Hi all,
Some tools uses packet capturing to do statistics for DNS and some of
them needs to see the beginning of the TCP sessions. If resolver systems
out there start keeping TCP session against authorities open for a very
long time (days or weeks) then it might become a problem for these tools.
We would like to look at two things;
1) First to poke at data to see if there are very long-lived TCP
sessions out there today, or not(!) which is equally interesting to know.
2) Second to survey DNS statistics tools out there to see how they
handle long-lived TCP sessions to understand how wide a problem this
might be, if any. And maybe fix some of them if issues are spotted when
doing this.
Sounds interesting? Do you have data to poke at? Hope to see you at the
hackathon then! :)
Cheers,
Jerry Lundström & Roy Arends
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop