Barry,

Thanks for the detailed review. The editorial comments and security
considerations comment will be addressed in a new draft I will be
pushing.

On Wed, Sep 11, 2019 at 12:06 PM Barry Leiba <barryle...@computer.org> wrote:
>
> I am handling this document as responsible AD, as Warren is a
> co-author and so must recuse himself.  I’m not sure how I missed the
> publication request, but miss it I did, and thanks to Warren for
> pinging me.
>
> Thanks for a very well-written and clear document.  I have only some
> minor editorial comments and a couple of questions, all of which can
> be addressed along with any last-call comments that come along.  I’ll
> request last call right after I send this message.
>
> — Abstract —
>
>    data can be kept in the cache beyond the TTL expiry, and also updates
>    RFC 2181 by interpreting values with the high order bit set as being
>    positive, rather than 0, and also suggests a cap of 7 days.
>
> The chain of “and also”s feels awkward; I would remove the first one,
> so “…TTL expiry, updates RFC 2181…”.  (I might remove the second
> “also” as well, as “and suggests” is fine without it.)  This text is
> also in the Introduction, so whatever change is made in the Abstract
> should be made in the Introduction too.
DONE

>
> — Introduction —
>
>    This document proposes that the definition of the TTL be explicitly
>    expanded to allow for expired data to be used in the exceptional
>
> This isn’t wrong, but for a standards-track document we would usually
> say, “This document expands the definition of the TTL to explicitly
> allow for…”.  It will be published as a Proposed Standard, so I guess
> the “proposed” part can just come from there, yes?
DONE

>
> — Section 3 —
>
>    This is again not [RFC2119]-normative
>    language, but does convey the natural language connotation that data
>
> In my ongoing effort to disabuse people of the idea that language has
> to have BCP 14 key words in order to be normative, I would prefer that
> this say, “This wording again does not contain BCP 14 key words,
> but…,” because I do believe the quoted text is normative.
DONE

>
>    Several recursive resolver operators currently use stale data for
>    answers in some way, including Akamai.
>
> Misplaced modifier:
> NEW
>    Several recursive resolver operators, including Akamai, currently
>    use stale data for answers in some way.
> END
DONE

>
>    collective operational experience is that it provides significant
>    benefit with minimal downside.
>
> The antecedent to “it” is unclear (it could refer to Apple MacOS or
> the Happy Eyeballs algorithm or mDNSResponder).  Better to say, “…is
> that using stale data can provide….”
DONE

>
> — Section 4 —
>
>       If the data is unable to be
>       authoritatively refreshed when the TTL expires, the record MAY be
>       used as though it is unexpired.
>
> I wonder if it makes sense to be more explicit here that one isn’t
> meant to keep using expired data forever, but is expected to keep
> trying to refresh it.  So, maybe?:
>
> NEW
>       If the data is unable to be
>       authoritatively refreshed when the TTL expires, the record MAY be
>       used as though it is unexpired until an authoritative refresh is
>       successful.
> END

Addressing along with Stephane's response.

>
> — Section 5 —
>
> “implementation dependent” needs a hyphen: “implementation-dependent”
DONE

>
> — Section 6 —
>
>    fact that no other RCODEs which a resolver normally encounters makes
>    any assertions regarding the name in the question
>
> Number agreement: “make any assertions”  (I would also change “which”
> to “that”, but I’m picky about using “that” to introduce restrictive
> clauses.)
DONE

>
>    existing cache state.  Some authoritative servers operators have said
>
> Either “authoritative server operators” or “authoritative servers’
> operators”; I think the former.
DONE

>
>    their servers are responding with errors like ServFail instead of
>    giving true authoritative answers.  Implementers MAY decide to return
>    stale answers in this situation.
>
> It might be good for the last paragraph in Section 4, with the
> “SHOULD”, to have a forward reference to this explanation.
DONE

>
> — Section 10 —
>
> Is another possible new security consideration that bad actors could
> DDoS authoritative servers with the explicit intent of having stale
> cached information used for longer, perhaps to extend the life of a
> cache-poisoning attack or some such?

Added wording with suggested text from Stephane.

-Puneet

>
> --
> Barry

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to