⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-dnsext-aaaa-a6-01.txt

📁 bind-3.2.
💻 TXT
📖 第 1 页 / 共 2 页
字号:
>From the packet format point of view, the approach has no benefitagainst AAAA.  Rather, there is a one-byte overhead to every(unfragmented) A6 record compared to a AAAA record.If the nameserver/resolver programs hardcode A6 processing to handle nofragments, there will be no future possibility for us to introducefragmented A6 records.  When there is no need for A6 reassembly, therewill be no code deployment, and even if the reassembly code getsdeployed they will not be tested enough.  The author believes that the``prepare for the future, use non-fragmented A6'' argument is notworthwhile.In the event of renumbering, non-fragmented A6 record has the sameproperty as AAAA (the whole zone file has to be updated).3.4.  AAAA synthesis (A6 and AAAA hybrid approach)At this moment, end hosts support AAAA records only.  Some people wouldlike to see A6 deployment in DNS databases even with the lack of endhosts support.  To workaround the deployment issues of A6, the followingapproach is proposed in IETF50 dnsext working group slot.  It is called``AAAA synthesis'' [Austein, 2001] :HAGINO                  Expires: January 19, 2002               [Page 7]DRAFT                   Comparison of AAAA and A6              July 2001o Deploy A6 DNS records worldwide.  The proposal was not specific about  whether we would deploy fragmented A6 records, or non-fragmented A6  records (``A6 0'').o When a host queries AAAA record to a DNS server, the DNS server  queries A6 fragments, reassemble it, and respond with a AAAA record.The approach needs to be diagnosed/specified in far more detail.  Forexample, the following questions need to be answered:o What is the DNS error code against AAAA querier, if the A6 reassembly  fails?o What TTL should the synthesized AAAA record have?  [BIND 9.2.0snap  uses TTL=0]o Which nameserver should synthesize the AAAA record, in the DNS  recursize query chain?  Is the synthesis mandatory for every DNS  server implementation?o What should we do if the A6 reassembly takes too much time?o What should we do about DNSSEC signatures?o What if the resolver wants no synthesis?  Do we want to have a flag  bit in DNS packet, to enable/disable AAAA synthesis?o Relationships between A6 TTL, AAAA TTL, A6 query timeouts, AAAA query  timeouts, and other timeout parameters?The approach seems to be vulnerable against DoS attacks, because thenameserver reassembles A6 fragments on behalf of the AAAA querier.  Seesecurity consideration section for more details.3.5.  Issues in keeping both AAAA and A6If we are to keep both AAAA and A6 records onto the worldwide DNSdatabase, it would impose more query delays to the client resolvers.Suppose we have a dual-stack host implementation.  If they need toresolve a name into addresses, the node would need to query in thefollowing order (in the order which RFC2874 suggests):o Query A6 records, and get full IPv6 addresses by chasing and  reassembling A6 fragment chain.o Query AAAA records.o Query A records.o Sort the result based on destination address ordering rule.  An  example of the ordering rule is presented as a draft [Draves, 2001] .HAGINO                  Expires: January 19, 2002               [Page 8]DRAFT                   Comparison of AAAA and A6              July 2001o Contact the destination addresses in sequence.The ordering imposes additional delays to the resolvers.  The aboveordering would be necessary for all approaches that use A6, as there areexisting AAAA records in the world.4.  Network renumberingSome says that there will be more frequent renumbers in IPv6 networkoperation, and A6 is necessary to reduce the zone modification cost aswell as zone signing costs on renumber operation.It is not clear if we really want to renumber that frequently.  WithIPv6, it should be easier for ISPs to assign addresses statically to thedownstream customers, rather than dynamically like we do in IPv4 dialupconnectivity today.  If ISPs do assign static IPv6 address block to thecustomers, there is no need to renumber customer network that frequently(unless the customer decides to switch the upstream ISPs that often).NOTE: Roaming dialup users, like those who carry laptop computersworldwide, seems to have a different issue from stationary dialup users.See [Hagino, 2000] for more discussions.It is questionable if it is possible to renumber IPv6 networks morefrequently than with IPv4.  