On 14 Oct 2015, at 8:20, Sara Dickinson wrote:

> Section 6.2.3  Idle Timeouts
>
> @@ -477,6 +477,12 @@
>  specified in [RFC1035].  Servers MAY use zero timeouts when
>  experiencing heavy load or are under attack.
>
> +   DNS messages delivered over TCP might arrive in multiple segments.  A
> +   DNS server that resets its idle timeout after receiving a single
> +   segment might be vulnerable to a "slow read attack."  For this
> +   reason, servers SHOULD apply the idle timeout to the receipt of a
> +   full DNS message, rather than to receipt of a TCP segment.
> +
>
> Section 8   TCP Message Field Lengths
>
> @@ -542,7 +549,18 @@
>  problems due to some DNS servers being very sensitive to timeout
>  conditions on receiving messages (they might abort a TCP session if
>  the first TCP segment does not contain both the length field and the
> -   entire message)
> +   entire message).  Such behavior is certainly undesirable.  As
> +   described in [6.2.3], servers SHOULD apply connection timeouts to the
> +   receipt of a full message and MUST NOT close a connection simply
> +   because the first segment does not contain the entire message.

I think that's a great improvement and I think the advice is clear and good.


Joe

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to