In message <c3de0a330905280804t56ca87dapd94281399202...@mail.gmail.com>, Bobby 
Mac writes:
> Not entirely on subject but....  I thought that allowing DNS queries to
> occur via TCP is mission critical for simple mail routing.  We ran across
> this back in the day at @Home Network.  Firewall rules were changed to not
> allow port 53 TCP.  This severely affected sending mail to large
> distribution lists.  Here is what we found and forgive me if I don't go into
> too much detail as it was almost 10 years a go.

        As I said, sites just don't do this as it causes serious
        problems.  Sites that disable TCP/53 outbound just end up
        re-enabling it.  Nameservers and stub resolvers automatically
        retry with TCP and the client applications just don't get
        answers returned when you start blocking TCP/53 outbound.
        It doesn't take long for said stupidity to be reversed.
 
> If you add enough recipients to an email, each domain within the send line
> needs to have an associated MX record.  DNS by default starts with UDP which
> has a limit to the datagram size (64bit). A flag is placed in the
> header which then requires the request to be sent via TCP (160bit V4).  Now
> that single query can be split up into many different packets providing that
> the request is more than the 160 bit and obviously IPV6 offers even more
> information contained in a single packet.

        The number of recipients has no impact on the size of the
        DNS responses.  It will have a impact on the number of DNS
        queries made iff the receipents are in multiple mail domains.

        Mark
 
> -BobbyJim
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org

Reply via email to