Re: [DNSOP] New Version Notification for draft-wkumari-dnsop-hammer-00.txt

Hector Santos <hsantos@isdg.net> Wed, 03 July 2013 18:02 UTC

Return-Path: <hsantos@isdg.net>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C580E21F9D78 for <dnsop@ietfa.amsl.com>; Wed, 3 Jul 2013 11:02:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.546
X-Spam-Level:
X-Spam-Status: No, score=-102.546 tagged_above=-999 required=5 tests=[AWL=-0.811, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, HOST_MISMATCH_NET=0.311, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O54UurpCpkvd for <dnsop@ietfa.amsl.com>; Wed, 3 Jul 2013 11:02:39 -0700 (PDT)
Received: from mail.santronics.com (ftp.catinthebox.net [208.247.131.9]) by ietfa.amsl.com (Postfix) with ESMTP id BB48721F9D7C for <dnsop@ietf.org>; Wed, 3 Jul 2013 11:02:36 -0700 (PDT)
DKIM-Signature: v=1; d=isdg.net; s=tms1; a=rsa-sha1; c=simple/relaxed; l=4010; t=1372874541; h=Received:Received: Message-ID:Date:From:To:Subject:Organization:List-ID; bh=3/X3KxH lX+I5VcqeAXSNRNmnN3Q=; b=wIwMvk31RjHGMoozmmnmRKQicbLDXiguUbzUd7L Q/sfz43QUtw84LIxy2/86OnWqRKdX4fqIj3UvjIweT1EKisi57va9HcS2T/enTG4 F/0Kmrk+nWNHDtgsFnruhF/E9II78cjNOmFOZK4oQd+g0146HOTT1JUWwQ5Wyzwe Gq04=
Received: by winserver.com (Wildcat! SMTP Router v7.0.454.4) for dnsop@ietf.org; Wed, 03 Jul 2013 14:02:21 -0400
Received: from [208.247.131.8] ([208.247.131.8]) by winserver.com (Wildcat! SMTP v7.0.454.4) with ESMTP id 3632072327.1690.5904; Wed, 03 Jul 2013 14:02:20 -0400
Message-ID: <51D46683.2010400@isdg.net>
Date: Wed, 03 Jul 2013 13:59:31 -0400
From: Hector Santos <hsantos@isdg.net>
User-Agent: Mozilla/5.0 (Windows NT 5.2; rv:17.0) Gecko/20130328 Thunderbird/17.0.5
MIME-Version: 1.0
To: Warren Kumari <warren@kumari.net>
References: <20130702014438.15013.qmail@joyce.lan> <51D26C01.1010508@nlnetlabs.nl> <F47366EE-A6D0-4041-ADC0-8D7369D7E0C7@kumari.net>
In-Reply-To: <F47366EE-A6D0-4041-ADC0-8D7369D7E0C7@kumari.net>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: dnsop@ietf.org, Matthijs Mekking <matthijs@nlnetlabs.nl>
Subject: Re: [DNSOP] New Version Notification for draft-wkumari-dnsop-hammer-00.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Jul 2013 18:02:43 -0000

well, for a moment, I did have to think about this draft being a joke or 
not.  But the acronym was perfect. :)

On 7/3/2013 1:30 PM, Warren Kumari wrote:
>
> On Jul 2, 2013, at 1:58 AM, Matthijs Mekking <matthijs@nlnetlabs.nl> wrote:
>
>> This sounds a lot like prefetch in unbound, and the configuration option
>> gives some analysis on increased traffic.
>> prefetch: <yes or no>
>>      If yes, message cache elements are prefetched before they expire
>>      to  keep  the  cache  up to date.  Default is no.  Turning it on
>>      gives about 10 percent more traffic and load on the machine, but
>>      popular items do not expire from the cache.
>
> Doh, sorry, I was not aware that Unbound did this. I'd like to recognize this in the draft, any idea who actually suggested it / added it to the code?
>>
>>
>> Also, if the original TTL of the RR is less than STOP * HAMMER_TIME then
>> the cache entry, it cannot be used anymore and the resolver should
>> "Break it down".
>>
>
> I got a few off-list questions asking about the odd naming (and I also remember the IETF Diversity thread on Discuss).
> For folk who have no idea what the hell we are on about:
> http://www.youtube.com/watch?v=GbKAaSf6e10
> http://www.youtube.com/watch?v=otCpCn0l4Wo
>
>
>
>> Best regards,
>> Matthijs
>>
>> On 07/02/2013 03:44 AM, John Levine wrote:
>>>> We would like to draw your attention to a new draft.
>>>
>>> It looks like it should work, assuming that your cache uses the
>>> existing logic to remember queries in progress so it doesn't hammer a
>>> record that's already in the process of being refetched.
>
> Hmm. Probably worth mentioning.
>
>>>
>>> My main observation is that I have no idea what the tradeoffs are
>>> between the increased DNS traffic and faster responses to clients.
>>> Have you done simulations or live experiments?
> Nope.
>
> This doesn't really change the average very much, but it should help decrease the jitter / spikes for the unlucky few who hit the resolver just as the cache entry expires.
> The draft specified HAMMER_TIME as a time, not a percentage because:
> A: I wanted to use the phrase HAMMER_TIME (and STOP HAMMER_TIME!) :-P
> B: The main "issue" that the draft tries to solve is increased resolution times for the unlucky few who hit the resolver when the record has just expired. In order to decrease the added load caused by this, I chose a default that is somewhat longer than a "bad" resolution experience with a few failures along the way.
> C: STOP was added to prevent doing a cache-fill request on every recursive request for records that have TTL of < HAMMER_TIME.
> D: I was (tilting at windmills and) trying to get folk to not use TTLs of < a few seconds in the records :-)
>
>>From reading the unbound prefetch thing, I suspect maybe a better solution would be:
> HAMMER_TIME defaults to 2 (or 1 or something) seconds
> If the original TTL is < HAMMER_TIME, then only do the cache-fill when the TTL is 10% of the original TTL.
>
> This means that:
> if HAMMER_TIME is 2 and the original TTL is 600 seconds -- the auth servers will see approximately 0.3% additional traffic.
> if HAMMER_TIME is 2 and the original TTL is 60 seconds -- the auth servers will see approximately 3.3% additional traffic.
> if HAMMER_TIME is 2 and the original TTL is 1 seconds -- the auth servers will see approximately 10% additional traffic.
>
>
> W
>
>
>>>
>>> R's,
>>> John
>>> _______________________________________________
>>> DNSOP mailing list
>>> DNSOP@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dnsop
>>>
>>
>> _______________________________________________
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop
>>
>
> --
> "Go on, prove me wrong. Destroy the fabric of the universe. See if I care."  -- Terry Prachett
>
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
>