Internet DRAFT - draft-lee-dnsop-scalingroot
draft-lee-dnsop-scalingroot
DNSOP Working Group Xiaodong Lee
Internet Draft CNNIC
Expires: January 2015 Vixie Paul
Farsight Security, Inc.
Zhiwei Yan(Ed.)
CNNIC
July 3, 2014
How to scale the DNS root system?
draft-lee-dnsop-scalingroot-00.txt
Abstract
In Domain Name System (DNS), 13 root servers are deployed in order
to provide the entrance of domain name resolution and they are
denoted by 13 letters. From 2000 or so, the anycast technology has
been adopted to extend the number of root servers with the explosive
development of Internet. To date, 11 of the 13 letters are hosted at
multiple sites, and the root zone is served at about 380 sites
around the globe. However, increasing mirror sites is not a perfect
solution to scale the DNS root servers because the geographical
distribution of the current 13 root servers is uneven and only
increasing mirror sites cannot solve the efficiency and scalability
issues caused by that. Then we propose a new DNS root system in this
draft based on the widely deployed Domain Name System Security
Extensions (DNSSEC). The proposed architecture is scalable and
secure enough to meet the current and future needs to scale the DNS
root system in an easy-deployment way.
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with
the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
X.D. Lee et al. Expires January,2015 [Page 1]
Internet-Draft How to scale the DNS root system? July 3, 2014
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress".
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on January, 2015.
Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the Simplified BSD License.
Table of Contents
1. Introduction ................................................ 2
2. Motivations ................................................. 3
3. Proposed architecture........................................ 5
4. Management considerations.................................... 8
5. Security considerations...................................... 9
6. References .................................................. 9
Author's Address .............................................. 10
Acknowledgment ................................................ 11
1. Introduction
In Domain Name System (DNS), 13 root servers are deployed and they
are denoted by 13 letters from A to M. From 2000 or so, the anycast
technology has been adopted to extend the number of root servers
with the explosive development of Internet. To date, 11 of the 13
letters are hosted at multiple sites, and the root zone is served at
about 380 sites around the globe [1,2].
X.D. Lee et al. Expires January,2015 [Page 2]
Internet-Draft How to scale the DNS root system? July 3, 2014
With the continuous development of Internet, more and more DNS root
servers have to be deployment in order to meet the efficiency and
stability requirements of the DNS root system. On one hand, the DNS
resolution efficiency should be high enough to support more and more
Internet users and their sophisticated applications. On the other
hand, the DNS root system has to be stable enough to face the cyber
attacks which are becoming more and more serious [3]. Then, how
about deploying more anycast mirror sites? Without doubt, this
scheme can improve the efficiency and stability of DNS root system
as usual, but its problems are:
a) This scheme is not open enough to satisfy the special
requirements of a country or district or organization (CDO). If a
CDO wants to deploy a root server to serve its local users, the
current procedure is complex and it is almost impossible for the CDO
to control the deployed site no matter the type of the site is local
or global. Specially, the current root name servers have respective
Root Name Server Operators (RNSOs), to whom IP address blocks have
been allocated. The CDO wants a root server mirror site must
coordinate anycast routing configuration and server placement with
the corresponding RNSO.
b) This scheme is not stable enough. When one root server is
attacked and fails down, its anycast mirrors cannot do the zone file
synchronization and the DNS root service may be affected.
2. Motivations
During recent years, many CDOs declare their anticipation to host a
DNS root server. And how to adjust the placement of the current 13
DNS root servers also drew a lot of attention from both academic and
technical worlds [2]. However, it's very difficult to change the
current belonging situation of DNS root servers. If possible, it's a
good idea to deploy more root servers (not just the mirror sites) to
solve or relieve the above problems.
In the IPv4 based Internet, only 13 root servers are allowed due to
the 512-byte limitation. However, adding the IPv6 address
information for more than two root name servers will increase the
size of the DNS priming response to exceed this maximum. Ultimately,
when all 13 root name servers assign IPv6 addresses, the priming
response will be increased to 811 bytes [3]. Specially, if a message
cannot fit in the 512 bytes, the server must set a special flag
indicating that the message was truncated. When receiving such a
message, a DNS resolver will normally retry the transaction using
TCP instead of UDP [4]. However, the costs of using TCP rather than
UDP, in terms of system and network resources, are much higher and
X.D. Lee et al. Expires January,2015 [Page 3]
Internet-Draft How to scale the DNS root system? July 3, 2014
can have significant impact on systems such as name servers that may
receive several thousands of queries per second during normal
operations. At the same time, with the promotion from ICANN, work is
in progress to put forward a recommendation that will enable the
publication of IPv6 addresses for, at least, DNS root servers in as
short a time as possible. Besides, with the exhaustion of IPv4
address, the IPv6 is promoted from all parties in the community.
Currently, 10 IPv6 addresses have been configured on the root
servers and the total size of the DNS priming response message has
been increased to above 512 bytes (We even do not consider the
DNSSEC herein, which increases the DNS response message more
tremendously).
Above background means that the 512-byte limitation does not
actually exist anymore in the DNS [5]. Then how many DNS root server
can be increased further? We take the IPv6 supported Internet as an
example, then the DNS priming response message structure is shown in
the following if we set the maximum number of root servers is N [6].
--Required Header: 12 bytes
--Query: 5 bytes
--Answer: 31+15*(N-1) [the first answer is 31 bytes, the sequent
answers are reduced by 16 bytes due to compression]
--Additional Records: 16*N [each A record is 16 bytes]
--Additional Records: 28*N [each AAAA record is 28 bytes]
The IPv6 supported node is not required to reduce the size of
subsequent packets to less than 1280 bytes, but must include a
"Fragment Header" in those packets so that the IPv6-to-IPv4
translating router can obtain a suitable "Identification" value to
use in resulted IPv4 fragments. Note that this means the payload may
have to be reduced to 1232 bytes (1280 minus 40 for the IPv6 header
and 8 for the Fragment header) [7].
Then we get the following formula,
12+5+31+15*(N-1)+16*N+28*N<1232
Accordingly, N=20, which means that the root servers can only be
increased by 7 more in the IPv6 transport environment (without EDNS0
[8] and TCP supporting).
X.D. Lee et al. Expires January,2015 [Page 4]
Internet-Draft How to scale the DNS root system? July 3, 2014
In advance, DNSSEC should be considered because it is necessary to
guarantee the security of the DNS information and it has been widely
deployed (and will be more widely deployed in the future). If only
one kind of signature algorithm is used to generate the RRSIG
resource record, the size of DNS response message will be increased
to about 7 to 10 times comparing with the original one without
signing [9]. It means that it is unpromising to increase the root
servers further in the current architecture.
In the security aspect, criticisms of the current and historical
root name server system is lack of resistance to DDoS attack, noting
that even with the current wide scale anycasting by every RNSO,
there are still only a few hundred name servers in the world to
answer authoritatively for the DNS root zone. We are also concerned
that reachability of the root name server system is required even
for purely local communication, since otherwise local clients have
no way to discover local services. In a world sized distributed
system like the Internet, critical services such as DNS root system
ought to be extremely well distributed.
In a word, we have to design a new architecture to scale the DNS
root name server system and in this way the root server deployment
balance can be reconsidered (the future deployment can refer the
actual requirements such as the number of Internet users, amount of
Internet traffic and so on). Besides, this architecture should scale
the DNS root servers without the technology limitations as
illustrated above.
3. Proposed architecture
The proposed architecture is strongly based on the widely deployed
DNSSEC and shown in Figure 1. With DNSSEC, it is now possible for
recursive name server operators to configure DNSSEC validation, such
that any gTLD information heard from a root server (or mirror site)
must be IANA-approved as indicated by DNSSEC signatures made with
IANA's root Zone Signing Key (ZSK).
For the universal anycast root server nodes deployment, we here
provide two actual solutions:
1)
The DNS root service manager (may still be the IANA) would
generate and digitally sign (with DNSSEC) an additional version of
the root zone that has a different set of NS records at its apex.
These NS records will denote name servers whose addresses are not
assigned to any current RNSO but are instead held in trust by IANA
for use by any or all interested CDOs (Global Root X in Figure 1).
IANA would request infrastructure micro-allocations from an RIR
X.D. Lee et al. Expires January,2015 [Page 5]
Internet-Draft How to scale the DNS root system? July 3, 2014
(such as ARIN or APNIC), as several IPv4 24-bit prefixes and
several IPv6 48-bit prefixes, for use in universal anycasting of
the root zone. For example, the following configuration can be
used corresponding to the universal root server (Global Root X):
. IN NS anycast-X1.iana-servers.net.
. IN NS anycast-X2.iana-servers.net.
$ORIGIN iana-servers.net.
anycast-x1 IN AAAA 2001:?:1::1
anycast-x1 IN A ?.?.1.1
anycast-x2 IN AAAA 2001:?:2::2
anycast-x2 IN A ?.?.2.2
2) Based on the contract or approval of one or multiple RNSO, the
related root server can also be globally anycasted or locally
deployed and totally managed and controlled by a CDO (Root A1 in
Figure 1). This case is backward-compatible and does not need to
change the current DNS root system.
+-----------------------+
| Distribution Master |
+-----------------------+
/ / \ \
/ / \ \
+------+ +-------+...+------+ +------+
|Root A|...|Global | |Root M|...|Global|
+------+ |Root A1| +------+ |Root X|
/ +-------+ +------+
/ \ \
/ \ \
+-------+ +-------+ +------+
|Local | |Local | |Local |
|Root A | |Root A1| |Root X|
+-------+ +-------+ +------+
Figure 1. DNS root server architecture
We herein assume that the DNSSEC is widely deployed. In this way,
the root zone file will not be tampered or misused. If the DNS root
X.D. Lee et al. Expires January,2015 [Page 6]
Internet-Draft How to scale the DNS root system? July 3, 2014
server is a local site (Local Root A) and only serve for the
restricted area, it may be unnecessary for holding the global
anycast address. Still in this case, the local site (Local Root A)
can also expand its site to multiple mirrors within the local area
(for example, within one ISP's coverage) as the global node (Global
Root A1) does.
Accordingly, the DNS request message may be served by any root sever
during its transmission and the possible scenarios are shown in
Figure 2.
+---------------+
+----+ ( )
|ISP3|--( Backbone )
+----+ ( )
| +---------------+
| | |
[Root 3] | |
| |
| |
| |
+----+ +----+
[Root 1]--|ISP1|----------|ISP2|--[Root 2]
+----+ +----+
Figure 2. DNS resolution scenarios
We assume that one ISP only holds one DNS root server. In the first
case, the DNS request message originated from the edge user is
served by the root server deployed in the local network within the
same ISP (Root 1) and then the response can be served as soon as
possible. In the second case, the DNS request is transmitted to the
nearby ISP due to the routing protocol and responded by the root
server in the nearby ISP (Root 2). In the third case, the request
may travel all the way to the Internet backbone without having been
answered closely, in which case it may be answered by an RNSO who
has decided to advertise a route to the well known address of the
CDO root server (Root 3).
For the data synchronization, the current scheme can be used. After
the root zone file is produced, the Distribution Master (DM) (such
as the current hidden server) sends a DNS notify message to all root
servers and then every root server responds with an acknowledgement
to the DM. The DNS notify triggers the Start of Authority (SOA)
request. The DM replies with a message which includes the serial
number. If this serial number is higher than the number that is
X.D. Lee et al. Expires January,2015 [Page 7]
Internet-Draft How to scale the DNS root system? July 3, 2014
currently operated by the root server, the root server starts the
Zone Transfer (XFR) to retrieve the new root zone file. If this
serial number in the SOA response is not higher than the root
server's currently used version, the root server will take no
further action. If this scheme is adopted, each CDO root server has
to register with the DM in order to receive the notify message and
which is the requirement of the first deployment solution
illustrated above. While, for the second deployment solution, the DM
function may be the root server managed by the current RNSO.
Of course, a more open scheme is needed in the future for the root
zone file synchronization. Because the root zone file data is solid
and cannot be tampered, the CDO can actively fetch the root zone
file data according to its special requirement and configuration. We
mention this synchronization type because the CDO root servers may
be increased significantly in the future and the traditional scheme
explained above is not flexible and efficient enough.
In a word, DNSSEC makes it possible to deploy the DNS root servers
in a more distributed and flat manner, because any server can
synchronize the root zone file without modification.
4. Management considerations
Considering the deployment of the architecture proposed in this
draft, the following management questions should be answered:
1) How to manage the universal anycast DNS root servers?
We introduce the idea to globally distribute the root servers and
locally deploy multiple local nodes. In the routing aspect, the
anycast addresses will be broadcasted more widely for the global
nodes to be accessed anywhere. However, the addresses of the local
nodes have to be controlled in the local area (with the no-export
attribute in BGP routing protocol) to serve the requests from the
particular local area.
2) What are the principles to deploy the universal DNS root servers?
The principles or rules to select the service provider (CDO) and
deploy the root servers can refer to [10,11]. Besides, more actual
aspects can be considered in this new architecture due to its
minimized limitation to deploy a root server.
Other management and deployment issues will be added further.
X.D. Lee et al. Expires January,2015 [Page 8]
Internet-Draft How to scale the DNS root system? July 3, 2014
5. Security considerations
Although this architecture maintains the basic operations of the
current DNS root system and follows the standard DNS protocols, it
changes the current DNS root system because we want this mature
system to be flexibly scaled with the Internet. Then the following
issues related to security and stability may be caused:
1) Routing table: according to this architecture, more than 13 root
servers may broadcast their IP addresses globally. This will
increase the entries of the BGP routing table (even maybe only one
pair of additional anycast addresses (IPv4 and IPv6)).
2) Attack defense: due to the deployment of anycast servers is more
widely and the anycast nodes are increased a lot. How to secure
these nodes will be harder and more important. In order to manage
the increased global/local nodes, more sophisticated tools (such as
CHOAS resource record, Traceroute command, special monitoring and
analyzing platform) should be adopted and developed. In this way,
the anycast nodes can be identified and monitored effectively and
efficiently.
Of course, we believe that the future DNS root service provider
(many ccTLD and gTLD have deployed anycast service and manage it
well) for the global or local anycast nodes will have the experience
and ability to monitor and manage the servers and the possible
attack (such as DDoS) can be effectively detected and defended [12].
Other security issues will be discussed and detailed further.
6. References
[1] http://www.root-servers.org/.
[2] T. Lee, B. Huffaker, M. Fomenkov, and k. claffy. On the
problem of optimization of DNS root servers' placement. In
Proc. of Passive and Active Network Measurement Workshop (PAM).
April 2003.
[3] P. Vixie and A. Kato. DNS Response Size Issues. draft-ietf-
dnsop-respsize-15.txt. February 2014.
[4] R. Bellis. DNS Transport over TCP - Implementation
Requirements. IETF RFC 5966. August 2010.
[5] CAIDA. Analysis of the DNS root and gTLD nameserver system:
status and progress report. May 2008.
X.D. Lee et al. Expires January,2015 [Page 9]
Internet-Draft How to scale the DNS root system? July 3, 2014
[6] ICANN. Accommodating IP Version 6 Address Resource Records for
the Root of the Domain Name System. January 2007.
[7] S. Deering, and R. Hinden. Internet Protocol, Version 6 (IPv6)
Specification. IETF RFC 2460. December 1998.
[8] P. Vixie. Extension Mechanisms for DNS (EDNS0). IETF RFC 2671.
August 1999.
[9] http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj
_7-2/dnssec.html.
[10] S. Sato, T. Matsuura, and Y. Morishita. BGP Anycast Node
Requirements for Authoritative Name Servers draft-sato-dnsop-
anycast-node-requirements-02.txt. September 2007.
[11] R. Bush, D. Karrenberg, M. Kosters, and R. Plzak. Root Name
Server Operational Requirements. IETF RFC 2870. June 2000.
[12] USC/ISI Technical Report. Identifying and Characterizing
Anycast in the Domain Name System. May 2011.
Author's Address
Xiaodong Lee
China Internet Network Information Center
No.4 South 4th Street, Zhongguancun
Beijing, P. R. China
Email: xl@cnnic.cn
Paul Vixie
Farsight Security, Inc.
155 Bovet Road, #476
San Mateo, CA 94402, USA
Email: vixie@farsightsecurity.com
Zhiwei Yan
China Internet Network Information Center
No.4 South 4th Street, Zhongguancun
Beijing, P. R. China
Email: yanzhiwei@cnnic.cn
X.D. Lee et al. Expires January,2015 [Page 10]
Internet-Draft How to scale the DNS root system? July 3, 2014
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
X.D. Lee et al. Expires January,2015 [Page 11]