Re: [dnsext] I-D Action:draft-ietf-dnsext-aliasing-requirements-00.txt

Tony Finch <dot@dotat.at> Thu, 03 March 2011 11:43 UTC

Return-Path: <fanf2@hermes.cam.ac.uk>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 939AF28C0CE for <dnsext@core3.amsl.com>; Thu, 3 Mar 2011 03:43:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.474
X-Spam-Level:
X-Spam-Status: No, score=-6.474 tagged_above=-999 required=5 tests=[AWL=0.125, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B85wSq51EpIQ for <dnsext@core3.amsl.com>; Thu, 3 Mar 2011 03:43:49 -0800 (PST)
Received: from ppsw-50.csi.cam.ac.uk (ppsw-50.csi.cam.ac.uk [131.111.8.150]) by core3.amsl.com (Postfix) with ESMTP id 3EDB828C0CF for <dnsext@ietf.org>; Thu, 3 Mar 2011 03:43:49 -0800 (PST)
X-Cam-AntiVirus: no malware found
X-Cam-SpamDetails: not scanned
X-Cam-ScannerInfo: http://www.cam.ac.uk/cs/email/scanner/
Received: from hermes-1.csi.cam.ac.uk ([131.111.8.51]:40876) by ppsw-50.csi.cam.ac.uk (smtp.hermes.cam.ac.uk [131.111.8.157]:25) with esmtpa (EXTERNAL:fanf2) id 1Pv6xi-0000uG-rs (Exim 4.72) (return-path <fanf2@hermes.cam.ac.uk>); Thu, 03 Mar 2011 11:44:54 +0000
Received: from fanf2 (helo=localhost) by hermes-1.csi.cam.ac.uk (hermes.cam.ac.uk) with local-esmtp id 1Pv6xi-0000wa-MD (Exim 4.67) (return-path <fanf2@hermes.cam.ac.uk>); Thu, 03 Mar 2011 11:44:54 +0000
Date: Thu, 03 Mar 2011 11:44:54 +0000
From: Tony Finch <dot@dotat.at>
X-X-Sender: fanf2@hermes-1.csi.cam.ac.uk
To: Phillip Hallam-Baker <hallam@gmail.com>
In-Reply-To: <AANLkTi=4VuWBJ1i87xMkFj=Q59=0Q0aOLsxrSqRLf61s@mail.gmail.com>
Message-ID: <alpine.LSU.2.00.1103031127240.14985@hermes-1.csi.cam.ac.uk>
References: <20110227191542.6824.qmail@joyce.lan> <335963D7-3440-45E6-843C-38F419462792@cisco.com> <AANLkTi=4VuWBJ1i87xMkFj=Q59=0Q0aOLsxrSqRLf61s@mail.gmail.com>
User-Agent: Alpine 2.00 (LSU 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"
Sender: Tony Finch <fanf2@hermes.cam.ac.uk>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] I-D Action:draft-ietf-dnsext-aliasing-requirements-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Mar 2011 11:43:50 -0000

On Tue, 1 Mar 2011, Phillip Hallam-Baker wrote:
>
> 2) The Server performs the rewrite.
>
> This is really hard to achieve as it requires the server to know that
> the mapping even exists.
>
> Typically a server is responding to hundreds of domains. Even large
> production servers do this. If a server receives a request for a.com
> it has no means of knowing that it 'should' map that to b.com unless
> the DNS configuration is somehow mapped to the Web administration.
>
> This is quite straightforward to handle administratively when the
> mapping is www.b.com to b.com because the source and target are in the
> same administrative zone. But this is not going to work if the mapping
> is being controlled by a TLD.

On the contrary, this is trivial for the server to do by dynamically
looking up a.com and seeing if it is a BNAME pointing at b.com.

However the server administrator probably does not want the server to
accept requests for arbitrary domains just because they have a BNAME
pointer.

So there has to be a list of valid aliases somewhere accessible to the
server, either in the DNS for b.com (used like "paranoid" reverse DNS
checking) or in the server's configuration.

Given the existence of HTTP redirects, I'm not entirely sure that it is
reasonable to forbid DNS aliasing. But server administrators are free to
choose between loose dynamic configurations and tight explicit
configurations without affecting clients.

The question for this group is if we specify something like BNAME if we
should also specify how to put the corresponding back-references in the
canonical domain.

Tony.
-- 
f.anthony.n.finch  <dot@dotat.at>  http://dotat.at/
Malin: South, veering northwest later, 3 or 4. Moderate or rough. Occasional
rain. Moderate or good, occasionally poor.