[dns-operations] Questions on DNS Flag day 2020 proposal

Mark Andrews marka at isc.org
Mon Jun 24 00:21:01 UTC 2019


Well it would help if wechat.com actually responded to well formed DNS
queries.  STD 13 says to return FORMERR to requests that you do not
understand.  It would also help if the servers didn’t return NXDOMAIN
for the nameservers.  This is basic DNS from 1987 that is going wrong.

[beetle:bin/tests/system] marka% dig ns1.wechat.com @101.89.19.165

; <<>> DiG 9.15.1 <<>> ns1.wechat.com @101.89.19.165
;; global options: +cmd
;; connection timed out; no servers could be reached
[beetle:bin/tests/system] marka% dig ns1.wechat.com @101.89.19.165 +nocookie

; <<>> DiG 9.15.1 <<>> ns1.wechat.com @101.89.19.165 +nocookie
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21680
;; flags: qr aa rd ad; QUERY: 1, ANSWER: 3, AUTHORITY: 4, ADDITIONAL: 1
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;ns1.wechat.com.			IN	A

;; ANSWER SECTION:
ns1.wechat.com.		7200	IN	A	157.255.246.101
ns1.wechat.com.		7200	IN	A	101.89.19.165
ns1.wechat.com.		7200	IN	A	183.3.226.207

;; AUTHORITY SECTION:
wechat.com.		7200	IN	NS	ns3.wechat.com.
wechat.com.		7200	IN	NS	ns4.wechat.com.
wechat.com.		7200	IN	NS	ns1.wechat.com.
wechat.com.		7200	IN	NS	ns2.wechat.com.

;; Query time: 410 msec
;; SERVER: 101.89.19.165#53(101.89.19.165)
;; WHEN: Mon Jun 24 10:02:20 AEST 2019
;; MSG SIZE  rcvd: 159

[beetle:bin/tests/system] marka% 

[beetle:bin/tests/system] marka% dig ns1.wechat.com @101.89.19.165 +nocookie aaaa

; <<>> DiG 9.15.1+hotspot+add-prefetch+marka <<>> ns1.wechat.com @101.89.19.165 +nocookie aaaa
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49739
;; flags: qr rd ad; QUERY: 1, ANSWER: 0, AUTHORITY: 4, ADDITIONAL: 13
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;ns1.wechat.com.			IN	AAAA

;; AUTHORITY SECTION:
ns1.wechat.com.		86400	IN	NS	ns-cmn1.qq.com.
ns1.wechat.com.		86400	IN	NS	ns-tel1.qq.com.
ns1.wechat.com.		86400	IN	NS	ns-cnc1.qq.com.
ns1.wechat.com.		86400	IN	NS	ns-os1.qq.com.

;; ADDITIONAL SECTION:
ns-cmn1.qq.com.		3600	IN	A	121.51.32.102
ns-cmn1.qq.com.		3600	IN	A	121.51.129.28
ns-cmn1.qq.com.		3600	IN	A	182.254.52.55
ns-tel1.qq.com.		600	IN	A	183.2.186.153
ns-tel1.qq.com.		600	IN	A	123.151.66.83
ns-cnc1.qq.com.		600	IN	A	111.161.107.195
ns-cnc1.qq.com.		600	IN	A	223.167.83.104
ns-cnc1.qq.com.		600	IN	A	58.251.103.109
ns-os1.qq.com.		600	IN	A	203.205.177.39
ns-os1.qq.com.		600	IN	A	184.105.206.121
ns-os1.qq.com.		600	IN	A	203.205.220.26
ns-os1.qq.com.		600	IN	A	203.205.144.156

;; Query time: 504 msec
;; SERVER: 101.89.19.165#53(101.89.19.165)
;; WHEN: Mon Jun 24 10:10:20 AEST 2019
;; MSG SIZE  rcvd: 325

[beetle:bin/tests/system] marka% dig ns1.wechat.com @121.51.32.102 +nocookie aaaa

; <<>> DiG 9.15.1+hotspot+add-prefetch+marka <<>> ns1.wechat.com @121.51.32.102 +nocookie aaaa
;; global options: +cmd
;; connection timed out; no servers could be reached
[beetle:bin/tests/system] marka% dig ns1.wechat.com @121.51.129.28 +nocookie aaaa

; <<>> DiG 9.15.1+hotspot+add-prefetch+marka <<>> ns1.wechat.com @121.51.129.28 +nocookie aaaa
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21536
;; flags: qr aa rd ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;ns1.wechat.com.			IN	AAAA

;; AUTHORITY SECTION:
wechat.com.		300	IN	SOA	ns-tel1.qq.com. webmaster.qq.com. 1357634004 300 600 86400 300

;; Query time: 302 msec
;; SERVER: 121.51.129.28#53(121.51.129.28)
;; WHEN: Mon Jun 24 10:11:06 AEST 2019
;; MSG SIZE  rcvd: 100

[beetle:bin/tests/system] marka% dig ns1.wechat.com @121.51.129.28 +nocookie a

; <<>> DiG 9.15.1+hotspot+add-prefetch+marka <<>> ns1.wechat.com @121.51.129.28 +nocookie a
;; global options: +cmd
;; connection timed out; no servers could be reached
[beetle:bin/tests/system] marka% dig ns1.wechat.com @121.51.129.28 +nocookie a

; <<>> DiG 9.15.1+hotspot+add-prefetch+marka <<>> ns1.wechat.com @121.51.129.28 +nocookie a
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1670
;; flags: qr aa rd ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;ns1.wechat.com.			IN	A

;; AUTHORITY SECTION:
wechat.com.		300	IN	SOA	ns-tel1.qq.com. webmaster.qq.com. 1357634004 300 600 86400 300

;; Query time: 241 msec
;; SERVER: 121.51.129.28#53(121.51.129.28)
;; WHEN: Mon Jun 24 10:12:52 AEST 2019
;; MSG SIZE  rcvd: 100

[beetle:bin/tests/system] marka% 


> On 22 Jun 2019, at 2:33 am, 吴洪声 <samwu at dnspod.com> wrote:
> 
> Actually, as Chinese operator, we don’t usually using email to discussing topics. Even many of us has not join the DNSop group.
> 
> Similarly, in China, we also giving up use BBS to discuss topics.
> 
> Instead, we have WeChat group. Almost Chinese operator discuss in the group everyday. WeChat is more effective, we can response & take action immediately. 
> 
> If you like to get connection with us, try WeChat.
> 
>> 在 2019年6月21日,下午5:00,Petr Špaček <petr.spacek at nic.cz> 写道:
>> 
>> Hello,
>> 
>> On 17. 06. 19 8:54, Sam wrote:
>>> Do you guys asked for any feedbacks from Chinese operators before you
>>> pushing the proposal?
>> 
>> For the record, we tried to invite everyone, not only Chinese operators:
>> 
>> a) Discussion about past and future flag days was held in public at DNS
>> OARC 30 conference, held in Bangkok. Live video streaming and Jabber
>> room for asking questions was available to anyone on the Internet.
>> 
>> b) This mailing list got invitation for the discussion, see archives:
>> https://lists.dns-oarc.net/pipermail/dns-operations/2019-May/018721.html
>> Feedback was basically zero.
>> 
>> c) I've personally invited major "broken" operators to talks about the
>> next flag days, and they promised in e-mail to participate in IETF dnsop
>> WG and DNS OARC conference ... and then they did not show up without a
>> single word of notice.
>> 
>> Personally I feel we have done as much as we could to attract attention
>> and do not know what else to do. If you have specific constructive
>> suggestions let's hear them.
>> 
>> Petr Špaček  @  CZ.NIC
>> 
>> 
>>> 
>>> I will be the first one to oppose this proposal, even though DNSPod
>>> already supported TCP protocol. Any proposals without fully and widely
>>> community discussion is a rogue proposal!
>>> 
>>> And, do you guys know about how many users and facility will be affected
>>> in China?
>>> 
>>> NO, you don't.
>>> 
>>> 2019年6月17日 下午2:12,Davey Song <songlinjian at gmail.com>写道:
>>> 
>>>    Hi folks,
>>> 
>>>    I'm writing to brief you the feedback I got on the proposal of DNS
>>>    Flag Day 2020. Firstly I had to say I'm the guy who most want to
>>>    resolve the IP fragmentation issue.  But I still would like to ask
>>>    technical questions on the proposal and discuss the justification on
>>>    it. I'm curious on the technical part, but the latter is the most
>>>    complains I heard.
>>> 
>>>    1) How to enhance and implement the idea of making DNS over TCP
>>>    support mandatory. In 2019 flag day, I know the approach is to
>>>    narrow the living space of authoritative servers to get a good
>>>    performance from a updated resolver if they do not support EDNS. But
>>>    as to TCP,  how to enhance it? We know that UDP queries from
>>>    stub-resolver only trigger resolver sending UDP queries to
>>>    authoritative server. What would happen if the authoritative server
>>>    does not support TCP after a flag day in 2020? Does resolver monitor
>>>    the TCP-readiness of authoritative server in advance and penalized
>>>    it afterwards, or it changes the received UDP queries randomly (10%)
>>>    to TCP queries against targeted authoritative server? Too
>>>    complicated! Can we provide positive incentive other than penalty
>>>    for this case ?
>>> 
>>>    2) No matter how to implement it, it definitely exerts a huge
>>>    pressure on authoritative DNS operators (huge of them) due to the
>>>    performance of DNS over TCP. Did the guys who proposed this ever ask
>>>    the opinion from the circle of authoritative DNS operators? Is there
>>>    any vote or rough consensus from majority of them? And where? ICANN
>>>    GNSO TechOps? I heard this complain because some of DNS operators
>>>    feel strongly that they have been bullied even not being asked.
>>> 
>>>    As a technical guy, I fully understand and support the enhancement
>>>    on interoperability of DNS protocol. But I'm doubt about this
>>>    approach. I suggest do it by advocate the significance of the
>>>    initiative, and leave enough time for the transition not by a change
>>>    in a flag day.  IPv6 transition may be not a good example, but it is
>>>    mad to think about asking a website to turn of IPv4 in a flag day.
>>>     
>>>    I also suggest we should continue this discussion and invite more
>>>    people to join in case of giving people a bad impression as a
>>>    "tyranny by the few".
>>> 
>>>    Comment please.
>>> 
>>>    Best regards,
>>>    Davey
>>> 
>>>    Some reference links of DNS flag day 2020;
>>>    https://www.zdnet.com/article/dns-flag-day-2020-dns-servers-must-support-both-udp-and-tcp-queries/ 
>>>    https://dnsflagday.net/   
>>> 
>>> 
>>> 
>>> _______________________________________________
>>> dns-operations mailing list
>>> dns-operations at lists.dns-oarc.net
>>> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
>>> dns-operations mailing list
>>> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
>> 
>> _______________________________________________
>> dns-operations mailing list
>> dns-operations at lists.dns-oarc.net
>> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
>> dns-operations mailing list
>> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> 
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-operations mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: marka at isc.org





More information about the dns-operations mailing list