Network Working GroupO. KolkmanG. Huston Internet-DraftNLnet LabsAPNIC Intended status: Experimental ProtocolA. SullivanO. Kolkman Expires:March 22,April 20, 2014 NLnet Labs A. Sullivan Dyn, Inc. W. Kumari Google, Inc.September 20,G. Michaelson APNIC October 19, 2013 Using Test Delegations from the Root Prior to Full Allocation and Delegationdraft-kolkman-root-test-delegation-00draft-kolkman-root-test-delegation-01 Abstract The delegation of certain strings asTLDsgeneric Top Level Domains (gTLDs) will cause stability and security issues if such strings have been used in private environments prior to their delegation.It is recommended that testTest delegations can be used to enable empirical research on the extent of the possibledisruptioncollision prior to actual allocation and delegation of any label in the root zone. This document describes one such approach to an empirical testing framework. Status of this Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire onMarch 22,April 20, 2014. Copyright Notice Copyright (c) 2013 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction and Motivation . . . . . . . . . . . . . . . . . 2 1.1.Search-path interaction. . . . . . . . . . . . . . . . . . 3 1.2.Scire est mensurare . . . . . . . . . . . . . . . . . . .43 2. Terms and Conventions Used in this Memo . . . . . . . . . . . 4 3. Principle of Operation . . . . . . . . . . . . . . . . . . . . 4 3.1. Measurements Servers and Zones . . . . . . . . . . . . . .54 3.2. Query Generation . . . . . . . . . . . . . . . . . . . . . 5 3.3. Sampling . . . . . . . . . . . . . . . . . . . . . . . . .7 3.4. The Name Server . . . . . . . . . . . . . . . . . . . . . 76 4. Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . .86 5.A Basis for Acceptable Behaviour . . . . . . . . . . . . . . . 9 6. Possible Experiment Extension . . . . . . . . . . . . . . . . 9 7.Security Considerations . . . . . . . . . . . . . . . . . . .10 8.7 6. References . . . . . . . . . . . . . . . . . . . . . . . . . .107 Appendix A. Acknowledgements . . . . . . . . . . . . . . . . . . .118 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .118 1. Introduction and Motivation [[The authors are aware that thisfirstversion of the documentdoesis not fully consistent. However they would value feedback on whether the idea is worth furtherpursuance.]] [Editor not: An appropriate mailinglist for discussion ofstudy. A mail list to discuss this drafthas not yet been identified] DNS names have always co-existed with other namespaces that are virtually indistinguishable from the DNS. The DNS was itself deployed alongside the host [RFC0822] table. NetBIOS [NETBIOS] names, though only one label long, could always interact with the DNS search path mechanism to generate DNS names. Additionally, mDNS [RFC6762] names often look just like DNS names. Because different naming systems are usually linked together in the user interface, from an end user's point of view these name spaces are all one -- even though they function differently on the Internet.is collisions@lists.dns-oarc.net.]] While[RFC6761] reservedcertain special names have been reserved for internal or privateuse,use [RFC6761], there is evidence [SAC45] that various sites connected to the Internet have used other names for internal purposes. In fact, the Multicast DNS specification [RFC6762] advises not to use .local for private use and observes: "the followingtop-leveltop- level domains have been used on private internal networks without the problems caused by trying to reuse ".local." for thispurpose:" .intranet.purpose: .intranet .internal. .private. .corp. .home..lan..lan." In the event such names are delegated for use in the public DNS, there will be inevitable consequences for sites that have used those names. Some of those consequences haveimplications for security,security implications, with the potential for leakage of credentials and HTTP cookies ([RFC6265]). Responsible administration of the public namespace therefore requires great care in permitting public delegation of any name when there is good reason to suppose it is in widespread use as a private namespace, even though such private namespaces are (from the point of view of the DNS) irregular, even if common.1.1. Search-path interaction. In many cases a string appears to be usedOne form of name collision involves network domains that use selected names asan "undelegated TLD" (being usedlocal-use top level domains, as noted in [RFC6762]. In the case where therightmostsame label is delegated inan name), but thisthe global DNS as a gTLD, then hosts in the local domain will be unable to resolve domain names in the context of the gTLD. This state of name occlusion issimply an artifactfurther compounded by a number ofdomain search list processing. Forscenarios where the resolution of a name is performed across multiple name scope domains. This may happen with a mobile host, or even with applications, such as, for example,supposemail delivery (in theExample Widgets corporation usescase where multiple MTAs who are listed as mail servers for asub-domain(.corp)reside in different name scope domains, some oftheir primary domain (example.com) towhich have this nametheir employee workstations, servers, printerscollision between the domain andsimilar. They have an "intranet" serverlocally defined pseudo-TLDs). Name collision opens up the potential for misdirection, where the namedintranet.corp.example.com. In order to allow their employees to simply type "intranet.corp" to access this server,remote point being contacted by theusers' workstations are configured (probably using [RFC3379]) withapplication may not necessarily be thesearch-list set to "corp.example.com, example.com".intended service point for the transaction. When auser enters "intranet.corp", their workstation will try and resolvehost leaves the intranet environment, the host's applications may anticipate that the DNS names associated with a label return an RCODE 3 (NXDOMAIN) response, but may encounter an unanticipated response when the gTLD is deployed with a colliding name.RFC1535 [RFC1535] specifiesSimilarly, a host that"in any eventhas an association with a named service point within the gTLD may encounter unanticipated responses when the host is placed into an intranet environment where the same name exist as a"." exists inlocally-scoped pseudo-TLD. There is aspecifiedsubtle form of interaction of names when the same nameit should be assumed to beis placed on afully qualified domainlocal name(FQDN) and SHOULD be tried as a rootedsearch list. Certain namefirst." So, the user's workstation willresolver libraries firsttryquery the original name, andresolve "intranet.corp.". As there is (currently) no .corp TLD this will result inif the query returns anNXDOMAIN response. The workstation willNXDOMAIN, thenappend entries inthey apply thesearch-list until it is ablelocal search list toresolvethe(now fully-qualified)original name.IfWhen this process occurs in the.corp label were to be delegated ascontext of aTLD and the sub-domain "intranet" created within .corp, the first lookup ("intranet.corp") would no longer generate an NXDOMAIN response. This would stop the search-list processing, and directvisible gTLD name colliding with theuser somewhere other than wherelocal name there is theuser intended to go --possibility of the"wrong server",name resolving in theeyescontext of theuser, even if right according to the DNS. It is worth noting that a researcher analyzing DNS queries hittinggTLD, which then bypasses theroot servers would see queries before search-list processing expands them. While this may not change whether or not it is safe to delegate these names, having an understandingapplication of thecause is valuable. 1.2.local search list. 1.1. Scire est mensurare The local use of undelegated top-level domain names is troublesome because itproducesmay produce differentexperienceuser experiences depending on thesearch path and location of a given device. That is a normal effect of the search path mechanism or the roaming of users, but with the advent of new generic top-level domains (gTLDs),locally used name, theproblem gets more acute, because many TLDs are intended to be mnemonics that will be intuitive to humans. Sincenameshigherplaced inthe DNS tree are likely also to use those same intuitive labels, there is potential for user confusion and information leakage. At the same time, it is not clear that the DNS protocol was designed aroundastaticlocal search listof top-level domains (TLDs),andtherefore it seems reasonable to plan forthepossible additionlocation ofnew TLDs whose use might conflict with deployed search path settings. Yet prudenta given host, and the host's name resolution behaviour. Prudent operation of the root zone requires that deployment of new names in the root should not cause widespread untoward effects for users of the DNS, particularly when those users are relying onfeaturesname resolution outcomes that have always been part of theprotocol.name resolution behaviour up unto this point. What isneededuseful in this context is a mechanism to test whether a particular delegation from the root zone presents aseriousconflict with widespread local use. This memo presents a methodology for making such a determination. The methodology considered here depends on temporary delegation of the top-level domains in question, and the use of a domain under an existing TLD in order to capture and compare queries generated by a large number of querying sources under the control of the experiment. 2. Terms and Conventions Used in this Memo The mechanism outlined here is intended to complement the analysis already performed in "Name Collision in the DNS" [namecollision]. We therefore use the terms defined in section 1.1 of [namecollision] whenever appropriate. Note that the evaluation methodology outlined here is intended to be complementary input to a risk analysis e.g. as found in [namecollision]; risk tradeofs are likely to include other factors than the effects measured herewith. 3. Principle of OperationIn orderThe goal of the experiment is to assess whether there is significant existing use of a given candidate string(CandidateTLD), probes will send out sets("CandidateTLD"). We propose the use ofqueries froma software test that is executed by a large number ofrandom locations.end hosts drawn from across the entire Internet. The execution of this test will cause the end host to attempt to retrieve a small set of URLs. This will trigger a set of DNS queries to resolve the domain name part of each URL, and subsequent HTTP queries to retrieve the object in the case that the DNS name is successfully resolved to an IP address. Both the DNS queries and the HTTP requests are answered by dedicated servers thatcollect statistics. In this section we describeanalyse thequery generation, data-collection,received responses andwhat the dedicated servers should answermatch them tonot interfere with Internet traffic. The goalthe original set of queries that were used by theexperiment isend host. This will allow us toassessinfer whether the lost is located in an context where there issignificant existing use of a singlename collision with the CandidateTLD. In this section we describe the query generation, data- collection, and analysis. This methodology is based on earlier work by APNIC [Method]. 3.1. Measurements Servers and Zones In addition to thecandidate string ("CandidateTLD")use of CandidateTLD, the methodology usesa specific sting "TestName". Duringanexperiment the Proposed TLD under evaluation ("CandidateTLD") and a control TLD ("TestName") are delegated from the root zone to a special DNS name server, the experiment's server. Further, a second control name (TestName.ExistingTLD) isadditional name, delegated from a 'common' existingTLD (ExistingTLD)TLD, ("TestName.ExistingTLD") to the experiment's server. The experiment's name serverhas two functions: First, with one exception detailed below in Section 3.4, if any requestis authoritative for CandidateTLD and TestName.ExistingTLD. The name server will respond to an A and AAAA query for any nameinsidewithin "TestName.CandidateTLD" with theCandidateTLDIPV4 or IPv6 address of theTestName namespace reaches the name server, theexperiment's HTTP server. The name serverMUSTwill respond to queries for any other name within CandidateTLD with RCODE 3 (Name Error orNXDOMAIN) (Note that from a DNS client perspective the ultimate RCODE 3 response is indistinguishable from what is returned without the test delegation in place.) Second, the experiment's server tracks everyNXDOMAIN). The name server will respond to A and AAAA queries inany request it receives,TestName.ExistingTLD with thetime at whichIPv4 or IPv6 address of the experiment's HTTP server. The experiment's HTTP server will respond with a "200 OK" for a requestarrived,for theRRTYPE and CLASSobject "1x1.png" inthe request,TestName.CandidateTLD andthe source networkin TestName.ExistingTLD. The server will respond with "404 Not Found" forthe request.any other object name. 3.2. Query GenerationSoftware probes will needThe TestName is a synthetic name with no intentional semantic meaning ,that is generated in such a way to reduce the likliehood of collision with any existing delegated name. It is suggested that it bedeployed throughoutgenerated by using theInternet (also see Section 3.3) these probes will send, in parallel, setshex encoding ofqueries.a randomly selected integer value between 1,000,000,000 and 2,000,000,000. The name must not be already delegated from the root or in the ExistingTLD. Each query setcomprisesconstitutes onemeasurement and consists of three queries (or even 4, see Section 6)."measurement". Ameasurement"measurement" is identified by auniquemeasurement identifier (<uniqueid>, syntactically a validhostname); the set will include the following: the QNAMEhostname) that is<uniqueid>-a.TestName.uniquely generated for each instance of a measurement. This ensures that when theQNAMEdomain name is<uniqueid>-b.TestName.CandidateTLDresolved, and when theQNAMEnamed object is<uniqueid>-c.TestName.ExistingTLD The TestName MUST be a randomly chosen name that remains constant for the durationretrieved there is no occlusion of theexperiment, MUST be a syntactically valid label, SHOULD be semantic nonsense, an MUST NOT be delegated frominteraction with therootexperiment's services because of local name orin the ExistingTLD already. Depending on the environment in which the probe is locatedweb object caches. The set uses thequery that is send by a stub resolverfollowing URLs: A: http://<unique_id>-a.TestName.CandidateTLD/1x1.png? <uniqueid>-a B: http://<unique_id>-a.TestName.ExistingTLD/1x1.png? <uniqueid>-b C: http://results.TestName.ExistingTLD/1x1.png? <uniqueid>?za=<a_result>&zb=<b_result> The A URL ishandled differently. We distinguish 4 possibilities. Localintended to test if CandidateTLDuse without Search List: The probeislocated withinanetwork thatlocallyresolves the candidateTLD and there are no searchlists beingusedthat append CandidateTLD. The query with a QNAME of <uniqueid>-b.TestName.CandidateTLD will not exit thename. In other words, if localnetwork while the queries with a QNAME of <uniqueid>-c.TestName.ExistingTLD. and QNAMEuse of<uniqueid>-a.TestName. will arrive at the authoritative servers for the respective domains. LocalCandidateTLDandoccludes visibility of CandidateTLDappened Search List: The probe is located withinas anetwork that locally resolves the candidateTLD and there are searchlists being used that append CandidateTLD.gTLD. The DNS querywith a QNAME of <uniqueid>-b.TestName.CandidateTLD will not exit the local network while the queries with a QNAME of lt;uniqueid>-c.TestName.ExistingTLD.for <unique_id>-a.TestName.CandidateTLD willarrive atonly be received by the authoritative name server for this name if there is no local name resolution function that uses the CandidateTLD name as a locally defined pseudo-top level domain. Thequery with a QNAME of <uniqueid>-a.TestName.B URL issubjectintended to function as thesearch algortithm, the query name will effectively be substitude to <uniqueid>-a.TestName.CandidateTLD and be resolved localy. The querycontrol test for<uniqueid>-a.TestName. will therefore not be seen attheauthoritative server. No use of CandidateTLDexperiment, andnothe use ofSearch List: The probeExistingTLD in B islocated withinintended to operate as anetworkname that does notresolvecollide with a local use context. As thecandidate TLD and no searchlists being used that append CandidateTLD. All queries will arrive atexperiment uses theauthoritative servers forabsence of a fetch of therespective domains. No useA URL to infer the name resolution behaviour ofCandidateTLD and CandidateTLD appended by Search List: The probethe location where the measurement islocated within a networkbeing performed, it is necessary to ensure thatdoes not resolve the candidate TLD but search list processing appends CandidateTLD. In this casethequeries for Lt;uniqueid>-a.TestName. get rewrittenmeasurement code has run tolt;uniqueid>-a.TestName.CandidateTLD and arrive, together with lt;uniqueid>-b.TestName.CandidateTLDcompletion. The measurement code starts a timer at theauthoritative server for CandidateTLD, while queries forstart of its execution. Upon expiration of theQNAME <uniqueid>-c.TestName.ExistingTLD arrive attimer, or when both theserver authoritative for TestName.ExistingTLD. As a result, by comparing what arrives atA and B objects have been successfully retrieved, theauthoritative servers one can establishcode will schedule theprevalenceretrieval of thevarious scenarios. UnderC URL. The arguments to theassumptionC URL include the client-side measurement ofa broad unbiased sample exclusively observing the 3rd option (all queries hitting their respective servers) would be a strong indication that a candidate TLD is not in use.the elapsed time to retrieve the A and B URLs. 3.3. SamplingToOne way to perform this measurement is to embed theevaluation,measurement in web content, using anames ofscripting language. When theform <uniqueid>.TestName.CandidateTLD and <uniqueid>.controlname.ExistingTLD are embedded inweb contentthatisplaced aroundloaded theweb. As people visit web sites, the contentscript isprocessed, yielding attempts at resolution ofactivated, and thenames. The easiestmeasurement sequence is performed. One way toprovide thedistribute this contentthat causesto clients to perform therelevant DNS lookuptest isto usevia an online (ad) campaign.ThereIf the measurement script is enclosed within the ad itself, then there is no reason for the campaign actually to cause users to clickthough, so it should be as boring as possible. However, the campaign must resultthough in order to perform theindependent resolution of both the control and test names.test. Behavior of this sort is trivially achievable withseverala number of available online advertising systems. It iscritical that the sampling be as representative of the Internet population as possible. This sort of sample already hasalso necessary to spread thesignificant problem that it can only measure usersdeliver of theweb. And there may be sampling effects that might prevent measurements from taking place in those environments that need to be reached. For instance, add-blocking or different web surfing behavior in corporate environements. The measurements should be unbiased with respectad totemporal behavior like sleep-wake and work-rest cycles. [[The sampling biases probably deserve their own section with much more elaboration and more possible biases]] 3.4. The Name Server This procedure rests onaname server that is configured and instrumented in particular ways. First,very broad spectrum of clients, uso thename server mustas should beconfigurable so that it authoritative forpresented across allrequests inside the Candidate TLD. Normally, it will always return RCODE 3 (NXDOMAIN) fortime zones, across allqueries inside that Candidate TLD, except that the name server must also be configurable so that it is the authoritative name server for the test name. All names underneath the test name, however, also return RCODE 3. A summary of the behavior is in Table 1. +-----------------------------+------------+-----------+------------+ | Domain Name | RRTYPE | RCODE | Actions if | | | queried | returned | any | +-----------------------------+------------+-----------+------------+ | CandidateTLD | anything | 3 | | | | except NS | | | | CandidateTLD | NS | 0 | return | | | | | server in | | | | | answer | | | | | section | | | | | RDATA | | TestName | anything | 3 | | | | except NS | | | | TestName | NS | 0 | return | | | | | server in | | | | | answer | | | | | section | | | | | RDATA | | TestName.CandidateTLD | NS | 0 | return | | | | | server in | | | | | answer | | | | | section | | | | | RDATA | | TestName.CandidateTLD | anything | 3 | | | | except NS | | | | *.TestName.CandidateTLD | ANY | 3 | Queries to | | | | | be | | | | | measured | | *.controlname.ExistingTLD | ANY | 3 | Queries to | | | | | be | | | | | measured | | *.TestName | ANY | 3 | Queries to | | | | | be | | | | | measured | +-----------------------------+------------+-----------+------------+language bases, and across all geographic regions. 4. Evaluation[TODO align with above]To evaluate the results,it is only necessary to compare the number of resolution attempts of the test names againstwe take those measurements that return theresolution attemptsC URL. The use of thecontrol names. IfC URL ensures that we use measurement results where thetestExistingTLD name is notin wide private use, then a lookups forbeing locally occluded. We count thename unique identifier innumber of experiments of eachname space will arrive nearly as often and at the same time (modulo the difference in the recursive nameserver following the delegation chain) atof theinstrumented name server. Ifpossible combinations of retrieving thetest name is in widespread private use without a search list, or is otherwise resolved locally, then we should expectA and B URLs. These combinations are: Not A and Not B: This result contributes to experimental uncertainty. (We know thatlookups inside the test namespace will happen less often than lookups insideExistingTLD is not locally occluded, so thecontrol namespace. If therefailure to retrieve B isno search listdue to other factors that are not being examined inuse, thenthetest QNAMEs of the "b" form will arrive less often than thosecontext of"a" formthis measurement.) A and"c" form. If thereNot B: This result indicates that the client isa search listable to resolve names inuse, then the "a" form will also not arrive at the authoritative server. Ifthe CandidateTLDisina search list, we can expect to see duplicated queries ofthe"b" form on the authoritative server (becausecontext of the"a" form getsglobal DNS, but thesearch list appended). 5. A Basis for Acceptable Behaviour We assume that there will always be some "stray" queriesinability to retrieve theDNS: queries for names that have a TLD-label that does not exist inB URL contributes to experimental uncertainty. (The same reasoning about theroot-zone,ExistingTLD andwhich were not intended to be sentlocal occlusion applies to this case). Not A and B: This result is an indicator that theglobal DNS. Therefore, itclient's use of CandidateTLD isnecessary to establishprobably being occluded by somebaseline levelform ofthese "noise" queries,local use. A andthen useB: This result indicates that the client is able toevaluate whether some proposed new name forresolve names in theDNS presents a problem. Because ofCandidateTLD in thehistoric prominencecontext of the.com TLD, it may be supposed that .com is, likeglobal DNS. If theroot itself, a special zoneCandidateTLD is inwhich unusual behaviour might be expected. Therefore, names insidewidespread private use then we would see the.com name space are a poor guide for "normal" behaviour,count of "Not A andit should notB" beused for making these sortsfar in excess ofevaluations. The best guide will likely come from using TLDs that are themselves statistically normal. In addition, overwhelming conservatism suggests that using comparisons withtheTLD that is queried least often provides a great margin of safety. Aslevel ofthis writing, a string that is queried less often than that least-queried TLD seems likely not to be in widespread real use, and therefore comparisons withexperimental uncertainty, then we can conclude thatleast- queried TLDthere area good conservative choice when evaluating. 6. Possible Experiment Extension A bias tolocales where themeasurementCandidateTLD isintroduced if in certain environments lists of existing TLDs arebeing used inaccess lists of, for instance, firewalls. In that case queries for the QNAME <uniqueid>-b.TestName.CandidateTLD might be blocked. To calibrate that behavior an additional non-existent TLD could be delegated for the durationlocal context. Analysis of theexperiment: the QNAME is <uniqueid>-d.TestName.RandomTLD Whereby RandomTLD is a short TLD withsource IP addresses of thesame properties asclients that fetch "Not A and B", and thecandidate TLD. e.g.BGP Origin AS of these addresses and their geolocation may indicate ifthe CandidateTLD is U-Label then the RandomTLDsuch local use is clustered in aU-Label from the same script. If the measurement servers receive queries where the QNAME is neither <uniqueid>-d.TestName.RandomTLD nor <uniqueid>-b.TestName.CandidateTLD then it is likely that all non- delegated domains are blocked. An alternative way of interpreting this is that the queries where the QNAME is <uniqueid>-d.TestName.RandomTLD that arrive at the measurement servers provideparticular network or group or networks, or clustered in abaseline for the transparency of the querying environment for non-delegated TLDs. 7.particular geography or language region. 5. Security Considerations The delegation of the Proposed TLD (CandidateTLD)and control TLD (TestName)comes with some risk of interference with existing deployments.The risks for name collision for the TestName is under the control ofIn theexperimentercase where a local system queries a name, andcan be minimized by taking random strings without semantic value. The risk of name collision with the CandidateTLD is minimized reduced by having the experiment's server returning RCODE=3. Under the assumption of regular DNS implementationsthatresponse is indistinguishable fromquery returns adirect root-response for applications that receive such answer fromNXDOMAIN response, then local system then queries further name forms where each entry on astub resolver. The authors have no reasonlocal name search list is appended tobelieve that there are DNS implementations that would handtheapplicationsoriginal name in turn, searching for adifferentname responseif athat is not NXDOMAIN. The delegation of CandidateTLD for this experiment may interfere this this behaviour. However, two observations mitigate this concern. The first ispartthat this situation of potential collision arises in theresolution process. The authors would advise against signingcase where thevarious delegated domains,local system is querying for the CandidateTLD name as a "dotless" name (as theintroduction of DNSSEConly delegated subdomain in the CandidateTLD zone islikelyTestName, which is intended tobiashave no semantic meaning in any language). The second observation is that for such "dotless" names, theexperiment. Atcurrently widely deployed name resolver libraries no not initially query theroot"dotless" domainand ExistingTLDs, regular signing practices, includingname then apply theinclusion of an NSEC or NSEC3 RR provingsearch list is thenon-existence of a DS record should continue. The experiment can be biased by 3rd parties through sending queriesfirst query results in an RCODE 3 response. Many name resolver libraries do not query for "dotless" domain names at all, while those libraries that haveproperties like the ones specified herein. The experimentor SHOULD carefully control and record the <uniqueid> values used in the experiment and discard non-expected and non-uniquebeen observed to perform such queriesthat arrive at(Windows XP, Linux, FreeBSD) perform them after using thenameserver. 8.local search name list, rather then before. 6. References[NETBIOS] IBM Corporation, "LAN Technical Reference: 802.2 and NetBIOS APIs[Method] APNIC, "APNIC Labs IPv6 Measurement System ", Doc. number SC30-3587-01,April 1996. [RFC0822] Crocker, D.H., "Standard for the format of ARPA Internet text messages", STD 11, RFC 822, August 1982. [RFC1535] Gavron, E., "A Security Problem and Proposed Correction With Widely Deployed DNS Software", RFC 1535, October 1993. [RFC3379] Pinkas, D. and R. Housley, "Delegated Path Validation and Delegated Path Discovery Protocol Requirements", RFC 3379, September 2002.May 2013. [RFC6265] Barth, A., "HTTP State Management Mechanism", RFC 6265, April 2011. [RFC6761] Cheshire, S. and M. Krochmal, "Special-Use Domain Names", RFC 6761, February 2013. [RFC6762] Cheshire, S. and M. Krochmal, "Multicast DNS", RFC 6762, February 2013. [SAC45] ICANN Security and Stability Advisory Committee, "Invalid Top Level Domain Queries at the Root Level of the Domain Name System", 11 2010, <http://www.icann.org/en/groups/ ssac/documents/sac-045-en.pdf>. [namecollision] Interisle Consulting Group, "Name Collision in the DNS", August 2013. Appendix A. Acknowledgements This draft is a follow-up of, an borrows heavily from, our earlier (abbandonded) work on "A Procedure for Cautious Delegation of a DNS Names". Discussion of that document in various hallways lead to inspiration for this document and we want to thank those that gave us feed-back. The idea of using different names to trigger events in a DNS server is due to Geoff Huston. Authors' Addresses Geoff Huston APNIC 6 Cordelia St South Brisbane, QLD 4101 Australia Email: gih@apnic.net Olaf Kolkman NLnet Labs Science Park 400 Amsterdam, 1098 XH The Netherlands Email: olaf@NLnetLabs.nl Andrew Sullivan Dyn, Inc. 150 Dow St Manchester, NH 03101 U.S.A. Email: asullivan@dyn.com Warren Kumari Google, Inc. 1600 Amphitheatre Pkwy Mountain View, CA 94043 U.S.A. Email: warren@kumari.net George Michaelson APNIC 6 Cordelia St South Brisbane, QLD 4101 Australia Email: ggm@apnic.net