Re: [DNSOP] Fwd: I-D Action: draft-song-dnsop-tcp-primingexchange-00.txt

Davey Song <songlinjian@gmail.com> Fri, 28 November 2014 06:33 UTC

Return-Path: <songlinjian@gmail.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B06EF1A1A3E for <dnsop@ietfa.amsl.com>; Thu, 27 Nov 2014 22:33:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.999
X-Spam-Level:
X-Spam-Status: No, score=-3.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, GB_I_LETTER=-2, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wgWWIHW9Btzg for <dnsop@ietfa.amsl.com>; Thu, 27 Nov 2014 22:32:57 -0800 (PST)
Received: from mail-qg0-x22c.google.com (mail-qg0-x22c.google.com [IPv6:2607:f8b0:400d:c04::22c]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 05FFC1A1A3D for <dnsop@ietf.org>; Thu, 27 Nov 2014 22:32:57 -0800 (PST)
Received: by mail-qg0-f44.google.com with SMTP id z60so4331280qgd.17 for <dnsop@ietf.org>; Thu, 27 Nov 2014 22:32:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=CsJMldHx1mvYjxirkPsAlCtuGm2Nk//XDTRO4WeSZiQ=; b=dZ6f8M7/mgVhfAclL7WkiuX45SYWT3UR7blY7EileQcbURh0eLss/6uH0z8CS4TfnG rQtlrv3gh3bKgpdYMlJlFLc0C/RN28F+6mXPThXKToAVRkcZRk08wmazK2eyUztMrZIR KOQsvIRgNWR1IF90iamCbZcqRq1gECwNjVzg6gnCtny+DIk/9bZ7wJuuVRUTzje8alqm WfIRtHaIFhJkig3EIBx1ZtQCOdTNv3OKSd8g6LrRxMErLktcRfmneMagg3N4VVS6YSDw GbLy9YYrm8/byxgK6P1YufW1NU5xJuA/3WJfCA8A9IYdH1VIWeM3OkP0/88gBMNcPb9P Tpdg==
MIME-Version: 1.0
X-Received: by 10.140.41.71 with SMTP id y65mr59757072qgy.64.1417156376225; Thu, 27 Nov 2014 22:32:56 -0800 (PST)
Received: by 10.140.91.202 with HTTP; Thu, 27 Nov 2014 22:32:56 -0800 (PST)
In-Reply-To: <54768F63.9070509@redbarn.org>
References: <20141126190228.2644.32272.idtracker@ietfa.amsl.com> <CAAObRXJM1Ucu3RtJCZPaw2ss0+ZBXxnDyyUvshuAnqEQYEi2XA@mail.gmail.com> <54768F63.9070509@redbarn.org>
Date: Fri, 28 Nov 2014 14:32:56 +0800
Message-ID: <CAAObRXLhG0Wfj2eC=+Xb+jnO0fLbiSAvVJti5VtpGANRyHC22g@mail.gmail.com>
From: Davey Song <songlinjian@gmail.com>
To: Paul Vixie <paul@redbarn.org>
Content-Type: multipart/related; boundary="001a11c135e8658a170508e56e71"
Archived-At: http://mailarchive.ietf.org/arch/msg/dnsop/2w6TOIAwBn0F0UjrWyURb7PGZGo
Cc: dnsop@ietf.org
Subject: Re: [DNSOP] Fwd: I-D Action: draft-song-dnsop-tcp-primingexchange-00.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Nov 2014 06:33:01 -0000

Thanks Paul. Please see the reply in line.

On Thu, Nov 27, 2014 at 10:41 AM, Paul Vixie <paul@redbarn.org> wrote:

>
>
>   Davey Song <songlinjian@gmail.com>
>  Wednesday, November 26, 2014 11:18 AM
> Hi folks, I just post a draft on Priming Exchange over TCP. Comments are
> welcome!
>
>
> davey, your abstract says "DNS payload size limitation constrains
> operational and policy choice for many years." your document does not give
> any examples of specific operational or policy constraints caused by this
> limitation.
>

I try to address the constraints in  section 2, see  "2. Operational and
policy constraints with Priming Exchange" . Actually, I start to study the
constraint from your draft (draft-ietf-dnsop-respsize-15)


> today a priming query returns 755 octets of udp payload without dnssec, or
> 913 octets of udp payload with dnssec. what's missing?
>

If a priming query only contains the existing NS/A/AAAA RRset of root zone,
and do not sign for A/AAAARRset, it will be OK,  given UDP fragmentaion
dose not happen.  But if it constrains the operational possibility for the
root zone operator who want to address issue in section2.2 and section 2.3.


> if EDNS is not used then TC=1 will cause TCP fallback, thus giving us
> either one round trip for EDNS, or four round trips (one TC=1 UDP, then
> three for TCP) for non-EDNS. in your model, we would always use three round
> trips. what does this optimize for?
>

In you draft (draft-ietf-dnsop-respsize-15)  ,it mentioned "Note that
truncation of the additional data section might not be signaled via the TC
bit since additional data is often optional (see discussion in Appendix B
of [RFC4472]).". I execute "dig . ns  +noedns @l.root-servers.net " on my
desktop and receive a reply packets (<512bytes) without truncated. So in
that case the resolver will not issue any other AAAA query. it  lose other
AAAA records.

As to the optimization,  Fast open TCP (dickinson-dnsop-5966-bis,
ietf-tcpm-fastopen) may helps in that case  involving only 1 or 2 rounds
trips. it need more work to test Fast open TCP to check whether (or to what
extent) it can relieve the constraints described in section 2.


> your reference to [I-D.lee-dnsop-scalingroot] is in error. that draft
> specifies two NS RR's, each having one A RR and one AAAA RR. thus, a
> priming response from an authority server using that approach would fit
> easily in 512 octets (without EDNS), with or without DNSSEC.
>

Yes. It's my problem. "13 to millions" is not your word in the draft. I
should be more precise.


> you wrote:
>
>    The author of this memo is the advocate for DNS over TCP, especially
>    on the very occasions when it is needed.  In this memo, the priming
>    exchange is identified as one of these occasions.
>
>
> you have nowhere shown cause why root priming would be one of those
> occasions
>


>
>
you wrote:
>
>    From the technical point of view, the number of NS server should be
>    treated as a parameter of the root system, rather than a constant
>    making the root server as some kind of rare resource of Internet
>    which only incurs constant disputes with Internet governance issue.
>
>
> you say "from a technical point of view" but then you give a completely
> non-technical reason. this makes your intent difficult to understand.
>
> later you say "Without actions above, be aware of the large possibility of
> risk due to truncated UDP packets or fragmentation", but you give no
> specific examples. what risks do you know of -- and are we facing them
> today?
>
> in your listing of pro's and con's for this proposal, you note as a "pro":
>
>    1)Adding full A/AAAA address of Root server in priming response,
>    which will enhance the resiliency of Root system for IPv6 users,
>    especially under the consideration of IPv6-only deployment
>    [I-D.song-sunset4-ipv6only-dns].
>
>
> i am appending below my signature a priming query performed just now,
> using EDNS and DNSSEC. as you will see, all IPv6 addresses are present, and
> there is plenty of room for additional addresses.
>
> with specific reference to your mention of "constant disputes with
> Internet governance issue", the only constantly disputed internet
> governance issue i am aware of in the area of DNS root name service is the
> desire by several national governments around the world to have a root name
> server "letter" of their own, for prestige reasons. i usually dismiss this
> as crazy talk, as you know. if however that is one of your concerns, then i
> suggest you address it as a policy matter and not as a technical matter.
> if someone told you that more countries can't have their own "root name
> server letter" because root DNS priming queries don't use TCP by default,
> then i would appreciate knowing exactly who said it, and in what context,
> and when.
>
>
 I try to express the idea: is there any possibility that if we can breaks
the rareness of Root servers. The arguments and disputes will cease
accordingly. Actually  this idea is out of the scope of this draft.

-- 
> Paul Vixie
>
>
> re:
>
> ; <<>> DiG 9.10.1b1 <<>> @f.root-servers.net +dnssec
> ; (2 servers found)
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45593
> ;; flags: qr aa rd; QUERY: 1, ANSWER: 14, AUTHORITY: 0, ADDITIONAL: 25
> ;; WARNING: recursion requested but not available
>
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags: do; udp: 4096
> ;; QUESTION SECTION:
> ;.                              IN      NS
>
> ;; ANSWER SECTION:
> .                       518400  IN      NS      k.root-servers.net.
> .                       518400  IN      NS      f.root-servers.net.
> .                       518400  IN      NS      j.root-servers.net.
> .                       518400  IN      NS      i.root-servers.net.
> .                       518400  IN      NS      a.root-servers.net.
> .                       518400  IN      NS      d.root-servers.net.
> .                       518400  IN      NS      m.root-servers.net.
> .                       518400  IN      NS      g.root-servers.net.
> .                       518400  IN      NS      e.root-servers.net.
> .                       518400  IN      NS      b.root-servers.net.
> .                       518400  IN      NS      l.root-servers.net.
> .                       518400  IN      NS      c.root-servers.net.
> .                       518400  IN      NS      h.root-servers.net.
> .                       518400  IN      RRSIG   NS 8 0 518400
> 20141203170000 20141126160000 22603 .
> KdqZRoBzFv8Uzh6jksly2gCNGzaJtqa4c3P8LScFLQiPSh/pZ8DP+/Zb
> pIIEYBON23y2cQBQF0KrFbOr3nlVHieYTSP76Y6VBPRa11V7f8GVrC47
> bKdCULo5esc1u6C7OOCerLrXabP1UNdGq0SWfIXnyquJ6fhBVn0rt6jv jCw=
>
> ;; ADDITIONAL SECTION:
> a.root-servers.net.     3600000 IN      A       198.41.0.4
> a.root-servers.net.     3600000 IN      AAAA    2001:503:ba3e::2:30
> b.root-servers.net.     3600000 IN      A       192.228.79.201
> b.root-servers.net.     3600000 IN      AAAA    2001:500:84::b
> c.root-servers.net.     3600000 IN      A       192.33.4.12
> c.root-servers.net.     3600000 IN      AAAA    2001:500:2::c
> d.root-servers.net.     3600000 IN      A       199.7.91.13
> d.root-servers.net.     3600000 IN      AAAA    2001:500:2d::d
> e.root-servers.net.     3600000 IN      A       192.203.230.10
> f.root-servers.net.     3600000 IN      A       192.5.5.241
> f.root-servers.net.     3600000 IN      AAAA    2001:500:2f::f
> g.root-servers.net.     3600000 IN      A       192.112.36.4
> h.root-servers.net.     3600000 IN      A       128.63.2.53
> h.root-servers.net.     3600000 IN      AAAA    2001:500:1::803f:235
> i.root-servers.net.     3600000 IN      A       192.36.148.17
> i.root-servers.net.     3600000 IN      AAAA    2001:7fe::53
> j.root-servers.net.     3600000 IN      A       192.58.128.30
> j.root-servers.net.     3600000 IN      AAAA    2001:503:c27::2:30
> k.root-servers.net.     3600000 IN      A       193.0.14.129
> k.root-servers.net.     3600000 IN      AAAA    2001:7fd::1
> l.root-servers.net.     3600000 IN      A       199.7.83.42
> l.root-servers.net.     3600000 IN      AAAA    2001:500:3::42
> m.root-servers.net.     3600000 IN      A       202.12.27.33
> m.root-servers.net.     3600000 IN      AAAA    2001:dc3::35
>
> ;; Query time: 34 msec
> ;; SERVER: 2001:500:2f::f#53(2001:500:2f::f)
> ;; WHEN: Thu Nov 27 02:21:54 UTC 2014
> ;; MSG SIZE  rcvd: 913
>
>