This draft is an old-school "00"  -  so I'll not get into nits.

First - what is an "upstream Auth server"?  Asking in the sense that perhaps
you mean to say that the requestor ought to assume all sources for the
domain name would return the same.  (I.e., don't try another address.)

Second - the document lacks needed justification/trade off discussion.

I'll take a moment to lay out my thoughts on this.

What good is the ANY query today?

1) The one use case is to retrieve un-expected records at a domain name for
which AXFR is not available.  (An exhaustive search is possible, but would
require 64K queries which is arguably worse than what we have now - at it's
worst.)

All other uses of the ANY query can be covered, reasonably, by other means.
(Having an AXFR of the zone for one, or a look at the database driving the
configuration.)

How is the ANY query harmful?

1) It contributes, not uniquely, to the ease with which amplification
attacks can make use of DNS servers to launch an attack on a third party.
While it is true that any large response can accomplish this, ANY make is it
"worse" but perhaps not  incrementally significantly.

2) It has been proven to be misunderstood because it is the one query type
that cannot guarantee coherence.  Asking a cache with partial set of the
records of a domain name will give that subset, even with DNSSEC.  Beyond
being used in a confusing manner, there are cases where implementers
confusion is apparent in traffic loads.

3) In cases where the responses for certain RRtypes are
environment-dependent, assembling the correct response is difficult.  To
keep this story short, yadda, yadda, yadda, the need to reply to ANY in this
way gets in the way of exploring options in this space.  (This description
might take the longest to document.)





Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to