DNSOP Working Group                                        Xiaodong Lee
    Internet Draft                                                    CNNIC
    Expires: January 2015                                        Vixie Paul
                                                    Farsight Security, Inc.
                                                            Zhiwei Yan(Ed.)
                                                                      CNNIC
                                                               July 3, 2014


                         How to scale the DNS root system?
                        draft-lee-dnsop-scalingroot-00.txt


    Abstract

       In Domain Name System (DNS), 13 root servers are deployed in order
       to provide the entrance of domain name resolution and they are
       denoted by 13 letters. From 2000 or so, the anycast technology has
       been adopted to extend the number of root servers with the explosive
       development of Internet. To date, 11 of the 13 letters are hosted at
       multiple sites, and the root zone is served at about 380 sites
       around the globe. However, increasing mirror sites is not a perfect
       solution to scale the DNS root servers because the geographical
       distribution of the current 13 root servers is uneven and only
       increasing mirror sites cannot solve the efficiency and scalability
       issues caused by that. Then we propose a new DNS root system in this
       draft based on the widely deployed Domain Name System Security
       Extensions (DNSSEC). The proposed architecture is scalable and
       secure enough to meet the current and future needs to scale the DNS
       root system in an easy-deployment way.

    Requirements Language

       The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
       "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
       document are to be interpreted as described in [RFC2119].

    Status of this Memo

       This Internet-Draft is submitted to IETF in full conformance with
       the provisions of BCP 78 and BCP 79.

       Internet-Drafts are working documents of the Internet Engineering
       Task Force (IETF), its areas, and its working groups.  Note that
       other groups may also distribute working documents as Internet-
       Drafts.

       Internet-Drafts are draft documents valid for a maximum of six
       months and may be updated, replaced, or obsoleted by other documents




    X.D. Lee et al.         Expires January,2015                  [Page 1]


    Internet-Draft     How to scale the DNS root system?      July 3, 2014


       at any time.  It is inappropriate to use Internet-Drafts as
       reference material or to cite them other than as "work in progress".

       The list of current Internet-Drafts can be accessed at
       http://www.ietf.org/ietf/1id-abstracts.txt

       The list of Internet-Draft Shadow Directories can be accessed at
       http://www.ietf.org/shadow.html

       This Internet-Draft will expire on January, 2015.

    Copyright Notice

       Copyright (c) 2010 IETF Trust and the persons identified as the
       document authors.  All rights reserved.

       This document is subject to BCP 78 and the IETF Trust's Legal
       Provisions Relating to IETF Documents
       (http://trustee.ietf.org/license-info) in effect on the date of
       publication of this document.  Please review these documents
       carefully, as they describe your rights and restrictions with
       respect to this document.  Code Components extracted from this
       document must include Simplified BSD License text as described in
       Section 4.e of the Trust Legal Provisions and are provided without
       warranty as described in the Simplified BSD License.

    Table of Contents

       1. Introduction ................................................ 2
       2. Motivations ................................................. 3
       3. Proposed architecture........................................ 5
       4. Management considerations.................................... 8
       5. Security considerations...................................... 9
       6. References .................................................. 9
       Author's Address .............................................. 10
       Acknowledgment ................................................ 11



      1. Introduction

       In Domain Name System (DNS), 13 root servers are deployed and they
       are denoted by 13 letters from A to M. From 2000 or so, the anycast
       technology has been adopted to extend the number of root servers
       with the explosive development of Internet. To date, 11 of the 13
       letters are hosted at multiple sites, and the root zone is served at
       about 380 sites around the globe [1,2].


    X.D. Lee et al.         Expires January,2015                  [Page 2]


    Internet-Draft     How to scale the DNS root system?      July 3, 2014


       With the continuous development of Internet, more and more DNS root
       servers have to be deployment in order to meet the efficiency and
       stability requirements of the DNS root system. On one hand, the DNS
       resolution efficiency should be high enough to support more and more
       Internet users and their sophisticated applications. On the other
       hand, the DNS root system has to be stable enough to face the cyber
       attacks which are becoming more and more serious [3]. Then, how
       about deploying more anycast mirror sites? Without doubt, this
       scheme can improve the efficiency and stability of DNS root system
       as usual, but its problems are:

       a) This scheme is not open enough to satisfy the special
       requirements of a country or district or organization (CDO). If a
       CDO wants to deploy a root server to serve its local users, the
       current procedure is complex and it is almost impossible for the CDO
       to control the deployed site no matter the type of the site is local
       or global. Specially, the current root name servers have respective
       Root Name Server Operators (RNSOs), to whom IP address blocks have
       been allocated. The CDO wants a root server mirror site must
       coordinate anycast routing configuration and server placement with
       the corresponding RNSO.

       b) This scheme is not stable enough. When one root server is
       attacked and fails down, its anycast mirrors cannot do the zone file
       synchronization and the DNS root service may be affected.

      2. Motivations

       During recent years, many CDOs declare their anticipation to host a
       DNS root server. And how to adjust the placement of the current 13
       DNS root servers also drew a lot of attention from both academic and
       technical worlds [2]. However, it's very difficult to change the
       current belonging situation of DNS root servers. If possible, it's a
       good idea to deploy more root servers (not just the mirror sites) to
       solve or relieve the above problems.

       In the IPv4 based Internet, only 13 root servers are allowed due to
       the 512-byte limitation. However, adding the IPv6 address
       information for more than two root name servers will increase the
       size of the DNS priming response to exceed this maximum. Ultimately,
       when all 13 root name servers assign IPv6 addresses, the priming
       response will be increased to 811 bytes [3]. Specially, if a message
       cannot fit in the 512 bytes, the server must set a special flag
       indicating that the message was truncated. When receiving such a
       message, a DNS resolver will normally retry the transaction using
       TCP instead of UDP [4]. However, the costs of using TCP rather than
       UDP, in terms of system and network resources, are much higher and


    X.D. Lee et al.         Expires January,2015                  [Page 3]


    Internet-Draft     How to scale the DNS root system?      July 3, 2014


       can have significant impact on systems such as name servers that may
       receive several thousands of queries per second during normal
       operations. At the same time, with the promotion from ICANN, work is
       in progress to put forward a recommendation that will enable the
       publication of IPv6 addresses for, at least, DNS root servers in as
       short a time as possible. Besides, with the exhaustion of IPv4
       address, the IPv6 is promoted from all parties in the community.
       Currently, 10 IPv6 addresses have been configured on the root
       servers and the total size of the DNS priming response message has
       been increased to above 512 bytes (We even do not consider the
       DNSSEC herein, which increases the DNS response message more
       tremendously).

       Above background means that the 512-byte limitation does not
       actually exist anymore in the DNS [5]. Then how many DNS root server
       can be increased further? We take the IPv6 supported Internet as an
       example, then the DNS priming response message structure is shown in
       the following if we set the maximum number of root servers is N [6].

         --Required Header: 12 bytes

         --Query: 5 bytes

         --Answer: 31+15*(N-1) [the first answer is 31 bytes, the sequent
       answers are reduced by 16 bytes due to compression]

         --Additional Records: 16*N [each A record is 16 bytes]

         --Additional Records: 28*N [each AAAA record is 28 bytes]

       The IPv6 supported node is not required to reduce the size of
       subsequent packets to less than 1280 bytes, but must include a
       "Fragment Header" in those packets so that the IPv6-to-IPv4
       translating router can obtain a suitable "Identification" value to
       use in resulted IPv4 fragments. Note that this means the payload may
       have to be reduced to 1232 bytes (1280 minus 40 for the IPv6 header
       and 8 for the Fragment header) [7].

       Then we get the following formula,

                        12+5+31+15*(N-1)+16*N+28*N<1232

       Accordingly, N=20, which means that the root servers can only be
       increased by 7 more in the IPv6 transport environment (without EDNS0
       [8] and TCP supporting).




    X.D. Lee et al.         Expires January,2015                  [Page 4]


    Internet-Draft     How to scale the DNS root system?      July 3, 2014


       In advance, DNSSEC should be considered because it is necessary to
       guarantee the security of the DNS information and it has been widely
       deployed (and will be more widely deployed in the future). If only
       one kind of signature algorithm is used to generate the RRSIG
       resource record, the size of DNS response message will be increased
       to about 7 to 10 times comparing with the original one without
       signing [9]. It means that it is unpromising to increase the root
       servers further in the current architecture.

       In the security aspect, criticisms of the current and historical
       root name server system is lack of resistance to DDoS attack, noting
       that even with the current wide scale anycasting by every RNSO,
       there are still only a few hundred name servers in the world to
       answer authoritatively for the DNS root zone. We are also concerned
       that reachability of the root name server system is required even
       for purely local communication, since otherwise local clients have
       no way to discover local services. In a world sized distributed
       system like the Internet, critical services such as DNS root system
       ought to be extremely well distributed.

       In a word, we have to design a new architecture to scale the DNS
       root name server system and in this way the root server deployment
       balance can be reconsidered (the future deployment can refer the
       actual requirements such as the number of Internet users, amount of
       Internet traffic and so on). Besides, this architecture should scale
       the DNS root servers without the technology limitations as
       illustrated above.

      3. Proposed architecture

       The proposed architecture is strongly based on the widely deployed
       DNSSEC and shown in Figure 1. With DNSSEC, it is now possible for
       recursive name server operators to configure DNSSEC validation, such
       that any gTLD information heard from a root server (or mirror site)
       must be IANA-approved as indicated by DNSSEC signatures made with
       IANA's root Zone Signing Key (ZSK).

       For the universal anycast root server nodes deployment, we here
       provide two actual solutions:

       1)
The DNS root service manager (may still be the IANA) would
          generate and digitally sign (with DNSSEC) an additional version of
          the root zone that has a different set of NS records at its apex.
          These NS records will denote name servers whose addresses are not
          assigned to any current RNSO but are instead held in trust by IANA
          for use by any or all interested CDOs (Global Root X in Figure 1).
          IANA would request infrastructure micro-allocations from an RIR


    X.D. Lee et al.         Expires January,2015                  [Page 5]


    Internet-Draft     How to scale the DNS root system?      July 3, 2014


          (such as ARIN or APNIC), as several IPv4 24-bit prefixes and
          several IPv6 48-bit prefixes, for use in universal anycasting of
          the root zone. For example, the following configuration can be
          used corresponding to the universal root server (Global Root X):

             . IN NS anycast-X1.iana-servers.net.

             . IN NS anycast-X2.iana-servers.net.

             $ORIGIN iana-servers.net.

             anycast-x1 IN AAAA 2001:?:1::1

             anycast-x1 IN A ?.?.1.1

             anycast-x2 IN AAAA 2001:?:2::2

             anycast-x2 IN A ?.?.2.2

       2) Based on the contract or approval of one or multiple RNSO, the
          related root server can also be globally anycasted or locally
          deployed and totally managed and controlled by a CDO (Root A1 in
          Figure 1). This case is backward-compatible and does not need to
          change the current DNS root system.

                               +-----------------------+
                               |  Distribution Master  |
                               +-----------------------+
                               /     /         \       \
                              /     /           \       \
                       +------+   +-------+...+------+   +------+
                       |Root A|...|Global |   |Root M|...|Global|
                       +------+   |Root A1|   +------+   |Root X|
                          /       +-------+              +------+
                         /             \                   \
                        /               \                   \
                    +-------+       +-------+              +------+
                    |Local  |       |Local  |              |Local |
                    |Root A |       |Root A1|              |Root X|
                    +-------+       +-------+              +------+

                      Figure 1. DNS root server architecture

       We herein assume that the DNSSEC is widely deployed. In this way,
       the root zone file will not be tampered or misused. If the DNS root


    X.D. Lee et al.         Expires January,2015                  [Page 6]


    Internet-Draft     How to scale the DNS root system?      July 3, 2014


       server is a local site (Local Root A) and only serve for the
       restricted area, it may be unnecessary for holding the global
       anycast address. Still in this case, the local site (Local Root A)
       can also expand its site to multiple mirrors within the local area
       (for example, within one ISP's coverage) as the global node (Global
       Root A1) does.

       Accordingly, the DNS request message may be served by any root sever
       during its transmission and the possible scenarios are shown in
       Figure 2.

                                +---------------+
                      +----+   (                 )
                      |ISP3|--(      Backbone     )
                      +----+   (                 )
                        |       +---------------+
                        |        |             |
                     [Root 3]    |             |
                                 |             |
                                 |             |
                                 |             |
                             +----+          +----+
                   [Root 1]--|ISP1|----------|ISP2|--[Root 2]
                             +----+          +----+
                      Figure 2. DNS resolution scenarios

       We assume that one ISP only holds one DNS root server. In the first
       case, the DNS request message originated from the edge user is
       served by the root server deployed in the local network within the
       same ISP (Root 1) and then the response can be served as soon as
       possible. In the second case, the DNS request is transmitted to the
       nearby ISP due to the routing protocol and responded by the root
       server in the nearby ISP (Root 2). In the third case, the request
       may travel all the way to the Internet backbone without having been
       answered closely, in which case it may be answered by an RNSO who
       has decided to advertise a route to the well known address of the
       CDO root server (Root 3).

       For the data synchronization, the current scheme can be used.  After
       the root zone file is produced, the Distribution Master (DM) (such
       as the current hidden server) sends a DNS notify message to all root
       servers and then every root server responds with an acknowledgement
       to the DM. The DNS notify triggers the Start of Authority (SOA)
       request. The DM replies with a message which includes the serial
       number. If this serial number is higher than the number that is


    X.D. Lee et al.         Expires January,2015                  [Page 7]


    Internet-Draft     How to scale the DNS root system?      July 3, 2014


       currently operated by the root server, the root server starts the
       Zone Transfer (XFR) to retrieve the new root zone file. If this
       serial number in the SOA response is not higher than the root
       server's currently used version, the root server will take no
       further action. If this scheme is adopted, each CDO root server has
       to register with the DM in order to receive the notify message and
       which is the requirement of the first deployment solution
       illustrated above. While, for the second deployment solution, the DM
       function may be the root server managed by the current RNSO.

       Of course, a more open scheme is needed in the future for the root
       zone file synchronization. Because the root zone file data is solid
       and cannot be tampered, the CDO can actively fetch the root zone
       file data according to its special requirement and configuration. We
       mention this synchronization type because the CDO root servers may
       be increased significantly in the future and the traditional scheme
       explained above is not flexible and efficient enough.

       In a word, DNSSEC makes it possible to deploy the DNS root servers
       in a more distributed and flat manner, because any server can
       synchronize the root zone file without modification.

      4. Management considerations

       Considering the deployment of the architecture proposed in this
       draft, the following management questions should be answered:

       1) How to manage the universal anycast DNS root servers?

       We introduce the idea to globally distribute the root servers and
       locally deploy multiple local nodes. In the routing aspect, the
       anycast addresses will be broadcasted more widely for the global
       nodes to be accessed anywhere. However, the addresses of the local
       nodes have to be controlled in the local area (with the no-export
       attribute in BGP routing protocol) to serve the requests from the
       particular local area.

       2) What are the principles to deploy the universal DNS root servers?

       The principles or rules to select the service provider (CDO) and
       deploy the root servers can refer to [10,11]. Besides, more actual
       aspects can be considered in this new architecture due to its
       minimized limitation to deploy a root server.

       Other management and deployment issues will be added further.




    X.D. Lee et al.         Expires January,2015                  [Page 8]


    Internet-Draft     How to scale the DNS root system?      July 3, 2014


      5. Security considerations

       Although this architecture maintains the basic operations of the
       current DNS root system and follows the standard DNS protocols, it
       changes the current DNS root system because we want this mature
       system to be flexibly scaled with the Internet. Then the following
       issues related to security and stability may be caused:

       1) Routing table: according to this architecture, more than 13 root
       servers may broadcast their IP addresses globally. This will
       increase the entries of the BGP routing table (even maybe only one
       pair of additional anycast addresses (IPv4 and IPv6)).

       2) Attack defense: due to the deployment of anycast servers is more
       widely and the anycast nodes are increased a lot. How to secure
       these nodes will be harder and more important. In order to manage
       the increased global/local nodes, more sophisticated tools (such as
       CHOAS resource record, Traceroute command, special monitoring and
       analyzing platform) should be adopted and developed. In this way,
       the anycast nodes can be identified and monitored effectively and
       efficiently.

       Of course, we believe that the future DNS root service provider
       (many ccTLD and gTLD have deployed anycast service and manage it
       well) for the global or local anycast nodes will have the experience
       and ability to monitor and manage the servers and the possible
       attack (such as DDoS) can be effectively detected and defended [12].

       Other security issues will be discussed and detailed further.

      6. References

       [1]  http://www.root-servers.org/.

       [2]   T. Lee, B. Huffaker, M. Fomenkov, and k. claffy. On the
             problem of optimization of DNS root servers' placement. In
             Proc. of Passive and Active Network Measurement Workshop (PAM).
             April 2003.

       [3]   P. Vixie and A. Kato. DNS Response Size Issues. draft-ietf-
             dnsop-respsize-15.txt. February 2014.

       [4]   R. Bellis. DNS Transport over TCP - Implementation
             Requirements. IETF RFC 5966. August 2010.

       [5]   CAIDA. Analysis of the DNS root and gTLD nameserver system:
             status and progress report. May 2008.


    X.D. Lee et al.         Expires January,2015                  [Page 9]


    Internet-Draft     How to scale the DNS root system?      July 3, 2014


       [6]   ICANN. Accommodating IP Version 6 Address Resource Records for
             the Root of the Domain Name System. January 2007.

       [7]   S. Deering, and R. Hinden. Internet Protocol, Version 6 (IPv6)
             Specification. IETF RFC 2460. December 1998.

       [8]   P. Vixie. Extension Mechanisms for DNS (EDNS0). IETF RFC 2671.
             August 1999.

       [9]   http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj
             _7-2/dnssec.html.

       [10]  S. Sato, T. Matsuura, and Y. Morishita. BGP Anycast Node
             Requirements for Authoritative Name Servers draft-sato-dnsop-
             anycast-node-requirements-02.txt. September 2007.

       [11]  R. Bush, D. Karrenberg, M. Kosters, and R. Plzak. Root Name
             Server Operational Requirements. IETF RFC 2870. June 2000.

       [12]  USC/ISI Technical Report. Identifying and Characterizing
             Anycast in the Domain Name System. May 2011.

    Author's Address

       Xiaodong Lee
       China Internet Network Information Center
       No.4 South 4th Street, Zhongguancun
       Beijing, P. R. China
       Email: xl@cnnic.cn

       Paul Vixie
       Farsight Security, Inc.
       155 Bovet Road, #476
       San Mateo, CA  94402, USA
       Email: vixie@farsightsecurity.com

       Zhiwei Yan
       China Internet Network Information Center
       No.4 South 4th Street, Zhongguancun
       Beijing, P. R. China
       Email: yanzhiwei@cnnic.cn





    X.D. Lee et al.         Expires January,2015                 [Page 10]


    Internet-Draft     How to scale the DNS root system?      July 3, 2014



    Acknowledgment

       Funding for the RFC Editor function is currently provided by the
       Internet Society.











































    X.D. Lee et al.         Expires January,2015                 [Page 11]