Re: [dnssd] SRP: Name Conflicts Handling

Kangping Dong <wgtdkp@google.com> Sun, 24 January 2021 06:05 UTC

Return-Path: <wgtdkp@google.com>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8ACE53A0CB8 for <dnssd@ietfa.amsl.com>; Sat, 23 Jan 2021 22:05:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -16.971
X-Spam-Level:
X-Spam-Status: No, score=-16.971 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.373, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=0.998, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UEmeySkrTZKl for <dnssd@ietfa.amsl.com>; Sat, 23 Jan 2021 22:05:30 -0800 (PST)
Received: from mail-yb1-xb29.google.com (mail-yb1-xb29.google.com [IPv6:2607:f8b0:4864:20::b29]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CEEE23A0CB5 for <dnssd@ietf.org>; Sat, 23 Jan 2021 22:05:30 -0800 (PST)
Received: by mail-yb1-xb29.google.com with SMTP id p185so9948634ybg.8 for <dnssd@ietf.org>; Sat, 23 Jan 2021 22:05:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=6KUAS9MSJredKwVzRtjcA3lYNUeJw40Y5VZOlp8jIbQ=; b=XLvCBRcMK93fEZ5bNsd2nZY3DtuptQAa7v8BklFhb4LbdL9rrTv0uV0oGXRRrRHR/2 H96lb/5VjUeNVdndsiM2Q5rGuaiAeSrpVQYzrRK7VjKlPUGiAZWx55V+x/07ERTLCeak jmkcHbWqbBapdc9tHGRbKQ7tLdQV3K1rawGYq7kfsW7e/+hFH1ESZIlpj2nq7ZylSBYL 5K+mzTKyQmsDb3wjtqh8GPvM5b7ihZYrPK1rD/7Si5csyPgCIqWpeZi0DySisZQdiVSy 9hnboZKHRISSrxwTccqM+iiddzj33GTfBeXmZ9VJDmk8UE0B7oRWCwcpxxaVkBbbFpfj yCgQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=6KUAS9MSJredKwVzRtjcA3lYNUeJw40Y5VZOlp8jIbQ=; b=PHNnXP+OeICbHO4fU91mHJQWet7G/Ee67f5MOTmryi5wid/4NIqFnomGBG0y80VfPj xuURlJkZQWqi7xu7Zgndye9FHSMJXBdMFT67nCVI+31dIYCVWRxiR4jC9ojOsMTBh9fD BPAdIePMLQf6JegOZmTdrFWgb6RTGfgaz5VGvIXs7nRnrHlfbe+z9DszXC+bslOT9NMS OZ7n+AwyXc7Q60N9Q024R2eKCCY61Bj1I7oLrOCZWPxWxwXjX4C7S7TdSC0/8iLQFYgj fYT+VC5M65vmKfknTKHBpaZl0QKYrwbr7P5z4iQ8Wp46fe1dxuukWcqym/edg9lES19I 7iDw==
X-Gm-Message-State: AOAM530A+883+MthDofzS2bCV7GV4DNySc2io0fjYfjEkah7p6WhfAhH BKsFHY1DrIDz+zxh+oKTavp3Xl+KET3zz2KpOEh1Ew==
X-Google-Smtp-Source: ABdhPJzIvRNQyPlZ4k+n56G/N5BtVg9kCERop9ZaN1GMX9GF0V4RhNFoaXR8ieZk9YQaej3aYFe8U44Wf/1lDHjNI8I=
X-Received: by 2002:a25:c50a:: with SMTP id v10mr17108766ybe.276.1611468329484; Sat, 23 Jan 2021 22:05:29 -0800 (PST)
MIME-Version: 1.0
References: <CAJ5Rr7Zc-Yma9EVXw1OeEKP+H1ZkPxB48Q5U45zoERX7=gNLJA@mail.gmail.com> <C224E9B3-EA9F-4A49-B73C-96F3D147B1E4@fugue.com> <CAJ5Rr7bXLiZJ=5Q-nYn2hWb2QSGzpJACv8b12BPqyTa1wJQVnA@mail.gmail.com> <0A1488E9-BFB8-4E82-815B-EF1F2A40B35E@fugue.com> <CAJ5Rr7ZZ22YCCszxjXCExgDjyBN18YKZzdnCe1bTHUDhmC7qtg@mail.gmail.com> <700C359B-B9D1-4A1E-A7B2-1ACA0AF224C5@fugue.com> <CAJ5Rr7Zy_7SD4gxuQsD6O_OAqQpZ2r5Q9fsLFE8vL_6XFTjo+Q@mail.gmail.com> <BA9F1636-409F-4581-BBC8-27F960BA63D2@fugue.com>
In-Reply-To: <BA9F1636-409F-4581-BBC8-27F960BA63D2@fugue.com>
From: Kangping Dong <wgtdkp@google.com>
Date: Sun, 24 Jan 2021 14:04:53 +0800
Message-ID: <CAJ5Rr7b-+hRsy3VWBxM2Lvma+WchY+WE5MU5c9f67fhZVf1icA@mail.gmail.com>
To: Ted Lemon <mellon@fugue.com>
Cc: DNSSD <dnssd@ietf.org>, Jonathan Hui <jonhui@google.com>, Abtin Keshavarzian <abtink@google.com>, Yakun Xu <xyk@google.com>, Rongli Sun <rongli@google.com>, Simon Lin <simonlin@google.com>
Content-Type: multipart/alternative; boundary="0000000000005943cb05b99f35e3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnssd/KO49rWQVDrJ0l364dDtGthGu2RE>
Subject: Re: [dnssd] SRP: Name Conflicts Handling
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion of extensions to DNS-based service discovery for routed networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>, <mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>, <mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 24 Jan 2021 06:05:33 -0000

okay, the workflow almost works for me, just a small question. For case 2,
when the Advertising Proxy detects a name conflict on the multicast link,
it choses a new name and informs the SRP server the new name. Before the
client refreshes its service registration, how should the SRP server/Border
Router
respond to a DNS query for the original name? I think the BR will reject
the query with some error like *RESOURCE_NOT_FOUND* / *NAME_NOT_FOUND*, as
the
service has already been renamed but just the client hasn't
been notified yet. right?

On Fri, Jan 22, 2021 at 10:52 PM Ted Lemon <mellon@fugue.com> wrote:

> I think that’s a good description of the solution, yes.
>
> On Jan 22, 2021, at 1:02 AM, Kangping Dong <wgtdkp@google.com> wrote:
>
> To make sure if I correctly understand how this works, let me explain how
> a SRP client will handle name conflicts:
> 1. If a name has already been registered on the SRP server or a name
> conflict error is returned by the Advertising Proxy:
>     the SRP server responds with the RR that includes the conflicted name.
> If the client sees such records, it knows the conflicts
>    on the SRP server and will retry with a new name.
> 2. If a name conflict is reported to the SRP server after the SRP update
> transaction has been committed:
>     The next time the SRP client registers, the SRP server responds
> with a CNAME record which includes the new name.
>     If the client sees such records, it knows the conflict on the
> multicast link and will accept the name or retry with another name.
>
> Am I correct about the workflow?
>
>
> On Fri, Jan 22, 2021 at 12:11 AM Ted Lemon <mellon@fugue.com> wrote:
>
>> On Jan 21, 2021, at 12:27 AM, Kangping Dong <wgtdkp@google.com> wrote:
>>
>> Option (1) also looks good to me. But what are the RRs that should be
>> included in the response? SRV RR for service instance name and AAAA/A RR
>> for host name?
>>
>>
>> Yes, I think that makes sense. These unambiguously indicate what type of
>> update failed. Which brings up the question of what RRtype to use for
>> renaming. CNAME?
>>
>>
>