One of my biggest concerns about the current proposal is that it seems to suggest that AS112 works. actually, the proposal doesn't mention AS112, but my discussion of the proposal here has mentioned AS112. Correct.
I would like to find some definition of “works” and how we come to that conclusion. In my experience there are AS112 nodes out there that are misconfigured in many ways (RIPE Atlas be your friend). Returning SERVFAILs, wrong data, etc. While wrong data is safeguarded by using DNSSEC in this proposal, malfunction is likely to occur still and can be just as bad. because AS112 only serves in-addr for non-routable address space (as described in RFC 1918), its failures are mostly benign -- it's rare to find someone who cares that the PTR for 10.0.0.73 has some particular value. in that way AS112 is a terrible canary for the scalingroot-XX coal mine, because data failures in the root zone are extremely noticeable and important. in other words the only reason we run AS112 at all is to keep the queries out of more important servers (like the root servers or the in-addr.arpa servers), whereas we have a broader and more powerful motive to run root servers. for that same reason, i'm not very worried. failures in AS112 servers go mostly unnoticed and as a result they might not be fixed quickly or ever. failures in root name service are extremely visible and will be noticed and fixed pretty quickly. so, in a way, AS112's weakness is scalingroot-00's strength. Agree on the technical nature of AS112 and that it goes largely unnoticed. That’s why I don’t like the notion of drawing conclusions that scalingroot-XX might work based on AS112 experience. It’s flawed. In the current system this issue is lessened due to the many different operators. i think you mean that the issue is lessened due to the small number of well known highly visible operators, since in scalingroot-XX, there would be millions of operators rather than a dozen or so operators. No, in case that K-root (sorry guys ;)) has a failure it is less likely that L-root has one as well. In the case of scalingroot-XX propagated failures due to a single operator are higher. Within a given enterprise or ISP that would have limited impact and one could just point the finger at them and not care (although I don’t agree with that either). However route leaks are going to occur as they have in the past (no-export stripping happens by accident) and will start to have impact on users outside of that admin/routing domain. route leaks also occur for the existing root name server anycast nodes. we're not inventing new trouble here. Now at least I know who to contact. See the issues with the root instances in Beijing and how quickly the could be resolved once noticed. Assuming that local routes are always the routes that are chosen first is a flawed assumption. Routing is integral to this proposal and cannot be disregarded if you wanna find a workable solution. as i tried to explain in the circleid post last week... http://www.circleid.com/posts/20141107_secure_unowned_hierarchical_anycast_root_name_service_and_apologia/ ...the routing issues are integral to the proposal (as you say) and are in no way disregarded (as you ask). Good. Thanks. From a TLD operator perspective I think it’s a huge step backwards that we will loose our update propagation assurance. Will I have to rely on the RRSIG expiry as my worst case scenario for a zone update to be fully propagated? With the sort of requirements that are put on TLD operators and DNS operators these days that sounds completely unacceptable path to me. It’s very different from AS112 where there is are simple zones that are configured as master and then remain that way. my primary reason for answering this message on-list rather than privately is to ask you whether your stated concern also applies to draft-wkumari-dnsop-root-loopback? (it would seem so, in which case, that part of this thread should continue here, even while the parts related narrowly to scalingroot-XX should be paused for now.) Yes it applies the same way to Warren’s draft. In closing, this draft proposes a solution to a problem that hasn’t been quantified and has no measure of success. Personally I think that’s bad practice. i hope you'll make time to come to hong kong on december 8-9 to inform the discussion with your perspective. I would be happy to help with work to quantify the problem. As said, I think there are more ways to go about this and it seems that the “I want my own root server” is taking centre stage without there necessarily being a need for that. mine is: several of us have, and many of us could, construct a simple, cheap, effective method to ddos all 300+ root name servers, untraceably and unstoppably. please do the thought experiment. we can repeat it as a group "bar bof" thought experiment in hong kong if you wish. but in any case i'm going to make that harder; while no service can ever be "ddos-impossible" we can and should work toward "ddos-difficult". i pushed f-root into global anycast on the strength of m-root's pioneering early success with it. i applaud l-root's efforts. but i'm not satisfied that any number of hundreds of servers, or any number of dozens of operators, can serve the internet as it has become and as it will be. Many tales to tell ...
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop