On 13 Jan 2010, at 18:19, Olafur Gudmundsson wrote:

I would like to propose that the document take the plunge of recommending that
modern DNSSEC capable resolvers perform the priming query over TCP.

I'm not sure it's a good idea to encourage more TCP traffic to the root servers or make that the default. It doesn't seem right to oblige servers with decent underlying transport that can handle big EDNS0 payloads to ignore that and use TCP for their priming queries.

How about the following text instead?

Priming queries from DNSSEC-aware resolvers

A DNSSEC-aware priming query will generate a response of at least 5K. DNSSEC-aware resolvers making a priming query with EDNS0 SHOULD use a minimum buffer size of foo*. If such a priming query fails -- say because of fragmentation issues in the underlying network -- a DNSSEC- aware resolver SHOULD use TCP. If TCP is refused or times out a different server SHOULD be tried. After TCP failures from 3 root servers, the resolver SHOULD fall back on UDP and use an EDNS0 buffer no larger than bar*. A resolver resorting to UDP/EDNS with a buffer size of bar should use that combination for subsequent queries needed to fully validate the response to their priming query.

Priming queries from DNSSEC-ignorant resolvers

A resolver that is DNSSEC ignorant but EDNS0 capable SHOULD issue the priming query over UDP using ENDS0 and MUST provide a buffer size of 1220 or larger. If the UDP query with EDNS0 times out or fails, TCP SHOULD be tried.

Priming queries from DNSSEC-ignorant resolvers

An EDNS0 ignorant resolver MUST issue the priming query over UDP.


* The values for foo and bar are open for discussion. Though there should be some text to explain whatever values were decided. As a straw man, how about 8K for foo and 1220 for bar? As a number plucked from the air, 8K should be "big enough" to cope with larger or extra signatures, when there's say a rollover of 2048 bit RSA keys under way. [I've not done the arithmetic to check if a signed root response with 2 such keys will fit in 8K. So shoot me...] For bar, the number is even murkier. It needs to be much less than foo (obviously), so maybe the payload should be set to that for an unsigned UDP response?
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to