Re: [dnssd] SRP: name conflict while not knowing which name conflicts

Ted Lemon <mellon@fugue.com> Fri, 23 September 2022 12:56 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE369C14CE43 for <dnssd@ietfa.amsl.com>; Fri, 23 Sep 2022 05:56:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level:
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o4QGChX5rw_v for <dnssd@ietfa.amsl.com>; Fri, 23 Sep 2022 05:56:27 -0700 (PDT)
Received: from mail-ed1-x529.google.com (mail-ed1-x529.google.com [IPv6:2a00:1450:4864:20::529]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D7CD1C14CE32 for <dnssd@ietf.org>; Fri, 23 Sep 2022 05:56:27 -0700 (PDT)
Received: by mail-ed1-x529.google.com with SMTP id m3so59742eda.12 for <dnssd@ietf.org>; Fri, 23 Sep 2022 05:56:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20210112.gappssmtp.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=V1zpY7/vB9iQUUQb2g2L4rTUCU+QzV3wqSX/94cDS58=; b=kZC5+nWJclfPo3A9MwxPZaSWxe2wEnchpKye4G6lycpgMx3QUfkMXf04eu4Pn/IO/Y WxLl7Vpwx517RrLnE3bfTarf38A5oRana1HyGYaSMOyurKLe49Se+5HixazEdXZAgrGS Ro/p4ZSW3qgfzP1RaxeaAQfEZMADIBozTSiUbUBr3uB/PZKvm0PwzNdHciiHjNksMNaQ 7BeKeZe6W3Fm/CLv15gIa8wEGI90WpLAX5BOk72rGZVMV+63IByHlyGWHomfvMkKBUkw XXwH+3bTi1WvtTWEkoh1SlNd7lMnHojaKztJ6zKFAUUKWmptZPECSOWh/PwolYlbs39Q wOsw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=V1zpY7/vB9iQUUQb2g2L4rTUCU+QzV3wqSX/94cDS58=; b=5+goG306gBLGH+K66xFAb6HiWGfGRMq4aV4VXIYI/TtWbKRpvaHd8WwGVES24rAJJc ss2dv6pmJRQrqXAzCrhx+ZXSXb+wB8QSnzks26T1DQlAGGAjXWIa4YmEkilb5MbOBFrr tfSk5XSZwTWJmYi3KaGcAWsNrqmc7DhCY+mxqgCwfJR0GaEu1xK11Ypmp8ZHsVuaPHxu XcL2xLhv8ZhYM1fLHryNk+hYkWyx1PKTowfUjFGHdpSXik/V/OGuboxLeK+szu9Ybef9 3SN7evoHC4IKW02adSSk3s5NPS71un/RtsaXlQ2shRSO+sVmRGx5g/fvBsNQrzKsey/i OE+g==
X-Gm-Message-State: ACrzQf0OVnZeY9Nd5braciTGwTlHw/xau5VYWCS0I/0+W2NICEWeRe+A utQ9/ZArWhVnLqenumIqwGP+6tfnqW+pAnSL+ikKWJAcicg=
X-Google-Smtp-Source: AMsMyM6fCFxbGeIcilfVVWOJj7O32RGtDJuiujRnWJdcMeJTMoEhsLmiTgqH8MU4J3vGO0qI2WMNrepLAQPS6Sn6Tsg=
X-Received: by 2002:aa7:cada:0:b0:452:5b04:efd9 with SMTP id l26-20020aa7cada000000b004525b04efd9mr8161022edt.84.1663937785586; Fri, 23 Sep 2022 05:56:25 -0700 (PDT)
MIME-Version: 1.0
References: <DU0P190MB19780211A2F50F5E66BCE005FD519@DU0P190MB1978.EURP190.PROD.OUTLOOK.COM> <CAJ5Rr7Ys+bmFiP9j3ebptBEZHXX+6rzkTRaFHr7_mmgVZb9sZQ@mail.gmail.com> <DU0P190MB1978E63F6C69807759C10FD0FD519@DU0P190MB1978.EURP190.PROD.OUTLOOK.COM> <CADyWQ+EMf3XTLuZWupLNeGwQ8Gaqd-A7BvyAs4wK-fT7M5zk6Q@mail.gmail.com> <DU0P190MB19786D6BDA466AC9667087C9FD519@DU0P190MB1978.EURP190.PROD.OUTLOOK.COM>
In-Reply-To: <DU0P190MB19786D6BDA466AC9667087C9FD519@DU0P190MB1978.EURP190.PROD.OUTLOOK.COM>
From: Ted Lemon <mellon@fugue.com>
Date: Fri, 23 Sep 2022 08:56:13 -0400
Message-ID: <CAPt1N1k0si52gnCHz_A-coitbVG8AHovLaWpJXBaWiN3to0j+w@mail.gmail.com>
To: Esko Dijk <esko.dijk@iotconsultancy.nl>
Cc: Kangping Dong <wgtdkp@google.com>, Tim Wicinski <tjw.ietf@gmail.com>, "dnssd@ietf.org" <dnssd@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000a37d0d05e957b47a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnssd/NiNOWByjua1RptIyeZP0Z_MOZ0I>
Subject: Re: [dnssd] SRP: name conflict while not knowing which name conflicts
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Discussion of extensions to DNS-based service discovery for routed networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>, <mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>, <mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Sep 2022 12:56:31 -0000

Aargh. Thanks for catching this Eskimo, and thanks Kangping for remembering
the conversation. I had completely forgotten, although I recall it now of
course.

One problem with this approach is that it will not be the case that the SRP
server necessarily knows all of the names that are in conflict. So it can
certainly respond with a list of the names on which it found conflicts, but
the list might not be able to be made complete without more work. Do we
want to require it to do that work?

Op vr 23 sep. 2022 om 08:07 schreef Esko Dijk <esko.dijk@iotconsultancy.nl>

> Hi Tim,
>
>
>
> > I don't think an update to 2136 is needed here, as section 2.2.3.1
> describes the differences with an SRP registrations and 2136 Updates,
>
> but this response should be tested against a DNS update response.
>
>
>
> Clear, we can just add a bullet in 2.2.3.1 then as plain DNS Update isn’t
> updated by this draft.  What’s important then is that the server, when
> receiving a DNS Update that is not an SRP Update, will not use the new
> mechanism of including the conflicting record(s). Only do this for an SRP
> Update.
>
> And for testing: do you mean sending the “new” type of YXDomain response
> to a plain DNS Update client and see what happens?  That seems not
> necessary if the SRP registrar is careful in using the “new” response
> format only for SRP clients.
>
>
>
> Esko
>
>
>
>
>
> *From:* Tim Wicinski <tjw.ietf@gmail.com>
> *Sent:* Friday, September 23, 2022 12:28
> *To:* Esko Dijk <esko.dijk@iotconsultancy.nl>
> *Cc:* Kangping Dong <wgtdkp@google.com>; dnssd@ietf.org; Ted Lemon <
> mellon@fugue.com>
> *Subject:* Re: [dnssd] SRP: name conflict while not knowing which name
> conflicts
>
>
>
>
>
>
>
> On Fri, Sep 23, 2022 at 4:32 AM Esko Dijk <esko.dijk@iotconsultancy.nl>
> wrote:
>
> Thanks Kangping,
>
>
>
> It looks like including the conflicting name records in the Additional
> section is a good base solution and also easy to describe in the SRP draft,
> which does not impact the states & procedures of registrar and client.
>
> It’s just additional helpful information the client may use to compose the
> retry Update.  The part about renaming by the registrar, on behalf of the
> client, seems more tricky and may impact states & procedures which were
> just WGLC-reviewed now.
>
>
>
> If we use the Additional section for a YXDomain response, this may require
> a formal update of RFC 2136 (3.8) since DNS Update only allows a server to
> repeat all records in the (error) response or to exclude all records.
>
>
>
> Esko
>
>
>
>
>
> Esko,
>
>
>
> I don't think an update to 2136 is needed here, as section 2.2.3.1
> describes the differences with an SRP registrations and 2136 Updates,
>
> but this response should be tested against a DNS update response.
>
>
>
> Kangping, I believe this is your workflow description - I pasted it here
> to assist in my readings.
>
>
>
> 1. If a name has already been registered on the SRP server or a name conflict
> error is returned by the Advertising Proxy:
>
>     the SRP server responds with the RR that includes the conflicted name.
>
>     If the client sees such records, it knows the conflicts on the SRP
> server and will retry with a new name.
>
>
>
> 2. If a name conflict is reported to the SRP server after the SRP update transaction
> has been committed:
>
>     The next time the SRP client registers, the SRP server responds with
> a CNAME record which includes the new name.
>
>     If the client sees such records, it knows the conflict on the multicast
>  link and will accept the name or retry with another name.
>
>
>
> https://mailarchive.ietf.org/arch/msg/dnssd/cUJBXN9WXBguPKtTYgPYq4bo4pQ/
>
>
>
> Tim
>