As I imagine you've heard, part of the problem with resolver-authoritative 
telemetry interfaces is that the deployed infrastructure is not so simple; it 
also includes forwarders, changed resolvers, caches, middleware that interferes 
with the query path and/or drops queries that don't look normal... It's a 
jungle out there. Looking at the closest tree from just outside the edge of the 
jungle is actually much easier than speculating about what bizarre horrors lie 
within it.

> On 27 Nov 2017, at 13:36, Richard Barnes <r...@ipv.sx> wrote:
> 
> Well, that's what I get for providing drive-by feedback.  Someone pointed me 
> off-list to RFC 8145 and the operational issues with that.  I still think 
> that that calls for a better authoritative/resolver telemetry interface, not 
> some client-side thing.
> 
> On Mon, Nov 27, 2017 at 1:10 PM, Richard Barnes <r...@ipv.sx> wrote:
> George, you should know better than to claim that a mechanism that requires 
> resolver updates will have "immediate benefit" :)
> 
> I do not find this mechanism terribly compelling.  It is not useful in the 
> short run, as noted above.  And it has the wrong architecture for the long 
> run.
> 
> What zone operators need, for KSK roll-overs and other evolution decisions, 
> is telemetry about the capabilities of the resolvers they serve.  In order 
> for an approach like this to provide that telemetry, one would need a 
> broad-scale client-side measurement system.  While such systems exist (Geoff 
> and George being expert practitioners), they have a lot of problems -- 
> they're expensive to operate at scale; they're extremely limited in terms of 
> what they can measure and how reliably; and they impose much more overhead 
> than is needed here.  We shouldn't be building a telemetry system for the DNS 
> that has hard-coded assumptions about web ads or dedicated probes.
> 
> It would be far better to build a telemetry mechanism that operated directly 
> between resolvers and authoritative servers.  There are a variety of ways you 
> could do this.  In today's world, you could have some record by which an 
> authoritative server could advertise a telemetry submission point.  In a DOH 
> world, you could have the resolver provide a Link header telling the 
> authoritative server where it could pick up information about resolver 
> capabilities.  None of these are hard to build (and they don't interfere with 
> the "fast path" of the resolver) and they provide much more high quality 
> information.
> 
> If you need data for the KSK roll that we're already a decade late for, 
> gather it in a way that doesn't require a resolver upgrade.  (Deploy a 
> dedicated temporary TLD if you need to.)  If you're trying to solve the 
> long-run telemetry problem, then build it properly.
> 
> --Richard
> 
> 
> On Thu, Nov 16, 2017 at 3:34 AM, George Michaelson <g...@algebras.org> wrote:
> I support adoption of this work. Its a sensible, simple proposal which
> has immediate benefit, and can be used by anyone to test the ability
> of their nominated resolver to recognise specific keys, and their
> trust state.
> 
> I believe as a community, at large,  we need code deployed into the
> resolvers in the wild, and we need a document specifying the behaviour
> we need deployed into those resolvers. We can use this to inform
> ourselves of operational risk under keychange. We can know as
> individuals, as organizations what we will see, if keys change. I
> think this is quite powerful. compared to measurement of what
> resolvers see, or what authoritatives or roots see, going back to
> these service-providers themselves. This method informs the client
> side of the transaction. Thats big.
> 
> I'm not saying we shouldn't do other things, or measure. I'm saying
> that this proposal has a qualitative aspect which I think is
> different, and good.
> 
> -George
> 
> On Thu, Nov 16, 2017 at 4:23 PM, tjw ietf <tjw.i...@gmail.com> wrote:
> > All
> >
> > The author has rolled out a new version addressing comments from the meeting
> > on Monday, and we feel it’s ready to move this along.
> >
> > This starts a Call for Adoption for draft-huston-kskroll-sentinel
> >
> > The draft is available here:
> > https://datatracker.ietf.org/doc/draft-huston-kskroll-sentinel/
> >
> > Please review this draft to see if you think it is suitable for adoption by
> > DNSOP, and comments to the list, clearly stating your view.
> >
> > Please also indicate if you are willing to contribute text, review, etc.
> >
> > This call for adoption ends: 30 November 2017 23:59
> >
> > Thanks,
> > tim wicinski
> > DNSOP co-chair
> >
> > _______________________________________________
> > DNSOP mailing list
> > DNSOP@ietf.org
> > https://www.ietf.org/mailman/listinfo/dnsop
> >
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
> 
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to