In message <20141105215548.27d51a91...@fafnir.remote.dragon.net>, Paul Ebersman writes: > > marka> Or we could stop debating whether we should maintain it and > marka> assume that if we give people tools that will allow it to be > marka> automatically maintained they will eventually deploy them. > > For providers with millions or tens of millions of end customers, any > system that just lets any customer scribble in DNS is unlikely to be > employed for security or stability reasons.
For in-addr.arpa you already have a PTR records. Allowing the end user to set its content does not increase the amount of data you are serving. It does increase the amount of churn in the zone. A matching TCP source address is a good enough authenticator to permit the update. If you want to force a single PTR record that is implementable policy. 1.2.3.4 can only set the PTR record at 4.3.2.1.in-addr.arpa. update-policy { permit * tcp-self * PTR; }; to do singletons something like would work update-policy { permit * tcp-self-singleton * PTR; }; I don't see a real security issue here. The occasional customer will add a offensive PTR record which won't be seen by 99.99999% of the world. It will occasionally be included in logs. The contents can already be checked to ensure that it is a legal hostname (LDH) that is being added. We see this sort of thing in whois but it doesn't stop the host names being registered there and there is no real reason to stop them here. If we recommend that this is only done when a forward record is also successfully added UPDATE + TSIG (yes, this does scale for this use) you get rid of the PTR/A mis-match issues. For ip6.arpa you delegate to the customer along with the prefix delegation. The customer has to deal with the space issues but uses the same mechanisms to add the PTR records and cleanup. > marka> Document what a node should do to register itself in the reverse > marka> tree and to cleanup when its address changes. Write some code to > marka> do it. > > And of course all CPE vendors put out quality products with these > advances in code and never put out cheap crap. And consumers always > upgrade their CPEs based on this improved code immmediately. So you implement the rest of the proposal to self clean and restore defaults. Delayed additions are no harder than delayed removals. Yes there are 3 records instead of one but no human needs to any maintainence of the zone content. REMOVE PTR <time> ADD PTR <time> <default value> You get the equivalent of $GENERATE with customer settable overrides using UPDATE over TCP. This is incrementally deployable. add-remove delay PTR; add-remove delay KEY; add-add delay PTR "dynamic-%1.%2.%3.%4.example.net"; update-policy { permit * tcp-self-singleton * PTR KEY; }; Or if you don't like the ADD record. add-remove delay PTR; add-remove delay KEY; ptr-default "dynamic-%1.%2.%3.%4.example.net"; update-policy { permit * tcp-self-singleton * PTR KEY; }; Technically this is 100% achievable. It adds a couple of new record types. It requires nameservers to do the processing specified in the new records as it falls due. If you don't have PTR records by default you don't restore them on deletion. It can work with zones that synthesize missing PTR records on demand. If there is no PTR record in the zone, create one. > Heh. > > The reality is that this will take decades and in the meantime, > consumers will have problems doing what they want and they will complain > to their service provider, who won't have a good solution. The reality is that this will give what is needed and is incrementally deployable. The only question is do you synthesize missing PTR records and matching AAAA records or not for IPv6. Mark > This document tries to lay out the challenges and tradeoffs of not > having PTRs or not having "clean" PTRs. We should be sure it makes those > tradeoffs clear, along with the problems service providers will see if > they do or don't pick one of the solution sets. If there are issues or > tradeoffs not in the document, suggest a text change. > > The "just do it right and folks will roll it out" argument doesn't solve > the problem in any useful timeframe and doesn't let folks who do have to > support millions of customers make informed operational decisions. > > And automating at the scale we'll see with real IPv6 deployment is going > to be very hard. Add in that embedded devices are some of the least > likely to be current, clean or remotely upgradeable as we learn of > mistakes and you'll wind up with more boxes doing it wrong than right. -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop