Hi Brian,
Thanks for your feedback on ANAME. Comments inline.
On 01-11-18 23:34, Brian Dickson wrote:
Greetings, DNSOP folks.
[...]
First, there is the issue of imposed update frequency.
The requirement on update rate, is imposed externally by whichever
entity operates the ANAME target. In other words, this is not under the
direct control of the zone operator, and is potentially a potentially
(and very likely) UNBOUNDED operational impact/cost.
As John already pointed out: You are in control of the update rate. It
may be that the target address records are changing frequently, but it
is up to the one that processes the ANAME to set an appropriate update
rate. So I don't see this as a particular worry.
The draft uses DNS UPDATE as an example and that may be a useful
scenario for one, but a red flag for another. However I will use ANAME
and no DNS UPDATE and I think my implementation of ANAME is still
compatible with the specification.
What I would like to see be changed in the draft is that were ANAME
processing occurs is more relaxed: Currently it focuses on this
happening at zone provisioning time (before the zone is loaded by the
primary), and mentions an optimization algorithm for resolvers that is
optional. However, there is some text in section 5.2 Alternatives that
the ANAME processing can occur on secondary servers which I think may
fit your DNS infrastructure better.
The point is that this draft should standardize the way ANAME is
processed, while giving flexibility on where processing can occur.
Second, this issue is compounded by scale.
The issue here is, that the larger the entity is that operates zones
with ANAMEs is, the larger the resulting impact. This is a new,
unanticipated, asymmetric cost. It has the definite potential to make
operating authority servers prohibitively costly.
I don't see any difference with existing proprietary implementations:
This statement is true for any CNAME-at-the-apex solution.
Third, there is an issue with the impact to anycast operation of zones
with ANAMEs, with respect to differentiated answers, based on
topological locations of anycast instances.
There is currently an expectation on resolving a given name, that where
the name is ultimately served (at the end of a *NAME chain) by an entity
doing "stupid DNS tricks" (e.g. CDNs), that the answer provided is
topologically appropriate, i.e. gives the "best" answer based on
resolver (or in the case of client-subnet, client) location.
[...]
As I said above: I agree that the draft should relax where ANAME
processing can occur. I don't see any reason why this processing can be
done at the entity that does the stupid DNS trick.
[...]
ANAME places the authority servers in an anycast cloud, in a "Hobsons
choice" scenario. Either a single, globally identical sibling value is
replicated to the anycast instances (which violates the expectation of
resolvers regarding "best" answer), or each anycast instance needs to do
its own sibling maintenance (with all that implies, including on-the-fly
DNSSEC signing), or the anycast cloud now has to maintain its own set of
divergent, signed answers at the master, and add all the complexity of
distributing and answering based on resolver topological placement. (The
last two have significant risk and operational complexity, multiplied by
the volume of zones served, and impacted by the size of the anycast cloud.)
If you are going to do stupid tricks (aka tailored responses), you will
have to do on-the-fly DNSSEC signing anyway.
Side-note: we, as a community, have been pushing for wide-scale adoption
of DNSSEC; this definitely places a significant hurdle to adoption,
precisely in a wide-scale manner, i.e. to the vast majority of DNS
registrants. It is a big roadblock to DNSSEC adoption, and a move in the
wrong direction.
I disagree, I think it works pretty well with DNSSEC given the
requirement that ANAME processing should happen before DNSSEC signing.
This requirement is reasonable since ANAME processing is in the business
of tailoring RRsets and any changes made to the zone contents must
happen before signing.
What are the alternatives?
Fundamentally, the behavior that is desired that we are collectively
trying to preserve, is that of resolver-based *NAME chain resolution,
just with the ability to do so at the apex of a zone.
This points to the only logical places that MUST be part of any
apex-based chaining of resolution: resolvers, or clients.
John is right: It is very hard to rely on a solution that depends on
recursive name servers to be updated. Hence we look at a solution that
can be implemented at authorities.
Kind regards,
Matthijs
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop