My quick comments on Olafur's ...

On Tue, Aug 19, 2025 at 12:56 PM Olafur Gudmundsson <o...@ogud.com> wrote:

>
> I’m reviewing the html document as I have forgot how to read XML bloat,
>
> Affiliation: do I really need one ?
> OLD:
>
> Retired/Unaffiliated
>
>
> NEW:
>
> Retired/formerly Cloudflare
>
> or
>
> NEW:
>
>
I'll defer to the RFC Editor about whether an affiliation is needed.

If one is, then your proposed "Retired/formerly Cloudflare" sounds fine to
me.

Comment:
>
> I hate reading RFC’s where lower case of RFC2119 words appears in a section 
> that has RFC2119 words, see the 3 used of should in section 3.5 that
>
> reads like a specification section not as guidance section
>
> Section 3.5 paragraph 1
>
> OLD:
>
> that should not appear
>
> NEW:
>
> that SHOULD NOT appear
>
>
> Section 3.5 paragraph 1
>
> OLD:
>
> response should be.
>
> NEW:
>
> response ought to be.
>
>
> Section 3.5 paragraph 2
>
> OLD:
>
> resolver should not forward
>
> NEW:
>
> resolver SHOULD NOT forward
>
>
> Section 3.5 paragraph 3
>
> OLD:
>
> type that should not appear
>
>
> NEW:
>
> type that ought not appear
>
>
> Section 4. paragraph 3
>
> OLD:
>
> The NSEC3 parameters should be set to algorithm 1
>
> NEW:
>
> The NSEC3 parameters SHOULD be set to algorithm 1
>
>
All of the above upper-casing of RFC 2119 keywords sound good to me.


> Section 7.1
>
> OLD:
>
> insists that pseudo-types must be clear
>
> NEW:
>
> insists that pseudo-types are not set
>
>
Ok.

The "must be clear" phrasing came from re-using the phrasing in the
original RFC text. But I'm not attached to it.

Section: 2 paragraph 3
>
> OLD:
>
> in addition to the required RRSIG
>
> NEW:
>
> in addition to the mandated RRSIG
>
>
Ok.


> Other points:
>
> Section 4: redundant word confuses message
>
> OLD:
>
> This protection is already better provided
>
> NEW:
>
> This protection is better provided
>
>
Ok.

Section 3.1 bad guidance on TTL value
>
> OLD:
>
> a.example.com. 3600 IN NSEC \000.a.example.com. RRSIG NSEC NXNAME
>
>
> NEW:
>
> a.example.com. 300 IN NSEC \000.a.example.com. RRSIG NSEC NXNAME
>
>
> Section 3.4 (bad TTL guidance)
>
> OLD:
>
> sub.example.com. 3600 IN NSEC sub\000.example.com. NS RRSIG NSEC
>
>
> NEW:
>
> sub.example.com. 300 IN NSEC sub\000.example.com. NS RRSIG NSEC
>
>
>
>
I'm fine with changing the TTL value from 3600 to 300 in these examples.

But as you might suspect, I don't agree with your assertion that  3600 is
"bad TTL guidance". In fact I don't believe there is any general agreement
in the DNS operator or protocol engineering community about longer TTLs
being bad (or good). There are strong opinions in either direction. In my
own organization, TTLs we select are situation dependent. Some
configurations benefit from lower TTLs (load balancers etc), others benefit
from longer. As a counterpoint to your assertion, there are many technical
papers and diatribes out there, for example this one:
https://00f.net/2019/11/03/stop-using-low-dns-ttls/

At any rate, this RFC does not intend to express an opinion on the topic of
what TTL values are good or bad, nor should it. So we don't not need to
belabor the point. I'm good with your suggestion of changing the TTL in the
example to 300.

I will wait for others to comment on those suggested changes before
giving my approval
>
> Olafur
>
>
Done!

Please approve and let's ship this doc!

Shumon.
-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to