kato san, what is the statistical likelihood of a routing break happening at a specific anycast node, during the life of a TCP session, and whats the consequence?
likelihood: it depends on the frequency of A/I XFR, the volume of query, and the frequency of routing break consequence: the TCP session dies and the client re-tries Which will connect to another anycast node and continue. I believe the frequency is going to be down below 1% and probably below 0.001% as orders of magnitude. I suspect it is no worse and no more likely than A/I XFR long held TCP, and breaking routing in the current model. I don't believe the consequence is severe because the global applicability of a single update fail is that you had to retry -G On Wed, Mar 25, 2015 at 9:01 AM, <k...@wide.ad.jp> wrote: > > From: Paul Hoffman <paul.hoff...@vpnc.org> > Subject: Re: [DNSOP] draft-ietf-dnsop-root-loopback-01 > Date: Wed, 25 Mar 2015 07:36:39 -0500 > > > On Mar 25, 2015, at 12:19 AM, k...@wide.ad.jp wrote: > >> It is better to describe that the update of the zone can be delayed a > >> little bit as no NOTIFY message is sent to the root-on-loopback. > > > > Good point; added. > > > >> In Appendix A, the root servers listed allow AXFR currently, but I am > >> afraid they don't guarantee it in the future. It may be necessary to > >> confirm it with the operator of each root server listed. > > > > The appendix already says: > > > > It is crucial to note that none of the above services are > guaranteed > > to be available. It is possible that ICANN or some of the root > server > > operators will turn off the AXFR capability on the servers listed > above. > > > > Asking any operator to guarantee something in the future doesn't mean > they actually will do so, so this warning is more appropriate. > > Sorry, I missed the paragraph. > > >> In Appendix B, most of the IP addresses of the root DNS servers are > >> anycasted. They are not suitable for the target to pull the zone data > >> in AXFR over TCP. > > > > Fully disagree. AXFR of the root zone over TCP over anycast works just > fine in all our testing. As Tony Finch points out, it works well in the > current Internet. > > I don't think Akamai uses anycast, but it answers "suitable" > non-anycast IP address in DNS query depending on the source address. > I don't know if such ISPs still exist, but when we started Anycast, it > was reported that some ISPs did per-packet load balancing. The root > zone grows over time in almost monotonous manner and longer TCP > sessions (especially over narrow bandwidth circuits) could break due > to routing change. I'd appreciate if you can add my concern to the > text. > > >> Also it must be noted that these addresses may change over time (while > >> the frequency is not high), it may need to give a warning to > >> periodically check if the addresses are valid. > > > > Is the above warning not sufficient? > > OK > > >> Generating the > >> configuration after priming query? (this is a joke) > >> > >> IMHO, it may necessary to establish an infrastructure to distribute > >> root zone in scalable/reliable manner. > > > > Feel free to create such an infrastructure. After it is in place, we can > update this document. In the meantime, this document describes a practice > that many operators are already using quite successfully. > > Publishing XML/JSON/YAML encoded root zone via CDN? I don't know who should > pay the cost. > > > > > --Paul Hoffman > > -- Akira Kato > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop >
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop