In message <f4529f1d-1a2f-48be-bf7c-e06419c07...@nominum.com>, Ted Lemon writes
:
> On Sep 7, 2009, at 6:52 PM, Mark Andrews wrote:
> >     /56 should be typical for homes
> >     /48 should be typical for businesses
> 
> I don't think this is germane to the discussion.   My point in  
> mentioning /64 was simply that if you go narrower than that, important  
> things break, so it's a pretty good number to assume as an absolute  
> minimum.
> 
> >> If you allow your customer to do arbitrary DNS
> >> updates to the reverse tree for the entire /64, that could wind up
> >> being a tremendous amount of data.   So on the one hand, you're
> >> opening yourself up to the potential for a buggy client to cause
> >> operational problems.
> >
> >     The size of the name space has NOTHING to do with it.  If
> >     I have 1 name I can add billions of records at that name.
> 
> True, and with an IPv4 delegation I can have a filter that prevents  
> you from adding names that don't make sense, stopping that particular  
> failure mode.   But there is no filter that could similarly disallow  
> an excessive number of names in an IPv6 delegation.
> 
> >> And on the other hand, what makes DoS attacks work is that you have
> >> some resource that people really care about, and you are able to
> >> exhaust it by sending too many queries to it.   One really great
> >> defense against DoS is distribution of load.   So delegating the
> >> reverse tree for a customer's zone to the customer's equipment
> >> protects against DoS that way.
> >
> >     Pure FUD.
> 
> ?
> 
> >> The problem is that I've never had an ISP that would actually  
> >> populate
> >> the reverse tree based on hints from the client,
> >
> >     Which is basically because ISP's had to work around a problem
> >     before there was technology for a solution and they havn't
> >     rethought the problem since.
> 
> No, that's not the case at all.   The technology I'm talking about  
> predates the existence of most of the really big ISPs, and there are  
> ISPs that have been doing DNS updates right for over a decade.   The  
> problem is a lack of motivation to implement, not a lack of working  
> technology.

Residential was basically dialup for a long time.  This has shifted
to cable, dsl and wireless which are essentially always on technologies.

> >     ISP's do support customer generated reverse zones for their
> >     commercial customers.  It really isn't that hard to do it
> >     for all customers.  It's just inertia that has stopped it.
> 
> Do they do it with DDNS, or with web forms?   The only commercial  
> support for the reverse tree that I know of for sub-class-C subnets is  
> done with web forms.

Which is a matter of tools which is what we are talking about
developing.  It isn't that hard to make a update tool that works
with RFC 2317 style delegations but you don't really need have a
delegation if you are doing dynamic updates in the first place.

nsupdate was designed to allow the CNAME to be removed.  A slightly
different tool is needed to follow the CNAME and construct a PTR
using the CNAME's rdata as the ownername.  This can be done outside
of nsupdate by whatever is translating the IP address into the
in-addr.arpa/ip6.arpa name.  DNAME's are likely to be in the ip6.arpa
which have the same issues.

> >> A single point of failure in this case isn't an issue: if your
> >> residential gateway dies, nobody's going to be querying your PTR
> >> records, because you're not going to be communicating with anyone.
> >
> >     Really?  Lots of log processing is done in batches.
> 
> Sure, and PTR queries can always fail.   There is no way to guarantee  
> that PTR queries will succeed when processing logs, no matter what  
> solution an ISP implements.   An auditing mechanism that depends on  
> the PTR tree is not valid.   Any mechanism necessary for  
> interoperation that fails in the absence of a PTR record is invalid.

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to