On 18 Sep 2016, at 15:21, John R Levine wrote:

It is impossible to measure the effectiveness without knowing how many collision queries are just noise (queries that will cause no noticeable damage if they started coming back with results).

Agreed. I don't see how to find that out in ways that are not hard to back out if it turns out the damage is as bad as we fear.

I do see that, but that's a discussion for a different time and place. (Unless this WG re-adopts corp/home/mail, of course.)


In the case of mitigation through wildcard-to-localhost, it is safe to assume that many organizations did in fact mitigate; we simply can't tell how many or when.

How come?

Because a few of them told me they did.

I'm not denying it's possible, but I've never seen any evidence that there were collisions to mitigate.

You of all people should know that "people do dumb things with the DNS". :-)

Before the 127.0.53.53 approach, some TLDs tried reserving the names that showed up in DITL snapshots, and those names looked to me totally random, likely generated by something that was trying to see whether some piece of namespace was wildcarded.

As we saw at the collisions workshop (https://www.ietf.org/id/draft-thomas-namecollisions-workshop-report-05.txt), DITL data is poorly suited for following collisions because you can't tell how much is coming from organizational resolvers that are in front of a poorly-chosen name and how many are from upstream ISPs.

(Disclaimer: I'm now on ICANN staff, but well before I was, I wrote "Guide to Name Collision Identification and Mitigation for IT Professionals" for ICANN.)

A fine document for people who already realize they need to deal with collisions, not so much for people who don't realize they exist or assume they're someone else's problem.

Correct. It has been helpful, though, at least to organizations seeing 127.0.53.53.

--Paul Hoffman

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to