It sounds like your interest here is not actually in _increasing_ the number of 
record types in the response ("multi qtypes"), but in _decreasing_ it (an "RR 
type filter").  I would treat that as a separate standardization topic.

For now, the Additional Section processing recommended for HTTPS records is not 
a major source of overhead.  Most HTTPS RRsets don't specify an alternate 
TargetName anyway, and some embed IPv4 and IPv6 addresses directly [1].

Another case where this comes up is in the glue address records for delegation. 
 A v4-only (or hypothetically v6-only) resolver has no use for half the glue, 
but it gets it anyway.  A dual-stack resolver theoretically could skip the IPv4 
glue.

I don't think the complexity of skipping these records is worth the 
hypothetical savings in bandwidth or cache (which I doubt would be 
significant), but it would be easier to reason about.

--Ben

[1] https://dns.google/query?name=www.cloudflare.com&rr_type=HTTPS&ecs=
________________________________
From: Petr Menšík <pemen...@redhat.com>
Sent: Friday, September 13, 2024 11:01 AM
To: dnsop@ietf.org <dnsop@ietf.org>
Subject: [DNSOP] Re: HTTPS and SVCB queries with 
draft-bellis-dnsext-multi-qtypes-08 extension

Okay. Then let's mention majority of enterprise networks and ISPs, which still 
have not heard about IPv6. If they have no IPv6 connectivity, they won't use 
that as fallback. All bytes with AAAA addresses delivered to them are wasted. 
Both in


Okay. Then let's mention majority of enterprise networks and ISPs, which still 
have not heard about IPv6. If they have no IPv6 connectivity, they won't use 
that as fallback. All bytes with AAAA addresses delivered to them are wasted. 
Both in memory of caches and on wire.

For IPv4AAS, sure. I expect most of clients will have 464XLAT or similar 
mechanism available. If they do, sending A query and response is okay and 
useful. Then they should indicate it by sending both AAAA and A additional 
queries. They are dual stack in such case, from remote networks view at least.

My idea should help to very conservative networks (no IPv6) or very modern 
networks (no IPv4). Unfortunately DNSSEC validation on client machines is much 
less common than sending unnecessary queries and responses.

On 13/09/2024 16:38, Mark Andrews wrote:
Also just about every IPv6 only network will have IPv4AAS to reach the legacy 
servers so the A records are need especially if you are also validating 
answers.  Also the provide a fallback if the IPv6 path is broken.
--
Mark Andrews

--
Petr Menšík
Software Engineer, RHEL
Red Hat, https://www.redhat.com/
PGP: DFCF908DB7C87E8E529925BC4931CA5B6C9FC5CB
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to