Re: [DNSOP] Terminology question: split DNS

2018-03-19 Thread John Heidemann
use of this term, see https://en.wikipedia.org/wiki/Split-horizon_DNS It is not, to me, too great an overlap with split-horizon routing. -John Heidemann ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

[DNSOP] b-root begins anycast in May

2017-04-18 Thread John Heidemann
[This topic is not directly relevant to dnsop working group events, but the WG overlaps with the right set of technical folks, so pardon the distraction.] To improve B-Root DNS service, B-Root will be activating anycast on 2017-05-01, providing service from a new site in Miami in addition to our

Re: [DNSOP] The DNSOP WG has placed draft-wkumari-dnsop-multiple-responses in state "Candidate for WG Adoption"

2016-07-06 Thread John Heidemann
TCP does not require protocol changes, but it may require implementation changes. (As per RFC-7766.) TCP perhaps solves the "give me A + + MX" case. Case (2) is the ability to have a server give back the answers to questions you did not yet ask. Isn't that what the &q

Re: [DNSOP] Root server tar pitting? Is there a better way?

2016-05-16 Thread John Heidemann
sing-the-Response-Rate-Limiting-Feature-in-BIND-9.10.html The KB article talks about doing it in response to a large number of NXDOMAINs per unit time, as it sounds like you encountered. -John Heidemann ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] Last Call: (DNS Transport over TCP - Implementation Requirements) to Internet Standard

2015-11-24 Thread John Heidemann
On Wed, 25 Nov 2015 09:23:50 +1100, Mark Andrews wrote: > > >In message <17673.1448400...@dash.isi.edu>, John Heidemann writes: >> On Mon, 23 Nov 2015 20:25:29 +, "Wessels, Duane" wrote: >> > >> >> On Nov 23, 2015, at 11:58 AM, Mukund Siva

Re: [DNSOP] Last Call: (DNS Transport over TCP - Implementation Requirements) to Internet Standard

2015-11-24 Thread John Heidemann
message maybe large enough that it is split into multiple TCP segments (each a separate packet). The statement: "an AXFR consists of the following 3 messages: Message1: beginning SOA and some RRs, Message2: some intermediate RRs, Message3: some more intermediate RRs..." I think conflates th

Re: [DNSOP] comments on draft-ietf-dnsop-5966bis-02

2015-08-06 Thread John Heidemann
oad in the same segment is buggy becuase, in general, there is NO way for sender to guarantee that property. This is the limitation Jinmei pointed out. Fortunately, app-level messages that are split across multiple TCP segments (and therefore may require mutliple read() calls) are well known to TCP deve

Re: [DNSOP] I-D Action: draft-ietf-dnsop-5966bis-02.txt

2015-07-27 Thread John Heidemann
On Sun, 26 Jul 2015 22:56:10 -0700, Paul Vixie wrote: > > > >John Heidemann wrote: >> ... >> >>> since you brought it up, i do want to know what the udp response policy >>> will be for servers who have a new-style (explicitly negotiated) persistent >

Re: [DNSOP] I-D Action: draft-ietf-dnsop-5966bis-02.txt

2015-07-26 Thread John Heidemann
On Sat, 25 Jul 2015 19:24:17 -0700, Paul Vixie wrote: > > >John Heidemann wrote: >> On Sat, 18 Jul 2015 10:27:41 -0700, Paul Vixie wrote: >> >>>> ... With modern routers my understanding is it's usually bitrate not >>>> packet count that is th

Re: [DNSOP] I-D Action: draft-ietf-dnsop-5966bis-02.txt

2015-07-18 Thread John Heidemann
On Sat, 18 Jul 2015 10:27:41 -0700, Paul Vixie wrote: > > > >John Heidemann wrote: >> ... >> I think one has to be careful comparing TCP and UDP attacks here. >> >> Yes, this is a DoS attack. The question is not can TCP be used to >> attack, but is i

Re: [DNSOP] I-D Action: draft-ietf-dnsop-5966bis-02.txt

2015-07-18 Thread John Heidemann
(that is: rate-limit queries per connection, connections per IP, and use SYN cookies). See Figure 4 and section V-B in http://www.isi.edu/~johnh/PAPERS/Zhu15b.pdf for graphs. (These do not include your specific attack, but do consider spoofing and non-spoofing.) Use of TCP will require hardening DNS servers' TCP compared to today. But in today's hostile Internet, such hardening seems necessary anyway. -John Heidemann ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] review of USC/ISI Technical Report ISI-TR-693, June 2014 (as referenced by draft-ietf-dnsop-5966bis-01)

2015-03-20 Thread John Heidemann
are useful across MANY deployment choices that are connection-based. DNS-over-HTTP will see similar connection reuse rates as DNS-over-TCP. TCP fastopen is good for HTTP and HTTP2 and DNS over TCP and DNS over HTTP. Please don't throw these babies out with the deployment bathwater. -John Heidemann ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-27 Thread John Heidemann
s initiators to other responders? How many responders keep your TCP connection on and actually allow multiple queries? (There are concerns about TCP port 53 being firewalled, or responders not handling TCP at all.) -John Heidemann ___ DNSOP mailing list

Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-25 Thread John Heidemann
On Sun, 25 Jan 2015 09:44:24 +1100, Mark Andrews wrote: > >In message <54c40d28.7050...@redbarn.org>, Paul Vixie writes: >> > Mark Andrews <mailto:ma...@isc.org> >> > Thursday, January 22, 2015 6:29 PM >> > In message <32707.1421975...@dash.isi.

Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-22 Thread John Heidemann
[Warning to rubberneckers: seems like at least two topics here: about the spec and about TCP as a DoS.] On Wed, 21 Jan 2015 14:29:22 -0800, Paul Vixie wrote: ># > John Heidemann >Wednesday, January 21, 2015 1:53 PM >On Wed, 21 Jan 2015 09:30:44 +, Ray

Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-21 Thread John Heidemann
On Wed, 21 Jan 2015 16:58:32 -0500, Christopher Morrow wrote: >On Wed, Jan 21, 2015 at 4:53 PM, John Heidemann wrote: >> I don't see how DoS is an argument against TCP for DNS. (Unless one >> assumes hardware and software at the servers is fixed to something like >> 2

Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-21 Thread John Heidemann
on't that also create any DoS problems that stem from TCP? I don't see how DoS is an argument against TCP for DNS. (Unless one assumes hardware and software at the servers is fixed to something like 2004 standards.) What am I missing? -John Heidemann ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

[DNSOP] updated tech report about DNS-over-TCP and DNS-over-TLS

2014-07-14 Thread John Heidemann
In Feb. 2014, Zi Hu posted about a study about DNS performance over TCP and TLS. The context was a proposal to allow DNS to use TLS over TCP, described in http://tools.ietf.org/html/draft-hzhwm-start-tls-for-dns-01 We got a lot of input we got from the community (particularly those at OARC in Wa

[DNSOP] deployment requirements for dns channel privacy [was: various approaches to dns channel secrecy]

2014-07-08 Thread John Heidemann
[I added dns-privacy to the cc list, since that seems like a relevant forum for this discussion.] On Mon, 07 Jul 2014 11:04:56 -0700, Paul Vixie wrote: >Matthäus Wander wrote: > >... > >I didn't mean to imply that a DTLS solution can be universally deployed. > > >because the dns is a

Re: [DNSOP] draft-bortzmeyer-dnsop-dns-privacy (was: DNS privacy : now at least two drafts)

2014-05-19 Thread John Heidemann
ver" without an adjective for (2) risks ambiguity - recursive resolver vs. recursive server for (2) seem to depend on if you're approaching the problem from the end-user or the providers point of view. The challenge is that (2) is both a client AND server, leading to inconsistency

Re: [DNSOP] [dns-privacy] DNS over DTLS (DNSoD)

2014-04-24 Thread John Heidemann
On Thu, 24 Apr 2014 11:32:12 -0400, Phillip Hallam-Baker wrote: >... > >For me the idea of putting TLS traffic over the same port as non TLS >traffic without careful attention to how the upgrade is achieved would >be 'butchering the protocol'. Changing the port number to one that is >known to work

Re: [DNSOP] A new appoarch for identifying anycast name server instance

2011-09-27 Thread John Heidemann
he coverage they're paying for. (Of course, you have to decide if that example is a reason for, or against :-) -John Heidemann ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop