Dear dnsop WG,

Authours submitted avoid-fragmentation-17 following comments from IESG review.

> Internet-Draft draft-ietf-dnsop-avoid-fragmentation-17.txt is now available.
> It is a work item of the Domain Name System Operations (DNSOP) WG of the IETF.
> 
> https://datatracker.ietf.org/doc/draft-ietf-dnsop-avoid-fragmentation/
> https://author-tools.ietf.org/iddiff?url2=draft-ietf-dnsop-avoid-fragmentation-17

Some recommendations have changed and will be introduced here.
Authors intend to respond within the scope of discussions in the dnsop WG.

R2. Where supported, UDP responders SHOULD set IP "Don't Fragment
    flag (DF) bit" [RFC0791] on IPv4.

   "MAY" was changed as "Where supported," + "SHOULD"

R6. UDP requestors SHOULD drop fragmented DNS/UDP responses without
    IP reassembly to avoid cache poisoning attacks.

   "MAY" was changed as "SHOULD"

R7. DNS responses may be dropped by IP fragmentation. Upon a
    timeout, to avoid resolution failures, UDP requestors SHOULD retry
    using TCP or UDP with a smaller EDNS requestor's maximum UDP payload
    size per local policy. UDP requestors SHOULD observe [RFC8961] in
    setting their timeout.

    "MAY" was changed as "SHOULD".
    However, all recent implementations do some retries.
    The details are left to the implementations.

--
Kazunori Fujiwara, JPRS <fujiw...@jprs.co.jp>

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to