mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-09-03 16:15:27 +00:00
updated drafts
This commit is contained in:
File diff suppressed because it is too large
Load Diff
19
doc/draft/draft-hibbs-dns-server-mib-01.txt
Normal file
19
doc/draft/draft-hibbs-dns-server-mib-01.txt
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
|
||||||
|
This Internet-Draft has been deleted. Unrevised documents placed in the
|
||||||
|
Internet-Drafts directories have a maximum life of six months. After
|
||||||
|
that time, they are deleted. This Internet-Draft was not published as
|
||||||
|
an RFC.
|
||||||
|
|
||||||
|
Internet-Drafts are not an archival document series, and expired
|
||||||
|
drafts, such as this one, are not available; please do not ask for
|
||||||
|
copies... they are not available. The Secretariat does not have
|
||||||
|
information as to future plans of the authors or working groups WRT the
|
||||||
|
deleted Internet-Draft.
|
||||||
|
|
||||||
|
For more information or a copy of the document, contact the author directly.
|
||||||
|
|
||||||
|
Draft Author(s):
|
||||||
|
|
||||||
|
R. Hibbs: rbhibbs@pacbell.com
|
||||||
|
|
||||||
|
|
@@ -1,6 +1,7 @@
|
|||||||
|
|
||||||
INTERNET-DRAFT Andreas Gustafsson
|
INTERNET-DRAFT Andreas Gustafsson
|
||||||
draft-ietf-dnsext-axfr-clarify-03.txt Nominum Inc.
|
draft-ietf-dnsext-axfr-clarify-04.txt Nominum Inc.
|
||||||
July 2001
|
March 2002
|
||||||
|
|
||||||
|
|
||||||
DNS Zone Transfer Protocol Clarifications
|
DNS Zone Transfer Protocol Clarifications
|
||||||
@@ -49,9 +50,9 @@ Abstract
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires January 2002 [Page 1]
|
Expires September 2002 [Page 1]
|
||||||
|
|
||||||
draft-ietf-dnsext-axfr-clarify-03.txt July 2001
|
draft-ietf-dnsext-axfr-clarify-04.txt March 2002
|
||||||
|
|
||||||
|
|
||||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||||||
@@ -105,9 +106,9 @@ draft-ietf-dnsext-axfr-clarify-03.txt July 2001
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires January 2002 [Page 2]
|
Expires September 2002 [Page 2]
|
||||||
|
|
||||||
draft-ietf-dnsext-axfr-clarify-03.txt July 2001
|
draft-ietf-dnsext-axfr-clarify-04.txt March 2002
|
||||||
|
|
||||||
|
|
||||||
DNS message size. In the case of a small zone, this can cause the
|
DNS message size. In the case of a small zone, this can cause the
|
||||||
@@ -161,9 +162,9 @@ draft-ietf-dnsext-axfr-clarify-03.txt July 2001
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires January 2002 [Page 3]
|
Expires September 2002 [Page 3]
|
||||||
|
|
||||||
draft-ietf-dnsext-axfr-clarify-03.txt July 2001
|
draft-ietf-dnsext-axfr-clarify-04.txt March 2002
|
||||||
|
|
||||||
|
|
||||||
any combination of messages with and without a question section.
|
any combination of messages with and without a question section.
|
||||||
@@ -217,9 +218,9 @@ draft-ietf-dnsext-axfr-clarify-03.txt July 2001
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires January 2002 [Page 4]
|
Expires September 2002 [Page 4]
|
||||||
|
|
||||||
draft-ietf-dnsext-axfr-clarify-03.txt July 2001
|
draft-ietf-dnsext-axfr-clarify-04.txt March 2002
|
||||||
|
|
||||||
|
|
||||||
send, and slave implementations expect to receive, the zone's SOA RR
|
send, and slave implementations expect to receive, the zone's SOA RR
|
||||||
@@ -273,9 +274,9 @@ References
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires January 2002 [Page 5]
|
Expires September 2002 [Page 5]
|
||||||
|
|
||||||
draft-ietf-dnsext-axfr-clarify-03.txt July 2001
|
draft-ietf-dnsext-axfr-clarify-04.txt March 2002
|
||||||
|
|
||||||
|
|
||||||
[RFC1035] - Domain Names - Implementation and Specifications, P.
|
[RFC1035] - Domain Names - Implementation and Specifications, P.
|
||||||
@@ -291,7 +292,7 @@ Author's Address
|
|||||||
|
|
||||||
Andreas Gustafsson
|
Andreas Gustafsson
|
||||||
Nominum Inc.
|
Nominum Inc.
|
||||||
950 Charter Street
|
2385 Bay Rd
|
||||||
Redwood City, CA 94063
|
Redwood City, CA 94063
|
||||||
USA
|
USA
|
||||||
|
|
||||||
@@ -302,7 +303,7 @@ Author's Address
|
|||||||
|
|
||||||
Full Copyright Statement
|
Full Copyright Statement
|
||||||
|
|
||||||
Copyright (C) The Internet Society (2000, 2001). All Rights Reserved.
|
Copyright (C) The Internet Society (2000 - 2002). All Rights Reserved.
|
||||||
|
|
||||||
This document and translations of it may be copied and furnished to
|
This document and translations of it may be copied and furnished to
|
||||||
others, and derivative works that comment on or otherwise explain it
|
others, and derivative works that comment on or otherwise explain it
|
||||||
@@ -329,9 +330,9 @@ Full Copyright Statement
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires January 2002 [Page 6]
|
Expires September 2002 [Page 6]
|
||||||
|
|
||||||
draft-ietf-dnsext-axfr-clarify-03.txt July 2001
|
draft-ietf-dnsext-axfr-clarify-04.txt March 2002
|
||||||
|
|
||||||
|
|
||||||
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE."
|
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE."
|
||||||
@@ -385,5 +386,5 @@ draft-ietf-dnsext-axfr-clarify-03.txt July 2001
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires January 2002 [Page 7]
|
Expires September 2002 [Page 7]
|
||||||
|
|
@@ -1,11 +1,15 @@
|
|||||||
DNSEXT Working Group David C Lawrence
|
DNSEXT Working Group David C Lawrence
|
||||||
INTERNET-DRAFT Nominum
|
INTERNET-DRAFT Nominum
|
||||||
<draft-ietf-dnsext-obsolete-iquery-02.txt> December 2001
|
<draft-ietf-dnsext-obsolete-iquery-03.txt> January 2002
|
||||||
Updates: RFC 1035
|
Updates: RFC 1035
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Obsoleting IQUERY
|
Obsoleting IQUERY
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Status of this Memo
|
Status of this Memo
|
||||||
|
|
||||||
This document is an Internet-Draft and is in full conformance with
|
This document is an Internet-Draft and is in full conformance with
|
||||||
@@ -30,25 +34,27 @@ Status of this Memo
|
|||||||
Comments should be sent to the authors or the DNSEXT WG mailing list
|
Comments should be sent to the authors or the DNSEXT WG mailing list
|
||||||
namedroppers@ops.ietf.org.
|
namedroppers@ops.ietf.org.
|
||||||
|
|
||||||
This draft expires on 14 June 2002.
|
This draft expires on 14 July 2002.
|
||||||
|
|
||||||
Copyright Notice
|
Copyright Notice
|
||||||
|
|
||||||
Copyright (C) The Internet Society (2001). All rights reserved.
|
Copyright (C) The Internet Society (2002). All rights reserved.
|
||||||
|
|
||||||
Abstract
|
Abstract
|
||||||
|
|
||||||
Based on a lack of working implementations of the IQUERY method
|
The IQUERY method of performing inverse DNS lookups, specified in
|
||||||
of performing inverse DNS lookups, and because an alternative
|
RFC 1035, has not been generally implemented and has usually been
|
||||||
mechanism for doing inverse queries of address records has been
|
operationally disabled where it has been implemented. Both reflect
|
||||||
successfully used operationally for well over a decade, this
|
a general view in the community that the concept was unwise and
|
||||||
draft proposes that the IQUERY operation be entirely obsoleted.
|
that the widely-used alternate approach of using PTR queries and
|
||||||
|
reverse-mapping records is preferable. Consequently, this document
|
||||||
|
deprecates the IQUERY operation and updates RFC 1035 to declare it
|
||||||
|
entirely obsolete.
|
||||||
|
|
||||||
|
|
||||||
|
Expires Jul 2002 [Page 1]
|
||||||
Expires Jun 2002 [Page 1]
|
|
||||||
|
|
||||||
INTERNET-DRAFT Obsoleting IQUERY June 2001
|
INTERNET-DRAFT Obsoleting IQUERY January 2002
|
||||||
|
|
||||||
|
|
||||||
1 - Introduction
|
1 - Introduction
|
||||||
@@ -98,13 +104,13 @@ INTERNET-DRAFT Obsoleting IQUERY June 2001
|
|||||||
|
|
||||||
1.1 - Requirements
|
1.1 - Requirements
|
||||||
|
|
||||||
The key words "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY" in this
|
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||||||
|
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
||||||
document are to be interpreted as described in RFC 2119.
|
document are to be interpreted as described in RFC 2119.
|
||||||
|
|
||||||
|
Expires Jul 2002 [Page 2]
|
||||||
Expires Jun 2002 [Page 2]
|
|
||||||
|
|
||||||
INTERNET-DRAFT Obsoleting IQUERY June 2001
|
INTERNET-DRAFT Obsoleting IQUERY January 2002
|
||||||
|
|
||||||
1.2 - Updated documents and sections
|
1.2 - Updated documents and sections
|
||||||
|
|
||||||
@@ -153,20 +159,23 @@ INTERNET-DRAFT Obsoleting IQUERY June 2001
|
|||||||
6 - Acknowledgments:
|
6 - Acknowledgments:
|
||||||
|
|
||||||
Olafur Gudmundsson was the instigator for this action.
|
Olafur Gudmundsson was the instigator for this action.
|
||||||
Matt Crawford contributed some improved wording.
|
Matt Crawford, John Klensin and Erik Nordmark contributed some
|
||||||
|
improved wording.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Expires Jul 2002 [Page 3]
|
||||||
Expires Jun 2002 [Page 3]
|
|
||||||
|
|
||||||
INTERNET-DRAFT Obsoleting IQUERY June 2001
|
INTERNET-DRAFT Obsoleting IQUERY January 2002
|
||||||
|
|
||||||
References:
|
References:
|
||||||
|
|
||||||
[RFC1035] P. Mockapetris, ``Domain Names - Implementation and
|
[RFC1035] P. Mockapetris, ``Domain Names - Implementation and
|
||||||
Specification'', STD 13, RFC 1035, November 1987.
|
Specification'', STD 13, RFC 1035, November 1987.
|
||||||
|
|
||||||
|
[RFC2119] S. Bradner, ``Key Words for Use in RFCs to Indicate
|
||||||
|
Requirement Levels'', BCP 14, RFC 2119, March 1997.
|
||||||
|
|
||||||
7 - Author's Address
|
7 - Author's Address
|
||||||
|
|
||||||
David Lawrence
|
David Lawrence
|
||||||
@@ -180,7 +189,7 @@ References:
|
|||||||
|
|
||||||
Full Copyright Statement
|
Full Copyright Statement
|
||||||
|
|
||||||
Copyright (C) The Internet Society (2001). All Rights Reserved.
|
Copyright (C) The Internet Society (2002). All Rights Reserved.
|
||||||
|
|
||||||
This document and translations of it may be copied and furnished to
|
This document and translations of it may be copied and furnished to
|
||||||
others, and derivative works that comment on or otherwise explain it
|
others, and derivative works that comment on or otherwise explain it
|
||||||
@@ -211,7 +220,4 @@ Full Copyright Statement
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Expires Jul 2002 [Page 4]
|
||||||
|
|
||||||
|
|
||||||
Expires Jun 2002 [Page 4]
|
|
@@ -6,24 +6,21 @@
|
|||||||
|
|
||||||
INTERNET-DRAFT D. Senie
|
INTERNET-DRAFT D. Senie
|
||||||
Category: BCP Amaranth Networks Inc.
|
Category: BCP Amaranth Networks Inc.
|
||||||
Expires in six months July 2001
|
Expires in six months March 2002
|
||||||
|
|
||||||
Requiring DNS IN-ADDR Mapping
|
Requiring DNS IN-ADDR Mapping
|
||||||
draft-ietf-dnsop-inaddr-required-02.txt.
|
draft-ietf-dnsop-inaddr-required-03.txt
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Status of this Memo
|
Status of this Memo
|
||||||
|
|
||||||
|
|
||||||
This draft, file name draft-ietf-dnsop-inaddr-required-00.txt, is
|
This draft, is intended to be become a Best Current Practice RFC.
|
||||||
intended to be become a Best Current Practice RFC. Distribution of
|
Distribution of this document is unlimited. Comments should be sent
|
||||||
this document is unlimited. Comments should be sent to the Domain
|
to the Domain Name Server Operations working group mailing list
|
||||||
Name Server Operations working group mailing list <dnsop@cafax.se> or
|
<dnsop@cafax.se> or to the author.
|
||||||
to the author.
|
|
||||||
|
|
||||||
This document is an Internet-Draft and is in full conformance with
|
This document is an Internet-Draft and is in full conformance with
|
||||||
all provisions of Section 10 of RFC2026.
|
all provisions of Section 10 of [RFC2026].
|
||||||
|
|
||||||
Internet-Drafts are working documents of the Internet Engineering
|
Internet-Drafts are working documents of the Internet Engineering
|
||||||
Task Force (IETF), its areas, and its working groups. Note that other
|
Task Force (IETF), its areas, and its working groups. Note that other
|
||||||
@@ -34,16 +31,20 @@ Status of this Memo
|
|||||||
time. It is inappropriate to use Internet-Drafts as reference
|
time. It is inappropriate to use Internet-Drafts as reference
|
||||||
material or to cite them other than as "work in progress."
|
material or to cite them other than as "work in progress."
|
||||||
|
|
||||||
The list of current Internet-Drafts can be accessed at
|
To view the list Internet-Draft Shadow Directories, see
|
||||||
http://www.ietf.org/1id-abstracts.html
|
|
||||||
|
|
||||||
The list of Internet-Draft Shadow Directories can be accessed at
|
|
||||||
http://www.ietf.org/shadow.html.
|
http://www.ietf.org/shadow.html.
|
||||||
|
|
||||||
|
|
||||||
Copyright Notice
|
Copyright Notice
|
||||||
|
|
||||||
Copyright (C) The Internet Society (2000,2001). All Rights Reserved.
|
Copyright (C) The Internet Society (2000-2002). All Rights Reserved.
|
||||||
|
|
||||||
|
Abstract
|
||||||
|
|
||||||
|
Mapping of addresses to names has been a feature of DNS. Many sites,
|
||||||
|
implement it, many others don't. Some applications attempt to use it
|
||||||
|
as a part of a security strategy. The goal of this document is to
|
||||||
|
encourage proper deployment of address to name mappings, and provide
|
||||||
|
guidance for their use.
|
||||||
|
|
||||||
1. Introduction
|
1. Introduction
|
||||||
|
|
||||||
@@ -52,13 +53,6 @@ Copyright Notice
|
|||||||
address, and address to name mappings are provided for networks. This
|
address, and address to name mappings are provided for networks. This
|
||||||
practice, while documented, has never been documented as a
|
practice, while documented, has never been documented as a
|
||||||
requirement placed upon those who control address blocks. This
|
requirement placed upon those who control address blocks. This
|
||||||
document fills this gap.
|
|
||||||
|
|
||||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
|
||||||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
|
||||||
document are to be interpreted as described in RFC 2119.
|
|
||||||
|
|
||||||
2. Discussion
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -68,9 +62,17 @@ Senie [Page 1]
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Internet-Draft Requiring DNS IN-ADDR Mapping July 2001
|
Internet-Draft Requiring DNS IN-ADDR Mapping March 2002
|
||||||
|
|
||||||
|
|
||||||
|
document fills this gap.
|
||||||
|
|
||||||
|
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||||||
|
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
||||||
|
document are to be interpreted as described in RFC 2119 [RFC2119].
|
||||||
|
|
||||||
|
2. Discussion
|
||||||
|
|
||||||
From the early days of the Domain Name Service [RFC 883] a special
|
From the early days of the Domain Name Service [RFC 883] a special
|
||||||
domain has been set aside for resolving mappings of IP addresses to
|
domain has been set aside for resolving mappings of IP addresses to
|
||||||
domain names. This was refined in [RFC1035], describing the .IN-
|
domain names. This was refined in [RFC1035], describing the .IN-
|
||||||
@@ -81,8 +83,9 @@ Internet-Draft Requiring DNS IN-ADDR Mapping July 2001
|
|||||||
[RFC2050], which requires regional registries to maintain IN-ADDR
|
[RFC2050], which requires regional registries to maintain IN-ADDR
|
||||||
records on the large blocks of space issued to ISPs and others.
|
records on the large blocks of space issued to ISPs and others.
|
||||||
|
|
||||||
ARIN's policy only requires ISPs to maintain IN-ADDR if they have a
|
ARIN's policy requires ISPs to maintain IN-ADDR for /16 or larger
|
||||||
/16 or larger allocation [ARIN]. APNIC indicates in their policy
|
allocations. For smaller allocations, ARIN can provide IN-ADDR for
|
||||||
|
/24 and shorter prefixes. [ARIN]. APNIC indicates in their policy
|
||||||
document [APNIC] that those to whom they allocate blocks, and those
|
document [APNIC] that those to whom they allocate blocks, and those
|
||||||
further downstream SHOULD maintain IN-ADDR records. RIPE appears to
|
further downstream SHOULD maintain IN-ADDR records. RIPE appears to
|
||||||
have the strongest policy in this area [ripe-185] indicating Local
|
have the strongest policy in this area [ripe-185] indicating Local
|
||||||
@@ -111,15 +114,6 @@ Internet-Draft Requiring DNS IN-ADDR Mapping July 2001
|
|||||||
it maps back to the address originally known. Failure to resolve
|
it maps back to the address originally known. Failure to resolve
|
||||||
matching names is seen as a potential security concern.
|
matching names is seen as a potential security concern.
|
||||||
|
|
||||||
Some popular FTP sites will flat-out reject users, even for anonymous
|
|
||||||
FTP, if the IN-ADDR lookup fails or if the result of the IN-ADDR
|
|
||||||
lookup when itself resolved, does not match. Some Telnet servers also
|
|
||||||
implement this check.
|
|
||||||
|
|
||||||
Web sites are in some cases using IN-ADDR checks to verify whether
|
|
||||||
the client is located within a certain geopolitical entity. This is
|
|
||||||
being employed for downloads of crypto software, for example, where
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Senie [Page 2]
|
Senie [Page 2]
|
||||||
@@ -128,9 +122,17 @@ Senie [Page 2]
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Internet-Draft Requiring DNS IN-ADDR Mapping July 2001
|
Internet-Draft Requiring DNS IN-ADDR Mapping March 2002
|
||||||
|
|
||||||
|
|
||||||
|
Some popular FTP sites will flat-out reject users, even for anonymous
|
||||||
|
FTP, if the IN-ADDR lookup fails or if the result of the IN-ADDR
|
||||||
|
lookup when itself resolved, does not match. Some Telnet servers also
|
||||||
|
implement this check.
|
||||||
|
|
||||||
|
Web sites are in some cases using IN-ADDR checks to verify whether
|
||||||
|
the client is located within a certain geopolitical entity. This is
|
||||||
|
being employed for downloads of crypto software, for example, where
|
||||||
export of that software is prohibited to some locales. Credit card
|
export of that software is prohibited to some locales. Credit card
|
||||||
anti-fraud systems also use these methods for geographic placement
|
anti-fraud systems also use these methods for geographic placement
|
||||||
purposes.
|
purposes.
|
||||||
@@ -154,7 +156,7 @@ Internet-Draft Requiring DNS IN-ADDR Mapping July 2001
|
|||||||
Traceroutes with descriptive IN-ADDR naming proves useful when
|
Traceroutes with descriptive IN-ADDR naming proves useful when
|
||||||
debugging problems spanning large areas. When this information is
|
debugging problems spanning large areas. When this information is
|
||||||
missing, the traceroutes take longer, and it takes additional steps
|
missing, the traceroutes take longer, and it takes additional steps
|
||||||
to determine who's network is the cause of problems.
|
to determine which network is the cause of problems.
|
||||||
|
|
||||||
4. Requirements
|
4. Requirements
|
||||||
|
|
||||||
@@ -171,14 +173,6 @@ Internet-Draft Requiring DNS IN-ADDR Mapping July 2001
|
|||||||
Internet providers and other users to whom a block of addresses are
|
Internet providers and other users to whom a block of addresses are
|
||||||
delegated SHOULD provide for lookup of host names from IP addresses.
|
delegated SHOULD provide for lookup of host names from IP addresses.
|
||||||
This may be provided directly or by delegation to the user of the
|
This may be provided directly or by delegation to the user of the
|
||||||
address block. The ISP is responsible for one or the other. In the
|
|
||||||
event of delegation, the user is responsible for resolution.
|
|
||||||
|
|
||||||
Only IP addresses not presently in use within a block, or which are
|
|
||||||
not valid for use (zeros or ones broadcast addresses) are permitted
|
|
||||||
to have no mapping. It should be noted that due to CIDR, many
|
|
||||||
addresses which appear to be otherwise valid host addresses may
|
|
||||||
actually be zeroes or ones broadcast addresses. As such, attempting
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -188,9 +182,17 @@ Senie [Page 3]
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Internet-Draft Requiring DNS IN-ADDR Mapping July 2001
|
Internet-Draft Requiring DNS IN-ADDR Mapping March 2002
|
||||||
|
|
||||||
|
|
||||||
|
address block. The ISP is responsible for one or the other. In the
|
||||||
|
event of delegation, the user is responsible for resolution.
|
||||||
|
|
||||||
|
Only IP addresses not presently in use within a block, or which are
|
||||||
|
not valid for use (zeros or ones broadcast addresses) are permitted
|
||||||
|
to have no mapping. It should be noted that due to CIDR, many
|
||||||
|
addresses which appear to be otherwise valid host addresses may
|
||||||
|
actually be zeroes or ones broadcast addresses. As such, attempting
|
||||||
to audit a site's degree of compliance can only be done with a
|
to audit a site's degree of compliance can only be done with a
|
||||||
knowledge of the internal routing structure of the site. However, any
|
knowledge of the internal routing structure of the site. However, any
|
||||||
host which originates an IP packet necessarily will have a valid host
|
host which originates an IP packet necessarily will have a valid host
|
||||||
@@ -213,7 +215,7 @@ Internet-Draft Requiring DNS IN-ADDR Mapping July 2001
|
|||||||
|
|
||||||
This document has no negative impact on security. While it could be
|
This document has no negative impact on security. While it could be
|
||||||
argued that lack of PTR record capabilities provides a degree of
|
argued that lack of PTR record capabilities provides a degree of
|
||||||
anonimity, this is really not valid. Trace routes, whois lookups and
|
anonymity, this is really not valid. Trace routes, whois lookups and
|
||||||
other sources will still provide methods for discovering identity.
|
other sources will still provide methods for discovering identity.
|
||||||
|
|
||||||
By recommending applications avoid using IN-ADDR as a security
|
By recommending applications avoid using IN-ADDR as a security
|
||||||
@@ -231,14 +233,6 @@ Internet-Draft Requiring DNS IN-ADDR Mapping July 2001
|
|||||||
|
|
||||||
[RFC1519] V. Fuller, et. al., "Classless Inter-Domain Routing (CIDR):
|
[RFC1519] V. Fuller, et. al., "Classless Inter-Domain Routing (CIDR):
|
||||||
an Address Assignment and Aggregation Strategy," RFC 1519, September
|
an Address Assignment and Aggregation Strategy," RFC 1519, September
|
||||||
1993.
|
|
||||||
|
|
||||||
[RFC2317] H. Eidnes, et. al., "Classless IN-ADDR.ARPA delegation,"
|
|
||||||
RFC 2317, March 1998.
|
|
||||||
|
|
||||||
[RFC2050] K. Hubbard, et. al., "Internet Registry IP Allocation
|
|
||||||
Guidelines", RFC2050, BCP 12, Novebmer 1996.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -248,14 +242,28 @@ Senie [Page 4]
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Internet-Draft Requiring DNS IN-ADDR Mapping July 2001
|
Internet-Draft Requiring DNS IN-ADDR Mapping March 2002
|
||||||
|
|
||||||
|
|
||||||
|
1993.
|
||||||
|
|
||||||
|
[RFC2026] S. Bradner, "The Internet Standards Process -- Revision 3",
|
||||||
|
RFC 2026, BCP 9, October 1996.
|
||||||
|
|
||||||
|
[RFC2119] S. Bradner, "Key words for use in RFCs to Indicate
|
||||||
|
Requirement Levels", RFC 2119, BCP 14, March 1997.
|
||||||
|
|
||||||
|
[RFC2050] K. Hubbard, et. al., "Internet Registry IP Allocation
|
||||||
|
Guidelines", RFC2050, BCP 12, Novebmer 1996.
|
||||||
|
|
||||||
|
[RFC2317] H. Eidnes, et. al., "Classless IN-ADDR.ARPA delegation,"
|
||||||
|
RFC 2317, March 1998.
|
||||||
|
|
||||||
[ARIN] "ISP Guidelines for Requesting Initial IP Address Space," date
|
[ARIN] "ISP Guidelines for Requesting Initial IP Address Space," date
|
||||||
unknown, http://www.arin.net/regserv/initial-isp.html
|
unknown, http://www.arin.net/regserv/initial-isp.html
|
||||||
|
|
||||||
[APNIC] "Policies for address space management in the Asia Pacific
|
[APNIC] "Policies For IPv4 Address Space Management in the Asia
|
||||||
Region," Approved October 1999, effective January 2000,
|
Pacific Region," APNIC-086, Approval pending, 17 December 2001,
|
||||||
http://www.apnic.net/drafts/add-manage-policy.html
|
http://www.apnic.net/drafts/add-manage-policy.html
|
||||||
|
|
||||||
[RIPE185] "European Internet Registry Policies and Procedures,"
|
[RIPE185] "European Internet Registry Policies and Procedures,"
|
||||||
@@ -283,20 +291,6 @@ Internet-Draft Requiring DNS IN-ADDR Mapping July 2001
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -305,3 +299,7 @@ Internet-Draft Requiring DNS IN-ADDR Mapping July 2001
|
|||||||
Senie [Page 5]
|
Senie [Page 5]
|
||||||
|
|
||||||
|
|
||||||
|
-----------------------------------------------------------------
|
||||||
|
Daniel Senie dts@senie.com
|
||||||
|
Amaranth Networks Inc. http://www.amaranth.com
|
||||||
|
|
@@ -1,337 +0,0 @@
|
|||||||
|
|
||||||
Internet Draft Johan Ihren
|
|
||||||
draft-ietf-dnsop-v6-name-space-fragmentation-00.txt Autonomica
|
|
||||||
January 2002
|
|
||||||
Expires in six months
|
|
||||||
|
|
||||||
|
|
||||||
IPv4-to-IPv6 migration and DNS name space fragmentation
|
|
||||||
|
|
||||||
|
|
||||||
Status of this Memo
|
|
||||||
|
|
||||||
This memo provides information to the Internet community. It does
|
|
||||||
no specify an Internet standard of any kind. This memo is in full
|
|
||||||
conformance with all provisions of Section 10 of RFC2026.
|
|
||||||
|
|
||||||
The list of current Internet-Drafts can be accessed at
|
|
||||||
http://www.ietf.org/ietf/1id-abstracts.txt The list of
|
|
||||||
Internet-Draft Shadow Directories can be accessed at
|
|
||||||
http://www.ietf.org/shadow.html.
|
|
||||||
|
|
||||||
Abstract
|
|
||||||
|
|
||||||
This memo documents some problems forseen in transitioning from a
|
|
||||||
IPv4-only DNS hierarchy via a long period of mixture to an
|
|
||||||
IPv6-mostly situation sometime in the future. The mixture period is
|
|
||||||
expected to be very long, and hence design choices should very much
|
|
||||||
take this into account, rather than just regard the transition as a
|
|
||||||
relatively short period of pain.
|
|
||||||
|
|
||||||
The main problem with transition that this paper focus on is what
|
|
||||||
to do about the name space fragmentation that may result from
|
|
||||||
certain DNS data only being available over one type of transport
|
|
||||||
(i.e. v4 or v6) which is thereby likely unavailable to hosts that
|
|
||||||
can cannot utilize that transport.
|
|
||||||
|
|
||||||
Two orthogonal issues are identified and discussed: deployment and
|
|
||||||
use. The former while technically simple holds certain dangers that
|
|
||||||
should be avoided. The "use" (as in performing DNS lookups) is much
|
|
||||||
more complicated, and a roadmap for this is presented.
|
|
||||||
|
|
||||||
1. Terminology
|
|
||||||
|
|
||||||
The key words "MUST", "SHALL", "REQUIRED", "SHOULD",
|
|
||||||
"RECOMMENDED", and "MAY" in this document are to be interpreted as
|
|
||||||
described in RFC 2119 [RFC2119].
|
|
||||||
|
|
||||||
The phrase "v4 name server" indicates a name server available over
|
|
||||||
IPv4 transport. It does not imply anything about what DNS data is
|
|
||||||
served. Likewise, "v6 name server" indicates a name server
|
|
||||||
available over IPv6 transport.
|
|
||||||
|
|
||||||
|
|
||||||
2. Introduction to the problem of name space fragmentation
|
|
||||||
|
|
||||||
With all DNS data only available over IPv4 transport everything is
|
|
||||||
simple. IPv4 resolvers can use the intended mechanism of following
|
|
||||||
referrals from the root and down while IPv6 resolvers have to work
|
|
||||||
through a "translator", i.e. they have to use a second name server
|
|
||||||
on a so-called "dual stack" host as a "forwarder" since they cannot
|
|
||||||
access the DNS data directly. This is not a scalable solution.
|
|
||||||
|
|
||||||
With all DNS data only available over IPv6 transport everything
|
|
||||||
would be equally simple, with the exception of old legacy IPv4 name
|
|
||||||
servers having to switch to a forwarding configuration.
|
|
||||||
|
|
||||||
However, the second situation will not arise in a foreseeable
|
|
||||||
time. Instead, it is expected that the transition will be from IPv4
|
|
||||||
only to a mixture of IPv4 and IPv6, with DNS data of theoretically
|
|
||||||
three categories depending on whether it is available only over
|
|
||||||
IPv4 transport, only over IPv6 or both.
|
|
||||||
|
|
||||||
The latter is the best situation, and a major question is how to
|
|
||||||
ensure that it as quickly as possible becomes the norm. However,
|
|
||||||
while it is obvious that some DNS data will only be available over
|
|
||||||
v4 transport for a long time it is also obvious that it is
|
|
||||||
important to avoid fragmenting the name space available to IPv4
|
|
||||||
only hosts. I.e. during transition it is not acceptable to break
|
|
||||||
the name space that we presently have available for IPv4-only
|
|
||||||
hosts.
|
|
||||||
|
|
||||||
3. Consequences of deploying a "IPv6 root name server"
|
|
||||||
|
|
||||||
If and when a root name server that is accessible over IPv6
|
|
||||||
transport is deployed it will immediately become possible to change
|
|
||||||
IPv6-only name servers to a "native configuration", i.e. to a
|
|
||||||
configuration where they follow referrals directly from the root
|
|
||||||
(which is now accessible to them because of the v6 transport).
|
|
||||||
|
|
||||||
However, initially they will typically quite soon get a so-called
|
|
||||||
"referral" to a name server only available over IPv4 transport, and
|
|
||||||
this will be impossible to follow, since there is no common
|
|
||||||
transport available. Therefore the name it is trying to lookup will
|
|
||||||
not get looked up and the result is that a v6-only name server
|
|
||||||
cannot lookup the same names that its v4-only counterpart can.
|
|
||||||
|
|
||||||
There are two available methods of addressing this problem:
|
|
||||||
|
|
||||||
a) ignore it, i.e. don't solve the problem, but put the effort into
|
|
||||||
helping deployment along so that the problem will shrink over
|
|
||||||
time.
|
|
||||||
|
|
||||||
b) provide some sort of "transport bridging", i.e. create a
|
|
||||||
fallback mechanism that enables a name server with only one type
|
|
||||||
of transport to reach a name server only available over the
|
|
||||||
other transport via some sort of proxy service. See for instance
|
|
||||||
[DNS-opreq] and [DNS-proxy] for discussions.
|
|
||||||
|
|
||||||
Regardless of how this problem is handled it is important to
|
|
||||||
realize that it only concerns the fragmented name space in
|
|
||||||
IPv6. I.e. the IPv4 name space is not (yet) fragmented, and a more
|
|
||||||
important question is possibly how to keep it unfragmented.
|
|
||||||
|
|
||||||
4. Policy based avoidance of name space fragmentation.
|
|
||||||
|
|
||||||
Today there are only a few DNS "zones" on the public Internet that
|
|
||||||
are only available over v6 transport, and they can mostly be
|
|
||||||
regarded as "experimental". However, as soon as there is a root
|
|
||||||
name server available over v6 transport it is reasonable to expect
|
|
||||||
that it will become more common with v6-only zones over time.
|
|
||||||
|
|
||||||
This would not be a good development, since this will fragment the
|
|
||||||
previously unfragmented IPv4 name space and there are strong
|
|
||||||
reasons to find a mechanism to avoid it.
|
|
||||||
|
|
||||||
4.1. Requirement of IPv4 address for at least one name server.
|
|
||||||
|
|
||||||
To ensure that all zones remain available over IPv4 transport one
|
|
||||||
method would be to require that nameservers authoritative for a
|
|
||||||
zone as part of the zone validation process ensure that there are
|
|
||||||
IPv4 address records available for the name servers of any child
|
|
||||||
delegations within the zone).
|
|
||||||
|
|
||||||
I.e. the future policy would be:
|
|
||||||
|
|
||||||
"Every delegation point should have at least one name server
|
|
||||||
for the child zone reachable over IPv4 transport".
|
|
||||||
|
|
||||||
To ensure this the authoritative server will have to lookup the
|
|
||||||
address records of the name servers that are part of any
|
|
||||||
"delegation" points in the zone.
|
|
||||||
|
|
||||||
I.e. for given the domain EXAMPLE.COM with the following data
|
|
||||||
|
|
||||||
$ORIGIN example.com.
|
|
||||||
child.example.com. IN NS ns.example.com.
|
|
||||||
child.example.com. IN NS dns.autonomica.se.
|
|
||||||
ns.example.com. IN A 1.2.3.4
|
|
||||||
|
|
||||||
the delegation of CHILD.EXAMPLE.COM is to the two name servers
|
|
||||||
"ns.example.com" and "dns.autonomica.se". The first name server,
|
|
||||||
"ns.example.com", obviously has an IPv4 address (as shown by the
|
|
||||||
"glue" record on the last line).
|
|
||||||
|
|
||||||
However, "ns.example.com" may have additional addresses assiciated
|
|
||||||
with it. Also there is no way for the server loading the zone to
|
|
||||||
know the address(es) of "dns.autonomica.se". Therefore, to find out
|
|
||||||
all the publicly available addresses they have to be queried for.
|
|
||||||
|
|
||||||
4.2. Zone validation for non-recursive servers.
|
|
||||||
|
|
||||||
Non-recursive authoritative servers are name servers that run
|
|
||||||
without ever asking questions. A change in the zone validation
|
|
||||||
requirements that force them to query for the addresses of name
|
|
||||||
servers that are part of delegations in the zone change this, since
|
|
||||||
they now have to query for these addresses.
|
|
||||||
|
|
||||||
However, the main reason that it is important to be able to run
|
|
||||||
without asking questions is to avoid "caching" possibly bogus
|
|
||||||
answers. This need can be managed by requiring that a non recursive
|
|
||||||
name server throw away the looked up address information after
|
|
||||||
having used it for validation of the delegations in the zone.
|
|
||||||
|
|
||||||
4.3. Future requirement of IPv6 address for at least one name server.
|
|
||||||
|
|
||||||
The immediate need for clarified policies for delegation is to
|
|
||||||
ensure that IPv4 name space does not start to fragment. Over time,
|
|
||||||
however, it is reasonable to expect that it may become important to
|
|
||||||
add a similar requirement to IPv6 name space.
|
|
||||||
|
|
||||||
I.e. an even more refined policy possible at some point in the
|
|
||||||
future would be:
|
|
||||||
|
|
||||||
"Every delegation point should have at least one name server
|
|
||||||
for the child zone reachable over IPv4 transport (i.e. should
|
|
||||||
have an A record) and at least one name server reachable over
|
|
||||||
IPv6 transport (i.e. should have an AAAA record)".
|
|
||||||
|
|
||||||
4.4. Implementation issues for new zone validation requirements.
|
|
||||||
|
|
||||||
Exactly what action should be taken when a zone does not validate
|
|
||||||
is not immediately clear. Immediate alternatives include:
|
|
||||||
|
|
||||||
a) fail the entire zone
|
|
||||||
|
|
||||||
b) load the zone but remove the delegation that failed validation
|
|
||||||
|
|
||||||
c) load the entire zone but issue a warning message about the
|
|
||||||
delegation that failed validation.
|
|
||||||
|
|
||||||
A likely implementation will make it configurable what action to
|
|
||||||
take.
|
|
||||||
|
|
||||||
5. Overview of suggested transition method.
|
|
||||||
|
|
||||||
By following the steps outlined below it will be possible to
|
|
||||||
transition without outages or lack of service. The assumption is
|
|
||||||
that the site has only v4 name servers or possibly v4 name servers
|
|
||||||
plus v6 name server in a forwarding configuration. All DNS data is
|
|
||||||
on the v4 name servers.
|
|
||||||
|
|
||||||
1) Do not change the method of resolution on any name server.
|
|
||||||
I.e. v4 servers go to the root and follow referrals while v6
|
|
||||||
servers go to their translator/forwarder which lookup the name
|
|
||||||
and return the end result.
|
|
||||||
|
|
||||||
2) Start mirroring DNS data into v6 by providing v6 name servers
|
|
||||||
serving the zones. Add v6 address information to to the zones
|
|
||||||
and as glue at the parent zone. Note that it is important that
|
|
||||||
the zone should have the same contents regardless of whether it
|
|
||||||
is the v4 version or the v6 version. Anything else will lead to
|
|
||||||
confusion.
|
|
||||||
|
|
||||||
4) Wait for the announcement of the DNS root zone being available
|
|
||||||
from a v6 name server.
|
|
||||||
|
|
||||||
5) Ensure that the entire path from the root down to the domain in
|
|
||||||
question is reachable over both IPv4 and IPv6 transport.
|
|
||||||
|
|
||||||
When this is accomplished it it possible to begin a migration of
|
|
||||||
the lookup of selected services to be available over IPv6
|
|
||||||
(i.e. typically by adding a AAAA record for a server of some sort).
|
|
||||||
|
|
||||||
6. How to deploy DNS hierarchy in v6 space.
|
|
||||||
|
|
||||||
The main problem with changing the DNS data so that it will become
|
|
||||||
available over both IPv6 and IPv4 transport is one of scale. There
|
|
||||||
are too many name servers and too many DNS zones for any kind of
|
|
||||||
forced migration to be aven remotely possible.
|
|
||||||
|
|
||||||
The way of achieving deployment is by providing domain owner with
|
|
||||||
|
|
||||||
a) a reason to deploy
|
|
||||||
|
|
||||||
b) a method to deploy
|
|
||||||
|
|
||||||
c) a way of verififying the correctness of the resulting configuration
|
|
||||||
|
|
||||||
6.1. A reason to deploy.
|
|
||||||
|
|
||||||
It is important to the migration process that zones migrate to
|
|
||||||
become available over v6 transport (as well as v4 transport). But
|
|
||||||
it is difficult to actually require such deployment too early in
|
|
||||||
the migration process.
|
|
||||||
|
|
||||||
Over time, however, it will become more reasonable to add such a
|
|
||||||
requirement. One likely method to do this will be by updating the
|
|
||||||
requirements for proper zone validation as was outlined above.
|
|
||||||
|
|
||||||
6.2. How to deploy DNS data.
|
|
||||||
|
|
||||||
Assuming the owner of the DNS domain has access to both IPv4 and
|
|
||||||
IPv6 address space that is globally routed. The steps to take are
|
|
||||||
then
|
|
||||||
|
|
||||||
a) identify all name servers that will serve the DNS domain, with
|
|
||||||
their IPv4 and/or IPv6 addresses
|
|
||||||
|
|
||||||
b) arrange for a suitable method of zone synchronization
|
|
||||||
|
|
||||||
c) announce the new set of servers to the parent zone, including
|
|
||||||
possible new IPv6 glue
|
|
||||||
|
|
||||||
It is recommended that the name servers run on single stack
|
|
||||||
machines, i.e. machines that are only able to utilize either IPv4
|
|
||||||
transport or IPv6 transport, but not both.
|
|
||||||
|
|
||||||
A common recommendation (mostly orthogonal to IPv6 transition
|
|
||||||
issues) is that authoritative name servers only serve data,
|
|
||||||
i.e. they do not act as caching resolvers. That way, since they
|
|
||||||
operate in non-recursive mode, they will not have any cache, and
|
|
||||||
hence will not be able to give out wrongful answers based upon
|
|
||||||
errors in the cache.
|
|
||||||
|
|
||||||
Since the announced name servers are single stack, the primary
|
|
||||||
master from which they fetch zone data will typically have to be
|
|
||||||
dual stack or otherwise some other method of data transfer has to
|
|
||||||
be arranged.
|
|
||||||
|
|
||||||
7. Security Considerations
|
|
||||||
|
|
||||||
Much of the security of the Internet relies, often wrongly, but
|
|
||||||
still, on the DNS. Thus, changes to the characteristics of the DNS
|
|
||||||
may impact the security of Internet based services.
|
|
||||||
|
|
||||||
Although it will be avoided, there may be unintended consequences
|
|
||||||
as a result of operational deployment of RR types and protocols
|
|
||||||
already approved by the IETF. When or if such consequences are
|
|
||||||
identified, appropriate feedback will be provided to the IETF and
|
|
||||||
the operational community on the efficacy of said interactions.
|
|
||||||
|
|
||||||
8. Summary.
|
|
||||||
|
|
||||||
The name space fragmentation problem is identified and examined at
|
|
||||||
some length.
|
|
||||||
|
|
||||||
A solution based upon a change in the validation method of
|
|
||||||
delegation points is suggested. This will both help keep the v4
|
|
||||||
name space unfragmented and may also help speed up deployment of
|
|
||||||
DNS hierarchy in v6 space.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
9. References
|
|
||||||
|
|
||||||
[RFC1034] Domain names - concepts and facilities.
|
|
||||||
P.V. Mockapetris.
|
|
||||||
|
|
||||||
[RFC1035] Domain names - implementation and specification.
|
|
||||||
P.V. Mockapetris.
|
|
||||||
|
|
||||||
[RFC2826] IAB Technical Comment on th Unique DNS Root
|
|
||||||
|
|
||||||
[DNS-proxy] draft-durand-dns-proxy-00.txt
|
|
||||||
Alain Durand
|
|
||||||
|
|
||||||
[DNS-opreq] draft-ietf-ngtrans-dns-ops-req-02.txt
|
|
||||||
Alain Durand
|
|
||||||
|
|
||||||
|
|
||||||
A. Authors' Address
|
|
||||||
|
|
||||||
Johan Ihren
|
|
||||||
Autonomica
|
|
||||||
Bellmansgatan 30
|
|
||||||
SE-118 47 Stockholm, Sweden
|
|
||||||
johani@autonomica.se
|
|
348
doc/draft/draft-ietf-dnsop-v6-name-space-fragmentation-01.txt
Normal file
348
doc/draft/draft-ietf-dnsop-v6-name-space-fragmentation-01.txt
Normal file
@@ -0,0 +1,348 @@
|
|||||||
|
|
||||||
|
Internet Draft Johan Ihren
|
||||||
|
draft-ietf-dnsop-v6-name-space-fragmentation-01.txt Autonomica AB
|
||||||
|
March 2002
|
||||||
|
Expires in six months
|
||||||
|
|
||||||
|
|
||||||
|
IPv4-to-IPv6 migration and DNS namespace fragmentation
|
||||||
|
|
||||||
|
|
||||||
|
Status of this Memo
|
||||||
|
|
||||||
|
This memo provides information to the Internet community. It does
|
||||||
|
no specify an Internet standard of any kind. This memo is still not
|
||||||
|
in full conformance with all provisions of Section 10 of RFC2026.
|
||||||
|
|
||||||
|
The list of current Internet-Drafts can be accessed at
|
||||||
|
http://www.ietf.org/ietf/1id-abstracts.txt The list of
|
||||||
|
Internet-Draft Shadow Directories can be accessed at
|
||||||
|
http://www.ietf.org/shadow.html.
|
||||||
|
|
||||||
|
Abstract
|
||||||
|
|
||||||
|
This memo documents some problems forseen in transitioning from a
|
||||||
|
IPv4-only DNS hierarchy via a long period of mixture to an
|
||||||
|
IPv6-mostly situation sometime in the future. The mixture period is
|
||||||
|
expected to be very long, and hence design choices should very much
|
||||||
|
take this into account, rather than just regard the transition as a
|
||||||
|
relatively short period of pain.
|
||||||
|
|
||||||
|
The main problem with transition that this paper focus on is what
|
||||||
|
to do about the namespace fragmentation that may result from
|
||||||
|
certain DNS data only being available over one type of transport
|
||||||
|
(i.e. v4 or v6) which is thereby likely unavailable to hosts that
|
||||||
|
can cannot utilize that transport.
|
||||||
|
|
||||||
|
Two orthogonal issues are identified and discussed: deployment and
|
||||||
|
use. The former while technically simple holds certain dangers that
|
||||||
|
should be avoided. The "use" (as in performing DNS lookups) is much
|
||||||
|
more complicated, and a suggested roadmap for this is presented.
|
||||||
|
|
||||||
|
1. Terminology
|
||||||
|
|
||||||
|
The key words "MUST", "SHALL", "REQUIRED", "SHOULD",
|
||||||
|
"RECOMMENDED", and "MAY", when used un uppercase, in this document
|
||||||
|
are to be interpreted as described in RFC 2119 [RFC2119].
|
||||||
|
|
||||||
|
The phrase "v4 name server" indicates a name server available over
|
||||||
|
IPv4 transport. It does not imply anything about what DNS data is
|
||||||
|
served. Likewise, "v6 name server" indicates a name server
|
||||||
|
available over IPv6 transport. In general this document only
|
||||||
|
discuss transport issues and does not care exactly what is
|
||||||
|
transported.
|
||||||
|
|
||||||
|
|
||||||
|
2. Introduction to the problem of namespace fragmentation
|
||||||
|
|
||||||
|
With all DNS data only available over IPv4 transport everything is
|
||||||
|
simple. IPv4 resolvers can use the intended mechanism of following
|
||||||
|
referrals from the root and down while IPv6 resolvers have to work
|
||||||
|
through a "translator", i.e. they have to use a second name server
|
||||||
|
on a so-called "dual stack" host as a "forwarder" since they cannot
|
||||||
|
access the DNS data directly. This is not a scalable solution.
|
||||||
|
|
||||||
|
With all DNS data only available over IPv6 transport everything
|
||||||
|
would be equally simple, with the exception of old legacy IPv4 name
|
||||||
|
servers having to switch to a forwarding configuration.
|
||||||
|
|
||||||
|
However, the second situation will not arise in a foreseeable
|
||||||
|
time. Instead, it is expected that the transition will be from IPv4
|
||||||
|
only to a mixture of IPv4 and IPv6, with DNS data of theoretically
|
||||||
|
three types of availability, depending on whether it is available
|
||||||
|
only over IPv4 transport, only over IPv6 or both.
|
||||||
|
|
||||||
|
The latter is the best situation, and a major question is how to
|
||||||
|
ensure that it as quickly as possible becomes the norm. However,
|
||||||
|
while it is obvious that some DNS data will only be available over
|
||||||
|
v4 transport for a long time it is also obvious that it is
|
||||||
|
important to avoid fragmenting the namespace available to IPv4
|
||||||
|
only hosts. I.e. during transition it is not acceptable to break
|
||||||
|
the namespace that we presently have available for IPv4-only hosts.
|
||||||
|
|
||||||
|
2.1. Namespace fragmentation vs. unreachability.
|
||||||
|
|
||||||
|
Something that is presently not clear is whether it is actually
|
||||||
|
necessary to provide access to the "Internet namespace" as defined
|
||||||
|
by what is visble on the public v4 Internet also on v6 transport.
|
||||||
|
|
||||||
|
The reason for the unclarity is that if one regards "the Internet"
|
||||||
|
as the largest set of nodes that have a mutual 1-1 reachability for
|
||||||
|
any pair of nodes over IP and adjust the "Internet namespace" to
|
||||||
|
fit this set, then there is by definition no need to bridge or do
|
||||||
|
any special tricks (since they can all reach each other anyhow).
|
||||||
|
|
||||||
|
On the other hand, if we regard "the Internet" as the set of nodes
|
||||||
|
that share a namespace that we can refer to as "the Internet
|
||||||
|
namespace" regardless of whether they can all reach each other or
|
||||||
|
not, then we have to ensure that this namespace is accessible to
|
||||||
|
every node, regardless of its available transport.
|
||||||
|
|
||||||
|
It is out of scope for this document to make a choice between the
|
||||||
|
two alternatives, and therefore the rest of this document has to
|
||||||
|
work from the assumption that the same namespace should, if
|
||||||
|
possible, be made available to all nodes that claim to be part of
|
||||||
|
the Internet.
|
||||||
|
|
||||||
|
3. Consequences of deploying a "IPv6 root name server"
|
||||||
|
|
||||||
|
If and when a root name server that is accessible over IPv6
|
||||||
|
transport is deployed it will immediately for the first time become
|
||||||
|
possible to change IPv6-only name servers to a "native
|
||||||
|
configuration", i.e. to a configuration where they follow referrals
|
||||||
|
directly from the root (which is now accessible to them because of
|
||||||
|
the v6 transport).
|
||||||
|
|
||||||
|
However, initially they will typically quite soon get a referral to
|
||||||
|
a name server only available over IPv4 transport, and this will be
|
||||||
|
impossible to follow, since there is no common transport available.
|
||||||
|
Therefore the name it is trying to lookup will not get resolved and
|
||||||
|
the result is that the v6-only name server cannot lookup the same
|
||||||
|
set of domain names that its v4-only counterpart can.
|
||||||
|
|
||||||
|
This is fragmentation of the namespace.
|
||||||
|
|
||||||
|
Regardless of how this problem is handled it is important to
|
||||||
|
realize that at first it will only concern the namespace as viewed
|
||||||
|
from an IPv6-host. I.e. the IPv4 namespace will not (initially) be
|
||||||
|
fragmented, and an important question is possibly how to keep it
|
||||||
|
unfragmented.
|
||||||
|
|
||||||
|
4. A taxonomy of alternatives to avoid fragmentation.
|
||||||
|
|
||||||
|
4.1. Ignore the problem.
|
||||||
|
|
||||||
|
It is possible to ignore the fragmentation issue. Whether that is
|
||||||
|
an acceptable choice or not has to be very carefully considered. Is
|
||||||
|
it reasonable to allow v4 only hosts to over time lose access to
|
||||||
|
parts of the Internet namespace just because they are not
|
||||||
|
"IPv6-aware"?
|
||||||
|
|
||||||
|
4.2. DNS transport bridging.
|
||||||
|
|
||||||
|
By providing some sort of "DNS transport bridging", i.e. create a
|
||||||
|
fallback mechanism that enables a name server with only one type of
|
||||||
|
transport to reach a name server only available over the other
|
||||||
|
transport via some sort of proxy service it would be possible to
|
||||||
|
unify the DNS zones available on each transport into a common
|
||||||
|
namespace.
|
||||||
|
|
||||||
|
The general consensus is that it is not possible to design such a
|
||||||
|
bridging solution that works in both directions. However, it may be
|
||||||
|
possible to design one that allows v6 clients to query v4 servers.
|
||||||
|
See for instance [DNS-opreq] and [DNS-proxy] for more detailed
|
||||||
|
discussions.
|
||||||
|
|
||||||
|
4.3. Policy based avoidance of fragmentation.
|
||||||
|
|
||||||
|
Today there are only a limited number of DNS zones on the public
|
||||||
|
Internet that are only available over v6 transport, and they can
|
||||||
|
mostly be regarded as "experimental". However, as soon as there is
|
||||||
|
a root name server available over v6 transport it is reasonable to
|
||||||
|
expect that it will become more common with v6-only zones over
|
||||||
|
time.
|
||||||
|
|
||||||
|
Such a development would erode the Internet namespace as viewed
|
||||||
|
from an v4-only client. There are obviously strong reasons to find
|
||||||
|
a mechanism to avoid this happening.
|
||||||
|
|
||||||
|
4.3.1. Requirement of zone reachability over IPv4 transport.
|
||||||
|
|
||||||
|
To ensure that all zones remain available over IPv4 transport one
|
||||||
|
method would be to require that nameservers authoritative for a
|
||||||
|
zone as part of the zone validation process ensure that there are
|
||||||
|
IPv4 address records available for the name servers of any child
|
||||||
|
delegations within the zone).
|
||||||
|
|
||||||
|
I.e. the future policy could be:
|
||||||
|
|
||||||
|
"Every delegation point delegated to nameservers available
|
||||||
|
over v6 transport should have the same availability
|
||||||
|
requirements for servers over both v4 and v6 transport as v4
|
||||||
|
only zones have over v4 transport.
|
||||||
|
|
||||||
|
I.e. if the parent requires "multiple nameservers" for a child,
|
||||||
|
then the requirement becomes "multiple nameservers available over
|
||||||
|
v4 transport plus multiple nameservers available over v6 transport"
|
||||||
|
|
||||||
|
I.e. for given the domain EXAMPLE.COM with the following data
|
||||||
|
|
||||||
|
$ORIGIN example.com.
|
||||||
|
child.example.com. IN NS ns.example.com.
|
||||||
|
child.example.com. IN NS dns.autonomica.se.
|
||||||
|
ns.example.com. IN A 1.2.3.4
|
||||||
|
|
||||||
|
the delegation of CHILD.EXAMPLE.COM is to the two name servers
|
||||||
|
"ns.example.com" and "dns.autonomica.se". The first name server,
|
||||||
|
"ns.example.com", obviously has an IPv4 address (as shown by the
|
||||||
|
"glue" record on the last line).
|
||||||
|
|
||||||
|
However, "ns.example.com" may have additional addresses assiciated
|
||||||
|
with it. Also there is no way for the server loading the zone to
|
||||||
|
know the address(es) of "dns.autonomica.se". Therefore, to find out
|
||||||
|
all the publicly available addresses they have to be queried for.
|
||||||
|
|
||||||
|
To ensure this the authoritative server will have to lookup the
|
||||||
|
address records of the name servers that are part of any
|
||||||
|
"delegation" points in the zone. However, this operation is very
|
||||||
|
costly for large, delegation-dense zones and therefore it is likely
|
||||||
|
that compromises a la
|
||||||
|
|
||||||
|
* only validate on the master (this is likely always good practice)
|
||||||
|
|
||||||
|
* validate as an offline process (i.e. not part of the zone loading)
|
||||||
|
|
||||||
|
* only validate at time of delegation
|
||||||
|
|
||||||
|
* never validate
|
||||||
|
|
||||||
|
Clearly, as validation is relaxed the amount of errors will
|
||||||
|
increase, so the sum of pain as usual remains mostly constant.
|
||||||
|
|
||||||
|
4.3.2. Zone validation for non-recursive servers.
|
||||||
|
|
||||||
|
Non-recursive authoritative servers are name servers that run
|
||||||
|
without ever asking questions. A change in the zone validation
|
||||||
|
requirements that force them to query for the addresses of name
|
||||||
|
servers that are part of delegations in the zone change this, since
|
||||||
|
they now have to query for these addresses.
|
||||||
|
|
||||||
|
However, the main reason that it is important to be able to run
|
||||||
|
without asking questions is to avoid "caching" possibly bogus
|
||||||
|
answers. This need can be managed by requiring that a non recursive
|
||||||
|
name server throw away the looked up address information after
|
||||||
|
having used it for validation of the delegations in the zone.
|
||||||
|
|
||||||
|
4.3.3. Future requirement of zone reachability over IPv6 transport.
|
||||||
|
|
||||||
|
The immediate need for clarified policies for delegation is to
|
||||||
|
ensure that IPv4 namespace does not start to fragment. Over time,
|
||||||
|
however, it is reasonable to expect that it may become important to
|
||||||
|
add a similar requirement to IPv6 namespace.
|
||||||
|
|
||||||
|
I.e. an even more refined policy possible at some point in the
|
||||||
|
future would be:
|
||||||
|
|
||||||
|
"Every delegation point should have at least one name server
|
||||||
|
for the child zone reachable over IPv4 transport (i.e. should
|
||||||
|
have an A record) and at least one name server reachable over
|
||||||
|
IPv6 transport (i.e. should have e.g. an AAAA record)".
|
||||||
|
|
||||||
|
4.3.4. Implementation issues for new zone validation requirements.
|
||||||
|
|
||||||
|
Exactly what action should be taken when a zone does not validate
|
||||||
|
is not immediately clear. Immediate alternatives include:
|
||||||
|
|
||||||
|
a) fail the entire parent zone (the extreme case, not suggested)
|
||||||
|
|
||||||
|
b) load the zone but remove the delegation that failed validation
|
||||||
|
(also drastic, and not suggested)
|
||||||
|
|
||||||
|
c) load the entire zone but issue a warning message about the
|
||||||
|
delegation that failed validation (more reasonable)
|
||||||
|
|
||||||
|
Implementations should make it configurable what action to take. In
|
||||||
|
the case of registries that have a business realtion to the child
|
||||||
|
zone it is also in principle possible to work on the deployment of
|
||||||
|
child zones over v6 transport by cost diffentiation for the
|
||||||
|
customer.
|
||||||
|
|
||||||
|
5. Overview of suggested transition method.
|
||||||
|
|
||||||
|
By following the steps outlined below it will be possible to
|
||||||
|
transition without outages or lack of service. The assumption is
|
||||||
|
that the site has only v4 name servers or possibly v4 name servers
|
||||||
|
plus v6 name server in a forwarding configuration. All DNS data is
|
||||||
|
on the v4 name servers.
|
||||||
|
|
||||||
|
1) Do not change the method of resolution on any (recursive) name
|
||||||
|
server. I.e. v4 servers go to the root and follow referrals
|
||||||
|
while v6 servers go to their translator/forwarder which lookup
|
||||||
|
the name and return the end result.
|
||||||
|
|
||||||
|
2) Start serving authoritative DNS data on v6 transport by
|
||||||
|
providing name servers with v6 transport serving the zones. Add
|
||||||
|
v6 address information to to the zones and as glue at the parent
|
||||||
|
zone. Note that it is of crucial importance that the zone should
|
||||||
|
have the same contents regardless of whether it is the v4
|
||||||
|
version or the v6 version. Anything else will lead to confusion.
|
||||||
|
|
||||||
|
4) Wait for the announcement of the DNS root zone being available
|
||||||
|
from a v6 name server.
|
||||||
|
|
||||||
|
5) Ensure that the entire path from the root down to the domain in
|
||||||
|
question is reachable over both IPv4 and IPv6 transport.
|
||||||
|
|
||||||
|
When this is accomplished it it possible to begin a migration of
|
||||||
|
the lookup of selected services to be available over IPv6
|
||||||
|
(i.e. typically by adding a IPv6 address record, eg. AAAA record,
|
||||||
|
for a server of some sort).
|
||||||
|
|
||||||
|
6. Security Considerations
|
||||||
|
|
||||||
|
Much of the security of the Internet relies, often wrongly, but
|
||||||
|
still, on the DNS. Thus, changes to the characteristics of the DNS
|
||||||
|
may impact the security of Internet based services.
|
||||||
|
|
||||||
|
Although it will be avoided, there may be unintended consequences
|
||||||
|
as a result of operational deployment of RR types and protocols
|
||||||
|
already approved by the IETF. When or if such consequences are
|
||||||
|
identified, appropriate feedback will be provided to the IETF and
|
||||||
|
the operational community on the efficacy of said interactions.
|
||||||
|
|
||||||
|
7. Summary.
|
||||||
|
|
||||||
|
The namespace fragmentation problem is identified and examined at
|
||||||
|
some length.
|
||||||
|
|
||||||
|
A solution based upon a change in the validation method of
|
||||||
|
delegation points is suggested. This will both help keep the v4
|
||||||
|
namespace unfragmented and may also help speed up deployment of
|
||||||
|
DNS hierarchy in v6 space.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
9. References
|
||||||
|
|
||||||
|
[RFC1034] Domain names - concepts and facilities.
|
||||||
|
P.V. Mockapetris.
|
||||||
|
|
||||||
|
[RFC1035] Domain names - implementation and specification.
|
||||||
|
P.V. Mockapetris.
|
||||||
|
|
||||||
|
[RFC2826] IAB Technical Comment on th Unique DNS Root
|
||||||
|
|
||||||
|
[DNS-proxy] draft-durand-dns-proxy-00.txt
|
||||||
|
Alain Durand
|
||||||
|
|
||||||
|
[DNS-opreq] draft-ietf-ngtrans-dns-ops-req-02.txt
|
||||||
|
Alain Durand
|
||||||
|
|
||||||
|
|
||||||
|
A. Authors' Address
|
||||||
|
|
||||||
|
Johan Ihren
|
||||||
|
Autonomica
|
||||||
|
Bellmansgatan 30
|
||||||
|
SE-118 47 Stockholm, Sweden
|
||||||
|
johani@autonomica.se
|
File diff suppressed because it is too large
Load Diff
@@ -1,11 +1,11 @@
|
|||||||
Network Working Group J. Schlyter
|
Network Working Group J. Schlyter
|
||||||
Internet-Draft Carlstedt Research &
|
Internet-Draft Carlstedt Research &
|
||||||
Expires: May 11, 2002 Technology
|
Expires: August 7, 2002 Technology
|
||||||
November 10, 2001
|
February 6, 2002
|
||||||
|
|
||||||
|
|
||||||
Storing application public keys in the DNS
|
Storing application public keys in the DNS
|
||||||
draft-schlyter-appkey-01.txt
|
draft-schlyter-appkey-02.txt
|
||||||
|
|
||||||
Status of this Memo
|
Status of this Memo
|
||||||
|
|
||||||
@@ -22,17 +22,17 @@ Status of this Memo
|
|||||||
time. It is inappropriate to use Internet-Drafts as reference
|
time. It is inappropriate to use Internet-Drafts as reference
|
||||||
material or to cite them other than as "work in progress."
|
material or to cite them other than as "work in progress."
|
||||||
|
|
||||||
The list of current Internet-Drafts can be accessed at
|
The list of current Internet-Drafts can be accessed at http://
|
||||||
http://www.ietf.org/ietf/1id-abstracts.txt.
|
www.ietf.org/ietf/1id-abstracts.txt.
|
||||||
|
|
||||||
The list of Internet-Draft Shadow Directories can be accessed at
|
The list of Internet-Draft Shadow Directories can be accessed at
|
||||||
http://www.ietf.org/shadow.html.
|
http://www.ietf.org/shadow.html.
|
||||||
|
|
||||||
This Internet-Draft will expire on May 11, 2002.
|
This Internet-Draft will expire on August 7, 2002.
|
||||||
|
|
||||||
Copyright Notice
|
Copyright Notice
|
||||||
|
|
||||||
Copyright (C) The Internet Society (2001). All Rights Reserved.
|
Copyright (C) The Internet Society (2002). All Rights Reserved.
|
||||||
|
|
||||||
Abstract
|
Abstract
|
||||||
|
|
||||||
@@ -50,28 +50,29 @@ Abstract
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Schlyter Expires May 11, 2002 [Page 1]
|
Schlyter Expires August 7, 2002 [Page 1]
|
||||||
|
|
||||||
Internet-Draft Application public keys in DNS November 2001
|
Internet-Draft Application public keys in DNS February 2002
|
||||||
|
|
||||||
|
|
||||||
Table of Contents
|
Table of Contents
|
||||||
|
|
||||||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
|
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
|
||||||
2. The APPKEY resource record . . . . . . . . . . . . . . . . . 3
|
2. Comments on the KEY RR . . . . . . . . . . . . . . . . . . . . 3
|
||||||
2.1 The APPKEY RDATA format . . . . . . . . . . . . . . . . . . 4
|
2.1 The flag field . . . . . . . . . . . . . . . . . . . . . . . . 3
|
||||||
2.1.1 The protocol field . . . . . . . . . . . . . . . . . . . . . 4
|
2.2 The protocol field . . . . . . . . . . . . . . . . . . . . . . 3
|
||||||
2.1.2 Version number octet . . . . . . . . . . . . . . . . . . . . 4
|
3. The APPKEY resource record . . . . . . . . . . . . . . . . . . 3
|
||||||
2.1.3 Algorithm number specification . . . . . . . . . . . . . . . 5
|
3.1 The APPKEY RDATA format . . . . . . . . . . . . . . . . . . . 4
|
||||||
2.2 Text representation of APPKEY RRs . . . . . . . . . . . . . 5
|
3.2 Algorithm number specification . . . . . . . . . . . . . . . . 4
|
||||||
2.3 Owner names for APPKEY RRs . . . . . . . . . . . . . . . . . 5
|
3.3 Text representation of APPKEY RRs . . . . . . . . . . . . . . 4
|
||||||
3. Applicability Statement . . . . . . . . . . . . . . . . . . 5
|
3.4 Owner names for APPKEY RRs . . . . . . . . . . . . . . . . . . 4
|
||||||
4. Security considerations . . . . . . . . . . . . . . . . . . 5
|
4. Applicability Statement . . . . . . . . . . . . . . . . . . . 5
|
||||||
5. IANA considerations . . . . . . . . . . . . . . . . . . . . 5
|
5. Security considerations . . . . . . . . . . . . . . . . . . . 5
|
||||||
References . . . . . . . . . . . . . . . . . . . . . . . . . 6
|
6. IANA considerations . . . . . . . . . . . . . . . . . . . . . 5
|
||||||
Author's Address . . . . . . . . . . . . . . . . . . . . . . 7
|
References . . . . . . . . . . . . . . . . . . . . . . . . . . 5
|
||||||
A. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 7
|
Author's Address . . . . . . . . . . . . . . . . . . . . . . . 6
|
||||||
Full Copyright Statement . . . . . . . . . . . . . . . . . . 8
|
A. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 6
|
||||||
|
Full Copyright Statement . . . . . . . . . . . . . . . . . . . 7
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -105,28 +106,29 @@ Table of Contents
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Schlyter Expires August 7, 2002 [Page 2]
|
||||||
|
|
||||||
Schlyter Expires May 11, 2002 [Page 2]
|
Internet-Draft Application public keys in DNS February 2002
|
||||||
|
|
||||||
Internet-Draft Application public keys in DNS November 2001
|
|
||||||
|
|
||||||
|
|
||||||
1. Introduction
|
1. Introduction
|
||||||
|
|
||||||
The Domain Name System Security Extensions (DNSSEC) as described in
|
The Domain Name System Security Extensions (DNSSEC) as described in
|
||||||
RFC 2535 [4] specifies the KEY resource record (RR). The KEY RR is
|
RFC 2535 [3] specifies the KEY resource record (RR). The KEY RR is
|
||||||
specified for use both for storing keys used by the DNSSEC
|
specified for use both for storing keys used by the DNSSEC
|
||||||
infrastructure itself and for storing keys used by non-DNSSEC
|
infrastructure itself and for storing keys used by non-DNSSEC
|
||||||
infrastructure applications (e.g. TLS [2], email and IPsec). The
|
infrastructure applications (e.g. TLS [2], email and IPsec). The
|
||||||
issues with combining these two uses in one RR are further discussed
|
issues with combining these two uses in one RR are further discussed
|
||||||
in draft-ietf-dnsext-restrict-key-for-dnssec-00 [11].
|
in a draft called "Limiting the Scope of the KEY Resource Record"
|
||||||
|
[10].
|
||||||
|
|
||||||
The protocol field in the KEY RR is only 8-bit and thus limited to
|
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||||||
256 different protocols. As there is no way of separating different
|
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
||||||
version of a specific protocol, incompatible versions of a single
|
document are to be interpreted as described in RFC 2119 [1].
|
||||||
protocol requires multiple protocol values. A larger protocol field
|
|
||||||
together with the possibility to specify a version of the protocol
|
2. Comments on the KEY RR
|
||||||
could solve this issue.
|
|
||||||
|
2.1 The flag field
|
||||||
|
|
||||||
The KEY RR includes a flag field that specifies key usage, what kind
|
The KEY RR includes a flag field that specifies key usage, what kind
|
||||||
of entity the key is associated with and various other flags. As
|
of entity the key is associated with and various other flags. As
|
||||||
@@ -135,108 +137,73 @@ Internet-Draft Application public keys in DNS November 2001
|
|||||||
application might need is hard to do, the usability of this field is
|
application might need is hard to do, the usability of this field is
|
||||||
questionable.
|
questionable.
|
||||||
|
|
||||||
|
2.2 The protocol field
|
||||||
|
|
||||||
|
The protocol field in the KEY RR is only 8-bit and thus limited to
|
||||||
|
256 different protocols. As there is no way of separating different
|
||||||
|
version of a specific protocol, incompatible versions of a single
|
||||||
|
protocol requires multiple protocol values. A larger protocol field
|
||||||
|
together with the possibility to specify a version of the protocol
|
||||||
|
could solve this issue.
|
||||||
|
|
||||||
A problem with multiple applications storing their public keys at a
|
A problem with multiple applications storing their public keys at a
|
||||||
single owner name and thus creating a very large RR set has been
|
single owner name and thus creating a very large RR set has been
|
||||||
identified. A possible solution for this could be to use a generic
|
identified. A possible solution for this could be to use a generic
|
||||||
protocol value [10] indicating that the actual protocol used is
|
protocol value [9] indicating that the actual protocol used is
|
||||||
indicated in the owner name using a SRV-like encoding. Although this
|
indicated in the owner name using a SRV-like encoding. Although this
|
||||||
would indeed solve the problem with large RR sets when querying for
|
would indeed solve the problem with large RR sets when querying for
|
||||||
an application key, it could also make the protocol field lose its
|
an application key, it could also make the protocol field lose its
|
||||||
value in practice as new applications would not require a new
|
value in practice as new applications would not require a new
|
||||||
protocol value. The author believes that combining unique protocol
|
protocol value.
|
||||||
values with SRV-like encode of protocol would be a better solution,
|
|
||||||
solving both the issue with large RR sets and a large number of
|
|
||||||
possible applications.
|
|
||||||
|
|
||||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
3. The APPKEY resource record
|
||||||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
|
||||||
document are to be interpreted as described in RFC 2119 [1].
|
|
||||||
|
|
||||||
2. The APPKEY resource record
|
|
||||||
|
|
||||||
The APPKEY resource record (RR) is used to store a application public
|
The APPKEY resource record (RR) is used to store a application public
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Schlyter Expires August 7, 2002 [Page 3]
|
||||||
|
|
||||||
|
Internet-Draft Application public keys in DNS February 2002
|
||||||
|
|
||||||
|
|
||||||
key that is associated with a Domain Name System (DNS) name.
|
key that is associated with a Domain Name System (DNS) name.
|
||||||
|
|
||||||
The RR type code for the APPKEY RR is TBA.
|
The RR type code for the APPKEY RR is TBA.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Schlyter Expires May 11, 2002 [Page 3]
|
|
||||||
|
|
||||||
Internet-Draft Application public keys in DNS November 2001
|
|
||||||
|
|
||||||
|
|
||||||
An APPKEY RR is, like any other RR, authenticated by a SIG RR.
|
An APPKEY RR is, like any other RR, authenticated by a SIG RR.
|
||||||
|
|
||||||
2.1 The APPKEY RDATA format
|
3.1 The APPKEY RDATA format
|
||||||
|
|
||||||
The RDATA for an APPKEY RR consists of a protocol field, a version
|
The RDATA for an APPKEY RR consists of an algorithm number octet and
|
||||||
number octet, the algorithm number octet and the public key itself.
|
the public key itself. The format is as follows:
|
||||||
The format is as follows:
|
|
||||||
|
|
||||||
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
|
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
|
||||||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
||||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
||||||
| protocol | version | algorithm |
|
| algorithm | /
|
||||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
+---------------+ public key /
|
||||||
| /
|
|
||||||
/ public key /
|
|
||||||
/ /
|
/ /
|
||||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|
|
||||||
|
|
||||||
The meaning of the APPKEY RR owner name, protocol field, version
|
The meaning of the APPKEY RR owner name and algorithm number octet
|
||||||
number octet and algorithm number octet are described in the sections
|
are described in the sections below. The format of the public key is
|
||||||
below. The format of the public key is algorithm dependent.
|
algorithm dependent.
|
||||||
|
|
||||||
APPKEY RRs do not specify their validity period but their
|
APPKEY RRs do not specify their validity period but their
|
||||||
authenticating SIG RR(s) do as described in RFC 2535 [4].
|
authenticating SIG RR(s) do as described in RFC 2535 [3].
|
||||||
|
|
||||||
2.1.1 The protocol field
|
3.2 Algorithm number specification
|
||||||
|
|
||||||
The protocol field specifies what protocol the public key is to be
|
|
||||||
used for. The following values of the protocol field are available:
|
|
||||||
|
|
||||||
Value Protocol
|
|
||||||
----- --------
|
|
||||||
0x0000 reserved
|
|
||||||
0x0001 - 0xFEFF available for assignment by IANA
|
|
||||||
0xFF00 - 0xFFFE experimental uses
|
|
||||||
0xFFFF any protocol
|
|
||||||
|
|
||||||
0xFFFF indicates that the key can be used in connection with any
|
|
||||||
protocol. Use of this value is discouraged and the use of unique
|
|
||||||
protocol values for different protocols is encouraged.
|
|
||||||
|
|
||||||
2.1.2 Version number octet
|
|
||||||
|
|
||||||
The version number octet is defined by the protocol specified in the
|
|
||||||
protocol field. It is up to the application implementing the
|
|
||||||
specified protocol to interpret the value of this octet.
|
|
||||||
|
|
||||||
Any document specifying how a protocol uses APPKEY MUST specify how
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Schlyter Expires May 11, 2002 [Page 4]
|
|
||||||
|
|
||||||
Internet-Draft Application public keys in DNS November 2001
|
|
||||||
|
|
||||||
|
|
||||||
to specify and interpret the version number octet.
|
|
||||||
|
|
||||||
2.1.3 Algorithm number specification
|
|
||||||
|
|
||||||
The algorithm number used is the same as defined for the KEY RR
|
The algorithm number used is the same as defined for the KEY RR
|
||||||
described in RFC 2535 [4].
|
described in RFC 2535 [3].
|
||||||
|
|
||||||
2.2 Text representation of APPKEY RRs
|
3.3 Text representation of APPKEY RRs
|
||||||
|
|
||||||
The RDATA portion of an APPKEY RR has the protocol field, version
|
The RDATA portion of an APPKEY RR has the algorithm number octet
|
||||||
number octet and algorithm number octet represented as unsigned
|
represented as unsigned integers.
|
||||||
integers.
|
|
||||||
|
|
||||||
The public key fields is represented in base 64 [9] and may be
|
The public key fields is represented in base 64 [8] and may be
|
||||||
divided up into any number of white space separated substrings, down
|
divided up into any number of white space separated substrings, down
|
||||||
to single base 64 digits, which are concatenated to obtain the full
|
to single base 64 digits, which are concatenated to obtain the full
|
||||||
public key. These substrings can span lines using the standard
|
public key. These substrings can span lines using the standard
|
||||||
@@ -244,50 +211,46 @@ Internet-Draft Application public keys in DNS November 2001
|
|||||||
have internal sub-fields, these do not appear in the master file
|
have internal sub-fields, these do not appear in the master file
|
||||||
representation.
|
representation.
|
||||||
|
|
||||||
2.3 Owner names for APPKEY RRs
|
3.4 Owner names for APPKEY RRs
|
||||||
|
|
||||||
The owner name of the APPKEY RR is defined per application. This can
|
The owner name of the APPKEY RR is defined per application and SHOULD
|
||||||
be, but is not limited to, the domain name of the host the
|
be defined in such a way that it is possible to query for a single
|
||||||
application is running at (e.g. host.example.com) or a name matching
|
|
||||||
the SRV RR [6] for the service (e.g. _ssh._tcp.host.example.com).
|
|
||||||
|
|
||||||
3. Applicability Statement
|
|
||||||
|
|
||||||
|
Schlyter Expires August 7, 2002 [Page 4]
|
||||||
|
|
||||||
|
Internet-Draft Application public keys in DNS February 2002
|
||||||
|
|
||||||
|
|
||||||
|
application APPKEY. This can be, but is not limited to, the domain
|
||||||
|
name of the host the application is running at (e.g.
|
||||||
|
host.example.com) combined with a protocol identifier. A name
|
||||||
|
matching the SRV RR [5] for the service (e.g.
|
||||||
|
_service._protocol.host.example.com) could be a good starting point
|
||||||
|
for this naming.
|
||||||
|
|
||||||
|
4. Applicability Statement
|
||||||
|
|
||||||
The APPKEY resource record (RR) are only intended for storage of
|
The APPKEY resource record (RR) are only intended for storage of
|
||||||
public keys - private keys MUST NOT be stored in an APPKEY RR.
|
public keys - private keys MUST NOT be stored in an APPKEY RR.
|
||||||
|
|
||||||
The APPKEY RR is not intended for storage of certificates and a
|
The APPKEY RR is not intended for storage of certificates and a
|
||||||
separate certificate RR, defined in RFC 2538 [5], has been developed
|
separate certificate RR, defined in RFC 2538 [4], has been developed
|
||||||
for that purpose.
|
for that purpose.
|
||||||
|
|
||||||
4. Security considerations
|
5. Security considerations
|
||||||
|
|
||||||
Public keys from an APPKEY RR, SHOULD NOT be trusted unless the
|
Public keys from an APPKEY RR, SHOULD NOT be trusted unless the
|
||||||
APPKEY was authenticated by a trusted SIG RR. Applications that do
|
APPKEY was authenticated by a trusted SIG RR. Applications that do
|
||||||
not validate the signatures by themselves are advised to use TSIG [7]
|
not validate the signatures by themselves are advised to use TSIG [6]
|
||||||
or SIG(0) [8] to protect the transport between themselves and the
|
or SIG(0) [7] to protect the transport between themselves and the
|
||||||
name server doing the signature validation.
|
name server doing the signature validation.
|
||||||
|
|
||||||
5. IANA considerations
|
6. IANA considerations
|
||||||
|
|
||||||
IANA needs to allocate a RR type code for APPKEY from the standard RR
|
IANA needs to allocate a RR type code for APPKEY from the standard RR
|
||||||
|
type space. No other IANA services are required by this document.
|
||||||
|
|
||||||
|
|
||||||
Schlyter Expires May 11, 2002 [Page 5]
|
|
||||||
|
|
||||||
Internet-Draft Application public keys in DNS November 2001
|
|
||||||
|
|
||||||
|
|
||||||
type space.
|
|
||||||
|
|
||||||
Protocol values 0x0000 and 0xFFFF are reserved.
|
|
||||||
|
|
||||||
Protocol values 0x0001 through 0xFEFF are allocated based on
|
|
||||||
"Specification Required" as defined in RFC 2434 [3].
|
|
||||||
|
|
||||||
XXX should the protocol values be divided into different ranges for
|
|
||||||
IETF Standard Action, IETF consensus and Specification Required ?
|
|
||||||
|
|
||||||
References
|
References
|
||||||
|
|
||||||
@@ -298,44 +261,40 @@ References
|
|||||||
P. Kocher, "The TLS Protocol Version 1.0", RFC 2246, January
|
P. Kocher, "The TLS Protocol Version 1.0", RFC 2246, January
|
||||||
1999.
|
1999.
|
||||||
|
|
||||||
[3] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA
|
[3] Eastlake, D., "Domain Name System Security Extensions", RFC
|
||||||
Considerations Section in RFCs", BCP 26, RFC 2434, October
|
|
||||||
1998.
|
|
||||||
|
|
||||||
[4] Eastlake, D., "Domain Name System Security Extensions", RFC
|
|
||||||
2535, March 1999.
|
2535, March 1999.
|
||||||
|
|
||||||
[5] Eastlake, D. and O. Gudmundsson, "Storing Certificates in the
|
[4] Eastlake, D. and O. Gudmundsson, "Storing Certificates in the
|
||||||
Domain Name System (DNS)", RFC 2538, March 1999.
|
Domain Name System (DNS)", RFC 2538, March 1999.
|
||||||
|
|
||||||
[6] Gulbrandsen, A., Vixie, P. and L. Esibov, "A DNS RR for
|
[5] Gulbrandsen, A., Vixie, P. and L. Esibov, "A DNS RR for
|
||||||
specifying the location of services (DNS SRV)", RFC 2782,
|
specifying the location of services (DNS SRV)", RFC 2782,
|
||||||
February 2000.
|
February 2000.
|
||||||
|
|
||||||
[7] Vixie, P., Gudmundsson, O., Eastlake, D. and B. Wellington,
|
|
||||||
|
|
||||||
|
|
||||||
|
Schlyter Expires August 7, 2002 [Page 5]
|
||||||
|
|
||||||
|
Internet-Draft Application public keys in DNS February 2002
|
||||||
|
|
||||||
|
|
||||||
|
[6] Vixie, P., Gudmundsson, O., Eastlake, D. and B. Wellington,
|
||||||
"Secret Key Transaction Authentication for DNS (TSIG)", RFC
|
"Secret Key Transaction Authentication for DNS (TSIG)", RFC
|
||||||
2845, May 2000.
