On Sep 7, 2023, at 6:58 PM, Bron Gondwana <br...@fastmailteam.com> wrote:
> 
> On Fri, Sep 8, 2023, at 02:18, Paul Hoffman wrote:
>> Thanks for the review!
>> 
>> On Sep 7, 2023, at 7:16 AM, Bron Gondwana via Datatracker <nore...@ietf.org> 
>> wrote:
>> 
>> > My only concern is that it does fall back very easily to cleartext, for a 
>> > long
>> > damping period.  As a protocol implementer myself, I would generally 
>> > expect to
>> > retry something one or two more times over the course of a few minutes 
>> > before
>> > giving up entirely for 24h, since the server at the other end may have just
>> > been restarting and either dropped an existing connection or rejected a SYN
>> > packet, but be ready a moment later.  I'd be happy with a limit of 
>> > something
>> > like 5 tries over 2 minutes (one every 30 seconds) before giving up.
>> 
>> In Section 4.3, the "damping" parameter has a "suggested default" of 1 day. 
>> That's a suggestion, not at all a requirement. It was established based on 
>> the idea that almost every domain name has multiple nameservers, and that it 
>> is likely that if one server has a failure such as a timeout, the resolver 
>> will try the other nameservers (which may or may not be encrypting).
> 
> Yeah, that bit makes sense, so you'll wind up with one of them having 
> encrypted connection and the other not - so you'll probably want to default 
> to sending further requests to that once since you have it tagged as 
> available for encryption.
> 
>> Are you proposing a shorter value for "damping", or a note saying "1 day is 
>> just the suggested value, you might choose a shorter one if you want"? Or 
>> something else?
> 
> I'm suggesting a backoff algorithm which isn't "single failure gives you N 
> hours of no retry" - particularly, if you have an existing encrypted 
> connection and it has a fault, my reading was that you don't retry at all to 
> form an encrypted connection, even when talking to somewhere that has 
> previously succeeded.  I agree you don't want to try more than once per day 
> against a server that's never supported encryption, but if you have had 
> consistent success encrypting to a server, then a single failure, you don't 
> want to be treating that one the same!  It's definitely worth retrying faster 
> than a full day later.

This sounds like you want a smaller value than 1 day for `damping` then. 
Because those parameters are only suggested defaults, a resolver operator like 
you could simply change the 1 day to maybe 1 hour, with the risk of slowing 
down resolution to that one nameserver.

--Paul Hoffman

_______________________________________________
dns-privacy mailing list
dns-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to