Re: [DNSOP] [v6ops] Fwd: New Version Notification for draft-v6ops-xie-network-happyeyeballs-00.txt

Davey Song <songlinjian@gmail.com> Tue, 25 September 2018 02:30 UTC

Return-Path: <songlinjian@gmail.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 585B21311FA; Mon, 24 Sep 2018 19:30:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IUcmAlZB30wS; Mon, 24 Sep 2018 19:30:16 -0700 (PDT)
Received: from mail-qk1-x733.google.com (mail-qk1-x733.google.com [IPv6:2607:f8b0:4864:20::733]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 03E1A1311D0; Mon, 24 Sep 2018 19:30:16 -0700 (PDT)
Received: by mail-qk1-x733.google.com with SMTP id a189-v6so3146127qkb.2; Mon, 24 Sep 2018 19:30:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=GmAHUHxLJZ9Ovp/DdpGZ/3nMSRukQdRIBIdL31PTSsM=; b=Nob5Tcy6gIwCg3NVKVlzlAwyaDhgnB5+tdve1D8Tmatg7+4ESUCw25ztpS7WatodC9 lCHARXmWlYQqfvcx/nt2Y6DdKMiQ/HykXshRhewvqmBormow6IY/e7vIl32JtOO+wdXl gkgrxyhTIxYhxLYLRfXBj3KtqqgUiZWGA3oBbJicgAQyjexPRxIl1l1WaZfIMolLvHo+ e97oqNZIwnsh0bJ5wpC/vd+0pkdKlDe+YQspPZA3TOy+Kc+QvCQTuXLT+N6NViujZjvQ tSyc5LjWjU7yqkN5VWyCkU4BHJKmc7gXVMdJzLccOgWDAposhE7bIt2v6qkZr1JAHuc0 wQDg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=GmAHUHxLJZ9Ovp/DdpGZ/3nMSRukQdRIBIdL31PTSsM=; b=PkO799oSov7yLeTzYiGBwa/ujW/LiC1NRj3hkyEbAI5Q/tG0xvF3ePw8/XlJZLUjNB vVJIRB4okAzIvI6l+0mJEwDP1fDCOTX+NECnf5q9itbjMK8dpJ9xvpm36KxOIcnS4eC9 XuT0Zg4xNM42SgUTsnyocvl1DfWK5cj6tKebiBb6PFUk9Vuicm5L4HeTcvBdgIC1rig9 FJ5FVYk2JEm/L6AUwHhk7mZs32ZB8jjy4Lb/Oo1W6SULl6QijeD8bG/Q2b5kzxcgszom fBsoAwd02QZK9iOY55DZ5uFg0v5XG3euFs1QnKkYeS1pVdZJEMnNtFU9LBHquuXn6qlx sTzw==
X-Gm-Message-State: ABuFfogt5y3p53T5thw+e6AYClkmZRgS/Tqk4JkiASgpd4c0WtaSnE2E cwEexZzaeNk6TDShCjiO2kY/6aXO9KKXuRXWWhklvSS2
X-Google-Smtp-Source: ACcGV63FIeAlZ/szpr/V++zPLJT2D35RQbKpgQULobe/t/RotUtTx6Lf/Vu5ktyBrDM5gUJ1s8Wmrp4BCkTbxZdS07U=
X-Received: by 2002:a37:15e7:: with SMTP id 100-v6mr1132693qkv.151.1537842615066; Mon, 24 Sep 2018 19:30:15 -0700 (PDT)
MIME-Version: 1.0
References: <153751052820.5339.10049404273601155140.idtracker@ietfa.amsl.com> <CAAObRXLWpXVbPyyxuzJH8osi+R1rdV8N8=Woqvq3UR9nk8kDaA@mail.gmail.com> <CAJE_bqd4jjeZy9Stp-v6O0VOyvEJiE9vW1BLuy-wzqPGvDagoQ@mail.gmail.com>
In-Reply-To: <CAJE_bqd4jjeZy9Stp-v6O0VOyvEJiE9vW1BLuy-wzqPGvDagoQ@mail.gmail.com>
From: Davey Song <songlinjian@gmail.com>
Date: Tue, 25 Sep 2018 10:30:05 +0800
Message-ID: <CAAObRX+6ktcD8i_aToKbX7UJoSPT0NMPV0xKqT8-k+7_d0R5Nw@mail.gmail.com>
To: 神明達哉 <jinmei@wide.ad.jp>
Cc: v6ops@ietf.org, dnsop <dnsop@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000caa7750576a8e22c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/zdpU4Y_w7qY9leIC36yDRWqmtk0>
Subject: Re: [DNSOP] [v6ops] Fwd: New Version Notification for draft-v6ops-xie-network-happyeyeballs-00.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Sep 2018 02:30:18 -0000

Hi Jinmei,

Thanks for your comments. I once had same questions in my mind when this
draft is conceived. I reply inline.

Some quick observations:
>
> - I don't see why the intended status is Standards Track.  It seems to
>   be a document about an operational practice rather than a new
>   protocol feature.
>

I agree with your observation here if the draft intends to share
information and practice. It now goes with Standards Track because the
authors would like to provide a new HE feature(or a framework) on network
side as a peering funtion of client-side HE. I would like to see more
feadback on this issues.

- In general, I wouldn't be excited about placing such complicated
>   functionality in the network rather than end hosts.  Sometimes it
>   may be justified as a least evil option, but the current description
>   of the draft didn't fully convince me
>

Before I put down this draft, I talked with some CPs (content/app
providers) and ISPs, they have motivations and requirement on this.  One
example is Tencent, they are planning to deploy a complicated measurement
network to info their Apps (with a SDK ) which address family they should
try first (their apps use dns over http).  I'm told that Tencent think HE
implemented on each client is too complicated (they have comlicated apps)
and resource consuming. ISP's motivation is easy to understood, they always
try to improve their network connenctivity on both IPv4 and IPv6. I have no
more comment on your saying of evil option:) Any technology can be used as
evil purpose I think.

- I suspect the discussion on breaking DNSSEC is way too hand-waving.
>   In my general understanding it's generally not accepted at dnsop to
>   justify breaking DNSSEC just by saying "it's okay as validation at
>   end hosts is not typical".  Especially if it really intends to be
>   published as Standards Track I suspect some more detailed discussion
>   with a stronger justification will be needed.
>

Sorry, I admit current txt on breaking DNSSEC is weak. Now it is put
into Security
Considerations as well as the issues on incoherency. I think one way to
avoid it as suggested in  Security Considerations is to artificially delay
the AAAA answers, other than omitting the AAAA record and its RRSIG

Best regards,
Davey