Network Working Group S. Kerr Internet-Draft J. Abley Intended status: Informational Afilias Canada Expires: January 29, 2009 July 28, 2008 EDNS0 Support in Authority Servers on 27 July 2008 draft-kerr-dnsop-edns0-penetration-00 Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on January 29, 2009. Abstract This memo documents the methodology and results of an experiment which tested the availability of the DNS Extension Mechanism (EDNS0) on a large set of authority-only nameservers. The experiment was conducted in the bar during the IETF 72 meeting on 27 July 2008. The results of this experiment suggest that EDNS0 deployment is extensive: it was found that 94.4% of non-defective authority-only servers are EDNS0-capable. Kerr & Abley Expires January 29, 2009 [Page 1] Internet-Draft EDNS0 Support in Authority Servers July 2008 Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 4. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 5. Opportunities for Further Study . . . . . . . . . . . . . . . . 5 6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Appendix A. Change History . . . . . . . . . . . . . . . . . . . . 6 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 6 Intellectual Property and Copyright Statements . . . . . . . . . . 8 Kerr & Abley Expires January 29, 2009 [Page 2] Internet-Draft EDNS0 Support in Authority Servers July 2008 1. Introduction [RFC2671] specifies an extension mechanism for DNS (EDNS0), to be used between an authority-only DNS server and a DNS client (typically a DNS resolver). This memo documents the methodology and results of an experiment intended to estimate how widely-supported EDNS0 is in authority-only servers on 27 July 2008, almost 9 years after the EDNS0 specification was published. 2. Methodology 1. The contents of 69 top- and second-level zones published by the Afilias DNS registry platform were mined to produce a list of unique nameserver names. 2. A list of the zones mined in this fashion, together with the SOA serial numbers of the particular zones used, can be found in Figure 1. 3. For each nameserver name, a set of nameserver IPv4 addresses were obtained using the result of the query " IN A?" obtained from a local DNS resolver. 4. For each nameserver IPv4 address resulting from this process a single query was constructed "EXAMPLE.COM IN SOA?". This query was sent to using UDP transport with EDNS0. The server at each address was considered to be EDNS0- capable if the response to the query included an OPT resource record in the additional section, as specified in [RFC2671]. If no OPT resource record was present, the server at the address was considered to be EDNS0-incapable. If no response was received within 3 seconds, the server was considered to be unresponsive. 5. For each nameserver address that was tested and found to be EDNS0-incapable, an additional "EXAMPLE.COM. IN SOA?" query was sent using TCP transport. If no response was received, the server was considered to be incapable of responding over TCP. 6. For each nameservers which were observed to be unresponsive to UDP queries with EDNS0, additional "EXAMPLE.COM. IN SOA?" queries were sent without EDNS0 over both UDP and TCP. Kerr & Abley Expires January 29, 2009 [Page 3] Internet-Draft EDNS0 Support in Authority Servers July 2008 AERO [2007100130] AG [2008071160], CO.AG [2008062014], COM.AG [2008062794], NET.AG [2008062730], NOM.AG [2008062704], ORG.AG [2008062725] ASIA [2007193728] BZ [2008071161], COM.BZ [2008062518], EDU.BZ [2008062703], GOV.BZ [2008062506], NET.BZ [2008062732], ORG.BZ [2008062608] GI [2008070922], COM.GI [2008062713], EDU.GI [2008062704], GOV.GI [2008062503], LTD.GI [2008062604], MOD.GI [2008061703], ORG.GI [2008062704] HN [2008070999], COM.HN [2008062638], EDU.HN [2008062714], GOB.HN [2008062711], MIL.HN [2008052504], NET.HN [2008062704], ORG.HN [2008062706] IN [2008117115], AC.IN [2008062983], CO.IN [2008072985], EDU.IN [2008062896], FIRM.IN [2008062905], GEN.IN [2008062906], GOV.IN [2008062767], IND.IN [2008062986], MIL.IN [2006072621], NET.IN [2008063495], ORG.IN [2008065500], RES.IN [2008062422] INFO [2007991379] LC [2008070926], CO.LC [2008062302], COM.LC [2008062403], L.LC [2008062701], NET.LC [2008062704], ORG.LC [2008062708], P.LC [2008062301] ME [2008053552], CO.ME [2008043077], ITS.ME [2008043301], NET.ME [2008043018], ORG.ME [2008043022], PRIV.ME [2008043011], MN [2008071266] MOBI [2007383589] ORG [2008264551] SC [2008071107], COM.SC [2008062715], EDU.SC [2008062604], GOV.SC [2008062703], NET.SC [2008062706], ORG.SC [2008062706] VC [2008071137], COM.VC [2008062714], EDU.VC [2008062705], MIL.VC [2008062705], NET.VC [2008062505], ORG.VC [2008062707] Zone versions used during this experiment. Note that although in many cases the SOA serial numbers for these zones were once constructed in the format YYYYMMDD, as is a common convention, once hosted in the Afilias registry platform SOA serial numbers no longer specified using that convention; in normal operation serial numbers increase strictly monotonically. Figure 1 3. Results 1. The total number of delegations from all 69 zones was 13,747,646. 2. The total number of unique nameserver names was 715,566. 3. The number of nameserver IPv4 addresses obtained was 407,011. 9 nameservers had IPv6 addresses but no IPv4 addresses. No IPv4 or Kerr & Abley Expires January 29, 2009 [Page 4] Internet-Draft EDNS0 Support in Authority Servers July 2008 IPv6 addresses could be found for 100,913 nameserver names. 4. Of the test queries sent to those 407,011 addresses, 322,992 responded and were EDNS0-capable, 19,030 responded and were were EDNS0-incapable, and 64,989 gave no response. 5. Of the 19,030 servers which responded but which were EDNS0- incapable, 14,991 responded to the same query sent using TCP transport, and the remainder did not. 6. Of the 64,989 nameservers which gave no response to an EDNS0 query, 5,326 gave a response to queries on both UDP transport without EDNS0 and TCP; 807 gave a response to a query on UDP transport without EDNS0 but not TCP; 919 gave a response on TCP but not UDP without EDNS0. 4. Summary Assuming that the methodology described in this document has resulted in a representative sample, it may be concluded that: 1. 16.0% of authority-only servers are defective, and provide no useful response at all to a query which specifies EDNS0. 2. 94.4% of non-defective authority-only servers are EDNS0-capable. 3. Of those authority servers which provide a response to a query which specifies EDNS0 but which are EDNS0-incapable, 79% respond to queries using TCP transport. 4. 10.9% of servers which did not respond to a query which specified EDNS0 will respond to queries with TCP transport, or with UDP transport without EDNS0. 5. Of all the servers tested from which it was possible to get a response (using UDP with EDNS0, UDP without EDNS0 or TCP) 92.5% support EDNS0 queries over UDP. 6. Of all the servers tested from which it was possible to get a response, as above, 98.6% support either EDNS0 queries over UDP or TCP or both. 5. Opportunities for Further Study The results presented in this document are for queries and responses carried over IPv4 only. Since there are some nameservers in the test Kerr & Abley Expires January 29, 2009 [Page 5] Internet-Draft EDNS0 Support in Authority Servers July 2008 set which have published AAAA records, queries over IPv6 could be added to the test set. The set of zones from which authority server names were harvested could be expanded to include other gTLDs and ccTLDs. The set of measurement scripts could be packaged for unattended operation, and run regularly over a period of time, so as to confirm that the results presented here are indicative of normal behaviour, and not some isolated temporal phoenomenon. The measurement scripts could be run from more than one location, to reduce the possibility that the results are skewed due to topological query source. It appears that some server implementations do not respond to queries which appear to be lame delegations; the methodology might be modified such that instead of asking the same question of every server, we instead ask a question relating to a zone which is delegated to the server in question. This may reduce some systematic skew in the results, and reveal more servers to be EDNS0-capable. 6. References [RFC2671] Vixie, P., "Extension Mechanisms for DNS (EDNS0)", RFC 2671, August 1999. Appendix A. Change History This section to be removed prior to publication. 00 Initial draft, circulated as draft-kerr-dnsop-edns0-penetration-00. Authors' Addresses Shane Kerr Afilias Canada Corp. Suite 204, 4141 Yonge Street Toronto, ON M2P 2A8 Canada Phone: +1 416 673 8371 Email: shane@ca.afilias.info Kerr & Abley Expires January 29, 2009 [Page 6] Internet-Draft EDNS0 Support in Authority Servers July 2008 Joe Abley Afilias Canada Corp. Suite 204, 4141 Yonge Street Toronto, ON M2P 2A8 Canada Phone: +1 416 673 4176 Email: jabley@ca.afilias.info Kerr & Abley Expires January 29, 2009 [Page 7] Internet-Draft EDNS0 Support in Authority Servers July 2008 Full Copyright Statement Copyright (C) The IETF Trust (2008). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org. Kerr & Abley Expires January 29, 2009 [Page 8]