Re: [dnssd] SRP: Name Conflicts Handling

Ted Lemon <mellon@fugue.com> Sun, 24 January 2021 15:59 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC7743A0DE1 for <dnssd@ietfa.amsl.com>; Sun, 24 Jan 2021 07:59:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dqkjNQlWMilA for <dnssd@ietfa.amsl.com>; Sun, 24 Jan 2021 07:59:00 -0800 (PST)
Received: from mail-qt1-x833.google.com (mail-qt1-x833.google.com [IPv6:2607:f8b0:4864:20::833]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EEB563A0DDF for <dnssd@ietf.org>; Sun, 24 Jan 2021 07:58:59 -0800 (PST)
Received: by mail-qt1-x833.google.com with SMTP id l23so5429604qtq.13 for <dnssd@ietf.org>; Sun, 24 Jan 2021 07:58:59 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20150623.gappssmtp.com; s=20150623; h=content-transfer-encoding:from:mime-version:subject:date:message-id :references:cc:in-reply-to:to; bh=nh1ACxDuMEGvn61F/mu9BecSOIY3jngE1XS4MMM8kxc=; b=JpxtJ0kIMrCQzFJUaCnaDP8X/m4phV3uik//2gQq/1/xymjXlLiVKAe/aY/k1N17r9 gJf3mVXpXZa2Ptk0XNVEWiaHsoSBK2veaYPd6kSb8sRsHnY+Kpn2719bPoy4kY0UpA6z ZJXXpt+6NEAKIwzkktfRuCdqwgM4GpXXCt6HdCMKLo3kz0Rxtg4q9X2EXwqLwOosxtiy KZZvgMuhBPTZwNWUj0Z4OPtepbtkjpV+PeyoQTpv6tl8BtrHRBGy6JDxa7d6N//JHVwu K293iP+hqBk+ppN9MDaNDP7z0kY4js+t7ZuvoKFofV7fj7FAaYehMF1PALQw/MnAKoQZ errw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:content-transfer-encoding:from:mime-version :subject:date:message-id:references:cc:in-reply-to:to; bh=nh1ACxDuMEGvn61F/mu9BecSOIY3jngE1XS4MMM8kxc=; b=ZHgeXKmxYeFHZSjXeO+JkICfJIivBApa0XpKn+P55qUvIh7rjjphEku1MhyZPMOxVH Iy0FFqh+Qx5GJsOQFYKJVv0iGbakBwOYZ0pZyKWB/m2KoCGQHGe2sZd+utLksm8Mg9EM +Jsa9XQ5bfemLxKE4rSyQwn0Fh7eu3B/PeSiDMplBaqx9ufLhaE9+DuOYW0DD9QBYhJE 5hzaK4scGhOqh9VWfTks2gfWSzk2ueaYpGh0PZzcwemjnTRogeVvyfecee7XSdWaopPr O/WCOiyO93Xhh88nvlEp4lBlaEEusZpdwN3T6W8EA9jxPgwfIj/IZrsOwk4rbujQ0bfe jNAw==
X-Gm-Message-State: AOAM531vddMf+63oF5HLdkOHGIWvqJH3YS7zNKVd3RNCb4PDBEndhWJ8 LESCkifVPnNwtAwran5DszAjHX38RPCZCA==
X-Google-Smtp-Source: ABdhPJztFmsLY92kWKuhxLfFmyzTLCeL+X61uUIkHhjgSgETwyfFDaNiXi26HfdCObme+uRl3UHnNg==
X-Received: by 2002:ac8:1699:: with SMTP id r25mr3869039qtj.302.1611503938756; Sun, 24 Jan 2021 07:58:58 -0800 (PST)
Received: from [192.168.4.114] (c-24-91-177-160.hsd1.ma.comcast.net. [24.91.177.160]) by smtp.gmail.com with ESMTPSA id 193sm4465359qko.5.2021.01.24.07.58.57 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 24 Jan 2021 07:58:58 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail-6B542A17-346F-4E68-9234-8094B198251C"
Content-Transfer-Encoding: 7bit
From: Ted Lemon <mellon@fugue.com>
Mime-Version: 1.0 (1.0)
Date: Sun, 24 Jan 2021 10:58:56 -0500
Message-Id: <B6F5EF72-5638-41F6-99E9-68FED1A1D7E6@fugue.com>
References: <CAJ5Rr7b-+hRsy3VWBxM2Lvma+WchY+WE5MU5c9f67fhZVf1icA@mail.gmail.com>
Cc: DNSSD <dnssd@ietf.org>, Jonathan Hui <jonhui@google.com>, Abtin Keshavarzian <abtink@google.com>, Yakun Xu <xyk@google.com>, Rongli Sun <rongli@google.com>, Simon Lin <simonlin@google.com>
In-Reply-To: <CAJ5Rr7b-+hRsy3VWBxM2Lvma+WchY+WE5MU5c9f67fhZVf1icA@mail.gmail.com>
To: Kangping Dong <wgtdkp@google.com>
X-Mailer: iPhone Mail (18E118)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnssd/geZC5IO-_Af9D4GPdKgv1Q3udTo>
Subject: Re: [dnssd] SRP: Name Conflicts Handling
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion of extensions to DNS-based service discovery for routed networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>, <mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>, <mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 24 Jan 2021 15:59:02 -0000

If there is a name conflict, it’s because the name is in use. This will never happen if the srp server is an authoritative name server: in this case there is only one source of truth.

It will only happen if the underlying service is an unauthenticated distributed service like mDNS. So in this case we rely on the definition of that service to say what will be done. I believe this is discussed in rfc 6762 for mDNS. 

> On Jan 24, 2021, at 01:05, Kangping Dong <wgtdkp@google.com> wrote:
> 
> 
> okay, the workflow almost works for me, just a small question. For case 2, when the Advertising Proxy detects a name conflict on the multicast link,
> it choses a new name and informs the SRP server the new name. Before the client refreshes its service registration, how should the SRP server/Border Router
> respond to a DNS query for the original name? I think the BR will reject the query with some error like RESOURCE_NOT_FOUND / NAME_NOT_FOUND, as the
> service has already been renamed but just the client hasn't been notified yet. right?
> 
>> On Fri, Jan 22, 2021 at 10:52 PM Ted Lemon <mellon@fugue.com> wrote:
>> I think that’s a good description of the solution, yes.
>> 
>>> On Jan 22, 2021, at 1:02 AM, Kangping Dong <wgtdkp@google.com> wrote:
>>> 
>>> To make sure if I correctly understand how this works, let me explain how a SRP client will handle name conflicts:
>>> 1. If a name has already been registered on the SRP server or a name conflict error is returned by the Advertising Proxy:
>>>     the SRP server responds with the RR that includes the conflicted name. If the client sees such records, it knows the conflicts
>>>    on the SRP server and will retry with a new name.
>>> 2. If a name conflict is reported to the SRP server after the SRP update transaction has been committed:
>>>     The next time the SRP client registers, the SRP server responds with a CNAME record which includes the new name.
>>>     If the client sees such records, it knows the conflict on the multicast link and will accept the name or retry with another name.
>>> 
>>> Am I correct about the workflow?
>>> 
>>> 
>>> On Fri, Jan 22, 2021 at 12:11 AM Ted Lemon <mellon@fugue.com> wrote:
>>>>> On Jan 21, 2021, at 12:27 AM, Kangping Dong <wgtdkp@google.com> wrote:
>>>>> Option (1) also looks good to me. But what are the RRs that should be included in the response? SRV RR for service instance name and AAAA/A RR for host name?
>>>> 
>>>> Yes, I think that makes sense. These unambiguously indicate what type of update failed. Which brings up the question of what RRtype to use for renaming. CNAME?
>>>> 
>>