A couple clarifying questions and remarks inline. On Fri, Oct 16, 2009 at 10:42:05AM +0800, YAO Jiankang wrote:
> if we dname is used in the root, all dns administrator of the names below the > TLD should have the dname knowledge. Ah, so your worry is that, if we have example. and variantexample. DNAME example, then if anyone configures www.somedomain.variantexample, it will be occluded? Yes, that's true. But it seems to me that this is actually a _reason_ to prefer the DNAME approach rather than not. For if we simply have two delegations (example NS, variantexample NS) then we'll also have the problem that someone could easily configure www.somedomain.example A 1.2.3.4 and www.somedomain.variantexample A 2.3.4.5, and there would be nothing at all to prevent this. This is in fact exactly why I think the DNAME approach is the only reasonable one. Otherwise, what happens is that we just create alternative namespaces. There is simply no way to prevent that under plain delegations, and there's certainly no way to test it. > since root is very important, its running need stable technology. > any technolgy that may cause some problems or lead to some potential > problems in the future should be evaluated in detail. if the rooth > has the problems, it will impact the whole internet. only single > domain name's problem is a single domain's problem; it will not > impact the whole internet. I completely agree, but the draft has nothing like an argument in it to the effect that there is anything "unstable" about DNAME. If you want to make that argument, it is open to you; but at the moment the argument really just consists of vague suggestions that something might be bad. We cannot make operational decisions simply on the basis of fear, uncertainty, and doubt. If there's a real problem with the protocol itself, you need to make the argument, and not just say, "Well, maybe there could be a problem someday." There _could_ be a problem with any RRTYPE. For instance, someone decided to overload A records in order to indicate spam sources; that's not a reason never to use A records. > > (3) is not, so far, an argument we have been hearing from the root > > nameserver operators. But in any case, this is a load and > > provisioning issue, and is not an argument that can properly be made > > about whether a given technology as such should be selected for a > > given purpose. It is rather a consideration that needs to be taken > > into account when someone makes a decision to support variant labels. > > in the future, there will have thousands of IDN TLD in the server; > one IDN TLD in the root may have little impact on the performance of > the root server. > > how about thousands of IDN TLD? I don't know, neither do you, and anyway we're not root nameserver operators. The right way to handle this is to point out the load issue, and then ask the operators of the name servers to say whether they can handle the projected increase in load. That would require, among other things, studying the number of cases where a 0-TTL CNAME would be generated. Therefore, this is a practical consideration that needs to be taken into account, and not a reason in itself either to reject or accept DNAME. I agree that the root operators need to look at this and their feedback will be important. But you can't use it as a premise that DNAME is necessarily the wrong choice, because you haven't shown that the load will seriously affect the root name servers. All you have shown is that it might; and that's not enough. Merely adding more records will _also_ affect the root name servers. Is that therefore reason to conclude, out of hand, that we can add no more? Apparently not, if the recently published study is to be believed. > > the premise can be generalized: if someone makes a future change that > > is incompatible with the existing deployed DNS, then the existing > > deployed DNS might break. This is trivially true, but not a useful > > guide to practical action. > > it may be trivial problem, but the trivial problem in the root may > impact the whole internet. the trivial problem in your domain name > may still be trivial. To clarify: I was not saying that the problem is trivial, but that the proposition, "If someone makes a future change incompatible with the existing deployed DNS, then the existing deployed DNS might break," is trivially true. The consequent is literally contained in the antecedent of the conditional sentence: the "incompatibility" in the first part _just means_ "might break" in the second part. This is related to the fear, uncertainty, and doubt I mentioned above: it's always true that someone could make a future incompatible change that breaks everything. But we rely on the protocol community not to do that. So if your argument depends on that premise, you have to show that the entire protocol community will take leave of its senses. (Now, some would argue that we have ample proof of such leave-taking; but that's an argument you need to make.) > my suggestion is that apply the NS in the root and apply the DNAME > in the second level. By "DNAME in the second level", I understood you to be suggesting that the root delegates variants by NS records, and then TLDs and below uses DNAME to support variants. But maybe you mean something else: the root delegates the variants via NS records, but on the child side at the apex all the variants but one are DNAMEs. If this is what you mean, then actually I don't think there's any difference in these approaches, provided that the parent enforces that the target of the variant NS has exactly the SOA and the DNAME at the apex. I wouldn't oppose a document that said that (although I think it would be tedious to support this arrangement). Best regards, A -- Andrew Sullivan a...@shinkuro.com Shinkuro, Inc. _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop