Wessels, Duane <dwess...@verisign.com> wrote:
>

Thanks for looking through my suggestions! All the changes look good.
A few follow-up points:

> Oops, correcting myself here.  It needs to be RFC 2541 because that is the
> one that mentions TCP.

Aha, that makes sense

> > 2.4:
> >
> > Last 2 paragraph s re. avoiding fragmentation, it might be worth
> > suggesting minimal-any [RFC 8482].
>
> I did add 8482 to the Appendix as you also suggested below.  I'm a
> little reluctant to add a reference in section 2.4 since I think the
> primary motivation for 8482 was about DDoS amplification, rather than
> fragmentation.  But I could still be convinced otherwise.

I needed minimal-any when my auth servers were being hammered by lots of
recursive servers making ANY requests; the responses were being truncated
because my servers have for a long time been configured to avoid
fragmentation, and the retries over TCP caused an overload.

I tend to think of all settings that reduce response size as tools for
avoiding fragmentation. Which makes me realise that BIND's
minimal-responses setting is probably also worth a mention. (I dunno if
other servers have a similar knob?)

> > A:
> >
> > Should RFC 2136 UPDATE be mentioned? (sections 2.1, 6.2, 7.8, 7.9) TBH I'm
> > not sure how much UDP is used, but I certainly rely on 60+ KB updates.
>
> I probably don't have enough direct experience with UPDATE to say.  If
> it is largely over TCP then I think it should be included.

I listed the main section numbers that mention TCP. One point in RFC 2136
that's notable from an operational point of view is that an UPDATE client
has to use TCP if it wants to be sure to get a response. Unlike QUERY,
UPDATE is not idempotent so UPDATE-over-UDP can't be retried when there is
packet loss. (But `nsupdate` still uses UDP for small changes; I run it
over localhost which is reliable enough.)

Tony.
-- 
f.anthony.n.finch  <d...@dotat.at>  https://dotat.at/
East Forties: Northwesterly 3 to 5. Moderate. Showers. Good.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to