Re: [DNSOP] ANAME in answer or additional section [issue #62]

Bob Harold <rharolde@umich.edu> Fri, 14 June 2019 12:19 UTC

Return-Path: <rharolde@umich.edu>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2AACA12001E for <dnsop@ietfa.amsl.com>; Fri, 14 Jun 2019 05:19:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=umich.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a541AkRHwGkW for <dnsop@ietfa.amsl.com>; Fri, 14 Jun 2019 05:19:35 -0700 (PDT)
Received: from mail-lf1-x12b.google.com (mail-lf1-x12b.google.com [IPv6:2a00:1450:4864:20::12b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8585912001B for <dnsop@ietf.org>; Fri, 14 Jun 2019 05:19:34 -0700 (PDT)
Received: by mail-lf1-x12b.google.com with SMTP id j29so1576411lfk.10 for <dnsop@ietf.org>; Fri, 14 Jun 2019 05:19:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=umich.edu; s=google-2016-06-03; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=QpXVYtHSL9zYlJNxVZRr5e7DhPp3VsVBEPWP9weC3eY=; b=J6wR7xurpw9U5aN8uy2hCC1/ucyc/mpjGtyrRC0oKl7IGCacdi26eCcctBoab7M/uC sockz7ChWpKNG6rtx0P2/vpQmYRIdkxZFaE4MbYxVg+CLoFvZC5qA5Euq2WoJn97Ts7u Q4LIWeTYB2uY0XdVC2kZiSalSxWwxGnGlzeVf+Cc4GKWtCrg7+xJd+ITDTtQjVQkMSZJ FNB7SdHDSb2619lg0MMx0lJhB5oieV7cQzLsCYlO1czYXbPfs8b0/SCv+a96SBuGjPMI o6mPsKEKQTRPip88FptJ3qrU+FMn2ciT1hnZSSXRNhVGki/jMvSpYgfEIqDFtYk5Fdz7 6GSg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=QpXVYtHSL9zYlJNxVZRr5e7DhPp3VsVBEPWP9weC3eY=; b=qhoz/kPz2Ex2OJBAiv8+diPePYABPs5o8xroSY+HR7xoLjHqjXWpL23mPDWuA76E+F +TkZvnEDEJKJrm5+JkUomPeCQAe4fqGZ+NS5g83k6+1wrR6RioecS9T3NU2/byb8WJBm lQWeWFSmNeqyI07MfhKwWdh98Zc0KKQ6Lk4vSv05nd46XRlL8ZEKHT0ENAgyaLQfC0Gy hH1X1rWDRp53EAIRzzaITRn5B3kJiODq6nET8F2thQbsFwrae5gl8yw8sstpYfeH8Nyl pdiXRKj1oimYkxu/nYyrdqIpFy2Apg9RDVbaVnNlZnRwaqsflX25iWyDyowyjk74cQ2C Z4gg==
X-Gm-Message-State: APjAAAXQPz1rv7wXG7I9HMe3GMAeZFEIwZlIWVGPqfnRXCyp/4d13+/X 7tOLyAnWxwSbeEK2LFYDjqTWzmfLEyi6GsRlAiTI7A==
X-Google-Smtp-Source: APXvYqyCtFahyR7j4Ug8zACpdZ1jjgQaQUnf88A8Hboz8Vo4lk8SQC3QanBUqVZsbr3hfRZZjp03gK7HTVV9U8llSdY=
X-Received: by 2002:a19:22d8:: with SMTP id i207mr44686240lfi.97.1560514772353; Fri, 14 Jun 2019 05:19:32 -0700 (PDT)
MIME-Version: 1.0
References: <3b136e34-7ec0-e144-2c2a-0885185ec2b1@pletterpet.nl> <20190612000459.GA60387@isc.org> <CAJhMdTP-iDbbgnCDV7WRhbh495KvhOW3cGS+0tu74VAoYfU=gg@mail.gmail.com> <CAH1iCiqE70T3fWVcCrSvA86=qJKoWwuRGFRzKnQyediMrm404A@mail.gmail.com> <68b5997e-1c24-a366-1165-9874a36169b5@pletterpet.nl> <CAH1iCiqp1dbP-No4K3t2hNQ2+kD4RVGPgUHB_sHgByzEOsAxuw@mail.gmail.com> <CA+nkc8BcNcYHkpAadsjgCBbSONOkU7G9kUu+t=0AAKZ92WvVAg@mail.gmail.com> <CAH1iCirO8JX6Ynmk2Rt4GQbTKivT7-dosAuqryN9+sGofZ-RRQ@mail.gmail.com>
In-Reply-To: <CAH1iCirO8JX6Ynmk2Rt4GQbTKivT7-dosAuqryN9+sGofZ-RRQ@mail.gmail.com>
From: Bob Harold <rharolde@umich.edu>
Date: Fri, 14 Jun 2019 08:19:20 -0400
Message-ID: <CA+nkc8BQbnqrpzg7NqDNgGDqk-vDFYj73JvTd+62HKFPp=L92Q@mail.gmail.com>
To: Brian Dickson <brian.peter.dickson@gmail.com>
Cc: Matthijs Mekking <matthijs@pletterpet.nl>, "dnsop@ietf.org" <dnsop@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000ac646f058b47a820"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/jAw0URN9A6cvqGQR8nQg24zQgbM>
Subject: Re: [DNSOP] ANAME in answer or additional section [issue #62]
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Jun 2019 12:19:39 -0000

On Thu, Jun 13, 2019 at 6:34 PM Brian Dickson <brian.peter.dickson@gmail.com>
wrote:

>
>
> On Thu, Jun 13, 2019 at 1:51 PM Bob Harold <rharolde@umich.edu> wrote:
>
>>
>> On Thu, Jun 13, 2019 at 1:50 PM Brian Dickson <
>> brian.peter.dickson@gmail.com> wrote:
>>
>>>
>>>
>>> On Wed, Jun 12, 2019 at 1:11 AM Matthijs Mekking <matthijs@pletterpet.nl>
>>> wrote:
>>>
>>>> Brian,
>>>>
>>>> Thanks for the detailed background on why DNAME worked. There are a few
>>>> things that caught my attention:
>>>>
>>>> > When a recursive queried an authority server, if it got back a DNAME
>>>> but did not understand it, it ignored the DNAME but processed the CNAME
>>>> (as if only the CNAME existed) (plus any other data like chained CNAMEs
>>>> or A/AAAA records)
>>>>
>>>> > All of this is unfortunate, because of the fact that there is no
>>>> genuinely backward compatible record similar to ANAME that can be used,
>>>> without a very strong likelihood of breaking things. From authority to
>>>> recursive: You can't return an ANAME and a CNAME (as a
>>>> backward-compatible rewrite signal that corresponds to the ANAME), since
>>>> the CNAME will effectively obscure other RRTYPEs that might coexist
>>>> (e.g. at the zone apex).
>>>>
>>>> This is fine, because that is not what we want: We would like to add the
>>>> ANAME in the answer section with the A/AAAA records (not a CNAME).
>>>>
>>>> > The real problem here, is the "other" record for backward
>>>> compatibility isn't a rewrite-type (such as CNAME or DNAME), but is a
>>>> "promoted" A/AAAA record of potentially limited utility and questionable
>>>> provenance (due to geo-ip stuff, TTL stuff, and RRSIG problems).
>>>>
>>>> I actually see the A/AAAA record as the backward compatibility records:
>>>> An ANAME-aware resolver would understand the ANAME and can act upon it,
>>>> an ANAME-unaware resolver will use the A/AAAA records that the
>>>> authoritative returned.
>>>>
>>>
>>> So, this is where the analogy to DNAME diverges from reality of ANAME,
>>> and IMHO is the the crux of one of the main problems with ANAME.
>>>
>>> In the DNAME/CNAME example, the A/AAAA records are returned ONLY IF the
>>> server that is authoritative for the DNAME is also authoritative for the
>>> DNAME "target" (right-hand-side/RDATA).
>>> If the DNAME auth server is not, it will only return DNAME+CNAME records.
>>>
>>> The only "legitimate" (in my opinion) reason that the ANAME
>>> authoritative server should also return A/AAAA records, is if it is also
>>> authoritative for the ANAME "target" (right-hand-side/RDATA).
>>>
>>> (And the reason that having the ANAME authoritative server obtain and
>>> return A/AAAA records itself leads to what I called:
>>>
>>>> potentially limited utility and questionable provenance (due to geo-ip
>>>> stuff, TTL stuff, and RRSIG problems).
>>>>
>>>
>>> I have elaborated on this problem previously, but will do so again for
>>> completeness/context:
>>>
>>>    - There can be differences (possibly significant differences) in the
>>>    results returned for resolution of the "target" between the ANAME
>>>    authoritative server, and the querying resolver.
>>>       - E.g. Any sort of "stupid DNS tricks" that return different
>>>       values based on either physical topology (anycast instance) or geo-ip
>>>       (client-subnet)
>>>       - That discrepancy can direct clients to a suboptimal server,
>>>       where suboptimal can even be, from a user perspective, badly broken (e..g.
>>>       wrong language, illegal content, etc.)
>>>    - The interactions on TTLs and the need for repeated lookups can
>>>    have adverse impacts on both clients, resolvers, and auth servers
>>>       - An auth server might want to use longer TTLs to reduce query
>>>       volume, for ANAME values that do not change frequently (A/AAAA TTL set to
>>>       same as ANAME TTL)
>>>       - The original A/AAAA TTL (for the "target" owner name's A/AAAA
>>>       RRDATA) might be short because it changes frequently (e.g. CDNs)
>>>    - If the "sibling" data is only a hint, non-upgraded resolvers will
>>>    serve A/AAAA records that are either poor (longer latency, higher loss),
>>>    wrong (incorrect language due to wrong CDN node), broken (long TTL -> wrong
>>>    server), or slow (requery required)
>>>
>>> I don't have a better suggestion on how to fix this within the context
>>> of ANAME; IMNSHO it is an intractable issue, a fundamental problem with
>>> ANAME if sibling records are required.
>>>
>>> Brian
>>>
>>
>> I see two main cases:
>>
>>    - ANAME replaces a CNAME record, so that other records can be
>>    attached to the same name. I don't think this is likely to be a big use
>>    case. In this case, all your concerns apply.
>>
>>
>>    - ANAME replaces A/AAAA records, most likely at a zone apex, where
>>    CNAME was desired but not allowed. I think this is the main case for ANAME.
>>    And in this case, the old A/AAAA records are returned as previously, but
>>    with the added ANAME record. Your concerns only apply if they already
>>    applied to the A/AAAA records - nothing has gotten any worse.
>>
>> Is there another major case I am missing?
>>
>
> Yes, ANAME placed at apex, where no A/AAAA exists or existed. Typically
> when there is a "www" CNAME, and the zone owner wants to make a "magic apex
> CNAME" that points the same place as "www" currently does.
>
> I think that (addition of ANAME) is going to be 95% of the deployments,
> versus a 5% migration of already-existing proprietary RRTYPEs or
> pseudo-types (vertical integration) to ANAME. (If those weren't the
> expected levels of deployment, I don't the the efforts on ANAME would be
> worthwhile.)
>
> Brian
>

But in that case, the ANAME (with A/AAAA records) is a new addition, and
not worse that not having anything there.  I don't have any data, but I
expected that most cases would already have A/AAAA at the apex.

Does anyone have data on how many "www" names have or do not have A/AAAA
data for the label without the "www"?

-- 
Bob Harold