On Tue, Jun 12, 2007 at 07:10:27PM +0900, JINMEI Tatuya / 神明達哉 wrote:>
> Thanks for the update. I've read the 03 version, and found that most > of my previous comments > http://www1.ietf.org/mail-archive/web/dnsop/current/msg05418.html > were not actually addressed (or perhaps ignored or rejected?). Thanks for your review. We considered each of your comments carefully, and made changes to the text to address them where it seemed correct to do so. (At the bottom of this message, I'm including a detailed outline of whether and how the document changed in response to each of your comments. Your comments have been extremely valuable, and I'm distressed to learn that you think we are silently ignoring them. I apologise in advance that the responses make this message a little long.) > In > particular, I now more strongly wonder why this document still keeps > the strong recommendation: > > all IP addresses in use within a range should have a reverse mapping. Note that, because someone has pointed out (and I missed) the ambiguity in "in use", this sentence has to change anyway. But I observe three things here. First, the sentence says "should" not "SHOULD", so I'd argue that this is not as strong a requirement as you seem to think. Second, the sentence begins with, "Unless there are strong counter-considerations. . . ," which rather softens the meaning some more. It strikes me that one could easily argue that "expense" is a strong counter-consideration, in the event the expense is high enough. Finally, the paragraph also includes some entirely new text at the end which was intended precisely to address your previous comments: This principle is also not intended to impose undue burden on network operators. It is nevertheless worth considering that not all benefit from an administration practice accrue to the administrator of a network. The consumers of reverse mapping data are often not the operators of the network that provides the reverse mappings. Users of reverse mapping data report that it is valuable to them. In your comments before, you noted that we need a convincing reason why a practice should be followed if it imposes any cost. In the text above, there is given a reason; if it is not convincing to you, and you think the cost is too high, then it seems to me that you might have a counter-consideration to implementing reverse mappings (that would be the "undue burden"). > convincing reason for the strong suggestion in this version. Is there > any specific reason that we cannot make the statement more moderate > like this? > > it is encouraged for a network administrator to provide a reverse > mapping for IP addresses in use within a range when the management > cost is acceptable for the administrator. The problem I have with that formulation is that management cost is not the _only_ counter-consideration that ought to be in place. The document already lists another example -- where the cost is imposed on the operation of the DNS as opposed to the pocketbook of the operator. Moreover, there is little to distinguish, "Do this if the cost is acceptable to you," and, "Do this or not; it's up to you." If the document is really going to say that it makes no difference whether you maintain reverse mappings, then I don't think we should bother saying anything: we'll get the situation we have today anyway. In addition, after the -03 draft was posted, I received a comment from another list pointing out that there is already an RFC that says you should implement reverse mapping: RFC 1912. In section 2.1, it says Make sure your PTR and A records match. For every IP address, there should be a matching PTR record in the in-addr.arpa domain. If a host is multi-homed, (more than one IP address) make sure that all IP addresses have a corresponding PTR record (not just the first one). Failure to have matching PTR and A records can cause loss of Internet services similar to not being registered in the DNS at all. Also, PTR records must point back to a valid A record, not a alias defined by a CNAME. It is highly recommended that you use some software which automates this checking, or generate your DNS data from a database which automatically creates consistent data. I would argue, therefore, that the current draft is something of a softening of the position taken in RFC 1912. (It's also pretty clear that the draft needs to be updated to take the above passage into account. Thanks to Bruce Gingery on spam-l for this.) I hope the above addresses your concerns in this area. Below is my outline of how the draft changed between -02 and -03 to try to address your other helpful comments. The bulk of your comments were in http://www1.ietf.org/mail-archive/web/dnsop/current/msg05411.html, I believe. > - Section 1.1 > If the intent of this document is to recommend one *should* provide > reverse mappings, this section clearly says so instead of the vague > wording like "provide some guidelines". In -03, this section was updated to include, "suggests that site administrators implement reverse mappings in the absence of strong counter-considerations. . .". The use of the word "suggests" is intentional, again to avoid any confusion with standards-words and to ensure that the document is clearly not imposing a requirement on operators. > - Section 1.2 > I guess the IESG will suggest not using "NXDOMAIN" since it's an > implementation specific term (actually I was told that when I > edited RFC4074). Section 1.2 (and other mentions) changed from NXDOMAIN to Name Error. > - Section 1.3 [. . .] > What are "useful" reverse mappings? I'd rather remove this word, then > it will be a mere fact and clear to read. The word "useful" is unpacked to use the terminology already defined in the document. Also, > I don't think it's very clear that [RFC4255] could benefit from > matching reverse mapping. In fact, it does not mention DNS reverse > mapping at all (while the other two do). If we want to include > [RFC4255], I suggest adding some text that explains how it could > benefit from reverse mapping. I asked about the relevance of reverse mappings to RFC 4255, and it was approximately as I thought: reverse mappings can be useful as one more check that you are getting the data you think you are, particularly in the presence of the DNS Security extensions. I wasn't able to convince myself that explicating every example in the document would be a good idea; the document is already kind of fat for what it is, and I was afraid that adding an explanation of the way this might work would just be distracting. I did try two or three times to write it up in a compact but suitably clear way, and failed. If you really object strongly to the mention of RFC 4255, I can take it out in the -04 draft, because the other two examples probably suffice. > - Section 3.1 [. . .] > I think this note is too generic to make "informed decisions". I > suggest adding how these are ineffective or even harmful for each > case. In order to make the text in each case more focussed on the topic, we broke apart the discussion of what happens and the discussion of whether the check in question is actually effective. The effectiveness discussion does not address each use of reverse mappings, but treats them as classes of use and then discusses whether that class of use actually achieves its goal. We hope this makes the point more clearly that reverse mapping _alone_ offers at best a very weak piece of positive evidence for a conclusion. (Note that the negative evidence case might be different.) > - Section 3.1 [. . .] > As I pointed out in my comments on the previous version, this is > unfair or misleading. I'd rather make a new section "Examples of > effects of relying on reverse mapping", and put this example there, > without being specific to the "missing" case. We simply removed this section. It seemed to be attracting too much dissent for its importance in the discussion. > - Section 3.1 > Traceroute output [. . .] > I commented for the previous version that this did not seem accurate. > There are "may"s added in this version, but I don't think they address > the concern. The section is altered to say this: Traceroute output with descriptive reverse mapping proves useful when debugging problems spanning large areas. When this information is missing, the traceroutes can take longer, and those performing troubleshooting are left without useful hints. The "additional steps" section is here more concrete, and notes the exact benefit that accrues to the user of the reverse mapping. > - Section 3.3 [. . .] > I suggest adding some more text that explains why it's less pressing > in practical. We added "because the number of addresses affected is different" to the sentence, to spell out what the practical difference is. [. . .] > than 20010db81111...abcd.example.com). Overall, the effectiveness > of this approach [for hiding] should be discussed more carefully, > and in a more pragmatic way. The text as it is accords with the recommendation in draft-ietf-v6ops-scanning-implications-03, which discusses the "hiding" approach more thoroughly. Do you think we should add a reference to that draft? I have resisted that because this document has dragged on a long time, and I'd like not to hold it up with a possible downref, but if you really think the reference is needed we can add it. > - Section 4.1 > In general, the DNS response [. . .] > This sentence sounds indirect and vague to me. In particular, I'm not > sure if I understand the phrase of "what is supposed to be seen at the > address". This was text lifted directly from the list (contributed by Ed Lewis, if memory serves). It just means that, from any place on the Internet, there is a right answer to every query _for that querier_. That isn't to say that there is always one universally right answer to every query at a given time. (Note that this moved to section 4.2 in -03, because of the addition of another subsection.) > - Section 4.1 > It is desirable that Regional [. . .] > I'd like to see why. (As part of my main concern) For the reasons noted in my main argument above as to why we want to encourage reverse mappings. Note that this is merely "encourage", not "require". > - Section 4.1 [. . .] > In addition, it's not clear to me what "all IP addresses in use" > means. For example, if I manage an IPv6 subnet > "2001:db8:1111:2222::/64", are "the all addresses in use" the > addresses from 2001:db8:1111:2222:0000:0000:0000:0000 to > 2001:db8:1111:2222:ffff:ffff:ffff:ffff? Or does that only mean IPv6 > addresses assigned to existing hosts in that subnet? If the latter, > does that include IPv6 addresses configured via stateless > autoconfiguration and often missing from the network? What about IPv6 > temporary addresses? I realise in retrospect that I didn't understand this comment properly when reading it, on the basis of another message that I overlooked (I misfiled it) when working on the revisions. See my other message on this topic. I will send a proposed change to the text to the list. I apologise to you and the rest of the working group for being obtuse on this point. > - Section 4.2 [. . .] > I cannot be sure what "functions that depend on reverse mapping" > specifically indicates. An example might be helpful here. We are getting concerned about the length of the document, so didn't include another example. I suppose an obvious feature would be the display of hostnames discovered by way of the reverse map. Do you really think an example is needed? > I think this is too weak. Comparing to the strong "recommendation" in > the previous section that does not explain why, this part provides the > reason, so I think the recommendation can/should be tightened > accordingly. Referring to the text in the Security Considerations > section, my suggestion is: I don't understand how "no real security" is too weak. The Security Considerations section already says that people should use better forms of authentication, and it seemed to me that your proposed text was a security consideration about the use of reverse mapping itself, and not about the document or its application. (Maybe I'm just misunderstanding). The -03 draft is intended to make the "effectiveness" section clearer and cast in a greater light. > I'd also point out even the use of reverse mapping as a scoring system > can be controversial. I was unable to find a controversy around reverse mapping used in scoring systems, or even _any_ criterion used in scoring systems. The idea of scoring systems seems to be that you set the bases on which you wish to score, and then evaluate according to those criteria. The draft as it is has a fairly extensive discussion of the ways in which too great weight placed on non-matching or missing reverse mappings can cause "false positives". Every anti-spam person I talk to tells me that using reverse mapping in scoring is a very good, but not perfect, measure of spamminess. I have never met anyone actually operating a mail server who has given me a different opinion, but I'd be happy to hear from such people if they are out there. > I don't understand the logic of this sentence. This sounds as if > complete connection rejection on the basis of missing reverse mapping > will be encouraged (or at least not discouraged) when reverse mapping > is universal. But in my understanding the essential problem of this > approach is "the use of the reverse tree provides no real security, > (and) can lead to erroneous results". This should still apply even if > "reverse mapping is universal". It doesn't actually say what you suggest it does -- "Not X until Y" means that Y is a necessary condition for X, but doesn't say Y is a sufficient condition. In any case, the point of the section is to discourage very strongly complete connection rejection on the basis of missing reverse mapping, until every host on the Internet has a reverse mapping. Since "heat death of the Universe prior to universal reverse mapping" is probably a safe bet, we thought this was enough. I didn't like the alternate text you provided because it seemed to lean on the argument that, since reverse mappings are not positive proof, therefore they're not useful negative proof. I don't think that's true in every case, and therefore we can't use it as a premise. Thank you again for your detailed reviews and helpful comments. I hope the above demonstrates the ways in which your review has strengthened the document; and explains, where your specific suggestions were not incorporated, why another path was taken. Best regards, Andrew -- Andrew Sullivan 204-4141 Yonge Street Afilias Canada Toronto, Ontario Canada <[EMAIL PROTECTED]> M2P 2A8 jabber: [EMAIL PROTECTED] +1 416 646 3304 x4110 _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www1.ietf.org/mailman/listinfo/dnsop