[DNSOP] Re: Introducing Relative Label for DNS

Ben van Hartingsveldt <ben.vanhartingsveldt@yocto.com> Tue, 23 July 2024 09:18 UTC

Return-Path: <ben.vanhartingsveldt@yocto.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71203C18DBA6 for <dnsop@ietfa.amsl.com>; Tue, 23 Jul 2024 02:18:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level:
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UCM4FwF8aH16 for <dnsop@ietfa.amsl.com>; Tue, 23 Jul 2024 02:18:30 -0700 (PDT)
Received: from mx2.yocto.eu (ns2.yoctodns.com [136.144.225.232]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE0C0C14F6EA for <dnsop@ietf.org>; Tue, 23 Jul 2024 02:18:28 -0700 (PDT)
MIME-Version: 1.0
Authentication-Results: mx2.yocto.eu; auth=pass smtp.mailfrom=ben.vanhartingsveldt@yocto.com
Date: Tue, 23 Jul 2024 09:18:25 +0000
From: Ben van Hartingsveldt <ben.vanhartingsveldt@yocto.com>
To: Peter Thomassen <peter@desec.io>, dnsop@ietf.org
In-Reply-To: <080e6020-c54a-482b-bdcb-b46ee9efd109@desec.io>
References: <32cb827b0875605f8fbf47ccae1d4a9c@yocto.com> <080e6020-c54a-482b-bdcb-b46ee9efd109@desec.io>
Message-ID: <4f0b2ade47a972606429399a2217e5ce@yocto.com>
X-Sender: ben.vanhartingsveldt@yocto.com
Organization: Yocto
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Spamd-Bar: ---
Message-ID-Hash: RLQPMWN2N6YNFJ3QFBNWSVHKTMQC6QQV
X-Message-ID-Hash: RLQPMWN2N6YNFJ3QFBNWSVHKTMQC6QQV
X-MailFrom: ben.vanhartingsveldt@yocto.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [DNSOP] Re: Introducing Relative Label for DNS
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/dC124PYIwGU7ffVjDPP8uCvZRyA>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>

Hi Peter,

It is a little bit of both, I think. Yes, I use relative labels already 
in my own system internally (now as 0xFF, but I'm planning to move to 
0x40). It works and it works very well. However, I'm planning to add DNS 
UPDATE to my DNS services, so that my customers can use it in their 
routers too. When adding DNS UPDATE, I also will allow them to use 
relative labels when connecting to my DNS servers. Then, the labels are 
not solely internally used anymore, because external users can use them 
when adding/updating/deleting records using DNS UPDATE.

If I just randomly pick a relative label byte, say 0x45, and this isn't 
standardized, years later somebody standardizes 0x45 for another 
purpose, even when many people wrote software for my 0x45, we get very 
weird situations. I would like to avoid that, because the web is full 
with those non-standardized problems. (E.g. I'm planning to build a DNS 
editor that only uses port 53 too).

> If I got that right, then I think the proposal might benefit from being 
> reframed as a draft to aims at assigning this label type, and maybe 
> simply naming its purpose as "indicating a relative name within a 
> confined system only". That way, all interop problems go away.
This seems a possible way to go. If I understand correctly, I have to 
see "confined system" as just my DNS system. The other ways seems to be 
addressing all interop problems. I'm fine with investigating both 
options.

Ben

Peter Thomassen schreef op 2024-07-23 08:11:
> Hi Ben,
> 
> Welcome to DNSOP! :-)
> 
> Your proposal reads like you'd like to add relative names to the DNS 
> protocol. Reading this thread, however, I realize that you'd simply 
> like to use the 0x40 label type *within the confines of your system*, 
> and are asking to this added to the DNS Label Types registry [1] so 
> that your use won't collide with any conflicting future.
> 
> So, it seems to be an entirely internal thing, except a reserved label 
> type would prevent adverse effects in the future.
> 
> If I got that right, then I think the proposal might benefit from being 
> reframed as a draft to aims at assigning this label type, and maybe 
> simply naming its purpose as "indicating a relative name within a 
> confined system only". That way, all interop problems go away.
> 
> [1]: 
> https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#dns-parameters-10
> 
> Best,
> Peter
> 
> PS: That said, the protocol has no concept of relative names; names are 
> just 1:1 mappings of nodes in a tree. I get it that one might take 
> other perspectives, but those are not DNS perspectives. Keeping track 
> of how the user entered data therefore is not really the DNS's problem; 
> your storage layer could use some other datastructure "around" the DNS 
> data to represent that information. -- I wouldn't mind a label type 
> assignment as described above, though.
> 
> 
> On 7/21/24 11:50, Ben van Hartingsveldt wrote:
>> Dear all,
>> 
>> In the recent years I started working on my own coded DNS server, 
>> because I was done with the synchronization between BIND and 
>> DirectAdmin that broke all the time. It resulted in a Java server that 
>> is running on 4 IPs for some years now. Because of this, I had to read 
>> many RFCs to have it pass tests like Zonemaster, DNSViz, IntoDNS, etc. 
>> While reading and implementing things, I also came across some 
>> shortcomings of DNS. On advice of someone at SIDN, I will share my 
>> draft that I published today. It solves one of the shortcomings that 
>> DNS has in its core: relative domain names.
>> 
>> I'm talking about 
>> https://datatracker.ietf.org/doc/html/draft-yocto-dns-relative-label-00. 
>> This draft is meant to solve the problem that we cannot use relative 
>> domain names in the DNS system, specificly in DNS UPDATE and in binary 
>> zone files. This also means that this draft is not meant for use with 
>> the QUERY opcode (except for possibly AXFR and IXFR). Let me explain 
>> those two usecases.
>> 
>> 1) DNS UPDATE: In DNS UPDATE it is possible to update the zone using 
>> DNS itself. This can be used in routers when dynamic DNS is wanted, 
>> but also in other situations. Imagine wanting to add an MX record. 
>> Using a webinterface, you are likely able to chooses one of the 
>> following four options:
>> - mail IN MX 10 mx
>> - mail IN MX 10 mx.example.com.
>> - mail.example.com. IN MX 10 mx
>> - mail.example.com. IN MX 10 mx.example.com.
>> However, using DNS UPDATE you are only able to add the record with 
>> fourth format; both record name and FQDN field have to be absolute. 
>> This means that when I return to the webinterface, I will likely see 
>> absolute domain names, even when I use relative domain names in my 
>> other records. My draft wants to give the client more control over 
>> when to use relative and when to use absolute domain names by adding a 
>> new label type.
>> 
>> 2) Binary Zone Files: Since BIND 9, it is possible to save zones in a 
>> binary format. This is possible to enable/disable using 
>> `masterfile-format`. It is possible to convert the textual format to 
>> binary and vice versa. However, when converting to binary, the zone 
>> file will loose the knowledge of knowing which domain names where 
>> absolute and which where relative. This means that converting the zone 
>> back from binary to text will likely give you a zone with only 
>> absolute domain names. As with DNS UPDATE, this is a shortcoming of 
>> the wire format used by DNS.
>> 
>> That is why I wrote this draft. Like BIND, my own DNS system also uses 
>> binary zone storage and in the future I'm planning to implement DNS 
>> UPDATE too. I also believe my draft is not yet perfect. I'm not a 
>> native English speaker and maybe just format to mention something 
>> important. That is why I want you to give your honest opinion on this 
>> topic. Do you agree with the problem? Does DNS need such label? Did I 
>> make a typo? Etc.
>> 
>> Please let me know.
>> 
>> Thanks in advance
>> 
>> Ben van Hartingsveldt
>> 
>> _______________________________________________
>> DNSOP mailing list -- dnsop@ietf.org
>> To unsubscribe send an email to dnsop-leave@ietf.org
> 
> --
> Like our community service? 💛
> Please consider donating at
> 
> https://desec.io/
> 
> deSEC e.V.
> Kyffhäuserstr. 5
> 10781 Berlin
> Germany
> 
> Vorstandsvorsitz: Nils Wisiol
> Registergericht: AG Berlin (Charlottenburg) VR 37525
> 
> _______________________________________________
> DNSOP mailing list -- dnsop@ietf.org
> To unsubscribe send an email to dnsop-leave@ietf.org