Hi,
I have also difficulties finding any benefit of such feature. Shall it
help lowering bandwidth usage for authoritatives or for recursives? I'd
say that for authoritatives in general, legitimate traffic is the
minority, so reducing that would not help much.
I'd oppose the idea of having the "noting has changed" signal insecure.
It should be carefully discussed why it would be not a big problem.
One idea that came to my mind is to utilize ZONEMD: the recursive could
re-query just ZONEMD (+its RRSIG), assume that nothing else in the zone
has changed (SOA, DNSKEYs, any RRSIGs....), and re-set their TTLs to
original. It could just cause problems if TTL of ZONEMD is greater than
TTL of DNSKEY, in case of some key roll-overs, so one would probably
require the TTL of ZONEMD be the minimum of zone's TTLs (currently it's
RECOMMENDED to equal SOA TTL).
Libor
Dne 04. 08. 23 v 13:07 jab...@strandkip.nl napsal(a):
Hi Petr,
On Aug 4, 2023, at 05:21, Petr Menšík <pemen...@redhat.com> wrote:
Again, this proposal is not targeted to gigabit+ links connectivity. This is
not indented to fight DDoS in data centers. It would be links, where data are
still counted in kilobytes or megabytes. Satellite links or long range radios
might be example. Low-power IoT devices battery operated devices as well.
I still have my doubts about the usefulness of shaving a relatively small
number of bytes off a transaction that is already pretty light on the wire. Any
device for which a significant proportion of its available capacity is consumed
by DNS in normal operation is presumably not doing very much else. But...
I would recommend checking the paper I have referenced about CoAP. It explains
well constrained environment with limited connectivity and low maximal MTU.
... that is a very reasonable request, and I will do so.
Joe
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop