Re: [DNSOP] New Version Notification for draft-bellis-dnsext-multi-qtypes-03.txt

Ray Bellis <ray@bellis.me.uk> Thu, 03 November 2016 18:17 UTC

Return-Path: <ray@bellis.me.uk>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 576F612970A for <dnsop@ietfa.amsl.com>; Thu, 3 Nov 2016 11:17:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s4nDPT54viDU for <dnsop@ietfa.amsl.com>; Thu, 3 Nov 2016 11:17:17 -0700 (PDT)
Received: from hydrogen.portfast.net (hydrogen.portfast.net [188.246.200.2]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E4681296C2 for <dnsop@ietf.org>; Thu, 3 Nov 2016 11:17:17 -0700 (PDT)
Received: from [46.227.151.81] (port=55807 helo=rays-mbp.local) by hydrogen.portfast.net ([188.246.200.2]:465) with esmtpsa (fixed_plain:ray@bellis.me.uk) (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16) id 1c2MZd-0002TG-7o (Exim 4.72) for dnsop@ietf.org (return-path <ray@bellis.me.uk>); Thu, 03 Nov 2016 18:17:13 +0000
To: dnsop@ietf.org
References: <147747377576.18804.12382454195926632620.idtracker@ietfa.amsl.com> <0d1385dd-aff5-d375-4356-dedf0f404364@isc.org> <6376E72C-AB6B-477F-BCD4-D56935C24BB2@verisign.com>
From: Ray Bellis <ray@bellis.me.uk>
Message-ID: <68de4b08-0d81-38e3-8e05-bded60c097e4@bellis.me.uk>
Date: Thu, 03 Nov 2016 18:17:15 +0000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:45.0) Gecko/20100101 Thunderbird/45.4.0
MIME-Version: 1.0
In-Reply-To: <6376E72C-AB6B-477F-BCD4-D56935C24BB2@verisign.com>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/BlMCjiim5CI21MqEihdT-RzWpC0>
Subject: Re: [DNSOP] New Version Notification for draft-bellis-dnsext-multi-qtypes-03.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Nov 2016 18:17:19 -0000


On 03/11/2016 17:57, Wessels, Duane wrote:
> Hi Ray,
> 
> 
>> QTn: a 2 byte field (MSB first) specifying a DNS RR type. The RR 
>> type MUST be for a real resource record, and MUST NOT refer to a 
>> pseudo RR type such as "OPT", "IXFR", "TSIG", "*", etc.

> How is an implementation expected to know which types are pseudo?
> Should this document specify the list of forbidden pseudo types at
> the time of publication?

I would take that to be any RR in the ranges set aside for meta types
in the IANA RRTYPE registry, plus OPT.

> I don't think the document says how a server should respond to
> receiving a forbidden pseudo type, does it?

I think you're right.  Do you think it should be FORMERR, or perhaps
just ignore any disallowed types [and omit them from the returned QTn
list] ?

>> A server that is authoritative for the specified QNAME on receipt
>> of a Multiple QTYPE Option MUST attempt to return all specified RR
>> types except where that would result in truncation in which case it
>> may omit some (or all) of the records for the additional RR types.
>> Those RR types MUST then also be omitted from the Multiple QTYPE
>> Option in the response.
> 
> Data in the Additional section also competes for space up to the
> truncation limit, right?  Which has priority, the Multiple QTYPE data
> or the normal Additional data?

My gut reaction is the latter, on the basis that this is closest to
"fallback to non-supporting behaviour".  I'm not sure there's a
definitive correct answer, though.

>> If the DNS client sets the "DNSSEC OK" (DO) bit in the query then
>> the server MUST also return the related DNSSEC records that would
>> have been returned in a standalone query for the same QTYPE.
>> 
>> A negative answer from a signed zone MUST contain the appropriate 
>> authenticated denial of existence records, per [RFC4034] and 
>> [RFC5155].
> 
> So we should expect to see single responses that have both positive
> and negative DNSSEC records together.  That should be fun... :-)

Yes, AIUI in theory you'd get individual RRSIGs over the QTn records
that exist, and a single NSEC[3] record that proves the existence (or
otherwise) of any others.

FWIW, I don't intend to spend too much more time on this draft until
such time as DNSOP determines that this really is a problem worth solving.

thanks for the review!

Ray