2
0
mirror of https://github.com/ietf-wg-dnsop/wg-materials synced 2025-08-22 02:09:16 +00:00
dnsop-wg-materials/interim-2021-dnsop-01/interim-2021-dnsop-01-minutes.txt
2021-10-02 18:12:52 -04:00

78 lines
4.3 KiB
Plaintext

DNS Operations (DNSOP) Working Group
Interim-2021-dnsop-01
Chairs: Tim Wicinski, Suzanne Woolf, Benno Overeinder
Minutes taken by Paul Hoffman
Text from slides not included
draft-ietf-dnsop-avoid-fragmentation
https://datatracker.ietf.org/doc/slides-interim-2021-dnsop-01-sessa-dnsop-avoid-fragmentation/
Kazunori Fujiwara
Brian Dickson: Maybe look at differences between stub-to-recursive and recursive-to-auth
Paul Hoffman: Maybe have this be an informational document because it is not a single practice
Warren Kumari: Informational is OK
Brian: Could be a BCP if we have a must-not-exceed value
Being a BCP will have people realize "this is really important"
Peter Koch: Could live with a single value for developers, but need configurations for operators
BCP could be "apply these considerations for good reasons"
Tim: Would need logic for each choice
Warren: It makes more sense to ask for a BCP, but let it be downgraded to informational by the IESG
Mark Andrews: Has an expired draft about well-known TSIG
Will defeat all fragmentation attacks, rather than saying "do not fragment on UDP"
Current proposal leads to black holes in routers
Can do what we want at the DNS layer instead of the IP layer
Wants the WG to look at his proposal
https://www.ietf.org/archive/id/draft-andrews-dnsop-defeat-frag-attack-00.txt
Don't switch to TCP too early
Brian: Thinks 1452 is a resonable number
Likely to get through even the biggest tunnels
What should auth servers set its buffer size?
PaulH: The author's preferred value needs to be justified, not just stated
Suzanne Woolf: Might be looking at this backwards
The BCP is "don't just blindly pick a number, choose your use case and compare them to what's listed"
Tim: Maybe breaking out the roles to make more obvious
draft-ietf-dnsop-glue-is-not-optional
https://datatracker.ietf.org/doc/slides-interim-2021-dnsop-01-sessa-glue-is-not-optional/
Duane Wessels
Brian: Intent should be if you don't include sibling glue, must set TC=1
Must include it if over TCP
Wants a MUST with refined wording
Make it more clear
Ben Schwartz: Would prefer zone operators must not construct sibling glue loops
Authoritative servers can ignore zones with loops
This is not a performance optimization
Mark: This is not meant as an optimization, it is to make sure the resolver can make the next query
You might succeed, but if there is a loop there, the resolution will fail
Ben: Make it fail
Paul: Would need to change the wording for RFC 1034 if we go to SHOULD
John Levine: Clarify the new sentence for 1034
Agrees with Ben on soMUST NOT for sibling loops
Worth adding more words
Duane: Please send text
Warren: There should be an example of a sibling glue loop
"Don't do this"
Brian: Sympathetic to the concept of getting rid of sibling glue loops
Could be arbitrarily deep in the DNS tree
Not feasible to look too far down
Ben: Don't create a loop, but auth servers MAY configure not to serve them
The behavior has to be compatible
Paul: Restated the need to change the 1034 wording if we differentiate sibling glue from classic glue
Ben: Doesn't feel that the portability of zones with sibling glue loops is a priority
Brian: Interoperability, not portability
Depends where the sibling glue lives, particularly down the tree
Duane: Hearing both opinions
Most current authoritative implementations fit as much glue as they can, don't truncate
This draft changes the "some but not all fit" situation
Things will continue to work, but will see more TCP traffic
Suzanne: Maybe corner cases
Need to resolver these issues, but primary message needs to be clear
Brian: Third case: if the auth server is configured to be narrow glue policy, that's different than today
Should be permissable, TC=1 must be set
Ben: Two questions: what is the glue policy, and what happens when the glue doesn't fit
Separate out the glue policy
Permit a range of behaviors
Brian: Behavior over TCP is not affecteb by the glue policy
Tim: need more from the mailing list