Might not hurt to also just mention this in the doc as a reminder for the 
reader...

> Am 31.07.2018 um 22:25 schrieb Benjamin Kaduk <ka...@mit.edu>:
> 
> On Tue, Jul 31, 2018 at 04:14:41PM -0400, Tom Pusateri wrote:
>> 
>> 
>>> On Jul 31, 2018, at 3:53 PM, Tom Pusateri <pusat...@bangj.com> wrote:
>>> 
>>>> 
>>>>  If the RCODE is set to any value other than NOERROR (0) or DSOTYPENI
>>>>  ([TBA2] tentatively 11), then the client MUST assume that the server
>>>>  does not implement DSO at all.  In this case the client is permitted
>>>>  to continue sending DNS messages on that connection, but the client
>>>>  SHOULD NOT issue further DSO messages on that connection.
>>>> 
>>>> I'm confused how the server would still have proper framing for subsequent
>>>> DNS messages, since the DSO TLVs would be "spurious extra data" after a
>>>> request header and potentially subject to misinterpretation as the start of
>>>> another DNS message header.
>>> 
>>> Yes, this is a serious oversight. I think we are going to need to encode 
>>> differently to make all the TLVs look like an RR externally so the RDLEN 
>>> can be used to skip them and add a single count or switch the TLV syntax 
>>> back to RR syntax. The existing DNS header format / RR format is less than 
>>> ideal...
>>> 
>> 
>> My co-authors reminded me about the TCP framing for DNS which gives the 
>> length of the DNS message so it can easily be skipped so this isn’t a 
>> problem.
> 
> Ah, that would do the trick.  It looks like I only chased up through the
> header format in 1035 and didn't scroll down to the "TCP usage" section.
> Sorry for the noise.
> 
> -Benjamin
> 

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to