Re: [DNSOP] opportunistic refresh and Happy Eyeballs

神明達哉 <jinmei@wide.ad.jp> Tue, 15 August 2017 17:09 UTC

Return-Path: <jinmei.tatuya@gmail.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D24F2132394 for <dnsop@ietfa.amsl.com>; Tue, 15 Aug 2017 10:09:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.699
X-Spam-Level:
X-Spam-Status: No, score=-1.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.199, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8CMHO-HpMkE2 for <dnsop@ietfa.amsl.com>; Tue, 15 Aug 2017 10:08:59 -0700 (PDT)
Received: from mail-qt0-x234.google.com (mail-qt0-x234.google.com [IPv6:2607:f8b0:400d:c0d::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F1AF31321CB for <dnsop@ietf.org>; Tue, 15 Aug 2017 10:08:58 -0700 (PDT)
Received: by mail-qt0-x234.google.com with SMTP id 16so7677107qtz.4 for <dnsop@ietf.org>; Tue, 15 Aug 2017 10:08:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=XSbsHBe066vj1yB5rc+uw/6eAqzJZISx4PClf7edSk0=; b=JoyOma/xH5FR9xnViAbr1vOIkXPAvhdXJ3ShWcSc2lB10701Gxfu7bgZGGOUx0Xtrw 2B2nPHpiwcSTtHFUWtuB2yaUZrM2UcnGh+wMc7dOKKYFi98+6KjtwVaLeXR5nBGaT35c YWHtHu9CqKAqjps1tauSavejfqoo9UnNfmZ5czJag2M1y7jsdhP1fpY/8GiVCuSSzDOn J105Ntrg1s7gy7wDDsN9iCuP0TS1A9L0XXyoqdOGRLfmcIQRWFcSG7ntYWA1BuQAcTHx gpSFmC2QDlPITDIynkHhDS1jUP+KELYc5XALup9FZeu3vB/+5eKQ8o6pPD2KU6QQ2gcf N/7A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=XSbsHBe066vj1yB5rc+uw/6eAqzJZISx4PClf7edSk0=; b=W6/8sSpToQqERMU/BNZ7B6K4NUHOjE8Ou/TxJD0/7RvPbozG80fGm1ExEMLx7HJkCL e91AR/yWcbmBlRAxelxULA+5dVKek4m0bMYrqhQY+CeaXzKaclQYXWasXqLFQoj86haO BVp6aOt9o+qAdd31b/o0MMfTxEf6lIeVlrQfhJkuDKBnNvtX1nOv77kQlBF3x+cSa31b KQZfiLRIXqbgiHutSMMDhl+5ZDfTPyyCQBXiCDgBfI2Eqh7oFI/VErRxxLRapSdyGMzF /vUWYIknJ6cnSyaPwoGXjqE0l+5YK9FFPC3ZSOFlA9KlD5CBeN5c3/6WMdIEo4GxfItD eL6g==
X-Gm-Message-State: AHYfb5h3ap7fRotpOabOaf3/B96tbjbsVNAubWYw6jDTUOPoq3POzT6p 8tW+TZsWLhQg1JlQNtIHif4qY9J/jvV5JBs=
X-Received: by 10.200.41.241 with SMTP id 46mr36636714qtt.339.1502816938029; Tue, 15 Aug 2017 10:08:58 -0700 (PDT)
MIME-Version: 1.0
Sender: jinmei.tatuya@gmail.com
Received: by 10.237.60.60 with HTTP; Tue, 15 Aug 2017 10:08:57 -0700 (PDT)
In-Reply-To: <alpine.DEB.2.20.1708151334370.3655@uplift.swm.pp.se>
References: <alpine.DEB.2.20.1708150911470.3655@uplift.swm.pp.se> <D65BFC40-FF9F-4B81-B185-906C12BC0C59@fugue.com> <alpine.DEB.2.20.1708151334370.3655@uplift.swm.pp.se>
From: 神明達哉 <jinmei@wide.ad.jp>
Date: Tue, 15 Aug 2017 10:08:57 -0700
X-Google-Sender-Auth: itBfUvtSHjxkl7Enw1SQDNbu6-E
Message-ID: <CAJE_bqfmQMn+Hi0KHczo4BDZjKeVOVDqYANGko1x4JGSF-x_wg@mail.gmail.com>
To: Mikael Abrahamsson <swmike@swm.pp.se>
Cc: Ted Lemon <mellon@fugue.com>, dnsop <dnsop@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/x9or9LJeAtoP4LU1CO-eLJYQrRo>
Subject: Re: [DNSOP] opportunistic refresh and Happy Eyeballs
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Aug 2017 17:09:01 -0000

At Tue, 15 Aug 2017 13:40:00 +0200 (CEST),
Mikael Abrahamsson <swmike@swm.pp.se> wrote:

> > If it's a commonly-used name, isn't this a one-time event, though?  The
> > happy eyeballs client asks for A and AAAA, gets A because it was in the
> > cache, but AAAA also winds up in the cache, and then because it's a
> > commonly used name, neither record ever goes stale again.
>
> That was the assumtion by a lot of people who aren't DNS experts
> (including me). Mark Andrews brought up that this might be a more frequent
> issue that people think.
>
> Also there is the issue that as the TTL becomes 0 and the RR is now no
> longer in cache, next question will trigger a lookup and if the
> authoritative nameserver is 400ms RTT away, then during these 400ms a lot
> of clients might only use IPv4 with current RFC6555bis proposal.

If it's a commonly-used name, I suspect the more straightforward
"prefetching" should suffice in practice:
https://datatracker.ietf.org/doc/draft-wkumari-dnsop-hammer/
Several popular recursive servers already implement the feature.
Some of them even enable it by default.

My impression on the rfc6555bis thread is that Mark wanted to make it
"safer" (in that both AAAA and A responses are provided before trying
to establish a TCP connection) even in some near-worst cases, not just
"working in most cases in practice".  In that sense I suspect tricks
at the resolver won't help much, whether it's existing prefetch,
opportunistic refresh or bundled AAAA/A queries, since there are worst
cases where those don't work.  Whether we need this level of
perfection for rfc6555bis is a different question, though.

--
JINMEI, Tatuya