Re: that MIT paper again (Re: VeriSign's rapid DNS updates in .com/.net ) (longish)

2004-07-24 Thread Daniel Karrenberg

On 23.07 22:30, Simon Waters wrote:
  
 The abstract doesn't mention that the TTL on NS records is found to be
 important for scalability of the DNS. 

Sic!

And it is the *child* TTL that counts for most implementations.


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-24 Thread Paul Vixie

  the primary beneficiaries of this new functionality are spammers and
  other malfeasants
 
 ... The primary beneficiaries are all
 ^
 intended
 current and future .com/.net domain holders: 

I'm not talking about intended beneficiaries.  I agree with your statement
when applied to intended beneficiaries.  I'm talking about the character
of the preponderance of actual beneficiaries, whether measured by number
of domain registration events per unit time, or number of dollars of income
enabled by the speediness of the fast update VeriSign is now announcing.

 ... I also stated in that message that VeriSign has no intention of
 changing the current 48-hour TTL on delegation NS RRsets in .com/.net.

Right.  And I hope you are able to stick to that plan in the face of what
I think will be gigantic pressure, from both registrants and competitors,
to lower it.

 I agree with Daniel's earlier statement that this is an education
 issue.  Does anyone want to co-author an Internet-Draft on the topic
 of choosing appropriate TTLs?

I can't think of anyone who could do it better than you could, Matt.  I
know I offered to help a while back, but we never really got started on it,
and after being named as a sitefinder co-conspirator in your lawsuit
against ICANN, I think I'll hold off on co-authoring anything with any
VeriSign employee for the time being.


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-24 Thread Randy Bush

 I'm not talking about intended beneficiaries.  I agree with your statement
 when applied to intended beneficiaries.  I'm talking about the character
 of the preponderance of actual beneficiaries, whether measured by number
 of domain registration events per unit time, or number of dollars of income
 enabled by the speediness of the fast update VeriSign is now announcing.

paying net customers want quick adds/updates/deletes.  verisign's
competitors offer this.  versign will offer this.  get over it.

randy



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-24 Thread Robert E. Seastrom


Randy Bush [EMAIL PROTECTED] writes:

  I'm not talking about intended beneficiaries.  I agree with your statement
  when applied to intended beneficiaries.  I'm talking about the character
  of the preponderance of actual beneficiaries, whether measured by number
  of domain registration events per unit time, or number of dollars of income
  enabled by the speediness of the fast update VeriSign is now announcing.
 
 paying net customers want quick adds/updates/deletes.  verisign's
 competitors offer this.  versign will offer this.  get over it.

Nothing wrong with showing the last 30 days worth of changes via
whois; it would address Paul's concerns and make it painfully obvious
when someone is monkeying around.

---Rob




Re: VeriSign's rapid DNS updates in .com/.net

2004-07-23 Thread Daniel Karrenberg

On 22.07 14:46, Randy Bush wrote:
 
 ... the TTL issue is almost entirely NS RRs, ...
 of course, almost all date in the gtlds are NS RRs, so the worry about
 TTL crank-down holds, though just for silly gtld servers.  then again,
 they're paid to serve.

This assumes rational behavior of a lot of zone admins. YMMV

Of course rational behavior may be increased by information and education.

Daniel


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-23 Thread Paul Vixie

 I welcome the change.

so do i.  but more importantly, i agree with daniel that the next thing
that's going to happen as a result is that there will be pressure toward
lower ttl's.  and i further agree with daniel that lower ttl's would be
bad.  so, let's increase dynamicism of domain addition, but let's please
not also increase dynamicism of delegation change and domain deletion.
-- 
Paul Vixie


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-23 Thread Paul Vixie

because i have sometimes been accused of being unfair to markk, i checked.

[EMAIL PROTECTED] (Mark Kosters) writes:

   the primary beneficiaries of this new functionality are spammers and
   other malfeasants,
  
  I think this is a true statement. 
 
 Has anyone done any studies to prove this conjecture?

at dictionary.reference.com we see the following:

| con·jec·ture P   Pronunciation Key  (kn-jkchr)
| n. 
| 
| 1. Inference or judgment based on inconclusive or incomplete evidence;
|guesswork.
|  
| 2. A statement, opinion, or conclusion based on guesswork: The commentators
|made various conjectures about the outcome of the next election.

as the author of the statement in question, and based on the definition
shown, it's just not conjecture.

 If this was true, maybe those registries who do perform this particular
 service today ought to slow down their update frequency.

as others have pointed out, spammers will always find a way to spam, and
while the number of cases where the beneficiary is not a spammer is small,
it's not zero.  so we have to do it.  but when someone says, later, that
the .COM zone generator ought to use a ttl template of 300 rather than
86400 in order that changes and deletions can get the same speedy service
as additions, i hope that icann will say no.

wrt the mit paper on why small ttl's are harmless, i recommend that y'all
actually read it, the whole thing, plus some of the references, rather
than assuming that the abstract is well supported by the body.
-- 
Paul Vixie


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-23 Thread Richard Cox

On Thu, 22 Jul 2004 15:27:37 -1000 Randy Bush [EMAIL PROTECTED] wrote:

| all they need to do is register foo.bar with delegation to their
| dns servers, and change a third level domain name at will.

Er, no.  They have of course tried that already!

By registering foo.bar with delegation to THEIR dns servers gives full
identification of THEIR dns servers, and the host or upstream of those
servers can (and often does) start invoking their acceptable use policy.
If not, then all the considerations that Paul V. recently cited about
neighbours who allow bad things on their network, start to kick in.

The scenario I have outlined - now well established, and the mechanism
understood - allows the malfeasants to operate on the 'net with zero
traceability of their identity or location, based on everything they do
being able to be done through zombied Windows PCs or open(ed) proxies.

-- 
Richard Cox



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-23 Thread Petri Helenius
Paul Vixie wrote:
so do i. but more importantly, i agree with daniel that the next thing
that's going to happen as a result is that there will be pressure toward
lower ttl's.  and i further agree with daniel that lower ttl's would be
bad.  so, let's increase dynamicism of domain addition, but let's please
not also increase dynamicism of delegation change and domain deletion.
 

What would be your suggestion to achieve the desired effect that many 
seek by lower TTL's, which is changing A records to point to available, 
lower load servers at different times? I did read the point that lower 
TTL's should only be used when appropriate but if most high-traffic 
sites use low TTL's, the point about the rest is moot. (with the 
exception of the root-servers) The load will be seen on ISP resolvers, 
specially on consumer networks.

Pete


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-23 Thread Christian Kuhtz




On 7/23/04 5:29 AM, Richard Cox [EMAIL PROTECTED] wrote:

 
 On Thu, 22 Jul 2004 15:27:37 -1000 Randy Bush [EMAIL PROTECTED] wrote:
 
 | all they need to do is register foo.bar with delegation to their
 | dns servers, and change a third level domain name at will.
 
 Er, no.  They have of course tried that already!
 
 By registering foo.bar with delegation to THEIR dns servers gives full
 identification of THEIR dns servers, and the host or upstream of those
 servers can (and often does) start invoking their acceptable use policy.
 If not, then all the considerations that Paul V. recently cited about
 neighbours who allow bad things on their network, start to kick in.
 
 The scenario I have outlined - now well established, and the mechanism
 understood - allows the malfeasants to operate on the 'net with zero
 traceability of their identity or location, based on everything they do
 being able to be done through zombied Windows PCs or open(ed) proxies.

The distribution of spam is only half of the economy at work here.  Spam
doesn't occur in a vacuum.  The other half is the site(s) profiting from
the spam.  


*
The information transmitted is intended only for the person or entity to which it is 
addressed and may contain confidential, proprietary, and/or privileged material.  Any 
review, retransmission, dissemination or other use of, or taking of any action in 
reliance upon, this information by persons or entities other than the intended 
recipient is prohibited.  If you received this in error, please contact the sender and 
delete the material from all computers. 113



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-23 Thread Daniel Senie
At 10:05 AM 7/23/2004, Christian Kuhtz wrote:


On 7/23/04 5:29 AM, Richard Cox [EMAIL PROTECTED] wrote:

 On Thu, 22 Jul 2004 15:27:37 -1000 Randy Bush [EMAIL PROTECTED] wrote:

 | all they need to do is register foo.bar with delegation to their
 | dns servers, and change a third level domain name at will.

 Er, no.  They have of course tried that already!

 By registering foo.bar with delegation to THEIR dns servers gives full
 identification of THEIR dns servers, and the host or upstream of those
 servers can (and often does) start invoking their acceptable use policy.
 If not, then all the considerations that Paul V. recently cited about
 neighbours who allow bad things on their network, start to kick in.

 The scenario I have outlined - now well established, and the mechanism
 understood - allows the malfeasants to operate on the 'net with zero
 traceability of their identity or location, based on everything they do
 being able to be done through zombied Windows PCs or open(ed) proxies.
The distribution of spam is only half of the economy at work here.  Spam
doesn't occur in a vacuum.  The other half is the site(s) profiting from
the spam.
Let's just be clear that not all sites mentioned in spam are profiting at 
all. Spammers mention sites unrelated to what they're advertising to:

1) throw off blocklists which attempt to build lists of sites mentioned in 
spam.

2) purposely hurt the reputation of sites by getting blocklists to mention 
those sites

3) and possibly cause flash traffic loads to sites that would otherwise not 
get high loads.

Sites mentioned without permission common. Be clear with any attempt to go 
after sites profiting from spam to explain how you will only affect those 
who are really profiting and have given their permission.




Re: VeriSign's rapid DNS updates in .com/.net

2004-07-23 Thread Paul Vixie

 ...  so, let's increase dynamicism of domain addition, but let's please
 not also increase dynamicism of delegation change and domain deletion.

 What would be your suggestion to achieve the desired effect that many seek
 by lower TTL's, which is changing A records to point to available, lower
 load servers at different times?

get over it.

 I did read the point that lower TTL's should only be used when
 appropriate but if most high-traffic sites use low TTL's, the point
 about the rest is moot. (with the exception of the root-servers) The
 load will be seen on ISP resolvers, specially on consumer networks.

that's not even the worst of it.

many business plans throughout history have involved virtualizing
something that used to be physical, or driving a bus through a loophole,
or both.  i'm happy to see dns still working lo these 25 years later,
but the terminology has improved to the point where i can make my
complaints more exact.  what is dns exactly, and what isn't it?

dns is a distributed, reliable, autonomous, coherent database.

dns is not a directory service.  if you want a directory service you
probably want soundex rather than wildcards, and you probably want
something that's specific to a protocol (like web browsing) rather than
something that also affects e-mail, ssh, and everything else.

dns is not a mapping service.  incoherency is bad.  an answer should
depend on the question (which means name, class, and type) and on the
time the question was asked.  offering different results when the same
question is asked at the same time is deliberate incoherence.  when
once upon a time yelling at akamai for doing this, i called it stupid
dns tricks.

i remain open to the possibility that a standards effort will someday
add directory services, or mapping services, to dns.  but delivering
such services without protocol changes is an abuse of a loophole, not
innovation.

note that immediate updates for .ORG and now .COM/.NET are completely
within the definition of dns and i'm happy to see people doing it.  (in
isc's own .ORG bid, we also proposed to have it work this way.)  i say
this in case someone mistakenly believes that this is not a new thread.


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-23 Thread Eric Brunner-Williams in Portland Maine

I don't want to digress into a spam-l or asrg standard thread, but I do want
to point out the similarity of what I think are ad networks that manage
sets of write-engines (aka zombies) in the blog-spam (http) problem space
with the canonical abuse-desk/xdsl swamp meta-thread on nanog.

I'm observing rotation of write-side assets (dsl zomb-o-the-moment), and
rotation of ad inventory (variation on viagra/paxil/casino/xxx domains.

This is in response to the comment that begins
 Let's just be clear that not all sites mentioned in spam are profiting
 ...

Which was in reply to a comment that concluded
 Spam doesn't occur in a vacuum.  The other half is the site(s) profiting 
 ...

Eric


that MIT paper again (Re: VeriSign's rapid DNS updates in .com/.net )

2004-07-23 Thread Paul Vixie

i'd said:

  wrt the mit paper on why small ttl's are harmless, i recommend that
  y'all actually read it, the whole thing, plus some of the references,
  rather than assuming that the abstract is well supported by the body.

someone asked me:

 Would you happen to have the URL for the MIT paper?  I meant to keep it
 to read at a latertime, but it seems I deleted the message.

http://nms.lcs.mit.edu/papers/dns-imw2001.html


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-23 Thread Randy Bush

 so, let's increase dynamicism of domain addition, but let's please
 not also increase dynamicism of delegation change and domain deletion.

dear customer, you can have wheat bread today, but rye takes a
day.  here is a url which explains the reasons in obscure technical
terms.  right; bloody likely.

we are here to serve the customer.  the black hats use the same
services that the good customers use.  do not cut off nose to spite
face.

and, as i said a few years back, in the long run, the spammers i
fear are the big business bulk mailers.  it is they who fill my
post box at discounted postal rates.  and they look a lot like
'legitimate' customers.

randy



Re: that MIT paper again (Re: VeriSign's rapid DNS updates in .com/.net ) (longish)

2004-07-23 Thread Simon Waters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
| Date: Fri, 23 Jul 2004 17:01:54 +
| From: Paul Vixie [EMAIL PROTECTED]
| Subject: that MIT paper again (Re: VeriSign's rapid DNS updates in
.com/.net )
|
|wrt the mit paper on why small ttl's are harmless, i recommend that
|y'all actually read it, the whole thing, plus some of the references,
|rather than assuming that the abstract is well supported by the body.
| http://nms.lcs.mit.edu/papers/dns-imw2001.html
I think most people are probably way too busy. I'll comment, and Paul
can tell me where I am wrong or incomplete ;)
I'm slightly concerned that the authors think web traffic is the big
source of DNS, they may well be right (especially given one of the
authors is talking about his own network), but my quick glance at the
type of queries shouts to me that SMTP (and email related traffic,
RBL's, etc) generate a disproportionate amount of wide area DNS traffic
byte for byte of data. I would think this is one that is pretty easy to
settle for specific networks. In particular I see a lot of retries
generated by email servers for UBE and virus dross (in our case for upto
5 days), when human surfers have famously given up the domain as dead
after the first 8 seconds. Perhaps if most people preview HTML in
emails, surfing and email access to novel URI are one and the same.
They conclude that the great bulk of benefit from sharing a DNS cache is
obtained in the first 10 to 20 clients. Although they scale this only to
1000+ clients, maybe some NANOG members can comment if they have scaled
DNS caches much bigger than this, but I suspect a lot of the scaling
issues are driven by maintainance costs and reliability, since DNS
doesn't generate much WAN traffic in comparison to HTTP for most people
here (let's face it the root/tld owners are probably the only people who
even think about bandwidth of DNS traffic).
They conclude the TTL on A records isn't so crucial.
The abstract doesn't mention that the TTL on NS records is found to be
important for scalability of the DNS. Probably the main point Paul wants
us to note. Just because the DNS in insensitive to slight changes in A
record TTL doesn't mean TTL doesn't matter on other records.
The paper leaves a lot of hanging question about poor performance,
the number of unanswered queries, and poor latency, which I'm sure can
be pinned down to the generally poor state of the DNS (both forward and
especially reverse), and a few bad applications.
The big difference between the places/times studied, suggests to me how
the DNS performs depends a lot on what mix of questions you ask it.
They suggest not passing on unqualified names would lose a lot of fluff
(me I still think big caches could zone transfer . and save both
traffic and, more importantly for the end users, latency, but that goes
further than their proposal). Remember resolvers do various interesting
things with unqualified names depending who coded them and when.
The paper doesn't pass any judgement on types of lookups, but obviously
not all DNS lookups are equal from the end user perspective. For example
reverse DNS from HTTP server is typically done off the critical path
(asynchronously), where as the same reverse lookup may be in the
critical path for deciding whether to accept an email message (not that
most people regard email as that time critical). Be nice to do a study
classifying them along the lines of DNS lookups you wait for, DNS
lookups that slow things down, DNS lookups that have to be done by
Friday for the weekly statistics.
Some *nix vendor(s?) should make sure loghost is in /etc/hosts or not in
/etc/syslog.conf by default by the sound of it ;)
As regards rapid update by Verisign - bring it on - I'm always
embarassed to tell clients they may have to wait upto 12 hours for a new
website in this day and age. And any errors that gets made in the
initial setup takes too long to fix, I don't want to be setting up a
site 3PM Friday, and having to check it Monday morning to discover some
typo means it is Tuesday before it works, when in a sane world one TTL +
5 minutes is long enough.
I think relying on accurate DNS information to distinguish spammers from
genuine senders is at best shakey currently, the only people I can think
would suffer with making it easier and quicker to create new domains
would be people relying on something like SPF, but I think that just
reveals issues with SPF, and the design flaws of SPF shouldn't influence
how we should manage the DNS.
-BEGIN PGP SIGNATURE-
Comment: Using GnuPG with Debian - http://enigmail.mozdev.org
iD8DBQFBAYOEGFXfHI9FVgYRApWTAKCupO6Eo5i0QtDqEuYs5d1xgEMetgCgjFJf
LQBGn1G1gsdbKlg8pagoEVM=
=fu+g
-END PGP SIGNATURE-


Re: that MIT paper again (Re: VeriSign's rapid DNS updates in .com/.net ) (longish)

2004-07-23 Thread Valdis . Kletnieks
On Fri, 23 Jul 2004 22:30:46 BST, Simon Waters [EMAIL PROTECTED]  said:

 I think relying on accurate DNS information to distinguish spammers from
 genuine senders is at best shakey currently, the only people I can think
 would suffer with making it easier and quicker to create new domains
 would be people relying on something like SPF, but I think that just
 reveals issues with SPF, and the design flaws of SPF shouldn't influence
 how we should manage the DNS.

Ahh.. but if SPF (complete with issues and design flaws) is widely deployed, we
may not have any choice regarding whether its issues and flaws dictate the DNS
management.

Remember that we've seen this before - RFC2052 didn't specify a '_', RFC2782
does.  And we all know where BIND's delegation-only came from


pgpXkHSYEKm4D.pgp
Description: PGP signature


RE: VeriSign's rapid DNS updates in .com/.net

2004-07-23 Thread Brian Battle


Petri Helenius wrote:

 What would be your suggestion to achieve the desired
 effect that many seek by lower TTL's, which is changing
 A records to point to available, lower load servers at
 different times?

On a similar note (and not viewing the issue through 
the usual spam-colored glasses):

Some people are using low dns TTLs in disaster recovery
setups, so that in the event of a disaster at a primary
site, services can be switched over to new servers at a
secondary site via easy and fast DNS changes?  If the TTLs
are too long, all the cached records will continue to
point at the servers which might no longer exist -- until
they expire.  This is another situation where low TTLs 
can be beneficial.

Are there any other uses for low dns TTLs that haven't
been brought up in this thread?

And what is a low TTL being classified as?  30 minutes?
10 minutes?  5 minutes?

-Brian


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-23 Thread Matt Larson

On Thu, 22 Jul 2004, Paul Vixie wrote:
 the primary beneficiaries of this new functionality are spammers and
 other malfeasants

It appears your glass is half empty rather than half full.  The
primary beneficiaries are all current and future .com/.net domain
holders: timely and predictable zone updates from one's parent are a
good and useful feature.  Mistakes can be fixed more rapidly and zone
administrators who know what they are doing can effect changes
quickly.

On Fri, 23 Jul 2004, Paul Vixie wrote:
 but when someone says, later, that the .COM zone generator ought to
 use a ttl template of 300 rather than 86400 in order that changes
 and deletions can get the same speedy service as additions, i hope
 that icann will say no.

Paul, as you know, the TTL of parent-side NS RRsets when the data
sought is in the immediate child zone is largely irrelevant because of
credibility, which I described in
http://www.merit.edu/mail.archives/nanog/2004-07/msg00255.html.  I
also stated in that message that VeriSign has no intention of changing
the current 48-hour TTL on delegation NS RRsets in .com/.net.

On Thu, 22 Jul 2004, Daniel Karrenberg wrote:
 I am not worried so much about the root servers here because of the 
 reasons you cite. The root server system is engineered to cope with
 hugely excessive loads already.
 I am worried about all the other DNS servers that have to deal with
 much lesser query loads and might feel the impact of lowered TTLs
 much more. 

If a zone owner lowers a TTL and causes an increase in load, most of
the foot being shot off is his or her own: the zone's own name servers
will bear the brunt of the increased query load.

I agree with Daniel's earlier statement that this is an education
issue.  Does anyone want to co-author an Internet-Draft on the topic
of choosing appropriate TTLs?

Matt
--
Matt Larson [EMAIL PROTECTED]
VeriSign Naming and Directory Services



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-23 Thread Duane Wessels

 If a zone owner lowers a TTL and causes an increase in load, most of
 the foot being shot off is his or her own: the zone's own name servers
 will bear the brunt of the increased query load.

Maybe, but don't forget that when BIND9 and DJBDNS caches find
expired nameserver address (A) records they don't trust any cached
data and start them back at the roots.  And in the case of BIND9,
it sends both A and A6 queries for each nameserver in the list.

For example, microsoft.com's five nameservers have A records with
TTL of one hour.  Worst case we might expect every BIND9 cache to
send 10 queries to the roots (then the TLDs) every hour, just for
these nameserver addresses.

Duane W.


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-23 Thread william(at)elan.net

On Fri, 23 Jul 2004, Duane Wessels wrote:

 Maybe, but don't forget that when BIND9 and DJBDNS caches find
 expired nameserver address (A) records they don't trust any cached
 data and start them back at the roots.  And in the case of BIND9,
 it sends both A and A6 queries for each nameserver in the list.

Do they really send A6 queries? Haven't we decided to go back to  now?
 
-- 
William Leibzon
Elan Networks
[EMAIL PROTECTED]



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Daniel Karrenberg

Matt, others,

I am a quite concerned about these zone update speed improvements
because they are likely to result in considerable pressure to reduce
TTLs **throughout the DNS** for little to no good reason.

It will not be long before the marketeers will discover that they do not
deliver what they (implicitly) promise to customers in case of **changes
and removals** rather than just additions to a zone. 

Reducing TTLs across the board will be the obvious *soloution*. 

Yet, the DNS architecture is built around effective caching! 

Are we sure that the DNS as a whole will remain operational when
(not if) this happens in a significant way? 

Can we still mitigate that trend by education of marketeers and users? 

Daniel


RE: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Ray Plzak

Good point!  You can reduce TTLs to such a point that the servers will
become preoccupied with doing something other than providing answers.

Ray

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
 Daniel Karrenberg
 Sent: Thursday, July 22, 2004 3:12 AM
 To: Matt Larson
 Cc: [EMAIL PROTECTED]
 Subject: Re: VeriSign's rapid DNS updates in .com/.net
 
 
 Matt, others,
 
 I am a quite concerned about these zone update speed improvements
 because they are likely to result in considerable pressure to reduce
 TTLs **throughout the DNS** for little to no good reason.
 
 It will not be long before the marketeers will discover that they do not
 deliver what they (implicitly) promise to customers in case of **changes
 and removals** rather than just additions to a zone.
 
 Reducing TTLs across the board will be the obvious *soloution*.
 
 Yet, the DNS architecture is built around effective caching!
 
 Are we sure that the DNS as a whole will remain operational when
 (not if) this happens in a significant way?
 
 Can we still mitigate that trend by education of marketeers and users?
 
 Daniel



RE: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Sam Stickland

Well, a naive calculation, based on reducing the TTL to 15 mins from 24
hours to match Verisign's new update times, would suggest that the number
of queries would increase by (24 * 60) / 15 = 96 times? (or twice that if 
you factor in for the Nyquist interval).

Any there any resources out there there that have information on global 
DNS statistics? ie. the average TTL currently in use.

But I guess it remains to be seen if this will have a knock on effect like 
that described below. Verisign are only doing this for the nameserver 
records at present time - it just depends on whether expection for such 
rapid changes gets pushed on down.

Sam

On Thu, 22 Jul 2004, Ray Plzak wrote:

 
 Good point!  You can reduce TTLs to such a point that the servers will
 become preoccupied with doing something other than providing answers.
 
 Ray
 
  -Original Message-
  From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
  Daniel Karrenberg
  Sent: Thursday, July 22, 2004 3:12 AM
  To: Matt Larson
  Cc: [EMAIL PROTECTED]
  Subject: Re: VeriSign's rapid DNS updates in .com/.net
  
  
  Matt, others,
  
  I am a quite concerned about these zone update speed improvements
  because they are likely to result in considerable pressure to reduce
  TTLs **throughout the DNS** for little to no good reason.
  
  It will not be long before the marketeers will discover that they do not
  deliver what they (implicitly) promise to customers in case of **changes
  and removals** rather than just additions to a zone.
  
  Reducing TTLs across the board will be the obvious *soloution*.
  
  Yet, the DNS architecture is built around effective caching!
  
  Are we sure that the DNS as a whole will remain operational when
  (not if) this happens in a significant way?
  
  Can we still mitigate that trend by education of marketeers and users?
  
  Daniel
 



RE: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Stephen J. Wilcox

Hang fire..

I dont see any reference to adjusting the TTL in the verisign announcement.

They say they will update the zones every 5 minutes from the registry data.

These are not the same things (or did I miss that bit?)

Also, isnt a lot of this dependent on the NS records in the second level gtlds 
which is hosted by the ISPs.. so this part doesnt change?

Steve

On Thu, 22 Jul 2004, Sam Stickland wrote:

 
 Well, a naive calculation, based on reducing the TTL to 15 mins from 24
 hours to match Verisign's new update times, would suggest that the number
 of queries would increase by (24 * 60) / 15 = 96 times? (or twice that if 
 you factor in for the Nyquist interval).
 
 Any there any resources out there there that have information on global 
 DNS statistics? ie. the average TTL currently in use.
 
 But I guess it remains to be seen if this will have a knock on effect like 
 that described below. Verisign are only doing this for the nameserver 
 records at present time - it just depends on whether expection for such 
 rapid changes gets pushed on down.
 
 Sam
 
 On Thu, 22 Jul 2004, Ray Plzak wrote:
 
  
  Good point!  You can reduce TTLs to such a point that the servers will
  become preoccupied with doing something other than providing answers.
  
  Ray
  
   -Original Message-
   From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
   Daniel Karrenberg
   Sent: Thursday, July 22, 2004 3:12 AM
   To: Matt Larson
   Cc: [EMAIL PROTECTED]
   Subject: Re: VeriSign's rapid DNS updates in .com/.net
   
   
   Matt, others,
   
   I am a quite concerned about these zone update speed improvements
   because they are likely to result in considerable pressure to reduce
   TTLs **throughout the DNS** for little to no good reason.
   
   It will not be long before the marketeers will discover that they do not
   deliver what they (implicitly) promise to customers in case of **changes
   and removals** rather than just additions to a zone.
   
   Reducing TTLs across the board will be the obvious *soloution*.
   
   Yet, the DNS architecture is built around effective caching!
   
   Are we sure that the DNS as a whole will remain operational when
   (not if) this happens in a significant way?
   
   Can we still mitigate that trend by education of marketeers and users?
   
   Daniel
  
 
 



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Daniel Karrenberg

On 22.07 12:26, Stephen J. Wilcox wrote:
 
 I dont see any reference to adjusting the TTL in the verisign announcement.

Correct.

 They say they will update the zones every 5 minutes from the registry data.
 
 These are not the same things (or did I miss that bit?)

Correct.

 Also, isnt a lot of this dependent on the NS records in the second level gtlds 
 which is hosted by the ISPs.. so this part doesnt change?

Correct. 

What I am concerned about is the pressure to lower TTLs across the board
if the increase in zone update speed creates expectations that it alone
cannot fulfill. 

I observe this being sold as instantaneous updates instead of
instantaneous additions.  When this becomes clear the pressure will be
to deliver what the salespeople promised.  This will result inthe obvious
soloution: Lower TTLs everywhere. 

I am not sure the DNS will remain stable if TTLs are lowered to
a couple of seconds throughout.

I am suggesting clearer marketing:
Quick additions: Yes.  Quick changes/deletions: No.

Note that I am not concerned about *judicious* lowering of TTLs 
in preparation for changes or to provide services such as akamai.
It is more a general trend of many independent actors serving nor real
purpose that worries me. 

Caveat emptor.

Daniel


RE: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Henry Linneweh

Before a big panic starts, they can restore it back to
the way it was if there is an event of such proportion
to totally hoze the entire network or any major
portion of it, until they fix any major issue with
these changes

-Henry

--- Sam Stickland [EMAIL PROTECTED] wrote:
 
 Well, a naive calculation, based on reducing the TTL
 to 15 mins from 24
 hours to match Verisign's new update times, would
 suggest that the number
 of queries would increase by (24 * 60) / 15 = 96
 times? (or twice that if 
 you factor in for the Nyquist interval).
 
 Any there any resources out there there that have
 information on global 
 DNS statistics? ie. the average TTL currently in
 use.
 
 But I guess it remains to be seen if this will have
 a knock on effect like 
 that described below. Verisign are only doing this
 for the nameserver 
 records at present time - it just depends on whether
 expection for such 
 rapid changes gets pushed on down.
 
 Sam
 
 On Thu, 22 Jul 2004, Ray Plzak wrote:
 
  
  Good point!  You can reduce TTLs to such a point
 that the servers will
  become preoccupied with doing something other than
 providing answers.
  
  Ray
  
   -Original Message-
   From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of
   Daniel Karrenberg
   Sent: Thursday, July 22, 2004 3:12 AM
   To: Matt Larson
   Cc: [EMAIL PROTECTED]
   Subject: Re: VeriSign's rapid DNS updates in
 .com/.net
   
   
   Matt, others,
   
   I am a quite concerned about these zone update
 speed improvements
   because they are likely to result in
 considerable pressure to reduce
   TTLs **throughout the DNS** for little to no
 good reason.
   
   It will not be long before the marketeers will
 discover that they do not
   deliver what they (implicitly) promise to
 customers in case of **changes
   and removals** rather than just additions to a
 zone.
   
   Reducing TTLs across the board will be the
 obvious *soloution*.
   
   Yet, the DNS architecture is built around
 effective caching!
   
   Are we sure that the DNS as a whole will remain
 operational when
   (not if) this happens in a significant way?
   
   Can we still mitigate that trend by education of
 marketeers and users?
   
   Daniel
  
 
 



RE: VeriSign's rapid DNS updates in .com/.net (fwd from ml)

2004-07-22 Thread Sam Stickland

I think I ought to qualify my earlier email - I certainly didn't mean to 
suggest that this would happen. I meant to merely comment on what the 
expected increase in load might be if we did see a trend towards lower 
TTLs.

Any trend towards lower TTLs would be outside of Verisign's control 
anyhow, and if it did happen, it would no doubt be a gradual effect. Which 
brings me back to my original question - does anyone know of any stastics 
for TTL values?

Sam

On Thu, 22 Jul 2004, Henry Linneweh wrote:

 
 Before a big panic starts, they can restore it back to
 the way it was if there is an event of such proportion
 to totally hoze the entire network or any major
 portion of it, until they fix any major issue with
 these changes
 
 -Henry
 
 --- Sam Stickland [EMAIL PROTECTED] wrote:
  
  Well, a naive calculation, based on reducing the TTL
  to 15 mins from 24
  hours to match Verisign's new update times, would
  suggest that the number
  of queries would increase by (24 * 60) / 15 = 96
  times? (or twice that if 
  you factor in for the Nyquist interval).
  
  Any there any resources out there there that have
  information on global 
  DNS statistics? ie. the average TTL currently in
  use.
  
  But I guess it remains to be seen if this will have
  a knock on effect like 
  that described below. Verisign are only doing this
  for the nameserver 
  records at present time - it just depends on whether
  expection for such 
  rapid changes gets pushed on down.
  
  Sam
  
  On Thu, 22 Jul 2004, Ray Plzak wrote:
  
   
   Good point!  You can reduce TTLs to such a point
  that the servers will
   become preoccupied with doing something other than
  providing answers.
   
   Ray
   
-Original Message-
From: [EMAIL PROTECTED]
  [mailto:[EMAIL PROTECTED] On Behalf Of
Daniel Karrenberg
Sent: Thursday, July 22, 2004 3:12 AM
To: Matt Larson
Cc: [EMAIL PROTECTED]
Subject: Re: VeriSign's rapid DNS updates in
  .com/.net


Matt, others,

I am a quite concerned about these zone update
  speed improvements
because they are likely to result in
  considerable pressure to reduce
TTLs **throughout the DNS** for little to no
  good reason.

It will not be long before the marketeers will
  discover that they do not
deliver what they (implicitly) promise to
  customers in case of **changes
and removals** rather than just additions to a
  zone.

Reducing TTLs across the board will be the
  obvious *soloution*.

Yet, the DNS architecture is built around
  effective caching!

Are we sure that the DNS as a whole will remain
  operational when
(not if) this happens in a significant way?

Can we still mitigate that trend by education of
  marketeers and users?

Daniel
   
  
  
 



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Paul Vixie

duane wessels' presentation at the last eugene nanog meeting distinguished
between two kinds of traffic received at f-root during his sampling work:
crap: 97.9%; non-crap: 2.1%.  the crap category includes requestors who
do not seem to cache the responses they hear, thus rendering the actual TTL
moot.  therefore if there were a drop in TTL for root-zone data, it would
only be a multiplier against 2.1% of f-root's present volume.

but i agree with daniel.  the reason verisign is doing this has got to be
because ultradns does it, and .ORG therefore has marketing hoopla that
.COM/.NET lacks, and parity was needed.  the primary beneficiaries of this
new functionality are spammers and other malfeasants, and the impact of
having it in many TLD's will be to put downward pressure on TTL's.  this
all needs to be looked at very carefully.
-- 
Paul Vixie


RE: VeriSign's rapid DNS updates in .com/.net (fwd from ml)

2004-07-22 Thread Sam Stickland

I got forwarded this URL from Patrick McManus. I haven't had a chance to
read the paper myself yet so I won't comment on it. I've included the link
and the abstract below.

A choice quote is these results suggest that the performance of DNS is
not as dependent on aggressive caching as is commonly believed, and that
the widespread use of dynamic, low-TTL A-record bindings should not
degrade DNS performance.

http://nms.lcs.mit.edu/papers/dns-imw2001.html



Abstract:

This paper presents a detailed analysis of traces of DNS and associated 
TCP traffic collected on the Internet links of the MIT Laboratory for 
Computer Science and the Korea Advanced Institute of Science and 
Technology (KAIST). The first part of the analysis details how clients at 
these institutions interact with the wide-area DNS system, focusing on 
performance and prevalence of failures. The second part evaluates the 
effectiveness of DNS caching. 

In the most recent MIT trace, 23% of lookups receive no answer; these 
lookups account for more than half of all traced DNS packets since they 
are retransmitted multiple times. About 13% of all lookups result in an 
answer that indicates a failure. Many of these failures appear to be 
caused by missing inverse (IP-to-name) mappings or NS records that point 
to non-existent or inappropriate hosts. 27% of the queries sent to the 
root name servers result in such failures. 

The paper presents trace-driven simulations that explore the effect of 
varying TTLs and varying degrees of cache sharing on DNS cache hit rates. 
The results show that reducing the TTLs of address (A) records to as low 
as a few hundred seconds has little adverse effect on hit rates, and that 
little benefit is obtained from sharing a forwarding DNS cache among more 
than 10 or 20 clients. These results suggest that the performance of DNS 
is not as dependent on aggressive caching as is commonly believed, and 
that the widespread use of dynamic, low-TTL A-record bindings should not 
degrade DNS performance. 

Sam

On Thu, 22 Jul 2004, Sam Stickland wrote:

 
 I think I ought to qualify my earlier email - I certainly didn't mean to 
 suggest that this would happen. I meant to merely comment on what the 
 expected increase in load might be if we did see a trend towards lower 
 TTLs.
 
 Any trend towards lower TTLs would be outside of Verisign's control 
 anyhow, and if it did happen, it would no doubt be a gradual effect. Which 
 brings me back to my original question - does anyone know of any stastics 
 for TTL values?
 
 Sam
 
 On Thu, 22 Jul 2004, Henry Linneweh wrote:
 
  
  Before a big panic starts, they can restore it back to
  the way it was if there is an event of such proportion
  to totally hoze the entire network or any major
  portion of it, until they fix any major issue with
  these changes
  
  -Henry
  
  --- Sam Stickland [EMAIL PROTECTED] wrote:
   
   Well, a naive calculation, based on reducing the TTL
   to 15 mins from 24
   hours to match Verisign's new update times, would
   suggest that the number
   of queries would increase by (24 * 60) / 15 = 96
   times? (or twice that if 
   you factor in for the Nyquist interval).
   
   Any there any resources out there there that have
   information on global 
   DNS statistics? ie. the average TTL currently in
   use.
   
   But I guess it remains to be seen if this will have
   a knock on effect like 
   that described below. Verisign are only doing this
   for the nameserver 
   records at present time - it just depends on whether
   expection for such 
   rapid changes gets pushed on down.
   
   Sam
   
   On Thu, 22 Jul 2004, Ray Plzak wrote:
   

Good point!  You can reduce TTLs to such a point
   that the servers will
become preoccupied with doing something other than
   providing answers.

Ray

 -Original Message-
 From: [EMAIL PROTECTED]
   [mailto:[EMAIL PROTECTED] On Behalf Of
 Daniel Karrenberg
 Sent: Thursday, July 22, 2004 3:12 AM
 To: Matt Larson
 Cc: [EMAIL PROTECTED]
 Subject: Re: VeriSign's rapid DNS updates in
   .com/.net
 
 
 Matt, others,
 
 I am a quite concerned about these zone update
   speed improvements
 because they are likely to result in
   considerable pressure to reduce
 TTLs **throughout the DNS** for little to no
   good reason.
 
 It will not be long before the marketeers will
   discover that they do not
 deliver what they (implicitly) promise to
   customers in case of **changes
 and removals** rather than just additions to a
   zone.
 
 Reducing TTLs across the board will be the
   obvious *soloution*.
 
 Yet, the DNS architecture is built around
   effective caching!
 
 Are we sure that the DNS as a whole will remain
   operational when
 (not if) this happens in a significant way?
 
 Can we still mitigate that trend by education of
   marketeers and users?
 
 Daniel

   
   
  
 



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Daniel Karrenberg

On 22.07 17:08, Paul Vixie wrote:
 
   therefore if there were a drop in TTL for root-zone data, it would
 only be a multiplier against 2.1% of f-root's present volume.

I am not worried so much about the root servers here because of the 
reasons you cite. The root server system is engineered to cope with
hugely excessive loads already.
I am worried about all the other root servers that have to deal with
much lesser query loads and might feel the impact of lowered TTLs
much more. 

 ... and the impact of
 having it in many TLD's will be to put downward pressure on TTL's.  this
 all needs to be looked at very carefully.

Yes, we need to keep an eye on this and argue against lowering TTLs 
across the board for little good reasion.




Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Daniel Karrenberg

On 22.07 21:05, an alter ego of Daniel Karrenberg wrote:
 
 I am worried about all the other root servers that have to deal with
 much lesser query loads and might feel the impact of lowered TTLs
 much more. 

Of course I meant all the other DNS servers.

Daniel


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Pete Schroebel


- Original Message - 
From: Daniel Karrenberg [EMAIL PROTECTED]
To: Paul Vixie [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Thursday, July 22, 2004 3:05 PM
Subject: Re: VeriSign's rapid DNS updates in .com/.net



 On 22.07 17:08, Paul Vixie wrote:
 
    therefore if there were a drop in TTL for root-zone data, it would
  only be a multiplier against 2.1% of f-root's present volume.

 I am not worried so much about the root servers here because of the
 reasons you cite. The root server system is engineered to cope with
 hugely excessive loads already.
 I am worried about all the other root servers that have to deal with
 much lesser query loads and might feel the impact of lowered TTLs
 much more.

  ... and the impact of
  having it in many TLD's will be to put downward pressure on TTL's.  this
  all needs to be looked at very carefully.

 Yes, we need to keep an eye on this and argue against lowering TTLs
 across the board for little good reasion.


Infospace / Authorize Net and their successors have their ttl's set for 10
minutes and that just plain goofy. Plus, TTL's at 600 or below have always
been the calling card for a spammer; . . . er not that I am accusing them of
spamming, rather they are just straining dns queries.

Peter



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Eric Brunner-Williams in Portland Maine

 the primary beneficiaries of this
 new functionality are spammers and other malfeasants,

I think this is a true statement. I think it is important to keep in
mind that registry operators compete for TLD franchises, and where
those competitions occur, this statement is not belived to be true.

Eric


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Mark Kosters

On Thu, Jul 22, 2004 at 08:27:45PM +, Eric Brunner-Williams in Portland Maine 
wrote:
  the primary beneficiaries of this
  new functionality are spammers and other malfeasants,
 
 I think this is a true statement. 

Has anyone done any studies to prove this conjecture? If this was
true, maybe those registries who do perform this particular service today
ought to slow down their update frequency.

Mark

-- 

Mark Kosters[EMAIL PROTECTED]   Verisign Applied Research


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Valdis . Kletnieks
On Thu, 22 Jul 2004 17:04:24 EDT, Mark Kosters said:

 Has anyone done any studies to prove this conjecture? If this was
 true, maybe those registries who do perform this particular service today
 ought to slow down their update frequency.

And lose share to the one who doesn't slow down?

I seem to remember the biggest reason for the flood away from the monopoly
registrar when *that* floodgate opened was that the other registrars promised
updates this day rather than this month.

(And yes, the whole .com/.net/.org/.biz landscape is enough of a mess that the
comment applies to registries as well as registrars - a local radio station
has 'wrov.cc' because 'wrov.com' is a domain in Korea)...



pgps3c9rl4PqG.pgp
Description: PGP signature


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread william(at)elan.net


On Thu, 22 Jul 2004, Eric Brunner-Williams in Portland Maine wrote:

  the primary beneficiaries of this
  new functionality are spammers and other malfeasants,
 
 I think this is a true statement. I think it is important to keep in
 mind that registry operators compete for TLD franchises, and where
 those competitions occur, this statement is not belived to be true.

In other words, Verisign is unhappy that spammers are now registering primarily
.biz domains and Verisign is no longer getting getting share of their business?

-- 
William Leibzon
Elan Networks
[EMAIL PROTECTED]



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Eric Brunner-Williams in Portland Maine

Mark,

I've been looking at spam in blogs, that is paxil et al domain names that
are POSTed into blogs as comments.

An example (from http://wampum.wabanaki.net/archives/000794.html, a post
on this very subject) follows this reply to you.

Some number of URLs are presented to engines that index this blog, and
as long as the data generated from those indexings (rankings) has value,
or the GET captured pages are cached by the indexing engines, value is
transfered from the host blog to the producers of ratings, or the producers
of means to obtain an increase in ratings, or the rated domain name.

One example I used earlier was a domain name owned by a major pharmacutical
company, and inserted in as many blogs as I cared to look at.

For want of a better term, I feel like I'm looking at an ad network (zombie
writer population) that performs ad placements (from xdsl puddles in Italy
or elsewhere) for buyers. It isn't banner-ads that are being placed, but a
latent index ranking that will be harvested within some few number of days
after placement.

Here is one viewed from an apache logfile:
customer72-236.mni.ne.jp - - [22/Jul/2004:13:31:53 -0400] POST 
/cgi-bin/mt-comments.cgi?entry_id=339 HTTP/1.0 200 1713

Entry 393 was posted on July 15, 2003, a little over a year ago. The attempted
POST is ment not be detected by any means other than exhaustive indexing of
some weblog.

I think I'm looking at a click-through model that is defined by a theft of
advertizing value, whether banners for eyeballs, or tags for ranking. I'm
getting redundant, but I've got two early readers pulling my fingers off
the keyboard and onto their texts.

As long as the names are either indexed, or resolve, the covert ad works.

Thinking about reducing the persistence of resolution of covert placed
names has caused me to think about spam and agility. For my part, it is,
as you pointed out, conjecture. I'm too busy trying to get my little
registrar business off the deck to perform studies. But as I look at
the example (below), it seems interesting to think about the resolution
of the names and the delivery of the names (in spam) as potentially a
synchronous event. That's why instant ad seems abuse prone to me, and
instant mod even more so.

There appear to be 15 URLs embedded in the comment below, which I selected
simply for having levitra in it.

As always, YMMV, and yes, I worked for an ad network (Engage/Flycast/CMGI),
and there is no 1x1 tracking gif anywhere in this message.
Eric

--- begin ---
COMMENT:
AUTHOR: http://www.fabuloussextoys.com
EMAIL: [EMAIL PROTECTED]
IP: 81.152.188.36
URL: http://www.fabuloussextoys.com
DATE: 06/08/2004 09:16:22 AM
The actor who plays http://www.888.com Connor in Angel will not bereturning for the 
http://www.mobilesandringtones.com fifth season of Angel. The actor will guest star in 
one http://www.celebtastic.com episode at the start of the http://www.ringtonespy.com 
season. The producers decided not to http://www.levitra-express.com pick up the 
actor's contract http://www.williamhill.co.uk for another season, as the character 
didn't have a http://www.cialis-express.com place to fit into the new story arc. 
Vincent is the second actor to http://www.adultfriendfinder.com leave the show, as 
producers also http://www.unbeatablemobiles.co.uk dropped Charisma Carpenter 
http://www.mobilequicksale.com from the cast. It is widely believed these two 
http://www.unbeatablecellphones.com actors have been dropped to make 
http://www.adultfriendfinder.com way for the two additions to Angel's 
http://www.lookforukhotels.com cast next season. James http://www.dating999.com 
Marsters is to join the cast ht!
 tp://www.adultfriendfinder.com of Angel next season,

--- end ---


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Eric Brunner-Williams in Portland Maine

 In other words, Verisign is unhappy that spammers are now registering
 primarily .biz domains and Verisign is no longer getting getting share
 of their business?

Do you want me to answer that wearing my hired-by-NeuStar-to-write-.biz hat
or my fired-by-NeuStar-for-trying-to-policy-.biz hat?

Or my almost-anybody-but-NSI/VGRS hat?

;-)


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread william(at)elan.net


On Thu, 22 Jul 2004, Daniel Karrenberg wrote:

 What I am concerned about is the pressure to lower TTLs across the board
 if the increase in zone update speed creates expectations that it alone
 cannot fulfill. 

 I observe this being sold as instantaneous updates instead of
 instantaneous additions.  When this becomes clear the pressure will be
 to deliver what the salespeople promised.  This will result inthe obvious
 soloution: Lower TTLs everywhere. 

What you're suggesting is that once Verisign marketing force moves in, this
will cause pressure (imitating Verisign, who really does it?) on marketing 
department of ISPs and DNS hosting providers to offer same level service?

I agree with you there, but I think most you will see are marketing by 
companies offering outsourced dns servers, such as what is done by Enom
and or Zonedit. In these cases however, most such dns service providers 
already do offer to their customers lower then normal TTL.

And greater majority of domains are not hosted on such provider but with
ISP that is taking care of the customer's entire DNS configuration and 
does not need to change ip that often. I don't think this puts pressure on 
such providers to change TTL.

So while some increase in genereal TTL may happen, I dont think it will 
be overwhelming so as to cause serious alarm.

-- 
William Leibzon
Elan Networks
[EMAIL PROTECTED]



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Robert L Mathews

At 7/22/04 10:08 AM, Paul Vixie wrote:

the primary beneficiaries of this
new functionality are spammers and other malfeasants

I think you're suggesting that such people will register domain names and 
use them right away (which may be true), and that the lack of a delay 
enables them to do things they couldn't otherwise do (which isn't).

Plenty of spammers register lots of .com domain names and let them sit 
for a little while before using them; if you're a committed spammer, it's 
obviously trivial to just get three days ahead of the game. The policy 
change doesn't allow evildoers to do anything they couldn't already do 
with a tiny amount of forethought (or by registering a .biz, .org, .info 
or .us domain, for that matter).

But the new policy does allow normal people to do something they couldn't 
otherwise do: have a working .com/.net Web site and e-mail in a few 
minutes. That's good for legitimate domain owner happiness.

By far the number one question customers ask my (hosting) company when 
they sign up is When will it start working?. It's almost embarrassing 
to tell these poor people ahem... it probably won't work for a day or 
so, and it's a bit random -- your friends might find it works before you 
do, so please don't complain if that happens, etc.

It's certainly true that a day's wait isn't the end of the world, but 
these people are anxious, and it is a source of confusion, bother and 
worry for them.

I welcome the change.

-- 
Robert L Mathews, Tiger Technologieshttp://www.tigertech.net/

 There are many who dare not kill themselves for fear of what the
  neighbours might say.  -- Cyril Connolly



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Chris Brenton

On Thu, 2004-07-22 at 20:24, Robert L Mathews wrote:

 At 7/22/04 10:08 AM, Paul Vixie wrote:
 
 the primary beneficiaries of this
 new functionality are spammers and other malfeasants
 
 I think you're suggesting that such people will register domain names and 
 use them right away (which may be true), and that the lack of a delay 
 enables them to do things they couldn't otherwise do (which isn't).

Actually, this *does* make the spammer's lives a whole lote easier. See
my post to Bugtraq from about a year ago titled Permitting recursion
can allow spammers to steal name server resources. It pretty much
hinges on the spammers finding an authority that will react quickly to
change requests.

Worst part is a year after that post I still see this activity taking
place. :(

HTH,
Chris




Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Randy Bush

 But the new policy does allow normal people to do something they couldn't 
 otherwise do: have a working .com/.net Web site and e-mail in a few 
 minutes. That's good for legitimate domain owner happiness.
 
 By far the number one question customers ask my (hosting) company when 
 they sign up is When will it start working?. It's almost embarrassing 
 to tell these poor people ahem... it probably won't work for a day or 
 so, and it's a bit random -- your friends might find it works before you 
 do, so please don't complain if that happens, etc.
 
 It's certainly true that a day's wait isn't the end of the world, but 
 these people are anxious, and it is a source of confusion, bother and 
 worry for them.

bingo!  and the TTL issue is almost entirely NS RRs, as Sam Stickland
[EMAIL PROTECTED] pointed out in the article from the usual
suspects at mit/lcs, http://nms.lcs.mit.edu/papers/dns-imw2001.html.
of course, almost all date in the gtlds are NS RRs, so the worry about
TTL crank-down holds, though just for silly gtld servers.  then again,
they're paid to serve.

randy



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Richard Cox

On Thu, 22 Jul 2004 17:24:07 -0700
Robert L Mathews [EMAIL PROTECTED] wrote:

| At 7/22/04 10:08 AM, Paul Vixie wrote:
|
| the primary beneficiaries of this new functionality are spammers
| and other malfeasants
|
| I think you're suggesting that such people will register domain
| names and use them right away (which may be true), and that the
| lack of a delay enables them to do things they couldn't otherwise
| do (which isn't).

The key here is not registration but change.  Currently, while spammers
and other malfeasants have the ability to send out through compromised
proxies and zombied PCs, there is little that can be done to identify
them until they require a response, and then the return path provides
some traceability via the IP addresses used, at least for nameservers.

One of the latest spammer exploits involves relying on compromised
PCs for hosting of websites and DNS: which, coupled with the ability
to update the root DNS in close-to-real-time, means that the entire
hosting operation including nameservers can be based on compromised
boxes, often with an encrypted/obfuscated link back to the real point
of control, and that is significantly harder to track.  This becomes
of rather greater significance if the hosting is for a phishing site.

The root DNS is controlled through the registrar, and what contact
information is held by the registrars frequently turns out to be at
best highly imaginative.

In removing the previous delays in updating root DNS, the registrars
have removed the last obstacle to making hosting totally-untraceable:
and then the only record of a hosting activity will be whatever data
is held by the registrar.  The only impact of the changes that ICANN
made to improve whois-accuracy, has been that the malfeasants are now
registering more domains, so that they can rely on the mandated 15-day
grace period during which when the registrar is required to keep their
domain up even though the provided contact details are totally bogus.

The demand for extra domains serves the registrars' business model well.
When a contact address is proved to be bogus, and at the end of 15 days
the domain complained of is in consequence shut down, it does not seem
to occur to most registrars that the other (say) six hundred - perhaps
thousands of domains - that were registered by the same person with the
identical contact details, must also have bogus contact details and so
should be automatically shut down.  No, an individual complaint seems
to be needed in each case, which means that the malfeasants are given
15 days from the first appearance of EACH domain during which the
entire domain is, as it were, bulletproof.

-- 
Richard Cox



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Randy Bush

 The key here is not registration but change.  Currently, while spammers
 and other malfeasants have the ability to send out through compromised
 proxies and zombied PCs, there is little that can be done to identify
 them until they require a response, and then the return path provides
 some traceability via the IP addresses used, at least for nameservers.
 
 One of the latest spammer exploits involves relying on compromised
 PCs for hosting of websites and DNS: which, coupled with the ability
 to update the root DNS in close-to-real-time, means that the entire
 hosting operation including nameservers can be based on compromised
 boxes, often with an encrypted/obfuscated link back to the real point
 of control, and that is significantly harder to track.  This becomes
 of rather greater significance if the hosting is for a phishing site.
 
 The root DNS is controlled through the registrar, and what contact
 information is held by the registrars frequently turns out to be at
 best highly imaginative.

aside from your confusion between the root and second level domain
names, this is still fud.  all they need to do is register foo.bar
with delegation to their dns servers, and change a third level
domain name at will.

randy



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread william(at)elan.net


On Fri, 23 Jul 2004, Richard Cox wrote:

 The key here is not registration but change.  Currently, while spammers
 and other malfeasants have the ability to send out through compromised
 proxies and zombied PCs, there is little that can be done to identify
 them until they require a response, and then the return path provides
 some traceability via the IP addresses used, at least for nameservers.
 
 One of the latest spammer exploits involves relying on compromised
 PCs for hosting of websites and DNS: which, coupled with the ability
 to update the root DNS in close-to-real-time, means that the entire
 hosting operation including nameservers can be based on compromised
 boxes, often with an encrypted/obfuscated link back to the real point
 of control, and that is significantly harder to track.  This becomes
 of rather greater significance if the hosting is for a phishing site.

That is one of the main reasons why I don't like that Verisign has removed
ability to find data on how list of nameservers for domain and more ip 
address of nameserver might have been changed. The only thing we can 
see is what whois shows (=bulk zone data) which is just one time/day
snapshot while spammer may have changed the ip address of nameserver
many times during the day to point to different zombie PCs.

I hope Matt can get through to correct people and deltas will be available
for those already doing bulk zone downloads.

 The demand for extra domains serves the registrars' business model well.
 When a contact address is proved to be bogus, and at the end of 15 days
 the domain complained of is in consequence shut down, it does not seem
 to occur to most registrars that the other (say) six hundred - perhaps
 thousands of domains - that were registered by the same person with the
 identical contact details, must also have bogus contact details and so
 should be automatically shut down.  No, an individual complaint seems
 to be needed in each case, which means that the malfeasants are given
 15 days from the first appearance of EACH domain during which the
 entire domain is, as it were, bulletproof.

It seems that by these policies registries are actively helping out spammers
while claiming to be neutral party. But in reality they know full well who 
the registrant of the domain is and that they deliberately breaking ICANN
rules but they do not close their account and allow them to register more
domains with false data. This neutral party excuse also leads to most
domain registries refusing spam compaints, again they know exactly who it
is that registers these domain and can definetly see they are spammer, but 
they will not do anything about it because spammers are good customers
who register lots of domains.

This situation not helping in trying to stop this epidemic.

-- 
William Leibzon
Elan Networks
[EMAIL PROTECTED]



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Eric Brunner-Williams in Portland Maine

Richard wrote:
 ... the return path provides ...

This was where I ended up also. As Barry and others have discussed on the
asrg, the write-side is throw-away assets. The return path is where the
persistence of the names used is greater and the value to the scheme is
realized.

and Randy wrote:
 all they need to do is register foo.bar
 with delegation to their dns servers, and change a third level
 domain name at will.

Yeah. But that's where registrars and registries can interpose on the
scheme. The static 2LD with a twinkling constelation of 3LDs is still
vulnerable. A run of twinkling 2LDs is harder for registrars and/or
registries to break, cross registries and registrars. There may be
fewer points of failure in the NS-set used for a particular campaign.

Eric


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-14 Thread william(at)elan.net


I reforward this email in hopes that it was by simple omission that nobody 
from Verisign is yet to respond to it. All questions in sections 1 - 3 are 
valid and something that directly concerns proposed changes, none of that 
had been asked before here in brief nanog discussion after Verisign's 
post on Friday. And of course, I'm still relying that its more then simple 
PR tactic that made verisign post to nanog originally and that they are 
going to consult internet engineering community before making any significant
change to most widely used TLD infrastructure and that if there are any 
problems found that would arrise from the change that the plan to address 
them would be made available.


-- Forwarded message --
Date: Mon, 12 Jul 2004 04:35:36 -0700 (PDT)
From: william(at)elan.net [EMAIL PROTECTED]
To: Matt Larson [EMAIL PROTECTED]
Cc: 
Subject: Re: VeriSign's rapid DNS updates in .com/.net


On Fri, 9 Jul 2004, Matt Larson wrote:

 VeriSign Naming and Directory Services (VNDS) currently generates new
 versions of the .com/.net zones files twice per day.  VNDS is
 scheduled to deploy on September 8, 2004 a new feature that will
 enable VNDS to update the .com/.net zones more frequently to reflect
 the registration activity of the .com/.net registrars in near real
 time.  After the rapid DNS update is implemented, the elapsed time
 from registrars' add or change operations to the visibility of those
 adds or changes in all 13 .com/.net authoritative name servers is
 expected to average less than five minutes.

Questions/Comments:

1. Currently SLD deligation info for .com/.net TLDs seems to be updated about
twice a day and new entire TLD dns zone is published as one bulk operation. 
These changes seems to be synced pretty well to changes in whois database
as seen at whois.crsnic.net, so listing of nameservers in whois seems 
almost always correct. Is it my understanding that after this change SLD 
dns delegation will not be synced to nameserver listing in whois?

2. Is it only changes in SLD delegation (listing of nameservers or ips of 
nameservers) that will be effected? Does that mean that changes to domain 
such as moving domain from one registrar to another, delition of domain 
will still be done once per day? Related - what about status codes as 
submitted by registrar? In particular, would change of status that causes 
domain to temporarily or permanently not be delegated (but keeps listing 
of nameservers in whois) also be processed immediatly?

 VNDS will continue to publish .com/.net zone files twice per day as
 part of the TLD Zone File Access Program. [2]  These zone files will
 continue to reflect the state of the .com/.net registry database at
 the moment zone generation begins.

3. Is it my understanding that with this change those who participate
in bulk whois program will not be able to see entire history of dns
delegation changes for the domain? In that case, you remove value of 
participation in bulk TLD zone downloads for certain kinds of research 
activity and in addition may actually be breaking service agreement for 
providing this kind of data. To cover that hole you need provide a way
to not only download entire TLD zone but also changes done to domain
since last time entire TLD zone file has been published (to give an 
example what I'm asking is ability to download UPDATES as in routevews 
directory rather then entire bgp dump from RIBS directory).  

Please note that being able to find entire history of domain delegation 
changes is important in quite a number of cases, for example when you 
need to show that either your dns registrar or isp screwed up (and then
corrected itself but does not want to admit it because that may cause them 
to pay compensation per SLA) or to show improper unathorized use of the 
domain, when its suspect that domain may have been hijacked (but dns has
been changed for half an hour and then returned back) or when you're tracking
domains used by spammers that change info from one zombie computer to another
every 10-30 minutes (you want to be able to create entire list of zombies
associated with such a domain and report these to ISPs, not just one or 
two taken once or twice per day, because otherwise spammers would just 
register different domain when that reported one is  deactivated but they
will still keep use of the same zombies)

 VNDS does not anticipate any negative consequences of deployment of
 rapid updates to the .com/.net zones.  However, as a courtesy we are
 providing the Internet community with 60 days advance notice of the
 change to the update process.

4. Last comment is I believe that such public announcement of changes
should to go other mail lists and not just nanog which covers primarily
those concerned with network routing in US and Canada, but not necessarily
with dns operations at your ISP. I'm subscribed to at least three dns 
specific mail lists and have not seen anything there. The onece I remember

Re: VeriSign's rapid DNS updates in .com/.net

2004-07-14 Thread Matt Larson

William,

On Wed, 14 Jul 2004, william(at)elan.net wrote:
 I reforward this email in hopes that it was by simple omission that nobody 
 from Verisign is yet to respond to it.

Replying to your original message has been on my to-do list.

 1. Currently SLD deligation info for .com/.net TLDs seems to be updated about
 twice a day and new entire TLD dns zone is published as one bulk operation. 
 These changes seems to be synced pretty well to changes in whois database
 as seen at whois.crsnic.net, so listing of nameservers in whois seems 
 almost always correct. Is it my understanding that after this change SLD 
 dns delegation will not be synced to nameserver listing in whois?

You are correct that the .com/.net zone files and Whois data are
currently updated at around the same time, twice per day.  Those
processes will continue after the deployment of the rapid updates.  As
a result, the .com/.net zone files available through the zone file
access program will continue match the data currently available in
Whois.  But the .com/.net the authoritative servers will contain
changes not yet reflected in Whois.

 2. Is it only changes in SLD delegation (listing of nameservers or ips of 
 nameservers) that will be effected?

Essentially, yes, but see below.

 Does that mean that changes to domain such as moving domain from one
 registrar to another, delition of domain will still be done once per
 day?

Yes.

 Related - what about status codes as submitted by registrar? In
 particular, would change of status that causes domain to temporarily
 or permanently not be delegated (but keeps listing of nameservers in
 whois) also be processed immediatly?

You're referring to Hold status, of which there are several kinds, all
of which keep a domain's NS records out of the .com/.net zones.  A
change in status will cause a domain's NS records to be inserted or
withdrawn from the .com/.net zones in near-real time.

 3. Is it my understanding that with this change those who participate
 in bulk whois program will not be able to see entire history of dns
 delegation changes for the domain?

You said bulk whois program, but I believe you're referring to the
TLD Zone File Access Program
(http://www.verisign.com/nds/naming/tld/).  VeriSign does not make the
bulk .com/.net Whois data available.

 In that case, you remove value of 
 participation in bulk TLD zone downloads for certain kinds of research 
 activity and in addition may actually be breaking service agreement for 
 providing this kind of data. To cover that hole you need provide a way
 to not only download entire TLD zone but also changes done to domain
 since last time entire TLD zone file has been published (to give an 
 example what I'm asking is ability to download UPDATES as in routevews 
 directory rather then entire bgp dump from RIBS directory).  
 
 Please note that being able to find entire history of domain delegation 
 changes is important in quite a number of cases, for example when you 
 need to show that either your dns registrar or isp screwed up (and then
 corrected itself but does not want to admit it because that may cause them 
 to pay compensation per SLA) or to show improper unathorized use of the 
 domain, when its suspect that domain may have been hijacked (but dns has
 been changed for half an hour and then returned back) or when you're tracking
 domains used by spammers that change info from one zombie computer to another
 every 10-30 minutes (you want to be able to create entire list of zombies
 associated with such a domain and report these to ISPs, not just one or 
 two taken once or twice per day, because otherwise spammers would just 
 register different domain when that reported one is  deactivated but they
 will still keep use of the same zombies)

Right now we don't have plans to make the deltas available, but I will
make sure the right people see the suggestion and your supporting
reasons for wanting them.

 4. Last comment is I believe that such public announcement of changes
 should to go other mail lists and not just nanog which covers primarily
 those concerned with network routing in US and Canada, but not necessarily
 with dns operations at your ISP. I'm subscribed to at least three dns 
 specific mail lists and have not seen anything there. The onece I remember
 by name are isp-dns.com, the other is bind-users, third one is I think 
 dns list at RIPE. 
 
 I'm not suggesting you make announcement on exactly those lists (or only 
 on those lists + nanog), but if Verisign is trying to have better 
 involvement with community and making viable prior notices worldwide of 
 changes it is making to dns system, some investigation on where is it best 
 to make such notices that it would reach largest number of persons 
 concerned with dns technical support worldwide should be done. 

With over 7000 subscribers (if I'm remembering the numbers from
Susan's latest statistics slide correctly), NANOG covers more than
just routing in North 

Re: VeriSign's rapid DNS updates in .com/.net

2004-07-12 Thread william(at)elan.net


On Fri, 9 Jul 2004, Matt Larson wrote:

 VeriSign Naming and Directory Services (VNDS) currently generates new
 versions of the .com/.net zones files twice per day.  VNDS is
 scheduled to deploy on September 8, 2004 a new feature that will
 enable VNDS to update the .com/.net zones more frequently to reflect
 the registration activity of the .com/.net registrars in near real
 time.  After the rapid DNS update is implemented, the elapsed time
 from registrars' add or change operations to the visibility of those
 adds or changes in all 13 .com/.net authoritative name servers is
 expected to average less than five minutes.

Questions/Comments:

1. Currently SLD deligation info for .com/.net TLDs seems to be updated about
twice a day and new entire TLD dns zone is published as one bulk operation. 
These changes seems to be synced pretty well to changes in whois database
as seen at whois.crsnic.net, so listing of nameservers in whois seems 
almost always correct. Is it my understanding that after this change SLD 
dns delegation will not be synced to nameserver listing in whois?

2. Is it only changes in SLD delegation (listing of nameservers or ips of 
nameservers) that will be effected? Does that mean that changes to domain 
such as moving domain from one registrar to another, delition of domain 
will still be done once per day? Related - what about status codes as 
submitted by registrar? In particular, would change of status that causes 
domain to temporarily or permanently not be delegated (but keeps listing 
of nameservers in whois) also be processed immediatly?

 VNDS will continue to publish .com/.net zone files twice per day as
 part of the TLD Zone File Access Program. [2]  These zone files will
 continue to reflect the state of the .com/.net registry database at
 the moment zone generation begins.

3. Is it my understanding that with this change those who participate
in bulk whois program will not be able to see entire history of dns
delegation changes for the domain? In that case, you remove value of 
participation in bulk TLD zone downloads for certain kinds of research 
activity and in addition may actually be breaking service agreement for 
providing this kind of data. To cover that hole you need provide a way
to not only download entire TLD zone but also changes done to domain
since last time entire TLD zone file has been published (to give an 
example what I'm asking is ability to download UPDATES as in routevews 
directory rather then entire bgp dump from RIBS directory).  

Please note that being able to find entire history of domain delegation 
changes is important in quite a number of cases, for example when you 
need to show that either your dns registrar or isp screwed up (and then
corrected itself but does not want to admit it because that may cause them 
to pay compensation per SLA) or to show improper unathorized use of the 
domain, when its suspect that domain may have been hijacked (but dns has
been changed for half an hour and then returned back) or when you're tracking
domains used by spammers that change info from one zombie computer to another
every 10-30 minutes (you want to be able to create entire list of zombies
associated with such a domain and report these to ISPs, not just one or 
two taken once or twice per day, because otherwise spammers would just 
register different domain when that reported one is  deactivated but they
will still keep use of the same zombies)

 VNDS does not anticipate any negative consequences of deployment of
 rapid updates to the .com/.net zones.  However, as a courtesy we are
 providing the Internet community with 60 days advance notice of the
 change to the update process.

4. Last comment is I believe that such public announcement of changes
should to go other mail lists and not just nanog which covers primarily
those concerned with network routing in US and Canada, but not necessarily
with dns operations at your ISP. I'm subscribed to at least three dns 
specific mail lists and have not seen anything there. The onece I remember
by name are isp-dns.com, the other is bind-users, third one is I think 
dns list at RIPE. 

I'm not suggesting you make announcement on exactly those lists (or only 
on those lists + nanog), but if Verisign is trying to have better 
involvement with community and making viable prior notices worldwide of 
changes it is making to dns system, some investigation on where is it best 
to make such notices that it would reach largest number of persons 
concerned with dns technical support worldwide should be done. 

 Some questions and answers about rapid updates for .com/.net are
 available at http://www.verisign.com/nds/naming/rapid_update/faq.html.

 [1] http://www.merit.edu/mail.archives/nanog/2004-01/msg00115.html

 [2] http://www.verisign.com/nds/naming/tld/

Additionally I notice that on the page you included as reference to TLD
zone file information on Verisign website (link [2] above) does not seem
to contain any 

RE: VeriSign's rapid DNS updates in .com/.net

2004-07-11 Thread Bruce Beckwith


Since September 2003, .ORG has offered resolution of new registrations
and changes to domain name records within 5 minutes.  This was announced
in the following release
http://www.pir.org/news/press_releases/pr_articles/2003-09-08-01

Regards,

Bruce


Bruce W. Beckwith
VP, Operations
Public Interest Registry

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Mike Lewinski
Sent: Saturday, July 10, 2004 10:36 PM
To: [EMAIL PROTECTED]
Subject: Re: VeriSign's rapid DNS updates in .com/.net


David A.Ulevitch wrote:

 I'm appreciative of this change -- but fyi, they aren't the only TLD 
 operators doing this, there are quite a few doing near-instant changes

 to their respective zones.

I just registered a new .org and it had visibility from external NS not 
more than 15 minutes later (I would have paid closer attention to just 
how long it took, but didn't even think to check on it until reading 
this thread).

Maybe I just got lucky and hit their update window (I registered ~ 
3:15AM UTC on 11-July-2004 fwiw). Anyone know the status of .org
updates?


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-10 Thread Alexei Roudnev

It is cool, but where is any value in this (I mean - 5 minutes)  rapid
updates for .com and other base domains? I wish rapid DNS when running
enterprise zone (with dynamic updates) or when running dynamic-dns service
(for those who use dynalic IP's); but for .com and .net, it is just a public
relation useless feature - registration time is 1 year, 5 minutes vs 1/2
day - do not makes any difference.

(I am not saying that it is bad; I just do not see any reason for the
celebration - anyway,  DNS system have caches and delays measured in hours,
and when you register .com you are doing it for a few years).

- Original Message - 
From: Matt Larson [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, July 09, 2004 12:20 PM
Subject: VeriSign's rapid DNS updates in .com/.net



VeriSign Naming and Directory Services (VNDS) currently generates new
versions of the .com/.net zones files twice per day.  VNDS is
scheduled to deploy on September 8, 2004 a new feature that will
enable VNDS to update the .com/.net zones more frequently to reflect
the registration activity of the .com/.net registrars in near real
time.  After the rapid DNS update is implemented, the elapsed time
from registrars' add or change operations to the visibility of those
adds or changes in all 13 .com/.net authoritative name servers is
expected to average less than five minutes.

The rapid update process will batch domain name adds and domain name
changes every few seconds.  The serial number in the .com/.net zones'
SOA records will increase with each batch of changes applied.  As
described in a message to the NANOG list in January [1], these serial
numbers are now based on UTC time encoded as the number of seconds
since the UNIX epoch (00:00:00 GMT, 1 January 1970).

VNDS will continue to publish .com/.net zone files twice per day as
part of the TLD Zone File Access Program. [2]  These zone files will
continue to reflect the state of the .com/.net registry database at
the moment zone generation begins.

VNDS does not anticipate any negative consequences of deployment of
rapid updates to the .com/.net zones.  However, as a courtesy we are
providing the Internet community with 60 days advance notice of the
change to the update process.

Some questions and answers about rapid updates for .com/.net are
available at http://www.verisign.com/nds/naming/rapid_update/faq.html.

Matt
--
Matt Larson [EMAIL PROTECTED]
VeriSign Naming and Directory Services


[1] http://www.merit.edu/mail.archives/nanog/2004-01/msg00115.html

[2] http://www.verisign.com/nds/naming/tld/



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-10 Thread David A . Ulevitch

On Jul 10, 2004, at 1:19 PM, Alexei Roudnev wrote:
It is cool, but where is any value in this (I mean - 5 minutes)  rapid
updates for .com and other base domains? I wish rapid DNS when running
enterprise zone (with dynamic updates) or when running dynamic-dns 
service
(for those who use dynalic IP's); but for .com and .net, it is just a 
public
relation useless feature - registration time is 1 year, 5 minutes vs 
1/2
day - do not makes any difference.
It makes a big difference to people who sell web/mail/etc services to 
people that includes the domain name.

It means that someone who pays for a new website through an automated 
system doesn't have to wait 12-24 hours for it to be live, just a few 
minutes.

It also means that changes can be made to host records quickly which is 
important for people who don't plan well or have unexpected changes 
that they want propagated.

I'm appreciative of this change -- but fyi, they aren't the only TLD 
operators doing this, there are quite a few doing near-instant changes 
to their respective zones.

The only thing I would still want would be the ability to create 
multiple host records of the same name but with various values.  At 
least the opposite, mutliple host names to the same value is now 
allowed.  That's good enough for me. :)

-davidu


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-10 Thread Alexei Roudnev

Hmm... May be, you are correct - if you sell service to the 'consumers'
(inexperienced customers), they do not expect any delays between 'payment
completed' and 'I can see my brand new domain WWW.HOW-COOL-I-AM.COM. And
TTL's/caches do not prevent you from this, because you did not requested
this domain before.

This is still just Public relation, but very useful, I agree.

PS. I  know about other operator, I just wanted to verify, who appreciate
this improvement - I agree that it is good for average consumer market (I
want to show my new WEB to  my friends NOW, while I am on weekend
downloading my photos, and I do not want to know about 24h, IP hops, DNS
cliens, TTLs and so on ... ). One more step in making Internet the same
'simple to use' reality as houses, cars, TV






 On Jul 10, 2004, at 1:19 PM, Alexei Roudnev wrote:

 
  It is cool, but where is any value in this (I mean - 5 minutes)  rapid
  updates for .com and other base domains? I wish rapid DNS when running
  enterprise zone (with dynamic updates) or when running dynamic-dns
  service
  (for those who use dynalic IP's); but for .com and .net, it is just a
  public
  relation useless feature - registration time is 1 year, 5 minutes vs
  1/2
  day - do not makes any difference.

 It makes a big difference to people who sell web/mail/etc services to
 people that includes the domain name.

 It means that someone who pays for a new website through an automated
 system doesn't have to wait 12-24 hours for it to be live, just a few
 minutes.

 It also means that changes can be made to host records quickly which is
 important for people who don't plan well or have unexpected changes
 that they want propagated.

 I'm appreciative of this change -- but fyi, they aren't the only TLD
 operators doing this, there are quite a few doing near-instant changes
 to their respective zones.

 The only thing I would still want would be the ability to create
 multiple host records of the same name but with various values.  At
 least the opposite, mutliple host names to the same value is now
 allowed.  That's good enough for me. :)

 -davidu




Re: VeriSign's rapid DNS updates in .com/.net

2004-07-10 Thread Mike Lewinski
David A.Ulevitch wrote:
I'm appreciative of this change -- but fyi, they aren't the only TLD 
operators doing this, there are quite a few doing near-instant changes 
to their respective zones.
I just registered a new .org and it had visibility from external NS not 
more than 15 minutes later (I would have paid closer attention to just 
how long it took, but didn't even think to check on it until reading 
this thread).

Maybe I just got lucky and hit their update window (I registered ~ 
3:15AM UTC on 11-July-2004 fwiw). Anyone know the status of .org updates?


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-10 Thread Suresh Ramasubramanian

On Sat, 10 Jul 2004, David A.Ulevitch wrote:

 It also means that changes can be made to host records quickly which is 
 important for people who don't plan well or have unexpected changes 
 that they want propagated.
 
 I'm appreciative of this change -- but fyi, they aren't the only TLD 
 operators doing this, there are quite a few doing near-instant changes 
 to their respective zones.

.biz, .info etc do this as well.

It is an excellent policy, and a convenient thing not to wait several 
hours for your new .com domain to appear online immediately.

The disadvantage is, of course, that several abusers who register domains 
at a rapid clip with these two tlds, setting  1 minute TTL on these and 
pointing these domain names to IPs that are basically compromised boxes or 
virus infected boxes, will now also start using .com / .net

There should be some way of fixing this, like requiring registrars to do
more due diligence when registering domains, maybe, and some better /
faster procedures to take down [say] phisher domains with fake contact
info.  Well yes, there is already a process, but it could sure do with 
more streamlining.

regards
--srs



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-10 Thread David A . Ulevitch

On Jul 10, 2004, at 7:35 PM, Mike Lewinski wrote:
David A.Ulevitch wrote:
I'm appreciative of this change -- but fyi, they aren't the only TLD 
operators doing this, there are quite a few doing near-instant 
changes to their respective zones.
I just registered a new .org and it had visibility from external NS 
not more than 15 minutes later (I would have paid closer attention to 
just how long it took, but didn't even think to check on it until 
reading this thread).

Maybe I just got lucky and hit their update window (I registered ~ 
3:15AM UTC on 11-July-2004 fwiw). Anyone know the status of .org 
updates?
Nope, .org is run this way also (since the handover to udns, if I 
remember right.  I don't know of a comprehensive list of tld's in this 
setup but I would say that the list is only growing...I learn of tlds 
running in this fashion every once in a while[1].

-davidu
1: not to imply any connection to when I notice it and when it is 
actually implemented. ;)



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-09 Thread Robert Boyle
At 03:20 PM 7/9/2004, you wrote:
time.  After the rapid DNS update is implemented, the elapsed time
from registrars' add or change operations to the visibility of those
adds or changes in all 13 .com/.net authoritative name servers is
expected to average less than five minutes.
Very cool! Kudos! This is good news from Verisign on NANOG for a change. :) 
Does this also apply to domains with other registrars? From your message 
wording above, it appears that is the case which is great news. Does this 
apply to authoritative name server changes as well? Also, does this apply 
to customers who have had their domains suspended due to non-payment? That 
is always tough for our support desk to tell a customer they need to pay 
their bill to registrar X then wait 24-48 hours. If this will end that mess 
too, that's even better.

-Robert
Tellurian Networks - The Ultimate Internet Connection
http://www.tellurian.com | 888-TELLURIAN | 973-300-9211
Good will, like a good name, is got by many actions, and lost by one. - 
Francis Jeffrey



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-09 Thread Deepak Jain

Very cool! Kudos! This is good news from Verisign on NANOG for a change. 
:) Does this also apply to domains with other registrars? From your 
message wording above, it appears that is the case which is great news. 
Does this apply to authoritative name server changes as well? Also, does 
this apply to customers who have had their domains suspended due to 
non-payment? That is always tough for our support desk to tell a 
customer they need to pay their bill to registrar X then wait 24-48 
hours. If this will end that mess too, that's even better.

Seconded. This is very cool and something I think everyone has wanted 
for a long time.

[Devil's Advocate Hat On]
So domain hijacking can now take place in seconds in the middle of the 
night?

[Devil's Advocate Hat Off]
And you can fix hijacked domains in seconds!!
DJ


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-09 Thread Valdis . Kletnieks
On Fri, 09 Jul 2004 16:00:30 EDT, Deepak Jain said:

 And you can fix hijacked domains in seconds!!

Devil's Advocate Hat On

Or social-engineer somebody to fix a hijacked domain in seconds.. :)

Hat Off


pgpfKYj8Ab6Wu.pgp
Description: PGP signature


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-09 Thread Christopher L. Morrow


On Fri, 9 Jul 2004 [EMAIL PROTECTED] wrote:

 On Fri, 09 Jul 2004 16:00:30 EDT, Deepak Jain said:

  And you can fix hijacked domains in seconds!!

 Devil's Advocate Hat On

 Or social-engineer somebody to fix a hijacked domain in seconds.. :)

 Hat Off


all still dependent on the 'its hijackable' to begin with, right? So what
changed really?


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-09 Thread Deepak Jain

all still dependent on the 'its hijackable' to begin with, right? So what
changed really?
The window to be notified and respond probably just shrunk by an 
enormous factor. Everything is hijackable.

DJ


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-09 Thread Christopher L. Morrow


On Fri, 9 Jul 2004, Deepak Jain wrote:

 
  all still dependent on the 'its hijackable' to begin with, right? So what
  changed really?
 

 The window to be notified and respond probably just shrunk by an
 enormous factor. Everything is hijackable.

I wasn't aware you got a notification upon hijack...


Re: VeriSign's rapid DNS updates in .com/.net

2004-07-09 Thread Deepak Jain

The window to be notified and respond probably just shrunk by an
enormous factor. Everything is hijackable.

I wasn't aware you got a notification upon hijack...

You may... you may not. If you don't its definitely a hijack. If you did 
and you were able to prevent it, its not a hijack. It really depends on 
the registrar I think.

As far as cancelling domains purchased with jacked credit cards... 
Verisign doesn't get a refund from ICANN or whoever if the domain is 
cancelled after the first two weeks or something... so why should 
Verisign cancel the domain when it helps their total-domains-registered 
rankings and THEY had to pay for it.

DJ



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-09 Thread Eric Brunner-Williams

 Verisign doesn't get a refund from ICANN ...

Deepak,

First, the fee to ICANN is on the order of $0.20/per, as opposed to the
fee we registrars pay to VGRS, which is on the order of $6.00. Second,
the fees paid by both the registries and registrars is subject to some
negociations, which is presently happening with much more energy and
vigor than usual, since ICANN wants to really grow its budget this year,
at the expense of the ... registrars and registries.

Eric

Oh, I just submitted a xfr on a hijacked domain ... sigh.



Re: VeriSign's rapid DNS updates in .com/.net

2004-07-09 Thread Matt Larson

On Fri, 09 Jul 2004, Robert Boyle wrote:
 Does this also apply to domains with other registrars?

I'm not sure what you mean by other registrars.  VeriSign sold the
Network Solutions registrar in November 2003 (although it retains a
15% ownership).

The rapid updates apply to all changes from all registrars.

 Does this apply to authoritative name server changes as well?

Do you mean, does it apply to glue records (i.e., A records for name
servers) in the .com/.net zones?  Yes, it does: a change to a name
server's IP address will be reflected just as fast as a change to a
domain's (er, zone's) NS records.

 Also, does this apply to customers who have had their domains
 suspended due to non-payment?

I'm not sure what you mean here, but I think you're referring to
something that's ultimately a registrar issue.  A domain can be placed
on hold status in the registry and its NS records will not appear in
the .com/.net zones.  There are several different hold statuses and
they all prevent a domain's NS records from being published.  It's
possible a registrar could put a domain on hold for non-payment.  Any
changes to its name servers while it's on hold would be propagated
quickly under this new system, as would changes to its hold status, so
if it it was removed from hold, whatever changes that occurred while
it was on hold would be visible quickly.


One other issue: a few people have sent me private email asking if
we're planning on changing the 48-hour TTL for NS records and A
records in .com/.net.  At this point we're not and the reason has a
lot to do with a little-known DNS behavior called credibility.  It's
described in RFC 2181 (Clarifications to the DNS Specification),
Section 5.4.1, although the concept pre-dates that RFC and has been in
the BIND iterative resolver, for example, since version 4.9 (if memory
serves).

In a nutshell, DNS data has different levels of credibility or
trustworthiness depending on where it's learned from.  That's relevant
here because the version of a zone's NS records from the zone's
authoritative servers is more trustworthy than the version obtained
from the zone's parent name servers.  For example, the foo.com NS
records received from a foo.com authoritative server are believed over
the foo.com NS records received from a .com name server.  Most
positive responses include the zone's NS records along with the
specific data requested (such as an A record).  So in practice, here's
what happens:

- An iterative resolver chasing down, for example, A records for
  www.foo.com queries a .com name server and caches the foo.com NS
  records (with a 48-hour TTL) it receives.

- The resolver then queries one of the foo.com name servers for the
  www.foo.com A records.

- In the response the resolver receives the www.foo.com A records,
  along with foo.com's own version of the foo.com NS records--and this
  is the important part--which have the TTL set by the foo.com zone
  owner.

- According to the credibility scale, the just-received foo.com NS
  records are more credible than the cached foo.com NS records from
  .com, so the just-received records displace the cached ones, new TTL
  and all.

In other words, for all the iterative resolvers out there that have
this credibility mechanism, the 48-hour TTL on data in .com/.net isn't
particularly relevant.

Matt