In message <59c47601.5030...@redbarn.org>, Paul Vixie writes:
> Davey Song() wrote:
> > Hi Paul,
> >
> > I know you suggest expose the problem and let the trouble maker
> > feeling the pain themselves. But return to the specific issue, from
> > APNIC's measurement the ASes in the path are dropping the fragments,
> > rather than end ASes. From these ASes' view , it's your pain not
> > theirs.
>
> it's a question of first mover advantage. EDNS will never be fully
> deployed, because of the middleboxes built before 1999 who "know" what a
> UDP/53 datagram has to look like, and which disallow ADCOUNT>0 && QR=0.

The ones built after 1999 that assume EDNS will always have a version
field of zero, or that there won't be any EDNS options, or that
there won't be any EDNS flags bits, other than DO, are the biggest
problem.

> we can, if we wish, continue to standardize one protocol, watch as the
> world deploys a different one, and still pretent that our effort was
> worthwhile. however, this would fit the technical definition of
> "insanity", and i urge that we avoid this course of action.
>
> > In another word, we are facing the fragmented and uncooperative
> > Internet. What should we do ? It is very hard to coordinate all parts
> > and networks. DNS is a field with lots of tussle.
>
> we need a kernel option for various open source operating systems which
> causes all UDP to be fragmented at 512 octets of payload. for ipv4, so
> that we can hard-smash every middlebox which still prevents EDNS from
> being deployed, and for ipv6 also, so that we can hard-smash any middle
> or edge network who won't carry ipv6 extension headers.
>
> and we need to turn this on everywhere. root, gtld, cctld, recursives,
> authoriatives, 8.8.8.8, opendns... Everywhere. with a press release to
> pre-announce the flag day.
>
> if we're not going to stand up for the standards we write, then we
> should admit that nothing except tcp/80 will work, and avoid all else.

Just padding UDP responses to EDNS buffer size should be enough to
force fragmentation.  If you advertise a 4096 buffer you should be
able to accept such a response.

We also need to bump the EDNS version number.  Going to EDNS(1)
will hit the firewalls that think EDNS(0) is the only EDNS version
they will ever see.

BIND 9.11 is already adding a DNS COOKIE option to every request.
That is causing some firewalls to be fixed as well as some nameservers.
We haven't added additional workaround code for this.

Mark
> --
> P Vixie
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to