Hi all,

Some tools uses packet capturing to do statistics for DNS and some of them needs to see the beginning of the TCP sessions. If resolver systems out there start keeping TCP session against authorities open for a very long time (days or weeks) then it might become a problem for these tools.

We would like to look at two things;
1) First to poke at data to see if there are very long-lived TCP sessions out there today, or not(!) which is equally interesting to know. 2) Second to survey DNS statistics tools out there to see how they handle long-lived TCP sessions to understand how wide a problem this might be, if any. And maybe fix some of them if issues are spotted when doing this.

Sounds interesting? Do you have data to poke at? Hope to see you at the hackathon then! :)

Cheers,
Jerry Lundström & Roy Arends

_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to