Re: [dnsop] WG Last Call: draft-ietf-dnsop-ipv6-dns-issues-04.txt

"S. Daniel Park" <natpp00@kornet.net> Tue, 13 April 2004 17:10 UTC

Received: from darkwing.uoregon.edu (root@darkwing.uoregon.edu [128.223.142.13]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA22377 for <dnsop-archive@lists.ietf.org>; Tue, 13 Apr 2004 13:10:00 -0400 (EDT)
Received: from darkwing.uoregon.edu (majordom@localhost [127.0.0.1]) by darkwing.uoregon.edu (8.12.11/8.12.11) with ESMTP id i3DFJqZX018175 for <dnsop-outgoing@darkwing.uoregon.edu>; Tue, 13 Apr 2004 08:19:52 -0700 (PDT)
Received: (from majordom@localhost) by darkwing.uoregon.edu (8.12.11/8.12.11/Submit) id i3DFJqtj018174 for dnsop-outgoing; Tue, 13 Apr 2004 08:19:52 -0700 (PDT)
Received: from relay6.kornet.net (relay6.kornet.net [211.48.62.166]) by darkwing.uoregon.edu (8.12.11/8.12.11) with ESMTP id i3DFJoJV017761 for <dnsop@lists.uoregon.edu>; Tue, 13 Apr 2004 08:19:51 -0700 (PDT)
Received: from [221.147.173.240] (natpp00@kornet.net) by relay6.kornet.net (Terrace MailWatcher) with ESMTP id 2004041400:19:44:332416.7114.280 for <pekkas@netcore.fi>; Wed, 14 Apr 2004 00:19:44 +0900 (KST)
Message-ID: <00f101c4216a$c0ba6eb0$f0ad93dd@shpark>
From: "S. Daniel Park" <natpp00@kornet.net>
To: Pekka Savola <pekkas@netcore.fi>
Cc: dnsop@lists.uoregon.edu
References: <1081500152830513842.0.ppp13@ppp13>
Subject: Re: [dnsop] WG Last Call: draft-ietf-dnsop-ipv6-dns-issues-04.txt
Date: Wed, 14 Apr 2004 00:19:45 +0900
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1158
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
Sender: owner-dnsop@lists.uoregon.edu
Precedence: bulk
Reply-To: "S. Daniel Park" <natpp00@kornet.net>
Content-Transfer-Encoding: 7bit

Sorry for being too late comment

Just references nits:

[27]  Droms, R., "Stateless DHCP Service for IPv6",
         draft-ietf-dhc-dhcpv6-stateless-04 (work in progress), January
         2004.


Would be RFC 3736 April 2004.



- Daniel (Soohong Daniel Park)
- Mobile Platform Laboratory, Samsung Electronics.
----- Original Message ----- 
From: "Pekka Savola" <pekkas@netcore.fi>
To: "Ralph Droms" <rdroms@cisco.com>
Cc: <dnsop@lists.uoregon.edu>; "Michael A. Patton" <MAP@MAP-NE.com>
Sent: Friday, April 09, 2004 3:33 PM
Subject: Re: [dnsop] WG Last Call: draft-ietf-dnsop-ipv6-dns-issues-04.txt


> Thanks for responding.  Trying to clarify further...
>
> (Michael -- we discussed this last December: do you have pointers to
> the work on adding entirely new records (rather than updating) to the
> zones, as noted in section 6?  Maybe some others know more of this
> than me...)
>
> I've updated the working copies in the same URL:
>
>
http://www.netcore.fi/pekkas/ietf/temp/draft-ietf-dnsop-ipv6-dns-issues-05pre.txt
>
http://www.netcore.fi/pekkas/ietf/temp/draft-ietf-dnsop-ipv6-dns-issues-05pre-diff.html
>
> Note to DNSOP WG: there has been some discussion on IPv6 WG what to
> say about DNS (forward/reverse) of the new "site-local replacement"
> described in draft-ietf-ipv6-unique-local-addr-03.txt.  I've avoided
> adding text on this as it's a bit of moving target (in AD
> evaluation:WG followup at the moment), but if people have opinions
> about that, feel free to shoot them.  (Note that Appendix A already
> lists considerations with site-local addresses, but the situation is
> slightly different with unique local addresses.)
>
> On Wed, 7 Apr 2004, Ralph Droms wrote:
> > Comments on draft-ietf-dnsop-ipv6-dns-issues-05pre.txt:
> >
> > I'm still having trouble understanding:
> >
> >     2.3  6to4 Addresses
> >
> >        6to4 [10] specifies an automatic tunneling mechanism which maps
> >        a public IPv4 address V4ADDR to an IPv6 prefix 2002:V4ADDR::/48.
> >        Providing reverse DNS delegation path for such addresses is a
> >        challenge.  Note that similar difficulties don't surface with
> >        the other automatic tunneling mechanisms. In particular,
> >        providing reverse DNS information for Teredo [11] hosts does not
> >        seem feasible; the IPv6 address is based on the IPv4 address and
> >        UDP port of the current NAT mapping which is likely to be
> >        relatively short-lived.
> >
> > The last sentence seems to contradict the preceding sentence.
>
> OK, let me try to reword this to:
>
>         <t><xref target="RFC3056">6to4</xref> specifies an automatic
> tunneling mechanism which maps a public IPv4 address V4ADDR to an IPv6
> prefix 2002:V4ADDR::/48.  Providing reverse DNS delegation path for
> such addresses is a challenge.</t>
>
>         <t>Note that it does not seem feasible to provide reverse DNS
> with the other automatic tunneling mechanism, <xref
> target="I-D.huitema-v6ops-teredo">Teredo</xref>; this is because
> the IPv6 address is based on the IPv4 address and UDP port of the
> current NAT mapping which is likely to be relatively short-lived.</t>
>
> (note that I'm intentionally not mentioning iSATAP here as it derives
> the address from an advertised v6 prefix, so there is nothing new
> there.)
>
> Better?
>
> [[ note to those who may be watching: I also added a paragraph of
> discussion on draft-huston-6to4-reverse-dns-00.txt here ]]
>
> > I don't think section 5.2 accurately reflects the current state of
> > specifications and discussion about recursive DNS resolver
configuration:
> >
> >     5.2  Recursive DNS Resolver Discovery
> >
> >        Recursive IPv6 DNS resolver discovery is a subject of active
> >        debate as of this writing (March 2003): the main proposed
> >        mechanisms include the use of well-known addresses [24], the use
> >        of Router Advertisements to convey the information [25], and
> >        using DHCPv6 (or the stateless subset of it [26]) for DNS
> >        resolver configuration [27].  No consensus has been reached yet.
> >
> >        Note that IPv6 DNS resolver discovery is not required for
> >        dual-stack nodes in dual-stack networks as IPv6 DNS records can
> >        be queried over IPv4 as well as IPv6.
> >
> > I think the current situation regarding recursive DNS resolver
configuration
> > would be more accurately reflected by the following paragraph:
> >
> >     5.2 Obtaining a list of DNS Recursive Resolvers
> >
> >        A host can be configured with a list of DNS recursive resolvers
> >        through the DHCPv6 "DNS Recursive Name Server" option [RFC3646].
> >        This option can be passed to a host through a subset of DHCPv6
> >        [RFC3736].  Two alternative mechanisms are under consideration:
> >        the use of well-known addresses [21] and the use of Router
> >        Advertisements to convey the information [22].
> >
> > I know this paragraph has been discussed before.  It would be good to
get
> > other WG input to make sure the text reflects WG consensus on the
subject.
>
> Yes, and to little resolution.  I'll raise this separately to see what
> people think.
>
> > In section 6, would it be possible to add a reference to work on the
> > problem of adding a name into a DNS zone for readers (such as myself!)
> > who are unfamiliar with the problem area?  Is there any guidance that
> > this document can give regarding adding a new name to a zone?
>
> Good question.  I'm actually unfamiliar with this.  I received similar
> input from Michael Patton, which I've Cc:'ed.  Maybe he could provide
> some pointers.
>
> > Comments on section 7.4:
> >
> >    7.4  DDNS with DHCP
> >
> >       With DHCP, the reverse DNS name is typically already inserted to
> >       the DNS that reflects to the name (e.g., "dhcp-67.example.com").
> >       All of these mappings are pre-configured, and require no
> >       updating.
> >
> > Are you referring to DHCPv4 or DHCPv6 here?  It would be good to get
> > input based on deployment experience to confirm that this
> > strategy is "typically" used for DHCPv4.  Of course, we have little
> > deployment experience with DHCPv6 to know whether pre-configuration
> > will be used for IPv6 PTR records.
>
> I'm familiar with some deployments of DHCPv4, and in almost all of
> them, you use pre-defined names.  I assume it will likely be similar
> with DHCPv6.
>
> Clarified:
>
>         <t>With DHCPv4, the reverse DNS name is typically already
> inserted to the DNS that reflects to the name (e.g.,
> "dhcp-67.example.com").  One can assume similar practice may become
> commonplace with DHCPv6 as well;  all such mappings would be
> pre-configured, and would require no updating.</t>
>
> Or other suggestions?
>
> >       If a more explicit control is required, similar considerations as
> >       with SLAAC apply, except for the fact that typically one must
> >       update a reverse DNS record instead of inserting one (if a denser
> >       address assignment policy than with SLAAC is adopted) and
> >       updating a record seems like a slightly more difficult thing to
> >       secure. However, it is yet uncertain how DHCPv6 is going to be
> >       used for address assignment.
> >
> > Would the parenthetical phrase be more clearly stated as "(if an
> > address assignment policy that reassigns disused addresses is
> > adopted)"
>
> Yes, changed to that.
>
> >       Note that when using DHCP, either the host or the DHCP server
> >       could perform the DNS updates; see the implications in Section
> >       6.2.
> >
> > Is there a parallel between host updates of DHCPv6-assigned
> > addresses and the discussion in section 7.3, as well?  It might be
> > worth mentioning that the DHCPv6 server can perform the PTR record
> > cleanup if the DHCPv6 address assignment is used.
>
> Yes, but there is difference if the disused addresses are being
> reused.  That is, with SLAAC you can pretty much be sure that nobody
> will be reusing your EUI64.
>
> I've added a note as the last paragraph:
>
>         <t>If disused addresses were to be reassigned, host-based DDNS
> reverse updates would need policy considerations for DNS record
> modification, as noted above.  On the other hand, if disused address
> were not to be assigned, host-based DNS reverse updates would have
> similar considerations as SLAAC in <xref target="rev_slaac"/>.
> Server-based updates have similar properties except that the
> janitorial process could be integrated with DHCP address
> assignment.</t>
>
> > Finally, in response to your comments on section 7.4:
> >
> > > > Section 7.4, second paragraph: What is a "denser address assignment
> > > > policy"?  As we have little or no experience with address assignment
> > > > through DHCPv6, I think it is premature to anticipate how DHCPv6
will
> > > > be used.  I can imagine, for example, that DHCPv6 might be used to
> > > > assign addresses that look just like SLAAC addresses - the advantage
> > > > to the use of DHCPv6 being centralized registration and accounting
for
> > > > addresses and devices.
> > >
> > >Well -- looking at those that seem to want to use DHCPv6, their main
> > >point appears to continue doing what they're doing with v4.  The
> > >logical conclusion of that is that using relatively dense allocations
> > >(though not necessarily every address sequentially, until running out,
> > >as with v4) is something they're familiar with and want to go on
> > >doing.
> >
> > My experience has been that network admins that want to use DHCPv6
> > for address assignment are primarily interested in registering
> > addresses and accounting for devices on the network, rather than
> > wanting to do sequential address assignment from a pool of available
> > addresses.  Those admins would be happy with a DHCPv6 server that
> > hands out an address constructed in the same way as a SLAAC address.
>
> Handing out such addresses, IMHO, makes no sense, as you would have to
> renumber the host if its MAC address changes, even though you wouldn't
> need to introduce this dependency.
>
> Of course, one could just assign addresses using some other policy so
> that the addresses would not need to be reassigned.
>
> I took this as generic discussion and did not make changes.  The text
> has been reworded in any case to deal with more than just a simple
> "dense" assignment policy.
>
> -- 
> Pekka Savola                 "You each name yourselves king, yet the
> Netcore Oy                    kingdom bleeds."
> Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
>
>
>
>
>
> .
> dnsop resources:_____________________________________________________
> web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
> mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html
>
>


.
dnsop resources:_____________________________________________________
web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html