<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.32 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2181 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2181.xml">
<!ENTITY RFC1034 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1034.xml">
<!ENTITY RFC7094 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7094.xml">
<!ENTITY RFC1546 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1546.xml">
<!ENTITY RFC1035 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1035.xml">
<!ENTITY RFC1995 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1995.xml">
<!ENTITY RFC5575 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5575.xml">
<!ENTITY RFC5936 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5936.xml">
<!ENTITY RFC4271 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4271.xml">
<!ENTITY RFC4786 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4786.xml">
<!ENTITY RFC1997 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1997.xml">
<!ENTITY RFC8499 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8499.xml">
<!ENTITY RFC6891 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6891.xml">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-moura-dnsop-authoritative-recommendations-08" category="info">

  <front>
    <title abbrev="Considerations-Large-Auth-DNS-Ops">Considerations for Large Authoritative DNS Servers Operators</title>

    <author initials="G.C.M." surname="Moura" fullname="Giovane C. M. Moura">
      <organization>SIDN Labs/TU Delft</organization>
      <address>
        <postal>
          <street>Meander 501</street>
          <city>Arnhem</city>
          <code>6825 MD</code>
          <country>The Netherlands</country>
        </postal>
        <phone>+31 26 352 5500</phone>
        <email>giovane.moura@sidn.nl</email>
      </address>
    </author>
    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/Information Sciences Institute</organization>
      <address>
        <postal>
          <street>PO Box 382</street>
          <city>Davis</city>
          <code>95617-0382</code>
          <country>U.S.A.</country>
        </postal>
        <phone>+1 (530) 404-0099</phone>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author initials="J." surname="Heidemann" fullname="John Heidemann">
      <organization>USC/Information Sciences Institute</organization>
      <address>
        <postal>
          <street>4676 Admiralty Way</street>
          <city>Marina Del Rey</city>
          <code>90292-6695</code>
          <country>U.S.A.</country>
        </postal>
        <phone>+1 (310) 448-8708</phone>
        <email>johnh@isi.edu</email>
      </address>
    </author>
    <author initials="M." surname="Davids" fullname="Marco Davids">
      <organization>SIDN Labs</organization>
      <address>
        <postal>
          <street>Meander 501</street>
          <city>Arnhem</city>
          <code>6825 MD</code>
          <country>The Netherlands</country>
        </postal>
        <phone>+31 26 352 5500</phone>
        <email>marco.davids@sidn.nl</email>
      </address>
    </author>

    <date year="2021" month="February" day="19"/>

    <area>Internet</area>
    <workgroup>DNSOP Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>Recent research work has explored the deployment characteristics and
configuration of the Domain Name System (DNS).  This document
summarizes the conclusions from these research efforts and offers
specific, tangible advice to operators when configuring authoritative
DNS servers.</t>

<t>It is possible that the results presented in this document could be
applicable in a wider context than just the DNS protocol,
as some of the results may generically apply to
any stateless/short-duration, anycasted service.</t>

<t>This document is not an IETF consensus document: it is published for
informational purposes.</t>



    </abstract>


  </front>

  <middle>


<section anchor="intro" title="Introduction">

<t>This document summarizes recent research work that explored the
deployed DNS configurations and offers derived, specific tangible
advice to DNS authoritative server operators (DNS operators
hereafter).  The considerations (C1--C5) presented in this document are
backed by published research work, which used wide-scale Internet
measurements to draw their conclusions. This document summarizes the
research results and describes the resulting key engineering options.
In each section, it points readers to the pertinent publications where
additional details are presented.</t>

<t>These considerations are designed for operators of "large"
authoritative DNS servers. In this context, "large" authoritative
servers refers to those with a significant global user population,
like top-level domain (TLD) operators, run by either a single or
multiple operators.  Typically these networks are deployed on wide
anycast networks <xref target="RFC1546"/>. These considerations may not be
appropriate for smaller domains, such as those used by an organization
with users in one unicast network, or in one city or region, where
operational goals such as uniform, global low latency are less
required.</t>

<t>It is possible that the results presented in this document could be
applicable in a wider context than just the DNS protocol, as some of
the results may generically apply to any stateless/short-duration,
anycasted service.  Because the conclusions of the reviewed studies
don't measure smaller networks, the wording in this document
concentrates solely on disusing large-scale DNS authoritative services
only.</t>

<t>This document is not an IETF consensus document: it is published for
informational purposes.</t>

</section>
<section anchor="background" title="Background">

<t>The DNS has main two types of DNS servers: authoritative servers and
recursive resolvers, shown by a representational deployment model in
<xref target="recuath"/>.  An authoritative server (shown as AT1--AT4 in
<xref target="recuath"/>) knows the content of a DNS zone, and is responsible for
answering queries about that zone.  It runs using local (possibly
automatically updated) copies of the zone and does not need to query
other servers <xref target="RFC2181"/> in order to answer requests. A recursive
resolver (Re1--Re3) is a server that iteratively queries authoritative
and other servers to answer queries received from client requests
<xref target="RFC1034"/>. A client typically employs a software library called a stub
resolver (stub in <xref target="recuath"/>) to issue its query to the upstream
recursive resolvers <xref target="RFC1034"/>.</t>

<figure title="Relationship between recursive resolvers (Re) and authoritative name servers (ATn)" anchor="recuath"><artwork><![CDATA[
        +-----+  +-----+  +-----+  +-----+
        | AT1 |  | AT2 |  | AT3 |  | AT4 |
        +-----+  +-----+  +-----+  +-----+
          ^         ^        ^        ^
          |         |        |        |
          |      +-----+     |        |
          +------| Re1 |----+|        |
          |      +-----+              |
          |         ^                 |
          |         |                 |
          |      +----+   +----+      |
          +------|Re2 |   |Re3 |------+
                 +----+   +----+
                   ^          ^
                   |          |
                   | +------+ |
                   +-| stub |-+
                     +------+
]]></artwork></figure>

<t>DNS queries issued by a client contribute to a user's perceived
perceived latency and affect user experience <xref target="Sigla2014"/> depending
on how long it takes for responses to be returned.  The DNS system has
been subject to repeated Denial of Service (DoS) attacks (for example,
in November 2015 <xref target="Moura16b"/>) in order to specifically degrade user
experience.</t>

<t>To reduce latency and improve resiliency against DoS attacks, the DNS
uses several types of service replication. Replication at the
authoritative server level can be achieved with (i) the deployment of
multiple servers for the same zone <xref target="RFC1035"/> (AT1---AT4 in
<xref target="recuath"/>), (ii) the use of IP anycast
<xref target="RFC1546"/><xref target="RFC4786"/><xref target="RFC7094"/> that allows the same IP address to
be announced from multiple locations (each of referred to as an
"anycast instance" <xref target="RFC8499"/>) and (iii) the use of load balancers to
support multiple servers inside a single (potentially anycasted)
instance. As a consequence, there are many possible ways an
authoritative DNS provider can engineer its production authoritative
server network, with multiple viable choices and no necessarily single
optimal design.</t>

<t>In the next sections we cover the specific consideration (C1--C5) for
conclusions drawn within the academic papers about large authoritative
DNS server operators.</t>

</section>
<section anchor="c1" title="C1: Deploy anycast in every authoritative server for better load distribution">

<t>Authoritative DNS server operators announce their service using NS
records<xref target="RFC1034"/>. Different authoritative servers for a given zone
should return the same content; typically they stay synchronized using
DNS zone transfers (AXFR<xref target="RFC5936"/> and IXFR<xref target="RFC1995"/>), coordinating
the zone data they all return to their clients.</t>

<t>DNS heavily relies upon replication to support high reliability,
ensure capacity and to reduce latency <xref target="Moura16b"/>. DNS has two
complementary mechanisms for service replication. First, the DNs
protocol itself supports nameserver replication through the use of
multiple nameserver records (NS records), each operating on different
IP addresses. Second, each of these addresses can run at multiple
physical locations through the use of IP
anycast<xref target="RFC1546"/><xref target="RFC4786"/><xref target="RFC7094"/>, by announcing the same IP
address from each instance at multiple locations -- Internet routing
(BGP<xref target="RFC4271"/>) associates the service's clients with their
topologically nearest anycast instance. Outside the DNS protocol,
replication can also be achieved by deploying load balancers at each
physical location. Nameserver replication is strongly recommended for
all zones (multiple NS records). IP anycast is used by many large
zones such as the DNS Root, most top-level domains<xref target="Moura16b"/> and
many large commercial enterprises, governments and other
organizations.</t>

<t>Most DNS operators strive to reduce service latency for users.
However, because they only have control over their authoritative
servers, and not over the client recursive resolvers, it is difficult
to ensure that recursives will be served by the closest authoritative
server. Server selection is up to the recursive resolver's software
implementation, and different vendors and even different releases
employ different criteria to chose the authoritative servers with
which to communicate.</t>

<t>Understanding how recursive resolvers choose authoritative servers is
a key step in improving the effectiveness of authoritative server
deployments. To measure and evaluate server deployments,
<xref target="Mueller17b"/> deployed seven unicast authoritative name servers in
different global locations and then queried them from more than 9000
RIPE authoritative server operators and their respective recursive
resolvers.
<!-- wjh: this last sentence doesn't make sense --></t>

<t><xref target="Mueller17b"/> found that recursive resolvers in the wild query all
available authoritative servers, regardless of the observed
latency. But the distribution of queries tends to be skewed towards
authoritatives with lower latency: the lower the latency between a
recursive resolver and an authoritative server, the more often the
recursive will send queries to that server. These results were
obtained by aggregating results from all of the vantage points and
were not specific to any specific vendor or version.</t>

<t>The authors believe this behavior is a consequence of combining the
two main criteria employed by resolvers when selecting authoritative
servers: resolvers regularly check all listed authoritative servers in
an NS set to determine which is closer (the least latent) and when one
isn't available selects one of the alternatives.</t>

<t>For an authoritative DNS operator, this result means that the latency
of all authoritative servers (NS records) matter, so they all must be
similarly capable -- all available authoritatives will be queried by
most recursive resolvers. Unicasted services, unfortunately, cannot
deliver good latency worldwide (a unicast authoritative server in
Europe will always have high latency to resolvers in California and
Australia, for example, given its geographical
distance). <xref target="Mueller17b"/> recommends that DNS operators deploy equally
strong IP anycast instances for every authoritative server (i.e., for
each NS record).  Each large authoritative DNS server provider should
phase out their usage of unicast and deploy a well engineered number
of anycast instances with good peering strategies so they can provide
good latency to their global clients. 
<!-- This doesn't really say anything?  what arch considerations?
However, {{Mueller17b}} also
notes that DNS operators should take architectural considerations
into account when planning for deploying anycast {{RFC1546}}.
--></t>

<t>As a case study, the ".nl" TLD zone was originally served on seven
authoritative servers with a mixed unicast/anycast setup.  In early
2018, .nl moved to a setup with 4 anycast authoritative
servers. 
<!-- XXX: NEED TO SHOW/DESCRIBE RESULTS --></t>

<t><xref target="Mueller17b"/>'s contribution to DNS service engineering shows that
because unicast cannot deliver good latency worldwide, anycast needs
to be used to provide a low latency service worldwide.</t>

</section>
<section anchor="c2-routing-can-matter-more-than-locations" title="C2: Routing can matter more than locations">

<t>When selecting an anycast DNS provider or setting up an anycast
service, choosing the best number of anycast instances<xref target="RFC4786"/> to
deploy is a challenging problem.  Selecting where and how many global
locations to announce from using BGP is tricky.  Intuitively, one
could naively think that the more instances the better and simply
"more" will always lead to shorter response times.</t>

<t>This is not necessarily true, however. In fact, <xref target="Schmidt17a"/> found
that proper route engineering can matter more than the total number of
locations. They analyzed the relationship between the number of
anycast instances and service performance (measuring latency of the
round-trip time (RTT)), measuring the overall performance of four DNS
Root servers. The Root DNS servers are implemented by 12 separate
organizations serving the DNS root zone at 13 different IPv4/IPv6
address pairs.</t>

<t>The results documented in <xref target="Schmidt17a"/> measured the performance of
the {c,f,k,l}.root-servers.net (hereafter, "C", "F", "K" and "L")
servers from more than 7.9k RIPE Atlas probes. RIPE Atlas is a
Internet measurement platform with more than 12000 global vantage
points called "Atlas Probes" -- it is used regularly by both
researchers and operators <xref target="RipeAtlas15a"/> <xref target="RipeAtlas19a"/>.</t>

<t><xref target="Schmidt17a"/> found that the C server, a smaller anycast deployment
consisting of only 8 instances, provided very similar overall
performance in comparison to the much larger deployments of K and L,
with 33 and 144 instances respectively. The median RTT for C, K and L
root server were all between 30-32ms.</t>

<!-- XXX: what about F???  why is it mentioned above if we don't talk -->

<t>Because RIPE Atlas is known to have better coverage in Europe than
other regions, the authors specifically analyzed the results per
region and per country (Figure 5 in <xref target="Schmidt17a"/>), and show that
known Atlas bias toward Europe does not change the conclusion that
properly selected anycast locations is more important to latency than
the number of sites.</t>

<t>The important conclusion of <xref target="Schmidt17a"/> is that when engineering
anycast services for performance, factors other than just the number
of instances (such as local routing connectivity) must be considered.
They showed that 12 instances can provide reasonable latency, assuming
they are globally distributed and have good local
interconnectivity. However, additional instances can still be useful
for other reasons, such as when handling Denial-of-service (DoS)
attacks <xref target="Moura16b"/>.</t>

</section>
<section anchor="c3-collecting-anycast-catchment-maps-to-improve-design" title="C3: Collecting anycast catchment maps to improve design">

<t>An anycast DNS service may be deployed from anywhere from several
locations to hundreds of locations (for example, l.root-servers.net
has over 150 anycast instances at the time this was written). Anycast
leverages Internet routing to distribute incoming queries to a
service's hop-nearest distributed anycast locations.  However, usually
queries are not evenly distributed across all anycast locations, as
found in the case of L-Root <xref target="IcannHedge18"/>.</t>

<t>Adding locations to or removing locations from a deployed anycast
network changes the load distribution across all of its
locations. When a new location is announced by BGP, locations may
receive more or less traffic than it was engineered for, leading to
suboptimal service performance or even stressing some locations while
leaving others underutilized.  Operators constantly face this scenario
that when expanding an anycast service. Operators cannot easily
directly estimate future query distributions based on proposed anycast
network engineering decisions.</t>

<t>To address this need and estimate the query loads based on changing,
in particular expanding, anycast service changes <xref target="Vries17b"/>
developed a new technique enabling operators to carry out active
measurements, using an open-source tool called Verfploeter (available
at <xref target="VerfSrc"></xref>).  The results allow the creation of detailed anycast
maps and catchment estimates.  By running verfploeter combined with a
published IPv4 "hit list", DNS can precisely calculate which remote
prefixes will be matched to each anycast instance in a network.  At
the moment of this writing, Verfploeter still does not support IPv6 as
the IPv4 hit lists used are generated via frequent large scale ICMP
echo scans, which is not possible using IPv6.</t>

<t>As proof of concept, <xref target="Vries17b"/> documents how it verfploeter was
used to predict both the catchment and query load distribution for a
new anycast instance deployed for b.root-servers.net.  Using two
anycast test instances in Miami (MIA) and Los Angeles (LAX), an ICMP
echo query was sent from an IP anycast addresses to each IPv4 /24
network routing block on the Internet.</t>

<t>The ICMP echo responses were recorded at both sites and analyzed and
overlayed onto a graphical world map, resulting in an Internet scale
catchment map.  To calculate expected load once the production network
was enabled, the quantity of traffic received by b.root-servers.net's
single site at LAX was recorded based on a single day's traffic
(2017-04-12, DITL datasets <xref target="Ditl17"/>).  <xref target="Vries17b"/> predicted that
81.6% of the traffic load would remain at the LAX site.  This estimate
by verfploeter turned out to be very accurate; the actual measured
traffic volume when production service at MIA was enabled was 81.4%.</t>

<t>Verfploeter can also be used to estimate traffic shifts based on other
BGP route engineering techniques (for example, AS path prepending or
BGP community use) in advance of operational deployment.  <xref target="Vries17b"/>
studied this using prepending with 1-3 hops at each instance and
compared the results against real operational changes to validate the
techniques accuracy.</t>

<t>An important operational takeaway <xref target="Vries17b"/> provides is how DNS
operators can make informed engineering choices when changing DNS
anycast network deployments by using Verfploeter in advance.
Operators can identify sub-optimal routing situations in advance with
significantly better coverage than using other active measurement
platforms such as RIPE Atlas.  To date, Verfploeter has been deployed
on a operational testbed (Anycast testbed) <xref target="AnyTest"/>, on a large
unnamed operator and is run daily at b.root-servers.net<xref target="Vries17b"/>.</t>

<t>Operators are encouraged to use active measurement techniques like
Verfploeter in advance of potential anycast network changes to
accurately measure the benefits and potential issues ahead of time.</t>

</section>
<section anchor="c4-when-under-stress-employ-two-strategies" title="C4: When under stress, employ two strategies">

<t>DDoS attacks are becoming bigger, cheaper, and more frequent
<xref target="Moura16b"/>. The most powerful recorded DDoS attack against DNS
servers to date reached 1.2 Tbps by using IoT devices
<xref target="Perlroth16"/>. How should a DNS operator engineer its anycast
authoritative DNS server react to such a DDoS attack?  <xref target="Moura16b"/>
investigates this question using empirical observations grounded with
theoretical option evaluations.</t>

<t>An authoritative DNS server deployed using anycast will have many
server instances distributed over many networks. Ultimately, the
relationship between the DNS provider's network and a client's ISP
will determine which anycast instance will answer queries for a given
client, given that BGP is the protocol that maps clients to specific
anycast instances by using routing information [RF:KDar02]. As a
consequence, when an anycast authoritative server is under attack, the
load that each anycast instance receives is likely to be unevenly
distributed (a function of the source of the attacks), thus some
instances may be more overloaded than others which is what was
observed analyzing the Root DNS events of Nov. 2015
<xref target="Moura16b"/>. Given the fact that different instances may have
different capacity (bandwidth, CPU, etc.), making a decision about how
to react to stress becomes even more difficult.</t>

<t>In practice, an anycast instance is overloaded with incoming traffic,
operators have two options:</t>

<t><list style="symbols">
  <t>They can withdraw its routes, pre-prepend its AS route to some or
all of its neighbors, perform other traffic shifting tricks (such as
reducing route announcement propagation using BGP
communities<xref target="RFC1997"/>), or by communicating with its upstream
network providers to apply filtering (potentially using FlowSpec
<xref target="RFC5575"/>). These techniques shift both legitimate and attack
traffic to other anycast instances (with hopefully greater capacity)
or to block traffic entirely.</t>
  <t>Alternatively, operators can be become a degraded absorber by
continuing to operate, knowing dropping incoming legitimate requests
due to queue overflow. However, this approach will also absorb
attack traffic directed toward its catchment, hopefully protecting
the other anycast instances.</t>
</list></t>

<t><xref target="Moura16b"/> saw both of these behaviors deployed in practice by
studying instance reachability and route-trip time (RTTs) in the DNS
root events.  When withdraw strategies were deployed, the stress of
increased query loads were displaced from one instance to multiple
other sites.  In other observed events, one site was left to absorb
the brunt of an attack leaving the other sites to remain relatively
less affected.</t>

<t>Operators should consider having both a anycast site withdraw strategy
and a absorption strategy ready to be used before a network overload
occurs.  Ideally, these should be encoded into operating playbooks
with defined site measurement guidelines for which strategy to employ
based on measured data from past events.</t>

<t><xref target="Moura16b"/> speculates that careful, explicit, and automated
management policies may provide stronger defenses to overload
events. DNS operators should be ready to employ both traditional
filtering approaches and other routing load balancing techniques
(withdraw/prepend/communities or isolate instances),
where the best choice depends on the specifics of the attack.</t>

<t>Note that this consideration refers to the operation of just one
anycast service point, i.e., just one anycasted IP address block
covering one NS record. However, DNS zones with multiple authoritative
anycast servers may also expect loads to shift from one anycasted
server to another, as resolvers switch from on authoritative service
point to another when attempting to resolve a name <xref target="Mueller17b"/>.</t>

</section>
<section anchor="c5-consider-longer-time-to-live-values-whenever-possible" title="C5: Consider longer time-to-live values whenever possible">

<t>Caching is the cornerstone of good DNS performance and reliability. A
50 ms response to a new DNS query may be considered fast, but a less
than 1 ms response to a cached entry is far faster. <xref target="Moura18b"/>
showed that caching also protects users from short outages and even
significant DDoS attacks.</t>

<t>DNS record TTLs (time-to-live values) <xref target="RFC1034"/><xref target="RFC1035"/> directly
control cache durations and affect latency, resilience, and the role
of DNS in CDN server selection. Some early work modeled caches as a
function of their TTLs <xref target="Jung03a"/>, and recent work has examined their
interaction with DNS<xref target="Moura18b"/>, but until <xref target="Moura19a"/> no research
provided considerations about the benefits of various TTL value
choices. To study this, Moura et. al. <xref target="Moura19a"/> carried out a
measurement study investigating TTL choices and their impact on user
experiences in the wild.  They performed this study independent of
specific resolvers (and their caching architectures), vendors, or
setups.</t>

<t>First, they identified several reasons why operators and zone-owners may
want to choose longer or shorter TTLs:</t>

<t><list style="symbols">
  <t>As discussed, longer TTLs lead to a longer cache life, resulting
in faster responses. <xref target="Moura19a"/> measured this in the wild and
showed that by increasing the TTL for .uy TLD from 5 minutes
(300s) to 1 day (86400s) the latency measured from 15k Atlas
vantage points changed significantly: the median RTT decreased
from 28.7ms to 8ms, and the 75%ile decreased from 183ms to 21ms.</t>
  <t>Longer caching times also results in lower DNS traffic:
authoritative servers will experience less traffic with extended
TTLs, as repeated queries are answered by resolver caches.</t>
  <t>Consequently, longer caching results in a lower overall cost if
DNS is metered: some DNS-As-A-Service providers charge a per query
(metered) cost (often in addition to a fixed monthly cost).</t>
  <t>Longer caching is more robust to DDoS attacks on DNS
infrastructure.  <xref target="Moura18b"/> also measured and show that DNS
caching can greatly reduce the effects of a DDoS on DNS, provided
that caches last longer than the attack.</t>
  <t>However, shorter caching supports deployments that may require
rapid operational changes: An easy way to transition from an old
server to a new one is to simply change the DNS records.  Since
there is no method to remotely remove cached DNS records, the TTL
duration represents a necessary transition delay to fully shift
from one server to another.  Thus, low TTLs allow for more rapid
transitions.  However, when deployments are planned in advance
(that is, longer than the TTL), it is possible to lower the TTLs
just-before a major operational change and raise them again
afterward.</t>
  <t>Shorter caching can also help with a DNS-based response to DDoS
attacks. Specifically, some DDoS-scrubbing services use the DNS to
redirect traffic during an attack. Since DDoS attacks arrive
unannounced, DNS-based traffic redirection requires the TTL be
kept quite low at all times to allow operators to suddenly have
their zone served by a DDoS-scrubbing service.</t>
  <t>Shorter caching helps DNS-based load balancing. Many large
services are known to rotate traffic among their servers using
DNS-based load balancing. Each arriving DNS request provides an
opportunity to adjust service load by rotating IP address records
(A and AAAA) to the lowest unused server.  Shorter TTLs may be
desired in these architectures to react more quickly to traffic
dynamics.  Many recursive resolvers, however, have minimum caching
times of tens of seconds, placing a limit on this form of agility.</t>
</list></t>

<t>Given these considerations, the proper choice for a TTL depends in
part on multiple external factors -- no single recommendation is
appropriate for all scenarios. Organizations must weigh these
trade-offs and find a good balance for their situation. Still, some
guidelines can be reached when choosing TTLs:</t>

<t><list style="symbols">
  <t>For general DNS zone owners, <xref target="Moura19a"/> recommends a longer TTL
of at least one hour, and ideally 8, 12, or 24 hours. Assuming
planned maintenance can be scheduled at least a day in advance, long
TTLs have little cost and may, even, literally provide a cost savings.</t>
  <t>For registry operators: TLD and other public registration
operators (for example most ccTLDs and .com, .net, .org) that host
many delegations (NS records, DS records and "glue" records),
<xref target="Moura19a"/> demonstrates that most resolvers will use the TTL
values provided by the child delegations while the others some
will choose the TTL provided by the parent's copy of the
record. As such, <xref target="Moura19a"/> recommends longer TTLs (at least an
hour or more) for registry operators as well for child NS and
other records.</t>
  <t>Users of DNS-based load balancing or DDoS-prevention services may
require shorter TTLs: TTLs may even need to be as short as 5
minutes, although 15 minutes may provide sufficient agility for
many operators.  There is always a tussle between shorter TTLs
providing more agility against all the benefits listed above for
using longer TTLs.</t>
  <t>Use of A/AAAA and NS records: The TTLs for A/AAAA records should
be shorter to or equal to the TTL for the corresponding NS records
for in-bailiwick authoritative DNS servers, since <xref target="Moura19a"/>
finds that once an NS record expires, their associated A/AAAA will
also be re-queried when glue is required to be sent by the
parents.  For out-of-bailiwick servers, A, AAAA and NS records are
usually all cached independently, so different TTLs can be used
effectively if desired. In either case, short A and AAAA records
may still be desired if DDoS-mitigation services are required.</t>
</list></t>

</section>
<section anchor="security-considerations" title="Security considerations">

<t>This document discusses applying measured research results to
operational deployments.  Most of the considerations affect mostly
operational practice, though a few do have security related impacts.</t>

<t>Specifically, C4 discusses a couple of strategies to employ when a
service is under stress from DDoS attacks and offers operators
additional guidance when handling excess traffic.</t>

<t>Similarly, C5 identifies the trade-offs with respect to the
operational and security benefits of using longer time-to-live values.</t>

<!-- verified against RFC3552 - MD -->

</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<!-- Add some remarkt according to RFC6973. Or should we name this "Human Rights considerations" according to RFC8280 - MD -->

<t>This document does not add any practical new privacy issues, aside
from possible benefits in deploying longer TTLs as suggested in C5.
Longer TTLs may help preserve a user's privacy by reducing the number
of requests that get transmitted in both the client-to-resolver and
resolver-to-authoritative cases.</t>

</section>
<section anchor="iana-considerations" title="IANA considerations">

<t>This document has no IANA actions.
<!-- RFC8126 style - MD --></t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>This document is a summary of the main considerations of six research
works performed by the authors and others. This document would not
have been possible without the hard work of these authors and co-authors:</t>

<t><list style="symbols">
  <t>Ricardo de O. Schmidt</t>
  <t>Wouter B de Vries</t>
  <t>Moritz Mueller</t>
  <t>Lan Wei</t>
  <t>Cristian  Hesselman</t>
  <t>Jan Harm Kuipers</t>
  <t>Pieter-Tjerk de Boer</t>
  <t>Aiko Pras</t>
</list></t>

<t>We would like also to thank the reviewers of this draft that offered
valuable suggestions: Duane Wessels, Joe Abley, Toema Gavrichenkov,
John Levine, Michael StJohns, Kristof Tuyteleers, Stefan Ubbink, Klaus
Darilion and Samir Jafferali, and comments provided at the IETF DNSOP
session (IETF104).</t>

<t>Besides those, we would like thank those acknowledged in the papers
this document summarizes for helping produce the results: RIPE NCC and
DNS OARC for their tools and datasets used in this research, as well
as the funding agencies sponsoring the individual research works.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2181;
&RFC1034;
&RFC7094;
&RFC1546;
&RFC1035;
&RFC1995;
&RFC5575;
&RFC5936;
&RFC4271;
&RFC4786;
&RFC1997;
&RFC8499;
&RFC6891;


    </references>

    <references title='Informative References'>

<reference anchor="Moura16b" target="https://www.isi.edu/~johnh/PAPERS/Moura16b.pdf">
  <front>
    <title>Anycast vs DDoS Evaluating the November 2015 Root DNS Events.</title>
    <author initials="G.C.M." surname="Moura" fullname="Giovane C. M. Moura">
      <organization></organization>
    </author>
    <author initials="R.d.O." surname="Schmidt" fullname="Ricardo de O. Schmidt">
      <organization></organization>
    </author>
    <author initials="J." surname="Heidemann" fullname="John Heidemann">
      <organization></organization>
    </author>
    <author initials="M." surname="Mueller" fullname="Moritz Mueller">
      <organization></organization>
    </author>
    <author initials="L." surname="Wei" fullname="Lan Wei">
      <organization></organization>
    </author>
    <author initials="C." surname="Hesselman" fullname="Cristian Hesselman">
      <organization></organization>
    </author>
    <date year="2016" month="October" day="14"/>
  </front>
  <seriesInfo name="ACM" value="2016 Internet Measurement Conference"/>
  <seriesInfo name="DOI" value="/10.1145/2987443.2987446"/>
</reference>
<reference anchor="Schmidt17a" target="https://www.isi.edu/%7ejohnh/PAPERS/Schmidt17a.pdf">
  <front>
    <title>Anycast Latency - How Many Sites Are Enough. In Proceedings of the Passive and Active Measurement Workshop</title>
    <author initials="R.d.O." surname="Schmidt" fullname="Ricardo de O. Schmidt">
      <organization></organization>
    </author>
    <author initials="J." surname="Heidemann" fullname="John Heidemann">
      <organization></organization>
    </author>
    <author initials="J.H." surname="Kuipers" fullname="Jam Harm Kuipers">
      <organization></organization>
    </author>
    <date year="2017" month="March"/>
  </front>
  <seriesInfo name="PAM" value="Passive and Active Measurement Conference"/>
</reference>
<reference anchor="Moura18b" target="https://www.isi.edu/~johnh/PAPERS/Moura18b.pdf">
  <front>
    <title>When the Dike Breaks: Dissecting DNS Defenses During DDos</title>
    <author initials="G.C.M." surname="Moura" fullname="Giovane C. M. Moura">
      <organization></organization>
    </author>
    <author initials="J." surname="Heidemann" fullname="John Heidemann">
      <organization></organization>
    </author>
    <author initials="M." surname="Mueller" fullname="Moritz Mueller">
      <organization></organization>
    </author>
    <author initials="R.d.O." surname="Schmidt" fullname="Ricardo de O. Schmidt">
      <organization></organization>
    </author>
    <author initials="M." surname="Davids" fullname="Marco Davids">
      <organization></organization>
    </author>
    <date year="2018" month="October" day="31"/>
  </front>
  <seriesInfo name="ACM" value="2018 Internet Measurement Conference"/>
  <seriesInfo name="DOI" value="10.1145/3278532.3278534"/>
</reference>
<reference anchor="Moura19a" target="https://www.isi.edu/~johnh/PAPERS/Moura19b.pdf">
  <front>
    <title>Cache Me If You Can: Effects of DNS Time-to-Live</title>
    <author initials="G.C.M." surname="Moura" fullname="Giovane C. M. Moura">
      <organization></organization>
    </author>
    <author initials="J." surname="Heidemann" fullname="John Heidemann">
      <organization></organization>
    </author>
    <author initials="R.d.O." surname="Schmidt" fullname="Ricardo de O. Schmidt">
      <organization></organization>
    </author>
    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization></organization>
    </author>
    <date year="2019" month="October" day="11"/>
  </front>
  <seriesInfo name="ACM" value="2019 Internet Measurement Conference"/>
  <seriesInfo name="DOI" value="10.1145/3355369.3355568"/>
</reference>
<reference anchor="Moura20a" target="https://www.isi.edu/~johnh/PAPERS/Moura20a.pdf">
  <front>
    <title>Old but Gold: Prospecting TCP to Engineer DNS Anycast (extended)</title>
    <author initials="G.C.M." surname="Moura" fullname="Giovane C. M. Moura">
      <organization></organization>
    </author>
    <author initials="J." surname="Heidemann" fullname="John Heidemann">
      <organization></organization>
    </author>
    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization></organization>
    </author>
    <author initials="J." surname="Bulten" fullname="Jeroen Bulten">
      <organization></organization>
    </author>
    <author initials="J." surname="Ceron" fullname="Joao Ceron">
      <organization></organization>
    </author>
    <author initials="C." surname="Hesselman" fullname="Cristian Hesselman">
      <organization></organization>
    </author>
    <date year="2020" month="June" day="01"/>
  </front>
  <seriesInfo name="Technical Report ISI-TR-740 USC/Information Sciences Institute." value=""/>
</reference>
<reference anchor="Moura20b" target="http://giovane-moura.nl/resources/paper/Moura20b.pdf">
  <front>
    <title>Clouding up the Internet: how centralized is DNS traffic becoming?</title>
    <author initials="G.C.M." surname="Moura" fullname="Giovane C. M. Moura">
      <organization></organization>
    </author>
    <author initials="S." surname="Castro" fullname="Sebastian Castro">
      <organization></organization>
    </author>
    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization></organization>
    </author>
    <author initials="M." surname="Wullink" fullname="Maarten Wullink">
      <organization></organization>
    </author>
    <author initials="C." surname="Hesselman" fullname="Cristian Hesselman">
      <organization></organization>
    </author>
    <date year="2020" month="October" day="27"/>
  </front>
  <seriesInfo name="ACM" value="2020 Internet Measurement Conference"/>
  <seriesInfo name="DOI" value="10.1145/3419394.3423625"/>
</reference>
<reference anchor="Sigla2014" target="http://speedierweb.web.engr.illinois.edu/cspeed/papers/hotnets14.pdf">
  <front>
    <title>The Internet at the speed of light. In Proceedings of the 13th ACM Workshop on Hot Topics in Networks (Oct 2014)</title>
    <author initials="A." surname="Singla" fullname="Ankit Singla">
      <organization></organization>
    </author>
    <author initials="B." surname="Chandrasekaran" fullname="Balakrishnan Chandrasekaran">
      <organization></organization>
    </author>
    <author initials="P.B." surname="Godfrey" fullname="P Brighten Godfrey">
      <organization></organization>
    </author>
    <author initials="B." surname="Maggs" fullname="Bruce Maggs">
      <organization></organization>
    </author>
    <date year="2014" month="October"/>
  </front>
  <seriesInfo name="ACM" value="Workshop on Hot Topics in Networks"/>
</reference>
<reference anchor="Vries17b" target="https://www.isi.edu/%7ejohnh/PAPERS/Vries17b.pdf">
  <front>
    <title>Verfploeter - Broad and Load-Aware Anycast Mapping</title>
    <author initials="W.d." surname="Vries" fullname="Wouter de Vries">
      <organization></organization>
    </author>
    <author initials="R.d.O." surname="Schmidt" fullname="Ricardo de O. Schmidt">
      <organization></organization>
    </author>
    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization></organization>
    </author>
    <author initials="J." surname="Heidemann" fullname="John Heidemann">
      <organization></organization>
    </author>
    <author initials="P.d." surname="Boer" fullname="Pieter-Tjerk de Boer">
      <organization></organization>
    </author>
    <author initials="A." surname="Pras" fullname="Aiko Pras">
      <organization></organization>
    </author>
    <date year="2017" month="October"/>
  </front>
  <seriesInfo name="ACM" value="2017 Internet Measurement Conference"/>
  <seriesInfo name="DOI" value="10.1145/3131365.3131371"/>
</reference>
<reference anchor="Jung03a" target="http://www.ieee-infocom.org/2003/papers/11_01.PDF">
  <front>
    <title>Modeling TTL-based Internet caches</title>
    <author initials="J." surname="Jung" fullname="Jaeyeon Jung">
      <organization></organization>
    </author>
    <author initials="A.W." surname="Berger" fullname="Arthur W. Berger">
      <organization></organization>
    </author>
    <author initials="H." surname="Balakrishnan" fullname="Hari Balakrishnan">
      <organization></organization>
    </author>
    <date year="2003" month="July"/>
  </front>
  <seriesInfo name="ACM" value="2003 IEEE INFOCOM"/>
  <seriesInfo name="DOI" value="10.1109/INFCOM.2003.1208693"/>
</reference>
<reference anchor="RipeAtlas15a" target="http://ipj.dreamhosters.com/wp-content/uploads/issues/2015/ipj18-3.pdf">
  <front>
    <title>RIPE Atlas A Global Internet Measurement Network</title>
    <author initials="R.N." surname="Staff" fullname="RIPE NCC Staff">
      <organization></organization>
    </author>
    <date year="2015" month="September"/>
  </front>
</reference>
<reference anchor="RipeAtlas19a" target="https://atlas.ripe.net/">
  <front>
    <title>Ripe Atlas - RIPE Network Coordination Centre</title>
    <author initials="R." surname="NCC" fullname="RIPE NCC">
      <organization></organization>
    </author>
    <date year="2019" month="September"/>
  </front>
</reference>
<reference anchor="Mueller17b" target="https://www.isi.edu/%7ejohnh/PAPERS/Mueller17b.pdf">
  <front>
    <title>Recursives in the Wild-  Engineering Authoritative DNS Servers.</title>
    <author initials="M." surname="Mueller" fullname="Moritz Mueller">
      <organization></organization>
    </author>
    <author initials="G.C.M." surname="Moura" fullname="Giovane C. M. Moura">
      <organization></organization>
    </author>
    <author initials="R.d.O." surname="Schmidt" fullname="Ricardo de O. Schmidt">
      <organization></organization>
    </author>
    <author initials="J." surname="Heidemann" fullname="John Heidemann">
      <organization></organization>
    </author>
    <date year="2017" month="October"/>
  </front>
  <seriesInfo name="ACM" value="2017 Internet Measurement Conference"/>
  <seriesInfo name="DOI" value="10.1145/3131365.3131366"/>
</reference>
<reference anchor="IcannHedge18" target="http://stats.dns.icann.org/hedgehog/">
  <front>
    <title>DNS-STATS -  Hedgehog 2.4.1</title>
    <author initials="." surname="ICANN" fullname="ICANN">
      <organization></organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="Ditl17" target="https://www.dns-oarc.net/oarc/data/ditl/2017">
  <front>
    <title>2017 DITL data</title>
    <author initials="D." surname="OARC" fullname="DNS OARC">
      <organization></organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="Perlroth16" target="https://www.nytimes.com/2016/10/22/business/internet-problems-attack.html">
  <front>
    <title>Hackers Used New Weapons to Disrupt Major Websites Across U.S.</title>
    <author initials="N." surname="Perlroth" fullname="Nicole Perlroth">
      <organization></organization>
    </author>
    <date year="2016" month="October"/>
  </front>
</reference>
<reference anchor="VerfSrc" target="https://github.com/Woutifier/verfploeter">
  <front>
    <title>Verfploeter source code</title>
    <author initials="W.d." surname="Vries" fullname="Wouter de Vries">
      <organization></organization>
    </author>
    <date year="2018" month="November"/>
  </front>
</reference>
<reference anchor="AnyTest" target="http://www.anycast-testbed.com/">
  <front>
    <title>Anycast Testbed</title>
    <author initials="R.d.O." surname="Schmidt" fullname="Ricardo de O. Schmidt">
      <organization></organization>
    </author>
    <date year="2018" month="December"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

