On 22/11/2018 12:53, Jim Hague wrote:
> On 21/11/2018 14:43, Suresh Krishnan wrote:
>> * Section 7.4.1.1.
>>
>> Looks like you can limit the
{client,server}-address-prefix-{ipv4,ipv6} fields
>> to one byte to restrict the range. e.g.
>>
>> client-address-prefix-ipv6 => uint .size 1
>>
>> Similar restrictions can be used for port (2) and TTL/hop limit (1)
fields.
>[....]
>
> As to whether there is value in applying size or range restrictions
> throughout the rest of the fields, we're not so sure. As well as port
> and hoplimit, many of the DNS items (e.g. opcode, rcode) could also be
> allocated a maximum size. Or possibly we should only put a range on
> user-specified items such as VLAN IDs or opcodes to capture.
>
> We'll ask the CBOR WG mailing list if there is a preferred CDDL style
> for these cases.
 The CBOR WG report there is as yet no received style, or in this case
right answer.

In the context of C-DNS, I am inclined to express ranges where values
stored are generated by the C-DNS application, but not for values of DNS
traffic items. C-DNS is storing traffic collected by one means or
another, and I think it should be storing what's reported. Expressing
validity ranges moves towards C-DNS being required to validate the
traffic. We intend C-DNS to be a storage mechanism, not a validation one.

So I suggest we specify validity ranges only for the following
configuration items:

StorageParameters:
* IPv6 prefix length. 1..32.
* IPv4 prefix length. 1..128.
* OPCODE (in list of OPCODEs to collect). 0..15.
* RR TYPE (in list of RR TYPEs to collect). 0..65535 or uint .size 2.

CollectionParameters:
* Promiscuous mode. Make this a boolean, holding CBOR true or false.
* VLAN ID (in list of VLAN IDs to collect). 1..0xffe.
-- 
Jim Hague - j...@sinodun.com          Never trust a computer you can't lift.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to