Thanks very much for your review.

I submitted -20 now.

Regards,

--
Kazunori Fujiwara, JPRS <fujiw...@jprs.co.jp>

> From: Štěpán Němec <step...@smrk.net>
> Some minor (editorial) issues I noticed in the current (19) draft:
> 
>   3.1
> 
>   R4.  If the UDP responder detects an immediate error indicating that
>   the UDP packet cannot be sent beyond the path MTU size, the UDP
>   responder may recreate response packets fit in the path MTU size, or
>   with the TC bit set.
> 
> s/packets fit/packets that fit/ ? Or perhaps "to fit"?
> 
> I also find "the UDP packet cannot be sent beyond the path
> MTU size" hard to interpret (specifically the "sending
> beyond the path MTU size" part), do you mean "packet exceeds
> the path MTU size"?
> 
>   3.2.  Proposed Recommendations for UDP requestors
> 
>   R5.  UDP requestors should limit the requestor's maximum UDP payload
>   size that fit in the minimum of the interface MTU, the network MTU
>   value configured by the knowledge of the network operators, and the
>   RECOMMENDED maximum DNS/UDP payload size 1400.  A smaller limit may
>   be allowed.  (See Appendix A for more information.)
> 
> s/that fit/to fit/ ?
> s/by the knowledge of the network operators/by the network operators/ ?
> Or perhaps "according to the knowledge of the network" (not operators)?
> 
>   4.  Proposed Recommendations for DNS operators
> 
>   Large DNS responses are typically the result of zone configuration.
>   People who publish information in the DNS should seek configurations,
>   resulting in small responses. 
> 
> The comma makes no sense here (should be dropped).
> 
>   7.1.  On-path fragmentation on IPv4
> 
>   If the Don't Fragment (DF) bit is not set, on-path fragmentation may
>   happen on IPv4, and be vulnerable, as shown in Section 7.3.  To avoid
>   this, recommendation R6 need to be used to discard the fragmented
>   responses and retry by TCP.
> 
> s/be vulnerable/lead to vulnerabilities/ ?
> s/R6 need/R6 needs/ (or "should")
> 
>   7.3.  Weaknesses of IP fragmentation
> 
>   [...]
>   "Domain Validation++ For MitM-Resilient PKI" [Brandt2018] proposed
>   that off-path attackers can intervene in the path MTU discovery
>   [RFC1191] to perform intentionally fragmented responses from
>   authoritative servers.
> 
> I didn't manage to obtain free access to the paper in the
> limited time I was willing to spend on the matter, but the
> way such papers are usually written is they describe attacks
> and propose solutions, not the other way round (and the
> abstract[1] seems to confirm that prejudice), so:
> 
> s/proposed/noted/ ?
> 
> And perhaps also rather "cause authoritative servers to
> return/produce fragmented responses"?
> 
>   [...]
>   due to the small amount of entropy provided by UDP port
>   numbers and DNS message identifiers, each of which being only 16 bits
>   in size, and both likely being in the first fragment of a packet if
>   fragmentation occurs.
> 
> s/each of which/both/
> 
>   7.5.  Possible actions for resolver operators
>   [...]
>   Specifically, config the firewall functions before the full-service
>   resolver to discard incoming DNS response packets
> 
> s/config/configure/
> s/before/in front of/ ?  Or "protecting", to avoid any
> spacial vs. temporal ambiguity?
> 
>   Appendinx A.
>   [...]
>   in the interior of the
>   Internet between recursive resolvers and authoritative servers the
>   prevailing MTU is at 1,500
> 
> I realize this comes verbatim from the report text[2], but
> for consistency/PoLA I suggest s/is at 1,500/is 1500/ (with
> all the numbers and plus/minus/maximum/at least flying
> around in the document I was at first wondering if "least"
> might be missing after "at", and the comma is distracting at
> best).  Failing that, add quotation marks so that it is
> clear that this is a quote from another document (following
> different style).
> 
> Thank you,
> 
>   Štěpán
> 
> [1] https://dl.acm.org/doi/10.1145/3243734.3243790#abstract
> 
> [2] 
> https://indico.dns-oarc.net/event/37/contributions/806/attachments/782/1366/2021-02-04-dns-flag.pdf
> p. 27:
> "Our measurements suggest that in the “interior” of the Internet between 
> recursive
> resolvers and authoritative servers the prevailing MTU is at 1,500."
> 
> _______________________________________________
> DNSOP mailing list -- dnsop@ietf.org
> To unsubscribe send an email to dnsop-le...@ietf.org
> 
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to