Re: [dnssd] New Version Notification for draft-sctl-service-registration-02.txt

Tim Wicinski <tjw.ietf@gmail.com> Thu, 19 July 2018 14:15 UTC

Return-Path: <tjw.ietf@gmail.com>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 91271130FDC for <dnssd@ietfa.amsl.com>; Thu, 19 Jul 2018 07:15:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N3LHm1PMdc2M for <dnssd@ietfa.amsl.com>; Thu, 19 Jul 2018 07:15:03 -0700 (PDT)
Received: from mail-wr1-x434.google.com (mail-wr1-x434.google.com [IPv6:2a00:1450:4864:20::434]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F3041310CA for <dnssd@ietf.org>; Thu, 19 Jul 2018 07:15:02 -0700 (PDT)
Received: by mail-wr1-x434.google.com with SMTP id q10-v6so8249032wrd.4 for <dnssd@ietf.org>; Thu, 19 Jul 2018 07:15:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to; bh=9s2dzryjhSl0he2WmNyKGa0TM4xQiQwrcSM560xhaBg=; b=QoFZkYN8CPrU1UF8Dp79xijNmeUhN2IlHswNyzMvJMi731JYBLWgocc2ebqNnhZZ/n K33YwOntKYDcqQxce+yo2XiMf3HmqZpm38qxyakEKo8vCnJezGtAmGcJKTYB8mB4lyco qX+1jAyxZqAqBbxXmqYVrDiU5QIupRgDR0ZmVgyunQvDI9wvGSbJIhcVHopAUzpZFjB6 QonLTM5Ti4zShEbefAkYuzYi1Fnq2BokXFYY5vQ1w3xNZgwc7XGoqJej7YQb5kFo7Prb H6o2jAqaTZUBZ0cJm1mpt21xycG/CFNEQ9XsS3Fe4rxfWWkREYMEzbcbc4Cy5ycvKr3w pDFg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=9s2dzryjhSl0he2WmNyKGa0TM4xQiQwrcSM560xhaBg=; b=Hk8rK6NSJmzyNi77st018+v8JXC77jm78j8XiUto8OG27x16D/6VNJ/uojiszLKng0 M0PRjWMN1fGo5Ri+kSysh46MNwBLD2BfohRWpqdAgUjn0/KZIV+8KocgeCiVYdyEnZPU K5XI1Ntj9s0kLBBLdB0EHDjMvsOhp6W7nRUYO7jK44AktrmGQs4+f53DuspV3Om6TRQR +gAroKnhhPv+yHiCVe5DaIlAEYmRpGE76/OB97lT4FeZPzSllpohCvSlr6/EbEz/xx1S nLODAKjq8dajZGCC764hawaS0fq+cgjuTt/NzWf2qtdlFMBospHXOlDYihD11vWoh8tf FOqw==
X-Gm-Message-State: AOUpUlGZJRNGMFRcDwbd0gYn96CKZ3t6cytiIbnjNCnTofAN/kq8nWys L3Xp7RKt2aRBicV7vo6lPUwMOzdnZpg3J2jrcIUmrBu7s9M=
X-Google-Smtp-Source: AAOMgpcpZ4OMh6RQ7QmMFKif4I1N14I31ASY99vMczTvi8alJsTh5yCSSlGeOajzHJoSJeXDuZR0b5GKPz0EoVWU4Ps=
X-Received: by 2002:adf:9086:: with SMTP id i6-v6mr7344452wri.271.1532009700444; Thu, 19 Jul 2018 07:15:00 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:adf:a414:0:0:0:0:0 with HTTP; Thu, 19 Jul 2018 07:14:59 -0700 (PDT)
In-Reply-To: <CAPt1N1m0fioaRvm3xw2Cep6VsSr63=7qdKWtmfd0q=tOtk3N1g@mail.gmail.com>
References: <153168722035.21892.2695151923270049902.idtracker@ietfa.amsl.com> <CAPt1N1mYtPRxP6F-JwKbWey3r_vSaNP5srbkf314gdjfdNe8mw@mail.gmail.com> <87d0vn7b5t.fsf@toke.dk> <CALX6+rAjz2FtsQkhNyp=xYjXovUJUMN5Bg5iRHSWzMTJaZtCjg@mail.gmail.com> <CAPt1N1kODz72aHwF0z-uhYo4tojwsLEQJwLyzP8zeUYXduFkyQ@mail.gmail.com> <87a7qq6fdk.fsf@toke.dk> <CAPt1N1k59CM8WG4HoqXkG-crUEJbk+KNppX_pgkVFdwbSxNDpw@mail.gmail.com> <CAPt1N1khnMaRE2oe5WEQmonB8AJcLeBm=OB=i1trbEuc=XiL5Q@mail.gmail.com> <B88554CD-2117-44CC-ACA0-F5ACB3F48F88@bangj.com> <CAPt1N1=42Wum5x0s4dJZUB1t2i7g-UUJwcmWKQV5HMM5mAYyQQ@mail.gmail.com> <0542F0E1-88BB-4EF5-9897-CB608E5792C9@bangj.com> <CAPt1N1mrr=od-HBEDoS+Bs7fHuHj1Kc0HU-+6+NvhCyWDywYLg@mail.gmail.com> <CAPt1N1nFj5DpkRepLQ=Jmk=Spx87tNcfUMGyJRuAT=26givYKw@mail.gmail.com> <8BC77FD3-B2E6-4980-A315-7595D250C49E@bangj.com> <CA15413D-D7FB-4923-9B51-A824FF6598D5@bangj.com> <3D4620BB-19AA-4190-8F9E-76A613661CC8@bangj.com> <CAPt1N1=MjxTvzRZmrY7btR0NDoa3R9bzp4+wiaq2onUGqQi3XA@mail.gmail.com> <2931BCE2-75B0-48BB-8F0C-7FDF7B51376D@bangj.com> <A08B1A77-0F6B-4A5B-8671-05EA14B4E104@bangj.com> <CAPt1N1nYCH616Jn7V9Bb_QsrASpy3g2P77hJFvqP681JfZaK5Q@mail.gmail.com> <A24B2575-CCEE-4921-819F-B8E3CD60F128@bangj.com> <CAPt1N1kJQeGfOLXZBH4TSDqW+e8TcG=MpTxJhdszUXZHQP0W=A@mail.gmail.com> <CAPt1N1kZz4jyJBU_0T-jC6ZRtNTuRbUS9E533SjE=_E7DwCCkw@mail.gmail.com> <A5A866F8-938F-42FB-AB41-D8AB4C7C0066@bangj.com> <CAPt1N1kcW8-Em2xx4h8C8cWa9a_oTXeV8MV529_UwPqZjmX0Ew@mail.gmail.com> <B1DEAF18-D8E9-4B4E-A3DC-1B5362061407@bangj.com> <4C40C3A6-5871-4F44-8351-20948F5C5958@bangj.com> <CAPt1N1m0fioaRvm3xw2Cep6VsSr63=7qdKWtmfd0q=tOtk3N1g@mail.gmail.com>
From: Tim Wicinski <tjw.ietf@gmail.com>
Date: Thu, 19 Jul 2018 10:14:59 -0400
Message-ID: <CADyWQ+EWAWKUfeNXY16JhiFxtwn25wh6NWV=1pXayUsqivUVGw@mail.gmail.com>
To: dnssd <dnssd@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000fcce7405715acd23"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnssd/NHbQFXIkCPNwCSByESlRkx2KMZU>
Subject: Re: [dnssd] New Version Notification for draft-sctl-service-registration-02.txt
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "Discussion of extensions to DNS-based service discovery for routed networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>, <mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>, <mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 14:15:14 -0000

I've read this draft and I support its adoption.   One thing to add to the
document once it's adopted that any DNS naming involving _underscore names
addresses the new BCP from DNSOP draft-ietf-dnsop-attrleaf

Tim


On Thu, Jul 19, 2018 at 7:55 AM, Ted Lemon <mellon@fugue.com> wrote:

> The service registration domain is its own domain, not one of th link
> domains. Disambiguation is done in the UI. If there are two services in two
> different domains with the same name otherwise, these would appear in the
> UI with the same name, annotated with the link name. SRP names would follow
> the same convention.
>
> I think this is talked about in the service discovery broker document.
>
> On Thu, Jul 19, 2018 at 7:32 AM Tom Pusateri <pusateri@bangj.com> wrote:
>
>> And I think this is a general problem to solve for unicast updates, not
>> necessarily a SRP thing.
>>
>> For instance, while the discovery proxy separates IP subnets which a
>> unique subdomain to avoid collision, using regular unicast update to a
>> discovery proxy doesn’t know about IP subnet subdomains and uses a shared
>> namespace. The unicast name collision problem exists there too.
>>
>> I haven’t read the mDNS relay spec in detail enough to know if it
>> collapses the namespace or abides by the IP subnet subdomain separate
>> namespaces.
>>
>> But this may be something Stuart already solved. I’m just not aware of
>> the solution.
>>
>> Thanks,
>> Tom
>>
>>
>> On Jul 18, 2018, at 11:34 PM, Tom Pusateri <pusateri@bangj.com> wrote:
>>
>> Speaking of name changes, you may need to handle name collision in a
>> special way. Since devices can’t see other devices names, they can’t easily
>> create unique names. So if there are 10 light bulbs from the same vendor
>> all starting to register the instance name “light bulb”, the first will
>> succeed and the others get YXDOMAIN. The second one will realize the name
>> is taken but not know how to necessarily create a new name that is unique.
>> The tenth light bulb might go through 9 iterations before generating a
>> unique name. The traditional name collision avoidance mechanism with mDNS
>> of incrementing a numerical suffix doesn’t work very well when you don’t
>> know how many there are.
>>
>> It might be better to suggest a random suffix instead of a numerical one
>> or some other mechanism of generating unique names from the beginning. But
>> then they won’t look human readable so I don’t know if that is a
>> consideration.
>>
>> Thanks,
>> Tom
>>
>>
>>
>> On Jul 18, 2018, at 10:30 PM, Ted Lemon <mellon@fugue.com> wrote:
>>
>> Depends on how the name change happens, but sure.   If a device has a
>> name-change UI, it could use a very short update lease time, but the server
>> might override it.   I guess we could define an SRP delete message that
>> deletes all or part of a registration.
>>
>> On Wed, Jul 18, 2018 at 10:17 PM, Tom Pusateri <pusateri@bangj.com>
>> wrote:
>>
>>> So if a device changes it’s name, the old one could be around for a
>>> while along side the new name.
>>>
>>> That might be confusing.
>>>
>>> Tom
>>>
>>> On Jul 18, 2018, at 10:06 PM, Ted Lemon <mellon@fugue.com> wrote:
>>>
>>> Okay, I've pushed fixes for the last couple of issues you guys brought
>>> up.   I used _dnssd-srp._tcp instead of _dns-update._udp, but that's up for
>>> debate.
>>>
>>> https://github.com/StuartCheshire/draft-sctl-
>>> service-registration/commit/ce15160933b458a2da2346b6181ad89ed0ff1e11
>>>
>>> On Wed, Jul 18, 2018 at 9:36 PM, Ted Lemon <mellon@fugue.com> wrote:
>>>
>>>> Yes, that’s the correct behavior.
>>>>
>>>> On Wed, Jul 18, 2018 at 9:30 PM Tom Pusateri <pusateri@bangj.com>
>>>> wrote:
>>>>
>>>>> Yeah, that needs to be more explicit.
>>>>>
>>>>> If you try to do a delete, does the server send REFUSED?
>>>>>
>>>>> Thanks,
>>>>> Tom
>>>>>
>>>>> On Jul 18, 2018, at 8:27 PM, Ted Lemon <mellon@fugue.com> wrote:
>>>>>
>>>>> You can't delete anything from a service name.   Maybe we need to say
>>>>> that more explicitly.   Right now the protocol doesn't allow a service to
>>>>> delete itself; only to add itself.   The assumption is that the service
>>>>> will not know in advance that it is leaving the network, so service entries
>>>>> get garbage collected, rather than being explicitly deleted.   Compare to
>>>>> DHCPRELEASE in the DHCP protocol, which is pretty useless.
>>>>>
>>>>> On Wed, Jul 18, 2018 at 7:40 PM, Tom Pusateri <pusateri@bangj.com>
>>>>> wrote:
>>>>>
>>>>>> You might not need a new KEY record for the PTR but you may need to
>>>>>> follow the instance of the PTR to a KEY record to make sure you have
>>>>>> permission to delete the PTR record.
>>>>>>
>>>>>> Tom
>>>>>>
>>>>>>
>>>>>> On Jul 18, 2018, at 7:37 PM, Tom Pusateri <pusateri@bangj.com> wrote:
>>>>>>
>>>>>> Tim and I were talking and we were wondering if one client could
>>>>>> delete the PTR record for a service instance that another client created?
>>>>>> Seems like it’s not protected and could be a denial of service attack? So
>>>>>> you might need a KEY record the PTR record.
>>>>>>
>>>>>> Tom
>>>>>>
>>>>>> On Jul 18, 2018, at 1:08 PM, Ted Lemon <mellon@fugue.com> wrote:
>>>>>>
>>>>>> Hm, you're right, that's never stated explicitly.
>>>>>>
>>>>>> On Wed, Jul 18, 2018 at 12:48 PM, Tom Pusateri <pusateri@bangj.com>
>>>>>> wrote:
>>>>>>
>>>>>>> I don’t see anywhere in the document where the anycast update method
>>>>>>> relies on UDP.
>>>>>>>
>>>>>>> Tom
>>>>>>>
>>>>>>>
>>>>>>> On Jul 18, 2018, at 12:27 PM, Ted Lemon <mellon@fugue.com> wrote:
>>>>>>>
>>>>>>> Of course, you still have a very good point in that the anycast
>>>>>>> update method relies on UDP, so sending the key multiple times isn't
>>>>>>> desirable.   But I also don't see a way around this.   We could have the
>>>>>>> server replicate the key, I guess.
>>>>>>>
>>>>>>> On Wed, Jul 18, 2018 at 12:25 PM, Tom Pusateri <pusateri@bangj.com>
>>>>>>> wrote:
>>>>>>>
>>>>>>>> Just saw this in Section 2: "By requiring the use of TCP, the
>>>>>>>> possibility of off-network spoofing is eliminated”. So requiring TCP is
>>>>>>>> already handled.
>>>>>>>>
>>>>>>>> Searching for _dns-update._udp.<domain> still seems odd but that’s
>>>>>>>> been going on for a while a presume.
>>>>>>>>
>>>>>>>> Tom
>>>>>>>>
>>>>>>>>
>>>>>>>> On Jul 18, 2018, at 12:15 PM, Tom Pusateri <pusateri@bangj.com>
>>>>>>>> wrote:
>>>>>>>>
>>>>>>>> Looking in the IANA registry, dns-update isn’t assigned for TCP. So
>>>>>>>> either you search for _dns-update._udp.<domain> and use TCP or you
>>>>>>>> register _tcp.
>>>>>>>>
>>>>>>>> And while you could use an EDNS(0) OPT RR to set the maximum UDP
>>>>>>>> packet size larger than 512, you probably wouldn’t want to set it larger
>>>>>>>> than the MTU and 1480 isn’t big enough for 3 KEYs plus other records.
>>>>>>>>
>>>>>>>> Tom
>>>>>>>>
>>>>>>>> On Jul 18, 2018, at 12:05 PM, Tom Pusateri <pusateri@bangj.com>
>>>>>>>> wrote:
>>>>>>>>
>>>>>>>> If you are adding more KEY records, you will certainly exceed the
>>>>>>>> UDP update size of 512 bytes. The draft doesn’t mention transport but maybe
>>>>>>>> this should be restricted to TCP.
>>>>>>>> The draft does mention searching for the update server using
>>>>>>>> _dns-update._udp.<domain>. But then it won’t be able to use UDP
>>>>>>>> for updates.
>>>>>>>>
>>>>>>>> Thanks,
>>>>>>>> Tom
>>>>>>>>
>>>>>>>> On Jul 17, 2018, at 4:12 PM, Ted Lemon <mellon@fugue.com> wrote:
>>>>>>>>
>>>>>>>> Tim pointed out that we need to protect the Service Instance Name
>>>>>>>> as well as the Host Description with a KEY record, because FCFS naming has
>>>>>>>> to protect both the service description and the host description.   Here
>>>>>>>> are the changes:
>>>>>>>>
>>>>>>>> https://github.com/StuartCheshire/draft-sctl-
>>>>>>>> service-registration/compare/ae53618d8231733701ccdda4d33669
>>>>>>>> 2a529c9f6b...5c85181881b84ed1132d544e157df8da85874597
>>>>>>>>
>>>>>>>> On Mon, Jul 16, 2018 at 6:42 PM, Ted Lemon <mellon@fugue.com>
>>>>>>>> wrote:
>>>>>>>>
>>>>>>>>> The question of whether we update RFC6763 is basically "is there
>>>>>>>>> text that is in RFC6763 that is no longer correct because of this
>>>>>>>>> document."  I think the answer is no.
>>>>>>>>>
>>>>>>>>> On Mon, Jul 16, 2018 at 6:41 PM, Tom Pusateri <pusateri@bangj.com>
>>>>>>>>> wrote:
>>>>>>>>>
>>>>>>>>>> Ok, just checking. So given that 6763 semi-defines service
>>>>>>>>>> registration protocol as DNS Dynamic Update, should this document claim it
>>>>>>>>>> updates 6763?
>>>>>>>>>>
>>>>>>>>>> Thanks,
>>>>>>>>>> Tom
>>>>>>>>>>
>>>>>>>>>> On Jul 16, 2018, at 6:01 PM, Ted Lemon <mellon@fugue.com> wrote:
>>>>>>>>>>
>>>>>>>>>> The title of RFC 6763 is DNS-Based Service Discovery.   So I
>>>>>>>>>> tried to harmonize the document toward that—did I miss something?
>>>>>>>>>>
>>>>>>>>>> On Mon, Jul 16, 2018 at 5:59 PM, Tom Pusateri <pusateri@bangj.com
>>>>>>>>>> > wrote:
>>>>>>>>>>
>>>>>>>>>>> How is DNS-Based Service Discovery different from DNS Service
>>>>>>>>>>> Discovery?
>>>>>>>>>>>
>>>>>>>>>>> Is this meant to distinguish from RFC 6763?
>>>>>>>>>>>
>>>>>>>>>>> Thanks,
>>>>>>>>>>> Tom
>>>>>>>>>>>
>>>>>>>>>>> On Jul 16, 2018, at 5:46 PM, Ted Lemon <mellon@fugue.com> wrote:
>>>>>>>>>>>
>>>>>>>>>>> BTW, the current version of the document on github now includes
>>>>>>>>>>> fixes for all the points that have been raised other than the ones I said I
>>>>>>>>>>> wasn't going to fix: https://github.com/
>>>>>>>>>>> StuartCheshire/draft-sctl-service-registration
>>>>>>>>>>>
>>>>>>>>>>> On Mon, Jul 16, 2018 at 5:29 PM, Ted Lemon <mellon@fugue.com>
>>>>>>>>>>> wrote:
>>>>>>>>>>>
>>>>>>>>>>>> On Mon, Jul 16, 2018 at 5:27 PM, Toke Høiland-Jørgensen <
>>>>>>>>>>>> toke@toke.dk> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>>> Ted Lemon <mellon@fugue.com> writes:
>>>>>>>>>>>>>
>>>>>>>>>>>>> Why can't it be just a Host Description? Might be useful for a
>>>>>>>>>>>>> device
>>>>>>>>>>>>> that just wants to register its name but doesn't (currently,
>>>>>>>>>>>>> or ever)
>>>>>>>>>>>>> advertise any services...
>>>>>>>>>>>>>
>>>>>>>>>>>>> Good question.   What does the working group think?   :)
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>> _______________________________________________
>>>>>>>>>>> dnssd mailing list
>>>>>>>>>>> dnssd@ietf.org
>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/dnssd
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>> _______________________________________________
>>>>>>>>>> dnssd mailing list
>>>>>>>>>> dnssd@ietf.org
>>>>>>>>>> https://www.ietf.org/mailman/listinfo/dnssd
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> dnssd mailing list
>>>>>>>> dnssd@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/dnssd
>>>>>>>>
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> dnssd mailing list
>>>>>>>> dnssd@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/dnssd
>>>>>>>>
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> dnssd mailing list
>>>>>>>> dnssd@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/dnssd
>>>>>>>> <https://www.ietf...org/mailman/listinfo/dnssd>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> dnssd mailing list
>>>>>>> dnssd@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/dnssd
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>
>>>>>> _______________________________________________
>>>>>> dnssd mailing list
>>>>>> dnssd@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/dnssd
>>>>>>
>>>>>>
>>>>>>
>>>>>
>>>
>> _______________________________________________
>> dnssd mailing list
>> dnssd@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnssd
>>
>>
>> _______________________________________________
>> dnssd mailing list
>> dnssd@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnssd
>>
>>
>>
> _______________________________________________
> dnssd mailing list
> dnssd@ietf.org
> https://www.ietf.org/mailman/listinfo/dnssd
>
>