Re: [DNSOP] draft-tale-dnsop-serve-stale

P Vix <> Mon, 27 March 2017 22:00 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id C0FBD128959 for <>; Mon, 27 Mar 2017 15:00:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id aDv7PUeBjAPQ for <>; Mon, 27 Mar 2017 15:00:13 -0700 (PDT)
Received: from ( []) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id BCA2D12969F for <>; Mon, 27 Mar 2017 15:00:00 -0700 (PDT)
Received: from [IPv6:2600:1008:b106:5160:f051:ef71:8d6:e50e] (unknown [IPv6:2600:1008:b106:5160:f051:ef71:8d6:e50e]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by (Postfix) with ESMTPSA id 3EB6761F9C; Mon, 27 Mar 2017 22:00:00 +0000 (UTC)
Date: Mon, 27 Mar 2017 21:59:58 +0000
User-Agent: K-9 Mail for Android
In-Reply-To: <>
References: <>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----MF14TR04OSLP6TDC5U16DCXZTJRQYQ"
Content-Transfer-Encoding: 7bit
To:, Dave Lawrence <>
From: P Vix <>
Message-ID: <>
Archived-At: <>
Subject: Re: [DNSOP] draft-tale-dnsop-serve-stale
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 27 Mar 2017 22:00:16 -0000

I agree to review and comment. Note that I am provisionally negative to the idea itself, and my review may reflect that. Vixie

On March 27, 2017 4:56:58 PM CDT, Dave Lawrence <> wrote:
>One of the two drafts I wanted to talk about at dnsop today for WG
>adoption was "Serving Stale Data to Improve DNS Resiliency":
>In short, this describes a method for increasing DNS resiliency by
>treating the inability to refresh data after TTL expiration as a soft
>error, eventually becoming a hard error if the authoritative server
>failures are not remedied.
>This basic algorithm has been in use at Akamai for six years now and
>helped us avoid numerous incidents.  I'd implemented it in BIND and
>the patches were recently contributed to ISC.
>There are relevant patents in the area held by Google and
>Akamai/Xerocole.  I'm still waiting for the official statement from
>Akamai lawyers about it, but given that we contributed to the code to
>ISC for release under the Mozilla Public License I don't expect any
>really issue here.
>Warren and I are hoping for WG adoption.
>DNSOP mailing list

Sent from my Android device with K-9 Mail. Please excuse my brevity.