Re: [DNSOP] New version of the DNS terminology draft

2015-01-21 Thread Paul Hoffman
On Jan 21, 2015, at 10:27 AM, Niall O'Reilly niall.orei...@ucd.ie wrote:
  I'ld suggest using the following text from RFC1034 (section 4.2.1):
  The authoritative data for a zone is simply all of the RRs attached to
  all of the nodes from the top node of the zone down to leaf nodes or
  nodes above cuts around the bottom edge of the zone.

Quoting directly from the source RFCs seems better, yes. Thanks!

--Paul Hoffman

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] New version of the DNS terminology draft

2015-01-21 Thread Niall O'Reilly
At Mon, 19 Jan 2015 14:16:47 -0800,
Paul Hoffman wrote:
 
 Greetings again. Andrew, Kazunori, and I have done a massive
 revision on the DNS terminology draft based on the input we got on
 the -00. We're sure we have further to go,

  So far, great job!

 but we wanted people to
 look over the new version and give feedback. Thanks!

[snip from http://www.ietf.org/id/draft-hoffman-dns-terminology-01.txt]
7.  Zones

   This section defines terms that are used when discussing zones that
   are being served or retrieved.

   Zone -- A unit of organization of authoritative data.

   [...]

   Authoritative data -- RRsets in the Answer section of a DNS response
   that has the AA bit in the response header set to 1.
[/snip]

  This seems to describe how Authoritative data must be marked in
  a DNS response, rather than to define Authoritative data.

  Besides, section 6.2.7 of RFC1034 shows a non-authoritative RR in
  the Answer section of a response which has the AA bit.

  I'ld suggest using the following text from RFC1034 (section 4.2.1):
  The authoritative data for a zone is simply all of the RRs attached to
  all of the nodes from the top node of the zone down to leaf nodes or
  nodes above cuts around the bottom edge of the zone.

  Best regards,
  Niall O'Reilly
  

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-21 Thread Paul Wouters

On Wed, 21 Jan 2015, Paul Vixie wrote:


even if changing TCP/53's connection semantics could be done without
creating new DoS vectors, the small number of DNS TCP initiators and
responders who will ever be upgraded


responders do not need to be upgraded for this, as we found out on this
list about two years ago when Mark Andrews patched dig and I ran a test
with that.


, would be able to adopt TCP/80
faster. many middleboxes assume that DNS is UDP-only, and a few no doubt
proxy the transaction in a way that hijacks the connection management
semantics in a way that would (a) pass your new signalling along, but
(b) not follow it.


What is the problem with if you are behind broken middleware, do DNS
like it it 1999 ? I don't see how that is a reason to start moving to
port 80.

Paul

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-21 Thread Paul Vixie


 Paul Wouters mailto:p...@nohats.ca
 Wednesday, January 21, 2015 8:38 AM
 On Wed, 21 Jan 2015, Paul Vixie wrote:

 even if changing TCP/53's connection semantics could be done without
 creating new DoS vectors, the small number of DNS TCP initiators and
 responders who will ever be upgraded

 responders do not need to be upgraded for this, as we found out on this
 list about two years ago when Mark Andrews patched dig and I ran a test
 with that.

a responder with a small file descriptor limit who ignores keepalive
signalling can easily see all of its tcp slots occupied, either by
persistent initiators, or by any extremely unskilled, low-investment
attacker.

 , would be able to adopt TCP/80
 faster. many middleboxes assume that DNS is UDP-only, and a few no doubt
 proxy the transaction in a way that hijacks the connection management
 semantics in a way that would (a) pass your new signalling along, but
 (b) not follow it.

