[DNSOP] draft-ietf-dnsop-avoid-fragmentation-04.txt

fujiwara@jprs.co.jp Fri, 26 February 2021 05:36 UTC

Return-Path: <fujiwara@jprs.co.jp>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFDB13A0D1C for <dnsop@ietfa.amsl.com>; Thu, 25 Feb 2021 21:36:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nVNS3KVmIUph for <dnsop@ietfa.amsl.com>; Thu, 25 Feb 2021 21:36:05 -0800 (PST)
Received: from off-send41.osa.jprs.co.jp (off-send41.osa.jprs.co.jp [117.104.133.135]) by ietfa.amsl.com (Postfix) with ESMTP id 006BB3A0D08 for <dnsop@ietf.org>; Thu, 25 Feb 2021 21:36:04 -0800 (PST)
Received: from off-sendsmg31.osa.jprs.co.jp (off-sendsmg31.osa.jprs.co.jp [172.23.8.161]) by off-send41.osa.jprs.co.jp (Postfix) with ESMTP id A9F974058EF for <dnsop@ietf.org>; Fri, 26 Feb 2021 14:36:03 +0900 (JST)
Received: from off-sendsmg31.osa.jprs.co.jp (localhost [127.0.0.1]) by postfix.imss91 (Postfix) with ESMTP id 931CF6022EEE for <dnsop@ietf.org>; Fri, 26 Feb 2021 14:36:01 +0900 (JST)
Received: from localhost (off-cpu08.osa.jprs.co.jp [172.23.4.18]) by off-sendsmg31.osa.jprs.co.jp (Postfix) with ESMTP id 87FB06022C47 for <dnsop@ietf.org>; Fri, 26 Feb 2021 14:36:01 +0900 (JST)
Date: Fri, 26 Feb 2021 14:36:01 +0900
Message-Id: <20210226.143601.246326576943370743.fujiwara@jprs.co.jp>
To: dnsop@ietf.org
From: fujiwara@jprs.co.jp
X-Mailer: Mew version 6.8 on Emacs 24.5
Mime-Version: 1.0
Content-Type: Text/Plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSS-9.1.0.1231-8.6.0.1013-25996.004
X-TM-AS-Result: No--19.709-5.0-31-10
X-imss-scan-details: No--19.709-5.0-31-10
X-TMASE-Version: IMSS-9.1.0.1231-8.6.1013-25996.004
X-TMASE-Result: 10--19.709300-10.000000
X-TMASE-MatchedRID: aFaKFnJZSSJCXIGdsOwlUmmpWpGzPzJdZggZX8gYmrU2PObui8pABlz+ OVMA6rt+iAO+vCfGdZEj+AfGxc7ZZLCWtPU/7bfHnJ5tL+LbGOONOKo58EEcae1uT4iMemmasmc +HzD5HmgE3IKYiiiTR2qPvFm32wm/OByiP8mqkZsK3Ma88LL+blF5adRR2Ej1kqcmDqh8ct/FYx BBONJAzdI6sCaR451wA32djEHOWJp7e0sj3KOOTOPEkNSS7Y82L7s3UWfpd3N3de2OoBqgwt6a7 wkuum7xWzUxxTADUJohfWBki/Au3uvMSPguOUdSWLXCxEPaFwCOQOsE4nDCdL0/f33kf9GlyYWl HyxayUnfYWzVDx+aLJY59NznjmOKbm9bUFipRwfece0aRiX9Wv4159kh1JlcS6QizeDUeN7Bk2U V37fBLFpV4aaUhGMYkBAw5x9XDqqPl8suWHSuVJ4CIKY/Hg3AtOt1ofVlaoKm8jxRk5/juCOHCQ wuRJVLSQQofLPVHA1nPQAAZZiCoqDmii8RYWYpjoczmuoPCq3IVo/qyDOlRJ8WOC7R2PpSbO/G9 h3cBg16Xnt4ExyO8SBlaIK7Azc7
X-TMASE-SNAP-Result: 1.821001.0001-0-1-12:0,22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/7MaKwNBq3ordVNTJAFvTVqYe6hM>
Subject: [DNSOP] draft-ietf-dnsop-avoid-fragmentation-04.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Feb 2021 05:36:07 -0000

Dear DNSOP WG,

Paul Vixue and I submitted draft-ietf-dnsop-avoid-fragmentation-04.txt .

  https://datatracker.ietf.org/doc/draft-ietf-dnsop-avoid-fragmentation/
  https://tools.ietf.org/html/draft-ietf-dnsop-avoid-fragmentation-04

We changed to use "default maximum DNS/UDP payload size" instead of
"default path MTU value".

Please review current version and choose good "Default Maximum DNS/UDP
payload size".

  Default maximum DNS/UDP payload size for IPv6 is XXXX.
  (Choose 1232, 1400, 1472 or other good values before/at WGLC)

  Default maximum DNS/UDP payload size for IPv4 is XXXX.
  (Choose 1232, 1400, 1452 or other good values before/at WGLC)

Regards,

--
Kazunori Fujiwara, JPRS <fujiwara@jprs.co.jp>

> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Domain Name System Operations WG of the IETF.
> 
>         Title           : Fragmentation Avoidance in DNS
>         Authors         : Kazunori Fujiwara
>                           Paul Vixie
> 	Filename        : draft-ietf-dnsop-avoid-fragmentation-04.txt
> 	Pages           : 11
> 	Date            : 2021-02-22
> 
> Abstract:
>    EDNS0 enables a DNS server to send large responses using UDP and is
>    widely deployed.  Path MTU discovery remains widely undeployed due to
>    security issues, and IP fragmentation has exposed weaknesses in
>    application protocols.  Currently, DNS is known to be the largest
>    user of IP fragmentation.  It is possible to avoid IP fragmentation
>    in DNS by limiting response size where possible, and signaling the
>    need to upgrade from UDP to TCP transport where necessary.  This
>    document proposes to avoid IP fragmentation in DNS.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-dnsop-avoid-fragmentation/
> 
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-dnsop-avoid-fragmentation-04
> https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-avoid-fragmentation-04
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-avoid-fragmentation-04
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>