|
2845, May 2000.
|
||||||
|
|
||||||
[8] Eastlake, D., "DNS Request and Transaction Signatures (
|
[7] Eastlake, D., "DNS Request and Transaction Signatures (
|
||||||
SIG(0)s)", RFC 2931, September 2000.
|
SIG(0)s)", RFC 2931, September 2000.
|
||||||
|
|
||||||
[9] Josefsson, S., "Base Encodings", work in progress draft-
|
[8] Josefsson, S., "Base Encodings", work in progress draft-
|
||||||
josefsson-base-encoding-02, May 2001.
|
josefsson-base-encoding-03, November 2001.
|
||||||
|
|
||||||
[10] Lewis, E., "DNS KEY Resource Record Generic Protocol Value",
|
[9] Lewis, E., "DNS KEY Resource Record Generic Protocol Value",
|
||||||
work in progress draft-lewis-dnsext-key-genprot-00, July 2001.
|
work in progress draft-lewis-dnsext-key-genprot-00, July 2001.
|
||||||
|
|
||||||
[11] Massey, D. and S. Rose, "Limiting the Scope of the KEY Resource
|
[10] Massey, D. and S. Rose, "Limiting the Scope of the KEY Resource
|
||||||
Record", work in progress draft-ietf-dnsext-restrict-key-for-
|
Record", work in progress draft-ietf-dnsext-restrict-key-for-
|
||||||
|
dnssec-01, January 2002.
|
||||||
|
|
||||||
|
|
||||||
Schlyter Expires May 11, 2002 [Page 6]
|
|
||||||
|
|
||||||
Internet-Draft Application public keys in DNS November 2001
|
|
||||||
|
|
||||||
|
|
||||||
dnssec-00, November 2001.
|
|
||||||
|
|
||||||
|
|
||||||
Author's Address
|
Author's Address
|
||||||
@@ -360,6 +319,7 @@ Appendix A. Acknowledgements
|
|||||||
|
|
||||||
Edward Lewis
|
Edward Lewis
|
||||||
|
|
||||||
|
Dan Massey
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -370,30 +330,14 @@ Appendix A. Acknowledgements
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Schlyter Expires August 7, 2002 [Page 6]
|
||||||
|
|
||||||
|
Internet-Draft Application public keys in DNS February 2002
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Schlyter Expires May 11, 2002 [Page 7]
|
|
||||||
|
|
||||||
Internet-Draft Application public keys in DNS November 2001
|
|
||||||
|
|
||||||
|
|
||||||
Full Copyright Statement
|
Full Copyright Statement
|
||||||
|
|
||||||
Copyright (C) The Internet Society (2001). All Rights Reserved.
|
Copyright (C) The Internet Society (2002). All Rights Reserved.
|
||||||
|
|
||||||
This document and translations of it may be copied and furnished to
|
This document and translations of it may be copied and furnished to
|
||||||
others, and derivative works that comment on or otherwise explain it
|
others, and derivative works that comment on or otherwise explain it
|
||||||
@@ -442,6 +386,6 @@ Acknowledgement
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Schlyter Expires May 11, 2002 [Page 8]
|
Schlyter Expires August 7, 2002 [Page 7]
|
||||||
|
|
||||||
|
|
@@ -1,13 +1,13 @@
|
|||||||
Network Working Group J. Schlyter
|
PKIX Working Group J. Schlyter
|
||||||
Internet-Draft Carlstedt Research &
|
Internet-Draft Carlstedt Research &
|
||||||
Expires: May 3, 2002 Technology
|
Expires: August 29, 2002 Technology
|
||||||
L. Johansson
|
L. Johansson
|
||||||
Stockholm University
|
Stockholm University
|
||||||
November 2, 2001
|
February 28, 2002
|
||||||
|
|
||||||
|
|
||||||
DNS as X.509 PKIX Certificate Storage
|
DNS as X.509 PKIX Certificate Storage
|
||||||
draft-schlyter-pkix-dns-00
|
draft-schlyter-pkix-dns-01
|
||||||
|
|
||||||
Status of this Memo
|
Status of this Memo
|
||||||
|
|
||||||
@@ -24,17 +24,17 @@ Status of this Memo
|
|||||||
time. It is inappropriate to use Internet-Drafts as reference
|
time. It is inappropriate to use Internet-Drafts as reference
|
||||||
material or to cite them other than as "work in progress."
|
material or to cite them other than as "work in progress."
|
||||||
|
|
||||||
The list of current Internet-Drafts can be accessed at
|
The list of current Internet-Drafts can be accessed at http://
|
||||||
http://www.ietf.org/ietf/1id-abstracts.txt.
|
www.ietf.org/ietf/1id-abstracts.txt.
|
||||||
|
|
||||||
The list of Internet-Draft Shadow Directories can be accessed at
|
The list of Internet-Draft Shadow Directories can be accessed at
|
||||||
http://www.ietf.org/shadow.html.
|
http://www.ietf.org/shadow.html.
|
||||||
|
|
||||||
This Internet-Draft will expire on May 3, 2002.
|
This Internet-Draft will expire on August 29, 2002.
|
||||||
|
|
||||||
Copyright Notice
|
Copyright Notice
|
||||||
|
|
||||||
Copyright (C) The Internet Society (2001). All Rights Reserved.
|
Copyright (C) The Internet Society (2002). All Rights Reserved.
|
||||||
|
|
||||||
Abstract
|
Abstract
|
||||||
|
|
||||||
@@ -50,9 +50,9 @@ Abstract
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Schlyter & Johansson Expires May 3, 2002 [Page 1]
|
Schlyter & Johansson Expires August 29, 2002 [Page 1]
|
||||||
|
|
||||||
Internet-Draft DNS PKIX storage November 2001
|
Internet-Draft DNS PKIX storage February 2002
|
||||||
|
|
||||||
|
|
||||||
Table of Contents
|
Table of Contents
|
||||||
@@ -106,9 +106,9 @@ Table of Contents
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Schlyter & Johansson Expires May 3, 2002 [Page 2]
|
Schlyter & Johansson Expires August 29, 2002 [Page 2]
|
||||||
|
|
||||||
Internet-Draft DNS PKIX storage November 2001
|
Internet-Draft DNS PKIX storage February 2002
|
||||||
|
|
||||||
|
|
||||||
1. Introduction
|
1. Introduction
|
||||||
@@ -132,10 +132,13 @@ Internet-Draft DNS PKIX storage November 2001
|
|||||||
2. Storing PKIX certificates in DNS
|
2. Storing PKIX certificates in DNS
|
||||||
|
|
||||||
A PKIX certificate is published in DNS using the CERT RR [5] for a
|
A PKIX certificate is published in DNS using the CERT RR [5] for a
|
||||||
given domain name which MUST be equal to the dnsName component of the
|
given domain name which SHOULD be equal to the dnsName component of
|
||||||
subjectAltName extension in the certificate. Multiple certificates
|
the subjectAltName extension in the certificate. Multiple
|
||||||
may be present for each domain name and all SHOULD have the same
|
certificates may be present for each domain name and all SHOULD have
|
||||||
subject DN.
|
the same subject DN. If the domain name does not match the dnsName
|
||||||
|
component of the subjectAltName extension the client SHOULD notify
|
||||||
|
the user of this and allow the user to decide weather to allow the
|
||||||
|
use of the certificate or not.
|
||||||
|
|
||||||
When constructing a certificate path for validation the client MAY
|
When constructing a certificate path for validation the client MAY
|
||||||
use the AuthorityKeyIdentifier and SubjectKeyIdentifier extensions to
|
use the AuthorityKeyIdentifier and SubjectKeyIdentifier extensions to
|
||||||
@@ -159,12 +162,9 @@ Internet-Draft DNS PKIX storage November 2001
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Schlyter & Johansson Expires August 29, 2002 [Page 3]
|
||||||
|
|
||||||
|
Internet-Draft DNS PKIX storage February 2002
|
||||||
|
|
||||||
Schlyter & Johansson Expires May 3, 2002 [Page 3]
|
|
||||||
|
|
||||||
Internet-Draft DNS PKIX storage November 2001
|
|
||||||
|
|
||||||
|
|
||||||
3. Certificate lookup algorithm
|
3. Certificate lookup algorithm
|
||||||
@@ -172,7 +172,7 @@ Internet-Draft DNS PKIX storage November 2001
|
|||||||
Given a certificate with a non-empty issuerAltName extension of type
|
Given a certificate with a non-empty issuerAltName extension of type
|
||||||
dnsName, perform a DNS lookup of the corresponding domain name with
|
dnsName, perform a DNS lookup of the corresponding domain name with
|
||||||
the class IN and type CERT. For each of the certificates returned
|
the class IN and type CERT. For each of the certificates returned
|
||||||
that are of type PKIX, implementations MUST verify that the
|
that are of type PKIX, implementations SHOULD verify that the
|
||||||
subjectAltName in the certificate contains a component of type
|
subjectAltName in the certificate contains a component of type
|
||||||
dnsName with the same domain name as the one where the certificate
|
dnsName with the same domain name as the one where the certificate
|
||||||
was published using the DNS.
|
was published using the DNS.
|
||||||
@@ -218,9 +218,9 @@ References
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Schlyter & Johansson Expires May 3, 2002 [Page 4]
|
Schlyter & Johansson Expires August 29, 2002 [Page 4]
|
||||||
|
|
||||||
Internet-Draft DNS PKIX storage November 2001
|
Internet-Draft DNS PKIX storage February 2002
|
||||||
|
|
||||||
|
|
||||||
Authors' Addresses
|
Authors' Addresses
|
||||||
@@ -237,9 +237,14 @@ Authors' Addresses
|
|||||||
|
|
||||||
Leif Johansson
|
Leif Johansson
|
||||||
Stockholm University
|
Stockholm University
|
||||||
|
IT and Media Unit
|
||||||
|
Frescati Hagvag 8
|
||||||
|
Stockholm SE-106 91
|
||||||
|
Sweden
|
||||||
|
|
||||||
Phone: +46 8 16 45 41
|
Phone: +46 8 16 45 41
|
||||||
EMail: leifj@it.su.se
|
EMail: leifj@it.su.se
|
||||||
|
URI: http://www.it.su.se
|
||||||
|
|
||||||
Appendix A. Acknowledgements
|
Appendix A. Acknowledgements
|
||||||
|
|
||||||
@@ -250,6 +255,7 @@ Appendix A. Acknowledgements
|
|||||||
|
|
||||||
Niklas Hallqvist
|
Niklas Hallqvist
|
||||||
|
|
||||||
|
Edward Lewis
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -268,20 +274,14 @@ Appendix A. Acknowledgements
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Schlyter & Johansson Expires August 29, 2002 [Page 5]
|
||||||
|
|
||||||
|
Internet-Draft DNS PKIX storage February 2002
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Schlyter & Johansson Expires May 3, 2002 [Page 5]
|
|
||||||
|
|
||||||
Internet-Draft DNS PKIX storage November 2001
|
|
||||||
|
|
||||||
|
|
||||||
Full Copyright Statement
|
Full Copyright Statement
|
||||||
|
|
||||||
Copyright (C) The Internet Society (2001). All Rights Reserved.
|
Copyright (C) The Internet Society (2002). All Rights Reserved.
|
||||||
|
|
||||||
This document and translations of it may be copied and furnished to
|
This document and translations of it may be copied and furnished to
|
||||||
others, and derivative works that comment on or otherwise explain it
|
others, and derivative works that comment on or otherwise explain it
|
||||||
@@ -330,6 +330,6 @@ Acknowledgement
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Schlyter & Johansson Expires May 3, 2002 [Page 6]
|
Schlyter & Johansson Expires August 29, 2002 [Page 6]
|
||||||
|
|
||||||
|
|
Reference in New Issue
Block a user