Closed
Bug 1801384
Opened 3 years ago
Closed 3 years ago
[Experiment] Add-On Experiment: DNSSEC Interference Measurement V4 Fx 105.0 to 110.0 Release
Categories
(Shield :: Shield Study, task, P3)
Shield
Shield Study
Tracking
(firefox107+)
RESOLVED
FIXED
| Tracking | Status | |
|---|---|---|
| firefox107 | + | --- |
People
(Reporter: experimenter, Assigned: k88hudson)
References
()
Details
User Story
Delivery Type: Add-on experiment
What are the branches of the experiment:
- Control dns-study.com 100%:
This is the version of the add-on which configures requests for dns-study.com (v3.2.0)
What version and channel do you intend to ship to?
1% of Release Firefox 105.0 to 110.0
Are there specific criteria for participants?
Prefs:
Experiments:
Any additional filters: Please ignore clients that have disabled telemetry.
Countries: all
Locales: all
What is your intended go live date and how long will the experiment run?
Dec 02, 2022 - Dec 09, 2022 (7 days)
What is the main effect you are looking for and what data will you use to
make these decisions?
Concretely, there are two questions we intend to answer:
1. How frequently do middleboxes between clients and recursive resolvers interfere with/drop DNSSEC record types? In other words, is it viable for Firefox to perform DNSSEC validation?
2. Do other record types (e.g. SMIMEA and an unallocated code point) get interfered with/dropped by middleboxes? In other words, is it viable to introduce new record types in a finite period of time?
3. Do certain populations of clients or ISPs experience higher failure rates?
At a high-level, both questions can be answered for each record type with the following analysis steps:
1. For each client, extract the DNS responses reported in each ping for a given record type
2. For a given record type, compare the bytes for the DNS response reported in each ping to the expected response across sessions
3. For a given record type, compute the percentage of DNS responses that do not match the expected response across sessions
4. For a given record type, compute the percentage of missing DNS responses across sessions
Who is the owner of the data analysis for this experiment?
None
Will this experiment require uplift?
False
QA Status of your code:
QA Status: YELLOW for more information see https://docs.google.com/document/d/1P2GuNLPU6B5c184eNQeQ5GerHsVzYqZ4BYEIBXrg-fQ/edit
Link to more information about this experiment:
https://experimenter.services.mozilla.com/experiments/dnssec-interference-measurement-with-per-client-measurements-v4/
DNSSEC Interference Measurement V4
We intend to measure rates of interference with DNSSEC record types by network middleboxes compared to other DNS record types.
Experimenter is the source of truth for details and delivery. Changes to Bugzilla are not reflected in Experimenter and will not change delivery configuration.
Data Science Issue: https://mozilla-hub.atlassian.net/browse/DS-12345
More information: https://experimenter.services.mozilla.com/experiments/dnssec-interference-measurement-with-per-client-measurements-v4/
| Assignee | ||
Comment 1•3 years ago
|
||
[Tracking Requested - why for this release]:
tracking-firefox107:
--- → ?
Updated•3 years ago
|
| Reporter | ||
Updated•3 years ago
|
User Story: (updated)
Summary: [Experiment]: Add-On Experiment: DNSSEC Interference Measurement V4 → [Experiment] Add-On Experiment: DNSSEC Interference Measurement V4 Fx 105.0 to 110.0 Release
| Reporter | ||
Comment 2•3 years ago
|
||
Start Date: 2022-12-02 End Date: 2022-12-09
| Reporter | ||
Updated•3 years ago
|
Status: NEW → RESOLVED
Closed: 3 years ago
Resolution: --- → FIXED
You need to log in
before you can comment on or make changes to this bug.
Description
•