[DNSOP] draft-ietf-dnsop-avoid-fragmentation-04.txt
fujiwara@jprs.co.jp Fri, 26 February 2021 05:36 UTC
Return-Path: <fujiwara@jprs.co.jp>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFDB13A0D1C for <dnsop@ietfa.amsl.com>; Thu, 25 Feb 2021 21:36:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nVNS3KVmIUph for <dnsop@ietfa.amsl.com>; Thu, 25 Feb 2021 21:36:05 -0800 (PST)
Received: from off-send41.osa.jprs.co.jp (off-send41.osa.jprs.co.jp [117.104.133.135]) by ietfa.amsl.com (Postfix) with ESMTP id 006BB3A0D08 for <dnsop@ietf.org>; Thu, 25 Feb 2021 21:36:04 -0800 (PST)
Received: from off-sendsmg31.osa.jprs.co.jp (off-sendsmg31.osa.jprs.co.jp [172.23.8.161]) by off-send41.osa.jprs.co.jp (Postfix) with ESMTP id A9F974058EF for <dnsop@ietf.org>; Fri, 26 Feb 2021 14:36:03 +0900 (JST)
Received: from off-sendsmg31.osa.jprs.co.jp (localhost [127.0.0.1]) by postfix.imss91 (Postfix) with ESMTP id 931CF6022EEE for <dnsop@ietf.org>; Fri, 26 Feb 2021 14:36:01 +0900 (JST)
Received: from localhost (off-cpu08.osa.jprs.co.jp [172.23.4.18]) by off-sendsmg31.osa.jprs.co.jp (Postfix) with ESMTP id 87FB06022C47 for <dnsop@ietf.org>; Fri, 26 Feb 2021 14:36:01 +0900 (JST)
Date: Fri, 26 Feb 2021 14:36:01 +0900
Message-Id: <20210226.143601.246326576943370743.fujiwara@jprs.co.jp>
To: dnsop@ietf.org
From: fujiwara@jprs.co.jp
X-Mailer: Mew version 6.8 on Emacs 24.5
Mime-Version: 1.0
Content-Type: Text/Plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSS-9.1.0.1231-8.6.0.1013-25996.004
X-TM-AS-Result: No--19.709-5.0-31-10
X-imss-scan-details: No--19.709-5.0-31-10
X-TMASE-Version: IMSS-9.1.0.1231-8.6.1013-25996.004
X-TMASE-Result: 10--19.709300-10.000000
X-TMASE-MatchedRID: aFaKFnJZSSJCXIGdsOwlUmmpWpGzPzJdZggZX8gYmrU2PObui8pABlz+ OVMA6rt+iAO+vCfGdZEj+AfGxc7ZZLCWtPU/7bfHnJ5tL+LbGOONOKo58EEcae1uT4iMemmasmc +HzD5HmgE3IKYiiiTR2qPvFm32wm/OByiP8mqkZsK3Ma88LL+blF5adRR2Ej1kqcmDqh8ct/FYx BBONJAzdI6sCaR451wA32djEHOWJp7e0sj3KOOTOPEkNSS7Y82L7s3UWfpd3N3de2OoBqgwt6a7 wkuum7xWzUxxTADUJohfWBki/Au3uvMSPguOUdSWLXCxEPaFwCOQOsE4nDCdL0/f33kf9GlyYWl HyxayUnfYWzVDx+aLJY59NznjmOKbm9bUFipRwfece0aRiX9Wv4159kh1JlcS6QizeDUeN7Bk2U V37fBLFpV4aaUhGMYkBAw5x9XDqqPl8suWHSuVJ4CIKY/Hg3AtOt1ofVlaoKm8jxRk5/juCOHCQ wuRJVLSQQofLPVHA1nPQAAZZiCoqDmii8RYWYpjoczmuoPCq3IVo/qyDOlRJ8WOC7R2PpSbO/G9 h3cBg16Xnt4ExyO8SBlaIK7Azc7
X-TMASE-SNAP-Result: 1.821001.0001-0-1-12:0,22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/7MaKwNBq3ordVNTJAFvTVqYe6hM>
Subject: [DNSOP] draft-ietf-dnsop-avoid-fragmentation-04.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Feb 2021 05:36:07 -0000
Dear DNSOP WG, Paul Vixue and I submitted draft-ietf-dnsop-avoid-fragmentation-04.txt . https://datatracker.ietf.org/doc/draft-ietf-dnsop-avoid-fragmentation/ https://tools.ietf.org/html/draft-ietf-dnsop-avoid-fragmentation-04 We changed to use "default maximum DNS/UDP payload size" instead of "default path MTU value". Please review current version and choose good "Default Maximum DNS/UDP payload size". Default maximum DNS/UDP payload size for IPv6 is XXXX. (Choose 1232, 1400, 1472 or other good values before/at WGLC) Default maximum DNS/UDP payload size for IPv4 is XXXX. (Choose 1232, 1400, 1452 or other good values before/at WGLC) Regards, -- Kazunori Fujiwara, JPRS <fujiwara@jprs.co.jp> > A New Internet-Draft is available from the on-line Internet-Drafts directories. > This draft is a work item of the Domain Name System Operations WG of the IETF. > > Title : Fragmentation Avoidance in DNS > Authors : Kazunori Fujiwara > Paul Vixie > Filename : draft-ietf-dnsop-avoid-fragmentation-04.txt > Pages : 11 > Date : 2021-02-22 > > Abstract: > EDNS0 enables a DNS server to send large responses using UDP and is > widely deployed. Path MTU discovery remains widely undeployed due to > security issues, and IP fragmentation has exposed weaknesses in > application protocols. Currently, DNS is known to be the largest > user of IP fragmentation. It is possible to avoid IP fragmentation > in DNS by limiting response size where possible, and signaling the > need to upgrade from UDP to TCP transport where necessary. This > document proposes to avoid IP fragmentation in DNS. > > > The IETF datatracker status page for this draft is: > https://datatracker.ietf.org/doc/draft-ietf-dnsop-avoid-fragmentation/ > > There are also htmlized versions available at: > https://tools.ietf.org/html/draft-ietf-dnsop-avoid-fragmentation-04 > https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-avoid-fragmentation-04 > > A diff from the previous version is available at: > https://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-avoid-fragmentation-04 > > > Please note that it may take a couple of minutes from the time of submission > until the htmlized version and diff are available at tools.ietf.org. > > Internet-Drafts are also available by anonymous FTP at: > ftp://ftp.ietf.org/internet-drafts/ > > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop >