Re: [DNSOP] Fwd: New Version Notification for draft-pan-dnsop-swild-rr-type-00.txt

Mark Andrews <marka@isc.org> Tue, 15 August 2017 05:14 UTC

Return-Path: <marka@isc.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB0F11324C3 for <dnsop@ietfa.amsl.com>; Mon, 14 Aug 2017 22:14:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.4
X-Spam-Level:
X-Spam-Status: No, score=-6.4 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URI_NOVOWEL=0.5] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TTHdYADXxvzr for <dnsop@ietfa.amsl.com>; Mon, 14 Aug 2017 22:14:30 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [199.6.1.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C8CA91324C1 for <dnsop@ietf.org>; Mon, 14 Aug 2017 22:14:29 -0700 (PDT)
Received: from zmx1.isc.org (zmx1.isc.org [149.20.0.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.ams1.isc.org (Postfix) with ESMTPS id CCF8524AE2D; Tue, 15 Aug 2017 05:14:18 +0000 (UTC)
Received: from zmx1.isc.org (localhost [127.0.0.1]) by zmx1.isc.org (Postfix) with ESMTPS id 9093C160045; Tue, 15 Aug 2017 05:14:24 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1]) by zmx1.isc.org (Postfix) with ESMTP id 7D2A8160067; Tue, 15 Aug 2017 05:14:24 +0000 (UTC)
Received: from zmx1.isc.org ([127.0.0.1]) by localhost (zmx1.isc.org [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Q_uayAp3kCrT; Tue, 15 Aug 2017 05:14:24 +0000 (UTC)
Received: from rock.dv.isc.org (c27-253-115-14.carlnfd2.nsw.optusnet.com.au [27.253.115.14]) by zmx1.isc.org (Postfix) with ESMTPSA id EAA10160045; Tue, 15 Aug 2017 05:14:23 +0000 (UTC)
Received: from rock.dv.isc.org (localhost [IPv6:::1]) by rock.dv.isc.org (Postfix) with ESMTP id 399518263A84; Tue, 15 Aug 2017 15:14:21 +1000 (AEST)
To: Lanlan Pan <abbypan@gmail.com>
Cc: Paul Vixie <paul@redbarn.org>, dnsop <dnsop@ietf.org>
From: Mark Andrews <marka@isc.org>
References: <149908054910.760.8140876567010458934.idtracker@ietfa.amsl.com> <CAAiTEH8ntOerB6MGKMS2xcCK3TL9n4fyLq6F+bpUY6oTUpWN8w@mail.gmail.com> <CANLjSvWOzaJcVL64BhNFKnTUEgfq06TQtoy=ZNJ_JafvPU1aSA@mail.gmail.com> <1659363.yAWSxLQAC2@tums.local> <CANLjSvUkoYt1LXwVQ90MVej6mwOg4Q_2=PT=+Rwrf=8k5WAaRA@mail.gmail.com> <599216D2.8060608@redbarn.org> <CANLjSvWyO0nbiSJGSqhRH33evbCUFLNzCjceAHJ-L89FA+En8g@mail.gmail.com>
In-reply-to: Your message of "Tue, 15 Aug 2017 04:45:17 +0000." <CANLjSvWyO0nbiSJGSqhRH33evbCUFLNzCjceAHJ-L89FA+En8g@mail.gmail.com>
Date: Tue, 15 Aug 2017 15:14:21 +1000
Message-Id: <20170815051421.399518263A84@rock.dv.isc.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/_EtckC4Vc0ITQJO18-jwhdk__JA>
Subject: Re: [DNSOP] Fwd: New Version Notification for draft-pan-dnsop-swild-rr-type-00.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Aug 2017 05:14:32 -0000

In message <CANLjSvWyO0nbiSJGSqhRH33evbCUFLNzCjceAHJ-L89FA+En8g@mail.gmail.com>
, Lanlan Pan writes:
> 
> Hi Paul,
> 
> Don't judy other's motivation with meaningless skeptics. The endless
> skeptics can also push on your RPZ to DNSSEC.

I can't see how you can say push your RPZ to DNSSEC as RPZ breaks
DNSSEC.

> As an network engineer, I think good faith is face to the realistic
> internet world, try my best to offer a better solution to technology
> problem.
> 
> If we anticipated the subdomain wildcard scenario when designing wildcard
> years ago, *make Authoritative give more precise wildcard information to
> Recursive* (SWILD) is natually.
> SWILD is not starting from "desire", not to mention "reducing DNSSEC
> deployment".
> 
> *1) I believe,  reduce solution interdependence between different problem
> areas is comfortable.*
> 
> Subdomain wildcard cache issue solution is not need to bind with security
> issue, in natural.

Only if you believe spoofed responses can't be delivered.
 
> *2) I believe,  design an alternative solution to an existed problem is
> ordinary.*
> 
> IPv4/IPv6 Migration can use Tunnel, NAT, ...

And that is a problem for router vendors and OS developers because
they end up having to implement them all.  Part of the reason there
aren't lots of CPE Routers today that support IPv6 is that the
vendors have to spend lots of $$$$$$ implemententing and testing
all the different transition mechanisms.  If they don't want to
spend lot of $$$$$$ then there is no real guidance on what mechanisms
to discard.

> Subdomain wildcard cache optimization can use NSEC aggressive wildcards,
> SWILD, ...
> 
> You can oppose to SWILD,  but wish you not oppose to the alternative
> solution designing.
> 
> *3) I believe,  network protocol / feature deployment progress is decided
> by the key function, not because of additional function.*
> 
> IPv6 deployment  will sharply rise mostly because of *IPv4 addresses
> exhaustion*,  but almost impossible because of any improved IPv6 featue
> that IPv4 not have, such as MTU detect, auto addressing, built in IPsec, ...
> DNSSEC deployment will sharply rise if global nameservers desire *dns
> security*, but almost impossible because of an addtional wildcards feature.
> 
> That is why I say "SWILD has no influnence on reducing DNSSEC deployment",
> going further,  "NSEC aggressive wildcard has no influnence on rising
> DNSSEC deployment".
> 
> Repeat the Google example,  as far as I can see:
> - Google has expert on NSEC aggressive wildcard.
> - Google likes to support some optimized protocols/features, such as QUIC,
> SPDY, ...
> 
> Nowadays: dig @ns1.google.com xxxxxxxx.google.com +dnssec, only return
> NXDOMAIN.
> Sum it up, I believe Google will deploy DNSSEC because of DNS SECURITY NEED
> in future, more probability than because of NSEC aggressive wildcards.

Google validates answers on its recursive servers so Google has already
partially deployed DNSSEC.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org