⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-dnsext-mdns-19.txt

📁 bind-3.2.
💻 TXT
📖 第 1 页 / 共 4 页
字号:
Where DHCPv4 or DHCPv6 is implemented, DHCP options can be used toconfigure LLMNR on an interface.  The LLMNR Enable Option, described in[LLMNREnable], can be used to explicitly enable or disable use of LLMNRon an interface.  The LLMNR Enable Option does not determine whether orin which order DNS itself is used for name resolution.  The order inwhich various name resolution mechanisms should be used can be specifiedusing the Name Service Search Option for DHCP [RFC2937].3.2.1.  Configuration consistencyIt is possible that DNS configuration mechanisms will go in and out ofservice.  In these circumstances, it is possible for hosts within anadministrative domain to be inconsistent in their DNS configuration.For example, where DHCP is used for configuring DNS servers, one or moreDHCP servers can go down.  As a result, hosts configured prior to theoutage will be configured with a DNS server, while hosts configuredafter the outage will not.  Alternatively, it is possible for the DNSconfiguration mechanism to continue functioning while configured DNSservers fail.Esibov, Aboba & Thaler       Standards Track                   [Page 11]INTERNET-DRAFT                    LLMNR                      12 May 2003Unless unconfigured hosts periodically retry configuration, an outage inthe DNS configuration mechanism will result in hosts continuing toprefer LLMNR even once the outage is repaired.  Since LLMNR only enableslinklocal name resolution, this represents an unnecessary degradation incapabilities.  As a result, it is recommended that hosts without aconfigured DNS server periodically attempt to obtain DNS configuration.A default retry interval of two (2) minutes is RECOMMENDED.4.  Conflict resolutionThe sender MUST anticipate receiving multiple replies to the same LLMNRquery, in the event that several LLMNR enabled computers receive thequery and respond with valid answers.  When this occurs, the responsesMAY first be concatenated, and then treated in the same manner thatmultiple RRs received from the same DNS server would.There are some scenarios when multiple responders MAY respond to thesame query.  There are other scenarios when only one responder MAYrespond to a query.  Resource records for which the latter queries aresubmitted are referred as UNIQUE throughout this document.  Theuniqueness of a resource record depends on a nature of the name in thequery and type of the query.  For example it is expected that:   - multiple hosts may respond to a query for an SRV type record   - multiple hosts may respond to a query for an A or AAAA type     record for a cluster name (assigned to multiple hosts in     the cluster)   - only a single host may respond to a query for an A or AAAA     type record for a hostname.Every responder that responds to an LLMNR query AND includes a UNIQUErecord in the response:   1.  MUST verify that there is no other host within the scope of the       LLMNR query propagation that can return a resource record       for the same name, type and class.   2.  MUST NOT include a UNIQUE resource record in the       response without having verified its uniqueness.Where a host is configured to respond to LLMNR queries on more than oneinterface, each interface should have its own independent LLMNR cache.For each UNIQUE resource record in a given interface's configuration,the host MUST verify resource record uniqueness on that interface.  Toaccomplish this, the host MUST send an LLMNR query for each UNIQUEresource record.By default, a host SHOULD be configured to behave as though all RRs areUNIQUE.  Uniqueness verification is carried out when the host:Esibov, Aboba & Thaler       Standards Track                   [Page 12]INTERNET-DRAFT                    LLMNR                      12 May 2003  - starts up or  - is configured to respond to the LLMNR queries on an interface or  - is configured to respond to the LLMNR queries using additional    UNIQUE resource records.When a host that owns a UNIQUE record receives an LLMNR query for thatrecord, the host MUST respond.  After the client receives a response, itMUST check whether the response arrived on another interface.  If thisis the case, then the client can use the UNIQUE resource record inresponse to LLMNR queries.  If not, then it MUST NOT use the UNIQUEresource record in response to LLMNR queries.The name conflict detection mechanism doesn't prevent name conflictswhen previously partitioned segments are connected by a bridge.  In sucha situation, name conflicts are detected when a sender receives morethan one response to its LLMNR multicast query.  In this case, thesender sends the first response that it received to all responders thatresponded to this query except the first one, using UDP unicast.  A hostthat receives a query response containing a UNIQUE resource record thatit owns, even if it didn't send such a query, MUST verify that no otherhost within the LLMNR scope is authoritative for the same name, usingthe mechanism described above.  Based on the result, the host detectswhether there is a name conflict and acts accordingly.4.1.  Considerations for Multiple InterfacesA multi-homed host may elect to configure LLMNR on only one of itsactive interfaces.  In many situations this will be adequate.  However,should a host need to configure LLMNR on more than one of its activeinterfaces, there are some additional precautions it MUST take.Implementers who are not planning to support LLMNR on multipleinterfaces simultaneously may skip this section.A multi-homed host checks the uniqueness of UNIQUE records as describedin Section 4.  The situation is illustrated in figure 1.     ----------  ----------      |      |    |      |     [A]    [myhost]   [myhost]   Figure 1.  Link-scope name conflictIn this situation, the multi-homed myhost will probe for, and defend,its host name on both interfaces.  A conflict will be detected on oneinterface, but not the other.  The multi-homed myhost will not be ableto respond with a host RR for "myhost" on the interface on the right(see Figure 1).  The multi-homed host may, however, be configured to usethe "myhost" name on the interface on the left.Esibov, Aboba & Thaler       Standards Track                   [Page 13]INTERNET-DRAFT                    LLMNR                      12 May 2003Since names are only unique per-link, hosts on different links could beusing the same name.  If an LLMNR client sends requests over multipleinterfaces, and receives replies from more than one, the result returnedto the client is defined by the implementation.  The situation isillustrated in figure 2.     ----------  ----------      |      |    |     |     [A]    [myhost]   [A]   Figure 2.  Off-segment name conflictIf host myhost is configured to use LLMNR on both interfaces, it willsend LLMNR queries on both interfaces.  When host myhost sends a queryfor the host RR for name "A" it will receive a response from hosts onboth interfaces.Host myhost will then send the first responder's response to the secondresponder, who will attempt to verify the uniqueness of host RR for itsname, but will not discover a conflict, since the conflicting hostresides on a different link.  Therefore it will continue using its name.Host myhost cannot distinguish between the situation shown in Figure 2,and that shown in Figure 3 where no conflict exists.             [A]            |   |        -----   -----            |   |           [myhost]   Figure 3.  Multiple paths to same hostThis illustrates that the proposed name conflict resolution mechanismdoes not support detection or resolution of conflicts between hosts ondifferent links.  This problem can also occur with unicast DNS when amulti-homed host is connected to two different networks with separatedname spaces.  It is not the intent of this document to address the issueof uniqueness of names within DNS.4.2.  API issues[RFC2553] provides an API which can partially solve the name ambiguityproblem for applications written to use this API, since the sockaddr_in6structure exposes the scope within which each scoped address exists, andthis structure can be used for both IPv4 (using v4-mapped IPv6addresses) and IPv6 addresses.Esibov, Aboba & Thaler       Standards Track                   [Page 14]INTERNET-DRAFT                    LLMNR                      12 May 2003Following the example in Figure 2, an application on 'myhost' issues therequest getaddrinfo("A", ...) with ai_family=AF_INET6 andai_flags=AI_ALL|AI_V4MAPPED.  LLMNR requests will be sent from bothinterfaces and the resolver library will return a list containingmultiple addrinfo structures, each with an associated sockaddr_in6structure.  This list will thus contain the IPv4 and IPv6 addresses ofboth hosts responding to the name 'A'.  Link-local addresses will have asin6_scope_id value that disambiguates which interface is used to reachthe address.  Of course, to the application, Figures 2 and 3 are stillindistinguishable, but this API allows the application to communicatesuccessfully with any address in the list.5.  Security ConsiderationsLLMNR is by nature a peer-to-peer name resolution protocol.  It istherefore inherently more vulnerable than DNS, since existing DNSsecurity mechanisms are difficult to apply to LLMNR and an attacker onlyneeds to be misconfigured to answer an LLMNR query with incorrectinformation.In order to address the security vulnerabilities, the followingmechanisms are contemplated:[1]  Scope restrictions.[2]  Usage restrictions.[3]  Cache and port separation.[4]  Authentication.These techniques are described in the following sections.5.1.  Scope restrictionWith LLMNR it is possible that hosts will allocate conflicting names fora period of time, or that attackers will attempt to deny service toother hosts by allocating the same name.  Such attacks also allow hoststo receive packets destined for other hosts.Since LLMNR is typically deployed in situations where no trust model canbe assumed, it is likely that LLMNR queries and responses will beunauthenticated.  In the absence of authentication, LLMNR reduces theexposure to such threats by utilizing queries sent to a link-scopemulticast address, as well as setting the TTL (IPv4) or Hop Limit (IPv6)fields to one (1) on both queries and responses.Esibov, Aboba & Thaler       Standards Track                   [Page 15]INTERNET-DRAFT                    LLMNR                      12 May 2003While this limits the ability of off-link attackers to spoof LLMNRqueries and responses, it does not eliminate it.   For example, it ispossible for an attacker to spoof a response to a frequent query (suchas an A/AAAA query for a popular Internet host), and using a TTL or HopLimit field larger than one (1), for the forged response to reach theLLMNR sender.  There also are scenarios such as public "hotspots" whereattackers can be present on the same link.These threats are most serious in wireless networks such as 802.11,since attackers on a wired network will require physical access to thehome network, while wireless attackers may reside outside the home.Link-layer security can be of assistance against these threats if it isavailable.5.2.  Usage restrictionAs noted in Section 3, LLMNR is intended for usage in a limited set ofscenarios.If an interface has been configured via any automatic configurationmechanism which is able to supply DNS configuration information, thenLLMNR SHOULD NOT be used as the primary name resolution mechanism onthat interface, although it MAY be used as a name resolution mechanismof last resort.Note: enabling LLMNR for use in situations where a DNS server has beenconfigured will result in upgraded hosts changing their default behaviorwithout a simultaneous update to configuration information.  Where thisis considered undesirable, LLMNR SHOULD NOT be enabled by default, sothat hosts will neither listen on the link-scope multicast address, norwill it send queries to that address.Use of LLMNR as a name resolution mechanism increases securityvulnerabilities.  For example, if an LLMNR query is sent whenever a DNSserver does not respond in a timely way, then an attacker can execute adenial of service attack on the DNS server(s) and then poison the LLMNRcache by responding to the resulting LLMNR queries with incorrectinformation.The vulnerability is more serious if LLMNR is given higher priority thanDNS among the enabled name resolution mechanisms.  In such aconfiguration, a denial of service attack on the DNS server would not be

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -