Re: [mif] New revision of DNS server selection

<teemu.savolainen@nokia.com> Thu, 11 November 2010 10:50 UTC

Return-Path: <teemu.savolainen@nokia.com>
X-Original-To: mif@core3.amsl.com
Delivered-To: mif@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CFF613A6905 for <mif@core3.amsl.com>; Thu, 11 Nov 2010 02:50:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 23BTbIkbmyNi for <mif@core3.amsl.com>; Thu, 11 Nov 2010 02:50:44 -0800 (PST)
Received: from mgw-mx03.nokia.com (smtp.nokia.com [192.100.122.230]) by core3.amsl.com (Postfix) with ESMTP id 8CE193A67DB for <mif@ietf.org>; Thu, 11 Nov 2010 02:50:44 -0800 (PST)
Received: from esebh105.NOE.Nokia.com (esebh105.ntc.nokia.com [172.21.138.211]) by mgw-mx03.nokia.com (Switch-3.3.3/Switch-3.3.3) with ESMTP id oABAp0hx003413; Thu, 11 Nov 2010 12:51:10 +0200
Received: from vaebh102.NOE.Nokia.com ([10.160.244.23]) by esebh105.NOE.Nokia.com with Microsoft SMTPSVC(6.0.3790.4675); Thu, 11 Nov 2010 12:51:08 +0200
Received: from smtp.mgd.nokia.com ([65.54.30.7]) by vaebh102.NOE.Nokia.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675); Thu, 11 Nov 2010 12:51:03 +0200
Received: from NOK-EUMSG-01.mgdnok.nokia.com ([65.54.30.86]) by nok-am1mhub-03.mgdnok.nokia.com ([65.54.30.7]) with mapi; Thu, 11 Nov 2010 11:51:03 +0100
From: teemu.savolainen@nokia.com
To: Ted.Lemon@nominum.com
Date: Thu, 11 Nov 2010 11:50:59 +0100
Thread-Topic: [mif] New revision of DNS server selection
Thread-Index: AcuBik+xglWVCvnATOiNDU9Rph4HnAAAYDwQ
Message-ID: <18034D4D7FE9AE48BF19AB1B0EF2729F5F05D6ED0D@NOK-EUMSG-01.mgdnok.nokia.com>
References: <18034D4D7FE9AE48BF19AB1B0EF2729F5F05D02AEE@NOK-EUMSG-01.mgdnok.nokia.com> <29F4CEED-DB30-4A4B-8CDF-AB43B576DE01@nominum.com> <18034D4D7FE9AE48BF19AB1B0EF2729F5F05D02AF6@NOK-EUMSG-01.mgdnok.nokia.com> <5390F566-8150-450B-BD5A-C2636EABE128@nominum.com> <18034D4D7FE9AE48BF19AB1B0EF2729F5F05D6EA16@NOK-EUMSG-01.mgdnok.nokia.com> <99962D6D-2626-4B66-B996-DE6FA05B9BF8@nominum.com> <4F099E7F-800E-4F5E-96E5-9BD7FBF23BF2@nishidaya.org> <B21EAB17-ADA5-40FF-AA14-24D636B795F3@nominum.com> <FAEB3290-FF11-499C-AB9B-C3919B95E47B@nishidaya.org> <842EACF2-ADE7-434E-8F64-A5F65AA9893C@nominum.com> <18034D4D7FE9AE48BF19AB1B0EF2729F5F05D6EC7B@NOK-EUMSG-01.mgdnok.nokia.com> <41FC18BB-A0E7-4895-98BE-0DB31F1A10C8@nominum.com>
In-Reply-To: <41FC18BB-A0E7-4895-98BE-0DB31F1A10C8@nominum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginalArrivalTime: 11 Nov 2010 10:51:03.0268 (UTC) FILETIME=[55A92A40:01CB818E]
X-Nokia-AV: Clean
Cc: mif@ietf.org
Subject: Re: [mif] New revision of DNS server selection
X-BeenThere: mif@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Multiple Interface Discussion List <mif.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mif>, <mailto:mif-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mif>
List-Post: <mailto:mif@ietf.org>
List-Help: <mailto:mif-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mif>, <mailto:mif-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Nov 2010 10:50:45 -0000

> On Nov 11, 2010, at 5:53 PM, <teemu.savolainen@nokia.com> wrote:
> > But then elsewhere people say network knows always better:) I'm
> confused of IETF:)
> > The user can fallback to use single interface.
> 
> How would the user know to fall back to a single interface?

How would the user know the network is instructing DNS queries should go over one interface or another at the first place?
 
> I argued earlier that using DNSSEC without this draft was a better
> solution than this draft.   I still think that's the case.   The

You also said:"DNSSEC doesn't remove split-horizon problems." So you say DNSSEC does not remove problems but is better solution than this. I have some hard time following the thinking and what the solution with DNSSEC would look like. Here I assume DNSSEC != send queries to all DNS servers.

> problem with recommendations of this sort is that they aren't
> enforceable, and aren't likely to be followed.  If, in order to get the
> behavior you want, you *have* to sign the zone, then that's more likely
> to happen.   So while I agree that a *requirement* to use DNSSEC here,
> if followed, would solve the problem, I don't think that the suggestion
> in the spec is going to help very much.

IETF cannot force implementation of anything that doesn't make sense in deployment at hand. Having DNSSEC MUST is pointless if there are imaginable real deployment scenarios where DNSSEC is just not needed - and where implementers can make the judgment call to not do DNSSEC if they know it is not needed. That way people who want security get it, but others can opt-out without violation MUST. But if you wish, we can have that MUST and the ignore in implementation phase:)

> You are talking about the situation where the ISP controls the device
> that's doing the protocol then, right?   Traditionally the way we've
> done stuff like this is to put it in a cablelabs encapsulation; that
> way the people who need it for boxes they control have a clear
> specification, but it's not implemented on devices to which that
> specification doesn't apply (e.g., my iPad).

This is the first time I hear that any DHCP option we specify gets implemented into iPad! Seriously, I'm sure you know people implement IETF specifications only when it makes sense for them (and sometimes don't implement even if it would have made sense, like we see in the level of IPv6 support in various places).

We are chartered to work on DHCP. We might be able to do this feature with things like ANDSF, 3GPP PCO IE, cablelabs, and so on, but is it really worthwhile to define same thing all over again in those places? Why not implement in DHCPv6 instead and then implement the DHCPv6 RFC on those devices where it applies. 

Best regards,

	Teemu