< draft-ietf-dnsind-clarify-00.txt   draft-ietf-dnsind-clarify-01.txt >
Network Working Group Robert Elz Network Working Group Robert Elz
Internet Draft University of Melbourne Internet Draft University of Melbourne
Expiration Date: August 1996 Expiration Date: November 1996
Randy Bush Randy Bush
RGnet, Inc. RGnet, Inc.
February 1996 May 1996
Clarifications to the DNS Specification Clarifications to the DNS Specification
draft-ietf-dnsind-clarify-00.txt draft-ietf-dnsind-clarify-01.txt
1. Status of this Memo Status of this Memo
This document is an Internet-Draft. Internet-Drafts are working This document is an Internet-Draft. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas, documents of the Internet Engineering Task Force (IETF), its areas,
and its working groups. Note that other groups may also distribute and its working groups. Note that other groups may also distribute
working documents as Internet-Drafts. working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
To learn the current status of any Internet-Draft, please check the To learn the current status of any Internet-Draft, please check the
"1id-abstracts.txt" listing contained in the Internet-Drafts Shadow "1id-abstracts.txt" listing contained in the Internet-Drafts Shadow
Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe), Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe),
munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or
ftp.isi.edu (US West Coast). ftp.isi.edu (US West Coast).
2. Abstract 1. Abstract
This draft considers some areas that have been identified as problems This draft considers some areas that have been identified as problems
with the specification of the Domain Name System, and proposes with the specification of the Domain Name System, and proposes
remedies for the defects identified. Two separate issues are remedies for the defects identified. Two separate issues are
considered, IP packet header address usage from multi-homed servers, considered, IP packet header address usage from multi-homed servers,
and TTLs in sets of records with the same name, class, and type. and TTLs in sets of records with the same name, class, and type.
3. Introduction 2. Introduction
Several problem areas in the Domain Name System specification have Several problem areas in the Domain Name System specification
been noted through the years. This draft addresses two of them. The [RFC1034, RFC1035] have been noted through the years [RFC1123]. This
two issues here are independent. Those issues are the question of draft addresses two additional problem areas. The two issues here
which source address a multi-homed DNS server should use when are independent. Those issues are the question of which source
replying to a query, and the issue of differing TTLs for DNS records address a multi-homed DNS server should use when replying to a query,
with the same label, class and type. and the issue of differing TTLs for DNS records with the same label,
class and type.
Suggestions for clarifications to the DNS specification to avoid the Suggestions for clarifications to the DNS specification to avoid
problems caused are made in this draft. The solutions proposed these problems are made in this memo. The solutions proposed herein
herein are intended to stimulate discussion. It is entirely possible are intended to stimulate discussion. It is possible that the sense
that the sense of either may be reversed before the next iteration of of either may be reversed before the next iteration of this draft,
this draft. but less likely now than it was before the previous version.
4. Server reply source address selection 3. Server Reply Source Address Selection
Many DNS clients, in fact, most DNS clients, if not all, whether a Most, if not all, DNS clients, whether servers acting as clients for
server acting as a client for the purposes of recursive query the purposes of recursive query resolution, or resolvers, expect the
resolution, or a resolver, expect that the address from which a reply address from which a reply is received to be the same address as that
is received via UDP will be the same address as that to which the to which the query eliciting the reply was sent. This, along with
query eliciting the reply was sent. This, along with the identifier the identifier (ID) in the reply is used for disambiguating replies,
(ID) in the reply is used for disambiguating replies, and filtering and filtering spurious responses. This may, or may not, have been
spurious responses. This may, or may not, have been intended when intended when the DNS was designed, but is now a fact of life.
the DNS was designed, but is now a fact of life.
Some multi-homed hosts running DNS servers fail to anticipate this Some multi-homed hosts running DNS servers fail to anticipate this
usage, and consequently send replies from the "wrong" source address, usage, and consequently send replies from the "wrong" source address,
causing the reply to be discarded by the client. causing the reply to be discarded by the client.
3.1. UDP Source Address Selection
To avoid these problems, servers when responding to queries using UDP To avoid these problems, servers when responding to queries using UDP
must cause the reply to be sent with the source address field in the must cause the reply to be sent with the source address field in the
IP header set to the address that was in the destination address IP header set to the address that was in the destination address
field of the IP header of the packet containing the query causing the field of the IP header of the packet containing the query causing the
response. If this would cause the response to be sent from an response. If this would cause the response to be sent from an IP
illegal IP address for sources, then the response must not be sent. address which is not permitted for this purpose, then the response
may be sent from any legal IP address allocated to the server. That
address should be chosen to maximise the possibility that the client
will be able to use it for further queries. Servers configured in
such a way that not all their addresses are equally reachable from
all potential clients need take particular care when responding to
queries sent to anycast, multicast, or similar, addresses.
[Aside: An alternative would be to finish the previous sentence 3.2. Port Number Selection
with "... may be sent from any legal IP address allocated to the
server."]
5. Multiple TTLs in a Resource Record Set Replies to all queries must be directed to the port from which they
were sent. With queries received via TCP this is an inherent part of
the transport protocol, for queries received by UDP the server must
take note of the source port and use that as the destination port in
the response. Replies should always be sent from the port to which
they were directed. Except in extraordinary circumstances, this will
be the well known port assigned for DNS queries [RFC1700].
DNS Resource Records (RRs) each have a label, class, type, and data. 4. Resource Record Sets
While it is meaningless for two records to ever have label, class,
type and data all equal (servers should suppress such duplicates if
encountered), it is possible for many record types to exist with the
same label class and type, but with different data. Such a group of
records is hereby defined to be a Resource Record Set (RRSet).
In all cases, a query for a specific (or non-specific) label, class, Each DNS Resource Record (RR) each has a label, class, type, and
and type, will always return all records in the associated RRSet - data. While it is meaningless for two records to ever have label,
whether that be one or more RRs, or the response shall be marked as class, type and data all equal (servers should suppress such
"truncated" if the entire RRSet will not fit in the response. duplicates if encountered), it is possible for many record types to
exist with the same label class and type, but with different data.
Such a group of records is hereby defined to be a Resource Record Set
(RRSet).
Resource Records also each have a time to live (TTL). It is possible 4.1. Sending RRs from an RRSet
for the RRs in a RRSet to have different TTLs, however this has no
known useful purpose, and can cause partial replies (not marked
"truncated") from a caching server, where the TTLs for some of the
RRs in the RRSet have expired, but not all have.
Consequently the use of differing TTLs in a RRSet is hereby A query for a specific (or non-specific) label, class, and type, will
deprecated, all TTLs in a RRSet should be the same. always return all records in the associated RRSet - whether that be
one or more RRs, or the response shall be marked as "truncated" if
the entire RRSet will not fit in the response.
4.2. TTLs of RRs in an RRSet
Resource Records also have a time to live (TTL). It is possible for
the RRs in an RRSet to have different TTLs, however no uses for this
have been found which cannot be better accomplished in other ways.
This can, however, cause partial replies (not marked "truncated")
from a caching server, where the TTLs for some but not all of the RRs
in the RRSet have expired.
Consequently the use of differing TTLs in an RRSet is hereby
deprecated, the TTLs of all RRs in an RRSet must be the same.
Should a client receive a response containing RRs from an RRSet with Should a client receive a response containing RRs from an RRSet with
TTLs not all equal, it should treat the RRs for all purposes as if differing TTLs, it should treat the RRs for all purposes as if all
all TTLs in the RRSet had been set to the value of the lowest TTL in TTLs in the RRSet had been set to the value of the lowest TTL in the
the RRSet. RRSet.
4.3. Receiving RRSets
Servers never merge RRs from a response with RRs in their cache to Servers never merge RRs from a response with RRs in their cache to
form a RRSet, they must either ignore the RRs in the response, or use form an RRSet. If a response contains data which would form an RRSet
those to replace existing RRs from the cache, as appropriate. with data in a server's cache the server must either ignore the RRs
Consequently the issue of TTLs varying between the cache and a in the response, or use those to replace the existing RRSet in the
response does not cause concern, one will be ignored. cache, as appropriate. Consequently the issue of TTLs varying
between the cache and a response does not cause concern, one will be
ignored.
4.3.1. Ranking data
When considering whether to accept an RRSet in a reply, or retain an
RRSet already in its cache instead, a server should consider the
relative likely trustworthiness of the various data. That is, an
authoritative answer from a reply should replace cached data that had
been obtained from additional information in an earlier reply, but
additional information from a reply will be ignored if the cache
contains data from an authoritative answer or a zone file.
The accuracy of data available is assumed from its source.
Trustworthiness shall be, in order from most to least:
+ Data from a primary zone file, other than glue data,
+ Data from a zone transfer, other than glue,
+ That from the answer section of an authoritative reply,
+ Glue from a primary zone, or glue from a zone transfer,
+ Data from the authority section of an authoritative answer,
+ Data from the answer section of a non-authoritative answer,
+ Additional information from an authoritative answer,
+ Data from the authority section of a non-authoritative answer,
+ Additional information from non-authoritative answers.
Where authenticated data has been received it shall be considered
more trustworthy than unauthenticated data of the same type.
"Glue" above includes any record in a zone file that is not properly
part of that zone, including nameserver records of delegated sub-
zones (NS records), address records that accompany those NS records
(A, AAAA, etc), and any other stray data that might appear.
4.4. Sending RRSets (reprise)
A Resource Record Set should only be included once in any DNS reply. A Resource Record Set should only be included once in any DNS reply.
It may occur in any of the Answer, Authority, or Additional It may occur in any of the Answer, Authority, or Additional
Information sections, as required, however should not be repeated in Information sections, as required, however should not be repeated in
the same, or any other, section, except where explicitly required by the same, or any other, section, except where explicitly required by
a specification. Eg: an AXFR response requires the SOA record a specification. For example, an AXFR response requires the SOA
(always an RRSet containing a single RR) be both the first and last record (always an RRSet containing a single RR) be both the first and
record of the reply. Where duplicates are required this way, the TTL last record of the reply. Where duplicates are required this way,
transmitted in each case must be the same. the TTL transmitted in each case must be the same.
6. Security Considerations 5. Security Considerations
This document does not consider security. This document does not consider security.
In particular, nothing in section 4 is any way related to, or useful In particular, nothing in section 3 is any way related to, or useful
for, any security related purposes. for, any security related purposes.
Section 4.3.1 is also not related to security. Security of DNS data
will be obtained by the Secure DNS [DNSSEC], which is orthogonal to
this memo.
It is not believed that anything in this document adds to any It is not believed that anything in this document adds to any
security issues that may exist with the DNS, nor does it do anything security issues that may exist with the DNS, nor does it do anything
to lessen them. to lessen them.
7. References 6. References
[RFC1034] Domain Names - Concepts and Facilities, [RFC1034] Domain Names - Concepts and Facilities, (STD 13)
P. Mockapetris, ISI, November 1987. P. Mockapetris, ISI, November 1987.
[RFC1035] Domain Names - Implementation and Specification [RFC1035] Domain Names - Implementation and Specification (STD 13)
P. Mockapetris, ISI, November 1987 P. Mockapetris, ISI, November 1987
8. Acknowledgements [RFC1123] Requirements for Internet hosts - application and support,
(STD 3) R. Braden, January 1989
To be supplied. [RFC1700] Assigned Numbers (STD 2)
J. Reynolds, J. Postel, October 1994.
[DNSSEC] Domain Name System Security Extensions,
D. E. Eastlake, 3rd, C. W. Kaufman,
Work in Progress (Internet Draft), January 1996.
7. Acknowledgements
This memo arose from discussions in the DNSIND working group of the
IETF in 1995 and 1996, the members of that working group are largely
responsible for the ideas captured herein.
8. Authors' addresses
Robert Elz
Computer Science
University of Melbourne
Parkville, Victoria, 3052
Australia.
EMail: kre@munnari.OZ.AU
Randy Bush
RGnet, Inc.
9501 SW Westhaven
Portland, Oregon, 97225
United States.
EMail: randy@psg.com
 End of changes. 30 change blocks. 
68 lines changed or deleted 131 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/