From owner-freebsd-hackers@FreeBSD.ORG Tue Jul 3 21:17:41 2012 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx2.freebsd.org (mx2.freebsd.org [IPv6:2001:4f8:fff6::35]) by hub.freebsd.org (Postfix) with ESMTP id 343E9106566B for ; Tue, 3 Jul 2012 21:17:41 +0000 (UTC) (envelope-from dougb@FreeBSD.org) Received: from opti.dougb.net (hub.freebsd.org [IPv6:2001:4f8:fff6::36]) by mx2.freebsd.org (Postfix) with ESMTP id 964F414E9AF; Tue, 3 Jul 2012 21:17:40 +0000 (UTC) Message-ID: <4FF36174.2000806@FreeBSD.org> Date: Tue, 03 Jul 2012 14:17:40 -0700 From: Doug Barton Organization: http://SupersetSolutions.com/ User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:13.0) Gecko/20120621 Thunderbird/13.0.1 MIME-Version: 1.0 To: Mark Felder References: <4FF2E00E.2030502@FreeBSD.org> <86bojxow6x.fsf@ds4.des.no> In-Reply-To: X-Enigmail-Version: 1.4.2 OpenPGP: id=1A1ABC84 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8bit Cc: freebsd-hackers@freebsd.org Subject: Re: Pull in upstream before 9.1 code freeze? X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 03 Jul 2012 21:17:41 -0000 On 07/03/2012 06:36, Mark Felder wrote: > On Tue, 03 Jul 2012 07:39:34 -0500, Dag-Erling Smørgrav wrote: > >> >> I don't think there will be as much whinging as you expect. Times have >> changed. > > Agreed; if we need DNS in base (really, why?) then unbound+nsd are prime > candidates, but they're healthily maintained in ports...soo... no real > advantage. We should not put nsd in the base. There is no need for an authoritative server in the base, the only reason BIND is there is that it is also a resolver, and, of course, hysterical raisins. The dream scenario is one we've discussed in the past: 1. Promote certain ports to "system" status, with more stringent requirements for both the ports, and the maintainers. 2. Re-tool the installer to give the users choice of which (if any) of the key system components get installed. Obvious choices for this category are the perennial favorites of DNS (resolver) and mail, reasonable arguments can be made for others of course. Whether we do the above or not, ldns/drill should be imported into the base so that we have at least one command line DNS resolution tool. A good "junior hacker" project would be to make a host(1) clone using ldns. If users want the regular bind tools, ports/dns/bind-tools already exists. Given it's unlikely that actually making the installer more modular will happen before 10-RELEASE, importing unbound is the next best alternative. And regarding the "it's a young project" issue, I've followed their development closely, I know the people involved, and I've used it for some projects. I have zero hesitation. And for those who are unclear on the problem we're trying to solve, a quick recap. As things have evolved over time the BIND release cycles and ours have diverged. Since we don't update the version of BIND in the base for POLA reasons, for FreeBSD 6, and now 7, this has led to a situation where our oldest release has an unsupported version of BIND. Clearly this is unacceptable. Oh, and to anticipate the traditional "zomg! don't turn freebsd into linux!!!11!!!" response: First, just because linux does something doesn't make it wrong, and Second, we can definitely add a *little* more modularity (which the users have been asking for as long as I can remember) without "turning into linux." And finally, to address the "why have a resolver on the system at all?" question, one word: DNSSEC. At this time there is no good solution to the problem of the local host system being able to validate a DNSSEC response. The only viable solution _at this time_ is to have a local, validating resolver. (Of course, other solutions are being worked on, but they aren't here yet.) This will become much more important over time as DNSSEC adoption increases, and more things begin to use it (like DANE). Doug -- This .signature sanitized for your protection