Mark, colleagues,
A quick update regarding the state of the nameservers in the
gTLD space, I have been monitoring the nameservers of the gTLDs, and across
time between 99.9% and 100% nameservers do not present any of the EDNS issues
described in https://tools.ietf.org/html/draft-ietf-dnsop-no-response-issue-04.
Registries have solved the issues reported by ICANN in a timely manner.
Finally, a handful of name servers are copying the Z flag bit from the query header (see 8.1.3.3 of draft-ietf-dnsop-no-response-issue-04) and
this is related to a bug that has now been fixed now in Knot (see. https://gitlab.labs.nic.cz/labs/knot/issues/476). We expect that in the near future the MBZ
issue should be solved in the gTLD space as Registries roll out the new version.
Regards,
Gustavo
Thank you Mark,In the past we worked with a few gTLD backends to solve these issues. Ithink that the massive improvement that you mentioned is related to thiseffort. I will review your latest report and work with the affected gTLDbackends to solve any new issue.Regards,Gustavo LozanoICANNOn 7/25/16, 21:01, "gtld-tech-bounces@icann.org on behalf of Mark Andrews"<gtld-tech-bounces@icann.org on behalf of marka@isc.org> wrote:In message <0EDF3BC2-6E1E-4A2B-B264-3972B5E994B2@icann.org>, FranciscoArias writes:Hi Mark,Are you suggesting there is an issue with TLD servers or second-levelnames, or both?There are issues with both though the TLD servers have show a massiveimprovement [1] and the GTLD subset are supposed to be RFC compliantwith DNSSEC, EDNS(0) and STD 13 as per their contracts. The rootservers also need to meet the same level of compliance.[2] shows that most of the TLD and root servers are basicallycompliant. The tests used are described in [3].The second level names are a entirely different matter with only~60% [1] of servers actually passing just the EDNS(0) subset of thetests above.Everytime new features (EDNS, DNSSEC, DNS COOKIES, AD=1 in queries)have been deployed in the DNS resolver vendors have had to workaround non compliant servers where possible or just live with thefact that you can't do reliable signaling because the broken serverswere not removed from the ecosystem in a timely enough manner (ADis echoed back by too many servers despite this being explictingprohibited by STD13). This could have been avoided if nameserverswere actually checked for protocol compliance and operators withnon-compliant servers informed that their servers are broken.Some of this will improve as operators use F1 [4] load balancersand Checkpoint Firewalls upgrade (Unknown EDNS version and UnknownEDNS Flags will no longer cause the DNS message to be dropped basedon correspondence with a Checkpoint developer.) This won't coverall cases of packets being dropped. Nor will it address the serversreturning inappropriate responses.To be able to use the extensions mechanisms specified in EDNS(0)the deployed server need to be well behaved when they see a messageusing a extensions mechanisms. This is very much not the casetoday.Mark[4]MarkRegards,--FranciscoOn 7/18/16, 2:07 PM, "gtld-tech-bounces@icann.org on behalf of MarkAndrews" <gtld-tech-bounces@icann.org on behalf of marka@isc.org> wrote:As part of preparations for shipping nameservers that support DNSCOOKIES (RFC 7873) I have been measuring EDNS Compliance in a numberdata sets the results of which are available atalong with a online tester. We wanted how much will break when weship BIND 9.11.0 which has DNS COOKIES on by default.We found there were zones that could no longer resolve if validationwas enabled. Named falls back to plain DNS on certain detectederrors as there isn't time to probe exact failure causes by trialand error. Even if trial and error worked for DNS COOKIEs theproblem will get worse as more EDNS features get used.We found zones that were taking multiple seconds to resolve. Wewere back to the sort of resolution times we saw when EDNS was firstintroduced for some zones.We saw increased queries being needed to be made as servers didn'tcorrectly ignore unknown EDNS options.All these errors are easily determinable by running a handful ofqueries against each server.RFC 1034 and RFC 1035 were written assuming that servers delegatedto would be RFC compliant. Currently GTLD servers are checked andthere is no reason that servers delegated to by the GTLD serverscan't also be checked and the operators asked to fix the faultsdetected. This can be done at both the RFC 1034 and RFC 1035 leveland at the EDNS level. It is not a actionable condition if all theEDNS tests fail in a way that indicated the EDNS is not supported.I would suggest that {E}DNS compliance checking be done within aweek of a new server being registered and delegated to and 1/2yearly thereafter. If a server fails a test that the operator /registrant be informed and the server be retested in a month. Iwould also suggest that compliance testing results and test dateshould be record in whois or similar so there is no need to retesttoo frequently.Mark--Mark Andrews, ISC1 Seymour St., Dundas Valley, NSW 2117, Australia--Mark Andrews, ISC1 Seymour St., Dundas Valley, NSW 2117, AustraliaPHONE: +61 2 9871 4742 INTERNET: marka@isc.org