Francis,

On Aug 20, 2008, at 3:17 PM, Francis Dupont wrote:
as you know the DO bit means DNSSEC RRs are accepted, so an
implementation which supports them should set the DO bit.

Mumble.

So, DO=1 by default will result in DNSSEC-related RRs being returned, regardless of whether those RRs will actually be used. What my intent was with 3225 is no longer particularly relevant since shipping code has been doing this for quite some time.

The implication of this is that the day the root gets signed, the root servers will be responding with DNSSEC-related RRs, regardless of whether caching servers intend on doing anything with them. This raises a few potential operational issues:

- if the advertised EDNS0 buffer size is not large enough, it will trigger truncation and, as a result, an increase in the number of TCP sessions going to the root.

- if the advertised EDNS0 buffer size is large enough, but the network MTU is too small, fragmentation will occur which may cause the response to be dropped (for a variety of reasons).

- if there are middle boxes in the way that do stupid things (e.g., disallow DNS over TCP), those middle boxes will likely drop the larger responses.

The concern I see (that I had hoped would be avoided by DO being set to 1 only when the caching server administrator had explicitly configured DNSSEC awareness) is that folks who are blissfully unaware of the root being signed would, through no fault or action on their part, could begin to see odd DNS failures due to one of the three issues I mention above.

In any event, I have an answer to my question...

Regards,
-drc

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to