 What is the problem with if you are behind broken middleware, do DNS
 like it it 1999 ? I don't see how that is a reason to start moving to
 port 80.

dnssec.

but, more importantly, persistent tcp is all we've got. RFC 6013 failed,
in the sense that the tcp-m WG chose not to give it the IANA resources
it would have needed. google's tcp-fastopen is at best unsecure. SCTP
seems to have jammed in the breach.

if we want (and we do want) to keep a hot path open between a dns
initiator and its pool of dns responders, then we need persistent tcp in
the HTTP/1.1 style, and we need a large number of tcp slots on the
responder, in the style of HTTP/1.1 responders.

the t-shirt is wrong. it's not cross out 'lets take it to the ietf' and
write 'just put it into dns'. rather, it's cross out 'lets assume that
our initiator has an internet connection' and write 'lets assume that
our initiator has a web connection'. the internet is older than the
web, but no longer larger than the web. just as ethernet was the RS232
of the 1990's, so now TCP/80 is the RS232 of the new century. i do not
love this fact, but i do recognize it.

-- 
Paul Vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] New version of the DNS terminology draft

2015-01-21 Thread Paul Hoffman
Thanks for the suggestions! However:

On Jan 21, 2015, at 6:52 AM, Colm MacCárthaigh c...@allcosts.net wrote:
 RRSet:  Are the RRs in an RRSet required to have different data? For
 types such as A//SRV/MX this makes sense, but maybe not for TXT. I
 also think views and other implementation specific features confuse
 things here. A user might have 10 A records defined for a given name;
 but if their DNS server returns one at a time (say it's using weighted
 round robin) - I don't think of the 10 as an RRSet; but rather it's 10
 RRSets. What's actually sent on the wire is what matters, I think.

Note that, when possible, our document is reproducing what is in the 
standards-track RFCs. You might want a different definition for a term, but if 
there is a non-confusing definition already, our document should use it. In 
this case, the RFC 2181 definition is refreshingly clear, and what you are 
describing would be a thing that is not an RRset and maybe should have a 
different term.

We are, in fact, making up some terms in the document, but only in cases where 
there is a well-known thing that doesn't have a term. I don't think your 
round-robin example is such a thing, but if others disagree and can come up 
with a new term, we can add it.

--Paul Hoffman
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] New version of the DNS terminology draft

2015-01-21 Thread Paul Vixie


 Colm MacCárthaigh mailto:c...@allcosts.net
 Wednesday, January 21, 2015 8:36 AM


 On Wed, Jan 21, 2015 at 7:25 AM, Paul Vixie p...@redbarn.org
 mailto:p...@redbarn.org wrote:


 if their server returns only one RR at a time, then there are ten
 RRsets, as you say. however, such a server would not be speaking
 the DNS protocol as defined, if it starts from a zone file or zone
 transfer where there is within the zone ten RR's for a given name.
 so, by definition, the current text is correct.


 If there are two zones for the same name, with different views, do the
 RRs of a given name and type in both zones form a single rrset? ...

views are outside of the protocol, and i don't think a dns terminology
document should talk about them at all.

 I don't think so. Zone files aren't a requirement of the DNS protocol
 either; and I don't think there's any case to be made that the
 configuration of multiple rrsets for the same name/type is not
 speaking the DNS protocol as defined.

to my credit, i wrote or a zone transfer. that means if you are
optionally receiving a zone (as defined in the protocol) or optionally
loading a zone file (as defined in the protocol), then the meaning of a
set of rr's in that zone transfer session or that zone file is as
described by the protocol, and if you subset that set of rr's when
sending a response to a query matching that name and type, then you are
acting outside of the protocol. in this case as in the above case, i
don't think a dns terminology document should describe things that are
outside of the protocol.

  

 Stealth server: this definition seems a bit contradictory. Starts out
 by saying it's a slave, but then says it can also be a master.

 in other words, what makes you a master is that someone is transferring 
 from you. the primary master is the only master that by definition cannot 
 also be a slave. the terms master and slave refer to protocol roles 
 within the AXFR/IXFR transaction.

 It might be worth updating the text to say is often also a master to
 make the non-exclusivity between master and slave a bit more clear. 

i think so too.

-- 
Paul Vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] New version of the DNS terminology draft

2015-01-21 Thread Tony Finch
Colm MacCárthaigh c...@allcosts.net wrote:

 TTL: It might be worth using the word 'maximum' in relation to the
 TTL; I think there is consensus that TTLs may be truncated.

Yes, due to memory pressure, server restarts, administrative fiat,
DNSSEC (RFC 4035 section 5.3.3), etc.

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
Humber, Thames, Dover, Wight, Portland: Southeast, backing east, 4 or 5,
occasionally 6 at first in Humber. Slight or moderate, but rough at first in
Portland. Showers. Good, occasionally moderate.___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-21 Thread Tony Finch
Paul Wouters p...@nohats.ca wrote:

 responders do not need to be upgraded for this, as we found out on this
 list about two years ago when Mark Andrews patched dig and I ran a test
 with that.

Not entirely true. Persistent TCP works but it needs some performance
engineering.

Responders need to be upgraded to handle queries concurrently and send
replies out-of-order, so that TCP performance is as good as UDP
performance. Both Unbound and BIND suffer from this (though BIND is being
fixed.)

They also need some web-server-style attention to TCP connection
scalability, e.g. by default BIND is limited to only 100 connections. It
should be reasonable to set it to 1 on servers that are relatively
modest by today's standards.

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
Tyne, Dogger, Fisher, German Bight: Southeast 4 or 5, occasionally 3 later.
Slight or moderate. Showers. Good, occasionally moderate.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-21 Thread Paul Vixie


 Ray Bellis mailto:ray.bel...@nominet.org.uk
 Wednesday, January 21, 2015 1:30 AM

 TCP/53 is already persistent, it just happens most clients don't take
 advantage of that feature.

if they did, then those initiators would either be a DoS from the
responder's point of view, or a DoS from other initiators' points of
view. we are a prisoner to the reasonable expectations of the billions
of devices that were created in the decades-long era of RFC 1034 section
4.2.2.

 The point of my draft is to permit signalling that the current
 connection should _not_ be persisted ;-)

i know. but the arrow of change does not point in that direction.
HTTP/0.9 was responder-close, and was thus able to be changed in
HTTP/1.1 to initiator-close unless and only unless Connection: close
was specified.

even if changing TCP/53's connection semantics could be done without
creating new DoS vectors, the small number of DNS TCP initiators and
responders who will ever be upgraded, would be able to adopt TCP/80
faster. many middleboxes assume that DNS is UDP-only, and a few no doubt
proxy the transaction in a way that hijacks the connection management
semantics in a way that would (a) pass your new signalling along, but
(b) not follow it.

-- 
Paul Vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] New version of the DNS terminology draft

2015-01-21 Thread Colm MacCárthaigh
On Wed, Jan 21, 2015 at 7:25 AM, Paul Vixie p...@redbarn.org wrote:

 RRSet: Are the RRs in an RRSet required to have different data? For
 types such as A//SRV/MX this makes sense, but maybe not for TXT. I
 also think views and other implementation specific features confuse
 things here. A user might have 10 A records defined for a given name;
 but if their DNS server returns one at a time (say it's using weighted
 round robin) - I don't think of the 10 as an RRSet; but rather it's 10
 RRSets. What's actually sent on the wire is what matters, I think.


 if their server returns only one RR at a time, then there are ten RRsets,
 as you say. however, such a server would not be speaking the DNS protocol
 as defined, if it starts from a zone file or zone transfer where there is
 within the zone ten RR's for a given name. so, by definition, the current
 text is correct.


If there are two zones for the same name, with different views, do the RRs
of a given name and type in both zones form a single rrset? I don't think
so. Zone files aren't a requirement of the DNS protocol either; and I don't
think there's any case to be made that the configuration of multiple rrsets
for the same name/type is not speaking the DNS protocol as defined.


  Stealth server: this definition seems a bit contradictory. Starts out
 by saying it's a slave, but then says it can also be a master.

 in other words, what makes you a master is that someone is transferring from 
 you. the primary master is the only master that by definition cannot also be 
 a slave. the terms master and slave refer to protocol roles within the 
 AXFR/IXFR transaction.

 It might be worth updating the text to say is often also a master to
make the non-exclusivity between master and slave a bit more clear.


-- 
Colm
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-21 Thread Christopher Morrow
On Wed, Jan 21, 2015 at 4:53 PM, John Heidemann jo...@isi.edu wrote:
 I don't see how DoS is an argument against TCP for DNS.  (Unless one
 assumes hardware and software at the servers is fixed to something like
 2004 standards.)  What am I missing?

What's the average client load expected (number of unique clients in
the timeout of the tcp connection expected) for an authoritative
server today? (say an enterprise hosted server, and then someone that
is a large domain aggregator)

What is the same curve for a recursive server? (again, a small
isp/enterprise vs a large provider)

What impact will changing to longer lived persistent tcp connections
have on hardware and network capacity planning?

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] MIXFR: Smaller IXFR in the DNSSEC case

2015-01-21 Thread Frederico A C Neves
On Fri, Jan 16, 2015 at 09:58:32AM -0800, Paul Vixie wrote:
 
  Olafur Gudmundsson mailto:o...@ogud.com
  Friday, January 16, 2015 7:51 AM
  ...
  One of the oldest ideas on that was from Andreas Gustafsson was to wrap
  XFR transmission inside compressed transmission.
 
 late BIND4 and early BIND8 had something called ZXFR that did this. it
 never worked out of the box, but frederico neves in brazil fixed it and
 had it running in production for his inter-site synchronization some
 time in the mid/late 1990's. it's worth asking him if it was worthwhile

This was late 1990's, in a time that we didn't have registry backend
journals, way before bind started providing ixfr-from-differences on
9.3, OSs still struggled with the long fat pipe problem and we happen
to have some secondaries on the 350ms vicinity... it was definitely
worthwhile. But today I guess in the same scenario a vpn based
transport solution would be easier.

 (noting, this was before incompressible DNSSEC signatures were added.)

True only for individual records. I guess the authors are aiming at
small zones and Olafur had this in mind when doing this comment. For a
even a few thousand records signed zone I see quite good compression
only taking in account RRSIGs RDATA.

Taking synchronization efficiency in perspective, reducing the amount
of redundant information, explicitly suppressing it, is the best
approach. MIXFR ideas are worth pursuing.

Fred

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-21 Thread Paul Vixie


 John Heidemann mailto:jo...@isi.edu
 Wednesday, January 21, 2015 1:53 PM
 On Wed, 21 Jan 2015 09:30:44 +, Ray Bellis wrote:

 I want to restate this, because people often confuse current practice
 with current specifications:

 DNS over TCP/53 is *already* persistent. No *protocol* changes are needed.

i disagree with your use of terms here. see below.

 *Implementation* changes, however, are needed:

 - clients need to not blindly close the connection after one request

 - clients and servers need to use well known implementation techniques
 (from HTTP) to get good performance---pipelining, processing requests
 in parallel, sending replies out-of-order (rfc5966), handling TCP
 fastopen (newly minited rfc7413).

at the moment, a tcp/53 initiator that assumes in-order response and
does not check the TXID works. the protocol neither permits nor forbids
this. the burden is either on the responder to be conservative in what
it generates in the presence of the ambiguous specification, or on
end-users to be able to upgrade their tcp/53 initiation software to be
more cautious in how it treats the answers.

similarly, a responder who aborts the tcp/53 session when pipelining is
seen (which is a common technique for spam defense on tcp/25, so,
unimaginable here) would have neither caused nor experienced any
operational problems related to that implementation choice from 1985 to
the present day, even though the specification was silent on the matter
of pipelining, neither forbidding it nor requiring that it be supported.

historically we say we don't want to break working configurations even
if their interpretation of the ambiguous specification is not to our
liking. and we treat the tightening up of the specification as a
protocol change even though by some reading the new behaviour was also
acceptable under the older more ambiguous specification.

you can see this principle in use here
https://tools.ietf.org/html/draft-vixie-dnsext-dns0x20-00:

 5.2. It is strongly urged that the DNS specification be amended to
 require that the question section from the request MUST be copied,
 exactly, bit for bit, into the question section of the response.  The
 DNS specification is silent on the matter of altering 0x20 bits in the
 question name when copying it from the request to the response, so, this
 change is within the spirit.

 A change to the specification is necessary because while such bit for
 bit copying happens to be nearly universal practice today, we must
 warn all future responder implementors that the 0x20 bits, while not
 significant for name matching, are now in use as a covert channel by
 the requestor, to itself. 

since this draft did not go forward, any responder which does not copy
the 0x20 bits of the QNAME is compliant, and any initiator who depends
on the copying of 0x20 bits being copied has to allow for this perfectly
reasonable interpretation of the existing, somewhat ambiguous,
specification.

in other words the installed base gets a seat at the table, and if
you're going to behave very differently in a way that older
implementations could reasonably refuse to interoperate with, it's your
problem, not theirs. and under those circumstances, a mandatory change
to how the other end interprets the older ambiguous specification is, in
effect, a protocol change.


 Paul Vixie replies:
 } if they did,
 [that is: if clients take advange of persitent TCP over port 53]
 } then those initiators would either be a DoS from the responder's
 point of view, or a
 } DoS from other initiators' points of view. we are a prisoner to the
 reasonable expectations of
 } the billions of devices that were created in the decades-long era of
 RFC 1034 section 4.2.2.

 You're saying TCP is inherently a DoS when used for DNS?

yes. well, TCP/53 is. TCP/80, with an appropriate RESTful/JSON API,
would be fine. as i've said every time someone has said to avoid
$problem, let's use TCP/53 as the primary transport, RFC 1035 section
4.2.2 is a mine field, and anyone at all can deny service to any
initiator who depends on tcp/53 service from anyone else at all. that's
why the fix to the Kaminsky bug was source port randomization, rather
than TCP/53.

 I don't get it. Some how the web community tolerates persistent TCP
 without
 falling over. And you've suggested DNS-over-HTTP is desirable. Won't
 that also create any DoS problems that stem from TCP?

no, it won't. i believe i spoke to this question in detail, down-thread:

 but, more importantly, persistent tcp is all we've got. RFC 6013
 failed, in the sense that the tcp-m WG chose not to give it the IANA
 resources it would have needed. google's tcp-fastopen is at best
 unsecure. SCTP seems to have jammed in the breach.

 if we want (and we do want) to keep a hot path open between a dns
 initiator and its pool of dns responders, then we need persistent tcp
 in the HTTP/1.1 style, and we need a large number of tcp slots on the
 responder, in the style of HTTP/1.1 responders.

[DNSOP] Reminder of the documents in the WG, and a nudge to review them

2015-01-21 Thread Paul Hoffman
Greetings again. This is a periodic reminder that the documents that this WG is 
working on, and may or may not be working on in the future, is at
 https://svn.tools.ietf.org/svn/wg/dnsop/doclist.html
It helps the WG chairs to know which documents have enough people willing to 
review them to move them forwards. If you would like to volunteer to be a 
reviewer for any of the documents, please let me know so I can list you.

If you want to add a document to the list, contact the WG chairs.

--Paul Hoffman, secretary

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Protocol Action: 'Child To Parent Synchronization in DNS' to Proposed Standard (draft-ietf-dnsop-child-syncronization-07.txt)

2015-01-21 Thread Wes Hardaker
Tim Wicinski tjw.i...@gmail.com writes:

 I wanted to thank all the folks who offered comments, edits, and text
 for this document.

Ditto!  Documents are always better after lots of feedback, so thank you
to everyone that contributed to the document.
-- 
Wes Hardaker
Parsons

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-21 Thread John Heidemann
On Wed, 21 Jan 2015 16:58:32 -0500, Christopher Morrow wrote: 
On Wed, Jan 21, 2015 at 4:53 PM, John Heidemann jo...@isi.edu wrote:
 I don't see how DoS is an argument against TCP for DNS.  (Unless one
 assumes hardware and software at the servers is fixed to something like
 2004 standards.)  What am I missing?

What's the average client load expected (number of unique clients in
the timeout of the tcp connection expected) for an authoritative
server today? (say an enterprise hosted server, and then someone that
is a large domain aggregator)

What is the same curve for a recursive server? (again, a small
isp/enterprise vs a large provider)

What impact will changing to longer lived persistent tcp connections
have on hardware and network capacity planning?

