In general, the resolver function and the authoritative function are best separated on different servers. When serving local data on a local network it is usually necessary to integrate serving authoritative data into the resolver function.
If the proposal if for public DNS servers I no not see a value of such recommendations. Keep those apart. --- Mats Dufberg mats.dufb...@internetstiftelsen.se Technical Expert Internetstiftelsen (The Swedish Internet Foundation) Mobile: +46 73 065 3899 https://internetstiftelsen.se/ -----Original Message----- From: DNSOP <dnsop-boun...@ietf.org> on behalf of Ralf Weber <d...@fl1ger.de> Date: Tuesday, 16 June 2020 at 08:57 To: Davey Song <songlinj...@gmail.com> Cc: dnsop <dnsop@ietf.org> Subject: Re: [DNSOP] Hybird Resolver/ DNS invariants Moin! On 16 Jun 2020, at 4:23, Davey Song wrote: > I happened to run into a discussion of behaviors of Hybrid Resolver/ DNS > invariants where some of the non-typical uses of DNS are listed, especially > on the resolver. I'm encouraged to put them down as a requirement draft of > these uses of DNS and ask the mailing list whether it is a good idea. I > hope it is helpful to provide information including risk for people who are > doing or going to the same thing. > > There are some existing cases in the discussion: > 1. A resolver syncs (pull or receive server push) with an authoritative > server. It reduces the recursion and resolves the very-short TTL > requirement. RFC7706 provides an approach. Other resolveless approaches are > used as well.. > 2. A resolver can forward queries to another resolver if the load is high > to reduce the recursion. > 3. A resolver/authoritative server mode serving Apps via DoH or other > Application-level DNS. Operators of apps can edit each response on demand > and propagate the changes of DNS RR in seconds. It also provides a private > zone and names for each Apps. > 4. A Hybrid DNS which is used as a name server but cache and pull the > authoritative data from another authoritative server. It provides an > approach to easily scale the system without any change of existing > authoritative DNS. > > Do you think it is a useful effort for DNSOP WG? Any suggestions or > observed related discussions on the DNS invariants? Some of these are the same old combination of authoritative and recursive function. Mixing these has caused a lot of problems, please don’t suggest to do that again. How DoX (T, H, Q) changes the DNS landscape is yet to be seen, but I don’t understand how answering via a different network protocol makes a server different. The DNS tree still is the same. What you describe is mix of observed behaviour and local implementations, and IMHO not the best way to deploy DNS, but others may have different opinions here. So if you want to describe these deployments, so that we can discuss them go ahead. But I don’t think that we want to require DNS being build that way. So long -Ralf —-- Ralf Weber _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop