Re: [DNSOP] [dnsext] Computerworld apparently has changed DNS protocol

Mark Andrews <marka@isc.org> Thu, 05 November 2009 00:03 UTC

Return-Path: <marka@isc.org>
X-Original-To: dnsop@core3.amsl.com
Delivered-To: dnsop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0E49028C158 for <dnsop@core3.amsl.com>; Wed, 4 Nov 2009 16:03:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.495
X-Spam-Level:
X-Spam-Status: No, score=-2.495 tagged_above=-999 required=5 tests=[AWL=0.104, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SbDgc6+Brdif for <dnsop@core3.amsl.com>; Wed, 4 Nov 2009 16:03:29 -0800 (PST)
Received: from farside.isc.org (farside.isc.org [IPv6:2001:4f8:3:bb::5]) by core3.amsl.com (Postfix) with ESMTP id 822B628C15A for <dnsop@ietf.org>; Wed, 4 Nov 2009 16:03:28 -0800 (PST)
Received: from drugs.dv.isc.org (drugs.dv.isc.org [IPv6:2001:470:1f00:820:214:22ff:fed9:fbdc]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "drugs.dv.isc.org", Issuer "ISC CA" (not verified)) by farside.isc.org (Postfix) with ESMTP id E323FE605D; Thu, 5 Nov 2009 00:03:48 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (8.14.3/8.14.3) with ESMTP id nA503jBa008500; Thu, 5 Nov 2009 11:03:46 +1100 (EST) (envelope-from marka@drugs.dv.isc.org)
Message-Id: <200911050003.nA503jBa008500@drugs.dv.isc.org>
To: Florian Weimer <fw@deneb.enyo.de>
From: Mark Andrews <marka@isc.org>
References: <200911041858.TAA24009@TR-Sys.de> <87639qrq25.fsf@mid.deneb.enyo.de>
In-reply-to: Your message of "Wed, 04 Nov 2009 21:30:10 BST." <87639qrq25.fsf@mid.deneb.enyo.de>
Date: Thu, 05 Nov 2009 11:03:45 +1100
Sender: marka@isc.org
Cc: namedroppers@ops.ietf.org, Alfred Hönes <ah@TR-Sys.de>, dnsop@ietf.org
Subject: Re: [DNSOP] [dnsext] Computerworld apparently has changed DNS protocol
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2009 00:03:30 -0000

In message <87639qrq25.fsf@mid.deneb.enyo.de>, Florian Weimer writes:
> * Alfred H=F6nes:
> 
> > There must be a hidden trick to introduce DNS Jumbograms we just
> > forgot to mention ....
> 
> The claims about firewall issues seems dubious to me.  It's certainly
> not the 512 byte limit which is a problem here---I think we've got
> pretty good empiric evidence that it's not a problem anymore.  Several
> root responses are already larger than 512 bytes, and you can't send
> mail to AOL or Yahoo if you're behind a firewall that swallows
> responses larger than 512 bytes.  People tend to fix such things,
> especially if the Internet is a new thing to them and they want to
> communicate with each other, instead of merely being right and
> protocol compliant.

And the protocol says that answers bigger than 512 bytes are legal
if EDNS is in use.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org