⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-dnsext-wcard-clarify-08.txt

📁 bind 源码 最新实现 linux/unix/windows平台
💻 TXT
📖 第 1 页 / 共 3 页
字号:
     Although a wild card domain name owning an SOA RRSet can never     be a source of synthesis, there is no reason to forbid the     ownership of an SOA RRSet.     E.g., given this zone:            $ORIGIN *.example.            @                 3600 IN  SOA   <SOA RDATA>                              3600     NS    ns1.example.com.                              3600     NS    ns1.example.net.            www               3600     TXT   "the www txt record"     A query for www.*.example.'s TXT record would still find the     "the www txt record" answer.  The reason is that the asterisk     label only becomes significant when section's 4.3.2, step 3     part 'c' in in effect.     Of course, there would need to be a delegation in the parent     zone, "example." for this to work too.  This is covered in the     next section.4.2 NS RRSet at a Wild Card Domain Name     With the definition of DNSSEC [RFC4033, RFC4034, RFC4035] now     in place, the semantics of a wild card domain name owning an     NS RRSet has come to be poorly defined.  The dilemma relates to     a conflict between the rules for synthesis in part 'c' and the     fact that the resulting synthesis generates a record for which     the zone is not authoritative.  In a DNSSEC signed zone, the     mechanics of signature management (generation and inclusion     in a message) become unclear.     After some lengthy discussions, there has been no clear "best     answer" on how to document the semantics of such a situation.     Barring such records from the DNS would require definition of     rules for that, as well as introducing a restriction on records     that were once legal.  Allowing such records and amending the     process of signature management would entail complicating the     DNSSEC definition.     There is one more ingredient to the discussion, that being the     utility of a wild card domain name owned NS RRSet.  Although     there are cases of this use, it is an operational rarity.     Expending effort to close this topic has proven to be an     exercise in diminishing returns.     In summary, there is no definition given for wild card domain     names owning an NS RRSet.  The semantics are left undefined until     there is a clear need to have a set defined, and until there is     a clear direction to proceed.  Operationally, inclusion of wild     card NS RRSets in a zone is discouraged, but not barred.4.2.1 Discarded Notions     Prior to DNSSEC, a wild card domain name owning a NS RRSet     appeared to be workable, and there are some instances in which     it is found in deployments using implementations that support     this.  Continuing to allow this in the specificaion is not     tenable with DNSSEC.  The reason is that the synthesis of the     NS RRSet is being done in a zone that has delegated away the     responsibility for the name.  This "unauthorized" synthesis is     not a problem for the base DNS protocol, but DNSSEC, in affirming     the authorization model for DNS exposes the problem.     Outright banning of wildcards of type NS is also untenable as     the DNS protocol does not define how to handle "illegal" data.     Implementations may choose not to load a zone, but there is no     protocol definition.  The lack of the definition is complicated     by having to cover dynamic update [RFC 2136], zone transfers,     as well as loading at the master server.  The case of a client     (resolver, cacheing server) getting a wildcard of type NS in     a reply would also have to be considered.     Given the daunting challenge of a complete definition of how to     ban such records, dealing with existing implementations that     permit the records today is a further complication.  There are     uses of wild card domain name owning NS RRSets.     One compromise proposed would have redefined wildcards of type     NS to not be used in synthesis, this compromise fell apart     because it would have required significant edits to the DNSSEC     signing and validation work.  (Again, DNSSEC catches     unauthorized data.)     With no clear consensus forming on the solution to this dilemma,     and the realization that wildcards of type NS are a rarity in     operations, the best course of action is to leave this open-ended     until "it matters."4.3 CNAME RRSet at a Wild Card Domain Name     The issue of a CNAME RRSet owned by a wild card domain name has     prompted a suggested change to the last paragraph of step 3c of     the algorithm in 4.3.2.  The changed text appears in section     3.3.3 of this document.4.4 DNAME RRSet at a Wild Card Domain Name     Ownership of a DNAME [RFC2672] RRSet by a wild card domain name     represents a threat to the coherency of the DNS and is to be     avoided or outright rejected.  Such a DNAME RRSet represents     non-deterministic synthesis of rules fed to different caches.     As caches are fed the different rules (in an unpredictable     manner) the caches will cease to be coherent.  ("As caches     are fed" refers to the storage in a cache of records obtained     in responses by recursive or iterative servers.)     For example, assume one cache, responding to a recursive     request, obtains the record:        "a.b.example. DNAME foo.bar.example.net."     and another cache obtains:        "b.example.  DNAME foo.bar.example.net."     both generated from the record:        "*.example. DNAME foo.bar.example.net."     by an authoritative server.     The DNAME specification is not clear on whether DNAME records     in a cache are used to rewrite queries.  In some interpretations,     the rewrite occurs, in some, it is not.  Allowing for the     occurrence of rewriting, queries for "sub.a.b.example. A" may     be rewritten as "sub.foo.bar.tld. A" by the former caching     server and may be rewritten as "sub.a.foo.bar.tld. A" by the     latter.  Coherency is lost, an operational nightmare ensues.     Another justification for banning or avoiding wildcard DNAME     records is the observation that such a record could synthesize     a DNAME owned by "sub.foo.bar.example." and "foo.bar.example."     There is a restriction in the DNAME definition that no domain     exist below a DNAME-owning domain, hence, the wildcard DNAME     is not to be permitted.4.5 SRV RRSet at a Wild Card Domain Name     The definition of the SRV RRset is RFC 2782 [RFC2782].  In the     definition of the record, there is some confusion over the term     "Name."  The definition reads as follows:# The format of the SRV RR...#    _Service._Proto.Name TTL Class SRV Priority Weight Port Target...#  Name#   The domain this RR refers to.  The SRV RR is unique in that the#   name one searches for is not this name; the example near the end#   shows this clearly.     Do not confuse the definition "Name" with the owner name.  I.e.,     once removing the _Service and _Proto labels from the owner name     of the SRV RRSet, what remains could be a wild card domain name     but this is immaterial to the SRV RRSet.     E.g.,  If an SRV record is:        _foo._udp.*.example. 10800 IN SRV 0 1 9 old-slow-box.example.     *.example is a wild card domain name and although it it the Name     of the SRV RR, it is not the owner (domain name).  The owner     domain name is "_foo._udp.*.example." which is not a wild card     domain name.     The confusion is likely based on the mixture of the specification     of the SRV RR and the description of a "use case."4.6 DS RRSet at a Wild Card Domain Name     A DS RRSet owned by a wild card domain name is meaningless and     harmless.  This statement is made in the context that an NS RRSet     at a wild card domain name is undefined.  At a non-delegation     point, a DS RRSet has no value (no corresponding DNSKEY RRSet     will be used in DNSSEC validation).  If there is a synthesized     DS RRSet, it alone will not be very useful as it exists in the     context of a delegation point.4.7 NSEC RRSet at a Wild Card Domain Name     Wild card domain names in DNSSEC signed zones will have an NSEC     RRSet.  Synthesis of these records will only occur when the     query exactly matches the record.  Synthesized NSEC RR's will not     be harmful as they will never be used in negative caching or to     generate a negative response.4.8 RRSIG at a Wild Card Domain Name     RRSIG records will be present at a wild card domain name in a     signed zone, and will be synthesized along with data sought in a     query.  The fact that the owner name is synthesized is not a     problem as the label count in the RRSIG will instruct the     verifying code to ignore it.4.9 Empty Non-terminal Wild Card Domain Name     If a source of synthesis is an empty non-terminal, then the     response will be one of no error in the return code and no RRSet     in the answer section.5. Security Considerations     This document is refining the specifications to make it more     likely that security can be added to DNS.  No functional     additions are being made, just refining what is considered     proper to allow the DNS, security of the DNS, and extending     the DNS to be more predictable.6. IANA Considerations      None.7. References     Normative References     [RFC20]   ASCII Format for Network Interchange, V.G. Cerf,               Oct-16-1969     [RFC1034] Domain Names - Concepts and Facilities,               P.V. Mockapetris, Nov-01-1987     [RFC1035] Domain Names - Implementation and Specification, P.V               Mockapetris, Nov-01-1987     [RFC1995] Incremental Zone Transfer in DNS, M. Ohta, August 1996     [RFC2119] Key Words for Use in RFCs to Indicate Requirement               Levels, S Bradner, March 1997     [RFC2181] Clarifications to the DNS Specification, R. Elz and               R. Bush, July 1997     [RFC2308] Negative Caching of DNS Queries (DNS NCACHE),               M. Andrews, March 1998     [RFC2672] Non-Terminal DNS Name Redirection, M. Crawford,               August 1999.     [RFC2782] A DNS RR for specifying the location of services (DNS               SRV), A. Gulbrandsen, et.al., February 2000     [RFC4033] DNS Security Introduction and Requirements, R. Arends,               et.al., March 2005     [RFC4034] Resource Records for the DNS Security Extensions,               R. Arends, et.al., March 2005     [RFC4035] Protocol Modifications for the DNS Security Extensions,               R. Arends, et.al., March 2005     [RFC2672] Non-Terminal DNS Name Redirection, M. Crawford,               August 1999     Informative References     [RFC2136] Dynamic Updates in the Domain Name System (DNS UPDATE),               P. Vixie, Ed., S. Thomson, Y. Rekhter, J. Bound,               April 19978. Editor          Name:         Edward Lewis          Affiliation:  NeuStar          Address:      46000 Center Oak Plaza, Sterling, VA, 20166, US          Phone:        +1-571-434-5468          Email:        ed.lewis@neustar.biz     Comments on this document can be sent to the editor or the mailing     list for the DNSEXT WG, namedroppers@ops.ietf.org.9. Others Contributing to the Document     This document represents the work of a large working group.  The     editor merely recorded the collective wisdom of the working group.10. Trailing Boilerplate     Copyright (C) The Internet Society (2005).     This document is subject to the rights, licenses and restrictions     contained in BCP 78, and except as set forth therein, the authors     retain all their rights.     This document and the information contained herein are provided     on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION     HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET     SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL     WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO     ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT     INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF     MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Intellectual Property     The IETF takes no position regarding the validity or scope of     any Intellectual Property Rights or other rights that might     be claimed to pertain to the implementation or use of the     technology described in this document or the extent to which     any license under such rights might or might not be available;     nor does it represent that it has made any independent effort     to identify any such rights.  Information on the procedures     with respect to rights in RFC documents can be found in BCP 78     and BCP 79.     Copies of IPR disclosures made to the IETF Secretariat and any     assurances of licenses to be made available, or the result of an     attempt made to obtain a general license or permission for the     use of such proprietary rights by implementers or users of this     specification can be obtained from the IETF on-line IPR     repository at http://www.ietf.org/ipr.  The IETF invites any     interested party to bring to its attention any copyrights,     patents or patent applications, or other proprietary rights     that may cover technology that may be required to implement     this standard.  Please address the information to the IETF at     ietf-ipr@ietf.org.Acknowledgement     Funding for the RFC Editor function is currently provided by the     Internet Society.Expiration     This document expires on or about January 6, 2006.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -