[dns-operations] Questions on DNS Flag day 2020 proposal

吴洪声 samwu at dnspod.com
Sat Jun 29 03:33:30 UTC 2019


Hi Mark,

Thanks for mention. Our crews are working on it. I will let you know when we fixed.

> 在 2019年6月24日,上午8:21,Mark Andrews <marka at isc.org> 写道:
> 
> Well it would help if wechat.com actually responded to well formed DNS
> queries.  STD 13 says to return FORMERR to requests that you do not
> understand.  It would also help if the servers didn’t return NXDOMAIN
> for the nameservers.  This is basic DNS from 1987 that is going wrong.
> 
> [beetle:bin/tests/system] marka% dig ns1.wechat.com @101.89.19.165
> 
> ; <<>> DiG 9.15.1 <<>> ns1.wechat.com @101.89.19.165
> ;; global options: +cmd
> ;; connection timed out; no servers could be reached
> [beetle:bin/tests/system] marka% dig ns1.wechat.com @101.89.19.165 +nocookie
> 
> ; <<>> DiG 9.15.1 <<>> ns1.wechat.com @101.89.19.165 +nocookie
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21680
> ;; flags: qr aa rd ad; QUERY: 1, ANSWER: 3, AUTHORITY: 4, ADDITIONAL: 1
> ;; WARNING: recursion requested but not available
> 
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 4096
> ;; QUESTION SECTION:
> ;ns1.wechat.com.			IN	A
> 
> ;; ANSWER SECTION:
> ns1.wechat.com.		7200	IN	A	157.255.246.101
> ns1.wechat.com.		7200	IN	A	101.89.19.165
> ns1.wechat.com.		7200	IN	A	183.3.226.207
> 
> ;; AUTHORITY SECTION:
> wechat.com.		7200	IN	NS	ns3.wechat.com.
> wechat.com.		7200	IN	NS	ns4.wechat.com.
> wechat.com.		7200	IN	NS	ns1.wechat.com.
> wechat.com.		7200	IN	NS	ns2.wechat.com.
> 
> ;; Query time: 410 msec
> ;; SERVER: 101.89.19.165#53(101.89.19.165)
> ;; WHEN: Mon Jun 24 10:02:20 AEST 2019
> ;; MSG SIZE  rcvd: 159
> 
> [beetle:bin/tests/system] marka% 
> 
> [beetle:bin/tests/system] marka% dig ns1.wechat.com @101.89.19.165 +nocookie aaaa
> 
> ; <<>> DiG 9.15.1+hotspot+add-prefetch+marka <<>> ns1.wechat.com @101.89.19.165 +nocookie aaaa
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49739
> ;; flags: qr rd ad; QUERY: 1, ANSWER: 0, AUTHORITY: 4, ADDITIONAL: 13
> ;; WARNING: recursion requested but not available
> 
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 4096
> ;; QUESTION SECTION:
> ;ns1.wechat.com.			IN	AAAA
> 
> ;; AUTHORITY SECTION:
> ns1.wechat.com.		86400	IN	NS	ns-cmn1.qq.com.
> ns1.wechat.com.		86400	IN	NS	ns-tel1.qq.com.
> ns1.wechat.com.		86400	IN	NS	ns-cnc1.qq.com.
> ns1.wechat.com.		86400	IN	NS	ns-os1.qq.com.
> 
> ;; ADDITIONAL SECTION:
> ns-cmn1.qq.com.		3600	IN	A	121.51.32.102
> ns-cmn1.qq.com.		3600	IN	A	121.51.129.28
> ns-cmn1.qq.com.		3600	IN	A	182.254.52.55
> ns-tel1.qq.com.		600	IN	A	183.2.186.153
> ns-tel1.qq.com.		600	IN	A	123.151.66.83
> ns-cnc1.qq.com.		600	IN	A	111.161.107.195
> ns-cnc1.qq.com.		600	IN	A	223.167.83.104
> ns-cnc1.qq.com.		600	IN	A	58.251.103.109
> ns-os1.qq.com.		600	IN	A	203.205.177.39
> ns-os1.qq.com.		600	IN	A	184.105.206.121
> ns-os1.qq.com.		600	IN	A	203.205.220.26
> ns-os1.qq.com.		600	IN	A	203.205.144.156
> 
> ;; Query time: 504 msec
> ;; SERVER: 101.89.19.165#53(101.89.19.165)
> ;; WHEN: Mon Jun 24 10:10:20 AEST 2019
> ;; MSG SIZE  rcvd: 325
> 
> [beetle:bin/tests/system] marka% dig ns1.wechat.com @121.51.32.102 +nocookie aaaa
> 
> ; <<>> DiG 9.15.1+hotspot+add-prefetch+marka <<>> ns1.wechat.com @121.51.32.102 +nocookie aaaa
> ;; global options: +cmd
> ;; connection timed out; no servers could be reached
> [beetle:bin/tests/system] marka% dig ns1.wechat.com @121.51.129.28 +nocookie aaaa
> 
> ; <<>> DiG 9.15.1+hotspot+add-prefetch+marka <<>> ns1.wechat.com @121.51.129.28 +nocookie aaaa
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21536
> ;; flags: qr aa rd ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
> ;; WARNING: recursion requested but not available
> 
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 4096
> ;; QUESTION SECTION:
> ;ns1.wechat.com.			IN	AAAA
> 
> ;; AUTHORITY SECTION:
> wechat.com.		300	IN	SOA	ns-tel1.qq.com. webmaster.qq.com. 1357634004 300 600 86400 300
> 
> ;; Query time: 302 msec
> ;; SERVER: 121.51.129.28#53(121.51.129.28)
> ;; WHEN: Mon Jun 24 10:11:06 AEST 2019
> ;; MSG SIZE  rcvd: 100
> 
> [beetle:bin/tests/system] marka% dig ns1.wechat.com @121.51.129.28 +nocookie a
> 
> ; <<>> DiG 9.15.1+hotspot+add-prefetch+marka <<>> ns1.wechat.com @121.51.129.28 +nocookie a
> ;; global options: +cmd
> ;; connection timed out; no servers could be reached
> [beetle:bin/tests/system] marka% dig ns1.wechat.com @121.51.129.28 +nocookie a
> 
> ; <<>> DiG 9.15.1+hotspot+add-prefetch+marka <<>> ns1.wechat.com @121.51.129.28 +nocookie a
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1670
> ;; flags: qr aa rd ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
> ;; WARNING: recursion requested but not available
> 
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 4096
> ;; QUESTION SECTION:
> ;ns1.wechat.com.			IN	A
> 
> ;; AUTHORITY SECTION:
> wechat.com.		300	IN	SOA	ns-tel1.qq.com. webmaster.qq.com. 1357634004 300 600 86400 300
> 
> ;; Query time: 241 msec
> ;; SERVER: 121.51.129.28#53(121.51.129.28)
> ;; WHEN: Mon Jun 24 10:12:52 AEST 2019
> ;; MSG SIZE  rcvd: 100
> 
> [beetle:bin/tests/system] marka% 
> 
> 
>> On 22 Jun 2019, at 2:33 am, 吴洪声 <samwu at dnspod.com> wrote:
>> 
>> Actually, as Chinese operator, we don’t usually using email to discussing topics. Even many of us has not join the DNSop group.
>> 
>> Similarly, in China, we also giving up use BBS to discuss topics.
>> 
>> Instead, we have WeChat group. Almost Chinese operator discuss in the group everyday. WeChat is more effective, we can response & take action immediately. 
>> 
>> If you like to get connection with us, try WeChat.
>> 
>>> 在 2019年6月21日,下午5:00,Petr Špaček <petr.spacek at nic.cz> 写道:
>>> 
>>> Hello,
>>> 
>>> On 17. 06. 19 8:54, Sam wrote:
>>>> Do you guys asked for any feedbacks from Chinese operators before you
>>>> pushing the proposal?
>>> 
>>> For the record, we tried to invite everyone, not only Chinese operators:
>>> 
>>> a) Discussion about past and future flag days was held in public at DNS
>>> OARC 30 conference, held in Bangkok. Live video streaming and Jabber
>>> room for asking questions was available to anyone on the Internet.
>>> 
>>> b) This mailing list got invitation for the discussion, see archives:
>>> https://lists.dns-oarc.net/pipermail/dns-operations/2019-May/018721.html
>>> Feedback was basically zero.
>>> 
>>> c) I've personally invited major "broken" operators to talks about the
>>> next flag days, and they promised in e-mail to participate in IETF dnsop
>>> WG and DNS OARC conference ... and then they did not show up without a
>>> single word of notice.
>>> 
>>> Personally I feel we have done as much as we could to attract attention
>>> and do not know what else to do. If you have specific constructive
>>> suggestions let's hear them.
>>> 
>>> Petr Špaček  @  CZ.NIC
>>> 
>>> 
>>>> 
>>>> I will be the first one to oppose this proposal, even though DNSPod
>>>> already supported TCP protocol. Any proposals without fully and widely
>>>> community discussion is a rogue proposal!
>>>> 
>>>> And, do you guys know about how many users and facility will be affected
>>>> in China?
>>>> 
>>>> NO, you don't.
>>>> 
>>>> 2019年6月17日 下午2:12,Davey Song <songlinjian at gmail.com>写道:
>>>> 
>>>>   Hi folks,
>>>> 
>>>>   I'm writing to brief you the feedback I got on the proposal of DNS
>>>>   Flag Day 2020. Firstly I had to say I'm the guy who most want to
>>>>   resolve the IP fragmentation issue.  But I still would like to ask
>>>>   technical questions on the proposal and discuss the justification on
>>>>   it. I'm curious on the technical part, but the latter is the most
>>>>   complains I heard.
>>>> 
>>>>   1) How to enhance and implement the idea of making DNS over TCP
>>>>   support mandatory. In 2019 flag day, I know the approach is to
>>>>   narrow the living space of authoritative servers to get a good
>>>>   performance from a updated resolver if they do not support EDNS. But
>>>>   as to TCP,  how to enhance it? We know that UDP queries from
>>>>   stub-resolver only trigger resolver sending UDP queries to
>>>>   authoritative server. What would happen if the authoritative server
>>>>   does not support TCP after a flag day in 2020? Does resolver monitor
>>>>   the TCP-readiness of authoritative server in advance and penalized
>>>>   it afterwards, or it changes the received UDP queries randomly (10%)
>>>>   to TCP queries against targeted authoritative server? Too
>>>>   complicated! Can we provide positive incentive other than penalty
>>>>   for this case ?
>>>> 
>>>>   2) No matter how to implement it, it definitely exerts a huge
>>>>   pressure on authoritative DNS operators (huge of them) due to the
>>>>   performance of DNS over TCP. Did the guys who proposed this ever ask
>>>>   the opinion from the circle of authoritative DNS operators? Is there
>>>>   any vote or rough consensus from majority of them? And where? ICANN
>>>>   GNSO TechOps? I heard this complain because some of DNS operators
>>>>   feel strongly that they have been bullied even not being asked.
>>>> 
>>>>   As a technical guy, I fully understand and support the enhancement
>>>>   on interoperability of DNS protocol. But I'm doubt about this
>>>>   approach. I suggest do it by advocate the significance of the
>>>>   initiative, and leave enough time for the transition not by a change
>>>>   in a flag day.  IPv6 transition may be not a good example, but it is
>>>>   mad to think about asking a website to turn of IPv4 in a flag day.
>>>> 
>>>>   I also suggest we should continue this discussion and invite more
>>>>   people to join in case of giving people a bad impression as a
>>>>   "tyranny by the few".
>>>> 
>>>>   Comment please.
>>>> 
>>>>   Best regards,
>>>>   Davey
>>>> 
>>>>   Some reference links of DNS flag day 2020;
>>>>   https://www.zdnet.com/article/dns-flag-day-2020-dns-servers-must-support-both-udp-and-tcp-queries/ 
>>>>   https://dnsflagday.net/   
>>>> 
>>>> 
>>>> 
>>>> _______________________________________________
>>>> dns-operations mailing list
>>>> dns-operations at lists.dns-oarc.net
>>>> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
>>>> dns-operations mailing list
>>>> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
>>> 
>>> _______________________________________________
>>> dns-operations mailing list
>>> dns-operations at lists.dns-oarc.net
>>> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
>>> dns-operations mailing list
>>> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
>> 
>> _______________________________________________
>> dns-operations mailing list
>> dns-operations at lists.dns-oarc.net
>> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
>> dns-operations mailing list
>> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> 
> -- 
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742              INTERNET: marka at isc.org
> 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3916 bytes
Desc: not available
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20190629/c429cb9a/attachment.bin>


More information about the dns-operations mailing list