The "ZONEVERSION" EDNS option for the version token of a RR's zoneNIC ChileMiraflores 222, piso 14SantiagoCP 8320198CL+56 2 29407700hsalgado@nic.clICANNmauricio.vergara@icann.org
General
Internet Engineering Task ForcezoneversionThe "ZONEVERSION" EDNS option allows a DNS querier to request a DNS authoritative server to
add an EDNS option in the answer of such query with a token field
representing the version of the zone which contains the answered Resource Record,
such as the SOA serial field in zones when this number corresponds to the zone version.This "ZONEVERSION" data allows to debug and diagnose problems by helping to recognize the
data source of an answer in an atomic single query,
by associating the response with a respective zone version.The "ZONEVERSION" EDNS option
allows a DNS querier to request to a DNS authoritative server
to add an EDNS option in the answer of such query
with a token field representing the version of the zone associated to the answered Resource Record, such as the SOA serial field in zones when this number corresponds to the zone version.This "ZONEVERSION" data allows to help debug by recognizing the data source of an answer,
associating this answer with a respective zone version.DNS data is of loose coherent nature,
meaning that a record obtained by a response could be out-of-sync with other authoritative sources of the same data.
This makes it difficult to debug responses,
because you'd need to couple an answer with the same version of the zone used to obtain such data.
Even when in zones where the SOA serial field have the meaning of zone version you could use a separate query to ask for the SOA RR of the zone and therefore know its SOA serial,
such separate query is performed in a different time and could arrive from another authoritative source
(for example, in the case the server is anycasted as described in ),
so it's not directly correlated with the original query.This EDNS option is aimed to be used only on authoritative servers for a zone.
It's intended for hop-to-hop communication (not transitive).
Resolver and forwarder behavior is undefined.
The ZONEVERSION EDNS extension can have different meaning depending on the semantics of the zone maintainer and implementation of nameservers. This document defines one possible value, when the zone version corresponds to the serial field of the SOA Resource Record of the zone, a classic behaviour defined in . As the writing of this document, we recognize there are cases where nameservers use different backends for its data sources (like relational databases or by using a different off-DNS synchronicity among others) therefore,
the SOA version field doesn't offer much relevance as a versioning to its content, and in those cases the ZONEVERSION EDNS extension SHOULD be extended with a different flag and have an opaque value for its data token.The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in .The variable part of RDATA in the OPT RR for ZONEVERSION is defined as follows:
The OPTION-CODE for the ZONEVERSION option is <TBD>.
The OPTION-LENGTH for the ZONEVERSION option MUST have a value of 0 for queries, and MUST have the value of length in octects for the next OPTION-DATA for responses.
The OPTION-DATA for the ZONEVERSION option is composed of the concatenation of an unsigned 1 byte Flag number, an unsigned 2 bytes number with the Length of the next field in bytes, and the final Data value of the ZONEVERSION field as an opaque bit value, with the previous specified length.
[RFC Editor: change <TBD> to the proper code when assigned by IANA.]The EDNS ZONEVERSION option MAY be included on any QUERY,
by adding a zero-length EDNS ZONEVERSION option to the options
field of the OPT record when the query is made.If an EDNS ZONEVERSION option is sent to a server that is Authoritative for
the zone, then a name server that understands the ZONEVERSION option and
chooses to honor a particular ZONEVERSION request, MUST put in the OPTION-DATA
a flag, length and value that corresponds to the properly semantic of such
flag number, and corresponds to a zone versioning value of the zone that holds
the original QNAME of the reply (as per ).Otherwise, the answer MUST NOT add an EDNS ZONEVERSION option to the response.The first and only ZONEVERSION Flag defined in this document for the ZONEVERSION Option has the Flag value of 0, a Length field of value 4, and its corresponding Data MUST be a copy of the unsigned 32 bit version number as defined in the SERIAL field of the "SOA RDATA Format" in .The OPTION-LENGTH for this ZONEVERSION Option MUST have a value of 7 for responses.The mnemonic of this flag is SOA-SERIAL.Note that in this case a NXDOMAIN RCODE already includes the complete SOA Resource Record in the AUTHORITY section, so the inclusion of a ZONEVERSION EDNS Option in the answer is superflous and can be omitted. In the case of a SERVFAIL RCODE the responder MAY include the ZONEVERSION EDNS Option if the QNAME still belongs to an authoritative zone of the server,
in which case that value MUST be the one included in the answer.Note that a NODATA response code as defined in
MUST also include the ZONEVERSION answer even when there's no ANSWER data for the QNAME,
since the RCODE is NOERROR. A zone which utilizes the serial field of the SOA Resource Record as a number of the zone version release, should answer a ZONEVERSION request with an EDNS option code ZONEVERSION, an OPTION-DATA with a Flag byte with value 0, Length value 4 and a copy of the unsigned 32 bit version number of the SERIAL field of its SOA zone Resourse Record, and an OPTION-LENGTH with value 7.An example of a proper diagnostic tool that implements ZONEVERSION EDNS extension towards a compliant authoritative DNS server could be:The authors thanks all the comments and support made in the DNSOPS mailing list, chats and discussions.
This document defines a new EDNS0 option, entitled "ZONEVERSION" (see ), and assigns a value of <TBD> from the DNS EDNS0 Option Codes (OPT) Option space:
Value
Name
Status
Reference
<TBD>
ZONEVERSION
Standard
[this document]
[RFC Editor: change <TBD> to the proper code when assigned by IANA.][RFC Editor: change "this document" with the proper RFC number for this document when assigned by IANA.]The ZONEVERSION option also defines a 8-bit Flag field, for which
IANA is to create and maintain a new registry entitled
"DNS EDNS0 ZONEVERSION Flags values" (abbreviation "ZONEVERSION") used by the ZONEVERSION option, inside the "Domain Name System (DNS) Parameters" group. Initial values for the
DNS EDNS0 ZONEVERSION Flags values registry are given below; future assignments in the 1-245 values
are to be made through Specification Required Review . Assignments consist
of a Flag value as an unsigned 8-bit integer recorded in decimal, a Mnemonic name as an uppercase ASCII string with maximum length of 15 characters, and the required document reference.
ZONEVERSION Flag
Mnemonic
Reference
0
SOA-SERIAL
[this document]
1-245
Unassigned
246-254
Reserved for Local/Experimental Use
[this document]
255
Reserved for future expansion
[this document]
[RFC Editor: change "this document" with the proper RFC number for this document when assigned by IANA.]The change control for this registry should be my means of an Standard action.Allocation procedures for new code points in the ZONEVERSION Flag registry require Specification Required review, and so it requires Expert Reviews as stated in .The expert should consider the following points:
Duplication of code point allocations should be avoided.
A clear code point mnemonic should be provided.
The referenced document and stated use of the new code point
should be appropriate for the intended use of a ZONEVERSION
Flag assignment. In particular the reference should state clear
instructions for implementers about the syntax and semantic of
the data. Also the Length of the Data must have proper limits.
The expert reviewing the request MUST approve or disapprove the
request within 10 business days from when he or she received the
expert review request.The EDNS extension data it's not covered by RRSIG records,
so there's no way to verify its authenticity nor integrity using DNSSEC
and could theoricatelly be tampered by a person-in-the-middle if the transport is made by unsecure means.
Caution should be taken to use the EDNS ZONEVERSION data for any means besides troubleshooting and debugging.If there's a need to certify the ZONEVERSION trustwortiness,
it will be necessary to use an encrypted and authenticated DNS transport. If there's a need to authenticate data origin for the ZONEVERSION value, an answer with the SOA-SERIAL flag as defined above
could be compared to a separate regular SOA query with DO flag,
whose answer shall be DNSSEC signed,
with the cautions about Anycast and others as already stated in .With the SOA-SERIAL flag defined above, there's no risk on disclosure of private information,
as the SERIAL of the SOA record is already publicly available.Domain names - concepts and facilitiesThis RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.Domain names - implementation and specificationThis RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.Key words for use in RFCs to Indicate Requirement LevelsIn many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.Extension Mechanisms for DNS (EDNS(0))The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.Guidelines for Writing an IANA Considerations Section in RFCsMany protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.This is the third edition of this document; it obsoletes RFC 5226.Operation of Anycast ServicesAs the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.DNS TerminologyThe Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.This document obsoletes RFC 7719 and updates RFC 2308.There's a patched NSD server version 4.3.7 with support for ZONEVERSION with the experimental opcode 65024 maintained in
https://github.com/huguei/nsd/tree/rrserial with SOA-SERIAL flag support,
and installed for live testing in 200.1.122.30 address with configured zones
dateserial.example.com. and incserial.example.com.;
with MX, TXT and AAAA apex records.