> Begin forwarded message: > > From: 神明達哉 <jin...@wide.ad.jp> > Subject: Re: [DNSOP] Working Group Last Call on draft-ietf-dnsop-5966bis > Date: 15 October 2015 01:52:09 BST > To: Sara Dickinson <s...@sinodun.com> > Cc: Joe Abley <jab...@hopcount.ca>, dnsop <dnsop@ietf.org> > > At Wed, 14 Oct 2015 13:20:39 +0100, > Sara Dickinson <s...@sinodun.com> wrote: > > > I think the additional text for these sections has the same problem I > pointed out before for the sending side of Section 8: a DNS server > implementation usually cannot know which TCP segment contains what > amount of data. All it can know in practice is which amount of data a > single "read" API call returns. I suggest you rephrasing the text as > we did for the sending side of Section 8.@@ -477,6 +477,12 @@
Point taken! How about the following: @@ -477,6 +477,12 @@ specified in [RFC1035]. Servers MAY use zero timeouts when experiencing heavy load or are under attack. + DNS messages delivered over TCP might arrive in multiple segments. As + a result a DNS server that resets its idle timeout after each “read” system call + might be vulnerable to a "slow read attack." For this + reason, servers SHOULD apply the idle timeout to the receipt of a + full DNS message, rather than to receipt of any part of a DNS message. + @@ -542,7 +549,18 @@ problems due to some DNS servers being very sensitive to timeout conditions on receiving messages (they might abort a TCP session if the first TCP segment does not contain both the length field and the - entire message) + entire message). Such behavior is certainly undesirable. As + described in [6.2.3], servers SHOULD apply idle timeouts to the + receipt of a full message and MUST NOT close a connection simply + because the first “read” system call for a new message does + not contain the entire message. Sara.
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop