Matthew,

On Nov 4, 2009, at 1:45 PM, Matthew Dempsky wrote:
> On Wed, Nov 4, 2009 at 12:04 PM, David Conrad <d...@virtualized.org> wrote:
>> On Nov 4, 2009, at 11:41 AM, Matthew Dempsky wrote:
>>> On Wed, Nov 4, 2009 at 11:26 AM,  <bmann...@vacation.karoshi.com> wrote:
>>>>       The current deployment plan is to stage things to push out large 
>>>> responses
>>>>       early - prior to having any actual DNSSEC usable data ... ostensibly 
>>>> to
>>>>       flush out DNSmtu problems.
>>> 
>>> Is this plan to push out large responses indiscriminately, or only in
>>> response to queries with DO=1?
>> 
>> We're not planning on breaking the DNS protocol.  DNSSEC responses will only 
>> be provided if DO=1 (currently about 70% of the queries hitting the root 
>> have DO=1).
> 
> I'd appreciate if someone could clarify what the "large responses"
> that will preexist "actual DNSSEC usable data" that Bill Manning is
> referring to are.

They are signed responses, but signed with a 'deliberately unvalidatable root 
key'.

> It's unclear to me whether it's still technically
> DNSSEC data and hence would require a client to send DO=1,

Yes, it is DNSSEC data and will only be returned if DO=1.  Clients that do not 
set DO=1 will not receive the DNSSEC responses.

> or if it
> will be something like large additional section TXT records or just
> trailing bytes.

No.

Regards,
-drc


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to