Hacker News Viewer

RFC 6677 DNS Transport over TCP – Implementation Requirements (2016)

by 1vuio0pswjnm7 on 12/11/2025, 9:18:49 PM

https://www.ietf.org/rfc/rfc7766.txt

Comments

by: themafia

&gt; The growing deployment of DNS Security (DNSSEC) and IPv6 has increased response sizes and therefore the use of TCP.<p>Yes, but doesn&#x27;t IPv6 also increase the &quot;maximum safe UDP packet size&quot; from 512 bytes to 1280?<p>&gt; Existing deployments of DNSSEC [RFC4033] have shown that truncation at the 512-byte boundary is now commonplace. For example, a Non-Existent Domain (NXDOMAIN) (RCODE == 3) response from a DNSSEC-signed zone using NextSECure 3 (NSEC3) [RFC5155] is almost invariably larger than 512 bytes.<p>This has been a flagged issue in DNSSEC since it was originally considered. This was a massive oversight on their part and was only added because DNSSEC originally made it quite easy to probe entire DNS trees and expose obscured RRs.<p>&gt; The MTU most commonly found in the core of the Internet is around 1500 bytes, and even that limit is routinely exceeded by DNSSEC-signed responses.<p>&gt; Stub resolver implementations (e.g., an operating system&#x27;s DNS resolution library) MUST support TCP since to do otherwise would limit the interoperability between their own clients and upstream servers.<p>Fair enough but are network clients actually meant to use DNSSEC? Isn&#x27;t this just an issue for authoritative and recursive DNSSEC resolvers to and down the roots?

12/11/2025, 11:03:07 PM


by: sparrish

[March 2016]

12/11/2025, 11:14:20 PM