Internet DRAFT - draft-jiang-a6-to-historic
draft-jiang-a6-to-historic
Network Working Group S. Jiang
Internet Draft Huawei Technologies Co., Ltd
Intended status: Informational D. Conrad
Expires: May 29, 2012 Cloudflare, Inc.
B. Carpenter
Univ. of Auckland
November 26, 2011
Moving A6 to Historic Status
draft-jiang-a6-to-historic-00.txt
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute working
documents as Internet-Drafts. The list of current Internet-Drafts is
at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 29, 2012.
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Jiang & et al. Expires May 29, 2012 [Page 1]
Internet-Draft draft-jiang-a6-to-historic November 2011
Abstract
This document provides a summary of issues and discusses the current
usage status of A6 DNS records and moves the A6 specifications to
Historic status, providing clarity to implementers and operators.
Table of Contents
1. Introduction & Background .................................... 3
2. A6 Issues .................................................... 3
2.1. Resolution Latency ...................................... 4
2.2. Resolution failure ...................................... 4
2.3. Cross administration domains ............................ 4
2.4. Difficult Maintenance ................................... 5
2.5. Existence of Multiple RR Types for one Purpose is Harmful 5
2.6. Higher Security Risks ................................... 5
3. Status of A6 current usage ................................... 5
3.1. Reasons for Current A6 Usage ............................ 6
4. Moving A6 to Historic Status ................................. 6
4.1. Impact on Current A6 Usage .............................. 6
4.2. Transition phase for current A6 ......................... 6
5. Security Considerations ...................................... 7
6. IANA Considerations .......................................... 7
7. Acknowledgments .............................................. 7
8. References ................................................... 7
8.1. Normative References .................................... 7
8.2. Informative References .................................. 7
Author's Addresses .............................................. 8
Jiang & et al. Expires May 29, 2012 [Page 2]
Internet-Draft draft-jiang-a6-to-historic November 2011
1. Introduction & Background
The IETF began the process of standardizing two different DNS
protocol enhancements for IPv6 addresses in DNS (Domain Name System)
records: AAAA [RFC3596] in 1995 [RFC1886] and A6 [RFC2874] in 2000.
Both protocol enhancements reached Proposed Standard status.
The existence of multiple ways of representing IPv6 address in the
DNS has led to confusion and conflicts about which of these protocol
enhancements should be implemented and/or deployed. Having more than
one choice of how IPv6 addresses are to be represented within the DNS
can be argued to have led to delays in the deployment of IPv6. In
2002, "Representing IPv6 Addresses in the DNS" [RFC3363] moved A6 to
Experimental status, with an aim to clear up any confusion in this
area. [RFC3363] and [RFC3364] compared AAAA and A6, and examined many
of the issues in the A6 standard, these issues being summarized in
this document.
However, after ten years, the Experimental status of A6 has resulted
in continued confusion and parallel deployment of both A6 and AAAA,
albeit AAAA predominates by a large degree. Even in recent IPv6
transition tests and deployments, some providers informally mentioned
A6 support as a possible future choice.
This document provides a brief summary of the issues related to the
use of A6 recprds and discusses the current usage status of A6. Given
the implications of A6 on the DNS architecture and the state of A6
deployment, this document moves the A6 specifications to Historic
status, thereby clarifying that implementers and operators should
represent IPv6 addresses in the DNS only by using AAAA records.
1.1 Standards Action Taken
This document requests the IESG to change the status of RFC 2874 from
Experimental to Historic.
2. A6 Issues
This section summarizes the known issues associated with the use of
A6 resource records, including the analyses explored in [RFC3363].
The reader is encouraged to review that document to fully understand
the issues relating to A6.
Jiang & et al. Expires May 29, 2012 [Page 3]
Internet-Draft draft-jiang-a6-to-historic November 2011
2.1. Resolution Latency
Resolving an A6 Record chain can involve resolving a series of sub-
queries that are likely to be independent of each other. Each of
these sub-queries takes a non-negligible amount of time unless the
answer already happens to be in the resolver's cache. The worst-case
time resolving a N-link chain A6 record would be the sum of the
latency resulting from each of the N resolutions. As a result, long
A6 chains would be likely to increase user frustration due to
excessive waiting times for domain names to resolve.
In practice, it is very hard to derive a reasonable timeout handling
strategy for the reassembly of all the results from A6 sub-queries.
It is proved difficult to decide multiple timeout parameters,
including (1) the communication timeout for a single A6 fragment, (2)
the communication timeout for the IPv6 address itself (total time
needed for reassembly) and (3) the TTL timeout for A6 fragment
records.
2.2. Resolution Failure
The probability of A6 resolution failure during the process of
resolving an N-link A6 chain is sum of the probabilities of failure
of each sub-query, since each of the queries involved in resolving an
A6 chain has a non-zero probability of failure and an A6 resolution
cannot complete until all sub-queries have succeeded.
Furthermore, the failure may happen at any link among 1~N of a N-Link
A6 chain. Therefore, it would take an indeterminate time to return a
failure result.
2.3. Cross Administrative Domains
One of the primary motivations for the A6 RR was to facilitate
renumbering and multihoming, where the prefix name field in the A6 RR
points to a target that is not only outside the DNS zone containing
the A6 RR, but is administered by a different organization entirely.
While pointers out of zone are not a problem per se, experience both
with glue RRs and with PTR RRs in the IN-ADDR.ARPA tree suggests that
pointers to other organizations are often not maintained properly,
perhaps because they're less amenable to automation than pointers
within a single organization would be.
Jiang & et al. Expires May 29, 2012 [Page 4]
Internet-Draft draft-jiang-a6-to-historic November 2011
2.4. Difficult Maintenance
In A6, changes to components of an RR are not isolated from the use
of the composite IPv6 address. Any change to a non-128-bit component
of an A6 RR may cause change to a large number of IPv6 addresses. The
dependence relationship actually makes the maintenance of addresses
much more complicated and difficult. Without understanding these
complicated relationships, any arbitrary change for a non-128-bit A6
RR component may result in undesired consequences.
Multiple correlative sub-components of A6 records may have different
TTLs, which can make cache maintenance very complicated.
2.5. Existence of Multiple RR Types for one Purpose is Harmful
If both AAAA and A6 records were widely deployed in the global DNS,
it would impose more query delays to the client resolvers. DNS
clients have insufficient knowledge to choose between AAAA and A6
queries, requiring local policy to determine which record type to
query. If local policy dictates parallel queries for both AAAA and A6
and if those queries returned different results for any reason, the
clients would have no knowledge about which address to choose.
2.6. Higher Security Risks
The dependency relationships inherent in A6 chains increase security
risks. An attacker may successfully attack a single sub-component of
an A6 record, which would then influence many query results, and
possibly every host on a large site. There is also the danger of
unintentionally or maliciously creating a resolution loop - an A6
chain may create an infinite loop because an out of zone pointer may
point back to another component farther down the A6 chain.
3. Current Usage of A6
Full support for IPv6 in the global DNS can be argued to have started
when the first IPv6 records were associated with root servers in
early 2008.
One of the major DNS server software packages, BIND9 [BIND], supports
both A6 and AAAA and is unique among the major DNS resolvers in that
certain versions of the BIND9 resolver will attempt to query for A6
records and follow A6 chains.
According to published statistics for two root DNS servers (the "K"
root server [KROOT] and the "L" root server [LROOT]), there are
between 9,000 and 14,000 DNS queries per second on the "K" root
Jiang & et al. Expires May 29, 2012 [Page 5]
Internet-Draft draft-jiang-a6-to-historic November 2011
server and 13,000 to 19,000 queries per second on the "L" root
server. The distributions of those queries by RR type are similar:
roughly 60% A queries, 20~25% AAAA queries, and less than 1% A6
queries.
3.1. Reasons for Current A6 Usage
That there is A6 query traffic does not mean that A6 is actually in
use; it is likely the result of some recursive servers that issue
internally-generated A6 queries when looking up missing name server
addresses in addition to issuing A and AAAA queries.
BIND versions 9.0 through 9.2 could be configured to make A6 queries
and it is possible that some active name servers running those
versions have not yet been upgraded.
In the late 1990s, A6 was considered to be the future in preference
to AAAA [RFC2874]. As a result, A6 queries were tried by default in
BINDv9 versions. When it was pointed out that A6 had some fundamental
issues (discussed in [A6DISC] with the deprecation codified in RFC
3363), A6 was abandoned in favor of AAAA and BINDv9 no longer tried
A6 records by default. A6 was removed from the query order in the
BIND distribution in 2004 or 2005.
Some Linux/glibc versions may have had A6 query implementations in
gethostbyname() 8-10 years ago. These operating systems/libraries may
not have been replaced or upgraded everywhere yet.
4. Moving A6 to Historic Status
This document moves the A6 specification to Historic status. This
move provides a clear signal to implementers and/or operators that A6
should NOT be implemented or deployed.
4.1. Impact on Current A6 Usage
If A6 were in use and it were to be treated as an 'unknown record'
(RFC3597) as discussed below, it might lead to some interoperability
issues since resolvers that support A6 are required to do additional
section processing for these records on the wire. However, as there
are no known production uses of A6, this impact is considered
negligible.
4.2. Transition phase for current A6
Since there is no known A6-only client in production use, the
transition phase may not be strictly necessary. However, clients that
Jiang & et al. Expires May 29, 2012 [Page 6]
Internet-Draft draft-jiang-a6-to-historic November 2011
attempt to resolve A6 before AAAA will suffer a performance penalty.
Therefore, we recommend:
* Removing A6 handling from all new or updated host stacks;
* Recommend removing all existing A6 records; and
* All resolver and server implementations return the same response as
for any unknown or deprecated RR type for all A6 queries. If an AAAA
record exists for the name being resolved, a suitable response would
be 'no answers/no error', i.e. the response packet has an answer
count of 0 but no error is indicated.
5. Security Considerations
Eliminating A6 records will eliminate any security exposure related
to that RR type, and should introduce no new vulnerabilities.
6. IANA Considerations
IANA is requested to change the annotation of the A6 RR type from
"Experimental" to "Obsolete" in the DNS Parameters registry.
7. Acknowledgments
The authors would like to thank Ralph Droms, Roy Arends, Edward
Lewis, Andreas Gustafsson, Mark Andrews, Jun-ichiro "itojun" Hagino
and other members of DNS WGs for valuable contributions.
8. References
8.1. Normative References
[RFC2874] M. Crawford, C. Huitema, "DNS Extensions to Support IPv6
Address Aggregation and Renumbering", RFC 2874, July 2000.
[RFC3596] S. Thomson, C. Huitema, V. Ksinant, M. Souissi, "DNS
Extensions to Support IP Version 6", RFC 3596, October
2003.
8.2. Informative References
[RFC1886] S. Thomson and C. Huitema, "DNS Extensions to Support IP
Version 6", RFC 1886, December 1995.
Jiang & et al. Expires May 29, 2012 [Page 7]
Internet-Draft draft-jiang-a6-to-historic November 2011
[RFC3363] R. Bush, A. Durand, B. Fink, O. Gudmundsson, T. Hain,
"Representing Internet Protocol version 6 (IPv6) Addresses
in the Domain Name System (DNS)", RFC 3363, August 2002.
[RFC3364] R. Austein, "Tradeoffs in Domain Name System (DNS) Support
for Internet Protocol version 6 (IPv6)", RFC 3364, August
2002.
[A6DISC] J. Hagino, "Comparison of AAAA and A6 (do we really need
A6?)", working in progress, 2001.
[BIND] http://www.isc.org/software/bind
[KROOT] http://k.root-servers.org/
[LROOT] http://dns.icann.org/lroot/
Author's Addresses
Sheng Jiang
Huawei Technologies Co., Ltd
Q14, Huawei Campus
No.156 Beiqing Road
Hai-Dian District, Beijing 100095
P.R. China
Email: jiangsheng@huawei.com
David Conrad
Cloudflare, Inc.
665 3rd Street, Suite 207
San Francisco CA 94107
USA
Email: drc@cloudflare.com
Brian Carpenter
Department of Computer Science
University of Auckland
PB 92019
Auckland, 1142
New Zealand
Email: brian.e.carpenter@gmail.com
Jiang & et al. Expires May 29, 2012 [Page 8]