On Mon, Nov 23, 2015 at 1:08 PM, 神明達哉 <jin...@wide.ad.jp> wrote:

> At Sun, 22 Nov 2015 14:52:34 +0100,
> Stephane Bortzmeyer <bortzme...@nic.fr> wrote:
>
> > > I've read draft-bortzmeyer-dnsop-nxdomain-cut-00
> >
> > Do note that -01 will be out in the next days and there are
> > substantial changes. So, readers may prefer to wait 48h :-)
>
> Okay, I'm now referring to 01.
>
> > >   I suspect this is highly implementation dependent and so the
> > >   RFC2119 'SHOULD' is not really appropriate.  First off, what
> > >   "delete" means isn't very clear.
> >
> > It is now defined. ' "Deleted" means that subsequent requests for
> > these names will yield NXDOMAIN. '
> >
> > >   But even if the resolver doesn't really "delete" the memory, it
> > >   could look as if it did as long as the resolver doesn't use it for
> > >   subsequent query handling
> >
> > Correct, but this is a general rule with IETF protocols: we mandate
> > the external behavior, not the implementation.
>
> That was exactly my point, and in that sense I'd say "SHOULD delete"
> is redundant (and possibly imposes unnecessary restrictions on
> implementations).


Yes, I agree. The current description is a bit too implementation specific.


> The revised wording in 01 now looks even more
> redundant:
>
>    When an iterative caching DNS resolver stores an NXDOMAIN in its
>    cache, all names and RRsets at or below that node SHOULD be deleted
>    since they will have become unreachable.  "Deleted" means that
>    subsequent requests for these names will yield NXDOMAIN.
>
> as it's already covered in the first paragraph:
>
>    When searching downward in its cache, an iterative caching DNS
>    resolver SHOULD stop searching if it encounters a cached NXDOMAIN.
>    The response to the triggering query should be NXDOMAIN.
>
> (Strictly speaking it does not use a 'SHOULD' about returning NXDOMAIN
> for these queries, but that should be a natural consequence of the
> SHOULD about stopping the search).



> > > I suggest stating that more clearly.
> >
> > Done
>
> Regarding this topic, I think it should rather refer to
> qname-minimization here:
>
>    queries.  (It would be better if the SOA record in the NXDOMAIN
>    response were sufficient to find the non-existing domain but this is
>    more delicate, see Section 5.)
>
> than updating the interpretation of SOA.  qname-minimization is much
> less controversial and will certainly help in this scenario.
>

Also agree. I think it would be best if this draft remained focussed on
correct interpretation of the NXDOMAIN response code, and leave this SOA
discussion out.


> > >   A minor corner case, but I suspect this is not fully accurate if
> > >   QNAME is the name specified in the question section.
> >
> > Added.
>
> Perhaps you might introduce a dedicated terminology such as "NXDOMAIN
> name" as used in someone else's comment and use it consistently,
> rather than just note this once and keep using QNAME in other places.
>
>
> One additional comment on 01:
>
> - Section 7
>
>    The technique described here may help against a denial-of-service
>    attack named "random qnames" and described in Section 3.
>
>   I suggest "a denial-of-service attack on authoritative servers" for
>   the same reason as my comment on the "benefits" section of the
>   previous version.
>

Yes,  this sounds appropriate.

-- 
Shumon Huque
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to