Viktor,

> On 11 Jul 2023, at 01:11, Viktor Dukhovni <ietf-d...@dukhovni.org> wrote:
> 
> On Mon, Jul 10, 2023 at 03:48:34PM -0700, internet-dra...@ietf.org wrote:
> 
>> A New Internet-Draft is available from the on-line Internet-Drafts
>> directories. This Internet-Draft is a work item of the Domain Name
>> System Operations (DNSOP) WG of the IETF.
>> 
>>   Title           : DNS Error Reporting
>>   Authors         : Roy Arends
>>                     Matt Larson
>>   Filename        : draft-ietf-dnsop-dns-error-reporting-05.txt
>>   Pages           : 11
>>   Date            : 2023-07-10
> 
> Some comments on on the -05 update.
> 
> * Spelling:  s/unsollicited/unsolicited/

Ack. Will fix.

> 
> * Substance: The new text suggests using TCP **and** cookies:
> 
>       Resolvers that send error reports SHOULD send these over TCP
>       [RFC7766] and SHOULD use DNS COOKIEs [RFC7873].  This makes it
>       hard to falsify the source address.  The monitoring agent SHOULD
>       respond to queries received over UDP with the truncation bit (TC
>       bit) set to challenge the resolver to re-query over TCP.
> 
>    I don't believe it is at all common to combine TCP with cookies,
>    typically cookies are used over UDP, with fallback to TCP (sans
>    cookies) if the server's cookie is missing or invalid.
> 
>    So above should be "either TCP **or** COOKIES".  If error reports are
>    infrequent no recent cookies will be cached for the monitoring agent,
>    and obtaining a cookie will require a round trip.  So perhaps simplest
>    to just use TCP.

Will fix.

> I don't yet see any text about rate-limiting of reports beyond per
> qname/qtype/info-code caching.  And yet the resolver has significant
> additional context:
> 
>    - The IP address of the problem nameserver.
> 
>        * It can rate-limit the frequency of reports per nameserver IP.
> 
>    - The server zone.
> 
>        * It can rate-limit the frequency of reports per zone.
> 
> The per IP limit can be significantly more "generous", than the per-zone
> limit, because some nameservers serve O(1M) zones, of which a few
> thousand might exhibit a problem, while the server's overall health is
> fine.  Reports for many different qnames in the same zone are likely
> to be substantially redundant.

If the resolver has rate-limiting features, it should apply them to these 
queries as well, and not ring fence these queries as special. I am not willing 
to over-specify the resolver behaviour for this. 

I am willing to specify that any rate limiting features should also apply to 
these queries.

Roy







_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to