Re: [DNSOP] AS112 for TLDs

Joe Baptista <baptista@publicroot.org> Tue, 27 November 2007 16:08 UTC

Return-path: <dnsop-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ix2yl-0006B6-Rh; Tue, 27 Nov 2007 11:08:07 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ix2yk-0006At-HM for dnsop@ietf.org; Tue, 27 Nov 2007 11:08:06 -0500
Received: from smtp101.rog.mail.re2.yahoo.com ([206.190.36.79]) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1Ix2yj-0005UM-Qz for dnsop@ietf.org; Tue, 27 Nov 2007 11:08:06 -0500
Received: (qmail 67267 invoked from network); 27 Nov 2007 16:08:05 -0000
Received: from unknown (HELO ?192.168.201.101?) (antoniobaptista@rogers.com@99.240.21.247 with plain) by smtp101.rog.mail.re2.yahoo.com with SMTP; 27 Nov 2007 16:08:05 -0000
X-YMail-OSG: 6ZgmHWIVM1nJrNCuzUOr3cjcaiZpsapsh3GMSQOIYfFSvFLwRrs972k8tJIMrGg8kA--
Message-ID: <474C40DF.8080100@publicroot.org>
Date: Tue, 27 Nov 2007 11:07:59 -0500
From: Joe Baptista <baptista@publicroot.org>
User-Agent: Mozilla Thunderbird 1.0.7 (Windows/20050923)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Phil Regnauld <regnauld@catpipe.net>
Subject: Re: [DNSOP] AS112 for TLDs
References: <20071127141848.GA16571@nic.fr> <20071127150813.GD33734@moof.catpipe.net>
In-Reply-To: <20071127150813.GD33734@moof.catpipe.net>
Content-Type: multipart/mixed; boundary="------------000007010002000308000000"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 5d7a7e767f20255fce80fa0b77fb2433
Cc: dnsop@ietf.org
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dnsop>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
Errors-To: dnsop-bounces@ietf.org

Phil Regnauld wrote:

>Stephane Bortzmeyer (bortzmeyer) writes:
>  
>
>>I cannot find another report about the TLDs most often queried at a
>>root name server. Other reports I've seen aggregated data, while this
>>small glimpse, however partial, at least *names* the TLDs.
>>    
>>
I'm posting the comments made to you on the GA/GNSO.  Since I have 
pointed out to you there that this data from L.root is not very 
reflective of network traffic.

> Stephane Bortzmeyer wrote:
>
>> I cannot find another report about the TLDs most often queried at a
>> root name server. Other reports I've seen aggregated data, while this
>> small glimpse, however partial, at least *names* the TLDs.
>>
>> It has been said sometimes that dummy (sorry, Karl, "boutique" TLDs)
>> were present in requests to the root name servers. This is clearly
>> false, all the non-existing TLDs queried are local domains (such as
>> Apple's ".local"), leaking through a configuration error.
>>
>> http://blog.icann.org/?p=240
>>  
>>
>
> Thanks for that Stephane.  It would look to me like things are getting 
> better.  This root where the data originates seems to get less errors 
> then that reported in 2003 which data mainly came from f.root.
>
> Thats a significant improvement however after careful inspection we 
> begin to see the flaws in this data.  If this were f.root data then I 
> would be very impressed.  Because the data would show a significant 
> decrease in error traffic.  That would be amazing.  In fact the data 
> looks alot like that I have seen for public roots I have setup.  Like 
> the one now used in Turkey.
>
> However this is data from the L.root run by ICANN and i'm not so 
> amazed anymore.  I speculate this is just a little bit of ICANN 
> nonsense designed to once again mislead the public.  Shame.
>
> Now the problem as I see it here is that this data is very limited in 
> scope.  I don't dispute the first chart on popular TLDs.  What i'm 
> interested to see are the popular TLDs that result in errors 
> (NXDOMAIN) as per the original 2003 report methodology.
>
> Next there is nothing in the data that states the number of queries 
> received at the root servers.  Only percentages are used in the 
> metrics.  The articles I wrote
>
> http://www.theregister.co.uk/2003/02/05/dud_queries_swamp_us_internet/
>
> show us that CAIDA conducted an analysis on 152 million messages.  
> This data was obtained from f.root.  f.root is one of the oldest roots 
> on the net while l.root is one of the newest.  In fact if as per the 
> ICANN blog this data was collected on November 26 then it would of 
> come from IP 199.7.83.42 that was implemented on 1 November 2007 and 
> replaced the previous IP address of 198.32.64.12.
>
> http://l.root-servers.org/ip-change-26nov07.htm
>
> The data is unclear if it was collected from 199.7.83.42 or 
> 198.32.64.12.  In any case what is certain is that both versions of 
> the L.root run by ICANN are very new and that means the amount of 
> traffic to them would be very low in comparison to f.root - which in 
> my opinion provides a more accurate reflection of traffic patterns on 
> the net.
>
> So in conclusion is this data in any way reflective of the impact of 
> Karl, "boutique" TLDs?  The answer in this case would be NO.  It is 
> however reflective of the data one would associate with a recently 
> launched root server that few people are yet dependent on.
>
> Hope my comments help you interpret the data.
>
> kindest regards
> joe baptista 



-- 
Joe Baptista                                www.publicroot.org
PublicRoot Consortium
----------------------------------------------------------------
The future of the Internet is Open, Transparent, Inclusive,
Representative & Accountable to the Internet community @large.
----------------------------------------------------------------
  Office: +1 (202) 517-1593
     Fax: +1 (509) 479-0084

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www1.ietf.org/mailman/listinfo/dnsop