Re: [dnssd] SRP: Name Conflicts Handling
Kangping Dong <wgtdkp@google.com> Sun, 24 January 2021 06:05 UTC
Return-Path: <wgtdkp@google.com>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 8ACE53A0CB8
for <dnssd@ietfa.amsl.com>; Sat, 23 Jan 2021 22:05:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -16.971
X-Spam-Level:
X-Spam-Status: No, score=-16.971 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.373, DKIM_SIGNED=0.1,
DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,
ENV_AND_HDR_SPF_MATCH=-0.5, HK_RANDOM_ENVFROM=0.001,
HK_RANDOM_FROM=0.998, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001,
SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001,
USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5]
autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
header.d=google.com
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id UEmeySkrTZKl for <dnssd@ietfa.amsl.com>;
Sat, 23 Jan 2021 22:05:30 -0800 (PST)
Received: from mail-yb1-xb29.google.com (mail-yb1-xb29.google.com
[IPv6:2607:f8b0:4864:20::b29])
(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id CEEE23A0CB5
for <dnssd@ietf.org>; Sat, 23 Jan 2021 22:05:30 -0800 (PST)
Received: by mail-yb1-xb29.google.com with SMTP id p185so9948634ybg.8
for <dnssd@ietf.org>; Sat, 23 Jan 2021 22:05:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025;
h=mime-version:references:in-reply-to:from:date:message-id:subject:to
:cc; bh=6KUAS9MSJredKwVzRtjcA3lYNUeJw40Y5VZOlp8jIbQ=;
b=XLvCBRcMK93fEZ5bNsd2nZY3DtuptQAa7v8BklFhb4LbdL9rrTv0uV0oGXRRrRHR/2
H96lb/5VjUeNVdndsiM2Q5rGuaiAeSrpVQYzrRK7VjKlPUGiAZWx55V+x/07ERTLCeak
jmkcHbWqbBapdc9tHGRbKQ7tLdQV3K1rawGYq7kfsW7e/+hFH1ESZIlpj2nq7ZylSBYL
5K+mzTKyQmsDb3wjtqh8GPvM5b7ihZYrPK1rD/7Si5csyPgCIqWpeZi0DySisZQdiVSy
9hnboZKHRISSrxwTccqM+iiddzj33GTfBeXmZ9VJDmk8UE0B7oRWCwcpxxaVkBbbFpfj
yCgQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:mime-version:references:in-reply-to:from:date
:message-id:subject:to:cc;
bh=6KUAS9MSJredKwVzRtjcA3lYNUeJw40Y5VZOlp8jIbQ=;
b=PHNnXP+OeICbHO4fU91mHJQWet7G/Ee67f5MOTmryi5wid/4NIqFnomGBG0y80VfPj
xuURlJkZQWqi7xu7Zgndye9FHSMJXBdMFT67nCVI+31dIYCVWRxiR4jC9ojOsMTBh9fD
BPAdIePMLQf6JegOZmTdrFWgb6RTGfgaz5VGvIXs7nRnrHlfbe+z9DszXC+bslOT9NMS
OZ7n+AwyXc7Q60N9Q024R2eKCCY61Bj1I7oLrOCZWPxWxwXjX4C7S7TdSC0/8iLQFYgj
fYT+VC5M65vmKfknTKHBpaZl0QKYrwbr7P5z4iQ8Wp46fe1dxuukWcqym/edg9lES19I
7iDw==
X-Gm-Message-State: AOAM530A+883+MthDofzS2bCV7GV4DNySc2io0fjYfjEkah7p6WhfAhH
BKsFHY1DrIDz+zxh+oKTavp3Xl+KET3zz2KpOEh1Ew==
X-Google-Smtp-Source: ABdhPJzIvRNQyPlZ4k+n56G/N5BtVg9kCERop9ZaN1GMX9GF0V4RhNFoaXR8ieZk9YQaej3aYFe8U44Wf/1lDHjNI8I=
X-Received: by 2002:a25:c50a:: with SMTP id v10mr17108766ybe.276.1611468329484;
Sat, 23 Jan 2021 22:05:29 -0800 (PST)
MIME-Version: 1.0
References: <CAJ5Rr7Zc-Yma9EVXw1OeEKP+H1ZkPxB48Q5U45zoERX7=gNLJA@mail.gmail.com>
<C224E9B3-EA9F-4A49-B73C-96F3D147B1E4@fugue.com>
<CAJ5Rr7bXLiZJ=5Q-nYn2hWb2QSGzpJACv8b12BPqyTa1wJQVnA@mail.gmail.com>
<0A1488E9-BFB8-4E82-815B-EF1F2A40B35E@fugue.com>
<CAJ5Rr7ZZ22YCCszxjXCExgDjyBN18YKZzdnCe1bTHUDhmC7qtg@mail.gmail.com>
<700C359B-B9D1-4A1E-A7B2-1ACA0AF224C5@fugue.com>
<CAJ5Rr7Zy_7SD4gxuQsD6O_OAqQpZ2r5Q9fsLFE8vL_6XFTjo+Q@mail.gmail.com>
<BA9F1636-409F-4581-BBC8-27F960BA63D2@fugue.com>
In-Reply-To: <BA9F1636-409F-4581-BBC8-27F960BA63D2@fugue.com>
From: Kangping Dong <wgtdkp@google.com>
Date: Sun, 24 Jan 2021 14:04:53 +0800
Message-ID: <CAJ5Rr7b-+hRsy3VWBxM2Lvma+WchY+WE5MU5c9f67fhZVf1icA@mail.gmail.com>
To: Ted Lemon <mellon@fugue.com>
Cc: DNSSD <dnssd@ietf.org>, Jonathan Hui <jonhui@google.com>,
Abtin Keshavarzian <abtink@google.com>, Yakun Xu <xyk@google.com>,
Rongli Sun <rongli@google.com>, Simon Lin <simonlin@google.com>
Content-Type: multipart/alternative; boundary="0000000000005943cb05b99f35e3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnssd/KO49rWQVDrJ0l364dDtGthGu2RE>
Subject: Re: [dnssd] SRP: Name Conflicts Handling
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion of extensions to DNS-based service discovery for routed
networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>,
<mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>,
<mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 24 Jan 2021 06:05:33 -0000
okay, the workflow almost works for me, just a small question. For case 2, when the Advertising Proxy detects a name conflict on the multicast link, it choses a new name and informs the SRP server the new name. Before the client refreshes its service registration, how should the SRP server/Border Router respond to a DNS query for the original name? I think the BR will reject the query with some error like *RESOURCE_NOT_FOUND* / *NAME_NOT_FOUND*, as the service has already been renamed but just the client hasn't been notified yet. right? On Fri, Jan 22, 2021 at 10:52 PM Ted Lemon <mellon@fugue.com> wrote: > I think that’s a good description of the solution, yes. > > On Jan 22, 2021, at 1:02 AM, Kangping Dong <wgtdkp@google.com> wrote: > > To make sure if I correctly understand how this works, let me explain how > a SRP client will handle name conflicts: > 1. If a name has already been registered on the SRP server or a name > conflict error is returned by the Advertising Proxy: > the SRP server responds with the RR that includes the conflicted name. > If the client sees such records, it knows the conflicts > on the SRP server and will retry with a new name. > 2. If a name conflict is reported to the SRP server after the SRP update > transaction has been committed: > The next time the SRP client registers, the SRP server responds > with a CNAME record which includes the new name. > If the client sees such records, it knows the conflict on the > multicast link and will accept the name or retry with another name. > > Am I correct about the workflow? > > > On Fri, Jan 22, 2021 at 12:11 AM Ted Lemon <mellon@fugue.com> wrote: > >> On Jan 21, 2021, at 12:27 AM, Kangping Dong <wgtdkp@google.com> wrote: >> >> Option (1) also looks good to me. But what are the RRs that should be >> included in the response? SRV RR for service instance name and AAAA/A RR >> for host name? >> >> >> Yes, I think that makes sense. These unambiguously indicate what type of >> update failed. Which brings up the question of what RRtype to use for >> renaming. CNAME? >> >> >
- [dnssd] SRP: Name Conflicts Handling Kangping Dong
- Re: [dnssd] SRP: Name Conflicts Handling Ted Lemon
- Re: [dnssd] SRP: Name Conflicts Handling Kangping Dong
- Re: [dnssd] SRP: Name Conflicts Handling Ted Lemon
- Re: [dnssd] SRP: Name Conflicts Handling Kangping Dong
- Re: [dnssd] SRP: Name Conflicts Handling Ted Lemon
- Re: [dnssd] SRP: Name Conflicts Handling Kangping Dong
- Re: [dnssd] SRP: Name Conflicts Handling Ted Lemon
- Re: [dnssd] SRP: Name Conflicts Handling Kangping Dong
- Re: [dnssd] SRP: Name Conflicts Handling Ted Lemon
- Re: [dnssd] SRP: Name Conflicts Handling Kangping Dong
- Re: [dnssd] SRP: Name Conflicts Handling Ted Lemon
- Re: [dnssd] SRP: Name Conflicts Handling Kangping Dong