With Knot Resolver + Knot DNS the fragmentation issues are currently
being addressed quite simply:
* IP_PMTUDISC_OMIT to avoid spoofed MTU
* UDP size limit, 1232 by default (and of course honoring if the other
side wants lower, etc.)
Other points from the draft, perhaps less important:
* fragments are ignored if they arrive over an XDP interface (XDP
usage is not typical)
* TCP is attempted after repeated UDP timeouts
* minimal responses: yes (not configurable)
* smaller signatures: yes, ecdsap256sha256 by default
I also believe that the MTU spoofing should be reflected in this draft's
recommendations. With the current list I _suspect_ attackers could
relatively easily force all 512B+ answers to TC=1 + TCP (if on IPv4).
1232: I haven't gone in detail over the relevant measurements so I'm not
even 100% sure they're conclusive, but it might really will be better to
increase that default. I don't expect any other changes related to this
draft for future.
Use 'minimal-responses' configuration: Some implementations have a
'minimal responses' configuration that causes DNS servers to make
response packets smaller, containing only mandatory and required data
Nit: this formulation makes me wonder what this recommends for SVCB-like
records. Strictly taken I'd say it clashes with some SHOULDs from the
soon-to-be RFC. Either way, SVCB-like queries could be prone to
generating large answers (if this SHOULD is followed).
--Vladimir
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop