I haven’t seen a final draft yet, so hopefully it’s not too late to suggest 
further additions :)

A talk [1] at DNS OARC 42 this morning reminded me of a common pitfall we might 
do well to point out in the document.


Beware of state in the network!

State holding middleware, e.g. firewalls, load-balancers, whether in discrete 
devices, or local to the nameserver host itself, e.g. connection tracking in 
Linux netfilter, often come with a default configuration not tuned in 
expectation of the high volumes of UDP seen at a DNS server. A typical failure 
scenario sees state tables are overrun, resulting in dropped packets.

Careful consideration should be made in regard to tuning how state is held in 
the network, is it needed at all?


dave


[1]

Real world challenges with large responses, truncation, and TCP

<https://indico.dns-oarc.net/event/48/contributions/1036/>
-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/dns-wg

Reply via email to