Re: [DNSOP] New Version Notification for draft-bellis-dnsext-multi-qtypes-03.txt
Ray Bellis <ray@bellis.me.uk> Thu, 03 November 2016 18:17 UTC
Return-Path: <ray@bellis.me.uk>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 576F612970A for <dnsop@ietfa.amsl.com>; Thu, 3 Nov 2016 11:17:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s4nDPT54viDU for <dnsop@ietfa.amsl.com>; Thu, 3 Nov 2016 11:17:17 -0700 (PDT)
Received: from hydrogen.portfast.net (hydrogen.portfast.net [188.246.200.2]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E4681296C2 for <dnsop@ietf.org>; Thu, 3 Nov 2016 11:17:17 -0700 (PDT)
Received: from [46.227.151.81] (port=55807 helo=rays-mbp.local) by hydrogen.portfast.net ([188.246.200.2]:465) with esmtpsa (fixed_plain:ray@bellis.me.uk) (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16) id 1c2MZd-0002TG-7o (Exim 4.72) for dnsop@ietf.org (return-path <ray@bellis.me.uk>); Thu, 03 Nov 2016 18:17:13 +0000
To: dnsop@ietf.org
References: <147747377576.18804.12382454195926632620.idtracker@ietfa.amsl.com> <0d1385dd-aff5-d375-4356-dedf0f404364@isc.org> <6376E72C-AB6B-477F-BCD4-D56935C24BB2@verisign.com>
From: Ray Bellis <ray@bellis.me.uk>
Message-ID: <68de4b08-0d81-38e3-8e05-bded60c097e4@bellis.me.uk>
Date: Thu, 03 Nov 2016 18:17:15 +0000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:45.0) Gecko/20100101 Thunderbird/45.4.0
MIME-Version: 1.0
In-Reply-To: <6376E72C-AB6B-477F-BCD4-D56935C24BB2@verisign.com>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/BlMCjiim5CI21MqEihdT-RzWpC0>
Subject: Re: [DNSOP] New Version Notification for draft-bellis-dnsext-multi-qtypes-03.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Nov 2016 18:17:19 -0000
On 03/11/2016 17:57, Wessels, Duane wrote: > Hi Ray, > > >> QTn: a 2 byte field (MSB first) specifying a DNS RR type. The RR >> type MUST be for a real resource record, and MUST NOT refer to a >> pseudo RR type such as "OPT", "IXFR", "TSIG", "*", etc. > How is an implementation expected to know which types are pseudo? > Should this document specify the list of forbidden pseudo types at > the time of publication? I would take that to be any RR in the ranges set aside for meta types in the IANA RRTYPE registry, plus OPT. > I don't think the document says how a server should respond to > receiving a forbidden pseudo type, does it? I think you're right. Do you think it should be FORMERR, or perhaps just ignore any disallowed types [and omit them from the returned QTn list] ? >> A server that is authoritative for the specified QNAME on receipt >> of a Multiple QTYPE Option MUST attempt to return all specified RR >> types except where that would result in truncation in which case it >> may omit some (or all) of the records for the additional RR types. >> Those RR types MUST then also be omitted from the Multiple QTYPE >> Option in the response. > > Data in the Additional section also competes for space up to the > truncation limit, right? Which has priority, the Multiple QTYPE data > or the normal Additional data? My gut reaction is the latter, on the basis that this is closest to "fallback to non-supporting behaviour". I'm not sure there's a definitive correct answer, though. >> If the DNS client sets the "DNSSEC OK" (DO) bit in the query then >> the server MUST also return the related DNSSEC records that would >> have been returned in a standalone query for the same QTYPE. >> >> A negative answer from a signed zone MUST contain the appropriate >> authenticated denial of existence records, per [RFC4034] and >> [RFC5155]. > > So we should expect to see single responses that have both positive > and negative DNSSEC records together. That should be fun... :-) Yes, AIUI in theory you'd get individual RRSIGs over the QTn records that exist, and a single NSEC[3] record that proves the existence (or otherwise) of any others. FWIW, I don't intend to spend too much more time on this draft until such time as DNSOP determines that this really is a problem worth solving. thanks for the review! Ray
- [DNSOP] Fwd: New Version Notification for draft-b… Ray Bellis
- Re: [DNSOP] Fwd: New Version Notification for dra… william manning
- Re: [DNSOP] Fwd: New Version Notification for dra… Ray Bellis
- Re: [DNSOP] New Version Notification for draft-be… Wessels, Duane
- Re: [DNSOP] New Version Notification for draft-be… Ray Bellis