This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/dns-wg@ripe.net/
[dns-wg] TLD delegation trade-offs
- Previous message (by thread): [dns-wg] TLD delegation trade-offs
- Next message (by thread): [dns-wg] TLD delegation trade-offs
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Edward Lewis
Ed.Lewis at neustar.biz
Tue Jun 7 17:03:48 CEST 2005
There are quite a few message to respond in the thread, I'll stick to questions indicating that my comments need clarification... At 0:45 +0100 6/7/05, Jim Reid wrote: >On Jun 6, 2005, at 22:00, Edward Lewis wrote: > >> What I find interesting is the trade-off of: >> >> The gain in packet compression by using similar names plus the >>operational advantage of streamlining the names >> >> vs >> >> The gain by spreading name server names under other TLDs plus the logging >>convenience of only needing one PTR record per address > >Ed, I'm not sure I understand the second part of your trade-off. The benefits >of better label compression and streamlined names seem clear enough. Spreading >name server names under other TLDs appears unwise: there's an increased >likelihood of not getting all the glue in a referral response with that >approach. Or have I missed something? I note Neustar doesn't spread the TLD NS >RRsets for .biz and .us like that. :-) And as for reverse lookups, I doubt >anybody or anything cares about what name (singular) should be returned for >the address of some TLD server. The operator of that server will care of >course, but why would anyone or anything else even need to care? Let's say my TLD is "tld", that my two options for name server sets are {a.nic.tld, b.nic.tld} and {a.nic.example, b.nic.tld}, and the query is for "www.jim.tld A". With option 1, if the query goes to the root and the iterative resolver is BIND, the queries for the addresses of a.nic.tld and b.nic.tld will follow. If there is a problem with the tld zone, and perhaps the glue at the root isn't completely right, we will have problems. With option 2, a problem with the tld zone isn't an issue if the copy of the zone on a.nic.example is in good enough condition. In summary, by using a different TLD, there's one more place to get the address of a name server. It could be that the fault that makes this a true advantage has almost no chance of happening in isolation. My supposition that spreading name servers among domains is based on watching how BIND does its resolution (via packet sniffing). I don't have access to other (popular) implementations to see how they go about their business. As you descend the tree, it's clearer than spreading name servers among domains (even different tlds) has a benefit. Because there are more moving parts as you descend the tree, there's more chance something goes wrong, so you want to build in resiliency. I can see that in the case of TLDs, there really aren't many options in case of a some failures. And, as far as what I call glue space savings isn't seen in the root zone as all name servers are in the root domain. Given that BIND chases the authoritative version of the glue it receives, and that there are a lot of BIND name servers (if not a majority), I think there's a gain in spreading the name servers over different TLDs. NeuStar's name servers are all in the same TLD. Internally, well, we just haven't seen a justification for trying "something new." It's like this, it works as is, its an industry norm, and tinkering with operational systems should not be taken lightly. I'd say that I have a hunch that there is a gain to mixing name servers over TLDs, and this is based on my thoughts about how enterprises should think. Hunches are not always right. (Recall I'm writing as an individual, not a company representative.) As far as reverse lookups - I think there are a lot of folks who do care. I've seen the issue more with routing discussions, traceroute is often cited as a tool that cares what it sees in the PTR record. Security analysis too - they rely on logging data. >> 1) Compression to insert more name servers or more glue records into a >>response is an advantage that I think is becoming outdated. > >With EDNS0 out there, I tend to agree. But there are lots of name servers >deployed that don't and won't support EDNS0. And even if EDNS0 was ubiquitous, >I'd prefer to see NS RRsets use a clean set of target names. It's prettier. >And it reduces the protocol overheads: fewer CPU cycles encoding/decoding DNS >packets as well as saving precious bytes we're going to need for DNSSEC >RRtypes. :-) Even with EDNS0. :-( I wasn't even considering EDNS0. I was thinking anycast. EDNS0 is good, but some non-DNS security devices still don't understand it. That needs fixing, and is out of scope for the thread and wg. I don't see how CPU cycles are reduced by using "a clean set" of names. A label pointer reference is the same, regardless of where it goes. >> 3) I would think that having servers listed under other TLDs (as we are >>looking at a ccTLD here) would be a good thing. Just for the fact that we >>are spreading the servers about (in DNS, not just topology). In addition, >>these servers don't count against the glue space hit in the response. > >Could you please expand on this Ed? There are things I simply do not >understand >here. What's gained by spreading the hostnames for 8 (say) name servers for >some TLD across .tld0, .tld1, ... .tld7? And how does the extra space needed >for these names not "count against the glue space hit" in a referral? Going back to my fictional tld above and the two options, here is what the root can minimally send back: option 1 answer: authority: tld NS a.nic.tld tld NS b.nic.tld additional: a.nic.tld A 1.1.1.1 b.nic.tld AAAA ::1 option 2 answer: authority: tld NS a.nic.example tld NS b.nic.tld additional: b.nic.tld AAAA ::1 The reason I say these are minimal is that any query for the records in the additional section would wind up with the same answer. In option 2, the next query to the root would be for "a.nic.example A" (and AAAA) from a BIND resolver. The response to that would be a referral to the example TLD servers. In option 2, the out-of-baliwick server does not count the needed glue. Of course, in reality, the root server is probably responding with it, as the server is under the root domain. Perhaps I am seeing a gain that is possible, but is not realized in practice because of the tools we are using and are used to. >Hmm. Nobody mentioned PTR records in this discussion. I'm struggling to see >how this matters. Is there a name server implementation that does reverse >lookups of the IP addresses in a referral, compares them with the hostnames >in the NS RRset and gets upset if there's a mismatch? I thought that the main problem was that IANA wasn't permitting multiple hosts to point to one IP address. Back in prehistoric times, this restriction was also in place in .com and .net. I ran into this - and the technical glitch that caused the restriction was that the registry software couldn't support multiple PTRs in a set. My supposition was that this might have been the cause of concern with IANA - I can't imagine any other reason to be concerned. Besides (potentially) faulty registry software, the main reason why multiple PTR records in a set are denigrated by some is that application software generally assumes a host has only one name. (I think multiple PTRs are fine, I'm just relating the arguments levied against them.) My experience with one dynamically updating DHCP server would treat the forward and reverse differently. When it created a lease with a vanity name, it would add the vanity name to the forward, supplementing what was already there. When updating the reverse, it deleted all previous records and out in the PTR with the vanity name. This is an application problem, not a DNS one. The only time that the reverse of a name server has ever been called out is in some DNS checking packages. I don't know why it's an issue, but DNS set ups were graded on that. >> The part of the trade-off I haven't addressed is: >> >> The gain by using unique name server names for each delegation >> >> vs >> >> The need for extra IP addresses in light of a one name per address policy > >This confuses me too Ed. AFAICT there is no one name per address policy. Even >if this was the case for TLD delegations, we'd still only be talking about >wasting around 4000 IPv4 addresses, assuming each TLD has around 20 NS >records. There are plenty of far more blatant examples of wasteful usage of >IPv4 address space: the /8s that Stanford and MIT have for instance. During the RIPE NCC presentation in the WG at RIPE 50, I thought the criticism was that the slave server names using unique addresses was considered wasteful and ironic that an RIR was doing this. I thought that this was proposed in response to the "problems" with IANA as described in the draft. It could be that my wires are crossed. -- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Edward Lewis +1-571-434-5468 NeuStar If you knew what I was thinking, you'd understand what I was saying.
- Previous message (by thread): [dns-wg] TLD delegation trade-offs
- Next message (by thread): [dns-wg] TLD delegation trade-offs
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
[ dns-wg Archives ]