mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-30 14:07:59 +00:00
remove
This commit is contained in:
@@ -1,337 +0,0 @@
|
|||||||
DNSIND Working Group Matt Crawford
|
|
||||||
Internet Draft Fermilab
|
|
||||||
May 5, 1999
|
|
||||||
|
|
||||||
Binary Labels in the Domain Name System
|
|
||||||
<draft-ietf-dnsind-binary-labels-05.txt>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Status of this Memo
|
|
||||||
|
|
||||||
This document is an Internet-Draft and is in full conformance with
|
|
||||||
all provisions of Section 10 of RFC2026. Internet-Drafts are working
|
|
||||||
documents of the Internet Engineering Task Force (IETF), its areas,
|
|
||||||
and its working groups. Note that other groups may also distribute
|
|
||||||
working documents as Internet-Drafts.
|
|
||||||
|
|
||||||
Internet-Drafts are draft documents valid for a maximum of six
|
|
||||||
months and may be updated, replaced, or obsoleted by other documents
|
|
||||||
at any time. It is inappropriate to use Internet- Drafts as
|
|
||||||
reference material or to cite them other than as "work in progress."
|
|
||||||
|
|
||||||
The list of current Internet-Drafts can be accessed at
|
|
||||||
http://www.ietf.org/ietf/1id-abstracts.txt
|
|
||||||
|
|
||||||
The list of Internet-Draft Shadow Directories can be accessed at
|
|
||||||
http://www.ietf.org/shadow.html.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
1. Introduction and Terminology
|
|
||||||
|
|
||||||
This document defines a ``Bit-String Label'' which may appear within
|
|
||||||
domain names. This new label type compactly represents a sequence
|
|
||||||
of ``One-Bit Labels'' and enables resource records to be stored at
|
|
||||||
any bit-boundary in a binary-named section of the domain name tree.
|
|
||||||
|
|
||||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
|
||||||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
|
||||||
document are to be interpreted as described in [KWORD].
|
|
||||||
|
|
||||||
|
|
||||||
2. Motivation
|
|
||||||
|
|
||||||
Binary labels are intended to efficiently solve the problem of
|
|
||||||
storing data and delegating authority on arbitrary boundaries when
|
|
||||||
the structure of underlying name space is most naturally represented
|
|
||||||
in binary.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires November 10, 1999 Crawford [Page 1]
|
|
||||||
|
|
||||||
Internet Draft Binary DNS Labels May 5, 1999
|
|
||||||
|
|
||||||
|
|
||||||
3. Label Format
|
|
||||||
|
|
||||||
Up to 256 One-Bit Labels can be grouped into a single Bit-String
|
|
||||||
Label. Within a Bit-String Label the most significant or "highest
|
|
||||||
level" bit appears first. This is unlike the ordering of DNS labels
|
|
||||||
themselves, which has the least significant or "lowest level" label
|
|
||||||
first. Nonetheless, this ordering seems to be the most natural and
|
|
||||||
efficient for representing binary labels.
|
|
||||||
|
|
||||||
Among consecutive Bit-String Labels, the bits in the first-appearing
|
|
||||||
label are less significant or "at a lower level" than the bits in
|
|
||||||
subsequent Bit-String Labels, just as ASCII labels are ordered.
|
|
||||||
|
|
||||||
|
|
||||||
3.1. Encoding
|
|
||||||
|
|
||||||
|
|
||||||
0 1 2
|
|
||||||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 . . .
|
|
||||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-//+-+-+-+-+-+-+
|
|
||||||
|0 1| ELT | Count | Label ... |
|
|
||||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+//-+-+-+-+-+-+-+
|
|
||||||
|
|
||||||
(Each tic mark represents one bit.)
|
|
||||||
|
|
||||||
|
|
||||||
ELT 000001 binary, the six-bit extended label type [EDNS0]
|
|
||||||
assigned to the Bit-String Label.
|
|
||||||
|
|
||||||
Count The number of significant bits in the Label field. A
|
|
||||||
Count value of zero indicates that 256 bits are
|
|
||||||
significant. (Thus the null label representing the DNS
|
|
||||||
root cannot be represented as a Bit String Label.)
|
|
||||||
|
|
||||||
Label The bit string representing a sequence of One-Bit Labels,
|
|
||||||
with the most significant bit first. That is, the One-Bit
|
|
||||||
Label in position 17 in the diagram above represents a
|
|
||||||
subdomain of the domain represented by the One-Bit Label
|
|
||||||
in position 16, and so on.
|
|
||||||
|
|
||||||
The Label field is padded on the right with zero to seven
|
|
||||||
pad bits to make the entire field occupy an integral
|
|
||||||
number of octets. These pad bits MUST be zero on
|
|
||||||
transmission and ignored on reception.
|
|
||||||
|
|
||||||
A sequence of bits may be split into two or more Bit-String Labels,
|
|
||||||
but the division points have no significance and need not be
|
|
||||||
preserved. An excessively clever server implementation might split
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires November 10, 1999 Crawford [Page 2]
|
|
||||||
|
|
||||||
Internet Draft Binary DNS Labels May 5, 1999
|
|
||||||
|
|
||||||
|
|
||||||
Bit-String Labels so as to maximize the effectiveness of message
|
|
||||||
compression [DNSIS]. A simpler server might divide Bit-String
|
|
||||||
Labels at zone boundaries, if any zone boundaries happen to fall
|
|
||||||
between One-Bit Labels.
|
|
||||||
|
|
||||||
|
|
||||||
3.2. Textual Representation
|
|
||||||
|
|
||||||
A Bit-String Label is represented in text -- in a zone file, for
|
|
||||||
example -- as a <bit-spec> surrounded by the delimiters "\[" and
|
|
||||||
"]". The <bit-spec> is either a dotted quad or a base indicator and
|
|
||||||
a sequence of digits appropriate to that base, optionally followed
|
|
||||||
by a slash and a length. The base indicators are "b", "o" and "x",
|
|
||||||
denoting base 2, 8 and 16 respectively. The length counts the
|
|
||||||
significant bits and MUST be between 1 and 32, inclusive, after a
|
|
||||||
dotted quad, or between 1 and 256, inclusive, after one of the other
|
|
||||||
forms. If the length is omitted, the implicit length is 32 for a
|
|
||||||
dotted quad or 1, 3 or 4 times the number of binary, octal or
|
|
||||||
hexadecimal digits supplied, respectively, for the other forms.
|
|
||||||
|
|
||||||
In augmented Backus-Naur form [ABNF],
|
|
||||||
|
|
||||||
bit-string-label = "\[" bit-spec "]"
|
|
||||||
|
|
||||||
bit-spec = bit-data [ "/" length ]
|
|
||||||
/ dotted-quad [ "/" slength ]
|
|
||||||
|
|
||||||
bit-data = "x" 1*64HEXDIG
|
|
||||||
/ "o" 1*86OCTDIG
|
|
||||||
/ "b" 1*256BIT
|
|
||||||
|
|
||||||
dotted-quad = decbyte "." decbyte "." decbyte "." decbyte
|
|
||||||
|
|
||||||
decbyte = 1*3DIGIT
|
|
||||||
|
|
||||||
length = NZDIGIT *2DIGIT
|
|
||||||
|
|
||||||
slength = NZDIGIT [ DIGIT ]
|
|
||||||
|
|
||||||
OCTDIG = %x30-37
|
|
||||||
|
|
||||||
NZDIGIT = %x31-39
|
|
||||||
|
|
||||||
If a <length> is present, the number of digits in the <bit-data>
|
|
||||||
MUST be just sufficient to contain the number of bits specified by
|
|
||||||
the <length>. If there are insignificant bits in a final
|
|
||||||
hexadecimal or octal digit, they MUST be zero. A <dotted-quad>
|
|
||||||
always has all four parts even if the associated <slength> is less
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires November 10, 1999 Crawford [Page 3]
|
|
||||||
|
|
||||||
Internet Draft Binary DNS Labels May 5, 1999
|
|
||||||
|
|
||||||
|
|
||||||
than 24, but, like the other forms, insignificant bits MUST be zero.
|
|
||||||
|
|
||||||
Each number represented by a <decbyte> must be between 0 and 255,
|
|
||||||
inclusive.
|
|
||||||
|
|
||||||
The number represented by <length> must be between 1 and 256
|
|
||||||
inclusive.
|
|
||||||
|
|
||||||
The number represented by <slength> must be between 1 and 32
|
|
||||||
inclusive.
|
|
||||||
|
|
||||||
When the textual form of a Bit-String Label is generated by machine,
|
|
||||||
the length SHOULD be explicit, not implicit.
|
|
||||||
|
|
||||||
|
|
||||||
3.2.1. Examples
|
|
||||||
|
|
||||||
The following four textual forms represent the same Bit-String
|
|
||||||
Label.
|
|
||||||
|
|
||||||
\[b11010000011101]
|
|
||||||
\[o64072/14]
|
|
||||||
\[xd074/14]
|
|
||||||
\[208.116.0.0/14]
|
|
||||||
|
|
||||||
The following represents two consecutive Bit-String Labels which
|
|
||||||
denote the same relative point in the DNS tree as any of the above
|
|
||||||
single Bit-String Labels.
|
|
||||||
|
|
||||||
\[b11101].\[o640]
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
3.3. Canonical Representation and Sort Order
|
|
||||||
|
|
||||||
Both the wire form and the text form of binary labels have a degree
|
|
||||||
of flexibility in their grouping into multiple consecutive Bit-
|
|
||||||
String Labels. For generating and checking DNS signature records
|
|
||||||
[DNSSEC] binary labels must be in a predictable form. This
|
|
||||||
canonical form is defined as the form which has the fewest possible
|
|
||||||
Bit-String Labels and in which all except possibly the first (least
|
|
||||||
significant) label in any sequence of consecutive Bit-String Labels
|
|
||||||
is of maximum length.
|
|
||||||
|
|
||||||
For example, the canonical form of any sequence of up to 256 One-Bit
|
|
||||||
Labels has a single Bit-String Label, and the canonical form of a
|
|
||||||
sequence of 513 to 768 One-Bit Labels has three Bit-String Labels of
|
|
||||||
which the second and third contain 256 label bits.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires November 10, 1999 Crawford [Page 4]
|
|
||||||
|
|
||||||
Internet Draft Binary DNS Labels May 5, 1999
|
|
||||||
|
|
||||||
|
|
||||||
The canonical sort order of domain names [DNSSEC] is extended to
|
|
||||||
encompass binary labels as follows. Sorting is still label-by-
|
|
||||||
label, from most to least significant, where a label may now be a
|
|
||||||
One-Bit Label or a standard (code 00) label. Any One-Bit Label
|
|
||||||
sorts before any standard label, and a 0 bit sorts before a 1 bit.
|
|
||||||
The absence of a label sorts before any label, as specified in
|
|
||||||
[DNSSEC].
|
|
||||||
|
|
||||||
For example, the following domain names are correctly sorted.
|
|
||||||
|
|
||||||
foo.example
|
|
||||||
\[b1].foo.example
|
|
||||||
\[b100].foo.example
|
|
||||||
\[b101].foo.example
|
|
||||||
bravo.\[b10].foo.example
|
|
||||||
alpha.foo.example
|
|
||||||
|
|
||||||
|
|
||||||
4. Processing Rules
|
|
||||||
|
|
||||||
A One-Bit Label never matches any other kind of label. In
|
|
||||||
particular, the DNS labels represented by the single ASCII
|
|
||||||
characters "0" and "1" do not match One-Bit Labels represented by
|
|
||||||
the bit values 0 and 1.
|
|
||||||
|
|
||||||
|
|
||||||
5. Discussion
|
|
||||||
|
|
||||||
A Count of zero in the wire-form represents a 256-bit sequence, not
|
|
||||||
to optimize that particular case, but to make it completely
|
|
||||||
impossible to have a zero-bit label.
|
|
||||||
|
|
||||||
|
|
||||||
6. IANA Considerations
|
|
||||||
|
|
||||||
This document defines one Extended Label Type, termed the Bit-String
|
|
||||||
Label, and requests registration of the code point 000001 binary in
|
|
||||||
the space defined by [EDNS0].
|
|
||||||
|
|
||||||
|
|
||||||
7. Security Considerations
|
|
||||||
|
|
||||||
All security considerations which apply to traditional ASCII DNS
|
|
||||||
labels apply equally to binary labels. he canonicalization and
|
|
||||||
sorting rules of section 3.3 allow these to be addressed by DNS
|
|
||||||
Security [DNSSEC].
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires November 10, 1999 Crawford [Page 5]
|
|
||||||
|
|
||||||
Internet Draft Binary DNS Labels May 5, 1999
|
|
||||||
|
|
||||||
|
|
||||||
8. References
|
|
||||||
|
|
||||||
[ABNF] D. Crocker, Ed., P. Overell, "Augmented BNF for Syntax
|
|
||||||
Specifications: ABNF", RFC 2234.
|
|
||||||
|
|
||||||
[DNSIS] P.V. Mockapetris, "Domain names - implementation and
|
|
||||||
specification", RFC 1035.
|
|
||||||
|
|
||||||
[DNSSEC]D. Eastlake, 3rd, C. Kaufman, "Domain Name System Security
|
|
||||||
Extensions", RFC 2065.
|
|
||||||
|
|
||||||
[EDNS0] P. Vixie, "Extension mechanisms for DNS (EDNS0)", Currently
|
|
||||||
draft-dnsind-edns0-01.txt.
|
|
||||||
|
|
||||||
[KWORD] Bradner, S., "Key words for use in RFCs to Indicate
|
|
||||||
Requirement Levels," RFC 2119.
|
|
||||||
|
|
||||||
|
|
||||||
9. Author's Address
|
|
||||||
|
|
||||||
Matt Crawford
|
|
||||||
Fermilab MS 368
|
|
||||||
PO Box 500
|
|
||||||
Batavia, IL 60510
|
|
||||||
USA
|
|
||||||
|
|
||||||
Phone: +1 630 840-3461
|
|
||||||
|
|
||||||
EMail: crawdad@fnal.gov
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires November 10, 1999 Crawford [Page 6]
|
|
||||||
|
|
@@ -1,502 +0,0 @@
|
|||||||
|
|
||||||
DNSIND Working Group Matt Crawford
|
|
||||||
Internet Draft Fermilab
|
|
||||||
March 21, 1999
|
|
||||||
|
|
||||||
Non-Terminal DNS Name Redirection
|
|
||||||
<draft-ietf-dnsind-dname-03.txt>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Status of this Memo
|
|
||||||
|
|
||||||
This document is an Internet-Draft and is in full conformance with
|
|
||||||
all provisions of Section 10 of RFC2026. Internet-Drafts are working
|
|
||||||
documents of the Internet Engineering Task Force (IETF), its areas,
|
|
||||||
and its working groups. Note that other groups may also distribute
|
|
||||||
working documents as Internet-Drafts.
|
|
||||||
|
|
||||||
Internet-Drafts are draft documents valid for a maximum of six
|
|
||||||
months and may be updated, replaced, or obsoleted by other documents
|
|
||||||
at any time. It is inappropriate to use Internet- Drafts as
|
|
||||||
reference material or to cite them other than as "work in progress."
|
|
||||||
|
|
||||||
To view the list Internet-Draft Shadow Directories, see
|
|
||||||
http://www.ietf.org/shadow.html.
|
|
||||||
|
|
||||||
|
|
||||||
1. Introduction
|
|
||||||
|
|
||||||
This document defines a new DNS Resource Record called ``DNAME'',
|
|
||||||
which provides the capability to map an entire subtree of the DNS
|
|
||||||
name space to another domain. It differs from the CNAME record
|
|
||||||
which maps a single node of the name space.
|
|
||||||
|
|
||||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
|
||||||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
|
||||||
document are to be interpreted as described in [KWORD].
|
|
||||||
|
|
||||||
|
|
||||||
2. Motivation
|
|
||||||
|
|
||||||
This Resource Record and its processing rules were conceived as a
|
|
||||||
solution to the problem of maintaining address-to-name mappings in a
|
|
||||||
context of network renumbering. Without the DNAME mechanism, an
|
|
||||||
authoritative DNS server for the address-to-name mappings of some
|
|
||||||
network must be reconfigured when that network is renumbered. With
|
|
||||||
DNAME, the zone can be constructed so that it needs no modification
|
|
||||||
when renumbered. DNAME can also be useful in other situations, such
|
|
||||||
as when an organizational unit is renamed.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires September 26, 1999 Crawford [Page 1]
|
|
||||||
|
|
||||||
Internet Draft Non-Terminal Nicknames March 21, 1999
|
|
||||||
|
|
||||||
|
|
||||||
3. The DNAME Resource Record
|
|
||||||
|
|
||||||
The DNAME RR has mnemonic DNAME and type code 39 (decimal).
|
|
||||||
|
|
||||||
DNAME has the following format:
|
|
||||||
|
|
||||||
<owner> <ttl> <class> DNAME <target>
|
|
||||||
|
|
||||||
The format is not class-sensitive. All fields are required. The
|
|
||||||
RDATA field <target> is a <domain-name> [DNSIS].
|
|
||||||
|
|
||||||
The DNAME RR causes type NS additional section processing.
|
|
||||||
|
|
||||||
The effect of the DNAME record is the substitution of the record's
|
|
||||||
<target> for its <owner> as a suffix of a domain name. A "no-
|
|
||||||
descendants" limitation governs the use of DNAMEs in a zone file:
|
|
||||||
|
|
||||||
If a DNAME RR is present at a node N, there may be other data at
|
|
||||||
N (except a CNAME or another DNAME), but there MUST be no data
|
|
||||||
at any descendant of N. This restriction applies only to
|
|
||||||
records of the same class as the DNAME record.
|
|
||||||
|
|
||||||
This rule assures predictable results when a DNAME record is cached
|
|
||||||
by a server which is not authoritative for the record's zone. It
|
|
||||||
MUST be enforced when authoritative zone data is loaded. Together
|
|
||||||
with the rules for DNS zone authority [DNSCLR] it implies that DNAME
|
|
||||||
and NS records can only coexist at the top of a zone which has only
|
|
||||||
one node.
|
|
||||||
|
|
||||||
The compression scheme of [DNSIS] MUST NOT be applied to the RDATA
|
|
||||||
portion of a DNAME record unless the sending server has some way of
|
|
||||||
knowing that the receiver understands the DNAME record format.
|
|
||||||
Signalling such understanding is expected to be the subject of
|
|
||||||
future DNS Extensions.
|
|
||||||
|
|
||||||
Naming loops can be created with DNAME records or a combination of
|
|
||||||
DNAME and CNAME records, just as they can with CNAME records alone.
|
|
||||||
Resolvers, including resolvers embedded in DNS servers, MUST limit
|
|
||||||
the resources they devote to any query. Implementors should note,
|
|
||||||
however, that fairly lengthy chains of DNAME records may be valid.
|
|
||||||
|
|
||||||
|
|
||||||
4. Query Processing
|
|
||||||
|
|
||||||
To exploit the DNAME mechanism the name resolution algorithms
|
|
||||||
[DNSCF] must be modified slightly for both servers and resolvers.
|
|
||||||
|
|
||||||
Both modified algorithms incorporate the operation of making a
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires September 26, 1999 Crawford [Page 2]
|
|
||||||
|
|
||||||
Internet Draft Non-Terminal Nicknames March 21, 1999
|
|
||||||
|
|
||||||
|
|
||||||
substitution on a name (either QNAME or SNAME) under control of a
|
|
||||||
DNAME record. This operation will be referred to as "the DNAME
|
|
||||||
substitution".
|
|
||||||
|
|
||||||
|
|
||||||
4.1. Processing by Servers
|
|
||||||
|
|
||||||
For a server performing non-recursive service steps 3.c and 4 of
|
|
||||||
section 4.3.2 [DNSCF] are changed to check for a DNAME record before
|
|
||||||
checking for a wildcard ("*") label, and to return certain DNAME
|
|
||||||
records from zone data and the cache.
|
|
||||||
|
|
||||||
DNS clients sending Extended DNS [EDNS0] queries with Version 0 or
|
|
||||||
non-extended queries are presumed not to understand the semantics of
|
|
||||||
the DNAME record, so a server which implements this specification,
|
|
||||||
when answering a non-extended query, SHOULD synthesize a CNAME
|
|
||||||
record for each DNAME record encountered during query processing to
|
|
||||||
help the client reach the correct DNS data. The behavior of clients
|
|
||||||
and servers under Extended DNS versions greater than 0 will be
|
|
||||||
specified when those versions are defined.
|
|
||||||
|
|
||||||
The synthesized CNAME RR, if provided, MUST have
|
|
||||||
|
|
||||||
The same CLASS as the QCLASS of the query,
|
|
||||||
|
|
||||||
TTL equal to zero,
|
|
||||||
|
|
||||||
An <owner> equal to the QNAME in effect at the moment the DNAME
|
|
||||||
RR was encountered, and
|
|
||||||
|
|
||||||
An RDATA field containing the new QNAME formed by the action of
|
|
||||||
the DNAME substitution.
|
|
||||||
|
|
||||||
If the server has the appropriate key on-line [DNSSEC, SECDYN], it
|
|
||||||
MAY generate and return a SIG RR for the synthesized CNAME RR.
|
|
||||||
|
|
||||||
The revised server algorithm is:
|
|
||||||
|
|
||||||
1. Set or clear the value of recursion available in the response
|
|
||||||
depending on whether the name server is willing to provide
|
|
||||||
recursive service. If recursive service is available and
|
|
||||||
requested via the RD bit in the query, go to step 5, otherwise
|
|
||||||
step 2.
|
|
||||||
|
|
||||||
2. Search the available zones for the zone which is the nearest
|
|
||||||
ancestor to QNAME. If such a zone is found, go to step 3,
|
|
||||||
otherwise step 4.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires September 26, 1999 Crawford [Page 3]
|
|
||||||
|
|
||||||
Internet Draft Non-Terminal Nicknames March 21, 1999
|
|
||||||
|
|
||||||
|
|
||||||
3. Start matching down, label by label, in the zone. The matching
|
|
||||||
process can terminate several ways:
|
|
||||||
|
|
||||||
a. If the whole of QNAME is matched, we have found the node.
|
|
||||||
|
|
||||||
If the data at the node is a CNAME, and QTYPE doesn't match
|
|
||||||
CNAME, copy the CNAME RR into the answer section of the
|
|
||||||
response, change QNAME to the canonical name in the CNAME
|
|
||||||
RR, and go back to step 1.
|
|
||||||
|
|
||||||
Otherwise, copy all RRs which match QTYPE into the answer
|
|
||||||
section and go to step 6.
|
|
||||||
|
|
||||||
b. If a match would take us out of the authoritative data, we
|
|
||||||
have a referral. This happens when we encounter a node with
|
|
||||||
NS RRs marking cuts along the bottom of a zone.
|
|
||||||
|
|
||||||
Copy the NS RRs for the subzone into the authority section
|
|
||||||
of the reply. Put whatever addresses are available into the
|
|
||||||
additional section, using glue RRs if the addresses are not
|
|
||||||
available from authoritative data or the cache. Go to step
|
|
||||||
4.
|
|
||||||
|
|
||||||
c. If at some label, a match is impossible (i.e., the
|
|
||||||
corresponding label does not exist), look to see whether the
|
|
||||||
last label matched has a DNAME record.
|
|
||||||
|
|
||||||
If a DNAME record exists at that point, copy that record
|
|
||||||
into the answer section. If substitution of its <target>
|
|
||||||
for its <owner> in QNAME would overflow the legal size for a
|
|
||||||
<domain-name>, set RCODE to YXDOMAIN [DNSUPD] and exit;
|
|
||||||
otherwise perform the substitution and continue. If the
|
|
||||||
query was not extended [EDNS0] with a Version indicating
|
|
||||||
understanding of the DNAME record, the server SHOULD
|
|
||||||
synthesize a CNAME record as described above and include it
|
|
||||||
in the answer section. Go back to step 1.
|
|
||||||
|
|
||||||
If there was no DNAME record, look to see if the "*" label
|
|
||||||
exists.
|
|
||||||
|
|
||||||
If the "*" label does not exist, check whether the name we
|
|
||||||
are looking for is the original QNAME in the query or a name
|
|
||||||
we have followed due to a CNAME. If the name is original,
|
|
||||||
set an authoritative name error in the response and exit.
|
|
||||||
Otherwise just exit.
|
|
||||||
|
|
||||||
If the "*" label does exist, match RRs at that node against
|
|
||||||
QTYPE. If any match, copy them into the answer section, but
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires September 26, 1999 Crawford [Page 4]
|
|
||||||
|
|
||||||
Internet Draft Non-Terminal Nicknames March 21, 1999
|
|
||||||
|
|
||||||
|
|
||||||
set the owner of the RR to be QNAME, and not the node with
|
|
||||||
the "*" label. Go to step 6.
|
|
||||||
|
|
||||||
4. Start matching down in the cache. If QNAME is found in the
|
|
||||||
cache, copy all RRs attached to it that match QTYPE into the
|
|
||||||
answer section. If QNAME is not found in the cache but a DNAME
|
|
||||||
record is present at an ancestor of QNAME, copy that DNAME
|
|
||||||
record into the answer section. If there was no delegation from
|
|
||||||
authoritative data, look for the best one from the cache, and
|
|
||||||
put it in the authority section. Go to step 6.
|
|
||||||
|
|
||||||
5. Use the local resolver or a copy of its algorithm (see resolver
|
|
||||||
section of this memo) to answer the query. Store the results,
|
|
||||||
including any intermediate CNAMEs and DNAMEs, in the answer
|
|
||||||
section of the response.
|
|
||||||
|
|
||||||
6. Using local data only, attempt to add other RRs which may be
|
|
||||||
useful to the additional section of the query. Exit.
|
|
||||||
|
|
||||||
Note that there will be at most one ancestor with a DNAME as
|
|
||||||
described in step 4 unless some zone's data is in violation of the
|
|
||||||
no-descendants limitation in section 3. An implementation might
|
|
||||||
take advantage of this limitation by stopping the search of step 3c
|
|
||||||
or step 4 when a DNAME record is encountered.
|
|
||||||
|
|
||||||
|
|
||||||
4.2. Processing by Resolvers
|
|
||||||
|
|
||||||
A resolver or a server providing recursive service must be modified
|
|
||||||
to treat a DNAME as somewhat analogous to a CNAME. The resolver
|
|
||||||
algorithm of [DNSCF] section 5.3.3 is modified to renumber step 4.d
|
|
||||||
as 4.e and insert a new 4.d. The complete algorithm becomes:
|
|
||||||
|
|
||||||
1. See if the answer is in local information, and if so return it
|
|
||||||
to the client.
|
|
||||||
|
|
||||||
2. Find the best servers to ask.
|
|
||||||
|
|
||||||
3. Send them queries until one returns a response.
|
|
||||||
|
|
||||||
4. Analyze the response, either:
|
|
||||||
|
|
||||||
a. if the response answers the question or contains a name
|
|
||||||
error, cache the data as well as returning it back to the
|
|
||||||
client.
|
|
||||||
|
|
||||||
b. if the response contains a better delegation to other
|
|
||||||
servers, cache the delegation information, and go to step 2.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires September 26, 1999 Crawford [Page 5]
|
|
||||||
|
|
||||||
Internet Draft Non-Terminal Nicknames March 21, 1999
|
|
||||||
|
|
||||||
|
|
||||||
c. if the response shows a CNAME and that is not the answer
|
|
||||||
itself, cache the CNAME, change the SNAME to the canonical
|
|
||||||
name in the CNAME RR and go to step 1.
|
|
||||||
|
|
||||||
d. if the response shows a DNAME and that is not the answer
|
|
||||||
itself, cache the DNAME. If substitution of the DNAME's
|
|
||||||
<target> for its <owner> in the SNAME would overflow the
|
|
||||||
legal size for a <domain-name>, return an implementation-
|
|
||||||
dependent error to the application; otherwise perform the
|
|
||||||
substitution and go to step 1.
|
|
||||||
|
|
||||||
e. if the response shows a server failure or other bizarre
|
|
||||||
contents, delete the server from the SLIST and go back to
|
|
||||||
step 3.
|
|
||||||
|
|
||||||
A resolver or recursive server which understands DNAME records but
|
|
||||||
sends non-extended queries MUST augment step 4.c by deleting from
|
|
||||||
the reply any CNAME records which have an <owner> which is a
|
|
||||||
subdomain of the <owner> of any DNAME record in the response.
|
|
||||||
|
|
||||||
|
|
||||||
5. Examples of Use
|
|
||||||
|
|
||||||
5.1. Organizational Renaming
|
|
||||||
|
|
||||||
If an organization with domain name FROBOZZ.EXAMPLE became part of
|
|
||||||
an organization with domain name ACME.EXAMPLE, it might ease
|
|
||||||
transition by placing information such as this in its old zone.
|
|
||||||
|
|
||||||
frobozz.example. DNAME frobozz-division.acme.example.
|
|
||||||
MX 10 mailhub.acme.example.
|
|
||||||
|
|
||||||
The response to an extended recursive query for www.frobozz.example
|
|
||||||
would contain, in the answer section, the DNAME record shown above
|
|
||||||
and the relevant RRs for www.frobozz-division.acme.example.
|
|
||||||
|
|
||||||
|
|
||||||
5.2. Classless Delegation of Shorter Prefixes
|
|
||||||
|
|
||||||
The classless scheme for in-addr.arpa delegation [INADDR] can be
|
|
||||||
extended to prefixes shorter than 24 bits by use of the DNAME
|
|
||||||
record. For example, the prefix 192.0.8.0/22 can be delegated by
|
|
||||||
the following records.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires September 26, 1999 Crawford [Page 6]
|
|
||||||
|
|
||||||
Internet Draft Non-Terminal Nicknames March 21, 1999
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
$ORIGIN 0.192.in-addr.arpa.
|
|
||||||
8/22 NS ns.slash-22-holder.example.
|
|
||||||
8 DNAME 8.8/22
|
|
||||||
9 DNAME 9.8/22
|
|
||||||
10 DNAME 10.8/22
|
|
||||||
11 DNAME 11.8/22
|
|
||||||
|
|
||||||
A typical entry in the resulting reverse zone for some host with
|
|
||||||
address 192.0.9.33 might be
|
|
||||||
|
|
||||||
$ORIGIN 8/22.0.192.in-addr.arpa.
|
|
||||||
33.9 PTR somehost.slash-22-holder.example.
|
|
||||||
|
|
||||||
|
|
||||||
The same advisory remarks concerning the choice of the "/" character
|
|
||||||
apply here as in [INADDR].
|
|
||||||
|
|
||||||
|
|
||||||
5.3. Network Renumbering Support
|
|
||||||
|
|
||||||
If IPv4 network renumbering were common, maintenance of address
|
|
||||||
space delegation could be simplified by using DNAME records instead
|
|
||||||
of NS records to delegate.
|
|
||||||
|
|
||||||
$ORIGIN new-style.in-addr.arpa.
|
|
||||||
189.190 DNAME in-addr.example.net.
|
|
||||||
|
|
||||||
$ORIGIN in-addr.example.net.
|
|
||||||
188 DNAME in-addr.customer.example.
|
|
||||||
|
|
||||||
$ORIGIN in-addr.customer.example.
|
|
||||||
1 PTR www.customer.example.
|
|
||||||
2 PTR mailhub.customer.example.
|
|
||||||
; etc ...
|
|
||||||
|
|
||||||
This would allow the address space 190.189.0.0/16 assigned to the
|
|
||||||
ISP "example.net" to be changed without the necessity of altering
|
|
||||||
the zone files describing the use of that space by the ISP and its
|
|
||||||
customers.
|
|
||||||
|
|
||||||
Renumbering IPv4 networks is currently so arduous a task that
|
|
||||||
updating the DNS is only a small part of the labor, so this scheme
|
|
||||||
may have a low value. But it is hoped that in IPv6 the renumbering
|
|
||||||
task will be quite different and the DNAME mechanism may play a
|
|
||||||
useful part.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires September 26, 1999 Crawford [Page 7]
|
|
||||||
|
|
||||||
Internet Draft Non-Terminal Nicknames March 21, 1999
|
|
||||||
|
|
||||||
|
|
||||||
6. IANA Considerations
|
|
||||||
|
|
||||||
This document defines a new DNS Resource Record type with the
|
|
||||||
mnemonic DNAME and type code 39 (decimal). The naming/numbering
|
|
||||||
space is defined in [DNSIS]. This name and number have already been
|
|
||||||
registered with the IANA.
|
|
||||||
|
|
||||||
|
|
||||||
7. Security Considerations
|
|
||||||
|
|
||||||
The DNAME record is similar to the CNAME record with regard to the
|
|
||||||
consequences of insertion of a spoofed record into a DNS server or
|
|
||||||
resolver, differing in that the DNAME's effect covers a whole
|
|
||||||
subtree of the name space. The facilities of [DNSSEC] are available
|
|
||||||
to authenticate this record type.
|
|
||||||
|
|
||||||
|
|
||||||
8. References
|
|
||||||
|
|
||||||
[DNSCF] P.V. Mockapetris, "Domain names - concepts and facilities",
|
|
||||||
RFC 1034.
|
|
||||||
|
|
||||||
[DNSCLR] R. Elz, R. Bush, "Clarifications to the DNS Specification",
|
|
||||||
RFC 2181.
|
|
||||||
|
|
||||||
[DNSIS] P.V. Mockapetris, "Domain names - implementation and
|
|
||||||
specification", RFC 1035.
|
|
||||||
|
|
||||||
[DNSSEC] D. Eastlake, 3rd, C. Kaufman, "Domain Name System Security
|
|
||||||
Extensions", RFC 2065.
|
|
||||||
|
|
||||||
[DNSUPD] P. Vixie, Ed., S. Thomson, Y. Rekhter, J. Bound, "Dynamic
|
|
||||||
Updates in the Domain Name System", RFC 2136.
|
|
||||||
|
|
||||||
[EDNS0] P. Vixie, "Extensions mechanisms for DNS (EDNS0)", Currently
|
|
||||||
draft-dnsind-edns0-01.txt.
|
|
||||||
|
|
||||||
[INADDR] H. Eidnes, G. de Groot, P. Vixie, "Classless IN-ADDR.ARPA
|
|
||||||
delegation", RFC 2317.
|
|
||||||
|
|
||||||
[KWORD] Bradner, S., "Key words for use in RFCs to Indicate
|
|
||||||
Requirement Levels," RFC 2119.
|
|
||||||
|
|
||||||
[SECDYN] D. Eastlake, 3rd, "Secure Domain Name System Dynamic
|
|
||||||
Update", RFC 2137.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires September 26, 1999 Crawford [Page 8]
|
|
||||||
|
|
||||||
Internet Draft Non-Terminal Nicknames March 21, 1999
|
|
||||||
|
|
||||||
|
|
||||||
9. Author's Address
|
|
||||||
|
|
||||||
Matt Crawford
|
|
||||||
Fermilab MS 368
|
|
||||||
PO Box 500
|
|
||||||
Batavia, IL 60510
|
|
||||||
USA
|
|
||||||
|
|
||||||
Phone: +1 630 840-3461
|
|
||||||
|
|
||||||
EMail: crawdad@fnal.gov
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires September 26, 1999 Crawford [Page 9]
|
|
||||||
|
|
@@ -1,319 +0,0 @@
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
DNSIND Working Group Paul Vixie
|
|
||||||
INTERNET-DRAFT ISC
|
|
||||||
<draft-dnsind-edns0-01.txt> January, 1999
|
|
||||||
|
|
||||||
|
|
||||||
Extension mechanisms for DNS (EDNS0)
|
|
||||||
|
|
||||||
|
|
||||||
Status of this Memo
|
|
||||||
|
|
||||||
This document is an Internet-Draft. Internet-Drafts are working
|
|
||||||
documents of the Internet Engineering Task Force (IETF), its areas,
|
|
||||||
and its working groups. Note that other groups may also distribute
|
|
||||||
working documents as Internet-Drafts.
|
|
||||||
|
|
||||||
Internet-Drafts are draft documents valid for a maximum of six months
|
|
||||||
and may be updated, replaced, or obsoleted by other documents at any
|
|
||||||
time. It is inappropriate to use Internet-Drafts as reference
|
|
||||||
material or to cite them other than as ``work in progress.''
|
|
||||||
|
|
||||||
To view the entire list of current Internet-Drafts, please check the
|
|
||||||
"1id-abstracts.txt" listing contained in the Internet-Drafts Shadow
|
|
||||||
Directories on ftp.is.co.za (Africa), ftp.nordu.net (Northern
|
|
||||||
Europe), ftp.nis.garr.it (Southern Europe), munnari.oz.au (Pacific
|
|
||||||
Rim), ftp.ietf.org (US East Coast), or ftp.isi.edu (US West Coast).
|
|
||||||
|
|
||||||
|
|
||||||
Abstract
|
|
||||||
|
|
||||||
The Domain Name System's wire protocol includes a number of fixed
|
|
||||||
fields whose range has been or soon will be exhausted and does not
|
|
||||||
allow clients to advertise their capabilities to servers. This
|
|
||||||
document describes backward compatible mechanisms for allowing the
|
|
||||||
protocol to grow.
|
|
||||||
|
|
||||||
1 - Rationale and Scope
|
|
||||||
|
|
||||||
1.1. DNS (see [RFC1035]) specifies a Message Format and within such
|
|
||||||
messages there are standard formats for encoding options, errors, and
|
|
||||||
name compression. The maximum allowable size of a DNS Message is fixed.
|
|
||||||
Many of DNS's protocol limits are too small for uses which are or which
|
|
||||||
are desired to become common. There is no way for implementations to
|
|
||||||
advertise their capabilities.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires July 1999 [Page 1]
|
|
||||||
|
|
||||||
INTERNET-DRAFT EDNS0 January 1999
|
|
||||||
|
|
||||||
|
|
||||||
1.2. Existing clients will not know how to interpret the protocol
|
|
||||||
extensions detailed here. In practice, these clients will be upgraded
|
|
||||||
when they have need of a new feature, and only new features will make
|
|
||||||
use of the extensions. We must however take account of client behaviour
|
|
||||||
in the face of extra fields, and design a fallback scheme for
|
|
||||||
interoperability with these clients.
|
|
||||||
|
|
||||||
2 - Affected Protocol Elements
|
|
||||||
|
|
||||||
2.1. The DNS Message Header's (see [RFC1035 4.1.1]) second full 16-bit
|
|
||||||
word is divided into a 4-bit OPCODE, a 4-bit RCODE, and a number of
|
|
||||||
1-bit flags. The original reserved Z bits have been allocated to
|
|
||||||
various purposes, and most of the RCODE values are now in use. More
|
|
||||||
flags and more possible RCODEs are needed.
|
|
||||||
|
|
||||||
2.2. The first two bits of a wire format domain label are used to denote
|
|
||||||
the type of the label. [RFC1035 4.1.4] allocates two of the four
|
|
||||||
possible types and reserves the other two. Proposals for use of the
|
|
||||||
remaining types far outnumber those available. More label types are
|
|
||||||
needed.
|
|
||||||
|
|
||||||
2.3. DNS Messages are limited to 512 octets in size when sent over UDP.
|
|
||||||
While the minimum maximum reassembly buffer size still allows a limit of
|
|
||||||
512 octets of UDP payload, most of the hosts now connected to the
|
|
||||||
Internet are able to reassemble larger datagrams. Some mechanism must
|
|
||||||
be created to allow requestors to advertise larger buffer sizes to
|
|
||||||
responders.
|
|
||||||
|
|
||||||
3 - Extended Label Types
|
|
||||||
|
|
||||||
3.1. The ``0 1'' label type will now indicate an extended label type,
|
|
||||||
whose value is encoded in the lower six bits of the first octet of a
|
|
||||||
label. All subsequently developed label types should be encoded using
|
|
||||||
an extended label type.
|
|
||||||
|
|
||||||
3.2. The ``1 1 1 1 1 1'' extended label type will be reserved for future
|
|
||||||
expansion of the extended label type code space.
|
|
||||||
|
|
||||||
4 - OPT pseudo-RR
|
|
||||||
|
|
||||||
4.1. The OPT pseudo-RR can be added to the additional data section of
|
|
||||||
either a request or a response. An OPT is called a pseudo-RR because it
|
|
||||||
pertains to a particular transport level message and not to any actual
|
|
||||||
DNS data. OPT RRs shall never be cached, forwarded, or stored in or
|
|
||||||
loaded from master files.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires July 1999 [Page 2]
|
|
||||||
|
|
||||||
INTERNET-DRAFT EDNS0 January 1999
|
|
||||||
|
|
||||||
|
|
||||||
4.2. An OPT RR has a fixed part and a variable set of options expressed
|
|
||||||
as {attribute, value} pairs. The fixed part holds some DNS meta data
|
|
||||||
and also a small collection of new protocol elements which we expect to
|
|
||||||
be so popular that it would be a waste of wire space to encode them as
|
|
||||||
{attribute, value} pairs.
|
|
||||||
|
|
||||||
4.3. The fixed part of an OPT RR is structured as follows:
|
|
||||||
|
|
||||||
Field Name Field Type Description
|
|
||||||
------------------------------------------------------
|
|
||||||
NAME domain name empty (root domain)
|
|
||||||
TYPE u_int16_t OPT
|
|
||||||
CLASS u_int16_t sender's UDP payload size
|
|
||||||
TTL u_int32_t extended RCODE and flags
|
|
||||||
RDLEN u_int16_t describes RDATA
|
|
||||||
RDATA octet stream {attribute,value} pairs
|
|
||||||
|
|
||||||
|
|
||||||
4.4. The variable part of an OPT RR is encoded in its RDATA and is
|
|
||||||
structured as zero or more of the following:
|
|
||||||
|
|
||||||
+0 (MSB) +1 (LSB)
|
|
||||||
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|
|
||||||
0: | OPTION-CODE |
|
|
||||||
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|
|
||||||
2: | OPTION-LENGTH |
|
|
||||||
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|
|
||||||
4: | |
|
|
||||||
/ OPTION-DATA /
|
|
||||||
/ /
|
|
||||||
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|
|
||||||
|
|
||||||
|
|
||||||
OPTION-CODE (Assigned by IANA.)
|
|
||||||
|
|
||||||
OPTION-LENGTH Size (in octets) of OPTION-DATA.
|
|
||||||
|
|
||||||
OPTION-DATA Varies per OPTION-CODE.
|
|
||||||
|
|
||||||
4.5. The sender's UDP buffer size (which OPT stores in the RR CLASS
|
|
||||||
field) is the number of octets of the largest UDP payload that can be
|
|
||||||
reassembled and delivered in the sender's network stack. Note that path
|
|
||||||
MTU, with or without fragmentation, may be smaller than this.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires July 1999 [Page 3]
|
|
||||||
|
|
||||||
INTERNET-DRAFT EDNS0 January 1999
|
|
||||||
|
|
||||||
|
|
||||||
4.5.1. Note that a 512-octet UDP payload requires a 576-octet IP
|
|
||||||
reassembly buffer. Choosing 1280 on an Ethernet connected requestor
|
|
||||||
would be reasonable. The consequence of choosing too large a value may
|
|
||||||
be an ICMP message from an intermediate gateway, or even a silent drop
|
|
||||||
of the response message. Requestors are advised to retry in such cases.
|
|
||||||
|
|
||||||
4.5.2. Both requestors and responders are advised to take account of the
|
|
||||||
path's already discovered MTU (if known) when considering message sizes.
|
|
||||||
|
|
||||||
4.6. The extended RCODE and flags (which OPT stores in the RR TTL field)
|
|
||||||
are structured as follows:
|
|
||||||
|
|
||||||
+0 (MSB) +1 (LSB)
|
|
||||||
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|
|
||||||
0: | EXTENDED-RCODE | VERSION |
|
|
||||||
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|
|
||||||
2: | Z |
|
|
||||||
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|
|
||||||
|
|
||||||
|
|
||||||
EXTENDED-RCODE Forms upper 8 bits of extended 12-bit RCODE. Note that
|
|
||||||
EXTENDED-RCODE value "0" indicates that an unextended
|
|
||||||
RCODE is in use (values "0" through "15").
|
|
||||||
|
|
||||||
VERSION Indicates the implementation level of whoever sets it.
|
|
||||||
Full conformance with this specification is indicated by
|
|
||||||
version ``0.'' Note that both requestors and responders
|
|
||||||
should set this to the highest level they implement,
|
|
||||||
that responders should send back RCODE=BADVERS and that
|
|
||||||
requestors should be prepared to probe using lower
|
|
||||||
version numbers if they receive an RCODE=BADVERS.
|
|
||||||
|
|
||||||
Z Set to zero by senders and ignored by receivers, unless
|
|
||||||
modified in a subsequent specification.
|
|
||||||
|
|
||||||
5 - Transport Considerations
|
|
||||||
|
|
||||||
5.1. The presence of an OPT pseudo-RR in a request should be taken as an
|
|
||||||
indication that the requestor fully implements the given version of
|
|
||||||
EDNS, and can correctly understand any response that conforms to that
|
|
||||||
feature's specification.
|
|
||||||
|
|
||||||
5.2. Lack of use of these features in a request must be taken as an
|
|
||||||
indication that the requestor does not implement any part of this
|
|
||||||
specification and that the responder may make no use of any protocol
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires July 1999 [Page 4]
|
|
||||||
|
|
||||||
INTERNET-DRAFT EDNS0 January 1999
|
|
||||||
|
|
||||||
|
|
||||||
extension described here in its response.
|
|
||||||
|
|
||||||
5.3. Responders who do not understand these protocol extensions are
|
|
||||||
expected to send a response with RCODE NOTIMPL, FORMERR, or SERVFAIL.
|
|
||||||
Therefore use of extensions should be ``probed'' such that a responder
|
|
||||||
who isn't known to support them be allowed a retry with no extensions if
|
|
||||||
it responds with such an RCODE. If a responder's capability level is
|
|
||||||
cached by a requestor, a new probe should be sent periodically to test
|
|
||||||
for changes to responder capability.
|
|
||||||
|
|
||||||
6 - Security Considerations
|
|
||||||
|
|
||||||
Requestor-side specification of the maximum buffer size may open a new
|
|
||||||
DNS denial of service attack if responders can be made to send messages
|
|
||||||
which are too large for intermediate gateways to forward, thus leading
|
|
||||||
to potential ICMP storms between gateways and responders.
|
|
||||||
|
|
||||||
7 - IANA Considerations
|
|
||||||
|
|
||||||
IANA is hereby requested to assign an RR type code for OPT.
|
|
||||||
|
|
||||||
It is the recommendation of this document and its working group that
|
|
||||||
IANA create a registry for EDNS Extended Label Types, for EDNS Option
|
|
||||||
Codes, and for EDNS Version Numbers.
|
|
||||||
|
|
||||||
This document assigns label type 0b01xxxxxx as "EDNS Extended Label
|
|
||||||
Type." We request that IANA record this assignment.
|
|
||||||
|
|
||||||
This document assigns extended label type 0bxx111111 as "Reserved for
|
|
||||||
future extended label types." We request that IANA record this
|
|
||||||
assignment.
|
|
||||||
|
|
||||||
This document assigns option code 65535 to "Reserved for future
|
|
||||||
expansion."
|
|
||||||
|
|
||||||
This document expands the RCODE space from 4 bits to 12 bits. This will
|
|
||||||
allow IANA to assign more than the 16 distinct RCODE values allowed in
|
|
||||||
[RFC1035].
|
|
||||||
|
|
||||||
This document assigns EDNS Extended RCODE "16" to "BADVERS".
|
|
||||||
|
|
||||||
IESG approval should be required to create new entries in the EDNS
|
|
||||||
Extended Label Type or EDNS Version Number registries, while any
|
|
||||||
published RFC (including Informational, Experimental, or BCP) should be
|
|
||||||
grounds for allocation of an EDNS Option Code.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires July 1999 [Page 5]
|
|
||||||
|
|
||||||
INTERNET-DRAFT EDNS0 January 1999
|
|
||||||
|
|
||||||
|
|
||||||
8 - Acknowledgements
|
|
||||||
|
|
||||||
Paul Mockapetris, Mark Andrews, Robert Elz, Don Lewis, Bob Halley,
|
|
||||||
Donald Eastlake, Rob Austein, Matt Crawford, Randy Bush, and Thomas
|
|
||||||
Narten were each instrumental in creating and refining this
|
|
||||||
specification.
|
|
||||||
|
|
||||||
9 - References
|
|
||||||
|
|
||||||
[RFC1035] P. Mockapetris, ``Domain Names - Implementation and
|
|
||||||
Specification,'' RFC 1035, USC/Information Sciences
|
|
||||||
Institute, November 1987.
|
|
||||||
|
|
||||||
10 - Author's Address
|
|
||||||
|
|
||||||
Paul Vixie
|
|
||||||
Internet Software Consortium
|
|
||||||
950 Charter Street
|
|
||||||
Redwood City, CA 94063
|
|
||||||
+1 650 779 7001
|
|
||||||
<paul@vix.com>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires July 1999 [Page 6]
|
|
||||||
|
|
Reference in New Issue
Block a user