole-2 and prisoner) out of the gate. Any such replacement would happen 
later, once there was some degree of comfort that it was safe to do that.


Joe
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Mark Andrews

In message 51274721.1030...@inex.ie, Nick Hilliard writes:
 On 22/02/2013 05:47, Mark Andrews wrote:
  For much the same reason that *.COM was bad.
 
 *.com was certainly evil, but I don't think it's necessarily fair to
 compare the two, given the different usage scope of forward and reverse
 domains.
 
  You *will* break things that you are unaware of.
 
 can you quantify / clarify any things which you think it will break?

I can well imagine a machine doing a reverse lookup on a proposed
address and not proceeding with that address if it doesn't get a
NXDOMAIN.

NODATA - unsafe
NXDOMAIN - may be safe

The problem is that we don't know what changing the status quo will
do.  We have to be very cautious about doing that.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Joe Abley

On 2013-02-22, at 09:39, Mark Andrews ma...@isc.org wrote:

 I can well imagine a machine doing a reverse lookup on a proposed
 address and not proceeding with that address if it doesn't get a
 NXDOMAIN.
 
   NODATA - unsafe
   NXDOMAIN - may be safe

So, out of interest, do you think it's legitimate for an omniscient server to 
return something like this? (note the RCODE and the SOA RRSet returned in the 
authority section)

;; Got answer:
;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 41208
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; WARNING: recursion requested but not available

;; QUESTION SECTION:
;1.1.1.10.in-addr.arpa. IN  PTR

;; AUTHORITY SECTION:
1.1.1.10.in-addr.arpa.  604800  IN  SOA prisoner.iana.org. 
hostmaster.root-servers.org. 1 1800 900 604800 604800

;; Query time: 3 msec
;; SERVER: 192.175.48.6#53(192.175.48.6)
;; WHEN: Fri Feb 22 13:45:36 2013
;; MSG SIZE  rcvd: 116

That would be a simple change to the spec. We chose NOERROR/ANSWER:0 because we 
thought it didn't make sense to say NXDOMAIN whilst at the same time 
synthesising an authority-section SOA with the same owner name as the QNAME 
when the RCODE we're returning indicates that that owner name doesn't exist.

As someone familiar with implementing the receiver side of this hack, 
would/should this negative answer be cached?


Joe
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Nick Hilliard
On 22/02/2013 13:39, Mark Andrews wrote:
 The problem is that we don't know what changing the status quo will
 do.  We have to be very cautious about doing that.

I agree we should be cautious.  So why not run it on some as112 servers on
a pilot basis and see what happens?  Full logging would be required, as
well as some idea of what sort of problems to look for (e.g. multiple
repeated queries from the same source, etc).  Does this seem sensible?

Nick

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Joe Abley

On 2013-02-22, at 10:42, Nick Hilliard n...@inex.ie wrote:

 I agree we should be cautious.  So why not run it on some as112 servers on
 a pilot basis and see what happens?  Full logging would be required, as
 well as some idea of what sort of problems to look for (e.g. multiple
 repeated queries from the same source, etc).  Does this seem sensible?

I think an even more cautious approach would be to run it for zones that are 
not currently served by AS112 (e.g. those in the locally-served zones registry 
that are not currently delegated to AS112 servers).

Providing omniscient servers on different addresses (so, a different anycast 
cloud, but presumably with overlaps with the current one) and leaving the 
existing AS112 servers untouched would give us some field experience with zero 
jeopardy for existing assumptions about AS112 service.


Joe
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Dickson, Brian
One question/caveat:

What would the practical impact be, if the TTL on the SOA were the same as
the default negative caching TTL (for the NXDOMAIN)?

I think it would be slightly less sniffy, to have the NXDOMAIN and the
synthesized SOA both disappear at the same time.

IIRC, the TTL would then need to be 900 rather than 604800.

Brian

On 2/22/13 8:49 AM, Joe Abley jab...@hopcount.ca wrote:


On 2013-02-22, at 09:39, Mark Andrews ma...@isc.org wrote:

 I can well imagine a machine doing a reverse lookup on a proposed
 address and not proceeding with that address if it doesn't get a
 NXDOMAIN.
 
  NODATA - unsafe
  NXDOMAIN - may be safe

So, out of interest, do you think it's legitimate for an omniscient
server to return something like this? (note the RCODE and the SOA RRSet
returned in the authority section)

;; Got answer:
;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 41208
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; WARNING: recursion requested but not available

;; QUESTION SECTION:
;1.1.1.10.in-addr.arpa.IN  PTR

;; AUTHORITY SECTION:
1.1.1.10.in-addr.arpa. 604800  IN  SOA prisoner.iana.org.
hostmaster.root-servers.org. 1 1800 900 604800 604800

;; Query time: 3 msec
;; SERVER: 192.175.48.6#53(192.175.48.6)
;; WHEN: Fri Feb 22 13:45:36 2013
;; MSG SIZE  rcvd: 116

That would be a simple change to the spec. We chose NOERROR/ANSWER:0
because we thought it didn't make sense to say NXDOMAIN whilst at the
same time synthesising an authority-section SOA with the same owner name
as the QNAME when the RCODE we're returning indicates that that owner
name doesn't exist.

As someone familiar with implementing the receiver side of this hack,
would/should this negative answer be cached?


Joe
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Joe Abley

On 2013-02-22, at 12:33, Dickson, Brian bdick...@verisign.com wrote:

 One question/caveat:
 
 What would the practical impact be, if the TTL on the SOA were the same as
 the default negative caching TTL (for the NXDOMAIN)?

The longevity of the negative answer in the cache is defined as min(SOA TTL, 
SOA MINIMUM). There is no magic, here.

 I think it would be slightly less sniffy, to have the NXDOMAIN and the
 synthesized SOA both disappear at the same time.
 
 IIRC, the TTL would then need to be 900 rather than 604800.

The existing AS112 servers return SOA TTL = SOA MINIMUM = 604800, per RFC 6304. 
Setting the SOA TTL to 900 would reduce the longevity of both the SOA and the 
NOERROR/NODATA to 900 seconds from a week. I don't think that's desirable for 
these zones. Note I'm assuming that NOERROR/NODATA are cached the same way as 
NXDOMAIN.

draft-kumari-omniscient-as112-01 specifies SOA MINIMUM = 604800 but doesn't 
specify the SOA TTL. Should probably fix that.


Joe

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Chris Thompson

On Feb 22 2013, Mark Andrews wrote:


I can well imagine a machine doing a reverse lookup on a proposed
address and not proceeding with that address if it doesn't get a
NXDOMAIN.

NODATA - unsafe
NXDOMAIN - may be safe


So when I do a reverse lookup of 255.255.255.255 or ::0, and BIND
gives me a NODATA response from its automatic empty zones that
cover just those specific addresses and no others, then it is 
being unsafe?


--
Chris Thompson   University of Cambridge Computing Service,
Email: c...@ucs.cam.ac.ukNew Museums Site, Cambridge CB2 3QH,
Phone: +44 1223 334715   United Kingdom.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Dickson, Brian
Good point, indirectly referencing RFC 2308 (I always seem to forget about
that one).

So, other than SOA TTL going into the draft, I think it's all good, and
please ignore everything else I said (e.g. 900).

Brian

On 2/22/13 11:43 AM, Joe Abley jab...@hopcount.ca wrote:


On 2013-02-22, at 12:33, Dickson, Brian bdick...@verisign.com wrote:

 One question/caveat:
 
 What would the practical impact be, if the TTL on the SOA were the same
as
 the default negative caching TTL (for the NXDOMAIN)?

The longevity of the negative answer in the cache is defined as min(SOA
TTL, SOA MINIMUM). There is no magic, here.

 I think it would be slightly less sniffy, to have the NXDOMAIN and the
 synthesized SOA both disappear at the same time.
 
 IIRC, the TTL would then need to be 900 rather than 604800.

The existing AS112 servers return SOA TTL = SOA MINIMUM = 604800, per RFC
6304. Setting the SOA TTL to 900 would reduce the longevity of both the
SOA and the NOERROR/NODATA to 900 seconds from a week. I don't think
that's desirable for these zones. Note I'm assuming that NOERROR/NODATA
are cached the same way as NXDOMAIN.

draft-kumari-omniscient-as112-01 specifies SOA MINIMUM = 604800 but
doesn't specify the SOA TTL. Should probably fix that.


Joe


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Warren Kumari

On Feb 22, 2013, at 8:49 AM, Joe Abley jab...@hopcount.ca wrote:

 
 On 2013-02-22, at 09:39, Mark Andrews ma...@isc.org wrote:
 
 I can well imagine a machine doing a reverse lookup on a proposed
 address and not proceeding with that address if it doesn't get a
 NXDOMAIN.
 
  NODATA - unsafe
  NXDOMAIN - may be safe
 
 So, out of interest, do you think it's legitimate for an omniscient server to 
 return something like this? (note the RCODE and the SOA RRSet returned in the 
 authority section)
 
 ;; Got answer:
 ;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 41208
 ;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
 ;; WARNING: recursion requested but not available
 
 ;; QUESTION SECTION:
 ;1.1.1.10.in-addr.arpa.   IN  PTR
 
 ;; AUTHORITY SECTION:
 1.1.1.10.in-addr.arpa.604800  IN  SOA prisoner.iana.org. 
 hostmaster.root-servers.org. 1 1800 900 604800 604800
 
 ;; Query time: 3 msec
 ;; SERVER: 192.175.48.6#53(192.175.48.6)
 ;; WHEN: Fri Feb 22 13:45:36 2013
 ;; MSG SIZE  rcvd: 116
 
 That would be a simple change to the spec. We chose NOERROR/ANSWER:0 because 
 we thought it didn't make sense to say NXDOMAIN whilst at the same time 
 synthesising an authority-section SOA with the same owner name as the QNAME 
 when the RCODE we're returning indicates that that owner name doesn't exist.


Yup, the change to the spec and the change to the code are both simple.
I also changed the TTLs to match what I got when querying AS112 (not because I 
necessarily think that they are the right numbers, just as an example)


wkumari@dns-test:~/tmp/evldns$ diff -Naur oas112d.c oas112d.c.orig 
--- oas112d.c   2013-02-22 19:02:36.875829849 +
+++ oas112d.c.orig  2013-02-22 18:35:52.546628018 +
@@ -33,7 +33,7 @@
 #include ctype.h
 #include evldns.h
 
-static char *t_soa = @ SOA a.as112.net. hostmaster.as112.net. 1 1800 900 
0604800 604800;
+static char *t_soa = @ SOA a.as112.net. hostmaster.as112.net. 1 604800 
2592000 0604800 604800;
 static char *t_ns1 = @ NS b.as112.net.;
 static char *t_ns2 = @ NS c.as112.net.;
 
@@ -57,7 +57,7 @@
ldns_pkt *req = srq-request;
 
/* the default response packet */
-   ldns_pkt *resp = srq-response = evldns_response(req, 
LDNS_RCODE_NXDOMAIN);
+   ldns_pkt *resp = srq-response = evldns_response(req, 
LDNS_RCODE_NOERROR);
 
/* copy the question and determine qtype and qname */
ldns_rr *question = ldns_rr_list_rr(ldns_pkt_question(req), 0);
-


The NOERROR version can be seen by querying  scratch-monkey.kumari.net, the 
NXDOMAIN by querying dns-test.snozzages.com


 As someone familiar with implementing the receiver side of this hack, 
 would/should this negative answer be cached?

Folk are welcome to test against these and see how their particualr resolvers 
cache….

W

 
 
 Joe
 ___
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop
 

-- 
No man is an island, But if you take a bunch of dead guys and tie them 
together, they make a pretty good raft.
--Anon.


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Warren Kumari

On Feb 22, 2013, at 6:57 AM, Paul Vixie p...@redbarn.org wrote:

 if we can't return nxdomain, then i'm opposed to the omniscient spec,
 and we should continue as before, enumerating on the responding servers
 every zone to which we wish to delegate.
 

If the WG consensus is NXDOMAIN, we can do that. *We* felt that NOERROR was 
more appropriate, but 'its entirely possible we are wrong.

W

(If folk feel sufficiently strongly we *could* even strip a label off, so that 
the synthesized SOA is not the same as the NXD. *This* feel really hacks, but 
putting it out there...) 
 noerror/nodata is the wrong answer.
 ___
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop
 

--
I think perhaps the most important problem is that we are trying to understand 
the fundamental workings of the universe via a language devised for telling one 
another when the best fruit is. --Terry Prachett 


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Dickson, Brian


On 2/22/13 2:27 PM, Warren Kumari war...@kumari.net wrote:

(If folk feel sufficiently strongly we *could* even strip a label off, so
that the synthesized SOA is not the same as the NXD. *This* feel really
hacks, but putting it out there...)

Uh, definitely not. The whole point is you don't know from where the
delegation comes, e.g. at what depth in the label tree.

However, there is another UGLY, EVIL way that might achieve what you're
thinking of:

Instead of delegating to omniscient AS112 servers, what about doing a
DNAME to a specific target foo (replace foo with what you will) in the
DNS tree?

Then, that location foo can be the SOA to use (which does not change
regardless of the original question), along with any synthesized NXDOMAIN
response.

I did say it was evil. :-)

Brian

P.S. Example case:

10.in-addr.arpa. DNAME as112-leaf.prisoner.iana.org.


Imagine the recursive wants an answer for the question:
1.1.1.10.in-addr.arpa.   IN PTR

Any root provides the above DNAME
The local omniscient-112 server sees the question:
1.1.1.as112-leaf.prisoner.iana.org.
The local omniscient-112 server gives the following answer:

;; Got answer:
;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 41208
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; WARNING: recursion requested but not available

;; QUESTION SECTION:
;1.1.1.as112-leaf.prisoner.iana.org.IN  PTR

;; AUTHORITY SECTION:
as112-leaf.prisoner.iana.org.   604800  IN  SOA prisoner.iana.org.
hostmaster.root-servers.org. 1 604800 900 604800 604800

;; Query time: 3 msec
;; SERVER: 192.175.48.6#53(192.175.48.6)
;; WHEN: Fri Feb 22 13:45:36 2013
;; MSG SIZE  rcvd: 116

And the recursive resolver would give the following answer (or something
like it) to the client:

(The CNAME is synthesized from the question and the DNAME, if I understand
the relevant RFCs.)
(I'm not sure if the recursive would send the SOA/Authority component)

;; Got answer:
;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 41208
;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 1, ADDITIONAL: 0
;; WARNING: recursion requested but not available

;; QUESTION SECTION:
;1.1.1.as112-leaf.prisoner.iana.org. IN PTR

;; ANSWER SECTION
10.in-addr.arpa. DNAME as112-leaf.prisoner.iana.org.
1.1.1.10.in-addr.arpa. CNAME 1.1.1.as112-leaf.prisoner.iana.org.

;; AUTHORITY SECTION:
as112-leaf.prisoner.iana.org.   604800  IN  SOA prisoner.iana.org.
hostmaster.root-servers.org. 1 604800 900 604800 604800

;; Query time: 3 msec
;; SERVER: 192.175.48.6#53(192.175.48.6)
;; WHEN: Fri Feb 22 13:45:36 2013
;; MSG SIZE rcvd: 

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread P Vixie
I'd like to be able to implement this with a standard authority server, no 
special code, just a root zone that's empty other than its apex. So please no 
requirements for the soa other than that it be at or above the qname. 

Paul

Warren Kumari war...@kumari.net wrote:


On Feb 22, 2013, at 6:57 AM, Paul Vixie p...@redbarn.org wrote:

 if we can't return nxdomain, then i'm opposed to the omniscient spec,
 and we should continue as before, enumerating on the responding
servers
 every zone to which we wish to delegate.
 

If the WG consensus is NXDOMAIN, we can do that. *We* felt that NOERROR
was more appropriate, but 'its entirely possible we are wrong.

W

(If folk feel sufficiently strongly we *could* even strip a label off,
so that the synthesized SOA is not the same as the NXD. *This* feel
really hacks, but putting it out there...) 
 noerror/nodata is the wrong answer.
 ___
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop
 

--
I think perhaps the most important problem is that we are trying to
understand the fundamental workings of the universe via a language
devised for telling one another when the best fruit is. --Terry
Prachett 


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

-- 
Sent from my Android phone with K-9 Mail. Please excuse my brevity.___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Joe Abley
Hi Paul,

That was our starting point; however, it turned out that resolvers wouldn't
cache the name error, I think because the SOA returned with the name error
in the authority section was clearly bogus (i.e. conflicted with the root
zone SOA presumably already cached by the resolver client).

I too have always preferred the idea of specifying configuration for
standard software over custom code (neat though the custom code Warren is
running is). We just couldn't figure out how to do it.

Did we miss something?


Joe

Aue Te Ariki! He toki ki roto taku mahuna!

On 2013-02-22, at 16:39, P Vixie p...@redbarn.org wrote:

I'd like to be able to implement this with a standard authority server, no
special code, just a root zone that's empty other than its apex. So please
no requirements for the soa other than that it be at or above the qname.

Paul

Warren Kumari war...@kumari.net wrote:


 On Feb 22, 2013, at 6:57 AM, Paul Vixie p...@redbarn.org wrote:

 if we can't return nxdomain, then i'm opposed to the omniscient spec,
 and we should continue as before, enumerating on the responding servers
 every zone to which we wish to delegate.



 If the WG consensus is NXDOMAIN, we can do that. *We* felt that NOERROR was 
 more appropriate, but 'its entirely possible we are wrong.

 W

 (If folk feel sufficiently strongly we *could* even strip a label off, so 
 that the synthesized SOA is not the same as the NXD. *This* feel really 
 hacks, but putting it out there...)

 noerror/nodata is the wrong answer.
 --

 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop



 --
 I think perhaps the most important problem is that we are trying to 
 understand the fundamental workings of the universe via a language devised 
 for telling one another when the best fruit is. --Terry Prachett


 --

 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop


-- 
Sent from my Android phone with K-9 Mail. Please excuse my brevity.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread P Vixie
Sorry to be late on this, missed it earlier.

Nxd says there is no such name, no matter what the type was, and there are no 
children. No data/noerror says there are either other types or children or 
both. We know what the truth must be and we know which implications we want the 
requestor to follow. Right? Is there any doubt at all or any ambiguity in what 
we want said?   ... Paul

Joe Abley jab...@hopcount.ca wrote:


On 2013-02-22, at 07:57, Paul Vixie p...@redbarn.org wrote:

 if we can't return nxdomain, then i'm opposed to the omniscient spec,
 and we should continue as before, enumerating on the responding
servers
 every zone to which we wish to delegate.
 
 noerror/nodata is the wrong answer.

It does smell a bit wrong, but I'm interested in more details of why
you think that if it's more than just the smell.

I'll note that the proposal is to assign new nameservers to be
omniscient, and not to convert the existing ones. We are then in a
position to delegate other local-zoneish zones to the new servers and
review the impact.

So, the suggestion is not to replace the existing AS112 servers
(blackhole-1, blackhole-2 and prisoner) out of the gate. Any such
replacement would happen later, once there was some degree of comfort
that it was safe to do that.


Joe
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

-- 
Sent from my Android phone with K-9 Mail. Please excuse my brevity.___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread P Vixie
Sounds like you want it to return the nxd with no 2308 proof which means most 
receives will cache it because the erroneous delegation isn't present. Bind 
calls this a minimal response I think.   ... Paul

Joe Abley jab...@hopcount.ca wrote:

Hi Paul,

That was our starting point; however, it turned out that resolvers
wouldn't
cache the name error, I think because the SOA returned with the name
error
in the authority section was clearly bogus (i.e. conflicted with the
root
zone SOA presumably already cached by the resolver client).

I too have always preferred the idea of specifying configuration for
standard software over custom code (neat though the custom code Warren
is
running is). We just couldn't figure out how to do it.

Did we miss something?


Joe

Aue Te Ariki! He toki ki roto taku mahuna!

On 2013-02-22, at 16:39, P Vixie p...@redbarn.org wrote:

I'd like to be able to implement this with a standard authority server,
no
special code, just a root zone that's empty other than its apex. So
please
no requirements for the soa other than that it be at or above the
qname.

Paul

Warren Kumari war...@kumari.net wrote:


 On Feb 22, 2013, at 6:57 AM, Paul Vixie p...@redbarn.org wrote:

 if we can't return nxdomain, then i'm opposed to the omniscient spec,
 and we should continue as before, enumerating on the responding
servers
 every zone to which we wish to delegate.



 If the WG consensus is NXDOMAIN, we can do that. *We* felt that
NOERROR was more appropriate, but 'its entirely possible we are wrong.

 W

 (If folk feel sufficiently strongly we *could* even strip a label
off, so that the synthesized SOA is not the same as the NXD. *This*
feel really hacks, but putting it out there...)

 noerror/nodata is the wrong answer.
 --

 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop



 --
 I think perhaps the most important problem is that we are trying to
understand the fundamental workings of the universe via a language
devised for telling one another when the best fruit is. --Terry
Prachett


 --

 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop


-- 
Sent from my Android phone with K-9 Mail. Please excuse my brevity.

-- 
Sent from my Android phone with K-9 Mail. Please excuse my brevity.___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Joe Abley
We want the absence of (qname, qtype) to be cached by resolvers who follow
a delegation to an omniscient as112 server for all (qname, qtype).

Given that requirement the thought was that NOERROR/no data and NXDOMAIN
were equally plausible. However, I see now that the lack of no children
signalling has the potential to cause increased query load, since resolvers
will re-query for children despite an earlier query for a parent. My
feeling is that this is not a big deal and the ability to add/drop with no
coordination with server operators represents a greater win, but I have no
science behind my words.

The current scheme (witness Warren's code) seems to do this (modulo extra
queries for children) for all (qname, qtype) where qtype != SOA. Which is
not perfect, but, I think pretty good. We could servfail on qtype == SOA I
guess, which is crazy nasty but which I think for all practical purposes
would work.

I like your other message's minimal response notion, though. When I'm not
sitting on a plane headed for a beach, I will play with that.


Joe

Aue Te Ariki! He toki ki roto taku mahuna!

On 2013-02-22, at 16:53, P Vixie p...@redbarn.org wrote:

Sorry to be late on this, missed it earlier.

Nxd says there is no such name, no matter what the type was, and there are
no children. No data/noerror says there are either other types or children
or both. We know what the truth must be and we know which implications we
want the requestor to follow. Right? Is there any doubt at all or any
ambiguity in what we want said? ... Paul

Joe Abley jab...@hopcount.ca wrote:


 On 2013-02-22, at 07:57, Paul Vixie p...@redbarn.org wrote:

 if we can't return nxdomain, then i'm opposed to the omniscient spec,
 and we should continue as before, enumerating on the responding servers
 every zone to which we wish to delegate.

 noerror/nodata is the wrong answer.


 It does smell a bit wrong, but I'm interested in more details of why you 
 think that if it's more than just the smell.

 I'll note that the proposal is to assign new nameservers to be omniscient, 
 and not to convert the existing ones. We are then in a position to delegate 
 other local-zoneish zones to the new servers and review the impact.

 So, the suggestion is not to replace the existing AS112 servers (blackhole-1,
 blackhole-2 and prisoner) out of the gate. Any such replacement would happen 
 later, once there was some degree of comfort that it was safe to do that.


 Joe
 --

 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop


-- 
Sent from my Android phone with K-9 Mail. Please excuse my brevity.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread P Vixie
I think your requirement is wrong, or misstated.

You ought not want to imply there could be other types, except at the apex. 

The semantics of an empty riot zone in a disconnected name space suit you 
perfectly.

If I get ambitious and revive resimprove then the no children exist signaling 
will also matter.

Why get cute?

Paul

Joe Abley jab...@hopcount.ca wrote:

We want the absence of (qname, qtype) to be cached by resolvers who
follow
a delegation to an omniscient as112 server for all (qname, qtype).

Given that requirement the thought was that NOERROR/no data and
NXDOMAIN
were equally plausible. However, I see now that the lack of no
children
signalling has the potential to cause increased query load, since
resolvers
will re-query for children despite an earlier query for a parent. My
feeling is that this is not a big deal and the ability to add/drop with
no
coordination with server operators represents a greater win, but I have
no
science behind my words.

The current scheme (witness Warren's code) seems to do this (modulo
extra
queries for children) for all (qname, qtype) where qtype != SOA. Which
is
not perfect, but, I think pretty good. We could servfail on qtype ==
SOA I
guess, which is crazy nasty but which I think for all practical
purposes
would work.

I like your other message's minimal response notion, though. When I'm
not
sitting on a plane headed for a beach, I will play with that.


Joe

Aue Te Ariki! He toki ki roto taku mahuna!

On 2013-02-22, at 16:53, P Vixie p...@redbarn.org wrote:

Sorry to be late on this, missed it earlier.

Nxd says there is no such name, no matter what the type was, and there
are
no children. No data/noerror says there are either other types or
children
or both. We know what the truth must be and we know which implications
we
want the requestor to follow. Right? Is there any doubt at all or any
ambiguity in what we want said? ... Paul

Joe Abley jab...@hopcount.ca wrote:


 On 2013-02-22, at 07:57, Paul Vixie p...@redbarn.org wrote:

 if we can't return nxdomain, then i'm opposed to the omniscient spec,
 and we should continue as before, enumerating on the responding
servers
 every zone to which we wish to delegate.

 noerror/nodata is the wrong answer.


 It does smell a bit wrong, but I'm interested in more details of why
you think that if it's more than just the smell.

 I'll note that the proposal is to assign new nameservers to be
omniscient, and not to convert the existing ones. We are then in a
position to delegate other local-zoneish zones to the new servers and
review the impact.

 So, the suggestion is not to replace the existing AS112 servers
(blackhole-1,
 blackhole-2 and prisoner) out of the gate. Any such replacement would
happen later, once there was some degree of comfort that it was safe to
do that.


 Joe
 --

 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop


-- 
Sent from my Android phone with K-9 Mail. Please excuse my brevity.

-- 
Sent from my Android phone with K-9 Mail. Please excuse my brevity.___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-21 Thread George Michaelson

On 21/02/2013, at 6:46 AM, Mark Andrews ma...@isc.org wrote:

 
 While I think we should adopt the document I have grave concerns
 about it.
 
 * there is no demonstrated need for it.

thats opinion, not fact Mark. 'demonstrated need' stems from other people's 
desires.

you might as well come out and say you think AS112 has no demonstrated need, as 
say this draft has no role in administration of AS112.

I tend to another opinion. I think this draft identifies a sensible path to 
making AS112 servers respond the way we want.

 * it is likely to interact badly with validating resolvers especially
  when there are lots of labels in the qname below the delegation to
  these servers.

AS112 is designed to offer a quick termination of query hunting to a non-value. 
Can you explain how this fails to be satisfied by a wildcard response, when we 
are seeking to divert a query WHICH CANNOT BE ANSWERED IN THE WIDER NET to a 
'not' answer? 

the internal side of anyone who has valid delegation of a domain which has hit 
an AS112 can have as much DNSSEC as they want. its everyone else, who sees the 
sideblow queries who needs this.

I am probably being thick. can you do an illustrative instance of what you mean 
here?


 * it changes the response from NXDOMAIN to NOERROR NODATA.

And why is that wrong ? I dont understand what you see as the outcomes. more 
query? bad DNS? load?

 
 If we have to build special servers can't they periodically transfer
 a list of zones they need to serve rather than return what is
 essentially the wrong answer?

the back-end administration has proved fraught.

btw, I continue to collect data on the volume of ULA, link-local, teredo 
traffic in reverse, and it continues to grow..

-George

 
 Mark
 -- 
 Mark Andrews, ISC
 1 Seymour St., Dundas Valley, NSW 2117, Australia
 PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
 ___
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-21 Thread Mark Andrews

In message f42adb61-fcf4-47b3-8062-745d136d8...@algebras.org, George Michaels
on writes:
 
 On 21/02/2013, at 6:46 AM, Mark Andrews ma...@isc.org wrote:
 
  
  While I think we should adopt the document I have grave concerns
  about it.
  
  * there is no demonstrated need for it.
 
 thats opinion, not fact Mark. 'demonstrated need' stems from other 
 people's desires.
 
 you might as well come out and say you think AS112 has no demonstrated 
 need, as say this draft has no role in administration of AS112.
 
 I tend to another opinion. I think this draft identifies a sensible path 
 to making AS112 servers respond the way we want.

  * it is likely to interact badly with validating resolvers especially
   when there are lots of labels in the qname below the delegation to
   these servers.
 
 AS112 is designed to offer a quick termination of query hunting to a 
 non-value.
 Can you explain how this fails to be satisfied by a wildcard response, 
 when we are seeking to divert a query WHICH CANNOT BE ANSWERED IN THE 
 WIDER NET to a 'not' answer? 

It's not a wild card response.
 
 the internal side of anyone who has valid delegation of a domain which =
 has hit an AS112 can have as much DNSSEC as they want. its everyone =
 else, who sees the sideblow queries who needs this.

It's the impact on those that are validating but don't have default
local zones of equivalent.

There a 30 delegations between d.f.ip6.arpa and the full reverse
of a ULA under this proposal.  Hunting for missing DS records will
hit every one of them.

 I am probably being thick. can you do an illustrative instance of what 
 you mean here?
 
 
  * it changes the response from NXDOMAIN to NOERROR NODATA.
 
 And why is that wrong ? I dont understand what you see as the outcomes. 
 more query? bad DNS? load?

For much the same reason that *.COM was bad.  You *will* break things
that you are unaware of.
 
  If we have to build special servers can't they periodically transfer
  a list of zones they need to serve rather than return what is
  essentially the wrong answer?
 
 the back-end administration has proved fraught.
 
 btw, I continue to collect data on the volume of ULA, link-local, teredo 
 traffic in reverse, and it continues to grow..

And the traffic stats are where?
The analysis of the recursive servers that are sending this traffic is where?
Vendor, version, isp.
Is it worth adding the terado prefix to locally served zones registry?

 -George
 
  
  Mark
  -- 
  Mark Andrews, ISC
  1 Seymour St., Dundas Valley, NSW 2117, Australia
  PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
  ___
  DNSOP mailing list
  DNSOP@ietf.org
  https://www.ietf.org/mailman/listinfo/dnsop
 

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-20 Thread Mark Andrews

While I think we should adopt the document I have grave concerns
about it.

* there is no demonstrated need for it.
* it is likely to interact badly with validating resolvers especially
  when there are lots of labels in the qname below the delegation to
  these servers.
* it changes the response from NXDOMAIN to NOERROR NODATA.

If we have to build special servers can't they periodically transfer
a list of zones they need to serve rather than return what is
essentially the wrong answer?

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-19 Thread Erik Kline
I know I'm late, but for what it's worth I'd support this.

I'm happy to help, if possible.  Perhaps I can sync with Warren et
alia in person in Orlando.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-18 Thread Peter Koch
Dear WG,

 Please respond by the end of next week, so that we could ask future
 editors to submit a renamed -00 version by Monday, Feb 18.

thanks to all who responded and especially to those three volunteer
reviewers.  However, we've not met the 5 reviewer threshold, so your
chairs agreed the WG might want to spend a bit more time given that
interest was signalled.  The current authors are encouraged to fold
in comments they received on this list and also we'd like to see
discussion on content so that there might be a broader base next time.
We will be going to start negotiating goals and milestones with our new AD
in Orlando and will keep this topic in mind, but we also need a strong
WG commitment to work on a draft.

