Re: [DNSOP] [dns-operations] dnsop-any-notimp violates the DNS standards

Paul Vixie <paul@redbarn.org> Mon, 16 March 2015 14:53 UTC

Return-Path: <paul@redbarn.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 300B11A87AA for <dnsop@ietfa.amsl.com>; Mon, 16 Mar 2015 07:53:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PY_ckR_-Pamr for <dnsop@ietfa.amsl.com>; Mon, 16 Mar 2015 07:53:29 -0700 (PDT)
Received: from family.redbarn.org (family.redbarn.org [24.104.150.213]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 88A161A87E7 for <dnsop@ietf.org>; Mon, 16 Mar 2015 07:53:24 -0700 (PDT)
Received: from [192.168.11.65] (OFSfx-13p9-14.ppp11.odn.ad.jp [39.3.162.14]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by family.redbarn.org (Postfix) with ESMTPSA id 091E61814C; Mon, 16 Mar 2015 14:53:23 +0000 (UTC)
Message-ID: <5506EE5D.3000408@redbarn.org>
Date: Mon, 16 Mar 2015 23:53:17 +0900
From: Paul Vixie <paul@redbarn.org>
User-Agent: Postbox 3.0.11 (Windows/20140602)
MIME-Version: 1.0
To: bert hubert <bert.hubert@netherlabs.nl>
References: <20150309110803.4516.qmail@cr.yp.to> <20150309151812.GA14897@xs.powerdns.com> <20150316142350.GB26918@xs.powerdns.com>
In-Reply-To: <20150316142350.GB26918@xs.powerdns.com>
X-Enigmail-Version: 1.2.3
Content-Type: multipart/alternative; boundary="------------000900000705030108010800"
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsop/lYpqISmEbhD2ihPhJDnfLUaxz2Y>
Cc: dnsop@ietf.org, dns-operations@dns-oarc.net
Subject: Re: [DNSOP] [dns-operations] dnsop-any-notimp violates the DNS standards
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Mar 2015 14:53:31 -0000


> bert hubert <mailto:bert.hubert@netherlabs.nl>
> Monday, March 16, 2015 11:23 PM
> On Mon, Mar 09, 2015 at 04:18:12PM +0100, bert hubert wrote:
>> On Mon, Mar 09, 2015 at 11:08:03AM -0000, D. J. Bernstein wrote:
>>> My "qmail" software is very widely deployed (on roughly 1 million SMTP
>>> server IP addresses) and, by default, relies upon ANY queries in a way
>>> that is guaranteed to work by the mandatory DNS standards.
> (...)
>> Do you think I read 4.3.2 wrong? Or is there another RFC that updates the
>> algorithm?
>
> Thanks to some clarification from Dan, I now understand that one can indeed
> rely on ANY queries to resolvers to either deliver a CNAME or no CNAME, in
> which case there is no CNAME. 

i'd like to see those clarifications. if any non-CNAME RRset had existed
and been cached, and then replaced by a CNAME, then ANY would not see
the CNAME until the last non-CNAME RRset had expired from that cache.

which is why, when i want to know if there is a CNAME, i ask if there's
a CNAME.

i realize that this only matters when the non-CNAME TTL's are one to two
weeks long, and weren't trimmed before replacement with the CNAME.
however, that situation is common enough that i dispute the phrase
quoted above, "guaranteed to work by mandatory DNS standards."

>
> Separately, I fail to see why we actually need to outlaw ANY queries when we
> can happily TC=1 them. 

TC=1'ing them would be a way to prevent them from being used as an
amplifying reflector. that is not the use case for this. the updated
document makes clear that the iteration complexity in split-authority
systems having a lightweight front end, is the situation where ANY is
painful.

there never was an ANY-related problem for which TC=1 was the solution.

-- 
Paul Vixie