Dear Kazunori,

We have noted your approval on the AUTH48 status page for this document 
(https://www.rfc-editor.org/authors/rfc9715-diff.html). 

We now have all of the necessary approvals and will move this document forward 
in the publication process.

Thank you to all for your time!

Best regards,
RFC Editor/kc

> On Jan 23, 2025, at 12:31 AM, Kazunori Fujiwara <fujiw...@jprs.co.jp> wrote:
> 
> Dear RFC Editor,
> 
> This revision is OK for me.
> Please proceed.
> 
> --
> Kazunori Fujiwara, JPRS <fujiw...@jprs.co.jp>
> 
>> From: Karen Moore <kmo...@staff.rfc-editor.org>
>> Dear Paul,
>> 
>> Thank you for your reply. We believe that this signifies your approval of 
>> the document, so we have marked your approval on the AUTH48 status page 
>> (https://www.rfc-editor.org/auth48/rfc9715). If that is not correct and you 
>> need more time for review, please let us know.
>> 
>> We now await approval from Kazunori prior to moving forward with the 
>> publication process.
>> 
>> Best regards,
>> RFC Editor/kc
>> 
>>> On Jan 22, 2025, at 12:21 PM, p...@redbarn.org wrote:
>>> 
>>> Nothing from me.
>>> 
>>> Sent from Workspace ONE Boxer
>>> 
>>> On Jan 22, 2025 11:01, Karen Moore <kmo...@staff.rfc-editor.org> wrote:
>>> Hi Warren, 
>>> 
>>> Thank you for your quick reply. We have noted your approval on the AUTH48 
>>> status page for this document (https://www.rfc-editor.org/auth48/rfc9715). 
>>> 
>>> We now await approvals (or further updates if needed) from Kazunori and 
>>> Paul. 
>>> 
>>> Best regards, 
>>> RFC Editor/kc 
>>> 
>>>> On Jan 22, 2025, at 10:40 AM, Warren Kumari <war...@kumari.net> wrote: 
>>>> 
>>>> On Tue, Jan 21, 2025 at 6:05 PM, Karen Moore <kmo...@staff.rfc-editor.org> 
>>>> wrote: 
>>>> Dear Kazunori and *Warren (AD), 
>>>> 
>>>> We have made your suggested update (see Appendix C.1). Please review the 
>>>> updated file and let us know if any further changes are needed or if you 
>>>> approve the document in its current form. 
>>>> 
>>>> *Warren, please review the following update (removal of text) and let us 
>>>> know if you approve. The change is highlighted below and can also be 
>>>> viewed here: https://www.rfc-editor.org/authors/rfc9715-auth48diff.html. 
>>>> 
>>>> Yes, thank you, I approve. 
>>>> 
>>>> W 
>>>> 
>>>> 
>>>> OLD: 
>>>> For R5, BIND 9 uses the edns-buf-size option, with the default of 1232. 
>>>> 
>>>> BIND 9 does implement R6. 
>>>> 
>>>> For R7, after two UDP timeouts, BIND 9 will fall back to TCP. 
>>>> 
>>>> 
>>>> NEW: 
>>>> For R5, BIND 9 uses the edns-buf-size option, with the default of 1232. 
>>>> 
>>>> For R7, after two UDP timeouts, BIND 9 will fall back to TCP. 
>>>> 
>>>> —Files (please refresh)— 
>>>> 
>>>> 
>>>> The updated XML file is here: 
>>>> https://www.rfc-editor.org/authors/rfc9715.xml 
>>>> 
>>>> 
>>>> The updated output files are here: 
>>>> https://www.rfc-editor.org/authors/rfc9715.txt 
>>>> https://www.rfc-editor.org/authors/rfc9715.pdf 
>>>> https://www.rfc-editor.org/authors/rfc9715.html 
>>>> 
>>>> This diff file shows all changes made during AUTH48: 
>>>> https://www.rfc-editor.org/authors/rfc9715-auth48diff.html 
>>>> 
>>>> These diff files show only the changes made during the last edit round: 
>>>> https://www.rfc-editor.org/authors/rfc9715-lastdiff.html 
>>>> https://www.rfc-editor.org/authors/rfc9715-lastrfcdiff.html (side by side) 
>>>> 
>>>> 
>>>> This diff file shows all changes made to date: 
>>>> https://www.rfc-editor.org/authors/rfc9715-diff.html 
>>>> 
>>>> 
>>>> Best regards, 
>>>> RFC Editor/kc 
>>>> 
>>>> On Jan 21, 2025, at 12:54 AM, Kazunori Fujiwara <fujiw...@jprs.co.jp> 
>>>> wrote: 
>>>> 
>>>> Dear RFC Editor, 
>>>> 
>>>> 
>>>> Current version is almost OK for me. 
>>>> I would like to make an edit to remove one line. 
>>>> 
>>>> 
>>>> Please remove a line at Appendix C.1. 
>>>> Current: BIND 9 does implement R6 (Section 3.2). 
>>>> 
>>>> I attach edited XML file. 
>>>> 
>>>> Regards, 
>>>> 
>>>> 
>>>> -- 
>>>> Kazunori Fujiwara, JPRS <fujiw...@jprs.co.jp> 
>>>> 
>>>> From: Karen Moore <kmo...@staff.rfc-editor.org> Dear Kazunori and Paul, 
>>>> 
>>>> Thank you for your replies. We have updated our files based on your 
>>>> feedback. Note that we updated “EDNS0” to “EDNS(0)”and the recommendation 
>>>> numbers to reflect “R#”. Please review the changes (especially Appendix 
>>>> C.1 to ensure we updated the text as desired), and let us know if any 
>>>> further updates are needed or if you approve the document in its current 
>>>> form. 
>>>> 
>>>> —Files— 
>>>> 
>>>> 
>>>> The updated XML file is here: 
>>>> https://www.rfc-editor.org/authors/rfc9715.xml 
>>>> 
>>>> 
>>>> The updated output files are here: 
>>>> https://www.rfc-editor.org/authors/rfc9715.txt 
>>>> https://www.rfc-editor.org/authors/rfc9715.pdf 
>>>> https://www.rfc-editor.org/authors/rfc9715.html 
>>>> 
>>>> This diff file shows all changes made during AUTH48: 
>>>> https://www.rfc-editor.org/authors/rfc9715-auth48diff.html 
>>>> 
>>>> 
>>>> This diff file shows all changes made to date: 
>>>> https://www.rfc-editor.org/authors/rfc9715-diff.html 
>>>> 
>>>> Note that it may be necessary for you to refresh your browser to view the 
>>>> most recent version. Please review the document carefully to ensure 
>>>> satisfaction as we do not make changes once it has been published as an 
>>>> RFC. 
>>>> 
>>>> We will await approvals from each author prior to moving forward in the 
>>>> publication process. 
>>>> 
>>>> For the AUTH48 status of this document, please see: 
>>>> https://www.rfc-editor.org/auth48/rfc9715 
>>>> 
>>>> 
>>>> Thank you, 
>>>> RFC Editor/kc 
>>>> 
>>>> On Jan 16, 2025, at 2:20 AM, Kazunori Fujiwara via auth48archive 
>>>> <auth48archive@rfc-editor.org> wrote: 
>>>> 
>>>> Dear RFC Editor, 
>>>> 
>>>> Thanks very much for your excellent rewrites. 
>>>> 
>>>> I will answer in-line as a first, quick response to proceed. 
>>>> 
>>>> 
>>>> From: rfc-edi...@rfc-editor.org 
>>>> Authors, 
>>>> 
>>>> While reviewing this document during AUTH48, please resolve (as necessary) 
>>>> the following questions, which are also in the XML file. 
>>>> 
>>>> 1) <!--[rfced] We have updated the short title that spans the header of 
>>>> the PDF file from "avoid-fragmentation" to "Avoid IP Fragmentation". 
>>>> Please review and let us know if any further changes are desired. 
>>>> 
>>>> 
>>>> Original: 
>>>> avoid-fragmentation 
>>>> 
>>>> 
>>>> Current: 
>>>> Avoid IP Fragmentation 
>>>> --> 
>>>> 
>>>> Agree. 
>>>> 
>>>> 2) <!-- [rfced] Please insert any keywords (beyond those that appear in 
>>>> the title) for use on https://www.rfc-editor.org/search. --> 
>>>> 
>>>> I think "DNS" and "IP Fragmentation" are key words. 
>>>> 
>>>> Some RFCs that show attack countermeasures include "attack". 
>>>> 
>>>> 3) <!--[rfced] How may we make these sentences clearer? Specifically, what 
>>>> does "other end" refer to in "keep it within the other end's MSS" - is it 
>>>> the other end of the segment? Also, does "as to how much queued data will 
>>>> fit" mean "depending on how much queued data will fit"? Please advise. 
>>>> 
>>>> 
>>>> Original: 
>>>> For each transmitted segment, the size of the IP and TCP headers is known, 
>>>> and the IP packet size can be chosen to keep it within the estimated MTU 
>>>> and the other end's MSS. This takes advantage of the elasticity of TCP's 
>>>> packetizing process as to how much queued data will fit into the next 
>>>> segment. 
>>>> 
>>>> 
>>>> Perhaps: 
>>>> For each transmitted segment, the size of the IP and TCP headers is known, 
>>>> and the IP packet size can be chosen to keep it within the estimated MTU 
>>>> and the MSS of the other end of the segment. This takes advantage of the 
>>>> elasticity of the TCP's packetizing process, depending on how much queued 
>>>> data will fit into the next segment. 
>>>> --> 
>>>> 
>>>> The proposed text is roughly fine, but I think it would be better to 
>>>> delete "of the segment" from "the MSS of the other end of the segment." 
>>>> 
>>>> 4) <!-- [rfced] FYI: In Section 2, we placed the definitions that are 
>>>> direct quotes within the <blockquote> element, and we updated the text 
>>>> slightly to exactly match the quoted text in RFCs 6891 and 8201. Please 
>>>> review and let us know of any concerns. 
>>>> 
>>>> 
>>>> Original: 
>>>> "Requestor" refers to the side that sends a request. "Responder" refers to 
>>>> an authoritative server, recursive resolver or other DNS component that 
>>>> responds to questions. (Quoted from EDNS0 [RFC6891]) 
>>>> 
>>>> "Path MTU" is the minimum link MTU of all the links in a path between a 
>>>> source node and a destination node. (Quoted from [RFC8201]) 
>>>> 
>>>> 
>>>> Current: 
>>>> The definitions of "requestor" and "responder" are per [RFC6891]: 
>>>> 
>>>> "Requestor" refers to the side that sends a request. "Responder" refers to 
>>>> an authoritative, recursive resolver or other DNS component that responds 
>>>> to questions. 
>>>> 
>>>> The definition of "path MTU" is per [RFC8201]: 
>>>> 
>>>> 
>>>> path MTU [is] the minimum link MTU of all the links in a path between a 
>>>> source node and a destination node. 
>>>> --> 
>>>> 
>>>> Agree. 
>>>> 
>>>> 5) <!--[rfced] Section 3.2. We find the use of "should/may" confusing. Is 
>>>> using only "should" or "may" acceptable? Please advise. 
>>>> 
>>>> 
>>>> Original: 
>>>> R6. UDP requestors should/may drop fragmented DNS/UDP responses without IP 
>>>> reassembly to avoid cache poisoning attacks (at firewall function). 
>>>> 
>>>> 
>>>> Perhaps: 
>>>> R6. UDP requestors may drop fragmented DNS/UDP responses without IP 
>>>> reassembly to avoid cache poisoning attacks (at the firewall function). 
>>>> --> 
>>>> 
>>>> This draft is "Informational". Then, ideally, please change to "should". 
>>>> 
>>>> 6) <!-- [rfced] For clarity, may we update the following sentence as shown 
>>>> below since some of the text is a direct quote from RFC 8085? 
>>>> 
>>>> 
>>>> Current: 
>>>> In Section 3.2 (Message Side Guidelines) of UDP Usage Guidelines [RFC8085] 
>>>> we are told that an application SHOULD NOT send UDP datagrams that result 
>>>> in IP packets that exceed the Maximum Transmission Unit (MTU) along the 
>>>> path to the destination. 
>>>> 
>>>> 
>>>> Perhaps: 
>>>> Section 3.2 of [RFC8085] states that "an application SHOULD NOT send UDP 
>>>> datagrams that result in IP packets that exceed the Maximum Transmission 
>>>> Unit 
>>>> (MTU) along the path to the destination". 
>>>> --> 
>>>> 
>>>> Agree. 
>>>> 
>>>> 7) <!-- [rfced] Informative Reference URLs 
>>>> 
>>>> 
>>>> a) We found the following URL for [Brandt2018]: 
>>>> https://dl.acm.org/doi/10.1145/3243734.3243790. 
>>>> May we update this reference to use this URL? 
>>>> 
>>>> 
>>>> Original: 
>>>> [Brandt2018] 
>>>> Brandt, M., Dai, T., Klein, A., Shulman, H., and M. Waidner, "Domain 
>>>> Validation++ For MitM-Resilient PKI", Proceedings of the 2018 ACM SIGSAC 
>>>> Conference on Computer and Communications Security , 2018. 
>>>> 
>>>> 
>>>> Perhaps: 
>>>> [Brandt2018] 
>>>> Brandt, M., Dai, T., Klein, A., Shulman, H., and M. Waidner, "Domain 
>>>> Validation++ For MitM-Resilient PKI", Proceedings of the 2018 ACM SIGSAC 
>>>> Conference on Computer and Communications Security, pp. 2060-2076, 
>>>> DOI 10.1145/3243734.3243790, October 2018, 
>>>> <https://dl.acm.org/doi/10.1145/3243734.3243790>. 
>>>> 
>>>> 
>>>> b) We found the following URL for [Herzberg2013]: 
>>>> https://ieeexplore.ieee.org/document/6682711. 
>>>> May we update this reference to use this URL? 
>>>> 
>>>> 
>>>> Original: 
>>>> [Herzberg2013] 
>>>> Herzberg, A. and H. Shulman, "Fragmentation Considered Poisonous", IEEE 
>>>> Conference on Communications and Network Security , 2013. 
>>>> 
>>>> 
>>>> Perhaps: 
>>>> [Herzberg2013] 
>>>> Herzberg, A. and H. Shulman, "Fragmentation Considered Poisonous, or: 
>>>> One-domain-to-rule-them-all.org", IEEE Conference on Communications and 
>>>> Network Security (CNS), DOI 10.1109/CNS.2013.6682711, 2013, 
>>>> <https://ieeexplore.ieee.org/document/6682711>. 
>>>> 
>>>> 
>>>> c) We found the following URL for [Fujiwara2018]: 
>>>> https://indico.dns-oarc.net/event/31/contributions/692/ 
>>>> attachments/660/1115/fujiwara-5.pdf. May we update this reference to use 
>>>> this URL? 
>>>> 
>>>> 
>>>> Original: 
>>>> [Fujiwara2018] 
>>>> Fujiwara, K., "Measures against cache poisoning attacks using IP 
>>>> fragmentation in DNS", OARC 30 Workshop , 2019. 
>>>> 
>>>> 
>>>> Perhaps: 
>>>> [Fujiwara2018] 
>>>> Fujiwara, K., "Measures against DNS cache poisoning attacks using IP 
>>>> fragmentation", OARC 30 Workshop, 2019, 
>>>> <https://indico.dns-oarc.net/event/31/contributions/692/ 
>>>> attachments/660/1115/fujiwara-5.pdf>. 
>>>> 
>>>> 
>>>> d) We found the following URL for [Huston2021]: 
>>>> https://indico.dns-oarc.net/event/37/contributions/806/ 
>>>> attachments/782/1366/2021-02-04-dns-flag.pdf. May we add this URL to the 
>>>> reference? 
>>>> 
>>>> 
>>>> Original: 
>>>> [Huston2021] 
>>>> Huston, G. and J. Damas, "Measuring DNS Flag Day 2020", OARC 34 Workshop , 
>>>> February 2021. 
>>>> 
>>>> 
>>>> Perhaps: 
>>>> [Huston2021] 
>>>> Huston, G. and J. Damas, "Measuring DNS Flag Day 2020", OARC 34 Workshop, 
>>>> February 2021, <https://indico.dns-oarc.net/ 
>>>> event/37/contributions/806/attachments/782/1366/2021-02-04-dns-flag.pdf> 
>>>> --> 
>>>> 
>>>> I agree all fixes. 
>>>> 
>>>> 8) <!--[rfced] FYI: To match the quoted text in Section 3 of RFC 4035, we 
>>>> updated the text below to include a reference to RFC 2671, and we listed 
>>>> RFC 2671 as an informative reference. 
>>>> 
>>>> 
>>>> Original: 
>>>> [RFC4035] defines that "A security-aware name server MUST support the 
>>>> EDNS0 message size extension, MUST support a message size of at least 1220 
>>>> octets". 
>>>> 
>>>> 
>>>> Current: 
>>>> [RFC4035] states that "A security-aware name server MUST support the EDNS0 
>>>> ([RFC2671]) message size extension, [and it] MUST support a message size 
>>>> of at least 1220 octets". 
>>>> --> 
>>>> 
>>>> Agree. 
>>>> 
>>>> 
>>>> 9) <!--[rfced] Regarding Appendix C ("Known Implementations"), is it your 
>>>> intention that this section remain in the RFC? The reason we ask is 
>>>> because RFC 7942 recommends removing it but also states that it is not 
>>>> mandatory to remove it. 
>>>> --> 
>>>> 
>>>> This document was changed from BCP to Informational due to implementation 
>>>> concerns. I would like to keep Appendix C since it is relevant in this 
>>>> situation. 
>>>> 
>>>> 10) <!--[rfced] Since this document is "Informational", is it correct to 
>>>> state that this specification defines "best practices", or does this text 
>>>> need an update to avoid any confusion? 
>>>> 
>>>> 
>>>> Original: 
>>>> This section records the status of known implementations of these best 
>>>> practices defined by this specification at the time of publication, and 
>>>> any deviation from the specification. 
>>>> --> 
>>>> 
>>>> This part remains the same as when the intended status was BCP. It is an 
>>>> oversight. 
>>>> 
>>>> Please change "best practices defined by this specification" as "proposed 
>>>> recommendations described in Section 3". 
>>>> 
>>>> 11) <!-- [rfced] Appendix C.1 
>>>> 
>>>> 
>>>> a) We notice inconsistencies with the recommendation numbers, for example, 
>>>> "recommendation R6", "recommendation 2", and "R5". May we use "R#" for 
>>>> consistency below and throughout the document? Please let us know your 
>>>> preference. 