Those are good questions, and take some time to answer.  We try to speak
to them in a tech report
at http://www.isi.edu/~johnh/PAPERS/Zhu14b.html

It doesn't seem useful copy and past long quotes from that here, but the 
pointers are:

What's the average client load expected (number of unique clients in
the timeout of the tcp connection expected) for an authoritative
server today? (say an enterprise hosted server, and then someone that
is a large domain aggregator)

What is the same curve for a recursive server? (again, a small
isp/enterprise vs a large provider)

[Zhu14b], figure 3a and 3b, with discussion in section 5.3.

What impact will changing to longer lived persistent tcp connections
have on hardware and network capacity planning?

See section 5.2 about memory usage, and appendix H for a long discussion
about deployment issues.

   -John Heidemann

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] I-D Action: draft-ietf-dnsop-rfc6304bis-05.txt

2015-01-21 Thread internet-drafts

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Domain Name System Operations Working Group 
of the IETF.

Title   : AS112 Nameserver Operations
Authors : Joe Abley
  William F. Maton Sotomayor
Filename: draft-ietf-dnsop-rfc6304bis-05.txt
Pages   : 25
Date: 2015-01-21

Abstract:
   Many sites connected to the Internet make use of IPv4 addresses that
   are not globally unique.  Examples are the addresses designated in
   RFC 1918 for private use within individual sites.

   Devices in such environments may occasionally originate Domain Name
   System (DNS) queries (so-called reverse lookups) corresponding to
   those private-use addresses.  Since the addresses concerned have only
   local significance, it is good practice for site administrators to
   ensure that such queries are answered locally.  However, it is not
   uncommon for such queries to follow the normal delegation path in the
   public DNS instead of being answered within the site.

   It is not possible for public DNS servers to give useful answers to
   such queries.  In addition, due to the wide deployment of private-use
   addresses and the continuing growth of the Internet, the volume of
   such queries is large and growing.  The AS112 project aims to provide
   a distributed sink for such queries in order to reduce the load on
   the corresponding authoritative servers.  The AS112 project is named
   after the Autonomous System Number (ASN) that was assigned to it.

   This document describes the steps required to install a new AS112
   node and offers advice relating to such a node's operation.

   This document obsoletes RFC6304.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-rfc6304bis/

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-dnsop-rfc6304bis-05

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-rfc6304bis-05


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] DNSKEY RRset size and the root

2015-01-21 Thread David Conrad
Paul,

 Let me clarify things a bit,

Thanks very much for this note. The issue of the ZSK length is something that 
has popped up on various radars on various occasions and given the recent 
publicity over at imperialviolet and sockpuppet on 1024 bit RSA, it'd be good 
to explore this in more detail to see what level of nightmare we'd be 
inflicting upon ourselves (if any).

 In other words, which ever clients cannot handle a root ZSK of 2048
 already has a severe problem with DNS. I don't think we would be adding
 much of a problem by just switching to 2048 today.

While I tend to agree, this assumes the clients would notice, which obviously 
depends on the names being looked up. Do you have any idea of (say) the 
popularity of the names behind large RRsets (e.g., their Alexa ranking or 
something similar)?

 Of course, once you believe we can do a ZSK of 2048, there is no urgency
 to move to ECDSA and we can wait on the CRFG to come up with a non-DSA
 ECC algorithm for us.

Yep. I'd really like to go to ECDSA, but it doesn't look like there is enough 
support out there for it (at least for root purposes).

 So unless Australia is not reachable by a significant portion of the
 world doing DNSSEC, the root is not going to see an issue either.

According to http://w3techs.com/technologies/overview/top_level_domain/all 
(random stats site select by closed eye googling, no idea whether their 
methodology is reasonable), .AU represents 1% of websites.  If 20% of DNS 
queries are doing DNSSEC lookups, and a small fraction of those are behind 
broken middleboxes that puke on large RRsets, I can (barely) see an argument 
that the universe is too small to make a reasonable determination...

I guess a larger question is do we care?.  I'll be honest and say I'm 
increasingly concerned that broken middleware-driven ossification is getting in 
the way of fixing serious problems.

Regards,
-drc



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Kathleen Moriarty's No Objection on draft-ietf-dnsop-dnssec-key-timing-06: (with COMMENT)

2015-01-21 Thread Kathleen Moriarty
Kathleen Moriarty has entered the following ballot position for
draft-ietf-dnsop-dnssec-key-timing-06: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to http://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
http://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-key-timing/



--
COMMENT:
--

Please move Appendix A into section 1.3 as it would be better to have all
terms, symbols, and variables used in the draft defined in the
terminology section.  Russ Housley noticed this and I agree with him in
that it would be good to fix.

In 1.4 should this include key sizes as well since they are not
discussed?  I see the explanation in section 5 and am just wondering if
the procedures are the same when key properties change as opposed to
expiration and revocation, which are both mentioned in the draft.

The SecDir review found a few nits you should probably fix as well:
https://www.ietf.org/mail-archive/web/secdir/current/msg05318.html


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-21 Thread John Heidemann
On Wed, 21 Jan 2015 09:30:44 +, Ray Bellis wrote: 

 i realize that no votes aren't counted. but that's going to be my input if 
 any document along the lines of adding persistence to tcp/53 is adopted by 
 the WG. so, for full disclosure, i wanted to weigh in at this stage.

TCP/53 is already persistent, it just happens most clients don't take 
advantage of that feature.

The point of my draft is to permit signalling that the current
connection should _not_ be persisted ;-)

I want to restate this, because people often confuse current practice
with current specifications:

DNS over TCP/53 is *already* persistent.  No *protocol* changes are needed.

*Implementation* changes, however, are needed:

- clients need to not blindly close the connection after one request

- clients and servers need to use well known implementation techniques
  (from HTTP) to get good performance---pipelining, processing requests
  in parallel, sending replies out-of-order (rfc5966), handling TCP
  fastopen (newly minited rfc7413).

(We've measured and reported the performance differences here before.)

Paul Vixie replies:
} if they did,
[that is: if clients take advange of persitent TCP over port 53]
} then those initiators would either be a DoS from the responder's point of 
view, or a
} DoS from other initiators' points of view. we are a prisoner to the 
reasonable expectations of
} the billions of devices that were created in the decades-long era of RFC 1034 
section 4.2.2.

You're saying TCP is inherently a DoS when used for DNS?

I don't get it.  Some how the web community tolerates persistent TCP without
falling over.  And you've suggested DNS-over-HTTP is desirable.  Won't
that also create any DoS problems that stem from TCP?

I don't see how DoS is an argument against TCP for DNS.  (Unless one
assumes hardware and software at the servers is fixed to something like
2004 standards.)  What am I missing?

   -John Heidemann

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-21 Thread Ray Bellis

 i realize that no votes aren't counted. but that's going to be my input if 
 any document along the lines of adding persistence to tcp/53 is adopted by 
 the WG. so, for full disclosure, i wanted to weigh in at this stage.

TCP/53 is already persistent, it just happens most clients don't take advantage 
of that feature.

The point of my draft is to permit signalling that the current connection 
should _not_ be persisted ;-)

kind regards,

Ray

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-21 Thread Wessels, Duane
I agree with Paul Hoffman.  While I think draft-ietf-dnsop-edns-tcp-keepalive is
good, even the simpler draft-bellis-dnsop-connection-close would be much
better than the current situation, so I support its adoption.

DW


On Jan 20, 2015, at 11:21 AM, Paul Hoffman paul.hoff...@vpnc.org wrote:

 On Jan 20, 2015, at 7:37 AM, Tim Wicinski tjw.i...@gmail.com wrote:
 
 draft-ietf-dnsop-edns-tcp-keepalive is a reasonable document, but 
 draft-bellis-dnsop-connection-close achieves a great deal at a very low cost. 
 If we drop draft-ietf-dnsop-edns-tcp-keepalive (which seems likely if the 
 authors don't want to pursue it), we should adopt 
 draft-bellis-dnsop-connection-close and answer the many questions in the 
 draft.
 
 --Paul Hoffman
 ___
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-21 Thread Paul Wouters

On Tue, 20 Jan 2015, Paul Vixie wrote:


my input is not a direct answer to either question, but, may be relevant.

my view is: we can't reliably signal this capability, so any option we
pursue will create a DoS vector for either new or old initiators or
responders, and the right answer is to pursue DNS-over-HTTP as an
alternate transport that already has TCP persistence built into it. i
also note that we've got a JSON layout for DNS messages now, thanks to
bortzmeyer and hoffman; and we've got a reasonably portable and high
quality DNS shim layer now, thanks to the getdns team. so: adding
DNS-over-HTTP would happen faster than revising TCP/53.


It would be really sad to relegate all ports but 80/443 to the realm of CHAOS.
And inevitably, the transparancy of port 80/443 would suffer as it
becomes the default demuxing point. But I know you know this, and still
you think it is the best way, so therefor sad.

tcp/53 is already out there and working on the recursors. Adding client
side support that proactively uses this should, for example in unbound
and bind, should be easier than implementing dns-in-xml-over-port-80-in-new-api
(just like I'm not a fan of dns-over-dbus-into-your-vm-and-back approach
of systemd-resolved)

I also think that draft-ietf-edns-querychain is a much simpler api than
the new getdns api, but I'm biased. And speaking of that draft, I will
process the reviews received on it and push out a an updated version.

Paul

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] New version of the DNS terminology draft

2015-01-21 Thread Paul Vixie


 Colm MacCárthaigh mailto:c...@allcosts.net
 Wednesday, January 21, 2015 6:52 AM


 RRSet: Are the RRs in an RRSet required to have different data? For
 types such as A//SRV/MX this makes sense, but maybe not for TXT. I
 also think views and other implementation specific features confuse
 things here. A user might have 10 A records defined for a given name;
 but if their DNS server returns one at a time (say it's using weighted
 round robin) - I don't think of the 10 as an RRSet; but rather it's 10
 RRSets. What's actually sent on the wire is what matters, I think.

if their server returns only one RR at a time, then there are ten
RRsets, as you say. however, such a server would not be speaking the DNS
protocol as defined, if it starts from a zone file or zone transfer
where there is within the zone ten RR's for a given name. so, by
definition, the current text is correct.

 Stealth server: this definition seems a bit contradictory. Starts out
 by saying it's a slave, but then says it can also be a master.

in http://www.rfc-editor.org/rfc/rfc1996.txt we see:

   1.3. This document intentionally gives more definition to the roles
   of Master, Slave and Stealth servers, their enumeration in NS
   RRs, and the SOA MNAME field.  In that sense, this document can be
   considered an addendum to [RFC1035].
...

   2.1. The following definitions are used in this document:

   Slave   an authoritative server which uses zone transfer to
   retrieve the zone.  All slave servers are named in
   the NS RRs for the zone.

   Master  any authoritative server configured to be the source
   of zone transfer for one or more slave servers.

   Primary Master  master server at the root of the zone transfer
   dependency graph.  The primary master is named in the
   zone's SOA MNAME field and optionally by an NS RR.
   There is by definition only one primary master server
   per zone.

   Stealth like a slave server except not listed in an NS RR for
   the zone.  A stealth server, unless explicitly
   configured to do otherwise, will set the AA bit in
   responses and be capable of acting as a master.  A
   stealth server will only be known by other servers if
   they are given static configuration data indicating
   its existence.

   Notify Set  set of servers to be notified of changes to some
   zone.  Default is all servers named in the NS RRset,
   except for any server also named in the SOA MNAME.
   Some implementations will permit the name server
   administrator to override this set or add elements to
   it (such as, for example, stealth servers).

   2.2. The zone's servers must be organized into a dependency graph
   such that there is a primary master, and all other servers must use
   AXFR or IXFR either from the primary master or from some slave which
   is also a master.  No loops are permitted in the AXFR dependency
   graph.

in other words, what makes you a master is that someone is transferring from 
you. the primary master is the only master that by definition cannot also be a 
slave. the terms master and slave refer to protocol roles within the 
AXFR/IXFR transaction.


-- 
Paul Vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop