Re: [dnsext] RFC 6604 Clarification

"W.C.A. Wijngaards" <wouter@nlnetlabs.nl> Tue, 31 March 2015 07:22 UTC

Return-Path: <wouter@nlnetlabs.nl>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 55D9B1AD0CB for <dnsext@ietfa.amsl.com>; Tue, 31 Mar 2015 00:22:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.017
X-Spam-Level:
X-Spam-Status: No, score=-3.017 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HELO_EQ_NL=0.55, HOST_EQ_NL=1.545, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ljoC95xXhLDh for <dnsext@ietfa.amsl.com>; Tue, 31 Mar 2015 00:22:27 -0700 (PDT)
Received: from dicht.nlnetlabs.nl (dicht.nlnetlabs.nl [185.49.140.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1D7E1A0338 for <dnsext@ietf.org>; Tue, 31 Mar 2015 00:22:26 -0700 (PDT)
Received: by dicht.nlnetlabs.nl (Postfix, from userid 58) id 091E62734; Tue, 31 Mar 2015 09:22:24 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=nlnetlabs.nl; s=default; t=1427786544; bh=BQnSxaL9f7FZDA68WmDFr86IM3Vy/z5KKHWsQQUC9JY=; h=Date:From:To:Subject:References:In-Reply-To; b=vv4N8LUyN4QMvBV/fqNX/nNX/dLqFQwll2NAWrh/tzcb0xURtVjO8eNedIK4pvjS4 mPqKkEUFaOl/7uasO4MhVVSM/oGp0/w9UZUGEcQ12YdOC3KjM7WzKBOU6WTm62fNEv EiXHNFC4E9KqGHMflW9DYt9ZAuKlbyjRIlpJChB4=
Received: from axiom.nlnetlabs.nl (unknown [IPv6:2a04:b900:0:1:222:4dff:fe55:4d46]) by dicht.nlnetlabs.nl (Postfix) with ESMTPSA id AB59F272E for <dnsext@ietf.org>; Tue, 31 Mar 2015 09:22:21 +0200 (CEST)
Authentication-Results: dicht.nlnetlabs.nl; dmarc=none header.from=nlnetlabs.nl
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=nlnetlabs.nl; s=default; t=1427786541; bh=BQnSxaL9f7FZDA68WmDFr86IM3Vy/z5KKHWsQQUC9JY=; h=Date:From:To:Subject:References:In-Reply-To; b=mY3jsJ3wyKMghxGFXKSOQ/CXHVFVETle4PEr3kYshbUJ04T0n5WenZ5Dx+qHdXvm6 DrHkQ6J4xCileyboDX9x3YYYGt0d3MvuhUT2fUK6ZBnPDtkJWkO6ojbhEi77tNc/pp bLW09LU+YV+/Sv56h9fAfgQBBuhn+cpwY7qPMRiE=
Message-ID: <551A4B2B.9070406@nlnetlabs.nl>
Date: Tue, 31 Mar 2015 09:22:19 +0200
From: "W.C.A. Wijngaards" <wouter@nlnetlabs.nl>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: dnsext@ietf.org
References: <af1796c3bda84e99844715264afc67a5@HKXPR30MB021.064d.mgd.msft.net>
In-Reply-To: <af1796c3bda84e99844715264afc67a5@HKXPR30MB021.064d.mgd.msft.net>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsext/SliSQ5YyQ1okmHAYpfSbU6Soxvo>
Subject: Re: [dnsext] RFC 6604 Clarification
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext/>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 Mar 2015 07:22:29 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hi Kumar,

I cannot answer on the RFC part, but I want to answer on what will
make the resolver continue the lookup.

On 30/03/15 11:04, Kumar Ashutosh wrote:
> Hi
> 
> As per RFC 6604, section 3
> 
> When an xNAME chain is followed, all but the last query cycle
> 
> necessarily had no error.  The RCODE in the ultimate DNS response
> 
> MUST BE set based on the final query cycle leading to that
> 
> response.  If the xNAME chain was terminated by an error, it will
> 
> be that error code.  If the xNAME chain terminated without error,
> 
> it will be zero.
> 
> 
> 
> This is a little vague on two accounts:
> 
> 1.What would be the error code if the server decides to curtail
> the CNAME chain after a certain length (say 20). Is it still
> success or do we indicate in some other way.

The curtailed CNAME chain is best sent with RCODE NOERROR(0).

> 
> 2.If the CNAME chain points to a Qname for which the auth server
> is non-authoritative (and recursion is disabled on the auth
> server.) The server in this case cannot get the response. A direct
> query for this Qname will result in SERV_FAIL. Should the auth
> server return SERV_FAIL in this case? Will resolvers respect
> answers with SERV_FAIL in RCODE and cache the partial response?

You must send the partial response with RCODE NOERROR(0).  Then, the
resolver can retry after the CNAME.

Best regards,
   Wouter


> 
> 
> 
> Can we put a clarification?
> 
> 
> 
> Thanks
> 
> *Ashu*
> 
> Program Manager | Windows Networking| DNS
> 
> 
> 
> 
> 
> _______________________________________________ dnsext mailing
> list dnsext@ietf.org https://www.ietf.org/mailman/listinfo/dnsext
> 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=ZlFv
-----END PGP SIGNATURE-----