Re: [DNSOP] draft-yao-dnsop-idntld-implementation-01.txt
Andrew Sullivan <ajs@shinkuro.com> Fri, 06 November 2009 18:03 UTC
Return-Path: <ajs@shinkuro.com>
X-Original-To: dnsop@core3.amsl.com
Delivered-To: dnsop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2326D3A697F for <dnsop@core3.amsl.com>; Fri, 6 Nov 2009 10:03:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.06
X-Spam-Level:
X-Spam-Status: No, score=-2.06 tagged_above=-999 required=5 tests=[AWL=0.539, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ty3plw5kNEwt for <dnsop@core3.amsl.com>; Fri, 6 Nov 2009 10:03:19 -0800 (PST)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by core3.amsl.com (Postfix) with ESMTP id 886E73A6944 for <dnsop@ietf.org>; Fri, 6 Nov 2009 10:03:19 -0800 (PST)
Received: from crankycanuck.ca (69-196-144-230.dsl.teksavvy.com [69.196.144.230]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id 27F1B2FE8CDC for <dnsop@ietf.org>; Fri, 6 Nov 2009 18:03:42 +0000 (UTC)
Date: Fri, 06 Nov 2009 13:03:40 -0500
From: Andrew Sullivan <ajs@shinkuro.com>
To: dnsop@ietf.org
Message-ID: <20091106180340.GS17456@shinkuro.com>
References: <457454769.21126@cnnic.cn> <006201ca5ef5$58470bd0$c619ab73@whatisfuture>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <006201ca5ef5$58470bd0$c619ab73@whatisfuture>
User-Agent: Mutt/1.5.18 (2008-05-17)
Subject: Re: [DNSOP] draft-yao-dnsop-idntld-implementation-01.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2009 18:03:21 -0000
On Fri, Nov 06, 2009 at 11:25:14PM +0800, YAO Jiankang wrote: > Fortunately, you are the chair of dnsext, not dnsop. otherwise, I > may lose the opportunity :) Just for the record, in a case where I act as a chair, I try very hard to reflect the will of the WG even if it is not my judgement that it is a good idea. I should hope that participants hold me to such a standard, and call me out in case they find I am not acting that way. A recent example was the WG's decision to pull back the sha-2 draft from the IESG because it did not like the aliasing mechanism in it. But you point out something important: I didn't note in my review that I comment only as a participant of DNSOP and not in any other capacity. > if you read the draft carefully, the draft does not enforce which > method must be used. we provide many possible solutions. I believe I did read the draft carefully, and it seems to me that it is written in such a way that it fails to address the basic issue bothering me: different delegations are, by their very nature, dangerous for this purpose and therefore should not be used. > since ICANN has approved the IDN ccTLD track, in a few months, there > will have some IDN tld and its variant appearing in the root soon. I am aware that ICANN has made that decision. It bothers me when ICANN makes policy decisions with technical implications without, apparently, having worked through all the technical implications. But anyone who has been in any technical environment in all of history has probably had that experience. Just because we have to do something doesn't mean we have to do something wrong, and I am of the opinion that using the NS strategy is wrong. The draft does not recommend against it, so I oppose the draft as it stands. > from your current wording, it seems that you oppose this draft > because that the solution proposed is not your favor. you does not > oppose that the IDN TLD variants issue should be resolved. If you want my real opinion, it is that the very idea of variants is deeply mistaken, imports into the administration of the DNS a large number of semantic issues that do not belong there, and involves a number of naïve linguistic assumptions some of which were proven to be false by (among others) Quine many years ago. But, since the crest of the slippery slope is already behind us, we need to address the idea of variants in its own terms. That means that the RNAMEs of a variant must be precisely equivalent to all the other RNAMEs of which it is a variant. If that is not what "variant" means, then a more rigorous definition of "variant" is necessary. If it is what "variant" means, however, then there is no way that separate delegations for the different variants actually offers the precise equivalence needed. DNAME does not, either, but it is much closer and therefore less harmful to the idea that the two variants of one another are the same. > if that is true, the reason that you oppose the draft is not reasonable. I don't see how that follows. My reason is that the draft leaves open a possibility that I consider fundamentally harmful to the operation of the DNS. Why do you think that is an unreasonable position? > I hope that you as the DNSEXT co-chair has much knowlege about DNS > protocols, could you provide more constructive suggestions to help > this draft I think my review offers a constructive suggestion: the draft should actively suggest that using different NS records to delegate variants is mistaken, because it does not guarantee the child sides of the respective zone cuts are in fact the same. As an alternative, it could recommend that tools be developed to ensure that the child side of a variant RNAME is always only a DNAME to the "primary" name, and that any delegation that fails to meet this requirement be immediately removed from the parent zone. The fact is that this would still potentially introduce more than 24 hours of potential confusion (since the root zone is published twice a day and the TTL on NS records from the root is longer than 24 hours). > the first time you opposed this draft is that you said that this > draft is not in the scope of the WG and you prefer the DNAME. I > cite the DNSOP charter sentences to prove that it is in the charter. The message at http://www.ietf.org/mail-archive/web/dnsop/current/msg07698.html does not say that the draft is not in scope of the WG. I did argue that there was a particular claim in the draft that didn't belong in output of the WG; I'm delighted the subsequent update took that feedback into consideration. Moreover, your characterization above appears to ignore just about every substantive remark I made in the aforementioned review. > now, you just simply say that "I am strongly opposed to the draft" > and have no contructive suggestions. This is simply false. My suggestions remain the same as before: the draft should recommend against using NS records to delegate two different name spaces that are somehow supposed to be the same. I also suggest that the draft should make it quite plain to everyone -- and particularly, to those who have to make policy about DNS namespaces -- that there is as a matter of fact _no_ way to have two namespaces be identical. DNAME comes closer than anything else, and therefore it is the only reasonable choice for this purpose. That is the primary suggestion I made in response to the -00 draft, and it remains my suggestion now. > if we put DNAME into the root, pls take a look at this presetation: > https://www.dns-oarc.net/files/workshop-200911/Ziqian_Liu.pdf, > > in May 19, 2009, the China Telecom network collapsed due to the too > much queries to DNS recursive servers . > > if dname is put into the root , the accidents similar to May 19 > affairs of China Telcecom network collapsing, and the attacked > recursive servers happen to be dname-unware, all the attacks to > recursive servers will directly go to the root since dname-unware > resolvers or recursive servers has the TTL zero. some root servers > may be down. Do you want to see this being happened? Your argument above is twofold. First, it depends on an analogy between the China Telecom network failure and the root nameserver system. It is more or less impossible for me, from my vantage point, to evaluate that analogy, because I know almost nothing about the China Telecom deployment. Given that the presentation seems to have a large number of recommendations on how to avoid this, and given that some of those recommendations appear to be technologies widely deployed in the root server operations, it seems at least possible that the similarity is not enough to conclude that what happened to the China Telecom systems could also happen to the root nameservers. Any argument from analogy depends on the degree of similarity of the two analogues, and so the more relevant dissimilarities there are, the weaker the argument. As I argued before, I think the DNS operators have to evaluate what the real risk is here. Second, it implicitly relies on the premise, "Either DNAME or NS," which is a conclusion that comes from the premise that we must have variants. But I claim NS is not appropriate because it does not make the two delegations equivalent. Therefore, we must use DNAME. If DNAME does not work because it imposes too much load, then we simply don't have the ability to support variants. I further argue that, if we suggest it possible to use NS records for "variants", we're not actually adding variants at all. We're adding new TLDs, and that's all there is to it. Some TLDs might have contractual restrictions on what is allowed in them. So, just as .aero is only allowed things that conform to the policies of SITA, one might have a TLD that is required to contain all and only delegations in some other zone. But that is entirely a contract matter, it is firmly in the domain of ICANN and outside this WG's purview, and we should not dress that contractual rule up as some sort of technique to implement "variants". It isn't, because there's no technical mechanism that ensures TLD1 and TLD2 contain the same data. I predict -- indeed, I'd bet a pretty good meal on this -- that an NS-based mechanism to implement the desired variant technology will result in a new clasee of occasional inconsistencies that are sometimes observable. I hope this makes clearer what I'm trying to say. Best regards, A -- Andrew Sullivan ajs@shinkuro.com Shinkuro, Inc.
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… Eric Brunner-Williams
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… YAO Jiankang
- [DNSOP] draft-yao-dnsop-idntld-implementation-01.… Andrew Sullivan
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… YAO Jiankang
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… Andrew Sullivan
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… Kim Davies
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… Andrew Sullivan
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… Alex Bligh
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… Alireza Saleh
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… Andrew Sullivan
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… Alex Bligh
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… James Seng
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… Paul Hoffman
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… Masataka Ohta
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… Todd Glassey
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… Edward Lewis
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… YAO Jiankang
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… YAO Jiankang
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… YAO Jiankang
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… YAO Jiankang
- Re: [DNSOP] draft-yao-dnsop-idntld-implementation… Andrew Sullivan