At Sun, 22 Nov 2015 14:52:34 +0100,
Stephane Bortzmeyer <bortzme...@nic.fr> wrote:

> > I've read draft-bortzmeyer-dnsop-nxdomain-cut-00
>
> Do note that -01 will be out in the next days and there are
> substantial changes. So, readers may prefer to wait 48h :-)

Okay, I'm now referring to 01.

> >   I suspect this is highly implementation dependent and so the
> >   RFC2119 'SHOULD' is not really appropriate.  First off, what
> >   "delete" means isn't very clear.
>
> It is now defined. ' "Deleted" means that subsequent requests for
> these names will yield NXDOMAIN. '
>
> >   But even if the resolver doesn't really "delete" the memory, it
> >   could look as if it did as long as the resolver doesn't use it for
> >   subsequent query handling
>
> Correct, but this is a general rule with IETF protocols: we mandate
> the external behavior, not the implementation.

That was exactly my point, and in that sense I'd say "SHOULD delete"
is redundant (and possibly imposes unnecessary restrictions on
implementations).  The revised wording in 01 now looks even more
redundant:

   When an iterative caching DNS resolver stores an NXDOMAIN in its
   cache, all names and RRsets at or below that node SHOULD be deleted
   since they will have become unreachable.  "Deleted" means that
   subsequent requests for these names will yield NXDOMAIN.

as it's already covered in the first paragraph:

   When searching downward in its cache, an iterative caching DNS
   resolver SHOULD stop searching if it encounters a cached NXDOMAIN.
   The response to the triggering query should be NXDOMAIN.

(Strictly speaking it does not use a 'SHOULD' about returning NXDOMAIN
for these queries, but that should be a natural consequence of the
SHOULD about stopping the search).

> > I suggest stating that more clearly.
>
> Done

Regarding this topic, I think it should rather refer to
qname-minimization here:

   queries.  (It would be better if the SOA record in the NXDOMAIN
   response were sufficient to find the non-existing domain but this is
   more delicate, see Section 5.)

than updating the interpretation of SOA.  qname-minimization is much
less controversial and will certainly help in this scenario.

> >   A minor corner case, but I suspect this is not fully accurate if
> >   QNAME is the name specified in the question section.
>
> Added.

Perhaps you might introduce a dedicated terminology such as "NXDOMAIN
name" as used in someone else's comment and use it consistently,
rather than just note this once and keep using QNAME in other places.

> >    [joost-dnsterror]
> >               Joost, M., "About DNS Attacks and ICMP Destination
> >               Unreachable Reports", December 2014,
> >               <http://www.michael-joost.de/dnsterror.html>.
> >
> >   Getting this URL resulted in 403 error.  Is that only for me?
>
> Works for me.

Sorry for the false alarm, it seems to be my local problem.

One additional comment on 01:

- Section 7

   The technique described here may help against a denial-of-service
   attack named "random qnames" and described in Section 3.

  I suggest "a denial-of-service attack on authoritative servers" for
  the same reason as my comment on the "benefits" section of the
  previous version.

--
JINMEI, Tatuya

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to