On 23 Dec 2017, at 11:59, Geoff Huston wrote:

On 22 Dec 2017, at 8:44 am, Ray Bellis <r...@bellis.me.uk> wrote:



On 21/12/2017 15:36, Robert Story wrote:
I reread the draft today, and noticed that two things aren't specified. The first is the contents of the A/AAAA RRSET returned, and the second
is the TTL for the records.

Maybe the A/AAAA record values could be used to return additional
details? For example, whether or not the key is part of static
configuration, or learned via 5011.

I had also wondered about this.

A browser-based system for triggering these queries can't do so without also then attempting a download of some resource via whatever IP address
is returned.

(in other words, you can't make a browser "just" do a DNS lookup, the
DNS lookup is a side effect of attempting to access a URL)


As Ray points out, if a browser is conducting the experiment, and the
only visible indication of successful resolution is the retrieval of the
named object, then a reasonable test would use some sentinel object as
the named target (a 1x1 pixel gif is conventional in these
circumstances). In this case the TTL of the DNS record is not directly
visible to the browser.

In situations where a client may have multiple resolvers in their local
/etc/resolv.conf configuration, and recursive resolvers may themselves
/use forwarders, it is not immediately obvious which resolver
generated the response, so I’m unsure of the interpretation of any
attempt to embed some form of additional information into either the IP
address of the named object.

The intent of the test is to establish a usable test along the lines of "If you can retrieve this named object you are ready for a Root Zone KSK roll" The issues around the diversity of behaviours in the DNS turn this
dsimple songle fetch into a compound fetch of three named objects, but
the semantic intent is the same. That is: "From the pattern of the
results of performing these three tests we can compute a likelihood of
concluding whether or not, you, the end user, will, or will not, be
affected by a pending KSK roll. From a large enough sample of users was
can then estimate the 'impact' of a KSK roll on the total user
population.

Note that the intent is not to try and isolate the behaviour of a single resolver, nor to attempt to diagnose the reasons for that behaviour. The
intent is to look at the user and the set of resolvers that the user's
DNS is configured to use, and determine if the user's DNS will be
"stranded" in the even of a KSK roll.

This answer doesn't seem to fully address Robert's and Ray's questions. Why use an A/AAAA query if you aren't going to do anything with the result? If you are going to use A/AAAA, you have to tell resolvers what to return in the results. Using a new RRtype would have clearer semantics.

--Paul Hoffman

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to