Router renumbering protocol [Crawford, 2000], IPv6 host autoconfiguration and IPv6 address lifetime [Thomson, 1998]can help us renumber the IPv6 network, however, network renumberingitself is not an easy task.  If you would like to maintain reachabilityfrom the outside world, a site administrator needs to carefullycoordinate site renumber.  The minimal interval between renumber isrestricted by DNS record timeouts, as DNS records will be cached aroundthe world.  If the TTL of DNS records are X, the interval betweenrenumber must be longer than 2 * X.  If we consider clients/servers thattries to validate addresses using reverse lookups, we also need to careabout the relationship between IPv6 address lifetime [Thomson, 1998] andthe interval between renumber.  At IETF50 ipngwg session, there was apresentation by JINMEI Tatsuya regarding to site renumbering experiment.It is recommend to read through the IETF49 minutes and slides.  [XXXFred Baker had a draft on this - where?]  For the network renumbering tobe successful, no configuration files should have hardcoded (numeric) IPaddresses.  It is a very hard requirement to meet.  We fail to satisfythis in many of the network renumbering events, and the failure causes alot of troubles.At this moment there is no mechanism defined for ISPs to renumberdownstream customers at will.  Even though it may sound interesting forISPs, it would cause a lot of (social and political) issues in doing so,so the author would say it is rather unrealistic to pursue this route.The only possible candidate, router renumbering protocol [Crawford,2000] does not really fit into the situation.  The protocol is definedusing IPsec authentication over site-local multicast packets.  It wouldbe cumbersome to run router renumbering protocol across multipleHAGINO                  Expires: January 19, 2002               [Page 9]DRAFT                   Comparison of AAAA and A6              July 2001administrative domains, as (1) customers will not want to share IPsecauthentication key for routers with the upstream ISP, and (2) customernetwork will be administered as a separate site from the upstream ISP(Even though router renumbering protocol could be used with unicastaddresess, it is not realistic to assume that we can maintain the listof IPv6 addresses for all the routers in both customers' and ISPs'networks).A6 was designed to help administators update zone files during networkrenumbering events.  Even with AAAA, zone file modification itself iseasy; you can just query-replace the addresses in the zone files.  Thedifficulty of network renumber comes from elsewhere.With AAAA, we need to sign the whole zone again with DNSSEC keys, afterrenumbering the network.  With A6, we need to sign upper bits only withDNSSEC keys.  Therefore, A6 will impose less zone signing cost on theevent of network renumbering.  As seen above, it is questionable if werenumber network that often, so it is questionable if A6 brings us anoverall benefit.  Note, however, even if we use A6 to facilitate morefrequent renumbering and lower signing cost, all glue records has to beinstalled as non-fragmented A6 records (``A6 0''), and required to besigned again on renumbering events.5.  Security considerationThere are a couple of security worries mentioned in the above.  To givea brief summary:o There will be a higher delay imposed by query/reply roundtrips for  fragmented A6 records.  This could affect every services that relies  upon DNS records.o There is no upper limit defined for the number of A6 fragments for  defining an IPv6 address.  Malicious parties may try to put a very  complex A6 chains and confuse nameservers worldwide.o A6 resolver/nameserver is much harder to implement correctly than AAAA  resolver/nameserver.  A6 fragment reassembly code needs to take care  of bitwise data reassembly, bitwise overwrap checks, and others.  From  our implementatation experiences, we expect to see a lot of security-  issue bugs in the future.o Interaction between DNS record TTL and the DNS query delays leads to  non-trivial timeout problem.We would like to go into more details for some of these.5.1.  DoS attacks against AAAA synthesisWhen a DNS server is configured for AAAA synthesis, malicious partiescan impose DoS attacks using the interaction between DNS TTL and queryHAGINO                  Expires: January 19, 2002              [Page 10]DRAFT                   Comparison of AAAA and A6              July 2001delays.  The attack can chew CPU time and/or memory, as well as somenetwork bandwidth on a victim nameserver, by the following steps:o A bad guy configures a record with very complex A6 chain, onto some  nameservers.  (the bad guy has to have controls over the servers).  The nameservers can be located anywhere in the world.  The A6 chain  should have a very low TTL (like 1 or 0 seconds).  The attack works  better if we have higher delays between the victim nameservers and the  nameservers that serve A6 fragments.o The bad guy queries the record using AAAA request, to the victim  nameserver.o The victim nameserver will try to reassemble A6 fragments.  During the  reassembly process, the victim nameserver puts A6 fragments into the  local cache.  The cached records will expire during the reassembly  process.  The nameserver will need to query a lot of A6 fragments  (more traffic).  The server can go into an infinite loop, if it tries  to query the expired A6 fragments again.Note, however, this problem could be considered as a problem inrecursize resolvers in general (like CNAME and NS chasing); A6 and AAAAsynthesis makes the problem more apparent, and more complex to diagnose.To remedy this problem, we have a couple of solutions:(1) Deprecate A6 and deploy AAAA worldwide.  If we do not have A6, the    problem goes away.(2) Even if we use A6, do not configure nameservers for AAAA synthesis.    Deployment issues with existing IPv6 hosts get much harder.(3) Impose a protocol limitation to the number of A6 fragments.(4) Do not query the expired records in A6 chain again.  In other words,    implement resolvers that ignore TTL on DNS records.  Not sure if it    is the right thing to do.6.  ConclusionNOTE: the section expresses the impressions of the author.A6/AAAA discussion has been an obstacle for IPv6 deployment, as thedeployment of IPv6 NS recodrs have been deferred because of thediscussion.  The author do not see benefit in keeping both AAAA and A6records, as it imposes more query delays to the clients.  So the authorbelieves that we need to pick one of them.Given the unlikeliness of frequent network renumbering, the authorbelieves that the A6's benefit in lower zone signing cost is notsignificant.  The benefit of A6 (in zone signing cost) is much less thanHAGINO                  Expires: January 19, 2002              [Page 11]DRAFT                   Comparison of AAAA and A6              July 2001the expected complication that will be imposed by A6 operations.>From the above discussions, the author suggests to keep AAAA anddeprecate A6 (move A6 document to historic state).  The author believesthat A6 can cause a lot of problem than the benefits it may have.  A6will make IPv6 DNS operation more complicated and vulnerable to attacks.AAAA is proven to work right in our IPv6 network operation since 1996.AAAA has been working just fine in existing IPv6 networks, and theauthor believes that it will in the coming days.ReferencesThomson, 1995.S. Thomson and C. Huitema, "DNS Extensions to support IP version 6" inRFC1886 (December 1995). ftp://ftp.isi.edu/in-notes/rfc1886.txt.Crawford, 2000.M. Crawford, C. Huitema, and S. Thomson, "DNS Extensions to Support IPv6Address Aggregation and Renumbering" in RFC2874 (July 2000).ftp://ftp.isi.edu/in-notes/rfc2874.txt.Austein, 2001.R. Austein, "Tradeoffs in DNS support for IPv6" in draft-ietf-dnsext-ipv6-dns-tradeoffs-00.txt (July 2001). work in progress material.Draves, 2001.Richard Draves, "Default Address Selection for IPv6" in draft-ietf-ipngwg-default-addr-select-04.txt (May 2001). work in progress material.Hagino, 2000.Jun-ichiro Hagino and Kazu Yamamoto, "Requirements for IPv6 dialup PPPoperation" in draft-itojun-ipv6-dialup-requirement-00.txt (July 2000).work in progress material.Crawford, 2000.Matt Crawford, "Router Renumbering for IPv6" in RFC2894 (August 2000).ftp://ftp.isi.edu/in-notes/rfc2894.txt.Thomson, 1998.S. Thomson and T. Narten, "IPv6 Stateless Address Autoconfiguration" inRFC2462 (December 1998). ftp://ftp.isi.edu/in-notes/rfc2462.txt.Change historynone.HAGINO                  Expires: January 19, 2002              [Page 12]DRAFT                   Comparison of AAAA and A6              July 2001AcknowledgementsThe draft was written based on discussions in IETF IPv6 and dnsextworking groups, and help from WIDE research group.Author's address     Jun-ichiro itojun HAGINO     Research Laboratory, Internet Initiative Japan Inc.     Takebashi Yasuda Bldg.,     3-13 Kanda Nishiki-cho,     Chiyoda-ku,Tokyo 101-0054, JAPAN     Tel: +81-3-5259-6350     Fax: +81-3-5259-6351     Email: itojun@iijlab.netHAGINO                  Expires: January 19, 2002              [Page 13]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -