Status Update
Comments
jo...@gmail.com <jo...@gmail.com> #2
rs...@nextdns.io <rs...@nextdns.io> #3
I'm not sure it is linked, but it seems to also make the sending of ECS by google flapping. We get no ECS on other qtypes once every 5-10 queries.
lu...@google.com <lu...@google.com>
lu...@google.com <lu...@google.com> #4
The typehttps.example.com and test(1|2).exmple.com no longer exist. Would it possible to set them up again so that we can verify the behavior? Thanks
rs...@nextdns.io <rs...@nextdns.io> #5
jo...@gmail.com <jo...@gmail.com> #6
The typehttps.example.com
and test(1|2).exmple.com
just as an example, not an actual domain name.
And now I have set up the actual test domain name and record according to the example, you can use the domain typehttps.dnsov.net
and test(1|2).dnsov.net
reproduce this problem.
pu...@google.com <pu...@google.com> #7
Also note that ECS does not apply to A/AAAA records in the Additional section (see paragraph 6 in
Question: At what level in a registered domain do you apply the CNAMEs described in this bug? At zone apex or lower? Zone apex CNAME will not work well with Google Public DNS since that is disallowed by the definition of CNAME.
rs...@nextdns.io <rs...@nextdns.io> #8
The
jo...@gmail.com <jo...@gmail.com> #9
The CNAME is also not at the zone apex in our case.
This suggestion seems to be helpful, just need to pay attention to the CNAME is also part of the HTTPS record when the project is implemented.
lu...@google.com <lu...@google.com> #10
We enabled ECS for HTTPS and SVCB types and should be live by this Friday. We are still evaluating ECS behavior of other relevant qtypes.
rs...@nextdns.io <rs...@nextdns.io> #11
lu...@google.com <lu...@google.com> #12
To be explicit, Google public DNS will accept/cache non-zero scope ECS responses for HTTPS/SVCB. Previously they are always cached globally (zero scope).
rs...@nextdns.io <rs...@nextdns.io> #13
jo...@gmail.com <jo...@gmail.com> #14
Thanks for your work, and i test it work correctly now.
Description
Description
Suppose we set the following record for
example.com
:While send a query of type HTTPS (TYPE65) use domain
typehttps.example.com
with ECS8.8.8.0/24
to Google Public DNS, such as:Google Public DNS send query to authoritative name servers won't include an ECS options, so the authoritative name servers will response the wrong CNAME answer
test2.example.com
, then response it to client, like this:Because it not include ECS in query and response, Google Public DNS treat the answer as global /0 scope and cache it. Then the A, AAAA, CNAME, or others type of query with ECS
8.8.8.0/24
will also get the wrong response until the TTL expires.Reference
DNS SVCB and HTTPSSVC follow CNAME in draft-ietf-dnsop-svcb-httpssvc-03#section-4.2 .
Other issue
The query type of MX and CAA has the same issue.