At 12:06 +0200 10/27/11, Havard Eidnes wrote:
Hi,

a.z.     NS     some.name.server.
sub.a.z. NS     some.other.name.server.

My claim is that it is a "Registry Error" for the operator of the
registry for the 'z' domain to permit this to happen, as it
violates the basic idea of what a "delegation" means.

Depending on what you mean by "exposed..."

It's possible to see this in a zone transfer, possibly occurring as a result of a dynamic update that added a.z's NS set after sub.a.z existed. What I recall from discussions (meaning I don't know if this is in a document) is that the dynamic update "occludes" (hides, as in the sense that the moon occludes the sun in a solar eclipse) the sub.a.z name. The rationale for this is as follows.

When getting the dynamic update adding a.z/IN/NS, you have a design choice. You can refuse the update because there are names in the zone below a.z. You can eliminate the now out-of-zone data because the zone is not authoritative for it. Or you can occlude the data, meaning hold it in the zone (AXFR) but not consult it when answering a query.

The last approach is better than the first because a "bounce" is avoided. The last approach is better than the second because the user can "undo" the dynamic update add with a delete at a minimum of effort to the name server. Mark Andrews noted that in his support experience, users often make a mistake and want to undo it.

So this may not be a "registry error" but a way to maintain the ability to undo an addition. Of course, it may be a "registry error" but some name server implementations wouldn't let you load this zone from a user file. (Slaves would load from their backup files on restart; they would accept this in AXFR/IXFR.)

Back to "expose" - if some.name.server. and some.other.name.server are the same process (even if the IP addresses are different for the names, etc.) it might appear that both delegations are in effect. There was once ip6.int which had all of it's delegations broken, but all fragments were on the same set of servers anyway. The only way to tell that the cut points were wrong was to get the AXFR and inspect it because name servers always give you the "best" answer they can as according to step 2 of the algorithm in RFC 1034, section 4.3.2. (All DNS geeks should have that section pinned to their wall at home.)

But, yes, this is "broken" for some definition of broken. What happens in the query processing would never reach the deeper delegation IF you started in that zone. I'd test this by standing up a series of name server processes each with just one zone. You can have them on one OS but use multiple addresses (such as 127.0.0.2 127.0.0.3 and so on on the loopback interface with host routes), so long as they are separate processes. With this you'll see what name server implementations really do. It's the only way to isolate "step 2" referred to above.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar                    You can leave a voice message at +1-571-434-5468

Vote for the word of the day:
"Papa"razzi - father that constantly takes photos of the baby
Corpureaucracy - The institution of corporate "red tape"
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to