I wanted to clarify a couple things on this thread.

Our concern is more than just "os issues".  Many apps today already ask for 
A/AAAA.  The bigger issue to me is related to when the host tries connecting to 
the IPv6 address, using a route that exists but is either broken or suffers 
serious performance problems.  Users see that as "Site Down".  The percentage 
is high [see #1]; our business people would never let us deploy IPv6 unless we 
can mitigate it by things like selectively enabling IPv6 towards specific 
operators and end users that appear to have IPv6 "for real".

Re: getting clients to use and prefer IPv6 resolvers:   this issue is not lost 
on us.  Today, we don't have a clear solution on this issue that works for 
everyone.    However, the access providers we talked to seemed to think this 
would become a resolvable issue (no pun intended).   This may be via access 
provider specific means, or perhaps standards updates (and product updates) 
have happen by the time IPv6 gains significance on the internet.  

As to when the filter-aaaa hack works, there are very limited conditions:

   1: Extra build option for the resolver.  Not compiled by default.
   2: Enabled in the configuration.  By default, disabled.    
   3: Query is for AAAA.
   4: Query arrived from client via INET, not INET6.
   5: Results have both A and AAAA.  Perform an "A" lookup if needed to satisfy 
this request.
   6: Results are not signed.
   
IPv6 only web sites, will still return the AAAA.

Any site that is DNSSEC signed, will return results *unaltered*.  We don't want 
to see DNSSEC broken.  

Yes, there is a "filter-aaaa break-dnssec;" option.   We see it being useful in 
very limited cases (enterprise or lab networks where V6 routes might exist, but 
not public connected yet).  It is just a tool; shoot your foot at your own 
risk.   When DNSSEC is involved, we absolutely do not want to break any trust 
(or functionality).  I look forward to the day when the majority of users are 
protected by DNSSEC.

Hope this helps,

-jfesler


[#1] 
http://www.ripe.net/ripe/meetings/ripe-58/content/presentations/Colitti-IPv6atGoogle-RIPE58.pdf
  publicly shows this as 0.1%.  Thanks, Lorenzo. 


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to