>>>> 
>>>> 
>>>> Authors intended R# to be unique and consistent in the document. However, 
>>>> part of Appendix C were forgotten to be updated. We need to refer 
>>>> draft-ietf-dnsop-avoid-fragmentation-12, 
>>>> "Appendix D. Known Implementations" first appeared. 
>>>> 
>>>> b) We find "the first recommendation of Section 3.2" and "recommendation 2 
>>>> of Section 3.2" (which should be "R6") confusing. For clarity, may we add 
>>>> section numbers for the recommendation numbers that do not have them and 
>>>> update the text as shown below? 
>>>> 
>>>> Since R# is unique, the section number may not be necessary. 
>>>> 
>>>> c) Please confirm if "recommendation 3" in the last entry is referring to 
>>>> R7 of Section 3.2. 
>>>> 
>>>> 
>>>> Original: 
>>>> BIND 9 does not implement the recommendations 1 and 2 in Section 3.1 
>>>> 
>>>> For recommendation 3, BIND 9 will honor the requestor's size up to the 
>>>> configured limit (max-udp-size)... 
>>>> 
>>>> In the case of recommendation 4, and the send fails with EMSGSIZE, BIND 9 
>>>> set the TC bit and try to send a minimal answer again. 
>>>> 
>>>> In the first recommendation of Section 3.2, BIND 9 uses the edns-buf-size 
>>>> option, with the default of 1232. 
>>>> 
>>>> BIND 9 does implement recommendation 2 of Section 3.2. 
>>>> 
>>>> For recommendation 3, after two UDP timeouts, BIND 9 will fall back to 
>>>> TCP. 
>>>> 
>>>> 
>>>> Perhaps: 
>>>> BIND 9 does not implement R1 and R2 in Section 3.1. 
>>>> 
>>>> ^^^^^^^^^^^^^^^remove 
>>>> 
>>>> For R3 (Section 3.1), BIND 9 will honor the requestor's size up to 
>>>> 
>>>> ^^^^^^^^^^^^^remove 
>>>> 
>>>> the configured limit (max-udp-size)... 
>>>> 
>>>> In the case of R4 (Section 3.1) and the send fails with EMSGSIZE, 
>>>> 
>>>> ^^^^^^^^^^^^^remove 
>>>> 
>>>> BIND 9 sets the TC bit and tries to send a minimal answer again. 
>>>> 
>>>> For R5 (Section 3.2), BIND 9 uses the edns-buf-size 
>>>> 
>>>> ^^^^^^^^^^^^^remove 
>>>> 
>>>> option, with the default of 1232. 
>>>> 
>>>> BIND 9 does implement R6 (Section 3.2). 
>>>> 
>>>> ^^^^^^^^^^^^^ remove 
>>>> 
>>>> For R7 (Section 3.2), after two UDP timeouts, BIND 9 will fall back 
>>>> 
>>>> ^^^^^^^^^^^^^remove 
>>>> 
>>>> to TCP. 
>>>> 
>>>> c) How may we update this sentence for clarity? Does BIND 9 cause 
>>>> IP_DONTFRAG to be disabled? If so, may we add "When" as shown below? 
>>>> 
>>>> 
>>>> Original: 
>>>> BIND 9 on systems with IP_DONTFRAG (such as FreeBSD), IP_DONTFRAG is 
>>>> disabled. 
>>>> 
>>>> 
>>>> Perhaps: 
>>>> When BIND 9 is on systems with IP_DONTFRAG (such as FreeBSD), IP_DONTFRAG 
>>>> is disabled. 
>>>> --> 
>>>> 
>>>> Agree. 
>>>> 
>>>> 12) <!--[rfced] May we make the first three bulleted items into complete 
>>>> sentences for clarity? Also, is "Spoofing nearmisses" a specific term, or 
>>>> may we add a space to "nearmisses" per its dictionary spelling? And does 
>>>> this quoted term need a reference for background, or will readers be 
>>>> familiar with it? 
>>>> 
>>>> 
>>>> Original: 
>>>> * IP_PMTUDISC_OMIT with fallback to IP_PMTUDISC_DONT 
>>>> 
>>>> * default EDNS buffer size of 1232, no probing for smaller sizes 
>>>> 
>>>> * no handling of EMSGSIZE 
>>>> 
>>>> * Recursor: UDP timeouts do not cause a switch to TCP. "Spoofing 
>>>> nearmisses" do. 
>>>> 
>>>> 
>>>> Perhaps: 
>>>> * Use IP_PMTUDISC_OMIT with fallback to IP_PMTUDISC_DONT 
>>>> 
>>>> * The default EDNS buffer size is 1232; no probing for smaller sizes. 
>>>> 
>>>> * There is no handling of EMSGSIZE. 
>>>> 
>>>> 
>>>> * Recursor: UDP timeouts do not cause a switch to TCP; "Spoofing near 
>>>> misses" do. 
>>>> --> 
>>>> 
>>>> Agree. 
>>>> 
>>>> 
>>>> 13) <!--[rfced] Please clarify what "if that is smaller" means as the text 
>>>> states that Unbound requests size 1232 and then it retries with a smaller 
>>>> size of 1232 for IPv6, which is confusing. Is the intended meaning perhaps 
>>>> that Unbound retries with a smaller size 
>>>> "if applicable"? Also, please clarify the intended meaning of 
>>>> "anything" in "This does not do anything". 
>>>> 
>>>> 
>>>> Additionally, should a citation be included for "flag day", either 
>>>> [DNSFlagDay2020] or [Huston2021], for easy reference? 
>>>> 
>>>> Note that the preceding sentence is included for context. 
>>>> 
>>>> 
>>>> Original: 
>>>> Unbound requests UDP size 1232 from peers, by default. The requestors size 
>>>> is limited to a max of 1232. 
>>>> 
>>>> After some timeouts, Unbound retries with a smaller size, if that is 
>>>> smaller, at size 1232 for IPv6 and 1472 for IPv4. This does not do 
>>>> anything since the flag day change to 1232. 
>>>> 
>>>> 
>>>> Perhaps: 
>>>> Unbound requests a UDP size of 1232 from peers, by default. The 
>>>> requestor's size is limited to a max of 1232. 
>>>> 
>>>> 
>>>> After some timeouts, Unbound retries with a smaller size, if applicable, 
>>>> or at size 1232 for IPv6 and 1472 for IPv4. This does not cause any 
>>>> negative effects due to the "flag day" [DNSFlagDay2020] change to 1232. 
>>>> --> 
>>>> 
>>>> Agree. 
>>>> 
>>>> 14) <!--[rfced] May we update this sentence as follows for clarity? 
>>>> 
>>>> 
>>>> Original: 
>>>> Unbound has minimal responses as an option, default on. 
>>>> 
>>>> 
>>>> Perhaps: 
>>>> Unbound has the 'minimal responses' configuration option; set default on. 
>>>> --> 
>>>> 
>>>> Agree. 
>>>> 
>>>> 15) <!-- [rfced] In the html and pdf outputs, the text enclosed in <tt> is 
>>>> output in fixed-width font. In the txt output, there are no changes to the 
>>>> font, and the quotation marks have been removed. 
>>>> 
>>>> 
>>>> Please review carefully and let us know if the output is acceptable or if 
>>>> any updates are needed. 
>>>> --> 
>>>> 
>>>> I will check this next revision. 
>>>> 
>>>> 16) <!-- [rfced] Terminology 
>>>> 
>>>> a) Throughout the text, the following terminology appears to be used 
>>>> inconsistently. Please review these occurrences and let us know if/how 
>>>> they may be made consistent. 
>>>> 
>>>> 
>>>> Don't Fragment flag (DF) bit vs. Don't Fragment (DF) bit 
>>>> [Note: Should this be "Don't Fragment (DF) flag bit" per RFC 0791?] 
>>>> 
>>>> 
>>>> More Fragments (MF) bit 
>>>> [Note: Should this be "More Fragments (MF) flag bit" for consistency?] 
>>>> 
>>>> Yes. Please choose RFC 0791 style. 
>>>> 
>>>> b) We made the following updates for consistency. Please let us know of 
>>>> any objections. 
>>>> 
>>>> 
>>>> Additional Section -> Additional section (per RFCs 1035 and 9460) 
>>>> [Note: RFC 2782 uses "Additional Data section"; please let us know if the 
>>>> current text is okay or if it should include 
>>>> "data".] 
>>>> 
>>>> 
>>>> Path MTU discovery -> Path MTU Discovery (per RFC 8201) Path MTU -> path 
>>>> MTU (per RFC 8201) 
>>>> --> 
>>>> 
>>>> Agree. 
>>>> 
>>>> 17) <!-- [rfced] Abbreviations 
>>>> 
>>>> a) FYI - We have added expansions for the following abbreviations per 
>>>> Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each expansion 
>>>> in the document carefully to ensure correctness. 
>>>> 
>>>> 
>>>> Elliptic Curve Digital Signature Algorithm (ECDSA) Edwards-curve Digital 
>>>> Signature Algorithm (EdDSA) Service Binding (SVCB) 
>>>> Resource Record (RR) 
>>>> 
>>>> OK for me. 
>>>> 
>>>> 
>>>> b) We notice that this document as well as RFCs 8900 and 9471 use 
>>>> "EDNS0" but RFC 6891 uses "EDNS(0)". Please let us know if using 
>>>> "EDNS0" is preferred or if you would like to use "EDNS(0)". 
>>>> 
>>>> 
>>>> Current: 
>>>> Extension Mechanisms for DNS (EDNS0) 
>>>> 
>>>> 
>>>> Perhaps: 
>>>> Extension Mechanisms for DNS (EDNS(0)) 
>>>> 
>>>> 
>>>> Both are OK for me. 
>>>> need to discuss with co-author. 
>>>> 
>>>> 
>>>> c) We do not see "XDP" used in any other RFCs. Does "XDP" stand for 
>>>> something 
>>>> (i.e., can it be expanded)? 
>>>> 
>>>> 
>>>> Current: 
>>>> Fragments are ignored if they arrive over an XDP interface. 
>>>> --> 
>>>> 
>>>> 
>>>> This section contains verbatim text from each implementer, so there may be 
>>>> some inconsistencies in the text. 
>>>> Regarding XDP, how about "Linux XDP" ? 
>>>> 
>>>> 18) <!-- [rfced] Please review the "Inclusive Language" portion of the 
>>>> online Style Guide 
>>>> <https://www.rfc-editor.org/styleguide/part2/#inclusive_language> and let 
>>>> us know if any changes are needed. Updates of this nature typically result 
>>>> in more precise language, which is helpful for readers. 
>>>> 
>>>> 
>>>> Note that our script did not flag any words in particular, but this should 
>>>> still be reviewed as a best practice. 
>>>> --> 
>>>> 
>>>> 
>>>> I will need to work next weeks... 
>>>> But now, I could not retrieve NIST document now. 
>>>> https://nvlpubs.nist.gov/nistpubs/ir/2021/NIST.IR.8366.pdf 
>>>> -> 503 Service Unavailable 
>>>> 
>>>> Regards, 
>>>> 
>>>> 
>>>> -- 
>>>> Kazunori Fujiwara, JPRS <fujiw...@jprs.co.jp> 
>>>> 
>>>> Thank you. 
>>>> 
>>>> RFC Editor/kc 
>>>> 
>>>> On Jan 13, 2025, at 6:41 PM, rfc-edi...@rfc-editor.org wrote: 
>>>> 
>>>> *****IMPORTANT***** 
>>>> 
>>>> Updated 2025/01/13 
>>>> 
>>>> 
>>>> RFC Author(s): 
>>>> -------------- 
>>>> 
>>>> Instructions for Completing AUTH48 
>>>> 
>>>> Your document has now entered AUTH48. Once it has been reviewed and 
>>>> approved by you and all coauthors, it will be published as an RFC. If an 
>>>> author is no longer available, there are several remedies available as 
>>>> listed in the FAQ (https://www.rfc-editor.org/faq/). 
>>>> 
>>>> 
>>>> You and you coauthors are responsible for engaging other parties 
>>>> (e.g., Contributors or Working Group) as necessary before providing your 
>>>> approval. 
>>>> 
>>>> 
>>>> Planning your review 
>>>> --------------------- 
>>>> 
>>>> Please review the following aspects of your document: 
>>>> 
>>>> * RFC Editor questions 
>>>> 
>>>> Please review and resolve any questions raised by the RFC Editor that have 
>>>> been included in the XML file as comments marked as follows: 
>>>> 
>>>> <!-- [rfced] ... --> 
>>>> 
>>>> These questions will also be sent in a subsequent email. 
>>>> 
>>>> * Changes submitted by coauthors 
>>>> 
>>>> Please ensure that you review any changes submitted by your coauthors. We 
>>>> assume that if you do not speak up that you agree to changes submitted by 
>>>> your coauthors. 
>>>> 
>>>> * Content 
>>>> 
>>>> 
>>>> Please review the full content of the document, as this cannot change once 
>>>> the RFC is published. Please pay particular attention to: 
>>>> - IANA considerations updates (if applicable) 
>>>> - contact information 
>>>> - references 
>>>> 
>>>> * Copyright notices and legends 
>>>> 
>>>> 
>>>> Please review the copyright notice and legends as defined in RFC 5378 and 
>>>> the Trust Legal Provisions 
>>>> (TLP – https://trustee.ietf.org/license-info). 
>>>> 
>>>> * Semantic markup 
>>>> 
>>>> 
>>>> Please review the markup in the XML file to ensure that elements of 
>>>> content are correctly tagged. For example, ensure that <sourcecode> and 
>>>> <artwork> are set correctly. See details at 
>>>> <https://authors.ietf.org/rfcxml-vocabulary>. 
>>>> 
>>>> * Formatted output 
>>>> 
>>>> Please review the PDF, HTML, and TXT files to ensure that the formatted 
>>>> output, as generated from the markup in the XML file, is reasonable. 
>>>> Please note that the TXT will have formatting limitations compared to the 
>>>> PDF and HTML. 
>>>> 
>>>> 
>>>> Submitting changes 
>>>> ------------------ 
>>>> 
>>>> To submit changes, please reply to this email using ‘REPLY ALL’ as all the 
>>>> parties CCed on this message need to see your changes. The parties 
>>>> include: 
>>>> 
>>>> * your coauthors 
>>>> 
>>>> * rfc-edi...@rfc-editor.org (the RPC team) 
>>>> 
>>>> * other document participants, depending on the stream (e.g., IETF Stream 
>>>> participants are your working group chairs, the responsible ADs, and the 
>>>> document shepherd). 
>>>> 
>>>> * auth48archive@rfc-editor.org, which is a new archival mailing list to 
>>>> preserve AUTH48 conversations; it is not an active discussion list: 
>>>> 
>>>> 
>>>> * More info: 
>>>> https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
>>>>  
>>>> 
>>>> 
>>>> * The archive itself: 
>>>> https://mailarchive.ietf.org/arch/browse/auth48archive/ 
>>>> 
>>>> * Note: If only absolutely necessary, you may temporarily opt out of the 
>>>> archiving of messages (e.g., to discuss a sensitive matter). If needed, 
>>>> please add a note at the top of the message that you  have dropped the 
>>>> address. When the discussion is concluded, auth48archive@rfc-editor.org 
>>>> will be re-added to the CC list and its addition will be noted at the top 
>>>> of the message. 
>>>> 
>>>> You may submit your changes in one of two ways: 
>>>> 
>>>> 
>>>> An update to the provided XML file 
>>>> — OR — 
>>>> An explicit list of changes in this format 
>>>> 
>>>> Section # (or indicate Global) 
>>>> 
>>>> 
>>>> OLD: 
>>>> old text 
>>>> 
>>>> 
>>>> NEW: 
>>>> new text 
>>>> 
>>>> You do not need to reply with both an updated XML file and an explicit 
>>>> list of changes, as either form is sufficient. 
>>>> 
>>>> We will ask a stream manager to review and approve any changes that seem 
>>>> beyond editorial in nature, e.g., addition of new text, deletion of text, 
>>>> and technical changes. Information about stream managers can be found in 
>>>> the FAQ. Editorial changes do not require approval from a stream manager. 
>>>> 
>>>> 
>>>> Approving for publication 
>>>> -------------------------- 
>>>> 
>>>> To approve your RFC for publication, please reply to this email stating 
>>>> that you approve this RFC for publication. Please use ‘REPLY ALL’, as all 
>>>> the parties CCed on this message need to see your approval. 
>>>> 
>>>> 
>>>> Files 
>>>> ----- 
>>>> 
>>>> 
>>>> The files are available here: 
>>>> https://www.rfc-editor.org/authors/rfc9715.xml 
>>>> https://www.rfc-editor.org/authors/rfc9715.html 
>>>> https://www.rfc-editor.org/authors/rfc9715.pdf 
>>>> https://www.rfc-editor.org/authors/rfc9715.txt 
>>>> 
>>>> 
>>>> Diff file of the text: 
>>>> https://www.rfc-editor.org/authors/rfc9715-diff.html 
>>>> https://www.rfc-editor.org/authors/rfc9715-rfcdiff.html (side by side) 
>>>> 
>>>> 
>>>> Diff of the XML: 
>>>> https://www.rfc-editor.org/authors/rfc9715-xmldiff1.html 
>>>> 
>>>> 
>>>> Tracking progress 
>>>> ----------------- 
>>>> 
>>>> The details of the AUTH48 status of your document are here: 
>>>> https://www.rfc-editor.org/auth48/rfc9715 
>>>> 
>>>> Please let us know if you have any questions. 
>>>> 
>>>> Thank you for your cooperation, 
>>>> 
>>>> RFC Editor 
>>>> 
>>>> 
>>>> -------------------------------------- 
>>>> RFC9715 (draft-ietf-dnsop-avoid-fragmentation-20) 
>>>> 
>>>> 
>>>> Title : IP Fragmentation Avoidance in DNS over UDP Author(s) : K. 
>>>> Fujiwara, P. Vixie 
>>>> WG Chair(s) : Suzanne Woolf, Benno Overeinder, Tim Wicinski 
>>>> 
>>>> Area Director(s) : Warren Kumari, Mahesh Jethanandani 
>>>> 
>>>> 
>>>> -- 
>>>> auth48archive mailing list -- auth48archive@rfc-editor.org To unsubscribe 
>>>> send an email to auth48archive-le...@rfc-editor.org 
>>>> 
>>>> <?xml version='1.0' encoding='UTF-8'?> 
>>>> 
>>>> 
>>>> <!-- pre-edited by ST 10/01/24 --> 
>>>> <!-- formatted by ST 11/08/24 --> 
>>>> <!-- reference review by TH 11/25/24 --> 
>>>> 
>>>> 
>>>> <!DOCTYPE rfc [ 
>>>> <!ENTITY nbsp "&#160;"> 
>>>> <!ENTITY zwsp "&#8203;"> 
>>>> <!ENTITY nbhy "&#8209;"> 
>>>> <!ENTITY wj "&#8288;"> 
>>>> ]> 
>>>> 
>>>> <rfc xmlns:xi="http://www.w3.org/2001/XInclude"; ipr="trust200902" 
>>>> docName="draft-ietf-dnsop-avoid-fragmentation-20" number="9715" 
>>>> category="info" consensus="true" submissionType="IETF" tocDepth="4" 
>>>> tocInclude="true" sortRefs="true" symRefs="true" obsoletes="" updates="" 
>>>> version="3" xml:lang="en"> 
>>>> 
>>>> 
>>>> <front> 
>>>> <title abbrev="Avoid IP Fragmentation">IP Fragmentation Avoidance in DNS 
>>>> over UDP</title> 
>>>> <seriesInfo name="RFC" value="9715"/> 
>>>> <author initials="K." surname="Fujiwara" fullname="Kazunori Fujiwara"> 
>>>> <organization abbrev="JPRS">Japan Registry Services Co., 
>>>> Ltd.</organization> 
>>>> <address> 
>>>> <postal> 
>>>> <street>Chiyoda First Bldg. East 13F, 3-8-1 Nishi-Kanda</street> 
>>>> <region>Chiyoda-ku, Tokyo</region> 
>>>> <code>101-0065</code> 
>>>> <country>Japan</country> 
>>>> </postal> 
>>>> <phone>+81 3 5215 8451</phone> 
>>>> <email>fujiw...@jprs.co.jp</email> 
>>>> </address> 
>>>> </author> 
>>>> <author initials="P." surname="Vixie" fullname="Paul Vixie"> 
>>>> <organization>AWS Security</organization> 
>>>> <address> 
>>>> <postal> 
>>>> <street>11400 La Honda Road</street> 
>>>> <city>Woodside</city> 
>>>> <region>CA</region> 
>>>> <code>94062</code> 
>>>> <country>United States of America</country> 
>>>> </postal> 
>>>> <phone>+1 650 393 3994</phone> 
>>>> <email>p...@redbarn.org</email> 
>>>> </address> 
>>>> </author> 
>>>> <date year="2025" month="January"/> 
>>>> <area>OPS</area> 
>>>> <workgroup>dnsop</workgroup> 
>>>> 
>>>> 
>>>> <abstract> 
>>>> <t>The widely 
>>>> deployed Extension Mechanisms for DNS (EDNS(0)) feature in the DNS enables 
>>>> a DNS receiver to indicate its received UDP message size capacity, which 
>>>> supports the sending of large UDP responses by a DNS server. 
>>>> Large DNS/UDP messages are more likely to be fragmented, and IP 
>>>> fragmentation has exposed weaknesses in application protocols. It is 
>>>> possible to avoid IP fragmentation in DNS by limiting the response size 
>>>> where possible and signaling the need to upgrade from UDP to TCP transport 
>>>> where necessary. 
>>>> This document describes techniques to avoid IP fragmentation in DNS.</t> 
>>>> </abstract> 
>>>> </front> 
>>>> <middle> 
>>>> <?line 142?> 
>>>> 
>>>> 
>>>> <section anchor="introduction"> 
>>>> <name>Introduction</name> 
>>>> <t>This document was originally intended to be a Best Current Practice, 
>>>> but due to operating system and socket option limitations, some of the 
>>>> recommendations have not yet gained real-world experience; therefore, this 
>>>> document is Informational. 
>>>> It is expected that, as operating systems and implementations evolve, we 
>>>> will gain more experience with the recommendations and will publish an 
>>>> updated document as a Best Current Practice in the future.</t> 
>>>> <t>DNS has an EDNS(0) mechanism <xref target="RFC6891"/>. The widely 
>>>> deployed EDNS(0) feature in the DNS enables a DNS receiver to indicate its 
>>>> received UDP message size capacity, which supports the sending of large 
>>>> UDP responses by a DNS server. 
>>>> DNS over UDP invites IP fragmentation when a packet is larger than the 
>>>> Maximum Transmission Unit (MTU) of some network in the packet's path.</t> 
>>>> <t>Fragmented DNS UDP responses have systemic weaknesses, which expose the 
>>>> requestor to DNS cache poisoning from off-path attackers (see <xref 
>>>> target="ProblemOfFragmentation"/> for references and details).</t> 
>>>> <t><xref target="RFC8900"/> states that IP fragmentation introduces 
>>>> fragility to Internet communication. 
>>>> The transport of DNS messages 
>>>> over UDP should take account of the observations stated in that 
>>>> document.</t> 
>>>> <t>TCP avoids fragmentation by segmenting data into packets that are 
>>>> smaller than or equal to the Maximum Segment Size (MSS). For each 
>>>> transmitted segment, the size of the IP and TCP headers is known, and the 
>>>> IP packet size can be chosen to keep it within the estimated MTU and the 
>>>> MSS. This takes advantage of the elasticity of the TCP's packetizing 
>>>> process, depending on how much queued data will fit into the next segment. 
>>>> In contrast, DNS over UDP has little datagram size elasticity and lacks 
>>>> insight into IP header and option size, so we must make more conservative 
>>>> estimates about available UDP payload space.</t> 
>>>> <t><xref target="RFC7766"/> states that all general-purpose DNS 
>>>> implementations <bcp14>MUST</bcp14> support both UDP and TCP 
>>>> transport.</t> 
>>>> 
>>>> 
>>>> <t>DNS transaction security <xref target="RFC8945"/> <xref 
>>>> target="RFC2931"/> does protect against the security risks of 
>>>> fragmentation, and it protects delegation responses. But <xref 
>>>> target="RFC8945"/> has limited applicability due to key distribution 
>>>> requirements, and there is little if any deployment of <xref 
>>>> target="RFC2931"/>.</t> 
>>>> <t>This document describes various techniques to avoid IP fragmentation of 
>>>> UDP packets in DNS. 
>>>> This document is primarily applicable to DNS use on the global 
>>>> Internet.</t> 
>>>> <t>In contrast, a path MTU that deviates from the recommended value might 
>>>> be obtained through static configuration, server routing hints, or a 
>>>> future discovery protocol. However, addressing this falls outside the 
>>>> scope of this document and may be the subject of future 
>>>> specifications.</t> 
>>>> </section> 
>>>> <section anchor="terminology"> 
>>>> <name>Terminology</name> 
>>>> <t> 
>>>> The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", 
>>>> "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL 
>>>> NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", 
>>>> "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", 
>>>> "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are 
>>>> to be interpreted as described in BCP&nbsp;14 <xref target="RFC2119"/> 
>>>> <xref target="RFC8174"/> when, and only when, they appear in all capitals, 
>>>> as shown here. 
>>>> </t> 
>>>> 
>>>> <t>The definitions of "requestor" and "responder" are per <xref 
>>>> target="RFC6891"/>:</t> 
>>>> 
>>>> 
>>>> <blockquote> 
>>>> "Requestor" refers to the side that sends a request. "Responder" refers to 
>>>> an authoritative, recursive resolver or other DNS component that responds 
>>>> to questions.</blockquote> 
>>>> 
>>>> 
>>>> <t>The definition of "path MTU" is per <xref target="RFC8201"/>:</t> 
>>>> <blockquote>path MTU [is] the minimum link MTU of all the links in a path 
>>>> between a source node and a destination node.</blockquote> 
>>>> 
>>>> 
>>>> <t>In this document, the term "Path MTU Discovery" includes both Classical 
>>>> Path MTU Discovery <xref target="RFC1191"/> <xref target="RFC8201"/> and 
>>>> Packetization Layer Path MTU Discovery <xref target="RFC8899"/>.</t> 
>>>> <t>Many of the specialized terms used in this document are defined in 
>>>> "DNS Terminology" <xref target="RFC9499"/>.</t> 
>>>> </section> 
>>>> <section anchor="recommendation"> 
>>>> <name>How to Avoid IP Fragmentation in DNS</name> 
>>>> <t>These recommendations are intended 
>>>> for nodes with global IP addresses on the Internet. Private networks or 
>>>> local networks are out of the scope of this document.</t> 
>>>> <t>The methods to avoid IP fragmentation in DNS are described below:</t> 
>>>> <section anchor="RecommendationsResponders"> 
>>>> <name>Proposed Recommendations for UDP Responders</name> <dl 
>>>> spacing="normal" newline="false" indent="7"> 
>>>> <dt>R1.</dt><dd>UDP responders should not use IPv6 fragmentation 
>>>> <xref target="RFC8200"/>.</dd> 
>>>> <dt>R2.</dt><dd><t>UDP responders should configure their systems to 
>>>> prevent fragmentation of UDP packets when sending replies, provided it can 
>>>> be done safely. The mechanisms to achieve this vary across different 
>>>> operating systems.</t> 
>>>> 
>>>> 
>>>> <t>For BSD-like operating systems, the IP Don't Fragment (DF) flag bit 
>>>> <xref target="RFC0791"/> can be used to prevent fragmentation. In 
>>>> contrast, Linux systems do not expose a direct API for this purpose and 
>>>> require the use of Path MTU socket options 
>>>> (IP_MTU_DISCOVER) to manage fragmentation settings. However, it is 
>>>> important to note that enabling IPv4 Path MTU Discovery for UDP in current 
>>>> Linux versions is considered harmful and dangerous. For more details, see 
>>>> <xref target="impl"/>.</t></dd> 
>>>> <dt>R3.</dt><dd>UDP responders should compose response packets that fit in 
>>>> the minimum of the offered requestor's maximum UDP payload size <xref 
>>>> target="RFC6891"/>, the interface MTU, the network MTU value configured by 
>>>> the knowledge of the network operators, and the 
>>>> <bcp14>RECOMMENDED</bcp14> maximum DNS/UDP payload size 1400. For more 
>>>> details, see 
>>>> <xref target="details"/>.</dd> 
>>>> <dt>R4.</dt><dd>If the UDP responder detects an immediate error indicating 
>>>> that the UDP packet exceeds the path MTU size, the UDP responder may 
>>>> recreate response packets that fit in the path MTU size or with the TC bit 
>>>> set.</dd> 
>>>> </dl> 
>>>> <t>The cause and effect of the TC bit are unchanged <xref 
>>>> target="RFC1035"/>.</t> 
>>>> </section> 
>>>> <section anchor="RecommendationsRequestors"> 
>>>> <name>Proposed Recommendations for UDP Requestors</name> <dl 
>>>> spacing="normal" newline="false" indent="7"> 
>>>> <dt>R5.</dt><dd>UDP requestors should limit the requestor's maximum UDP 
>>>> payload size to fit in the minimum of the interface MTU, the network MTU 
>>>> value configured by the network operators, and the 
>>>> <bcp14>RECOMMENDED</bcp14> maximum DNS/UDP payload size 1400. A smaller 
>>>> limit may be allowed. For more details, see <xref target="details"/>.</dd> 
>>>> 
>>>> 
>>>> <dt>R6.</dt><dd>UDP requestors should drop fragmented DNS/UDP responses 
>>>> without IP reassembly to avoid cache poisoning attacks (at the firewall 
>>>> function).</dd> 
>>>> <dt>R7.</dt><dd>DNS responses may be dropped by IP fragmentation. It is 
>>>> recommended that requestors eventually try alternative transport 
>>>> protocols.</dd> </dl> 
>>>> </section> 
>>>> </section> 
>>>> <section anchor="RecommendationOperators"> 
>>>> <name>Proposed Recommendations for DNS Operators</name> 
>>>> <t>Large DNS responses are typically the result of zone configuration. 
>>>> People who publish information in the DNS should seek configurations 
>>>> resulting in small responses. For example:</t> 
>>>> <dl spacing="normal" newline="false" indent="7"> <dt>R8.</dt><dd>Use a 
>>>> smaller number of name servers.</dd> <dt>R9.</dt><dd>Use a smaller number 
>>>> of A/AAAA RRs for a domain name.</dd> <dt>R10.</dt><dd>Use 
>>>> minimal-responses configuration: Some implementations have a 'minimal 
>>>> responses' configuration option that causes DNS servers to make response 
>>>> packets smaller by containing only mandatory and required data (<xref 
>>>> target="minimal-responses"/>).</dd> <dt>R11.</dt><dd>Use a smaller 
>>>> signature / public key size algorithm for DNSSEC. Notably, the signature 
>>>> sizes of the Elliptic Curve Digital Signature Algorithm (ECDSA) and 
>>>> Edwards-curve Digital Signature Algorithm (EdDSA) are smaller than those 
>>>> of equivalent cryptographic strength using RSA.</dd> 
>>>> </dl> 
>>>> <t>It is difficult to determine a specific upper limit for R8, R9, and 
>>>> R11, but it is sufficient if all responses from the DNS servers are below 
>>>> the size of R3 and R5.</t> 
>>>> </section> 
>>>> <section anchor="protocol"> 
>>>> <name>Protocol Compliance Considerations</name> 
>>>> <t>Some authoritative servers deviate from the DNS standard as 
>>>> follows:</t> 
>>>> <ul spacing="normal"> 
>>>> <li> 
>>>> <t>Some authoritative servers ignore the EDNS(0) requestor's maximum UDP 
>>>> payload size and return large UDP responses <xref 
>>>> target="Fujiwara2018"/>.</t> 
>>>> </li> 
>>>> <li> 
>>>> <t>Some authoritative servers do not support TCP transport.</t> 
>>>> </li> 
>>>> </ul> 
>>>> <t>Such non-compliant behavior cannot become implementation or 
>>>> configuration constraints for the rest of the DNS. If failure is the 
>>>> result, then that failure must be localized to the non-compliant 
>>>> servers.</t> 
>>>> </section> 
>>>> <section anchor="iana"> 
>>>> <name>IANA Considerations</name> 
>>>> <t>This document has no IANA actions.</t> 
>>>> </section> 
>>>> <section anchor="securitycons"> 
>>>> <name>Security Considerations</name> 
>>>> <section anchor="on-path-fragmentation-on-ipv4"> 
>>>> <name>On-Path Fragmentation on IPv4</name> 
>>>> <t>If the Don't Fragment (DF) flag bit is not set, on-path fragmentation 
>>>> may happen on IPv4, 
>>>> and it can lead to vulnerabilities as shown in <xref 
>>>> target="ProblemOfFragmentation"/>. To avoid this, R6 needs to be used to 
>>>> discard the fragmented responses and retry using TCP.</t> 
>>>> </section> 
>>>> <section anchor="small-mtu-network"> 
>>>> <name>Small MTU Network</name> 
>>>> <t>When avoiding fragmentation, 
>>>> a DNS/UDP requestor behind a small MTU network may experience UDP 
>>>> timeouts, which would reduce performance 
>>>> and may lead to TCP fallback. 
>>>> This would indicate prior reliance upon IP fragmentation, which is 
>>>> considered to be harmful 
>>>> to both the performance and stability of applications, endpoints, and 
>>>> gateways. Avoiding IP fragmentation will improve operating conditions 
>>>> overall, and the performance of DNS/TCP has increased and will continue to 
>>>> increase.</t> 
>>>> <t>If a UDP response packet is dropped in transit, up to and including the 
>>>> network stack of the initiator, it increases the attack window for 
>>>> poisoning the requestor's cache.</t> 
>>>> </section> 
>>>> <section anchor="ProblemOfFragmentation"> 
>>>> <name>Weaknesses of IP Fragmentation</name> 
>>>> <t>"Fragmentation Considered Poisonous" <xref target="Herzberg2013"/> 
>>>> notes effective off-path DNS cache poisoning attack vectors using IP 
>>>> fragmentation. 
>>>> "IP fragmentation attack on DNS" <xref target="Hlavacek2013"/> and "Domain 
>>>> Validation++ For MitM-Resilient PKI" <xref target="Brandt2018"/> note that 
>>>> off-path attackers can intervene in the Path MTU Discovery <xref 
>>>> target="RFC1191"/> to cause authoritative servers to produce fragmented 
>>>> responses. 
>>>> <xref target="RFC7739"/> states the security implications of predictable 
>>>> fragment identification values.</t> 
>>>> 
>>>> 
>>>> <t><xref section="3.2" sectionFormat="of" target="RFC8085"/> states that 
>>>> "an application <bcp14>SHOULD NOT</bcp14> send UDP datagrams that result 
>>>> in IP packets that exceed the Maximum Transmission Unit (MTU) along the 
>>>> path to the destination".</t> 
>>>> <t>A DNS message receiver cannot trust fragmented UDP datagrams primarily 
>>>> due to the small amount of entropy provided by UDP port numbers and DNS 
>>>> message identifiers, each of which is only 16 bits in size, and both are 
>>>> likely to be in the first fragment of a packet if fragmentation occurs. By 
>>>> comparison, the TCP protocol stack controls packet size and avoids IP 
>>>> fragmentation under ICMP NEEDFRAG attacks. In TCP, fragmentation should be 
>>>> avoided for performance reasons, whereas for UDP, fragmentation should be 
>>>> avoided for resiliency and authenticity reasons.</t> 
>>>> </section> 
>>>> <section anchor="dns-security-protections"> 
>>>> <name>DNS Security Protections</name> 
>>>> <t>DNSSEC is a countermeasure against cache poisoning attacks that use IP 
>>>> fragmentation. 
>>>> However, DNS delegation responses are not signed with DNSSEC, and DNSSEC 
>>>> does not have a mechanism to get the correct response if an incorrect 
>>>> delegation is injected. This is a denial-of-service vulnerability that can 
>>>> yield failed name resolutions. If cache poisoning attacks can be avoided, 
>>>> DNSSEC validation failures will be avoided.</t> 
>>>> </section> 
>>>> <section anchor="possible-actions-for-resolver-operators"> 
>>>> <name>Possible Actions for Resolver Operators</name> 
>>>> <t>Because this document is published as Informational rather than a Best 
>>>> Current Practice, 
>>>> this section presents steps that resolver operators can take to avoid 
>>>> vulnerabilities related to IP fragmentation.</t> 
>>>> <t>To avoid vulnerabilities related to IP fragmentation, implement R5 and 
>>>> R6.</t> 
>>>> 
>>>> 
>>>> <t>Specifically, configure the firewall functions protecting the 
>>>> full-service resolver to discard incoming DNS response packets 
>>>> with a non-zero Fragment Offset (FO) or a More Fragments (MF) flag bit of 
>>>> 1 on IPv4, and discard packets with IPv6 Fragment Headers. 
>>>> (If the resolver's IP address is not dedicated to the DNS resolver and 
>>>> uses UDP communication that relies on IP Fragmentation for purposes other 
>>>> than DNS, discard only the first fragment that contains the UDP header 
>>>> from port 53.)</t> 
>>>> <t>The most recent resolver software is believed to implement R7.</t> 
>>>> <t>Even if R7 is not implemented, it will only result in a name resolution 
>>>> error, preventing attacks from leading to malicious sites.</t> 
>>>> </section> 
>>>> </section> 
>>>> </middle> 
>>>> <back> 
>>>> <references> 
>>>> <name>References</name> 
>>>> <references anchor="sec-normative-references"> 
>>>> <name>Normative References</name> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6891.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7766.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8945.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2931.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8201.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1191.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8899.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9499.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8200.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1035.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7739.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8085.xml"/> 
>>>> </references> 
>>>> <references anchor="sec-informative-references"> 
>>>> <name>Informative References</name> 
>>>> 
>>>> 
>>>> <reference anchor="Brandt2018" 
>>>> target="https://dl.acm.org/doi/10.1145/3243734.3243790";> 
>>>> <front> 
>>>> <title>Domain Validation++ For MitM-Resilient PKI</title> 
>>>> <author initials="M." surname="Brandt" fullname="Markus Brandt"> 
>>>> <organization>Fraunhofer Institute for Secure Information Technology SIT, 
>>>> Darmstadt, Germany</organization> 
>>>> </author> 
>>>> <author initials="T." surname="Dai" fullname="Tianxiang Dai"> 
>>>> <organization>Fraunhofer Institute for Secure Information Technology SIT, 
>>>> Darmstadt, Germany</organization> 
>>>> </author> 
>>>> <author initials="A." surname="Klein" fullname="Amit Klein"> 
>>>> <organization>Fraunhofer Institute for Secure Information Technology SIT, 
>>>> Darmstadt, Germany</organization> 
>>>> </author> 
>>>> <author initials="H." surname="Shulman" fullname="Haya Shulman"> 
>>>> <organization>Fraunhofer Institute for Secure Information Technology SIT, 
>>>> Darmstadt, Germany</organization> 
>>>> </author> 
>>>> <author initials="M." surname="Waidner" fullname="Michael Waidner"> 
>>>> <organization>Fraunhofer Institute for Secure Information Technology SIT, 
>>>> Darmstadt, Germany</organization> 
>>>> </author> 
>>>> <date month="October" year="2018"/> 
>>>> </front> 
>>>> <refcontent>Proceedings of the 2018 ACM SIGSAC Conference on Computer and 
>>>> Communications Security, pp. 2060-2076</refcontent> <seriesInfo name="DOI" 
>>>> value="10.1145/3243734.3243790"/> 
>>>> </reference> 
>>>> 
>>>> 
>>>> <reference anchor="Herzberg2013" 
>>>> target="https://ieeexplore.ieee.org/document/6682711";> 
>>>> <front> 
>>>> <title>Fragmentation Considered Poisonous, or: 
>>>> One-domain-to-rule-them-all.org</title> 
>>>> <author initials="A." surname="Herzberg" fullname="Amir Herzberg"> 
>>>> <organization/> 
>>>> </author> 
>>>> <author initials="H." surname="Shulman" fullname="Haya Shulman"> 
>>>> <organization/> 
>>>> </author> 
>>>> <date year="2013"/> 
>>>> </front> 
>>>> <refcontent>IEEE Conference on Communications and Network Security 
>>>> (CNS)</refcontent> <seriesInfo name="DOI" 
>>>> value="10.1109/CNS.2013.6682711"/> 
>>>> </reference> 
>>>> 
>>>> 
>>>> <reference anchor="Hlavacek2013" 
>>>> target="https://ripe67.ripe.net/presentations/240-ipfragattack.pdf";> 
>>>> <front> 
>>>> <title>IP fragmentation attack on DNS</title> 
>>>> <author initials="T." surname="Hlavacek" fullname="Tomas Hlavacek"> 
>>>> <organization>cz.nic</organization> 
>>>> </author> 
>>>> <date year="2013"/> 
>>>> </front> 
>>>> <refcontent>RIPE 67 Meeting</refcontent> 
>>>> </reference> 
>>>> 
>>>> 
>>>> <reference anchor="Fujiwara2018" 
>>>> target="https://indico.dns-oarc.net/event/31/contributions/692/attachments/660/1115/fujiwara-5.pdf";>
>>>>  
>>>> <front> 
>>>> <title>Measures against DNS cache poisoning attacks using IP 
>>>> fragmentation</title> 
>>>> <author initials="K." surname="Fujiwara" fullname="Kazunori Fujiwara"> 
>>>> <organization>JPRS</organization> 
>>>> </author> 
>>>> <date year="2019"/> 
>>>> </front> 
>>>> <refcontent>OARC 30 Workshop</refcontent> 
>>>> </reference> 
>>>> 
>>>> 
>>>> <reference anchor="DNSFlagDay2020" target="https://dnsflagday.net/2020/";> 
>>>> <front> 
>>>> <title>DNS flag day 2020</title> 
>>>> <author> 
>>>> <organization/> 
>>>> </author> 
>>>> <date></date> 
>>>> </front> 
>>>> </reference> 
>>>> 
>>>> 
>>>> <reference anchor="Huston2021" 
>>>> target="https://indico.dns-oarc.net/event/37/contributions/806/attachments/782/1366/2021-02-04-dns-flag.pdf";>
>>>>  
>>>> <front> 
>>>> <title>Measuring DNS Flag Day 2020</title> 
>>>> <author initials="G." surname="Huston" fullname="Geoff Huston"> 
>>>> <organization>APNIC Labs</organization> 
>>>> </author> 
>>>> <author initials="J." surname="Damas" fullname="Joao Damas"> 
>>>> <organization>APNIC Labs</organization> 
>>>> </author> 
>>>> <date year="2021" month="February"/> 
>>>> </front> 
>>>> <refcontent>OARC 34 Workshop</refcontent> 
>>>> </reference> 
>>>> 
>>>> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8900.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.0791.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4035.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9471.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2308.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2782.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9460.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5155.xml"/> 
>>>> <xi:include 
>>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2671.xml"/> 
>>>> 
>>>> 
>>>> </references> 
>>>> </references> 
>>>> 
>>>> 
>>>> <section anchor="details"> 
>>>> <name>Details of Requestor's Maximum UDP Payload Size Discussions</name> 
>>>> <t>There are many discussions about default path MTU size and a 
>>>> requestor's maximum UDP payload size.</t> 
>>>> <ul spacing="normal"> 
>>>> <li> 
>>>> <t>The minimum MTU for an IPv6 interface is 1280 octets 
>>>> (see <xref section="5" sectionFormat="of" target="RFC8200"/>). So, it can 
>>>> be used as the default path MTU value for IPv6. The corresponding minimum 
>>>> MTU for an IPv4 interface is 68 (60 + 8) 
>>>> <xref target="RFC0791"/>.</t> 
>>>> </li> 
>>>> <li> 
>>>> 
>>>> 
>>>> <t><xref target="RFC4035"/> states that "A security-aware name server 
>>>> <bcp14>MUST</bcp14> support the EDNS0 (<xref target="RFC2671"/>) message 
>>>> size extension, [and it] <bcp14>MUST</bcp14> support a message size of at 
>>>> least 1220 octets". Then, the smallest number of the maximum DNS/UDP 
>>>> payload size is 1220.</t> 
>>>> </li> 
>>>> <li> 
>>>> <t>In order to avoid IP fragmentation, 
>>>> <xref target="DNSFlagDay2020"/> proposes that UDP requestors set the 
>>>> requestor's payload size to 1232 and UDP responders compose UDP responses 
>>>> so they fit in 1232 octets. 
>>>> The size 1232 is based on an MTU of 1280, which is required by the IPv6 
>>>> specification <xref target="RFC8200"/>, minus 48 octets for the IPv6 and 
>>>> UDP headers.</t> 
>>>> </li> 
>>>> <li> 
>>>> <t>Most of the Internet, especially the inner core, has an MTU of at least 
>>>> 1500 octets. 
>>>> Maximum DNS/UDP payload size for IPv6 on an MTU 1500 Ethernet is 1452 
>>>> (1500 minus 40 (IPv6 header size) minus 8 (UDP header size)). To allow for 
>>>> possible IP options and distant tunnel overhead, the recommendation of 
>>>> default maximum DNS/UDP payload size is 1400.</t> 
>>>> </li> 
>>>> <li> 
>>>> <t><xref target="Huston2021"/> analyzes the result of <xref 
>>>> target="DNSFlagDay2020"/> and reports that their measurements suggest that 
>>>> in the interior of the Internet between recursive resolvers and 
>>>> authoritative servers, the prevailing MTU is 1500 and there is no 
>>>> measurable signal of use of smaller MTUs in this part of the Internet. 
