[Dnssec-trigger] patch to fix the dnssec-trigger fallback issue
Tomas Hozza
thozza at redhat.com
Wed Aug 13 15:46:55 UTC 2014
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi Wouter.
On Wed 13 Aug 2014 04:57:22 PM CEST, W.C.A. Wijngaards wrote:
> Hi Pavel,
>
> On 08/13/2014 04:31 PM, Pavel Simerda wrote:
>> Hi,
>
>> just found where the problem with not using the fallback
>> configuration was. All the details are in the Fedora bugzilla
>> ticket[1]. I didn't do any more extensive research but it
>> basically seems that after planning the direct probe we need to
>> also plan the tcpdns probe *before* the direct probe finishes and
>> prevents the tcpdns one from being planned.
>
> You seem to want dnssec-trigger to probe in a different sequence of
> fallback methods?
>
> At the design time the direct method was thought to be a better method
> than using a public-recursor fallback. The traffic on authority
> servers was not considered a problem.
>
> The bugzilla ticket is solving something which is not a bug but a
> feature. Designed in, as the order of the probes performed.
>
> The aim for the initial design was also to reduce load on that public
> resolver (hosted by us in the generic package).
>
> The direct (direct to authority servers) method works very often. And
> when it does it is very likely to produce DNSSEC support.
For some reason I thought that fall-back servers were used before the
root servers. However I can see that it is the other way around when
reading the dnssec-trigger project page.
We consider offloading root servers a good thing. I agree with you that
in this case it is more of a feature request. Maybe it could be made
configurable. We have own Fedora infrastructure, so we will not increase
the load on your servers.
The problem I see is the situation when you want to use DNS over SSL,
because full recursion is blocked. Then it would make sense to actually
try the fall-back configuration first.
However Pavel will know more, since he debugged the daemon to find the
cause in source.
> Your patch also seems to have a race condition, I think, since you
> spawn both the direct and the dnstcp probes at the same time.
>
> Best regards,
> Wouter
>
>> Pavel
>
>> [1] https://bugzilla.redhat.com/show_bug.cgi?id=1109292
>
>
Thanks.
Regards,
- --
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience
PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJT64hvAAoJEMWIetUdnzwtCeUH/iLA5ZiXght/q/h9jYnguuIi
iddIrQkwyg1jbAua9okfvGQlHpUJI05TQVjEmoT/30HWpA4v5UYJUe2XFr7cKz/3
GyCbjYK3ZZn3Jf3UR1gofCRAtRLr1XM+Fp5Qa2IJgkpLuoA595S1ss/2dyJeyGNi
PTr7e1MLLOxBl9JvM/BIlvsiiy+A+sjb9EKLnc0vRgiel7wJkXOn294Bcx1W3S6R
xjzGmRGStAPFKmCiuQfthgLB5Bk6McROWqXzPR8RGGUGDfWSBErfq43ymUuoA5CV
1izvkEm7K02F9ljG9/jOORs7pLhQJs+TS7hGEWUWbCMdqx28WSDNptEFGwBqjVI=
=5P1U
-----END PGP SIGNATURE-----
More information about the dnssec-trigger
mailing list