> I'm sorry but I don;t understand the point you are making here.

- A DNS query for an FQDN with a length of 255 using DNSSEC leads to a 
  336b message on the wire. It is unlikely that we will cram enough
  into DNS to raise this above 1280.
- In the past, some vocal voices were rather clear that any changes
  should be transparent for recursive implementations, as it is
  unlikely that these will be changed so quickly.
- If a recursive receives responses from authoritatives adhering to
  draft-ietf-dnsop-avoid-fragmentation-20, i.e., also the guidance
  on authoritatives in draft-momoka-dnsop-3901bis-06, the messages
  the recursive will receive will be fine.
- A recursive replying from cache might then create on-the-wire
  messages that creates an issue. That, though, would either require
  providing explicit guidance on recursive implementations w.r.t.
  packet size, which was discouraged earlier given the difficulty of
  changing all in-place implementations, or need to accept that this
  already is a visible problem and in the authority of an individual
  operator.

  Hence, even though i do see the appeal in regulating this aspect, I 
  am currently unsure how it interacts with earlier suggestions on the
  draft. 

  Also, I do have some scope concerns. Resolving those, would likely
  require a more comprehensive approach, ensuring a tighter per-ID
  scope.

> > 
> HE territory? For the acronym challenged (myself included) what
> are you referring to here?

Ah, I was referring to 'Happy Eyeballs'; Initially in RFC6555, later
revised in RFC8305, this specifies how clients should interact in dual-
stack setting for selecting the IP protocol to use.

At the moment, there is draft-pauly-v6ops-happy-eyeballs-v3 ongoing.
This draft also includes guidance on transport protocol selection as
well, even though--at the moment--this only provides guidance on TCP
vs. QUICK.

> I would've though that a document that is recommending dual stack
> operation of DNS resolvers would either provide some clarification on
> its dual stack behaviour or provide a pointer to an RFC that
> contains this clarification.

The idea here was to seperate the operational requirement (equal
footing operation of IPv4 and IPv6) in this document, in line with the
prior phrasing of RFC3901, while leaving the selection aspect out of
scope. Adding this in this document would conflict with the prior work
of generally specifying that behavior in a dedicated draft.

This leaves, in my opinion, four options:

- Leave this aspect unmentioned, as per the approach in the (pre HE)
  original RFC3901
- Create dedicated document(s) specifying transport protocol selection
  for DNS (which might be relevant given the abundance of transports;
  DoUDP, DoTCP, DoT, DoH, and all of that for v4 and v6); Especially
  for DoT and DoH, though, this would also necessitate specifying
  public key discovery for the authoritative and recursive case (i
  recently pondered over TLSA in ADDITIONAL for that); There is also
  the case of recursive discovery there, that needs to be addressed,
  especially in the absence of PKI valid certificates; Even though
  there TLSA in ip6.arpa/in-addr.arpa might be a thing.
- Add it in the current draft, potentially creating conflicting
  guidance for DNS in comparison to the general efforts going on
- Add these considerations to the discussion around
  draft-pauly-v6ops-happy-eyeballs-v3

I _personally_ would argue that the second approach would be the way to
go, aggregating the corresponding documents in a BCP ('a' BCP, as BCP91
is currently 'DNS IPv6 Transport Operational guidelines'; The BCP could
rather become 'Operational Guidelines on Discovering, Providing, and
Selecting DNS Transports for Authoritative and Recursive Servers')

Such would then have to contain (at least; open for suggestions):

- 3901bis
- draft-ietf-dnsop-avoid-fragmentation
- draft-tbd-dnsop-dns-auth-transport-selection
        Guidance on how to select from available protocols; Would need
        an additional document draft-tbd-dnsop-dns-auth-key-discovery
        to enable DoH/DoT without names; Which should be straight
        forward
- draft-tbd-dnsop-dns-rec-transport-selection
        Expanding on, among others RFC9606, also needing an additional
        document draft-tbd-dnsop-dns-rec-key-discovery for recursive
        DNS key discovery in the case of DoH/DoT

The issue there is that there are some rather neat things that can be
done, especially to bring DoT/DoH to authoritative DNS (via TLSA in
additional, given that that would signal proto/port already);

However, there are also just 24h in my day, so if the WG would be
interested in a more fundamental 'all bases covered' approach that does
not blow a single document beyond clarity (imho), it might be good to
discuss this in Dublin more extensively (and have some of the documents
authored by more people, if there would be interest in such a
fundamental overhaul ;));

I do certainly see the appeal of nailing down that door for good by
creating an (extensible) BCP covering all bases.

With best regards,
Tobias

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to