new draft
This commit is contained in:
283
doc/draft/draft-ietf-dnsop-serverid-00.txt
Normal file
283
doc/draft/draft-ietf-dnsop-serverid-00.txt
Normal file
@@ -0,0 +1,283 @@
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
INTERNET-DRAFT David Conrad
|
||||
draft-ietf-dnsop-serverid-00.txt Nominum, Inc.
|
||||
May, 2002
|
||||
|
||||
Identifying an Authoritative Name Server
|
||||
|
||||
Status of this Memo
|
||||
|
||||
|
||||
This document is an Internet-Draft and is in full conformance with
|
||||
all provisions of Section 10 of RFC2026.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering
|
||||
Task Force (IETF), its areas, and its working groups. Note that
|
||||
other groups may also distribute working documents as Internet-
|
||||
Drafts.
|
||||
|
||||
Internet-Drafts are draft documents valid for a maximum of six months
|
||||
and may be updated, replaced, or obsoleted by other documents at any
|
||||
time. It is inappropriate to use Internet-Drafts as reference
|
||||
material or to cite them other than as "work in progress."
|
||||
|
||||
The list of current Internet-Drafts can be accessed at
|
||||
http://www.ietf.org/ietf/1id-abstracts.txt
|
||||
|
||||
The list of Internet-Draft Shadow Directories can be accessed at
|
||||
http://www.ietf.org/shadow.html.
|
||||
|
||||
Abstract
|
||||
|
||||
A standardized mechanism to determine the identity of a name server
|
||||
responding to a particular query would be useful, particularly as a
|
||||
diagnostic aid. This document describes an identification convention
|
||||
used in one widely deployed implementation of the DNS protocol and
|
||||
proposes a slight modification to that convention aimed at addressing
|
||||
some implementation concerns.
|
||||
|
||||
1. Introduction
|
||||
|
||||
Determining the identity of the name server responding to a query has
|
||||
become more complex due primarily to the proliferation of various
|
||||
load balancing techniques. This document describes a convention used
|
||||
by one particular DNS server implementation to provide identifying
|
||||
information and proposes a slight modification to that convention to
|
||||
address concerns regarding implementation neutrality.
|
||||
|
||||
Note that this document makes no value judgements as to whether or
|
||||
not the convention in current use is good or bad; it merely documents
|
||||
|
||||
|
||||
|
||||
Expires November, 2002 [Page 1]
|
||||
|
||||
draft-ietf-dnsops-serverid-00.txt May, 2002
|
||||
|
||||
|
||||
the covention's existence and proposes a slight redefinition of the
|
||||
convention to address non-technical implementation concerns.
|
||||
|
||||
2. Rationale
|
||||
|
||||
Identifying which name server is responding to queries is often
|
||||
useful, particularly in attempting to diagnose name server
|
||||
difficulties. However, relying on the IP address of the name server
|
||||
has become more problematic due the deployment of various load
|
||||
balancing solutions, including the use of shared unicast addresses as
|
||||
documented in [RFC3258].
|
||||
|
||||
An unfortunate side effect of these load balancing solutions is that
|
||||
traditional methods of determining which server is responding can be
|
||||
unreliable. Specifically, non-DNS methods such as ICMP ping, TCP
|
||||
connections, or non-DNS UDP packets (e.g., as generated by tools such
|
||||
as "traceroute"), etc., can end up going to a different server than
|
||||
that which receives the DNS queries.
|
||||
|
||||
This proposal makes the assumption that an identification mechanism
|
||||
that relies on the DNS protocol is more likely to be successful
|
||||
(although not guaranteed) in going to the same machine as a "normal"
|
||||
DNS query.
|
||||
|
||||
3. Historical Conventions
|
||||
|
||||
Recent versions of the commonly deployed Berkeley Internet Name
|
||||
Domain implementation of the DNS protocol suite from the Internet
|
||||
Software Consortium [BIND] support a way of identifying a particular
|
||||
server via the use of a standard, if somewhat unusual, DNS query.
|
||||
Specifically, a query to a late model BIND server for a TXT resource
|
||||
record in class 3 (CHAOS) for the domain name "HOSTNAME.BIND." will
|
||||
return a string that can be configured by the name server
|
||||
administrator to provide a unique identifier for the responding
|
||||
server (defaulting to the value of a gethostname() call). This
|
||||
mechanism, which is an extension of the BIND convention of using
|
||||
CHAOS class TXT RR queries to sub-domains of the "BIND." domain for
|
||||
version information, has been copied by several name server vendors.
|
||||
|
||||
For reference, the other well-known name used by recent versions of
|
||||
BIND within the CHAOS class "BIND." domain is "VERSION.BIND." A
|
||||
query for a TXT RR for this name will return an administratively re-
|
||||
definable string which defaults to the version of the server
|
||||
responding.
|
||||
|
||||
4. An Implementation Neutral Convention
|
||||
|
||||
The previously described use of the CHAOS class "BIND." domain has
|
||||
|
||||
|
||||
|
||||
Expires November, 2002 [Page 2]
|
||||
|
||||
draft-ietf-dnsops-serverid-00.txt May, 2002
|
||||
|
||||
|
||||
rightly been viewed by many implementors as not being standardized
|
||||
nor being implementation neutral. As such, a standard mechanism to
|
||||
identify a particular machine among a shared unicast set of machines
|
||||
serving the same DNS data does not currently exist.
|
||||
|
||||
Since a name server conforming to [RFC1034] and [RFC1035] should
|
||||
support the CHAOS class and the use of TXT resource record queries in
|
||||
the CHAOS class to derive information about a name server has been
|
||||
used in several independent name server implementations, the quickest
|
||||
way of supporting the identification of a particular name server out
|
||||
of a set of name servers all sharing the same unicast prefix would
|
||||
likely be to standardize on the BIND convention, albeit with a slight
|
||||
modification to address implementation neutrality concerns.
|
||||
|
||||
The convention proposed here simply redefines the top level CHAOS
|
||||
domain to be "SERVER." instead of "BIND.". Since using the actual
|
||||
hostname may be considered an information leakage security risk, the
|
||||
use of the actual hostname of the server is discouraged and instead a
|
||||
unique per-server identifier should be used. As the BIND convention
|
||||
of "HOSTNAME" implies the use of a hostname, the domain name
|
||||
"ID.SERVER" is proposed. That is, a TXT RR query for "ID.SERVER." in
|
||||
the CHAOS class will return an administratively defined string that
|
||||
can be used to differentiate among multiple servers.
|
||||
|
||||
To make this convention useful, DNS operators wishing to identify
|
||||
their servers MUST put a unique string for the RDATA of the TXT
|
||||
record associated with the "ID.SERVER." domain in class CHAOS.
|
||||
Implementors MUST provide a way to disable returning identifying
|
||||
information. Implementors SHOULD provide a way to limit who can
|
||||
query for the identifying information.
|
||||
|
||||
The use of other names in the CHAOS class "SERVER." domain are beyond
|
||||
the scope of this document.
|
||||
|
||||
IANA Considerations
|
||||
|
||||
The "SERVER." domain in the CHAOS class should be reserved by IANA
|
||||
and a registry should be created that reserves the "ID" name. In the
|
||||
future, requests may be submitted for other sub-domains of "SERVER.",
|
||||
e.g., "VERSION.SERVER." and the IANA should take appropriate action.
|
||||
|
||||
Security Considerations
|
||||
|
||||
Providing identifying information as to which server is responding
|
||||
can be seen as information leakage and thus a security risk. It may
|
||||
be appropriate to restrict who can query for the "ID.SERVER."
|
||||
domain. Filtering on source address would be one way in which
|
||||
restrictions can be applied.
|
||||
|
||||
|
||||
|
||||
Expires November, 2002 [Page 3]
|
||||
|
||||
draft-ietf-dnsops-serverid-00.txt May, 2002
|
||||
|
||||
|
||||
The identifer returned via an "ID.SERVER." query SHOULD NOT contain
|
||||
the hostname or other information that could be considered sensitive.
|
||||
|
||||
Acknowledgements
|
||||
|
||||
The technique for host identification documented here derive from
|
||||
practices implemented by Paul Vixie of the Internet Software
|
||||
Consortium in the Berkeley Internet Name Domain package. Useful
|
||||
comments on earlier drafts were provided by Bob Halley, Brian
|
||||
Wellington, Andreas Gustafsson, Ted Hardie, Chris Yarnell, and
|
||||
members of the ICANN Root Server System Advisory Council.
|
||||
|
||||
References
|
||||
|
||||
[RFC1034] Mockapetris, P., "Domain Names - Concepts and Facilities",
|
||||
RFC 1034, November 1987.
|
||||
|
||||
[RFC1035] Mockapetris, P., "Domain Names - Implementation and
|
||||
Specifications", RFC 1035, November 1987.
|
||||
|
||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||||
Requirement Levels", BCP 14, RFC 2119, March 1997.
|
||||
|
||||
[RFC3258] Hardie, T., "Distributing Authoritative Name Servers via
|
||||
Shared Unicast Addresses", RFC 3258, April, 2002.
|
||||
|
||||
Author's Address
|
||||
|
||||
David Conrad
|
||||
Nominum, Inc.
|
||||
2385 Bay Road
|
||||
Redwood City, CA 94063
|
||||
USA
|
||||
|
||||
Phone: +1 650 381 6003
|
||||
Fax: +1 650 381 6055
|
||||
Email: david.conrad@nominum.com
|
||||
|
||||
Full Copyright Statement
|
||||
|
||||
Copyright (C) The Internet Society (2000). All Rights Reserved.
|
||||
|
||||
This document and translations of it may be copied and furnished to
|
||||
others, and derivative works that comment on or otherwise explain it
|
||||
or assist in its implementation may be prepared, copied, published and
|
||||
distributed, in whole or in part, without restriction of any kind,
|
||||
provided that the above copyright notice and this paragraph are
|
||||
included on all such copies and derivative works. However, this
|
||||
|
||||
|
||||
|
||||
Expires November, 2002 [Page 4]
|
||||
|
||||
draft-ietf-dnsops-serverid-00.txt May, 2002
|
||||
|
||||
|
||||
document itself may not be modified in any way, such as by removing
|
||||
the copyright notice or references to the Internet Society or other
|
||||
Internet organizations, except as needed for the purpose of
|
||||
developing Internet standards in which case the procedures for
|
||||
copyrights defined in the Internet Standards process must be
|
||||
followed, or as required to translate it into languages other than
|
||||
English.
|
||||
|
||||
The limited permissions granted above are perpetual and will not be
|
||||
revoked by the Internet Society or its successors or assigns.
|
||||
|
||||
This document and the information contained herein is provided on an
|
||||
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||||
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||||
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||||
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||||
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE."
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Expires November, 2002 [Page 5]
|
||||
|
||||
Reference in New Issue
Block a user