Hello,

Thank you for your detailed comments.  I have some additional
questions and remarks below.

On Fri, Mar 28, 2008 at 03:28:17PM -0700, JINMEI Tatuya / 神明達哉 wrote:

> As a meta (and most substantial) level, this version still doesn't
> answer the fundamental question I asked a year ago: "why *should* one
> provide reverse mappings for all IP addresses they manage? (despite
> the cost of the provision)?".
> (see http://www.ietf.org/mail-archive/web/dnsop/current/msg05411.html)

In the current version, we have attempted to address this question in
two ways.

First, we do list a number of cases where people say they are using
the reverse tree, and it's useful to them.  As Brian Dickson says
elswhere in this thread, the simple fact is that there is no way to
tell whether there is existing or matching reverse without querying
for it.  To the extent that the reverse tree can be valuable, it
requires that people populate it and keep it up to date.

Second, the current version includes the following text in Section
4.2; it  is intended to address your objection, at least in part.

                    It is nevertheless worth considering that not all
   benefit from an administration practice accrues to the administrator
   of a network.  The consumers of reverse mapping data are often not
   the operators of the network that provides the reverse mappings.
   Users of reverse mapping data report that it is valuable to them.

(note that there's a typo in the published version: "accrue" rather
than "accrues".  I just fixed it in my local copy, now.)

The idea here is to remind people that the reason you _should_ do this
is because other people say they find the reverse map useful.  It is
true that there is an asymmetry of cost and benefit here; that's the
reason that we need the draft at all, I think.

> Since this document does not provide a convincing answer (at least to
> me) for the question of "why I should", I, as an operator, will still
> only provide reverse mappings as a best effort basis (i.e., I may not
> provide them even if there is no "*strong* counter-considerations").
> For example I won't provide reverse mappings if I simply cannot (or
> don't want to) afford the operational cost.  And I'm afraid I'm not

I tried to argue in
<http://www.ietf.org/mail-archive/web/dnsop/current/msg05563.html>
that the counter-consideration is ultimately one that operators are
going to have to evaluate themselves.  The same section 4.2 says
explicitly that the principle is not intended to impose an undue
burden on network operators.  

I agree, however, that

> just one of very few lazy operators; rather, I think a non negligible
> number of ordinary operators will take a similar action.  

many people may decide (unfortunately, in my opinion) that maintaining
the reverse will be too burdensome.  There's nothing anybody can do
about that, but I still think we should say that it would be better
overall if they would maintain the reverse mapping.

> On the other hand, since this document only requires "thinking
> carefully" about adopting (dubious) access control based on reverse
> mappings, operators who are currently deploying it will simply
> continue the operation, probably with quickly "thinking about it" as
> an excuse.  I'm also

I think the document does condemn relying on the reverse mapping,
particularly in section 4.3.

> afraid the unbalanced level of recommendations (i.e., "should provide
> reverse mappings" vs "are encouraged to think about it before using
> it") will give an excuse for such operators (revmap users) to continue
> it.  The end result will be a (continued) poor interoperability, and
> the "excuse" may even make it worse.

I think the context of the "think carefully" remark also suggests that
operators who don't want to maintain the reverse map need to think
carefully:

   At the same time, site administrators are cautioned that
   administrators at other sites sometimes use reverse mapping as one of
   several pieces of evidence in evaluating connection traffic,
   particularly in the context of mail systems and anti-spam efforts.

That section 4.4 is about usage and deployment, and the intent of that
section is to say, "If you're going to use this data, be very careful,
because the results may not mean what you think they mean; if you're
not going to provide the data, be aware that others may be making
decisions based on your non-provision of it."  Would a general
sentence of that sort at the beginning of that section help to clarify it?
 
> My interpretation from the discussions so far is that the issues are
> too subtle or controversial to provide a convincing reason for
> declaring a specific requirement with such a strong word as "should".

Please note that this is not an RFC2119 "SHOULD".  The document as it
is now does not refer to RFC2119 at all, because this document does
not create new requirements of any sort.  My understanding is that the
way one communicates as much in an Internet Draft is by not citing
RFC2119, but I'd be happy to be corrected.

> convincing reason will be ignored anyway.  Is there any reason we
> cannot adopt this text?  If this is something we can "live with", I
> sincerely request adopting it.

I attempted to reply to that request in
<http://www.ietf.org/mail-archive/web/dnsop/current/msg05563.html>.
The reason I have trouble with this is twfold.

First, the "administration cost is acceptable according to the local
policy" is, in my view, too narrow a condition.  I don't think it is
the only counter-consideration that should be in place: the reverse
map is useful to some people, according to what they say, but it can
only be useful if people maintain it.  Since there are costs to the
rest of the DNS (e.g. lookups that will never provide any data and
will slow operations) when the data is not provided, I argue that the
local cost is not enough.  

Second, I'm not sure what the difference is between, "Do this if the
cost is acceptable to you," and, "Do this or don't; it's up to you."
If that's what this document is going to say, then we should just keep
quiet and let the thing die; we'll get the same state of affairs as
actually obtains.  (Speaking only personally, I'd rather have a
document that says, "stop using the reverse tree; people can't be
bothered to maintain it," than a document that makes it all up to
local policy.)

I note that the existing draft already says that there are cases where
you should not provide a matching reverse for every forward map.

In spite of my objections, however, I would like guidance from the
Working Group: are there others who want to make the change as
suggested?  If there seems to be support, I will cheerfully make the
change.  The last time this was suggested, I did not hear many
expressions of support for it, so I left the text alone.
 
> One more possibly related thing: what does this document recommend
> about "matching reverse data"?  

The idea is that, if you maintain the reverse mapping, the mappings
will automatically match.  This is implicit in section 4.2:

   Unless there are strong counter-considerations, such as a high
   probability of forcing large numbers of queries to use TCP, IP
   addresses in use within a range and referenced in a forward mapping
   should have a reverse mapping.

But notice the caveat.  That caveat is made more explicit in section
4.4:

   Administrators are advised to keep in mind the effects of adding a
   very large number of PTR records for a given reverse mapping.

So, there should usually be matching reverse data.  But the draft
attempts to note that there will be at least some occasions in which
it is impractical to maintain the data this way.

> Section 3.2
> 
>    Reports from operators suggest that scoring mail on the basis of
>    missing or non-matching reverse mapping remains an imperfect but
>    useful measure of the likelihood that a given message is spam,
>    particularly in combination with other measures.  It is clear that
>    the presence of reverse mapping, and a match between the forward and
>    reverse zones, is neither a necessary nor sufficient condition for a
>    candidate message to be spam.
> 
> I'm not very much comfortable with a statement based on "some people
> say something" because it's difficult to assess its validity.  

If I understand this correctly, you mean, "Difficult to assess the
validity of the thing the people say," and not, "Difficult to assess
whether people actually have said that," (since people have made the
claim during the discussion about this document).  I don't know how to
assess the validity of someone's claim that a strategy is useful _to
them_.  Would this be better if we altered it to "Some operators
report that scoring mail on the basis. . ."?

> I'd rather like to see a solid reference that describes how exactly
> effective of this type of scoring is, both in terms of the ability of
> identifying spams and of the ability of avoiding false positives.

When I attempted to collect such references, all the spam-fighting
people told me that every reference I made would be obsolete within
months.  I'm happy to attempt this again, though, if others in the
working group also think it is a worthwhile thing to do.  Anyone?
 
> This is not related to DNS or reverse mapping specifically per se, but
> I think it's useful to show people who naively believe the power of
> reverse mappings that there are alternatives, which might be more
> trustworthy, for their purposes.

The draft already says, more than once, that you shouldn't rely too
heavily on the reverse mapping, particularly by itself.  I don't
especially see the value of adding specific examples of how not to
rely on the reverse mapping alone for every case, but I'm of course
willing to reconsider that position depending upon expressions of WG
support to say something different.

>    ... If such "hiding" is desirable, one possible alternative is to
>    provide reverse mapping for (a large segment of) the network in
>    question, and then use only a small number of the so-mapped hosts.
>    It should still be noted, however, that this approach may not
>    easily be realized with deployed implementations, and that
>    automatically generated host names that are often used in this
>    approach may make them useless. ...

I'm not opposed to adding this text (thank you for it), if there are
other expressions of support.  I do note that there is already text in
section 3.4 that makes a similar point:

   The much larger address space of IPv6 makes administration of reverse
   mapping somewhat daunting, in the absence of good tools to help
   administrators.  Some discussion of this issue can be found in
   [RFC4472], particularly section 7.

I also suggested previously that I'd be willing to put in a reference
to draft-ietf-v6ops-scanning-implications; at the time I was somewhat
uneasy with it, because I thought we were fairly close to WGLC.
That didn't happen as quickly as I expected, in fact, and I note that
draft-ietf-v6ops-scanning-implications is in the RFC Editor's queue.
So there won't be any problems with the reference anyway.  Would such
a reference help?

> Section 4.2
> 
>    In general, the DNS response to a reverse map query for an address
>    ought to reflect what is supposed to be seen at the address by the
>    machine initiating the query.
> 
> Maybe I'm too dull, but I've never succeeded to understand the meaning
> of this sentence (I asked the same question on a previous version of
> the draft, but this point has never been clarified).  In particular, I
> don't understand what this means: "what is supposed to be seen at the
> address by the machine initiating the query".  Can't this be more
> clarified?

I know we've never clarified this; I'm not sure how to do it and still
make readable text.  (Note that Ed Lewis contributed the original
text, and I don't want to put words in his mouth; any mistake here is
my fault, not his.)  The idea is this: when a query arrives at a DNS
server, there is some right answer to it.  This does not mean that
there is one absolutely correct answer to a particular query; for
instance, the answer to a query about 10.1.2.3 is going to depend on
the network on which it happens.  Similarly, in a split-brain
deployment, the answer to a query might depend on which address
receives the query.  But there is a right answer, and it's what the
administrator configured the server to give (or at least, what the
administrator would have configured the server to answer in the event
the administrator had done it correctly).  This is true of forward
queries, and it is also true of reverse-map queries.

>    Unless there are strong counter-considerations, such as a high
>    probability of forcing large numbers of queries to use TCP, IP
>    addresses in use within a range and referenced in a forward mapping
>    should have a reverse mapping.
> 
> I failed to understand this sentence.  Does this mean
> 
>    IP addresses that are
>       - in use within a range, and
>       - referenced in a forward mapping
>    should have a reverse mapping.

This is the intended meaning.  If there's a way to disambiguate it
from the other case, I'd be happy to include it.  

> or something else?  In either case, does this mean we don't have to
> provide reverse mappings for addresses that are NOT referenced in a
> forward mapping?

No.  We added this text exactly to address your previous objection
that the text appeared to be requiring that every IP address anybody
uses has to have a reverse map, which is absurd since every IP address
in use doesn't need to have a forward map.
 
> I also asked the precise definition of 'in use' (especially in the
> context of IPv6 stateless address configuration) in my previous
> comment, but it's still unclear in this version.

I'm sorry.  The point of the clarifiying remark was intended to make
that plain.  Probably, I've failed to grasp the complete context of
IPv6 stateless address configuration.  My impression is that, in a
stateless configuration case, you're pretty unlikely to have a forward
mapping.  Is that wrong?  I dealt with this as issue 17, and proposed
text in
<http://www.ietf.org/mail-archive/web/dnsop/current/msg05575.html>.
I'm sorry we still haven't clarified the issue. 

>    can be corrected by the provision by those providers of reverse
>    mapping; but until the day reverse mapping is universal, complete
>    connection rejection on the basis of missing reverse mapping should
>    be regarded as a last resort.

> > I don't understand the logic of this sentence.  This sounds as if
> > complete connection rejection on the basis of missing reverse mapping
> > will be encouraged (or at least not discouraged) when reverse mapping
> > is universal.  

I think this is a reasonable objection, but I also suspect that "the
day reverse mapping is universal" will never come.  Nevertheless, let
me see if we can do better.

> >   reverse mapping; but even if reverse mapping is more widely
> >   provided, complete connection rejection on the basis of missing
> >   reverse mapping should be generally discouraged, since the
> >   existence of a reverse mapping does not necessarily mean the owner
> >   of the address is legitimate.
> 
> Perhaps my suggested text is too biased toward discouraging the
> dubious use of reverse mappings, but at least I want to see something
> that is logically more understandable.

The reason I'm uncomfortable with your proposed text is that it seems
to say this: the reverse mapping is an inadequate positive proof,
therefore it cannot be used as evidence in a negative proof.  I think
that premise is false.

What about this:

   Some users continue to report difficulty in ensuring complete
   population of the reverse tree by upstream providers.  This situation
   could be corrected by the provision by those providers of reverse
   mapping; but even if that happened, because there is no way to be
   sure the reverse map is always complete, connection rejection on
   the basis of missing reverse mapping should be regarded as a last
   resort.

This text stays with the current point (that you shouldn't reject
connections because of missing reverse, because you can't be sure that
you're reacting to the right information) without drawing into this
paragraph other issues of the utility of the reverse mapping.  Does it
address your objection?

Again, thank you very much for your detailed comments and careful
review.  Your editors appreciate it.

Best regards,

Andrew

-- 
Andrew Sullivan
[EMAIL PROTECTED]
+1 503 667 4564 x104
http://www.commandprompt.com/
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to