>>>> They propose that 
>>>> their measurements suggest setting the EDNS(0) requestor's UDP payload 
>>>> size to 1472 octets for IPv4 and 1452 octets for IPv6.</t> 
>>>> </li> 
>>>> </ul> 
>>>> <t>As a result of these discussions, 
>>>> this document recommends a value of 1400, 
>>>> with smaller values also allowed.</t> 
>>>> </section> 
>>>> <section anchor="minimal-responses"> 
>>>> <name>Minimal Responses</name> 
>>>> <t>Some implementations have a "minimal responses" configuration 
>>>> setting/option that causes a DNS server to make response packets smaller, 
>>>> containing only mandatory and required data.</t> 
>>>> 
>>>> 
>>>> <t>Under the minimal-responses configuration, a DNS server composes 
>>>> responses containing only necessary Resource Records (RRs). For 
>>>> delegations, see <xref target="RFC9471"/>. In case of a non-existent 
>>>> domain name or non-existent type, the authority section will contain an 
>>>> SOA record, and the answer section is empty 
>>>> (see <xref section="2" sectionFormat="of" target="RFC2308"/>).</t> 
>>>> <t>Some resource records (MX, SRV, SVCB, and HTTPS) require additional A, 
>>>> AAAA, and Service Binding (SVCB) records in the Additional section 
>>>> defined in <xref target="RFC1035"/>, <xref target="RFC2782"/>, and <xref 
>>>> target="RFC9460"/>.</t> 
>>>> <t>In addition, if the zone is DNSSEC signed and a query has the DNSSEC OK 
>>>> bit, signatures are added in the answer section, 
>>>> or the corresponding DS RRSet and signatures are added in the authority 
>>>> section. Details are defined in <xref target="RFC4035"/> and <xref 
>>>> target="RFC5155"/>.</t> 
>>>> </section> 
>>>> <section anchor="impl"> 
>>>> <name>Known Implementations</name> 
>>>> 
>>>> 
>>>> <t>This section records the status of known implementations of the 
>>>> proposed recommendations described in <xref target="recommendation"/>.</t> 
>>>> <t>Please note that the listing of any individual implementation here does 
>>>> not imply endorsement by the IETF. Furthermore, no effort has been made to 
>>>> verify the information that was supplied by IETF contributors and 
>>>> presented here.</t> 
>>>> <section anchor="bind-9"> 
>>>> 
>>>> 
>>>> <name>BIND 9</name> 
>>>> <t>BIND 9 does not implement R1 and R2. <!--<xref 
>>>> target="RecommendationsResponders"/>--></t> 
>>>> <t>BIND 9 on Linux sets IP_MTU_DISCOVER to IP_PMTUDISC_OMIT with a 
>>>> fallback to  IP_PMTUDISC_DONT.</t> 
>>>> 
>>>> 
>>>> <t>When BIND 9 is on systems with IP_DONTFRAG (such as FreeBSD), 
>>>> IP_DONTFRAG is disabled.</t> 
>>>> <t>Accepting Path MTU Discovery for UDP is considered harmful and 
>>>> dangerous. BIND 9's settings avoid attacks to Path MTU Discovery.</t> 
>>>> <t>For R3, BIND 9 will honor the requestor's size up to the configured 
>>>> limit (<tt>max-udp-size</tt>). The UDP response packet is bound to be 
>>>> between 512 and 4096 bytes, with the default set to 1232. BIND 9 supports 
>>>> the requestor's size up to the configured limit 
>>>> (<tt>max-udp-size</tt>).</t> 
>>>> <t>In the case of R4 and the send fails with EMSGSIZE, BIND 9 sets the TC 
>>>> bit and tries to send a minimal answer again.</t> 
>>>> <t>For R5, <!--<xref target="RecommendationsRequestors"/>--> BIND 9 uses 
>>>> the <tt>edns-buf-size</tt> option, with the default of 1232.</t> 
>>>> <!-- remove this (by fujiwara): <t>BIND 9 does implement R6.--> <!--<xref 
>>>> target="RecommendationsRequestors"/>--><!-- </t> --> 
>>>> <t>For R7, after two UDP timeouts, BIND 9 will fall back to TCP.</t> 
>>>> </section> 
>>>> <section anchor="knot-dns-and-knot-resolver"> 
>>>> <name>Knot DNS and Knot Resolver</name> 
>>>> <t>Both Knot servers set IP_PMTUDISC_OMIT to avoid path MTU spoofing. The 
>>>> UDP size limit is 1232 by default.</t> 
>>>> <t>Fragments are ignored if they arrive over a Linux XDP interface.</t> 
>>>> <t>TCP is attempted after repeated UDP timeouts.</t> 
>>>> <t>Minimal responses are returned and are currently not configurable.</t> 
>>>> <t>Smaller signatures are used, with ecdsap256sha256 as the default.</t> 
>>>> </section> 
>>>> <section 
>>>> anchor="powerdns-authoritative-server-powerdns-recursor-powerdns-dnsdist"> 
>>>> <name>PowerDNS Authoritative Server, PowerDNS Recursor, and PowerDNS 
>>>> dnsdist</name> 
>>>> 
>>>> 
>>>> <ul spacing="normal"> 
>>>> <li> 
>>>> <t>Use IP_PMTUDISC_OMIT with a fallback to IP_PMTUDISC_DONT.</t> 
>>>> </li> 
>>>> <li> 
>>>> <t>The default EDNS buffer size of 1232; no probing for smaller sizes.</t> 
>>>> </li> 
>>>> <li> 
>>>> <t>There is no handling of EMSGSIZE.</t> 
>>>> </li> 
>>>> <li> 
>>>> <t>Recursor: UDP timeouts do not cause a switch to TCP, but "spoofing near 
>>>> misses" may.</t> 
>>>> </li> 
>>>> </ul> 
>>>> </section> 
>>>> <section anchor="powerdns-authoritative-server"> 
>>>> <name>PowerDNS Authoritative Server</name> 
>>>> <ul spacing="normal"> 
>>>> <li> 
>>>> <t>The default DNSSEC algorithm is 13.</t> 
>>>> </li> 
>>>> <li> 
>>>> <t>Responses are minimal; this is not configurable.</t> 
>>>> </li> 
>>>> </ul> 
>>>> </section> 
>>>> <section anchor="unbound"> 
>>>> <name>Unbound</name> 
>>>> <t>Unbound sets IP_MTU_DISCOVER to IP_PMTUDISC_OMIT with fallback to 
>>>> IP_PMTUDISC_DONT. It also disables IP_DONTFRAG on systems that have it, 
>>>> but not on Apple systems. On systems that support it, Unbound sets 
>>>> IPV6_USE_MIN_MTU, with a fallback to IPV6_MTU at 1280, with a fallback to 
>>>> IPV6_USER_MTU. It also sets IPV6_MTU_DISCOVER to IPV6_PMTUDISC_OMIT, with 
>>>> a fallback to IPV6_PMTUDISC_DONT.</t> 
>>>> <t>Unbound requests a UDP size of 1232 from peers, by default. The 
>>>> requestor's size is limited to a max of 1232.</t> 
>>>> 
>>>> <t>After some timeouts, Unbound retries with a smaller size, if 
>>>> applicable, or at size 1232 for IPv6 and 1472 for IPv4. This does not 
>>>> cause any negative effects due to the "flag day" <xref 
>>>> target="DNSFlagDay2020"/> change to 1232.</t> 
>>>> 
>>>> 
>>>> <t>Unbound has the "minimal responses" configuration option; set default 
>>>> on.</t> 
>>>> </section> 
>>>> <section anchor="acknowledgments" numbered="false"> 
>>>> <name>Acknowledgments</name> 
>>>> <t>The authors would like to specifically thank <contact fullname="Paul 
>>>> Wouters"/>, <contact fullname="Mukund Sivaraman"/>, <contact 
>>>> fullname="Tony Finch"/>, <contact fullname="Hugo Salgado"/>, <contact 
>>>> fullname="Peter van Dijk"/>, <contact fullname="Brian Dickson"/>, 
>>>> <contact fullname="Puneet Sood"/>, <contact fullname="Jim Reid"/>, 
>>>> <contact fullname="Petr Spacek"/>, <contact fullname="Andrew 
>>>> McConachie"/>, <contact fullname="Joe Abley"/>, <contact fullname="Daisuke 
>>>> Higashi"/>, <contact fullname="Joe Touch"/>, <contact fullname="Wouter 
>>>> Wijngaards"/>, <contact fullname="Vladimir Cunat"/>, 
>>>> <contact fullname="Benno Overeinder"/>, and <contact fullname="Štěpán 
>>>> Němec"/> for their extensive reviews and comments.</t> 
>>>> </section> 
>>>> </section> 
>>>> </back> 
>>>> 
>>>> <!-- [rfced] In the html and pdf outputs, the text enclosed in <tt> is 
>>>> output in fixed-width font. In the txt output, there are no changes to the 
>>>> font, and the quotation marks have been removed. 
>>>> 
>>>> 
>>>> Please review carefully and let us know if the output is acceptable or if 
>>>> any updates are needed. 
>>>> --> 
>>>> 
>>>> </rfc> 
>>>> 
>>> 
>>> 
>> 
>> 

-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to