On Tue, Jul 12, 2016 at 11:03 AM, John R Levine <jo...@taugh.com> wrote:
>>> The reason to use TCP framing is so that you can send multiple DNS
>>> requests
>>> in a single http request and get back multiple answers.  Recent messages
>>> here suggest that's of considerable interest, and if you're only sending
>>> one
>>> request, the two bytes of TCP length are tiny compared to the http
>>> headers.
>
>
>> Maybe I'm still missing something - so you pack multiple DNS requests in
>> single HTTP request, answer#1 takes 5s, answer#2 timeouts, the rest is
>> answered from cache. How do you send back the fast answers first without
>> blocking when you have just a single HTTP request outstanding?
>
>
> The obvious way would be to send chunked http responses as the answers come
> back.  See section 4 of RFC 7230.  The DNS responses don't have to be in
> order.

Great, so you get a couple of queries from DNS/TCP stream and batch
them into HTTP request,
now you get additional query but your HTTP connection is already
blocked and you have to start a new one
or wait. After all this is just an optimisation game, perhaps I'm
foolish to pursue it, but (for me) it's important to define the
requirements before we end up with a long tail of weak
implementations.

> I don't think anyone sees DNS over http as a general replacement for
> ordinary DNS.  I see two plausible scenarios:
>
> * The most likely is javascript apps that want to look up SRV or NAPTR or
> something, but can only make http/s requests back to the place the js files
> came from.
>
> * The other is an application that wants to make it hord to observce its DNS
> queries, so it uses https to a trusted proxy.
>
> This should be fine for both of those.
>
> R's,
> John

I hope these would be the cases, I thought about search engine results
page pushing resolved addresses (secured) for search results ahead of
time, but using packed DNS wire format for this is not terribly great.
It looks like the motivation is to get around DNS firewalls and
filters, which implies deploying a scattered
set of "open" resolvers similar to dnscrypt to get around IP blocking.
Performance should matter in this case.

Marek

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to