I have some small concerns on 5.4. Consideration on TTL I think the language needs to be clearer that if you are in the position of reading the NSEC3 state and the TTL you receive is value <x> that the TTL you assert cannot be longer than <x> and needs very probably to be <x> minus some period of time.
the 'maximum 3 hours' thing I worry implies you can span over the NSEC3 projected gap by any time you like. If you get told "for the next 20 seconds nothing exists betwewn a and b" then I don't think this TTL can be longer than 20 seconds. -G On Wed, Nov 16, 2016 at 3:09 PM, Ondřej Surý <ondrej.s...@nic.cz> wrote: > Hi, > > I read the document and I believe that the document goes to far > to recommend the vendors how to implement the knobs in their > software here: > > It is recommended that resolvers that implement Aggressive Negative > Caching provide a configuration switch to disable the feature. > Separate configuration switches may be implemented for the aggressive > use of NSEC, NSEC3 and wildcard records, and it is recommended to > enable aggressive negative caching by default. > > I would recommend (not strongly) dropping this paragraph. And if not > dropping provide a rationale for such recommendation. (And I am sorry > if this has been rehashed and the rational can be found in the archive. > In that case, the msg-id would be appreciated.) > > ~~~ > (nit) missing whitespace in Section 5.4. third paragraph: > s/RFC2308]also/RFC2308] also/ > > ~~~ > Section 5.4, fourth paragraph, first line: should or SHOULD to match > RECOMMENDED in second paragraph same section? > ~~~ > (nit) Section 6: s/authorative/authoritative/ > > ~~~ > I think a small text to recommend signing domains because of increased > protection would be nice in Section 6. I am happy to provide text if > the authors poke me when I am not jet-lagged. > > ~~~ > (nit) Appendix B: s/NXDOMAN/NXDOMAIN/ > > ~~~ > It's unclear what Appendix B means by "discard it". Does it mean "proceed as > normal" > or "delete it from cache and proceed as normal"? Could you please clarify > the text > in the draft? > > Also 'ENT' is a abbreviation neither defined anywhere else nor explained in > this > document. > > ~~~ > I would also welcome if Sections 5.1, 5.2 and 5.3 had specific examples, > either > in the respective sections or in separate Section or as a part of Appendix B. > > ~~~ > Otherwise the rest of the document is in good shape (if not I blame lack of > sleep) > and I would be happy to review next revision. In case I am silent bug me > until > I do the review. > > Cheers, > -- > Ondřej Surý -- Technical Fellow > -------------------------------------------- > CZ.NIC, z.s.p.o. -- Laboratoře CZ.NIC > Milesovska 5, 130 00 Praha 3, Czech Republic > mailto:ondrej.s...@nic.cz https://nic.cz/ > -------------------------------------------- > > ----- Original Message ----- >> From: internet-dra...@ietf.org >> To: i-d-annou...@ietf.org >> Cc: "dnsop" <dnsop@ietf.org> >> Sent: Wednesday, 16 November, 2016 03:41:29 >> Subject: [DNSOP] I-D Action: draft-ietf-dnsop-nsec-aggressiveuse-06.txt > >> A New Internet-Draft is available from the on-line Internet-Drafts >> directories. >> This draft is a work item of the Domain Name System Operations of the IETF. >> >> Title : Aggressive use of NSEC/NSEC3 >> Authors : Kazunori Fujiwara >> Akira Kato >> Warren Kumari >> Filename : draft-ietf-dnsop-nsec-aggressiveuse-06.txt >> Pages : 16 >> Date : 2016-11-15 >> >> Abstract: >> The DNS relies upon caching to scale; however, the cache lookup >> generally requires an exact match. This document specifies the use >> of NSEC/NSEC3 resource records to allow DNSSEC validating resolvers >> to generate negative answers within a range, and positive answers >> from wildcards. This increases performance / decreases latency, >> decreases resource utilization on both authoritative and recursive >> servers, and also increases privacy. It may also help increase >> resilience to certain DoS attacks in some circumstances. >> >> This document updates RFC4035 by allowing validating resolvers to >> generate negative based upon NSEC/NSEC3 records (and positive answers >> in the presence of wildcards). >> >> [ Ed note: Text inside square brackets ([]) is additional background >> information, answers to frequently asked questions, general musings, >> etc. They will be removed before publication.This document is being >> collaborated on in Github at: https://github.com/wkumari/draft-ietf- >> dnsop-nsec-aggressiveuse. The most recent version of the document, >> open issues, etc should all be available here. The authors >> (gratefully) accept pull requests.] >> >> >> The IETF datatracker status page for this draft is: >> https://datatracker.ietf.org/doc/draft-ietf-dnsop-nsec-aggressiveuse/ >> >> There's also a htmlized version available at: >> https://tools.ietf.org/html/draft-ietf-dnsop-nsec-aggressiveuse-06 >> >> A diff from the previous version is available at: >> https://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-nsec-aggressiveuse-06 >> >> >> Please note that it may take a couple of minutes from the time of submission >> until the htmlized version and diff are available at tools.ietf.org. >> >> Internet-Drafts are also available by anonymous FTP at: >> ftp://ftp.ietf.org/internet-drafts/ >> >> _______________________________________________ >> DNSOP mailing list >> DNSOP@ietf.org >> https://www.ietf.org/mailman/listinfo/dnsop > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop