Some friends of mine who run DNSBLs have this idea to manage the
traffic to their servers: some parts of the IP address space are more
likely to get infected than others, so when they send back a NXDOMAIN
response, they want to adjust the TTL so that addreses that are
unlikely to get listed have a longer TTL and addresses that are more
likely to become listed have a shorter TTL.

Since the TTL on a negative cache entry comes from the TTL on the SOA
returned with the NXDOMAIN, this means that they'll be returning SOAs
with different TTLs on different responses.  This strikes me as
something that's not technically illegal, but that people who write
DNS caches didn't anticipate.  Is it likely to break anything?

Bonus question: with DNSSEC, a cache can use NSEC info to synthesize
NXDOMAIN responses for nearby addresses.  Will inconsistent TTLs break
anything then?

If you think this is a stupid idea, please say why.  Traffic to DNSBL
servers is significant, and traces suggest this will noticably
decrease the traffic, so unless it breaks something, it's useful.
They realize that there is some possibility of stale data, but that's
a given whenever a TTL is greater than zero.

Regards,
John Levine, jo...@iecc.com, Primary Perpetrator of "The Internet for Dummies",
Please consider the environment before reading this e-mail. http://jl.ly

PS: If you were planning to say that all DNSBLs stink, don't.  We know
they do, but the alternative stinks worse.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to