Hi, I already said this in private, but will also mention it here: I like this idea.
Some initial comments: 1. Why actually define a new option for this. Since the option only uses one bit to request/acknowledge opportunistic refresh, can't we use one bit from the Z field from the OPT Record TTL Field? 2. The draft says: If Client Subnet [RFC7871] is enabled, resource records in the cache may be associated with a subnet. In these cases, the resolver MUST ensure that the zone serial number associated with such records is obtained from an SOA record associated with the identical subnet. But a SOA record is not associated with a subnet, and most likely will return with a SCOPE of 0 since the option is not actually used to generate the response. Typically with Client Subnet only address records (A, AAAA) will result in a tailored response. Also, an authoritative name server may generate a different response for QTYPE=AAAA while the SOA record has not changed. It would be tricky to make opportunistic refresh work with Client Subnet. It would definitely require more thought, but I would also be fine with just specifying it does not work with ECS. 3. Security Considerations I think this could use some words on the risk that an adversary tries to make a record stick in the cache for longer than it is allowed, by spoofing a response with an additional SOA record (this can be stopped with DNSSEC obviously). Best regards, Matthijs On 03-07-17 13:36, Stephen Morris wrote: > Hi > > We have submitted a new draft which attempts to formalize an idea that > has been kicking around for a couple of years, namely to use serial > number information from DNS responses to determine whether stale records > in a cache can be refreshed without the need for an upstream query. > > Please send comments and feedback to the list. > > Stephen > > > > -------- Forwarded Message -------- > Subject: New Version Notification for > draft-muks-dnsop-dns-opportunistic-refresh-00.txt > Date: Fri, 30 Jun 2017 13:41:45 -0700 > From: internet-dra...@ietf.org > To: Mukund Sivaraman <m...@isc.org>, Shane Kerr > <sh...@timetravellers.org>, Stephen Morris <step...@isc.org> > > > A new version of I-D, draft-muks-dnsop-dns-opportunistic-refresh-00.txt > has been successfully submitted by Mukund Sivaraman and posted to the > IETF repository. > > Name: draft-muks-dnsop-dns-opportunistic-refresh > Revision: 00 > Title: DNS Opportunistic Refresh for Resolvers > Document date: 2017-06-29 > Group: Individual Submission > Pages: 9 > URL: > https://www.ietf.org/internet-drafts/draft-muks-dnsop-dns-opportunistic-refresh-00.txt > Status: > https://datatracker.ietf.org/doc/draft-muks-dnsop-dns-opportunistic-refresh/ > Htmlized: > https://tools.ietf.org/html/draft-muks-dnsop-dns-opportunistic-refresh-00 > Htmlized: > https://datatracker.ietf.org/doc/html/draft-muks-dnsop-dns-opportunistic-refresh-00 > > > Abstract: > This document describes a mechanism whereby a DNS resolver can > opportunistically refresh the TTLs of cached records of a zone using > serial number information carried in responses from the zone's > nameservers. As well as improving resolver response time by reducing > the need to make upstream queries, the mechanism can also reduce the > workload of authoritative servers. > > > > > Please note that it may take a couple of minutes from the time of > submission until the htmlized version and diff are available at > tools.ietf.org. > > The IETF Secretariat > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop > _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop