Re: [DNSOP] Fwd: New Version Notification for draft-wkumari-dnsop-multiple-responses-01.txt

2015-07-22 Thread
Hi, Stephane,
Sorry for the delayed response.
Please find the in-line answers and welcome your further comments:


* the draft gives the impression that it authorizes a new behaviour. 
But auth. servers have been sending extra data (IP address of a MX target, for 
instance) for years.


#Z.W. Yan: Yup, auth servers have been including extra data for a long time, but
only certain sets of information -- things like IP for MX, CNAME
followups, etc. They haven't really been sending other answers, not
strictly in support of the original query. This is because receivers
have not been willing to accept this, *because they cannot trust it*.
Basically what we are saying is, now that DNSSEC exists, resolvers can
trust data in the additional section, so it is worth sending it
again...




* the draft says these extra data MUST (RFC2119-MUST) be validated with DNSSEC. 
Does it mean that the current behaviour of sending extra data for unsigned 
zones is now illegal?


#Z. W. Yan: Not illegal, as explained above, if we want to make well use of 
this function, we need to guarantee its security.




* followup off the previous question] should we instead say that
extra data should be sent (and should be accepted by clients) if and
only if (DNSSEC-validated _or_ in-bailiwick)? The current behaviors of
resolvers (accept extra data if in-bailiwick) does not seem to be
mentioned.


#Z. W. Yan: The background of the current situation will be added in the next 
version.




* the draft says "an authoritative name server operator can ensure
that the recursive server that the client is using has all the answers
in its cache". This is very dangerous because people may read it "we
now have a sure way to control what ends in the resolver's cache"
which is clearly not the case (the resolver may refuse some of the
extra data, the TTL of the extra data may mae it expire before the
"main" data, etc).


#Z. W. Yan: we will revised it as: "an authoritative name server operator can 
ensure that the recursive server that the client is using has all the answers 
in its cache from the authoritative point of view".


BR,
Zhiwei YAN
 ___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Fwd: New Version Notification for draft-wkumari-dnsop-multiple-responses-01.txt

2015-07-22 Thread
Hi, Stephane,
Sorry for the delayed response.
Please find the in-line answers and welcome your further comments:


* the draft gives the impression that it authorizes a new behaviour. 
But auth. servers have been sending extra data (IP address of a MX target, for 
instance) for years.


#Z.W. Yan: Yup, auth servers have been including extra data for a long time, but
only certain sets of information -- things like IP for MX, CNAME
followups, etc. They haven't really been sending other answers, not
strictly in support of the original query. This is because receivers
have not been willing to accept this, *because they cannot trust it*.
Basically what we are saying is, now that DNSSEC exists, resolvers can
trust data in the additional section, so it is worth sending it
again...




* the draft says these extra data MUST (RFC2119-MUST) be validated with DNSSEC. 
Does it mean that the current behaviour of sending extra data for unsigned 
zones is now illegal?


#Z. W. Yan: Not illegal, as explained above, if we want to make well use of 
this function, we need to guarantee its security.




* followup off the previous question] should we instead say that
extra data should be sent (and should be accepted by clients) if and
only if (DNSSEC-validated _or_ in-bailiwick)? The current behaviors of
resolvers (accept extra data if in-bailiwick) does not seem to be
mentioned.


#Z. W. Yan: The background of the current situation will be added in the next 
version.




* the draft says "an authoritative name server operator can ensure
that the recursive server that the client is using has all the answers
in its cache". This is very dangerous because people may read it "we
now have a sure way to control what ends in the resolver's cache"
which is clearly not the case (the resolver may refuse some of the
extra data, the TTL of the extra data may mae it expire before the
"main" data, etc).


#Z. W. Yan: we will revised it as: "an authoritative name server operator can 
ensure that the recursive server that the client is using has all the answers 
in its cache from the authoritative point of view".


BR,
Zhiwei YAN
 ___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] my lone hum against draft-wkumari-dnsop-multiple-responses

2016-07-19 Thread
About the DDoS risk, it should not be worried so much because this scheme is 
controlled/triggered by the recursive server (with a flag as NN bit).
In other words, the recursive server can get the piggybacked multiple responses 
only when it wants and of cource it can disable this model anytime.


Another scenario to illustrate this proposal is under the DANE case:
A client wants to visit www.example.com.
But this domain name supports DANE can the TLSA record is configured under the 
domain name: _443._tcp.www.example.com.
The client has to query the two names seperately.
Yes, it is just one more TTL, but why not to do the optimization with a 
steerable method.


Zhiwei Yan___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] my lone hum against draft-wkumari-dnsop-multiple-responses

2016-07-19 Thread
Good morning, Ralf.


At 2016-07-20 13:07:01, "Ralf Weber"  wrote:
>Moin!
>
>On 20 Jul 2016, at 5:03, 延志伟 wrote:
>
>> About the DDoS risk, it should not be worried so much because this 
>> scheme is controlled/triggered by the recursive server (with a flag as 
>> NN bit).
>> In other words, the recursive server can get the piggybacked multiple 
>> responses only when it wants and of cource it can disable this model 
>> anytime.
>That's not who DDos work. If attacker would only do what the specs say 
>we wouldn't have any DDos. But an attacker can just create an UDP packet 
>with that bits and a spoofed address and fire it off (or get a botnet to 
>fire it off).

I understand your points, but these risks always be there because DNS response 
is larger than the request, like DNSSEC. 
How to avoid DNS DDoS is anther problem.
>> Another scenario to illustrate this proposal is under the DANE case:
>> A client wants to visit www.example.com.
>> But this domain name supports DANE can the TLSA record is configured 
>> under the domain name: _443._tcp.www.example.com.
>> The client has to query the two names seperately.
>> Yes, it is just one more TTL, but why not to do the optimization with 
>> a steerable method.
>Again if example.com is popular almost all the time this record will be 
>in the cache already.

Anyway, the cache should get the data fist and then it can cache them.
:-)


>So long

>-Ralf


Zhiwei Yan___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] my lone hum against draft-wkumari-dnsop-multiple-responses

2016-07-20 Thread


Hi, Ralf,
We understand your worries and these negative effects can be fixed or descended 
in the next version.
But anyway, let's go back to the scenario considered by our draft to illustrate 
its necessity.
I show an example as following (although I think we have described it several 
times. :-)):
In order to visit the www.baidu.com, the user has to query www.baidu.com and 
many other related domain names 
(for many related resources such as images, java script, html, flash, video, 
sound), then a series of queries happen as the attached figure shows.


Thank you.
Zhiwei Yan





At 2016-07-20 20:20:45, "Ralf Weber"  wrote:
>Moin!
>
>On 20 Jul 2016, at 7:34, 延志伟 wrote:
>> I understand your points, but these risks always be there because DNS 
>> response is larger than the request, like DNSSEC.
>Yes, which is why we have several proposals on how to mitigate the 
>problem by e.g not giving  back ALL qtypes to an ANY question, or rate 
>limit any or answers in general. There also are tools out there that can 
>limit based on the answer size, all of that to mitigate or make the 
>handling of the amplification better.
>
>> How to avoid DNS DDoS is anther problem.
>If you introduce something that makes the answer bigger without 
>acknowledging that there could be a problem with it or it is another 
>problem you have not been following what is going on in the Internet 
>lately.
>
>Others have acknowledged that and described a way forward to mitigate it 
>(TCP,TLS,Cookies) which introduce a whole other set of problems (some 
>introduce additional round trips) which further more diminishes the gain 
>to effort ratio IMHO.
>
>> Anyway, the cache should get the data fist and then it can cache them.
>> :-)
>That is true, but an answer out of the cache is served a lot of times 
>before it has to be cached again, so you are gaining something for that 
>tiny fraction of users where the cache is cold or has become cold (not a 
>problem if you use software that prefetches), but putting all others to 
>risk. Not a good idea IMHO.
>
>So long
>-Ralf
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] my lone hum against draft-wkumari-dnsop-multiple-responses

2016-07-20 Thread
Hi, Ralf, I understand prefetch by the recursive server and it is the common 
case.
[https://tools.ietf.org/html/draft-liu-dnsop-dns-cache-00]
But if recursive server asks: give me the a RR and all the related RRs under 
your domain. And the authoritative server sends back  the requested domain name 
RR and the related RRs under its domain. It can also improve the efficiency.
Zhiwei Yan










在 2016-07-20 20:48:07,"Ralf Weber"  写道:
>Moin!
>
>On 20 Jul 2016, at 14:36, 延志伟 wrote:
>> But anyway, let's go back to the scenario considered by our draft to 
>> illustrate its necessity.
>> I show an example as following (although I think we have described it 
>> several times. :-)):
>> In order to visit the www.baidu.com, the user has to query 
>> www.baidu.com and many other related domain names
>> (for many related resources such as images, java script, html, flash, 
>> video, sound), then a series of queries happen as the attached figure 
>> shows.
>So what. If your recursive resolver is used by many people these records 
>will be in the cache. There will be no gain. Now of course if your 
>resolver only serves you that might be the case, but that is not the way 
>DNS was designed or is operated today. Oh and your example have out of 
>zone queries (also very common like facebook.com asking for fbcdn.com) 
>that can not be solved by this anyway. There is no better tool than a 
>prefetching hot resolver for lots of users to solve this problem.
>
>So long
>-Ralf
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop