> On Jul 8, 2025, at 10:57, Joe Abley <[email protected]> 
> wrote:
> On 8 Jul 2025, at 10:18, Carlos Horowicz 
> <[email protected]> wrote:
>> I must say I’m not particularly sympathetic to DNS over TCP. While it’s a 
>> necessary fallback in some cases, it slows things down due to handshake 
>> overhead, increased latency from retries, and the need to maintain state per 
>> connection.
> Setup and teardown handshake overhead is in principle able to be amortised 
> over the many messages that might be exchanged over a single session, so over 
> a busy session the aggregate cost tends towards zero and the cost for a 
> message over a session that is already established is as close to zero as 
> makes no odds.
> The ability to handle large aggregate session state is something that has 
> turned out to be manageable for HTTP and many other protocols. I don't know 
> why we would assume that it's an insurmountable problem. 

Just chiming in to register agreement with Joe.  Essentially all DNS traffic is 
either stub-recursive or recursive-authoritative.  Stubs typically use a single 
recursive, and should ideally be using DoT anyway, so that’s efficiently 
handled using TLS already.  The _vast_ majority of recursive-authoritative 
traffic is long-lived flows between relatively small numbers of servers (with a 
small minority of traffic spread over a long tail of infrequently-queried 
authoritatives).  So there, too, there’s high efficiency in ensuring that the 
majority of the traffic is running over ADoT.

Next up, bidirectional TLS auth FTW!

                                -Bill


Please consider the environment before using AI to process this email.

_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to