This means we'll not have a draft-ietf-dnsop-as112-omniscient this
time, but no more, no less: nobody should be discouraged from making
comments on this draft, the floor remains open.

Best regards,
  Peter (as DNSOP co-chair)
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-17 Thread Lindqvist Kurt Erik

On 9 feb 2013, at 21:45, Peter Koch p...@denic.de wrote:

 the topic of AS112 has been addresses in the DNSOP WG resulting in
 RFCs 6304 and 6305 and is also related to 'local zones' as described in
 RFC 6303.
 
 The question of extending AS112 service to IPv6 (as in transport)
 as well as the maintainability of the list of zones served by AS112
 systems has been discussed before.  We have a proposal in
 
   draft-wkumari-dnsop-omniscient-as112-01.txt
 
 to make the AS112 served zone set extendable in the future.
 Please read the draft and state whether you think this is something
 the WG - and you in particular - would want to work on.  We'd like to
 find five volunteers for thorough document reviews to support the
 draft going forward - provided the overall response is positive.

Me too supports adoption!

Best regards,

- kurtis -




Best regards,

- kurtis -






signature.asc
Description: Message signed with OpenPGP using GPGMail
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-15 Thread Paul Ebersman

nick I like this and think it should be adopted as a WG doc.  Am not
nick going to volunteer for formal document review, but would be happy
nick to run + provide feedback for this sort of code in a live
nick environment.

I also support this being adopted as a WG document.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-15 Thread Christopher Morrow
On Fri, Feb 15, 2013 at 5:05 PM, Paul Ebersman list-dn...@dragon.net wrote:

 nick I like this and think it should be adopted as a WG doc.  Am not
 nick going to volunteer for formal document review, but would be happy
 nick to run + provide feedback for this sort of code in a live
 nick environment.

 I also support this being adopted as a WG document.

aolme too!/aol

seems like a great start.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-15 Thread Paul Hoffman
Sure, looks good. I'll review drafts.

--Paul Hoffman
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-13 Thread Warren Kumari

On Feb 9, 2013, at 3:45 PM, Peter Koch p...@denic.de wrote:

 Dear WG,
 
 the topic of AS112 has been addresses in the DNSOP WG resulting in
 RFCs 6304 and 6305 and is also related to 'local zones' as described in
 RFC 6303.
 
 The question of extending AS112 service to IPv6 (as in transport)
 as well as the maintainability of the list of zones served by AS112
 systems has been discussed before.  We have a proposal in
 
   draft-wkumari-dnsop-omniscient-as112-01.txt
 
 to make the AS112 served zone set extendable in the future.
 Please read the draft and state whether you think this is something
 the WG - and you in particular - would want to work on.  We'd like to
 find five volunteers for thorough document reviews to support the
 draft going forward - provided the overall response is positive.
 
 It is always very helpful if people could identify open questions in/w.r.t.
 the draft, but please don't forget to also state your opinion on adoption.
 
 Please respond by the end of next week, so that we could ask future
 editors to submit a renamed -00 version by Monday, Feb 18.

And just a note:

The last day for submission of a -00 is Feb18th, but the last day for adoption 
was the 11th.
So, if this is adopted, the authors can resubmit with a new name, but it 
approved till the cycle restarts…

• 2013-02-11 (Monday): Working Group Chair approval for initial 
document (Version -00) submissions appreciated by UTC 24:00.
• 2013-02-18 (Monday): Internet Draft Cut-off for initial document 
(-00) submission by UTC 24:00, upload using IETF ID Submission Tool.

W
 
 Thanks,
  Peter  Stephen
 ___
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop
 

--
What our ancestors would really be thinking, if they were alive today, is: Why 
is it so dark in here?

-- (Terry Pratchett, Pyramids)


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-13 Thread Peter Koch
On Wed, Feb 13, 2013 at 12:34:09PM -0500, Warren Kumari wrote:

 The last day for submission of a -00 is Feb18th, but the last day for 
 adoption was the 11th.
 So, if this is adopted, the authors can resubmit with a new name, but it 
 approved till the cycle restarts?
 
   ? 2013-02-11 (Monday): Working Group Chair approval for initial 
 document (Version -00) submissions appreciated by UTC 24:00.
   ? 2013-02-18 (Monday): Internet Draft Cut-off for initial document 
 (-00) submission by UTC 24:00, upload using IETF ID Submission Tool.

the time difference appears to be a leftover from pre-automation times. WG 
chairs can
use automated tools to approve or even pre-approve a WG -00 submission, i.e., 
this will
not be a process road block.

-Peter
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop