⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-lewis-dns-wildcard-clarify-00.txt

📁 bind-3.2.
💻 TXT
📖 第 1 页 / 共 2 页
字号:
for the query.  Even if the closest enclosing node conforms to the syntaxrule in section 2 for being a wild card domain name, the closest enclosingnode is not eligible to be a source of a synthesized answer.The only wild card domain name that is a candidate to synthesize an answerwill be the "*" subdomain of the closest enclosing domain name.  Threepossibilities can happen.  The "*" subdomain does not exist, the "*"subdomain does but does not have an RR set of the same type as the QTYPE,or it exists and has the desired RR set.For the sake of brevity, the closest enclosing node can be referred to asthe "closest encloser."To illustrate, using the example in section 1.2 of this document, thefollowing chart shows QNAMEs and the closest enclosers.  In Appendix Athere is another chart showing unusual cases.    QNAME                        Closest Encloser     Wild Card Source    host3.example.               example.             *.example.    _telnet._tcp.host1.example.  _tcp.host1.example.  no wild card    _telnet._tcp.host2.example.  host2.example.       no wild card    _telnet._tcp.host3.example.  example.             *.example.    _chat._udp.host3.example.    example.             *.example.Note that host1.subdel.example. is in a subzone, so the search for it endsin a referral in part 'b', thus does not enter into finding a closestencloser.The fact that a closest encloser will be the only superdomain thatcan have a candidate wild card will have an impact when it comes todesigning authenticated denial of existence proofs.  (This conceptis not introduced until DNS Security Extensions are considered inupcoming sections.)#            If the "*" label does not exist, check whether the name#            we are looking for is the original QNAME in the query#            or a name we have followed due to a CNAME.  If the name#            is original, set an authoritative name error in the#            response and exit.  Otherwise just exit.The above passage says that if there is not even a wild card domain nameto match at this point (failing to find an explicit answer elsewhere),we are to return an authoritative name error at this point.  If we werefollowing a CNAME, the specification is unclear, but seems to imply thata no error return code is appropriate, with just the CNAME RR (or sequenceof CNAME RRs) in the answer section.#            If the "*" label does exist, match RRs at that node#            against QTYPE.  If any match, copy them into the answer#            section, but set the owner of the RR to be QNAME, and#            not the node with the "*" label.  Go to step 6.This final paragraph covers the role of the QTYPE in the process.  Notethat if no resource record set matches the QTYPE the result is that no datais copied, but the search still ceases ("Go to step 6.").6 Authenticated Denial and Wild CardsIn unsecured DNS, the only concern when there is no data to return toa query is whether the domain name from which the answer comes exists ornot, whether or not a name error is indicated in the return code.  Ineither case the answer section is empty or contained just a sequence ofCNAME RR sets.In securing DNS, authenticated denial of existence is a service that isprovided.  The chosen solution to provide this service is to generateresource records indicating what is protected in a zone and to digitallysign these.The resource records that do this, as defined in RFC 2535, are NXT RRs.There are three points to consider when clarifying the topic of wild carddomain names.  One is the construction of the records.  The second isthe inclusion of records in responses.  The third is the interpretationof the records in a response by the resolver.6.1 Preparing Wild Card Domain Name Owned Non-existence ProofsDuring the creation of the authenticated denial records, the wild carddomain name plays no special role, in the same manner as the wild carddomain name playing no special role in a query.There is one consideration with regards to preparing non-existenceproofs.R6.1 Any mechanism used to provide authenticated denial MUST reveal the      closest enclosing existing domain for the query.  If this is not      provided, the resolver will not be able to ascertain the identity      of an appropriate wild card domain name.6.2 Role of Wild Cards in AnswersThere are three cases to address.  The first is synthesizing from wild carddomain name with data, the second is negatively synthesizing from anexisting wild card, and the third is denying that neither an exact match,referral, nor wild card exist to answer the query.6.2.1 Synthesizing From a Wild CardWhen preparing an answer from a wild card domain name, the answer needsto include proof that the exact match of the QNAME and QCLASS does notexist.  This is needed because synthesis of the answer replaces the "*"label with the QNAME without securing the result.  The resolver willrealize that the answer was derived from a wild card, but cannotdetect whether an exact match was maliciously omitted.R6.2 When synthesizing a positive answer from a wild card domain name, the      answer MUST include proof that the exact match for the QNAME and      QCLASS does not exist.6.2.2. Synthesizing Negatively From a Wild CardWhen synthesizing a negative answer that is derived from a wild card,meaning that a wild card matched the QNAME (no exact match happened forQNAME) but that there is no match for QTYPE there, two negative answersare needed, possibly one.  As in 6.2.1, a proof that the exact matchfailed is needed.  A second proof is needed to show that the wild carddomain name does not have the QTYPE.  Depending on the method ofauthenticated denial, these this could be possible with one statement.R6.3 When synthesizing a negative answer from a wild card domain name,      the answer MUST include proof that the exact match of the QNAME      and QCLASS does not exist and that the QTYPE matches no RR set at      the wild card.  If this answer can be optimized, an implementation      SHOULD reduce the number of records included in the response.6.2.3. Answering With an Authoritative Name ErrorWhen answering with a result code of a name error, the answer needs toprovide proof that neither the exact match for QNAME and QCLASS existsnor that a wild card domain name exists as a subdomain of the closestenclosing domain name.R6.4 When preparing a reply with an authoritative name error, the answer      MUST include proof that the exact match for the QNAME and QCLASS      does not exist and that no wild card is available to provide a match.6.2.4. The Remaining CaseWhen answering negatively because there is a match for QNAME and QCLASSbut no match for the QTYPE, only a proof for that is needed.  Just asthe search does not proceed onto a search for the wild card in thiscase, neither does the construction of the negative answer proof.R6.5 When preparing a reply in which there is an exact match of the      QNAME and QCLASS, but there is no RR set matching the QTYPE,      the reply SHOULD NOT contain any proof regarding the wild card      domain name.6.3 Interpreting Negative Answers Involving Wild CardsThere are two requirements for resolvers when it comes to handlingnegative answers generated as described in section 6.2.R6.6 A resolver MUST be able to identify negative answer data that      indicate when a match for QNAME and QCLASS does not exist.R6.7 From a negative answer, a resolver MUST be able to determine      the closest enclosing domain name in a negative answer and      MUST be able to process a negative answer involving the one      wild card domain name that is a candidate to provide a      synthesized answer.6.4 Authenticated Denial, Wild Card Domain Names, and Opt-InWhen considering the Opt-In proposal [WIP], it is wise to not combinea zone that adheres to both opt-in and that has a wild card domainname.  The reason is rooted in that the synthesis of an answer is doneby substituting the QNAME for the wild card domain name in the answer.Because this is unsecured, and the is ambiguity regarding whether anegative proof can be provided for the exact match (when it is outsidethe opt-in secured area), a definitive proof of authenticated denialis not possible.7 Security ConsiderationsThis document is refining the specifications to make it more likely thatsecurity can be added to DNS.  No functional additions are being made,just refining what is considered proper to allow the system, securityof the system, and extending the system more predictable.8 ReferencesNormative References[RFC 20] ASCII Format for Network Interchange, V.G. Cerf, Oct-16-1969[RFC 1034] Domain Names - Concepts and Facilities, P.V. Mockapetris,            Nov-01-1987[RFC 1035] Domain Names - Implementation and Specification, P.V            Mockapetris, Nov-01-1987[RFC 2119] Key Words for Use in RFCs to Indicate Requirement Levels, S            Bradner, March 1997Non-normative References[RFC 2136] Dynamic Updates in the Domain Name System (DNS UPDATE), P. Vixie,            Ed., S. Thomson, Y. Rekhter, J. Bound, April 1997[RFC 2535] Domain Name System Security Extensions, D. Eastlake, March 1999[WIP] DNSSEC Opt-In, Internet Draft, R. Arends, M. Kosters, D. Blacka, 20029 Other Contributing to This DocumentOthers who have directly caused text to appear in the document: Paul Vixieand Olaf Kolkman.  Many others have indirect influences on the content.10 EditorName:        Edward LewisTitle:       Research EngineerAffiliation: ARINEmail:       edlewis@arin.netPhone:       +1-703-227-9854Appendix A: Subdomains of Wild Card Domain NamesIn reading the definition of section 2 carefully, it is possible torationalize unusual names as legal.  In the example given, *.example.could have subdomains of *.sub.*.example. and even the more direct*.*.example.  (The implication here is that these domain names ownexplicit resource records sets.)  Although defining these names is noteasy to justify, it is important that implementations account for thepossibility.  This section will give some further guidance on handlingthese names.The first thing to realize is that by all definitions, subdomains ofwild card domain names are legal.  In analyzing them, one realizesthat they cause no harm by their existence.  Because of this, they areallowed to exist, i.e., there are no special case rules made to disallowthem.  The reason for not preventing these names is that the preventionwould just introduce more code paths to put into implementations.The concept of "closest enclosing" existing names is important to keep inmind.  It is also important to realize that a wild card domain name canbe a closest encloser of a query name.  For example, if *.*.example. isdefined in a zone, and the query name is a.*.example., then the closestenclosing domain name is *.example.  Keep in mind that the closestencloser is not eligible to be a source of synthesized answers, just thesubdomain of it that has the first label "*".To illustrate this, the following chart shows some matches.  Assume thatthe names *.example., *.*.example., and *.sub.*.example. are definedin the zone.       QNAME                Closest Encloser   Wild Card Source       a.example.           example.           *.example.       b.a.example.         example.           *.example.       a.*.example.         *.example.         *.*.example.       b.a.*.example.       *.example.         *.*.example.       b.a.*.*.example.     *.*.example.       no wild card       a.sub.*.example.     sub.*.example.     *.sub.*.example.       b.a.sub.*.example.   sub.*.example.     *.sub.*.example.       a.*.sub.*.example.   *.sub.*.example.   no wild card       *.a.example.         example.           *.example.       a.sub.b.example.     example.           *.example.Recall that the closest encloser itself cannot be the wild card.  Thereforethe match for b.a.*.*.example. has no applicable wild card.Finally, if a query name is sub.*.example., any answer available will comefrom an exact name match for sub.*.example.  No wild card synthesis isperformed in this case.Full Copyright Statement   Copyright (C) The Internet Society 2003.  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published and   distributed, in whole or in part, without restriction of any kind,   provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of developing   Internet standards in which case the procedures for copyrights defined   in the Internet Standards process must be followed, or as required to   translate it into languages other than English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT   NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN   WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Acknowledgement   Funding for the RFC Editor function is currently provided by the   Internet Society.-- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-Edward Lewis                                          +1-703-227-9854ARIN Research Engineer

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -