Re: [dnsext] SRV and wildcard CNAME

Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp> Mon, 21 February 2011 00:52 UTC

Return-Path: <dnsext-bounces@ietf.org>
X-Original-To: namedroppers-archive-gleetwall6@lists.ietf.org
Delivered-To: ietfarch-namedroppers-archive-gleetwall6@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 87A0A3A6D4D; Sun, 20 Feb 2011 16:52:08 -0800 (PST)
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4637E3A6D4D for <dnsext@core3.amsl.com>; Sun, 20 Feb 2011 16:52:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.101
X-Spam-Level:
X-Spam-Status: No, score=-0.101 tagged_above=-999 required=5 tests=[AWL=-0.011, BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KwpXxOVMCDkc for <dnsext@core3.amsl.com>; Sun, 20 Feb 2011 16:52:06 -0800 (PST)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by core3.amsl.com (Postfix) with SMTP id 2A1063A6CC3 for <dnsext@ietf.org>; Sun, 20 Feb 2011 16:52:05 -0800 (PST)
Received: (qmail 16595 invoked from network); 21 Feb 2011 01:04:03 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 21 Feb 2011 01:04:03 -0000
Message-ID: <4D61B702.7060902@necom830.hpcl.titech.ac.jp>
Date: Mon, 21 Feb 2011 09:51:14 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; ja; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: Phillip Hallam-Baker <hallam@gmail.com>
References: <20110216032120.43474.qmail@joyce.lan> <alpine.LSU.2.00.1102161143180.5244@hermes-1.csi.cam.ac.uk> <20110216212930.57D64A3F344@drugs.dv.isc.org> <4D5D24F3.70206@gis.net> <20110217231720.1FCF3A49096@drugs.dv.isc.org> <4D5E08E4.8060106@necom830.hpcl.titech.ac.jp> <AANLkTikjBvndD91q1jQeU9Q45qZyJbBs8t_wZkFezSfa@mail.gmail.com>
In-Reply-To: <AANLkTikjBvndD91q1jQeU9Q45qZyJbBs8t_wZkFezSfa@mail.gmail.com>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] SRV and wildcard CNAME
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: dnsext-bounces@ietf.org
Errors-To: dnsext-bounces@ietf.org

Phillip Hallam-Baker wrote:

> It does indeed. And worse, it works for
> 
> _null._random.example.com  SRV...
> 
> And other non existent protocols.

Non existent protocols are not a problem, because they just do
not work, which is fine.

The problem is that protocols used share a port.

However, as the only protocol which may be used by *LAZY* users,
other than http, is https, it may share the same port as http,
if servers are implemented to distinguish them by the first
byte of the request.

Maybe, some of you are thinking that SRV can't differentiate
server names of name based virtual hosting.

But,

       *.example.com  CNAME com.example.net

       *.example.org  CNAME org.example.net

	com.example.net SRV  0 1 P com.server.example.net
	org.example.net SRV  0 1 P org.server.example.net
	com.server.example.net CNAME shared.server.example.net
	org.server.example.net CNAME shared.server.example.net

should work, even though it violates SRV specification requiring
"name MUST NOT be an alias".

> There is a way to fix the issue. Instead of resolving in a single step, a
> two step resolution is performed. The first step being for an unprefixed
> name. This will result in either 'not found' or a canonical name being
> returned. The prefix is applied to the canonical name in the second phase.

Why do we have to fix a non existent issue?

						Masataka Ohta
_______________________________________________
dnsext mailing list
dnsext@ietf.org
https://www.ietf.org/mailman/listinfo/dnsext