Comments on the latest ANAME draft:

In Section 3.1, "records retrieved during ANAME <> resolution" looks like a typo. Should "<>" be "<target>"?

Also in Section 3.1, the first five paragraphs could be more explicit about resolving and adding address records instead of specifically A and/or AAAA (other than as examples).

Also in Section 3.1, the final paragraph will result in universal SERVFAIL responses if an ANAME target is in a misconfigured signed zone, even if the zone containing the ANAME is _not_ signed (and a corresponding traffic spike from ANAME-ignorant resolvers).

In Section 4, "resolution fails" should be better defined. Specifically, may resolvers use server-provided records if their own query results in NODATA or NXDOMAIN?

I think zone transfer considerations merit their own section, rather than being buried in and mixed with DNSSEC in 3.3. And because of those considerations, I consider it a mistake to prohibit secondary servers from resolving ANAME targets when there are address records at the same node as is required by Section 3.2. Behavior in error cases, including those stemming from ANAME-ignorant participants, seems to be much more preferable if such address records are treated as fallback data occluded during healthy operation:

1. *ANAME-ignorant primary, ANAME-aware secondary*: The secondary will
   have access to fallback data from the zone, but will only include it
   in responses when its own ANAME target resolution fails. The
   secondary can thus provide better answers to ANAME-ignorant clients
   when responses for the ANAME target are tailored.
2. *ANAME-aware primary, ANAME-ignorant secondary*: Including expanded
   records in the transferred zone data results in stretching ANAME
   TTLs and failing to update anything until secondary refresh, but
   /not/ including them would almost completely suppress ANAME
   functionality. I think the tradeoffs here need further analysis;
   more on that below.
3. *Address-including zone, address-lacking target*: An ALIAS-aware
   server will be able to locally resolve answers from the target name
   for address types that it has (e.g., A), while still providing
   nonempty answers from the zone for those it lacks (e.g., AAAA). At
   least Oracle [Dyn] customers actually prefer such behavior, as I
   mentioned in
   https://www.ietf.org/mail-archive/web/dnsop/current/msg20061.html .
   But note that it requires authoritative servers to override NODATA
   responses to ANAME target resolution, changing the last two
   paragraphs of Section 3.1.
4. *Address-ignorant primary, address-aware secondary*: Assuming that a
   new address record has been defined that the primary does not know
   of, the secondary will be able to include locally-resolved data for
   it, whether or not zone data includes the new type. In cases where
   the zone data just hasn't been updated, this behavior is better than
   assuming it has been pre-expanded to an empty set.
5. *Address-aware primary, address-ignorant secondary*: Assuming that a
   new address record has been defined which the primary knows of but
   the secondary does not, the transferred zone data should include
   pre-expanded answers of the type so the secondary has them available
   for its responses (since it doesn't know to look them up on its
   own). This informs the question from case 2 above, but does not
   completely resolve it (see below).
6. And layering DNSSEC on top of the above (i.e., assuming the
   ANAME-containing zone is signed), *ANAME-aware secondary without a
   zone-signing private key*: I agree that there is no reason for a
   secondary to respond with data that it cannot sign, but it should
   still include signed (fallback) data that ANAME-aware clients will
   attempt to override with local resolution. But how is the XFR server
   to know if the XFR client can add valid signatures?

Regarding zone transfers in which the secondary server is ignorant of ANAME altogether, or the inclusion of a new address type, it seems clear that primary servers capable of pre-expansion should do so. But in my mental model, there's a distinction between static in-zone fallback data and data that was resolved upstream (the latter subject to TTL decrementing and local refreshes, the former not), and ANAME-aware zone transfers should preserve the distinction even though resolution responses won't. There's also the practical matter of zone serial, which controls zone transfers but SHOULD NOT be updated by changes in non-zone data like ALIAS target answers.

With all that in mind, I think ANAME will need to update the definition of AXFR and IXFR, and IXFR in particular is likely to give ANAME a hard time:

   @     SOA serial=<N> ; PROBLEM 1!
          ; Use of an already-known serial (since static zone contents
   have not changed).
          ; This may confuse ANAME-ignorant servers into ignoring the
   XFR altogether.
   @     SOA serial=<N> ; PROBLEM 2!
          ; This is a putative ANAME-enhanced IXFR of serial N to serial N.
          ; But at this point, it is indistinguishable from an AXFR of
   a degenerate single-record zone.
   aname A 192.0.2.1 ; removed ANAME expansion
   aname A 192.0.2.2 ; PROBLEM 3!
          ; ANAME-ignorant servers must remove *all* previous ANAME
   target expansions, but those are independent of serial.
          ; The servers may fail when asked to delete a nonexistent RR.
   @     SOA serial=<N>
   aname A 192.0.2.1 ; new ANAME expansion
   @     SOA serial=<N>

I guess the above could be mitigated somewhat via a signal indicating ANAME-awareness in the client, but that probably means AXFR of an unchanged serial for ANAME-ignorant clients, which is a) incredibly wasteful and inefficient, and b) /still/ not guaranteed to succeed as far as I know.

There's also a similar problem for instructing secondary servers to switch away from UDP—we essentially have to lie about having serial N+1 in the single-SOA UDP response, or else they will consider theirselves already up-to-date and not even bother retrying.


On 01/12/2018 12:25 AM, internet-dra...@ietf.org wrote:
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Domain Name System Operations WG of the IETF.

         Title           : Address-specific DNS Name Redirection (ANAME)
         Authors         : Evan Hunt
                           Peter van Dijk
                           Anthony Eden
        Filename        : draft-ietf-dnsop-aname-01.txt
        Pages           : 12
        Date            : 2018-01-11

Abstract:
    This document defines the "ANAME" DNS RR type, to provide similar
    functionality to CNAME, but only redirects type A and AAAA queries.
    Unlike CNAME, an ANAME can coexist with other record types.  The
    ANAME RR allows zone owners to redirect queries for apex domain names
    in a standards compliant manner.


The IETF datatracker status page for this draft is:
https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dietf-2Ddnsop-2Daname_&d=DwICAg&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=-o8MJF7i0TzXAJRB0ncfTVfWKSyTG7nl_iTLU_A2B7c&m=RTkkehWDtp4BTCTzFokAZCDAuCd_w3pUmKgrZI930wg&s=ulCMqQ4wONLJG9KK0IQABDgOA2c8Re-qj7QjvlccUmM&e=

There are also htmlized versions available at:
https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dietf-2Ddnsop-2Daname-2D01&d=DwICAg&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=-o8MJF7i0TzXAJRB0ncfTVfWKSyTG7nl_iTLU_A2B7c&m=RTkkehWDtp4BTCTzFokAZCDAuCd_w3pUmKgrZI930wg&s=lIM4rArEf1_3WZ-wc0OAMjrrQl7oPojbWnL5c-sWvyE&e=
https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_html_draft-2Dietf-2Ddnsop-2Daname-2D01&d=DwICAg&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=-o8MJF7i0TzXAJRB0ncfTVfWKSyTG7nl_iTLU_A2B7c&m=RTkkehWDtp4BTCTzFokAZCDAuCd_w3pUmKgrZI930wg&s=zH9k0X0QisCnWUvpbFOYTUIPo-OXmY8eds60z-VhPyE&e=

A diff from the previous version is available at:
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_rfcdiff-3Furl2-3Ddraft-2Dietf-2Ddnsop-2Daname-2D01&d=DwICAg&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=-o8MJF7i0TzXAJRB0ncfTVfWKSyTG7nl_iTLU_A2B7c&m=RTkkehWDtp4BTCTzFokAZCDAuCd_w3pUmKgrZI930wg&s=dz9gowqhmuf5y-hhYE1mO53PxoJnMye_-MjScoWpsJQ&e=


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
https://urldefense.proofpoint.com/v2/url?u=ftp-3A__ftp.ietf.org_internet-2Ddrafts_&d=DwICAg&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=-o8MJF7i0TzXAJRB0ncfTVfWKSyTG7nl_iTLU_A2B7c&m=RTkkehWDtp4BTCTzFokAZCDAuCd_w3pUmKgrZI930wg&s=KOnatQo8HbAQv2xzq5uohkI5K0barAUuYdIu9PMd_7Q&e=

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_dnsop&d=DwICAg&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=-o8MJF7i0TzXAJRB0ncfTVfWKSyTG7nl_iTLU_A2B7c&m=RTkkehWDtp4BTCTzFokAZCDAuCd_w3pUmKgrZI930wg&s=GiCIMlFzleSHBbNYaGcNmJZBGJ5cSZIsI9BMUp2y8qI&e=

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to