Document: draft-ietf-dnsop-3901bis
Title: DNS IPv6 Transport Operational Guidelines
Reviewer: Geoff Huston
Review result: Not Ready

Not Ready

I have been assigned as the DNS Directorate reviewer of this draft.

I have identified the following issues with this draft and the I
suggest that these issues should be addressed before the draft advances
towards publication as a BCP.

Minor Nits:

1  Section 2 - Terminology : "recrusive" -> "recursive"

2  Section 3.3 - " At the time of writing" -> This reference is already 2
   years old. Perhaps the document should explicitly state this as a
   reference to measurements undertaken in 2023, as per the citation

Issues:

1  Section 3 is a treatise on on the pontential fragmentary pressures on a
   single name space when a transport protocol-based failure to resolve a
   name may result in different views of the same name space when
   exclusively using one protocol or another. This section appears to this
   reviewer to stray from the purpose of a BCP document, namely to provide a
   description of guidelines, processes, and methods that are considered the
   best engineering judgment for designing, using, and managing the
   Internet. Some level of justification such processes and methods, but the
   material in Section 3 goes further than a brief justification and
   presents some general descriptions of DNS pathologies and remedial
   configuration settings for DNS servers and resolvers. Restating at length
   material from other DNS literature, including RFCs, appears to this
   reviewer to wander from the intended scope and purpose of this proposed
   revision to RFC3901.
   

2  Section  4.1 "It is usually recommended that DNS zones contain at least

   two name servers, which are geographically diverse and operate under
   different routing policies [IANANS]." This reference to advice from the
   IANA is advice that explicitly limits itself to consideration of the root
   zone, and delegations in the TLDs .int and .arpa, and does not purport to
   describe  a usual case.  Either the text should be modified toi note the
   intended limited scope of the IANA advice, or other DNS literature should
   be cite to justify this claim.
   
3  Section 4.1: "RECOMMENDED that at least two name servers for a zone are
   dual-stack name servers." There is no justification for this
   recommendation, and there are clearly other ways of providing resilience
   in the DNS for single-stack DNS resolvers. For example, using two
   nameserve names that are accessible using IPv4-only and a further twp
   nameserver names that are acessible using IPv6-only meets the same
   requirement of resilience in both protocols. The reviewer suggests that
   this recommendation be rewritten to address a requrement for resilience
   in each protocol familty. 

4. Section 4.1: "IPv4 adoption: Every DNS zone SHOULD be served by at least
   one IPv4-reachable authoritative DNS server". It appears that the intent
   of the RECOMMENDATION in the previous paragragh is that there is a
   minimum of TWO IPv4-reachable authoritative DNS servers. Which is it?
      
5. Section 4.1: "Given the IPv4 address scarcity, operators MAY opt not to
   provide DNS services via IPv4, if they can ensure that all clients
   expected to resolve this zone do support DNS resolution via IPv6." In the
   context of the public Internet (which is the intended context of RFC3901
   and presumably the intended context of this draft that proposes updating
   it), a DNS server is a promiscuous server and SHOULD NOT constraint or
   limit the clients that query it. The conditional expression in this text
   relating to ensuring all client c an support DNS resolution via IPv6
   appears to contradict the context of the public Internet. The review
   suggests that this sentence has no place in a BCP relating to the DNS on
   the public internet, and should be removed.
        
6. Section 4.1: "To avoid reachability issues, authoritative DNS servers
   SHOULD use native IPv6 addresses instead of IPv4-converted IPv6 addresses
   for receiving queries." Perhaps the draft should state that authoritative
   DNS servers SHOULD NOT use IPv4-Compatible IPv6 Addresses and IPv4-Mapped
   IPv6 Address [RFC4291]", as the reviewer dowa not believe that "native
   IPv6 addresses" is a well defined term in the IPv6 address architecture.
      
7. Section 4.1: "IPv6 adoption: Every DNS zone SHOULD be served by at least
   one IPv6-reachable authoritative DNS server". It appears that the intent
   of the RECOMMENDATION in the previous paragragh is that there is a
   minimum of TWO IPv6-reachable authoritative DNS servers. Which is it?
   
8. Section 4.1 Avoiding IP Fragmentation: This appears to be a more concise
   treatment of the material in Section 3 in the subsections "DNS-over-UDP
   packets requiring fragmentation" and "DNS-over-TCP packets requiring
   fragmentation". This reviewer suggests that the material in Section 3 can
   be dropped in favour of this treatment in Section 4.1.   
   
9. Section 4.2: "Every recursive DNS resolver SHOULD be dual-stack." This
   is not justified in the body of the document, and as such probably
   deserves further thought. Stub resolvers are encouraged to use a local
   configuration that has two (or more) recursive resolvers, and in such a
   scenario the stub resolver has recovery options if one of the configured
   recursive resolvers is unreachable. Secondly, there still exist many
   access networks in the public Internet where there is no IPv6 deployment.
   In such context this recommendation for local recursive resolver to be
   dual-stacked for its function of responding to the queries from the set
   of local stub resolvers makes no sense. At the very least this
   recommendation should be considered in respect to the
   stub-resolver-facing role of a recursive resolver and the authoritative
   server-facing role. If autheorativbe servers follow the recommendations
   on Section  4.1 then it would appear thathere is no generic requirement
   for all recursive resolvers to be dual-stacked in every instance.
   
10. Section 4.2:  "..a configuration where it forwards queries.." Embedding
   non-explicit forwarding of queries in the DNS resolution process is not
   exactly an instance of Best Current Practice. The DNS has no form of 
   query loop detection or excessive resolver query chain detection, and
   application of this practice in resolver implementations should be avoided
   as a general behaviour. This reviewer suggests removing all references to
   query forwarding by recursive resolvers in Section 4.2.
   
11. Section4.2: "when responding to recursive queries sent by stub DNS". How
   can a recursive resolver know that a query has been sent by a stub resolver? 

12. Section 5. Security Considerations: "introduce no new security\
   considerations into the DNS protocol." This reviewr differs with respect
   to the recommendation that under certain circumstances a recursive
   resolver may forward a query to another recursive resolver. As already
   noted, the DNS resolution protocol has no form of query loop detection or
   excessive resolver query chain detection, and there is the potential for
   scenarios that can be used to launch a DOS attacks on recursive
   resolvers. The authors should reconsider this section in the light of the
   advice relating to resover-to-resolver forwarding in this document.


 


_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to