On 3/31/10 3:19 PM, "Dan Wing" <dw...@cisco.com> wrote: >> -----Original Message----- >> From: dnsop-boun...@ietf.org [mailto:dnsop-boun...@ietf.org] >> On Behalf Of John Jason Brzozowski >> Sent: Wednesday, March 31, 2010 10:38 AM >> To: Rémi Després; dnsop >> Cc: Ted Lemon; Jason Fesler; Igor Gashinsky >> Subject: Re: [DNSOP] Ugly DNS ack >> >> Remi, >> >> I hope you do not mind, I have take the liberty to pull some >> text from your >> original post and will reply to them here: > ... >>> 4. >>> "Return 0 answers for AAAA if, and only if: - Query comes >>> over Ipv4; - ³A² >>> record exists for same name; - DNSSEC is not used." >>> => This hack would NOT ONLY be "ugly" (as acknowledged by >>> their proponents), >>> BUT ALSO would BREAK some of the IPv6 connectivities that >>> are available today !!! >> >> [jjmb] I do not see how this would break IPv6 connectivity. > > Any host that sends its AAAA queries over IPv4 would lose > IPv6 connectivity. That includes common configurations of > hosts doing 6to4, Teredo, Windows XP, ISATAP, and any that > -- for whatever reasons -- are using an IPv4 DNS server instead > of an IPv6 DNS server. On many OSs, the DNS server list is > just a simple list and all DNS queries are sent to the > same DNS server. This is an issue with split-zone DNS and > multiple interfaces (in the MIF working group), but split-zone > DNS is another topic for another time. Igor's proposal > requires, effectively, accelerating host modifications to > perform A queries over an IPv4 interface and AAAA queries > over an IPv6 interface, which MIF is working on. How IPv6 > DNS servers are configured is another problem with RFC5006 > being experimental (which is being fixed) and lack of > RFC5006 implementations in routers (I know Cisco, and perhaps > others, lack RFC5006). > > -d [jjmb] some might consider this a feature given the issues and challenges with some of the transition technologies you mention. Support for RFC5006 from a residential point of view requires the home gateway/router to support the same. DHCPv6 (RFC3315) addresses this as well. > >> I do agree that there will likely be an impact to DNSSEC. >> >>> ==> This hack MUST therefore be flatly rejected. >> [jjmb] I see a number of people agree that this should be >> rejected. I can >> tell you from first hand experience over the past several >> months there are >> some enigmas here and that issues with 6to4 and other transition >> technologies present challenges to readying infrastructure for real >> broadband IPv6 traffic. And these challenges are likely not >> temporary. I >> suggest deferring rejection until the issues, challenges, and >> documentation >> have been documented. >>> >>> >>> If and when the mentioned OS problems are documented, it >> will be possible to >>> fix them with patches in OSes, where they belong. >> >>> >>> >>> Le 31 mars 2010 à 17:43, Ted Lemon a écrit : >>> >>>> On Mar 31, 2010, at 8:32 AM, Rémi Després wrote: >>>>> ==> This hack MUST therefore be flatly rejected. >>>> >>>> Unfortunately we don't have any control over what Yahoo or >> Google do to their >>>> name servers. I agree with you completely on what we >> SHOULD do, but if Igor >>>> decides to filter AAAAs on IPv4 queries, we can't stop him. >>> >>> Sure, and that's fair. >>> But it has to remains his problem, not an IETF >> specification problem. >>> >>>> We can refuse to endorse his solution, but really what's >> going on here is >>>> that Igor (and Google before him) have come to us in good >> faith to tell us >>>> about hacks they've done that they feel are necessary. >> We shouldn't >>>> discourage them from doing that, >>> >>> Agreed. >>> My strong reaction is only against this particular hack because: >>> - it is based on the idea that OSes cannot be patched where >> they are bugged >>> - it destroys legitimate connectivity for OSes that aren't bugged. >> [jjmb] see my point above, do you really assume the turn >> around time here is >> short? >>> >>> >>>> even if we do discourage them from doing the hacks. >>>> >>>> So to my mind, the question is whether or not we want to >> (and can!) have some >>>> say in what these hacks look like, >>> >>> We do want it. >>> (That's what I did in the technical explanation.) >>> >>>> not whether or not we should forbid them. >>> >>> "Flatly rejecting" the hack, as I proposed, doesn't mean >> "forbidding" it. >>> (Vendor makes its own choices anyway.) >>> It just means, in my understanding, a clear refusal to endorse it. >>> >>> >>> Regards, >>> RD >>> _______________________________________________ >>> DNSOP mailing list >>> DNSOP@ietf.org >>> https://www.ietf.org/mailman/listinfo/dnsop >> >> ========================================= >> John Jason Brzozowski >> Comcast Cable >> e) mailto:john_brzozow...@cable.comcast.com >> o) 609-377-6594 >> m) 484-962-0060 >> w) http://www.comcast6.net >> ========================================= >> >> _______________________________________________ >> DNSOP mailing list >> DNSOP@ietf.org >> https://www.ietf.org/mailman/listinfo/dnsop >
========================================= John Jason Brzozowski Comcast Cable e) mailto:john_brzozow...@cable.comcast.com o) 609-377-6594 m) 484-962-0060 w) http://www.comcast6.net ========================================= _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop