> One other issue around DO is that it was introduced to signal "understanding"
> of DNSSEC as per RFC 2535. The reaction of hypothetical 2535 only
> resolvers to DNSSECbis responses is to be explored. I vaguely remember that
> we've had this discussion of versioning the DO "bit".
It's
On Wed, Aug 20, 2008 at 04:06:05PM -0700, David Conrad wrote:
> - if the advertised EDNS0 buffer size is not large enough, it will
> trigger truncation and, as a result, an increase in the number of TCP
> sessions going to the root.
assumed that it's reasonable to focus on referrals and NXDOM