On Tue, Nov 11, 2014 at 10:26:22PM -0800, Paul Vixie wrote:
> i don't know how to answer your discomfort. as you know i was
> responsible for f-root's anycast growth for many years; as you may not
> know i was responsible for as112's early growth after a bill manning
> experiment succeeded.

AS112 absolutely proves that unowned anycast can work at scale; that's not
my concern.  But if my neighbor announces a route to the AS112 addresses,
and then misconfigures a server, fills it with lies, or logs all my
queries, the practical effect on me is pretty small: the worst case
scenario I can think of offhand is that somebody gleans information about
my internal network topology that probably wouldn't have been difficult to
guess anyway.

I believe there's more scope for an incompetent or malicious root server
operator to block, surveil, or deceive me, and while there are defenses I
can deploy against some misbehaviors, I think we need to be cautious about
about a potential increase in the number of bad actors and failure modes.

While I don't particularly share Andrew's camel's-nose-on-the-slippery-slope
concerns about a root zone with a modified NS rrset, if I were going to use
it myself, it would *only* be because I was deploying a local root instance
on my own network or on the local host.  If I weren't going to deploy it
myself, then I'd stick to the traditional roots.  I may not be typical
in that respect, but if I am, then there's no need for unowned anycast
anyway.

-- 
Evan Hunt -- e...@isc.org
Internet Systems Consortium, Inc.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to