On Thu, May 31, 2018 at 12:39 PM, Ron Bonica <rbon...@juniper.net> wrote:
>
> In Section 6.1, *DNS*, please note that draft-ietf-tsvwg-udp-options
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dietf-2Dtsvwg-2Dudp-2Doptions&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-AWF2EfpHcAwrDThKP8&m=J_pOJLHC_gbCzzfyeW8omX8B8j4T6I07igUCmsA7vPg&s=l9Z0Kh7PKrF4seGUMRn2kViHzJspMRaoNPTKtZ62uIs&e=>
>  may
> offer an *incrementally deployable* solution to the problem of oversize
> DNS responses. As far as I know, this specific use case is not yet
> documented in any I-D, but the basic idea is that a client would indicate
> its willingness to accept a UDP-fragmented response by including in its
> (unfragmented) request a UDP options trailer with the FRAG option as
> specified on page-15
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dietf-2Dtsvwg-2Dudp-2Doptions-2D02-23page-2D15&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-AWF2EfpHcAwrDThKP8&m=J_pOJLHC_gbCzzfyeW8omX8B8j4T6I07igUCmsA7vPg&s=VyqM-WCNZiwxsDRAU9buCv7rxPTo9FyDxsWRLlwh_T8&e=>
>  of draft-ietf-tsvwg-udp-options. A server that does not implemented UDP
> options would ignore the options trailer and use IP-layer fragmentation for
> large responses; a server that implements UDP options would use UDP-layer
> fragmentation for large responses.
>
>
>
> RB> While I agree, such a recommendation might be overstepping my charter..
> Isn’t that a decision for another WG?
>

Fair enough. But it might be worth noting possible solutions, Let me offer
the following proposal for your consideration.

OLD:

   DNS Servers that execute DNSSEC [RFC4035
<https://tools.ietf.org/html/rfc4035>] procedures are more likely
   to generate large responses.  Therefore, when running over UDP, they
   are more likely to cause the generation of IPv6 fragments.  DNS's
   reliance upon IPv6 fragmentation is fundamental and cannot be broken
   without changing the DNS specification.


NEW:

   DNS Servers that execute DNSSEC [RFC4035
<https://tools.ietf.org/html/rfc4035>] procedures are more likely
   to generate large responses.  Therefore, when running over UDP, they
   are more likely to cause the generation of IPv6 fragments.  DNS's
   reliance upon IPv6 fragmentation is fundamental and cannot be fully
   eliminated without changing the DNS specification, e.g., by adding

   UDP or application layer fragmentation, or by measures such as those
   described in https://tools.ietf.org/html/draft-song-atr-large-resp.




> Section 4.4, *Security Vulnerabilities:* please cite RFC 3828 in addition
> to RFC 1858 in both places where the latter is cited.
>
>
>
> RB> Are you sure that you want me to reference 3828 (UDP lite)? I don’t
> see the connection.
>

 That was a typo. I meant RFC 3128 <https://tools.ietf.org/html/rfc3128>.
Sorry about that.

Mike Heard
_______________________________________________
Int-area mailing list
Int-area@ietf.org
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to