On Tue, 21 Dec 2004, Iljitsch van Beijnum wrote:

>
> On 20-dec-04, at 17:32, Paul Vixie wrote:
>
> >>> 1. There should always be non-anycast alternatives
>
> >> I believe there is a strong consensus about that. And therefore a
> >> strong agreement that ".org" is seriously wrong.
>
> > i believe that icann/afilias/ultradns would be very receptive to input
> > from the ietf-dnsop wg on this topic.  but it's not cut and dried -- if
> > you have two widely anycast'd servers plus one non-anycast server "just
> > in case something bad happens to anycast" you're doing two questionable
> > things: (1) treating anycast as new/unstable/experimental which it's
> > not,
> > and (2) limiting your domain's availability to the strength of that one
> > non-anycast server.
>
> ??? How are things worse with two anycasted addresses and one
> non-anycasted address vs two anycasted addresses?

There seem to have been a few (and paul/joe/isc/rodney have FAR more
experience with this than I) different and 'interesting' failure modes for
anycast DNS services to date:
1) complete dns outage (software caused problem on all devices)
2) route damping due to flaps (maybe software, maybe hardware, maybe link,
maybe DoS)
3) inconsistency of dns data (perhaps not a problem at all)

The trouble as I've seen it has always related to 'view' more than
anything else. So, aside from a complete software basd outage, normally
.ORG (to use as an example) is up for larger portions of the Internet.
Often folks will report '.ORG is Down!!!' when they really mean: "The pod
of .ORG tld1 nearest to my location is down."

So, for most DNS applications you  really don't care if the /32 is
anycasted in BGP or is unicasted in BGP, you just care about reachability.
Anycast provides geographic diversity, robustness through that diversity,
resilience to single-network-problems (uunet can die while the anycast pod
on qwest is still 'ok') and 'quick response' (close response really) to
the end-users of the service. Making a mix of uni/anycast seems to not
really solve the problems above, it may solve other problems, but I
suppose that you'd have to scope and risk-analyze them to see how relevant
they are to the entire userbase. I'd venture that the original 'out of
sequence packets' problem falls down fairly low on the totem of
risk/reward, but that's a guess.

> Anycast can increase the number of physical servers, but this is also
> possible with more traditional clustering techniques or anycasting that
> stays outside BGP.

look at what anycast in  today BGP can get you in terms of geographic
diversity, closeness to the eyeball and stability of the overall
'service'. Then think about how to provision Paul's 10,000 10gb link
server farm... There is more than just 'clustering' to be done for DNS
services at the TLD/Root level (and the roots do all manner of oddball
versions of these things depending on their individual fancy as bill and
paul point out regularly)

>
> What I find surprising is that every IP address gets to query the
> roots, despite the fact that most addresses don't have any need to do
> this or know how to do it properly. It would make perfect sense to me
> that people would have to sign up for "root service" before they get to
> talk to the root servers. This way, all unknown addresses can be
> filtered out. (Or more practical, rate limited.) Obviously something
> like this would face deployment issues, but if we're serious about DDoS
> issues these kinds of options are the ones we should consider.
>

also keep in mind that not only the dns 'server' is under attack, as paul
pointed out, and others before him, link filler attacks are also
effective. So, block my /32 cable modem from quering a-m.root-servers.net,
but my packet still got to the upstream link(s) for
a-m.root-servers.net... the DoS was still effective in many cases :( Also,
the IAB might consider 'root query service' some form of 'end to end
filtering' and might not feel warm and fuzzy about that form of extortion.

> Another way to approach this would be for larger ISPs to connect to one
> or more roots using private peering. This gives those operators both
> the means and an incentive to keep such links free of clutter.

This also exists today... for many larger networks. Anycast extends that
capability and provides some more close 'partnership' with the
dns-service-provider and network-operator, or could in theory do that.

I'm leary of the 'anycast is bad' or 'anycast is good' discussions in
general. There are good applications of anycast, there are certainly
horrid ones (true pplb of all links inside a IGP with IGP anycast of a TCP
service could lead to some 'interesting' results) doing the risk analysis
and proper engineering will help get away from the 'bad' and to more of
the 'good' I hope.

On the PPLB front though, that is almost always done via the IGP since BGP
mostly holds a single next-hop (unless you non-default install it and deal
with the multipath 'features') So, unless you have 2 instances inside your
AS for an Anycast destination you really only go 1 path to the
destination.  Or more clearly, if you are on UUNET's network and want to
get to 'tld1.ultradns.net' you have to go through Verio (on the east coast
atleast) to get there and pplb really doesn't seem to matter for
'anycast', atleast no more than getting to 'www.sun.com' which is
'unicast' by sun...

-Chris

Reply via email to