[dnsext] Re: I-D ACTION:draft-vandergaast-edns-client-ip-00.txt

Wilmer van der Gaast <wilmer@google.com> Fri, 29 January 2010 18:48 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7305F3A67DA; Fri, 29 Jan 2010 10:48:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.317
X-Spam-Level:
X-Spam-Status: No, score=-105.317 tagged_above=-999 required=5 tests=[AWL=0.660, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nkQhmX-pg+K3; Fri, 29 Jan 2010 10:48:06 -0800 (PST)
Received: from psg.com (psg.com [147.28.0.62]) by core3.amsl.com (Postfix) with ESMTP id 7A1873A67E5; Fri, 29 Jan 2010 10:48:06 -0800 (PST)
Received: from majordom by psg.com with local (Exim 4.71 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1NavnK-000GwV-5E for namedroppers-data0@psg.com; Fri, 29 Jan 2010 18:42:14 +0000
Received: from [216.239.33.17] (helo=smtp-out.google.com) by psg.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.71 (FreeBSD)) (envelope-from <wilmer@google.com>) id 1NavnH-000Gvc-Jl for namedroppers@ops.ietf.org; Fri, 29 Jan 2010 18:42:11 +0000
Received: from kpbe17.cbf.corp.google.com (kpbe17.cbf.corp.google.com [172.25.105.81]) by smtp-out.google.com with ESMTP id o0TIg89O022103 for <namedroppers@ops.ietf.org>; Fri, 29 Jan 2010 18:42:09 GMT
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1264790529; bh=CNFr3kKyJoMqMorbV0ltTuzkeSo=; h=MIME-Version:In-Reply-To:References:Date:Message-ID:Subject:From: To:Content-Type; b=EJAJa50J59oEZt4inx3Q4inve0metcm6jJaw+3B1z/gD9qiG7HjYtfhkksDvjllw6 txVwTGeUUZppLtUYVj3Aw==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:date:message-id:subject:from:to: content-type:x-system-of-record; b=l4YfZ4nUxCGd2zuum71QAO9L62eQWMr9JD5SURNbN1a76R8fpUUn7ij4EHDR25I/h HtvIYJ8QzMPi8yva4DU9A==
Received: from iwn39 (iwn39.prod.google.com [10.241.68.103]) by kpbe17.cbf.corp.google.com with ESMTP id o0TId8qK018438 for <namedroppers@ops.ietf.org>; Fri, 29 Jan 2010 10:42:07 -0800
Received: by iwn39 with SMTP id 39so257082iwn.1 for <namedroppers@ops.ietf.org>; Fri, 29 Jan 2010 10:42:07 -0800 (PST)
MIME-Version: 1.0
Received: by 10.231.159.207 with SMTP id k15mr405386ibx.52.1264790527318; Fri, 29 Jan 2010 10:42:07 -0800 (PST)
In-Reply-To: <7c31c8cc1001271556w4918093er6e94e07cb92c4dc4@mail.gmail.com>
References: <7c31c8cc1001271556w4918093er6e94e07cb92c4dc4@mail.gmail.com>
Date: Fri, 29 Jan 2010 18:42:07 +0000
Message-ID: <7c31c8cc1001291042u76f706d0odeeb626d02037a9e@mail.gmail.com>
Subject: [dnsext] Re: I-D ACTION:draft-vandergaast-edns-client-ip-00.txt
From: Wilmer van der Gaast <wilmer@google.com>
To: namedroppers@ops.ietf.org
Content-Type: text/plain; charset="ISO-8859-1"
X-System-Of-Record: true
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>
List-Unsubscribe: To unsubscribe send a message to namedroppers-request@ops.ietf.org with
List-Unsubscribe: the word 'unsubscribe' in a single line as the message text body.
List-Archive: <http://ops.ietf.org/lists/namedroppers/>

Let me clarify a few more things.

* Fallback mechanism:
Good idea. In fact I have noticed that not only cheap home routers can
choke on DNS packets with EDNS0 options, even Netscalers (with some
versions + configs at least) can intercept them and return a FORMERR
response.

This isn't so much a problem specific to edns-client-ip, but I agree
we should describe a fallback mechanism in this I-D (and for now in
every I-D describing an EDNS0 option, it seems. :-( )

* RFC1918 IP space, NAT, etc.
Nicholas Weaver's e-mail
<8419C7FF-27E8-47AD-924C-BE42AC75E54E@ICSI.Berkeley.EDU> /
<http://www.ops.ietf.org/lists/namedroppers/namedroppers.2010/msg00105.html>
explains the behaviour we intended perfectly. We'll make sure to make
this behaviour much clearer in -01 since clearly it's currently
lacking.

* DNS/HTTP coming from different IP addresses:
I believe this is not so much related to our draft, or if anything,
our draft will make it possible to solve this problem by letting the
resolver include the external IP address from where HTTP traffic will
exit. If the resolver can't know this information (i.e. if it's not
predictable) then there isn't *any* way for CDNs to fix this problem;
even when using something like a 302 it's entirely possible that
another exit point will be used for the new connection.

* The requirement to include the option in responses only if the
request contained one.
Obviously our intent is to require edns-client-ip options only in
responses to queries that contained one. We'll clarify that in the
doc.

* Allowing to use the option without returning it in the response:
There's one problem with that. Without getting back the option a
caching resolver doesn't know how reusable the response is and will
assume it's suitable for everyone. Allowing that behaviour would allow
one to trick a resolver in Europe to cache the result of
www.example.com for Asia. Although this isn't cache poisoning in the
strictly malicious sense, it's definitely undesirable.

* Making larger netmasks (i.e. lowering the number) optional:
Although I'm not against making this a weak recommendation, doing this
affects not only the auth. resolver with generating more traffic, it
does also increase cache pressure on the resolver. Needs more
discussion.


Regards,

-- 
Wilmer van der Gaast, Dublin Traffic SRE.
Google Ireland.