📄 draft-ietf-dnsop-serverid-04.txt
字号:
Woolf & Conrad Expires September 14, 2005 [Page 6]Internet-Draft Identifying an Authoritative Name Server March 20054. Characteristics of an Implementation Neutral Convention The discussion above of advantages and disadvantages to the HOSTNAME.BIND mechanism suggest some requirements for a better solution to the server identification problem. These are summarized here as guidelines for any effort to provide appropriate protocol extensions: 1. The mechanism adopted MUST be in-band for the DNS protocol. That is, it needs to allow the query for the server's identifying information to be part of a normal, operational query. It SHOULD also permit a separate, dedicated query for the server's identifying information. 2. The new mechanism SHOULD not require dedicated namespaces or other reserved values outside of the existing protocol mechanisms for these, i.e. the OPT pseudo-RR. In particular, it should not propagate the existing drawback of requiring support for a CLASS and top level domain in the authoritative server (or the querying tool) to be useful. 3. Support for the identification functionality SHOULD be easy to implement and easy to enable. It MUST be easy to disable and SHOULD lend itself to access controls on who can query for it. 4. It should be possible to return a unique identifier for a server without requiring the exposure of information that may be non-public and considered sensitive by the operator, such as a hostname or unicast IP address maintained for administrative purposes. 5. The identification mechanism SHOULD NOT be implementation-specific.Woolf & Conrad Expires September 14, 2005 [Page 7]Internet-Draft Identifying an Authoritative Name Server March 20055. IANA Considerations This document proposes no specific IANA action. Protocol extensions, if any, to meet the requirements described are out of scope for this document. Should such extensions be specified and adopted by normal IETF process, the specification will include appropriate guidance to IANA.Woolf & Conrad Expires September 14, 2005 [Page 8]Internet-Draft Identifying an Authoritative Name Server March 20056. Security Considerations Providing identifying information as to which server is responding to a particular query from a particular location in the Internet can be seen as information leakage and thus a security risk. This motivates the suggestion above that a new mechanism for server identification allow the administrator to disable the functionality altogether or partially restrict availability of the data. It also suggests that the serverid data should not be readily correlated with a hostname or unicast IP address that may be considered private to the nameserver operator's management infrastructure. Propagation of protocol or service meta-data can sometimes expose the application to denial of service or other attack. As DNS is a critically important infrastructure service for the production Internet, extra care needs to be taken against this risk for designers, implementors, and operators of a new mechanism for server identification.Woolf & Conrad Expires September 14, 2005 [Page 9]Internet-Draft Identifying an Authoritative Name Server March 20057. Acknowledgements The technique for host identification documented here was initially implemented by Paul Vixie of the Internet Software Consortium in the Berkeley Internet Name Daemon package. Comments and questions on earlier drafts were provided by Bob Halley, Brian Wellington, Andreas Gustafsson, Ted Hardie, Chris Yarnell, Randy Bush, and members of the ICANN Root Server System Advisory Committee. The newest version takes a significantly different direction from previous versions, owing to discussion among contributors to the DNSOP working group and others, particularly Olafur Gudmundsson, Ed Lewis, Bill Manning, Sam Weiler, and Rob Austein.Woolf & Conrad Expires September 14, 2005 [Page 10]Internet-Draft Identifying an Authoritative Name Server March 2005Intellectual Property Statement The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org.Disclaimer of Validity This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Copyright Statement Copyright (C) The Internet Society (2005). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights.Acknowledgment Funding for the RFC Editor function is currently provided by the Internet Society.Woolf & Conrad Expires September 14, 2005 [Page 11]
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -