Fair enough. You will see that text in the next version of the draft.

                                        Ron


From: C. M. Heard <he...@pobox.com>
Sent: Friday, June 1, 2018 12:01 PM
To: Ron Bonica <rbon...@juniper.net>
Cc: draft-intarea-frag authors <draft-bonica-intarea-frag-frag...@ietf.org>; 
int-area <int-area@ietf.org>
Subject: Re: draft-bonica-intarea-frag-fragile-01

On Thu, May 31, 2018 at 12:39 PM, Ron Bonica 
<rbon...@juniper.net<mailto:rbon...@juniper.net>> wrote:
In Section 6.1, DNS, please note that 
draft-ietf-tsvwg-udp-options<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dietf-2Dtsvwg-2Dudp-2Doptions&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-AWF2EfpHcAwrDThKP8&m=J_pOJLHC_gbCzzfyeW8omX8B8j4T6I07igUCmsA7vPg&s=l9Z0Kh7PKrF4seGUMRn2kViHzJspMRaoNPTKtZ62uIs&e=>
 may offer an incrementally deployable solution to the problem of oversize DNS 
responses. As far as I know, this specific use case is not yet documented in 
any I-D, but the basic idea is that a client would indicate its willingness to 
accept a UDP-fragmented response by including in its (unfragmented) request a 
UDP options trailer with the FRAG option as specified on 
page-15<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dietf-2Dtsvwg-2Dudp-2Doptions-2D02-23page-2D15&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-AWF2EfpHcAwrDThKP8&m=J_pOJLHC_gbCzzfyeW8omX8B8j4T6I07igUCmsA7vPg&s=VyqM-WCNZiwxsDRAU9buCv7rxPTo9FyDxsWRLlwh_T8&e=>
 of draft-ietf-tsvwg-udp-options. A server that does not implemented UDP 
options would ignore the options trailer and use IP-layer fragmentation for 
large responses; a server that implements UDP options would use UDP-layer 
fragmentation for large responses.

RB> While I agree, such a recommendation might be overstepping my charter. 
Isn’t that a decision for another WG?

Fair enough. But it might be worth noting possible solutions, Let me offer the 
following proposal for your consideration.

OLD:

   DNS Servers that execute DNSSEC 
[RFC4035<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc4035&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-AWF2EfpHcAwrDThKP8&m=3hdRdqDKogUrFAnsk2PVA1XtzMKf_uOyyPaQJlIYrm4&s=iVOGnO8g0kR-YbEW_OTY3jl0QbFKxAgT9ClrD0JOs4c&e=>]
 procedures are more likely

   to generate large responses.  Therefore, when running over UDP, they

   are more likely to cause the generation of IPv6 fragments.  DNS's

   reliance upon IPv6 fragmentation is fundamental and cannot be broken

   without changing the DNS specification.

NEW:

   DNS Servers that execute DNSSEC 
[RFC4035<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc4035&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-AWF2EfpHcAwrDThKP8&m=3hdRdqDKogUrFAnsk2PVA1XtzMKf_uOyyPaQJlIYrm4&s=iVOGnO8g0kR-YbEW_OTY3jl0QbFKxAgT9ClrD0JOs4c&e=>]
 procedures are more likely

   to generate large responses.  Therefore, when running over UDP, they

   are more likely to cause the generation of IPv6 fragments.  DNS's

   reliance upon IPv6 fragmentation is fundamental and cannot be fully

   eliminated without changing the DNS specification, e.g., by adding

   UDP or application layer fragmentation, or by measures such as those

   described in 
https://tools.ietf.org/html/draft-song-atr-large-resp<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dsong-2Datr-2Dlarge-2Dresp&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-AWF2EfpHcAwrDThKP8&m=3hdRdqDKogUrFAnsk2PVA1XtzMKf_uOyyPaQJlIYrm4&s=F3W3ZMZQZDYsg1U-raZas8QM5l0vc5udsEs0xl5KmAg&e=>.


Section 4.4, Security Vulnerabilities: please cite RFC 3828 in addition to RFC 
1858 in both places where the latter is cited.

RB> Are you sure that you want me to reference 3828 (UDP lite)? I don’t see the 
connection.

 That was a typo. I meant RFC 
3128<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc3128&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-AWF2EfpHcAwrDThKP8&m=3hdRdqDKogUrFAnsk2PVA1XtzMKf_uOyyPaQJlIYrm4&s=-9XQRL7WMoI5EfSks-E5b7h92F__gRQhbMBCL284Tj8&e=>.
 Sorry about that.

Mike Heard
_______________________________________________
Int-area mailing list
Int-area@ietf.org
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to