On 30 Oct 2025, at 14:49, Hank Nussbacher <hank@efes.iucc.ac.il> wrote:
https://pulse.internetsociety.org/blog/more-than-70-of-dns-root-queries-are-...
The surprising thing to me about this is that anybody thinks this is surprising. Evi Nemeth wrote about this over 20 years ago. Do people imagine that the graph of junk is going down and to the right? https://www.caida.org/catalog/papers/2001_dnsmeasroot/dmr.pdf Joe
All the more reason to take a look at Geoff Huston’s plan to reinvent the Root. https://419.consulting/encrypted-dns/f/reinventing-the-root Andrew Sent from Outlook for iOS<https://aka.ms/o0ukef> ________________________________ From: Joe Abley via dns-wg <dns-wg@ripe.net> Sent: Thursday, October 30, 2025 10:38:59 AM To: Hank Nussbacher <hank@efes.iucc.ac.il> Cc: dns-wg@ripe.net <dns-wg@ripe.net> Subject: [dns-wg] Re: More Than 70% of DNS Root Queries Are Junk On 30 Oct 2025, at 14:49, Hank Nussbacher <hank@efes.iucc.ac.il> wrote:
https://pulse.internetsociety.org/blog/more-than-70-of-dns-root-queries-are-...
The surprising thing to me about this is that anybody thinks this is surprising. Evi Nemeth wrote about this over 20 years ago. Do people imagine that the graph of junk is going down and to the right? https://www.caida.org/catalog/papers/2001_dnsmeasroot/dmr.pdf Joe ----- To unsubscribe from this mailing list or change your subscription options, please visit: https://mailman.ripe.net/mailman3/lists/dns-wg.ripe.net/ As we have migrated to Mailman 3, you will need to create an account with the email matching your subscription before you can change your settings. More details at: https://www.ripe.net/membership/mail/mailman-3-migration/
On 30 Oct 2025, at 14:38, Joe Abley via dns-wg <dns-wg@ripe.net> wrote:
The surprising thing to me about this is that anybody thinks this is surprising. Evi Nemeth wrote about this over 20 years ago. Do people imagine that the graph of junk is going down and to the right?
More importantly Joe, does anyone imagine they'll ever go down and to the right? With ever-increasing zillions of people getting Gb/s+ connections at home, I fear there's only one direction those graphs of junk traffic are going to go.
On 30 Oct 2025, at 16:29, Jim Reid <jim@rfc1035.com> wrote:
On 30 Oct 2025, at 14:38, Joe Abley via dns-wg <dns-wg@ripe.net> wrote:
The surprising thing to me about this is that anybody thinks this is surprising. Evi Nemeth wrote about this over 20 years ago. Do people imagine that the graph of junk is going down and to the right?
More importantly Joe, does anyone imagine they'll ever go down and to the right?
Not really more importantly, Jim, since that was exactly my point :-) Joe
Proprietary From: Joe Abley via dns-wg <dns-wg@ripe.net> Date: Thursday, 30 October 2025 at 14:39 To: Hank Nussbacher <hank@efes.iucc.ac.il> Cc: dns-wg@ripe.net <dns-wg@ripe.net> Subject: [dns-wg] Re: More Than 70% of DNS Root Queries Are Junk On 30 Oct 2025, at 14:49, Hank Nussbacher <hank@efes.iucc.ac.il> wrote:
https://pulse.internetsociety.org/blog/more-than-70-of-dns-root-queries-are-...
The surprising thing to me about this is that anybody thinks this is surprising. Evi Nemeth wrote about this over 20 years ago. Do people imagine that the graph of junk is going down and to the right? https://www.caida.org/catalog/papers/2001_dnsmeasroot/dmr.pdf My recollection about this issue is there a handful of studies done thru time. Duane Wessels in 2003 https://www.caida.org/catalog/papers/2003_dnspackets/wessels-pam2003.pdf Follow-up in 2008 https://www.caida.org/catalog/papers/2008_root_internet/root_internet.pdf And I’m sure Duane did a refresher on his paper in the past 10 years. It seems to be going down, but all depends on the methodology. Cheers, Joe ----- To unsubscribe from this mailing list or change your subscription options, please visit: https://mailman.ripe.net/mailman3/lists/dns-wg.ripe.net/ As we have migrated to Mailman 3, you will need to create an account with the email matching your subscription before you can change your settings. More details at: https://www.ripe.net/membership/mail/mailman-3-migration/
The surprising thing to me about this is that anybody thinks this is surprising. Evi Nemeth wrote about this over 20 years ago.
indeed but a question. what are one or two simple things that operators could do to have useful impact? again: one or two. simple. impact. randy
On 30 Oct 2025, at 3:31 pm, Randy Bush <randy@psg.com> wrote: The surprising thing to me about this is that anybody thinks this is surprising. Evi Nemeth wrote about this over 20 years ago. indeed but a question. what are one or two simple things that operators could do to have useful impact? again: one or two. simple. impact. Great question Randy. For a bind resolver adding zone "." { type mirror; }; to your local configuration will have a useful impact. simple. immediate. I'm sure other resolver code bases have similar switches, Geoff
Great question Randy. For a bind resolver adding zone "." { type mirror; }; to your local configuration will have a useful impact. simple. immediate.
could i convince you to put up a web page with the recipes for the half dozen prominent resolvers with this hack and one or two others? randy, who uses knot and unbound
On 2025/10/30 21:25, Randy Bush wrote:
could i convince you to put up a web page with the recipes for the half dozen prominent resolvers with this hack and one or two others?
The BIND instructions are in RFC 8806, as are those for some other resolvers that support this. There are caveats: - allowing AXFR of the root is something that some root operators do, but it is not a formal service offering. Any (or all) of them could withdraw it at any point. - you'll want to have really good monitoring in place to make sure your transfers are succeeding - without NOTIFY you might miss urgent root zone updates, e.g. in the case of an urgent TLD key roll - you might also want to use ZONEMD to check that the zone is correct. Ray
ray, i know you mean well, and it's not your fault, but ...
could i convince you to put up a web page with the recipes for the half dozen prominent resolvers with this hack and one or two others?
The BIND instructions are in RFC 8806, as are those for some other resolvers that support this.
There are caveats:
- allowing AXFR of the root is something that some root operators do, but it is not a formal service offering. Any (or all) of them could withdraw it at any point.
- you'll want to have really good monitoring in place to make sure your transfers are succeeding
- without NOTIFY you might miss urgent root zone updates, e.g. in the case of an urgent TLD key roll
- you might also want to use ZONEMD to check that the zone is correct.
in case you did not notice, you left *simple* a few turns back. oh right, this is the dns (see my 2000 rant that dns anti-simplicity [0]). would you care to put up a web page with the recipe(s) for doing all this? oh, you say there are 42 platforms and at least three ways to do each on any given platform? and then we wonder why there is such a mess? randy [0] The DNS Today Are we Overloading the Saddlebags on an Old Horse? https://archive.psg.com/001213.ietf-dns.pdf it even predates magenta comic sans :)
On 2025/10/30 21:51, Randy Bush wrote:
in case you did not notice, you left *simple* a few turns back. oh right, this is the dns (see my 2000 rant that dns anti-simplicity [0]).
Well yes, I was seeking to discourage people from doing this without full consideration of the implications. It wasn't me that said it was simple...
would you care to put up a web page with the recipe(s) for doing all this? oh, you say there are 42 platforms and at least three ways to do each on any given platform?
Not my problem, I'm just the messenger. Ray
On Thu, Oct 30, 2025 at 5:51 PM, Randy Bush <randy@psg.com> wrote:
ray, i know you mean well, and it's not your fault, but ...
could i convince you to put up a web page with the recipes for the half dozen prominent resolvers with this hack and one or two others?
The BIND instructions are in RFC 8806, as are those for some other resolvers that support this.
There are caveats:
- allowing AXFR of the root is something that some root operators do, but it is not a formal service offering. Any (or all) of them could withdraw it at any point.
- you'll want to have really good monitoring in place to make sure your transfers are succeeding
- without NOTIFY you might miss urgent root zone updates, e.g. in the case of an urgent TLD key roll
- you might also want to use ZONEMD to check that the zone is correct.
in case you did not notice, you left *simple* a few turns back. oh right, this is the dns (see my 2000 rant that dns anti-simplicity [0]).
would you care to put up a web page with the recipe(s) for doing all this? oh, you say there are 42 platforms and at least three ways to do each on any given platform?
Hi, There are a few options — one of these is to register your server with ISI's LocalRoot project (https://localroot.isi.edu/) — that will generate config for you, allow you to setup TSIG if you want it, get notifies, etc. If you don't want to do that: BIND — from BIND documentation for mirror zones <https://bind9.readthedocs.io/en/stable/reference.html#namedconf-statement-type%20mirror> zone "." { type mirror; }; Knot - from Knot Resolver Cache refilling <https://knot-%20%20%20%20resolver.readthedocs.io/en/v5.0.1/modules-%20%20%20%20prefill.html?highlight=cache%20prefilling> modules.load('prefill') prefill.config({ ['.'] = { url = 'https://www.internic.net/domain/root.zone', interval = 86400 -- seconds ca_file = '/etc/pki/tls/certs/ca-bundle.crt', -- optional } }) Unbound - from: Unbound <https://unbound.docs.nlnetlabs.nl/en/latest/manpages/%20%20%20%20unbound.conf.html#unbound-conf-auth-url>Authority Zone Options <https://unbound.docs.nlnetlabs.nl/en/latest/manpages/%20%20%20%20unbound.conf.html#unbound-conf-auth-url> auth-zone: name: "." url: "https://www.internic.net/domain/root.zone" zonefile: "root.zone" fallback-enabled: yes for-downstream: no for-upstream: yes zonefile: "root.zone" prefetch: yes There are from a lightning talk that I did at the ICANN meeting last week: Slides: https://slides.com/wkumari/code?token=J6TlZ0Yu (note: the first many are very much background, and, as with most lightning talks, made more sense with someone talking through it…) They are also included in: https://datatracker.ietf.org/doc/draft-wkumari-dnsop-localroot-bcp/ (note: we still need to add a bunch of text on priming and fetching by address, etc.). W
and then we wonder why there is such a mess?
randy
[0] The DNS Today Are we Overloading the Saddlebags on an Old Horse? https://archive.psg.com/001213.ietf-dns.pdf it even predates magenta comic sans :) ----- To unsubscribe from this mailing list or change your subscription options, please visit: https://mailman.ripe.net/mailman3/lists/dns-wg.ripe.net/ As we have migrated to Mailman 3, you will need to create an account with the email matching your subscription before you can change your settings. More details at: https://www.ripe.net/membership/mail/mailman-3-migration/
Ray Bellis <ray@isc.org> wrote: >> could i convince you to put up a web page with the recipes for the half >> dozen prominent resolvers with this hack and one or two others? > The BIND instructions are in RFC 8806, as are those for some other resolvers > that support this. > There are caveats: > - allowing AXFR of the root is something that some root operators do, > but it is not a formal service offering. Any (or all) of them could > withdraw it at any point. 1. I think we should fix this in "contracts" going forward. > - you'll want to have really good monitoring in place to make sure your > transfers are succeeding > - without NOTIFY you might miss urgent root zone updates, e.g. in the > case of an urgent TLD key roll 2. I'm skeptical about this. If I were only caching, would my risk not be similiar? > - you might also want to use ZONEMD to check that the zone is correct. 3. My understanding of bind9's "type mirror" is that it runs a DNSSEC check on it. I assume other platforms do the same. The ZONEMD(RFC8976) suggests that some NS RR can not be protected by DNSSEC. (I understand how this can be the case, but not for the NS in .) I see ZONEMD in the root zone, so maybe "type mirror" can check that automatically too? If current root infrastructure is designed to withstand DDoS attacks, then anyone (any ISP/Enterprise/...) who has RFC8806 won't need that to survive the attack. Maybe 8806 should be the better resiliency against attacks. ISPs that don't do 8806 won't survive, and will have an incentive to implement it. 4. An ISP might think it a good idea, once they have 8806, so add their own (internal) anycast responder for some A/AAAA for . zone. There are probably good reasons to discourage this, the major one being routing leaks. I imagine it will happen anyway. I'd like to see a how-to-do-it-right document instead. Maybe there is already one. -- Michael Richardson <mcr+IETF@sandelman.ca> . o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and Worldwide
[ Quoting <ray@isc.org> in "[dns-wg] Re: More Than 70% of DNS R..." ]
The BIND instructions are in RFC 8806, as are those for some other resolvers that support this.
There are caveats:
- allowing AXFR of the root is something that some root operators do, but it is not a formal service offering. Any (or all) of them could withdraw it at any point.
- you'll want to have really good monitoring in place to make sure your transfers are succeeding
- without NOTIFY you might miss urgent root zone updates, e.g. in the case of an urgent TLD key roll
- you might also want to use ZONEMD to check that the zone is correct.
There is the localroot project: https://localroot.isi.edu/about/ /Miek
could i convince you to put up a web page with the recipes for the half dozen prominent resolvers with this hack and one or two others?
The BIND instructions are in RFC 8806, as are those for some other resolvers that support this.
Funny you should mention that. I recently read that RFC, and came off with a feeling that "the authors do not really want you to do this". Why? 1) It is an Informational RFC, but it uses the upper-case keywords from RFC 2119 even though that notation is supposedly only appropriate for standards-track documents. 2) What's worse, the justification for the stated requirements are not spelled out in the RFC, and some of the requirements are not exactly immediately obvious at least to me, even though I would dare to call myself "experienced". So it comes across as an "edict from above". As a source for *information* I would like to give it an "F" for "fail" for this reason alone. 3) The various MUST requirements give rise to significant complication in the configurations. An example for #2 and #3 is Specifically, the root service on the local system MUST be configured to only answer queries from resolvers on the same host and MUST NOT answer queries from any other resolver. Why? The document is silent on that matter. I sense a strong unwillingness to simplify as much as possible. What would go wrong on this front if you simply dropped a root mirror zone in each view you are currently serving? This paragraph in the RFC gives rise to the monstrostity of a configuration presented for BIND 9.12 which is also incomplete because of: * No mention of where 127.12.12.12 needs to be configured. * No mention of whether listen-on needs to be modified. * No mention of whether the "MUST validate the zone DNSSEC-wise" requirement (OK, not an actual quote) is fulfilled by this configuration (it probably isn't?) Granted, the "mirror zone" feature of BIND 9.14+ makes that configuration sample much simpler, and it supposedly DNSSEC-validates the zone before serving it, but, again, the assumed (by me) conflict with the customary "hints" root zone is not mentioned, and here the use of a specially cordoned off view is also not mentioned. So it's no longer needed in this case? Why not? (...and both BIND 9.12 and 9.14 are by now both "ancient history", for those of us who follow along with the maintenance versions of BIND.)
There are caveats:
- allowing AXFR of the root is something that some root operators do, but it is not a formal service offering. Any (or all) of them could withdraw it at any point.
What would happen at that point with BIND 9.14+? The mirror zone would expire, and the local recursor would then revert back to the built-in root hints on startup instead? What's the actual damage to the service the local recursor provides in that case? Granted, in the 7 days from the last successful AXFR until the Expire timer triggers, the recursor would serve up the information from the root zone at the start of that period. How bad would that be? How often does a TLD fully replace all its NS records? Or urgently need to update its DS record? I would posit that changing the delegation of a TLD is typically done more slowly and over a period longer than 7 days. (Emergency KSK rollovers are another matter. Anyone have any history on how frequent such events have been? This can be used to calculate the risk of serving an inaccurate DS record for a TLD for a number of days within that expiry period.) As has been mentioned, the continuity of AXFR service seems to be something which is fixable in a contract if there is any will...
- you'll want to have really good monitoring in place to make sure your transfers are succeeding
What? One-time success is no guarantee for future success? :) And ... what to do if your zone transfers of the root zone are failing? Especially if you haven't touched the "local" or "adjacent" network config?
- without NOTIFY you might miss urgent root zone updates, e.g. in the case of an urgent TLD key roll
How is this significantly different from the propagation of that information without serving the root zone locally? It seems that all the DS records in the root zone have 86000 as TTL, so takes a full day to time out before the root zone is re-consulted for an updated copy. And with the current timers in the SOA (30m refresh 15m retry), and a good success rate for SOA queries and root zone transfers, I fail to see how this would in reality present a practical problem.
- you might also want to use ZONEMD to check that the zone is correct.
Ehm, isn't that for ISC to implement for zone-type "mirror" and for us to use that way (and similar for other DNS server software maintainers), instead of forcing us as administrators to jump through even more complication hoops? I thought the whole point of publishing RFC 8806 was to spur adoption of this configuration method. Was I wrong on this point? It certainly comes off that way. Regards, - Håvard
On 31 Oct 2025, at 14:04, Havard Eidnes via dns-wg <dns-wg@ripe.net> wrote:
Funny you should mention that. I recently read that RFC, and came off with a feeling that "the authors do not really want you to do this". Why?
Most probably because there's not much in the way of supporting infrastructure for zillions of resolving servers to slurp the root zone several times a day. A few RSOs do offer axfr/ixfr. It's also freely available from IANA/PTI. [And many other places on a volunteer, best efforts basis.] Though those who do this might be less keen to keep up the good work if every resolving server on the planet came knocking on their door every few hours. As for the rest of your excellent comments and suggestions Havard, I encourage you and everyone else who's interested to join the discussion on draft-wkumari-dnsop-localroot-bcp in the dnsop WG next week. The aim is to "upgrade" RFC8806 to a BCP and document solutions to the questions you raised. That new RFC would hopefully stimulate wider adoption of hyperlocal roots. The first step in that effort is getting the draft adopted as a WG document next week.
Hi, On Thu, Oct 30, 2025 at 08:46:41PM +0000, Geoff Huston wrote:
Great question Randy. For a bind resolver adding
zone "." { type mirror; };
to your local configuration will have a useful impact. simple. immediate.
I'm sure other resolver code bases have similar switches,
That assumes a sane resolver, which shouldn't be contributing to all the garbage hitting the roots in the first place. No? Gert Doering -- NetMaster -- have you enabled IPv6 on something today...? SpaceNet AG Vorstand: Sebastian v. Bomhard, Karin Schuler, Sebastian Cler Joseph-Dollinger-Bogen 14 Aufsichtsratsvors.: A. Grundner-Culemann D-80807 Muenchen HRB: 136055 (AG Muenchen) Tel: +49 (0)89/32356-444 USt-IdNr.: DE813185279
Gert Doering <gert@space.net> wrote: > On Thu, Oct 30, 2025 at 08:46:41PM +0000, Geoff Huston wrote: >> Great question Randy. For a bind resolver adding >> >> zone "." { type mirror; }; >> >> to your local configuration will have a useful impact. simple. immediate. >> >> I'm sure other resolver code bases have similar switches, > That assumes a sane resolver, which shouldn't be contributing to all > the garbage hitting the roots in the first place. No? Yes, it's a case of the clueful people leaving the party before the cops show up, meaning everyone still at the party was probably completely clueless. -- Michael Richardson <mcr+IETF@sandelman.ca> . o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and Worldwide
again: one or two. simple. impact.
Great question Randy. For a bind resolver adding
zone "." { type mirror; };
to your local configuration will have a useful impact. simple. immediate.
This is getting into the weeds with BIND config, but won't an administrator also have to comment out any "type hint" root zone configuration at the same time? I would not have expected to be able to have both zone "." { type mirror; file "root.zone"; }; and zone "." { type hint; file "root.cache"; }; configured simultaneously, and the latter i beleive to be rather customary. So what does BIND fall back on if validation of the mirror root zone should fail or some other problem causes the mirror zone to be dis-regarded? Built-in root hints, perhaps? I'm just trying to map out all of the potential failure scenarios, and convince myself that this is "just as safe as before"... Regards, - Håvard
I'm just trying to map out all of the potential failure scenarios, and convince myself that this is "just as safe as before"...
Just one data point - I wrote a paper about the local root configuration that I presented at IMC in 2004. https://conferences.sigcomm.org/imc/2004/papers/p15-malone.pdf The results seemd to show a reasonable improvement in weird queries leaking out of my name server, so I've been using the local root configuration ever since, and I don't remember it causing any trouble in the last ~20 years. (Plus, the configuration is now easier.) I've also been doing the same thing for "arpa", "in-addr.arpa", and "ip6.arpa" for a shorter period of time, with no problems. David.
David, On 31/10/2025 11.38, David Malone wrote:
I'm just trying to map out all of the potential failure scenarios, and convince myself that this is "just as safe as before"...
Just one data point - I wrote a paper about the local root configuration that I presented at IMC in 2004.
https://conferences.sigcomm.org/imc/2004/papers/p15-malone.pdf
The results seemd to show a reasonable improvement in weird queries leaking out of my name server, so I've been using the local root configuration ever since, and I don't remember it causing any trouble in the last ~20 years. (Plus, the configuration is now easier.)
I've also been doing the same thing for "arpa", "in-addr.arpa", and "ip6.arpa" for a shorter period of time, with no problems.
I was wondering where you got in-addr.arpa and ip6.arpa around, and found out that ICANN provides those and a few more zones at servers set up for XFR: https://www.dns.icann.org/services/axfr/ Most of these are DNSSEC-signed (I think all of them except for root-servers.net). I wonder if we could convince ICANN to add ZONEMD to those zones as well... Cheers, -- Shane
I was wondering where you got in-addr.arpa and ip6.arpa around, and found out that ICANN provides those and a few more zones at servers set up for XFR:
Most of these are DNSSEC-signed (I think all of them except for root-servers.net). I wonder if we could convince ICANN to add ZONEMD to those zones as well...
Ah! Very neat - I guess they are intended for writing into config files? David.
Hi David, On 2 Nov 2025, at 16:09, David Malone <dwmalone@maths.tcd.ie> wrote:
Ah! Very neat - I guess they are intended for writing into config files?
Years ago, when I worked for ICANN doing DNS things, we created the xfr.lax.dns.icann.org and xfr.cjr.dns.icann.org services in order to provide AXFR access to zones that we served on L-Root. I assume those are the ancestors of the similarly-named services described at https://www.dns.icann.org/services/axfr/ The operational idea was to be able not to provide AXFR on L-Root itself so that L could concentrate on being a root server and not have the additional job of providing zone transfer responses. The public transparency idea was to make all the public zones we served available, not just the root zone, because why wouldn't we, somebody might find them useful. To be clear I haven't worked for ICANN for a long time and I'm very sure that the current ICANN DNS people are much more competent than I ever was, but in case it's useful that's my memory of the history. Joe
Op 30-10-2025 om 15:38 schreef Joe Abley via dns-wg:
On 30 Oct 2025, at 14:49, Hank Nussbacher <hank@efes.iucc.ac.il> wrote:
https://pulse.internetsociety.org/blog/more-than-70-of-dns-root-queries-are-...
The surprising thing to me about this is that anybody thinks this is surprising. Evi Nemeth wrote about this over 20 years ago. Do people imagine that the graph of junk is going down and to the right?
There is a very nice ICANN project, managed by Alain Durand and Christian Huitema, measuring this metric over the last 7 years with I root: https://ithi.research.icann.org/graph-m3.html At least for I root, the long term trend for No Such Domain queries appears to go down sort of. Also, from the graph in the ISOC article, it looks like their measurement is from 2023. I also don't see mentioning of cacheable queries in the article, so I'm assuming it is only about No Such Domain queries. -- Willem
Meanwhile, in other news, I have *shocking* revelations about the religious beliefs of the pope and the toilet habits of bears in the woods. FWIW the ISOC article ignores many categories of junk traffic at the root: queries from RFC1918 address space, queries that set the RD bit, DDoS attacks, etc. IMO all queries that come to the root that aren't from well behaved resolving servers should be classified as junk*. These are supposed to be the only things that have a good reason to be querying the root, modulo the probe that gather stats on response times, availability, propagation of updates. * That definition of junk would account for something like 99% of root server traffic.
Hank Nussbacher <hank@efes.iucc.ac.il> wrote: > https://pulse.internetsociety.org/blog/more-than-70-of-dns-root-queries-are-... A good reason for more people to do RFC8806 :-) Of course, as people do that, the precentage of junk will go *up* as legitimate traffic stays local. But, OTH, we could scale back the root nameserver infrastructure. -- Michael Richardson <mcr+IETF@sandelman.ca> . o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and Worldwide
On 2025/10/30 17:23, Michael Richardson wrote:
A good reason for more people to do RFC8806 :-) Of course, as people do that, the precentage of junk will go *up* as legitimate traffic stays local. But, OTH, we could scale back the root nameserver infrastructure.
The root nameserver infrastructure is scaled as it is for DDoS defence, not because of current typical traffic levels (junk queries or otherwise). There is also no formal infrastructure in place to support RFC 8806 at scale, nor to generate the signalling to tell any RFC 8806 mirror that a new zone is available. If there was, it would also need signficant DDoS protection. Ray
Moin! On 30 Oct 2025, at 20:54, Ray Bellis wrote:
There is also no formal infrastructure in place to support RFC 8806 at scale, nor to generate the signalling to tell any RFC 8806 mirror that a new zone is available. If there was, it would also need signficant DDoS protection.
For a zone that has 2 day TTL referrals and changes twice a day I honestly don’t think signalling is needed. The current refresh/retry timer is fully sufficient for that. I think the current root server would be more than capable of doing two zone transfers per day for all the IPs they serve. I unfortunately don’t have the numbers for that, but maybe someone with access to root server data could crunch this. So long -Ralf ——- Ralf Weber
participants (17)
-
Andrew Campling -
David Malone -
Geoff Huston -
Gert Doering -
Hank Nussbacher -
Havard Eidnes -
Jim Reid -
Joe Abley -
Michael Richardson -
Miek Gieben -
Ralf Weber -
Randy Bush -
Ray Bellis -
Sebastian Castro -
Shane Kerr -
Warren Kumari -
Willem Toorop