On Sat, Feb 23, 2019 at 1:54 PM <internet-dra...@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Domain Name System Operations WG of the
> IETF.
>
>         Title           : Serving Stale Data to Improve DNS Resiliency
>         Authors         : David C Lawrence
>                           Warren "Ace" Kumari
>                           Puneet Sood
>         Filename        : draft-ietf-dnsop-serve-stale-03.txt
>         Pages           : 11
>         Date            : 2019-02-23
>
> Abstract:
>    This draft defines a method for recursive resolvers to use stale DNS
>    data to avoid outages when authoritative nameservers cannot be
>    reached to refresh expired data.  It updates the definition of TTL
>    from [RFC1034], [RFC1035], and [RFC2181] to make it clear that data
>    can be kept in the cache beyond the TTL expiry and used for responses
>    when a refreshed answer is not readily available.  One of the
>    motivations for serve-stale is to make the DNS more resilient to DoS
>    attacks, and thereby make them less attractive as an attack vector.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-dnsop-serve-stale/
>
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-dnsop-serve-stale-03
> https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-serve-stale-03
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-serve-stale-03
>
>
In section 5:
Will the "resolution recheck timer" cause ttl's less than the timer to be
effectively lengthened, by refusing to look them up again?

I think 'serve-stale' should focus on the situation where the auth server
is not available, and not change the handling of short ttl's.  Or am I
mis-reading that?

-- 
Bob Harold
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to