⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-dnsop-serverid-04.txt

📁 bind 源码 最新实现 linux/unix/windows平台
💻 TXT
📖 第 1 页 / 共 2 页
字号:
Network Working Group                                           S. WoolfInternet-Draft                         Internet Systems Consortium, Inc.Expires: September 14, 2005                                    D. Conrad                                                           Nominum, Inc.                                                          March 13, 2005                Identifying an Authoritative Name Server                      draft-ietf-dnsop-serverid-04Status of this Memo   This document is an Internet-Draft and is subject to all provisions   of Section 3 of RFC 3667.  By submitting this Internet-Draft, each   author represents that any applicable patent or other IPR claims of   which he or she is aware have been or will be disclosed, and any of   which he or she become aware will be disclosed, in accordance with   RFC 3668.   Internet-Drafts are working documents of the Internet Engineering   Task Force (IETF), its areas, and its working groups.  Note that   other groups may also distribute working documents as   Internet-Drafts.   Internet-Drafts are draft documents valid for a maximum of six months   and may be updated, replaced, or obsoleted by other documents at any   time.  It is inappropriate to use Internet-Drafts as reference   material or to cite them other than as "work in progress."   The list of current Internet-Drafts can be accessed at   http://www.ietf.org/ietf/1id-abstracts.txt.   The list of Internet-Draft Shadow Directories can be accessed at   http://www.ietf.org/shadow.html.   This Internet-Draft will expire on September 14, 2005.Copyright Notice   Copyright (C) The Internet Society (2005).Abstract   With the increased use of DNS anycast, load balancing, and other   mechanisms allowing more than one DNS name server to share a single   IP address, it is sometimes difficult to tell which of a pool of name   servers has answered a particular query.  A standardized mechanism to   determine the identity of a name server responding to a particularWoolf & Conrad         Expires September 14, 2005               [Page 1]Internet-Draft    Identifying an Authoritative Name Server    March 2005   query would be useful, particularly as a diagnostic aid.  Existing ad   hoc mechanisms for addressing this concern are not adequate.  This   document attempts to describe the common ad hoc solution to this   problem, including its advantages and disadvantages, and to   characterize an improved mechanism.Woolf & Conrad         Expires September 14, 2005               [Page 2]Internet-Draft    Identifying an Authoritative Name Server    March 20051.  Introduction   With the increased use of DNS anycast, load balancing, and other   mechanisms allowing more than one DNS name server to share a single   IP address, it is sometimes difficult to tell which of a pool of name   servers has answered a particular query.  A standardized mechanism to   determine the identity of a name server responding to a particular   query would be useful, particularly as a diagnostic aid.   Unfortunately, existing ad-hoc mechanisms for providing such   identification have some shortcomings, not the least of which is the   lack of prior analysis of exactly how such a mechanism should be   designed and deployed.  This document describes the existing   convention used in one widely deployed implementation of the DNS   protocol and discusses requirements for an improved solution to the   problem.Woolf & Conrad         Expires September 14, 2005               [Page 3]Internet-Draft    Identifying an Authoritative Name Server    March 20052.  Rationale   Identifying which name server is responding to queries is often   useful, particularly in attempting to diagnose name server   difficulties.  However, relying on the IP address of the name server   has become more problematic due the deployment of various load   balancing solutions, including the use of shared unicast addresses as   documented in [RFC3258].   An unfortunate side effect of these load balancing solutions, and   some changes in management practices as the public Internet has   evolved, is that traditional methods of determining which server is   responding can be unreliable.  Specifically, non-DNS methods such as   ICMP ping, TCP connections, or non-DNS UDP packets (such as those   generated by tools such as "traceroute"), etc., can end up going to a   different server than that which receives the DNS queries.   There is a well-known and frequently-used technique for determining   an identity for a nameserver more specific than the   possibly-non-unique "server that answered my query".  The widespread   use of the existing convention suggests a need for a documented,   interoperable means of querying the identity of a nameserver that may   be part of an anycast or load-balancing cluster.  At the same time,   however, it also has some drawbacks that argue against standardizing   it as it's been practiced so far.Woolf & Conrad         Expires September 14, 2005               [Page 4]Internet-Draft    Identifying an Authoritative Name Server    March 20053.  Existing Conventions   Recent versions of the commonly deployed Berkeley Internet Name   Domain implementation of the DNS protocol suite from the Internet   Software Consortium [BIND] support a way of identifying a particular   server via the use of a standard, if somewhat unusual, DNS query.   Specifically, a query to a late model BIND server for a TXT resource   record in class 3 (CHAOS) for the domain name "HOSTNAME.BIND." will   return a string that can be configured by the name server   administrator to provide a unique identifier for the responding   server (defaulting to the value of a gethostname() call).  This   mechanism, which is an extension of the BIND convention of using   CHAOS class TXT RR queries to sub-domains of the "BIND." domain for   version information, has been copied by several name server vendors.   For reference, the other well-known name used by recent versions of   BIND within the CHAOS class "BIND." domain is "VERSION.BIND."  A   query for a TXT RR for this name will return an administratively   defined string which defaults to the version of the server   responding.  This is, however, not generally implemented by other   vendors.3.1  Advantages   There are several valuable attributes to this mechanism, which   account for its usefulness.   1.  The "hostname.bind" query response mechanism is within the DNS       protocol itself.  An identification mechanism that relies on the       DNS protocol is more likely to be successful (although not       guaranteed) in going to the same machine as a "normal" DNS query.   2.  Since the identity information is requested and returned within       the DNS protocol, it doesn't require allowing any other query       mechanism to the server, such as holes in firewalls for       otherwise-unallowed ICMP Echo requests.  Thus it does not require       any special exceptions to site security policy.   3.  It is simple to configure.  An administrator can easily turn on       this feature and control the results of the relevant query.   4.  It allows the administrator complete control of what information       is given out in the response, minimizing passive leakage of       implementation or configuration details.  Such details are often       considered sensitive by infrastructure operators.3.2  Disadvantages   At the same time, there are some forbidding drawbacks to the   VERSION.BIND mechanism that argue against standardizing it as it   currently operates.Woolf & Conrad         Expires September 14, 2005               [Page 5]Internet-Draft    Identifying an Authoritative Name Server    March 2005   1.  It requires an additional query to correlate between the answer       to a DNS query under normal conditions and the supposed identity       of the server receiving the query.  There are a number of       situations in which this simply isn't reliable.   2.  It reserves an entire class in the DNS (CHAOS) for what amounts       to one zone.  While CHAOS class is defined in [RFC1034] and       [RFC1035], it's not clear that supporting it solely for this       purpose is a good use of the namespace or of implementation       effort.   3.  It is implementation specific.  BIND is one DNS implementation.       At the time of this writing, it is probably the most prevalent       for authoritative servers.  This does not justify standardizing       on its ad hoc solution to a problem shared across many operators       and implementors.   The first of the listed disadvantages is technically the most   serious.  It argues for an attempt to design a good answer to the   problem that "I need to know what nameserver is answering my   queries", not simply a convenient one.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -