I think you missed something slightly. Based on the proposal the connectivity to the recursive name server from the client is being leveraged as *partial* indicator, not the connectivity from the recursive name server to the authoritative name server(s).
John On 4/1/10 6:41 AM, "Mohacsi Janos" <moha...@niif.hu> wrote: > > > > On Wed, 31 Mar 2010, Jason Fesler wrote: > >> I wanted to clarify a couple things on this thread. >> >> Our concern is more than just "os issues". Many apps today already ask for >> A/AAAA. The bigger issue to me is related to when the host tries connecting >> to the IPv6 address, using a route that exists but is either broken or >> suffers serious performance problems. Users see that as "Site Down". The >> percentage is high [see #1]; our business people would never let us deploy >> IPv6 unless we can mitigate it by things like selectively enabling IPv6 >> towards specific operators and end users that appear to have IPv6 "for real". >> >> Re: getting clients to use and prefer IPv6 resolvers: this issue is not >> lost on us. Today, we don't have a clear solution on this issue that works >> for everyone. However, the access providers we talked to seemed to think >> this would become a resolvable issue (no pun intended). This may be via >> access provider specific means, or perhaps standards updates (and product >> updates) have happen by the time IPv6 gains significance on the internet. >> >> As to when the filter-aaaa hack works, there are very limited conditions: >> >> 1: Extra build option for the resolver. Not compiled by default. >> 2: Enabled in the configuration. By default, disabled. >> 3: Query is for AAAA. >> 4: Query arrived from client via INET, not INET6. >> 5: Results have both A and AAAA. Perform an "A" lookup if needed to >> satisfy this request. >> 6: Results are not signed. >> >> IPv6 only web sites, will still return the AAAA. >> >> Any site that is DNSSEC signed, will return results *unaltered*. We don't >> want to see DNSSEC broken. >> >> Yes, there is a "filter-aaaa break-dnssec;" option. We see it being useful >> in very limited cases (enterprise or lab networks where V6 routes might >> exist, but not public connected yet). It is just a tool; shoot your foot at >> your own risk. When DNSSEC is involved, we absolutely do not want to break >> any trust (or functionality). I look forward to the day when the majority of >> users are protected by DNSSEC. >> >> Hope this helps, >> >> -jfesler >> >> >> [#1] >> http://www.ripe.net/ripe/meetings/ripe-58/content/presentations/Colitti-IPv6a >> tGoogle-RIPE58.pdf publicly shows this as 0.1%. Thanks, Lorenzo. > > > I still cannot see, how can you assses the quality of IPv6 connectivity of > someone, based on a DNS query. DNS queries mostly are coming from the ISP > public DNS servers. They are nothing to do with IPv6 connectivity of the > end-users. > > Will it be effective? > > Best Regards, > Janos Mohacsi ========================================= John Jason Brzozowski Comcast Cable e) mailto:john_brzozow...@cable.comcast.com o) 609-377-6594 m) 484-962-0060 w) http://www.comcast6.net ========================================= _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop