Re: [DNSOP] Clarifying referrals (#35)
Andrew Sullivan <ajs@anvilwalrusden.com> Tue, 14 November 2017 09:51 UTC
Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DBE31126CC7 for <dnsop@ietfa.amsl.com>; Tue, 14 Nov 2017 01:51:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=yitter.info header.b=iVAAjbDP; dkim=pass (1024-bit key) header.d=yitter.info header.b=lSkCjEET
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AiHr7kKcAg71 for <dnsop@ietfa.amsl.com>; Tue, 14 Nov 2017 01:50:57 -0800 (PST)
Received: from mx4.yitter.info (mx4.yitter.info [159.203.56.111]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3E65124B09 for <dnsop@ietf.org>; Tue, 14 Nov 2017 01:50:57 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mx4.yitter.info (Postfix) with ESMTP id 13F23BF56B for <dnsop@ietf.org>; Tue, 14 Nov 2017 09:50:57 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yitter.info; s=default; t=1510653057; bh=BJ2GOiimTGysYhHF8a0hpemD/RvSHL4bdhfw5bVgjZ4=; h=Date:From:To:Subject:References:In-Reply-To:From; b=iVAAjbDPaq9frFapqTK9KbJgqoEFZenTB3oa6gEg7m9qV78h9KsYmMQ76d9Oa30gg aDRi54u/IQpDjsPgsl8gwbuHDN8kyzoMyMcqdC8/9SX6DAYoszcwu/35BKmcSOgKVH IVeNlXDheXbG5BFKv5LE3ERHwhf8QuOD5/xpkAZs=
X-Virus-Scanned: Debian amavisd-new at crankycanuck.ca
Received: from mx4.yitter.info ([127.0.0.1]) by localhost (mx4.yitter.info [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UF2dzGwH4ANy for <dnsop@ietf.org>; Tue, 14 Nov 2017 09:50:55 +0000 (UTC)
Date: Tue, 14 Nov 2017 04:50:45 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yitter.info; s=default; t=1510653055; bh=BJ2GOiimTGysYhHF8a0hpemD/RvSHL4bdhfw5bVgjZ4=; h=Date:From:To:Subject:References:In-Reply-To:From; b=lSkCjEETwWj/7amB0hRsEAs0lWaZBsEp4R2ejcTU84lGGub6wcdTT59VwT7LIrYM5 bRk8z8qsIMWmo3G8hM8pUqhbMuNqhN9xacr8SPg5fIRUB8ykxsZi0CagyOfMiLdk+0 AT/Z0w+3qh77zupGu4zFGpdRvektbd/I9i+MOQL4=
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dnsop@ietf.org
Message-ID: <20171114095044.yowfpwlsyfvdsgss@mx4.yitter.info>
References: <20171112075445.tf2ut5dxzhhnqe7l@mx4.yitter.info> <20171112131831.GA32208@laperouse.bortzmeyer.org> <20171113014445.ncldrwnuuvluecx7@mx4.yitter.info> <5A08FD96.8030907@redbarn.org> <20171113020736.ga7rzgst2hurb56h@mx4.yitter.info> <5A09068A.3030206@redbarn.org> <20171113032640.tbn7icsllm6jeeny@mx4.yitter.info> <5A09C4D6.6080202@redbarn.org> <20171114063209.gjubqyovnwcrl33a@mx4.yitter.info> <5A0A952F.1060001@redbarn.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <5A0A952F.1060001@redbarn.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/AvhNcGg8Ip4XuIx85EOuC3xxJdA>
Subject: Re: [DNSOP] Clarifying referrals (#35)
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Nov 2017 09:51:22 -0000
Hi, On Mon, Nov 13, 2017 at 11:03:11PM -0800, Paul Vixie wrote: > > there is no reason for an authority server to know who the root name servers > are. so, there can be no expectation that it would know any "closer" name > server set than the one at its zone bottom. I think your claim there depends on a strict role separation that is not in the protocol definition (yet). It implies that there is such a thing as "an authority server", whereas it seems to me that we have not defined servers quite so exclusively (yet). Interestingly (and really helpfully I must emphasise), you have just made me realise that there's actually a problem in the definition of "authoritative server" in 7719 and -bis. In that definition, we quote 2182: A server that knows the content of a DNS zone from local knowledge, and thus can answer queries about that zone without needing to query other servers. But then we go on to say that the server has been configured to answer with AA set for the zone. Yet that is not entailed by 2182's definition, for it seems to me that 2182's definition of "knows the content" could under one reading include the root hints file. I note that RFC 8109 doesn't actually cover the case of an authoritative server, and of course we haven't (yet) got consensus that mixed-mode servers are harmful, either. Now, one might argue (I can see such a reading, and I think it is what you are arguing) that the root hints file is RFC 1034's SBELT structure, and that 1034 defines SBELT is to "be used when the resolver doesn't have any local information to guide name server selection", and that the SBELT structure is anyway defined only for resolvers and not servers. All of that _should_ mean that a server that is only ever authoritative ought not to have this sort of information and probably also that it ought never to reveal it when the RD bit is clear even if it did have it. I think it is reasonble to say, however, that this information is not entirely clear from the RFCs as they currently stand, particularly since the algorithm in section 4.3.2 of RFC 1034 seems explicitly to contemplate having a cache, and it's not clear (at least to me) in that algorithm whether there are ever cases where a cache ought to be excluded completely from consideration. > since RFC 1034 talks about zone bottoms, and "closest enclosing", and its > algorithm speaks specifically of a referral being generated by copying > non-authoritative NS RRs from the zone bottom into the answer, there is no > reasonable interpretation of "closer" other than an NS RRset which is > closer, along the path from the zone apex to the qname, than the zone apex > was. in fact, from that algorithm, there is no way to generate a referral > other than by copying along-the-path data into an answer. Step 4 of the algorithm in RFC 1034 reads to me like a flat-out contradiction of your claim there: 4. Start matching down in the cache. If QNAME is found in the cache, copy all RRs attached to it that match QTYPE into the answer section. If there was no delegation from authoritative data, look for the best one from the cache, and put it in the authority section. Go to step 6. So your entire argument turns on whether a server should ever have a root hints file and use it. If there is written down somewhere advice that some class of servers should never have such information, I have overlooked it. > > This, too, seems to be a claim that is at best poorly justified. It > > might be that it is how BIND interprets the RCODE, but it's not what > > it is defined to be. > > it's defined as "administrative denial" not merely "widely interpreted as > administrative denial" as i wrote above. Where is it defined that way? RFC 1035 just says it is refused "for policy reasons", and the IANA registry is less descriptive than that because it refers to RFC 1035. I'm unaware of another place this is defined. > "no." the client isn't asking for an upward referral, it's asking for an > answer, and is expecting either an answer (positive or negative or empty) or > an on-the-path referral copied from the non-authoritative data at the bottom > of the authority zone. I don't think that you have shown this follows from the algorithm, and the fact that clients seem not to spit up on root referrals strikes me as empirical evidence that your assertion of what the client is expecting is at least in doubt. > <<For example, a name server may not wish to provide the information to the > particular requester Right. Such as, for instance, not wishing to provide the upward referral (or anything else). The particular requester might be a member of the class, "all requesters asking for zones for which I am not authoritative". I get why your interpretation is one plausible one, but I do not see that it is the _only_ one. > as witnessed in discussions of the u.s. constitutions and the christian > bible, arguments about the literal intent of the authors are interesting > mostly to scholars, whereas our concern should be with the actions taken by > the far end given the data pattern we transmit and the circumstances as we > know them. Well, I want to be neither talmudic nor supreme. I don't think I disagree with your view (though FWIW I find your tone a little patronizing), but I think we are doing two things in this discussion: 1. Providing fodder for a draft I've already started writing that provides guidance not to return upward referrals. 2. Providing the necessary information for the terminology document so that we have written down our current best understanding of terms as people use them. I do not believe that (2) ought to include an effort to define terms to exclude operations we (for some value of we) think are a bad idea. IMO, the goal of 7719bis is not to define problems out of existence but to give us a clear and common set of terms to talk about all of this, _so that_ we can specify improvements to what the traditional specifications say. > while specific guidance was not given as to resolver action in response to > each possible authority RCODE, i have both witnessed and implemented full > resolvers which treated REFUSED as a permanent failure whereas SERVFAIL was > a temporary failure. And that "permanent failure" marks the server dead, not the server-qname or even server-zone combination dead, I guess. I think I have seen this too. That seems like another thing that ought to be documented, however, as a possible issue: at least one full service resolver interprets an RCODE somewhat more liberally than the specification does under some (other) plausible reading. I'm here to document things so that we can maximise interoperation, not specify what is Correct. Best regards, A -- Andrew Sullivan ajs@anvilwalrusden.com
- [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Stephane Bortzmeyer
- Re: [DNSOP] Clarifying referrals (#35) Paul Vixie
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Paul Vixie
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Paul Vixie
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) John Kristoff
- Re: [DNSOP] [Ext] Re: Clarifying referrals (#35) Edward Lewis
- [DNSOP] CDS polling, was Re: [Ext] Re: Clarifying… Tony Finch
- Re: [DNSOP] Clarifying referrals (#35) Paul Vixie
- Re: [DNSOP] Clarifying referrals (#35) Paul Vixie
- Re: [DNSOP] CDS polling, was Re: [Ext] Re: Clarif… Evan Hunt
- Re: [DNSOP] Clarifying referrals (#35) Matthew Pounsett
- Re: [DNSOP] CDS polling, was Re: [Ext] Re: Clarif… Edward Lewis
- Re: [DNSOP] CDS polling, was Re: [Ext] Re: Clarif… Paul Vixie
- Re: [DNSOP] Clarifying referrals (#35) Paul Vixie
- Re: [DNSOP] Clarifying referrals (#35) Matthew Pounsett
- Re: [DNSOP] Clarifying referrals (#35) Paul Vixie
- Re: [DNSOP] Clarifying referrals (#35) Matthew Pounsett
- Re: [DNSOP] Clarifying referrals (#35) Paul Vixie
- Re: [DNSOP] Clarifying referrals (#35) Robert Edmonds
- Re: [DNSOP] Clarifying referrals (#35) Evan Hunt
- Re: [DNSOP] CDS polling, was Re: [Ext] Re: Clarif… Mark Andrews
- Re: [DNSOP] CDS polling, was Re: [Ext] Re: Clarif… Evan Hunt
- [DNSOP] another draft (was Re: Clarifying referra… Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Paul Vixie
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Paul Vixie
- Re: [DNSOP] Clarifying referrals (#35) Evan Hunt
- Re: [DNSOP] Clarifying referrals (#35) Paul Vixie
- Re: [DNSOP] CDS polling, was Re: [Ext] Re: Clarif… Mark Elkins
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] CDS polling, was Re: [Ext] Re: Clarif… Tony Finch
- Re: [DNSOP] Clarifying referrals (#35) Evan Hunt
- Re: [DNSOP] CDS polling, was Re: [Ext] Re: Clarif… Jacques Latour
- Re: [DNSOP] Clarifying referrals (#35) Dave Lawrence
- Re: [DNSOP] Clarifying referrals (#35) Paul Vixie
- Re: [DNSOP] CDS polling, was Re: [Ext] Re: Clarif… Paul Wouters
- Re: [DNSOP] Clarifying referrals (#35) Tony Finch
- Re: [DNSOP] CDS polling, was Re: [Ext] Re: Clarif… Tony Finch
- Re: [DNSOP] Clarifying referrals (#35) Stephane Bortzmeyer
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Mark Andrews
- Re: [DNSOP] Clarifying referrals (#35) Paul Vixie
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Mark Andrews
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Mark Andrews
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Mark Andrews
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Mark Andrews
- Re: [DNSOP] Clarifying referrals (#35) Mark Andrews
- Re: [DNSOP] Clarifying referrals (#35) Evan Hunt
- Re: [DNSOP] Clarifying referrals (#35) Paul Vixie
- Re: [DNSOP] Clarifying referrals (#35) Tony Finch
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) P Vix
- Re: [DNSOP] Clarifying referrals (#35) Mark Andrews
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Tony Finch
- Re: [DNSOP] Clarifying referrals (#35) P Vix
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Tony Finch
- Re: [DNSOP] Clarifying referrals (#35) Paul Hoffman
- Re: [DNSOP] Clarifying referrals (#35) Evan Hunt
- Re: [DNSOP] Clarifying referrals (#35) Evan Hunt
- Re: [DNSOP] Clarifying referrals (#35) Dick Franks
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Dick Franks
- Re: [DNSOP] Clarifying referrals (#35) Tony Finch
- Re: [DNSOP] Clarifying referrals (#35) Dick Franks
- Re: [DNSOP] Clarifying referrals (#35) Tony Finch
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Paul Vixie
- Re: [DNSOP] Clarifying referrals (#35) Florian Weimer
- Re: [DNSOP] Clarifying referrals (#35) Tony Finch
- Re: [DNSOP] Clarifying referrals (#35) Andrew Sullivan
- Re: [DNSOP] Clarifying referrals (#35) Bob Harold
- Re: [DNSOP] Clarifying referrals (#35) Evan Hunt
- Re: [DNSOP] Clarifying referrals (#35) Wessels, Duane
- Re: [DNSOP] Clarifying referrals (#35) Johannes Naab