The Experts below are selected from a list of 42 Experts worldwide ranked by ideXlab platform
Paul Hoffman - One of the best experts on this subject based on the ideXlab platform.
-
Running a Root Server Local to a Resolver
2020Co-Authors: Warren Kumari, Paul HoffmanAbstract:Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server; those resolvers may have difficulty getting responses from the root servers, such as during a network attack. Some DNS recursive resolver operators want to prevent snooping by third parties of requests sent to DNS root servers. In both cases, resolvers can greatly decrease the round- trip time and prevent observation of requests by serving a copy of the full root zone on the same server, such as on a Loopback Address or in the resolver software. This document shows how to start and maintain such a copy of the root zone that does not cause problems for other users of the DNS, at the cost of adding some operational fragility for the operator. This document obsoletes RFC 7706. [ This document is being collaborated on in Github at: https://github.com/wkumari/draft-kh- dnsop-7706bis. The most recent version of the document, open issues, and so on should all be available there. The authors gratefully accept pull requests. ]
-
Decreasing Access Time to Root Servers by Running One On The Same Server
2018Co-Authors: Warren Kumari, Paul HoffmanAbstract:Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server. Some DNS recursive resolver operators want to prevent snooping of requests sent to DNS root servers by third parties. Such resolvers can greatly decrease the round-trip time and prevent observation of requests by running a copy of the full root zone on the same server, such as on a Loopback Address. This document shows how to start and maintain such a copy of the root zone that does not pose a threat to other users of the DNS, at the cost of adding some operational fragility for the operator. This draft will update RFC 7706. See Section 1.1 for a list of topics that will be added in the update. [ Ed note: Text inside square brackets ([]) is additional background information, answers to freqently asked questions, general musings, etc. They will be removed before publication.] [ This document is being collaborated on in Github at: https://github.com/wkumari/draft-kh-dnsop-7706bis. The most recent version of the document, open issues, and so on should all be available there. The authors gratefully accept pull requests. ]
-
Decreasing Access Time to Root Servers by Running One on Loopback
2015Co-Authors: Warren Kumari, Paul HoffmanAbstract:Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server. Some DNS recursive resolver operators want to prevent snooping of requests sent to DNS root servers by third parties. Such resolvers can greatly decrease the round-trip time and prevent observation of requests by running a copy of the full root zone on a Loopback Address (such as 127.0.0.1). This document shows how to start and maintain such a copy of the root zone that does not pose a threat to other users of the DNS, at the cost of adding some operational fragility for the operator.
Warren Kumari - One of the best experts on this subject based on the ideXlab platform.
-
Running a Root Server Local to a Resolver
2020Co-Authors: Warren Kumari, Paul HoffmanAbstract:Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server; those resolvers may have difficulty getting responses from the root servers, such as during a network attack. Some DNS recursive resolver operators want to prevent snooping by third parties of requests sent to DNS root servers. In both cases, resolvers can greatly decrease the round- trip time and prevent observation of requests by serving a copy of the full root zone on the same server, such as on a Loopback Address or in the resolver software. This document shows how to start and maintain such a copy of the root zone that does not cause problems for other users of the DNS, at the cost of adding some operational fragility for the operator. This document obsoletes RFC 7706. [ This document is being collaborated on in Github at: https://github.com/wkumari/draft-kh- dnsop-7706bis. The most recent version of the document, open issues, and so on should all be available there. The authors gratefully accept pull requests. ]
-
Decreasing Access Time to Root Servers by Running One On The Same Server
2018Co-Authors: Warren Kumari, Paul HoffmanAbstract:Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server. Some DNS recursive resolver operators want to prevent snooping of requests sent to DNS root servers by third parties. Such resolvers can greatly decrease the round-trip time and prevent observation of requests by running a copy of the full root zone on the same server, such as on a Loopback Address. This document shows how to start and maintain such a copy of the root zone that does not pose a threat to other users of the DNS, at the cost of adding some operational fragility for the operator. This draft will update RFC 7706. See Section 1.1 for a list of topics that will be added in the update. [ Ed note: Text inside square brackets ([]) is additional background information, answers to freqently asked questions, general musings, etc. They will be removed before publication.] [ This document is being collaborated on in Github at: https://github.com/wkumari/draft-kh-dnsop-7706bis. The most recent version of the document, open issues, and so on should all be available there. The authors gratefully accept pull requests. ]
-
Decreasing Access Time to Root Servers by Running One on Loopback
2015Co-Authors: Warren Kumari, Paul HoffmanAbstract:Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server. Some DNS recursive resolver operators want to prevent snooping of requests sent to DNS root servers by third parties. Such resolvers can greatly decrease the round-trip time and prevent observation of requests by running a copy of the full root zone on a Loopback Address (such as 127.0.0.1). This document shows how to start and maintain such a copy of the root zone that does not pose a threat to other users of the DNS, at the cost of adding some operational fragility for the operator.
Ali Zafar - One of the best experts on this subject based on the ideXlab platform.
-
SRV6 SID/USID OAM FOR ADJ-SID VALIDATION
Technical Disclosure Commons, 2020Co-Authors: Nainar, Nagendra Kumar, Pignataro, Carlos M., Ali ZafarAbstract:Techniques are presented for using a Loopback segment identifier (SID) that has the semantic of a Loopback Address (terminate and process). Such a Loopback SID is assigned for both traditional SID and micro SID (uSID) that can be used in the segment-list of the probe packet to terminate the probe directly in the Nexthop of the adjacent SID (Adj-SID) which can be used to validate the forwarding semantic of the respective Adj-SID at the dataplane
Li Zhi - One of the best experts on this subject based on the ideXlab platform.
-
Study and analysis of EBGP oscillation induced by Loopback Addresses
Journal of Sichuan University, 2008Co-Authors: Li ZhiAbstract:Border Gateway Protocol(BGP) is a path vector protocol with plenty of expansibility and control mechanisms.It provides loop-free inter-domain route information to autonomy systems(AS),and control the data transit between ASes with given policies.With the applications of BGP serves in backbone network,BGP stability is directly concerns on internet's stable operation and it is the basis of expansibility and sustainable development for internet.The EBGP peering with Loopback Address facilitate load balancing over multiple links.However,the router oscillations may occur under special network configuration.This paper has analyzed the condition lead to BGP routing oscillation in the EBGP peering with Loopback Addresses,and has shown various oscillating possibility.In addition,it has brought forward the common method how to avoid this kind of route oscillation.
Nainar, Nagendra Kumar - One of the best experts on this subject based on the ideXlab platform.
-
SRV6 SID/USID OAM FOR ADJ-SID VALIDATION
Technical Disclosure Commons, 2020Co-Authors: Nainar, Nagendra Kumar, Pignataro, Carlos M., Ali ZafarAbstract:Techniques are presented for using a Loopback segment identifier (SID) that has the semantic of a Loopback Address (terminate and process). Such a Loopback SID is assigned for both traditional SID and micro SID (uSID) that can be used in the segment-list of the probe packet to terminate the probe directly in the Nexthop of the adjacent SID (Adj-SID) which can be used to validate the forwarding semantic of the respective Adj-SID at the dataplane