Review of: draft-ietf-v6ops-v6-aaaa-whitelisting-implications-03

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Review:

Title:  IPv6 AAAA DNS Whitelisting Implications
I-D:    draft-ietf-v6ops-v6-aaaa-whitelisting-implications-03

By:     D. Crocker <dcrocker@xxxxxxxx>
Date:   29 April 2011


Summary:

This draft is a discussion of a technique for resolving a dual-stack problem between IPv4 and IPv6, through the use of special DNS records.

The document appears to continue a recent use of the term 'whitelisting' that strongly conflicts with long-standing use of the term by the anti-abuse community.

The document needs to do a more careful job of introducing the problem it is solving and the explaining the way the 'whitelisting' mechanism works.

I also very strongly encourage finding a different term.

d/


Abstract

   The objective of this document is to describe what the whitelisting
   of DNS AAAA resource records is, hereafter referred to as DNS

RRs are whitelisted? Isn't it the addresses and not the records that are whitelisted?

Does this mean putting whitelisting records into the DNS or does it mean something else?

Comcast's own considerable expertise notwithstanding, has this doc been vetted with a range of organizations that actually DO whitelisting? Has it been circulated through MAAWG and APWG? Any comments from Spamhaus? The Acknowledgements list does not seem to indicate a range of whitelist ops folks whose names I know. (But then, I only know a few...)


   whitelisting, as well as the implications of this emerging practice
   and what alternatives may exist.  The audience for this document is
   the Internet community generally, including the IETF and IPv6
   implementers.

I suspect that product marketers won't have much interest in this. I suspect that the target for this is anti-abuse technical and operations staff.


Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on August 26, 2011.

Copyright Notice

   Copyright (c) 2011 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as



Livingood                Expires August 26, 2011                [Page 1]

Internet-Draft   IPv6 AAAA DNS Whitelisting Implications   February 2011


   described in the Simplified BSD License.


















































Livingood                Expires August 26, 2011                [Page 2]

Internet-Draft   IPv6 AAAA DNS Whitelisting Implications   February 2011


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  5
   2.  How DNS Whitelisting Works . . . . . . . . . . . . . . . . . .  6
     2.1.  Description of the Operation of DNS Whitelisting . . . . .  7
   3.  What Problems Are Implementers Trying To Solve?  . . . . . . .  8
   4.  Concerns Regarding DNS Whitelisting  . . . . . . . . . . . . .  9
   5.  Similarities to Other DNS Operations . . . . . . . . . . . . . 12
     5.1.  Similarities to Split DNS  . . . . . . . . . . . . . . . . 12
     5.2.  Similarities to DNS Load Balancing . . . . . . . . . . . . 12
   6.  Likely Deployment Scenarios  . . . . . . . . . . . . . . . . . 13
     6.1.  Deploying DNS Whitelisting On An Ad Hoc Basis  . . . . . . 13
     6.2.  Deploying DNS Whitelisting Universally . . . . . . . . . . 14
   7.  Implications of DNS Whitelisting . . . . . . . . . . . . . . . 15
     7.1.  Architectural Implications . . . . . . . . . . . . . . . . 15
     7.2.  Public IPv6 Address Reachability Implications  . . . . . . 16
     7.3.  Operational Implications . . . . . . . . . . . . . . . . . 17
       7.3.1.  De-Whitelisting May Occur  . . . . . . . . . . . . . . 17
       7.3.2.  Authoritative DNS Server Operational Implications  . . 17
       7.3.3.  DNS Recursive Resolver Server Operational
               Implications . . . . . . . . . . . . . . . . . . . . . 18
       7.3.4.  Monitoring Implications  . . . . . . . . . . . . . . . 19
       7.3.5.  Implications of Operational Momentum . . . . . . . . . 19
       7.3.6.  Troubleshooting Implications . . . . . . . . . . . . . 20
       7.3.7.  Additional Implications If Deployed On An Ad Hoc
               Basis  . . . . . . . . . . . . . . . . . . . . . . . . 20
     7.4.  Homogeneity May Be Encouraged  . . . . . . . . . . . . . . 20
     7.5.  Technology Policy Implications . . . . . . . . . . . . . . 21
     7.6.  IPv6 Adoption Implications . . . . . . . . . . . . . . . . 22
   8.  Solutions  . . . . . . . . . . . . . . . . . . . . . . . . . . 23
     8.1.  Implement DNS Whitelisting Universally . . . . . . . . . . 23
     8.2.  Implement DNS Whitelisting On An Ad Hoc Basis  . . . . . . 23
     8.3.  Do Not Implement DNS Whitelisting  . . . . . . . . . . . . 23
       8.3.1.  Solving Current End User IPv6 Impairments  . . . . . . 24
       8.3.2.  Gain Experience Using IPv6 Transition Names  . . . . . 24
   9.  Is DNS Whitelisting a Recommended Practice?  . . . . . . . . . 24
   10. Security Considerations  . . . . . . . . . . . . . . . . . . . 25
     10.1. DNSSEC Considerations  . . . . . . . . . . . . . . . . . . 25
     10.2. Authoritative DNS Response Consistency Considerations  . . 26
   11. Privacy Considerations . . . . . . . . . . . . . . . . . . . . 26
   12. IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 27
   13. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 27
   14. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 27
   15. References . . . . . . . . . . . . . . . . . . . . . . . . . . 28
     15.1. Normative References . . . . . . . . . . . . . . . . . . . 28
     15.2. Informative References . . . . . . . . . . . . . . . . . . 29
   Appendix A.  Document Change Log . . . . . . . . . . . . . . . . . 31
   Appendix B.  Open Issues . . . . . . . . . . . . . . . . . . . . . 32



Livingood                Expires August 26, 2011                [Page 3]

Internet-Draft   IPv6 AAAA DNS Whitelisting Implications   February 2011


   Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 32


















































Livingood                Expires August 26, 2011                [Page 4]

Internet-Draft   IPv6 AAAA DNS Whitelisting Implications   February 2011


1.  Introduction

   This document describes the emerging practice of whitelisting of DNS
   AAAA resource records (RRs), which contain IPv6 addresses, hereafter
   referred to as DNS whitelisting.  The document explores the
   implications of this emerging practice are and what alternatives may
   exist.

   The practice of DNS whitelisting appears to have first been used by
   major web content sites (sometimes described herein as "highly-

Really?  Not for email first?


   trafficked domains" or "major domains").  These web site operators,
   or domain operators, observed that when they added AAAA resource
   records to their authoritative DNS servers in order to support IPv6

Oh.  You mean /IPv6/ whitelisting.


   access to their content that a small fraction of end users had slow
   or otherwise impaired access to a given web site with both AAAA and A
   resource records.  The fraction of users with such impaired access
   has been estimated to be roughly 0.078% of total Internet users
   [IETF-77-DNSOP] [NW-Article-DNSOP] [Evaluating IPv6 Adoption] [IPv6
   Brokenness].  Thus, in an example Internet Service Provider (ISP)
   network of 10 million users, approximately 7,800 of those users may
   experience such impaired access.

At a minimum, these sorts of statistics need to be normalized across IPv6 users/traffic, given how small a percentage that is in total users and total traffice. If that's what is meant it should be stated. If it isn't, the statistic should be recalculated.


   As a result of this impairment affecting end users of a given domain,
   a few major domains have either implemented DNS whitelisting or are
   considering doing so [NW-Article-DNS-WL] [IPv6 Whitelist Operations].

How or why does whitelisting affect slow performance for these folk?


   When implemented, DNS whitelisting in practice means that a domain's
   authoritative DNS will return a AAAA resource record to DNS recursive
   resolvers [RFC1035] on the whitelist, while returning no AAAA
   resource records to DNS resolvers which are not on the whitelist.  It

Oh.  The whitelisting is for resolving a conflict between AAAA and A record choices?

Normally, the term 'whitelisting' is used to refer to bypass anti-abuse mechanisms. This appears to be for something else and it seems odd to call it whitelisting.

Note the more typical use of the term:

   <http://www.dnswl.org/>

   <http://en.wikipedia.org/wiki/DNSBL>


<http://publib.boulder.ibm.com/infocenter/domhelp/v8r0/index.jsp?topic=/com.ibm.help.domino.admin.doc/DOC/H_USING_DNS_whitelists_OVER.html>

It appears that some v6 folks have chosen to co-opt a distinctive and very well established anti-abuse term for an entirely different purpose.



   is important to note that these major domains are motivated by a
   desire to maintain a high-quality user experience for all of their
   users.  By engaging in DNS whitelisting, they are attempting to
   shield users with impaired access from the symptoms of those
   impairments.

   Critics of the practice of DNS whitelisting have articulated several
   concerns.  Among these are that:

   o  DNS whitelisting is a very different behavior from the current
      practice concerning the publishing of IPv4 address resource
      records,

   o  that it may create a two-tiered Internet,

   o  that policies concerning whitelisting and de-whitelisting are
      opaque,





Livingood                Expires August 26, 2011                [Page 5]

Internet-Draft   IPv6 AAAA DNS Whitelisting Implications   February 2011


   o  that DNS whitelisting reduces interest in the deployment of IPv6,

Well, it certainly suggests that there is a problem handling v4/v6 in dual stack environments cleanly. And it certainly seems that dealing with the underlying problem would be better.

Beyond that, this appears to be a hack that is useful but not scalable.



   o  that new operational and management burdens are created,

well, yeah...


   o  and that the costs and negative implications of DNS whitelisting
      outweigh the perceived benefits, compared to fixing underlying
      impairments.

   This document explores the reasons and motivations for DNS
   whitelisting.  It also explores the outlined concerns regarding this
   practice.  Readers will hopefully better understand what DNS
   whitelisting is, why some parties are implementing it, and what
   criticisms of the practice exist.



--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
_______________________________________________
Ietf mailing list
Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf


[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]