An approach to improve recursion performance
draft-lee-dnsop-recursion-performance-improvement-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | XiaoDong Lee , Hongtao Li , Haikuo Zhang , Peng Zuo | ||
Last updated | 2016-06-13 (Latest revision 2015-12-11) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
A recursive DNS server generally uses random port numbers to send outbound requests to protect against DNS spoofing attacks. Due to the limitation of operation system, a process typically can only open numerable file descriptors simultaneously. This limit reduces recursion performance of resolvers. This draft offers an approach to improve both recursion performance and security for recursive servers.
Authors
XiaoDong Lee
Hongtao Li
Haikuo Zhang
Peng Zuo
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)