DNS Opportunistic Refresh for Resolvers
draft-muks-dnsop-dns-opportunistic-refresh-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Mukund Sivaraman , Shane Kerr , Stephen Morris | ||
Last updated | 2018-01-01 (Latest revision 2017-06-30) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document describes a mechanism whereby a DNS resolver can opportunistically refresh the TTLs of cached records of a zone using serial number information carried in responses from the zone's nameservers. As well as improving resolver response time by reducing the need to make upstream queries, the mechanism can also reduce the workload of authoritative servers.
Authors
Mukund Sivaraman
Shane Kerr
Stephen Morris
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)