On 27. 01. 20 16:08, Hugo Salgado wrote:
Dear DNSOPers, as an operator I tend to have this need to couple
an answer for a query to an auth server, with the actual "SOA zone
version" used. So I think it'll be valuable to have an EDNS option
for it.
Here I'm proposing it with this new draft. The 'camel index' for
its implementation/hack/proof-of-concept is about 37 lines in
NSD 4.1 (more details in Appendix A).
I've asked some operators and they see value on it. Is there any
support for adoption in DNSOP?
-----
Name: draft-salgado-rrserial
Revision: 01
...
This "RRSERIAL" data allows to debug problems and diagnosis by
helping to recognize the origin of an answer, associating this answer
with a respective zone version.
I think it needs more thought. Here's why:
Extending TTLs
==============
First, people in this thread have floated ideas about using SOA serial
for extending TTLs.
I think it's a bad idea because:
a) It would be pretty complex to implement right.
b) There are no guarantees that the SOA serial did not overflow in the
meanwhile. As an extreme example, auth server can legally increment SOA
value by 2^29 for each update, thus rolling SOA serial over very frequently.
Debugging
=========
Secondly, let's consider just the "debugging" use-case, which removes
the requirement to make the proposed mechanism 100 % reliable:
In practice, this RRSERIAL option is a specialized way to conflate two
queries into one:
- First query specified by the standard (qclass, qtype, qname)
- Second query with hardcoded qtype=SOA, qclass derived from the primary
qclass in question section, and SOA name derived from qname in the
question section.
To me, this sounds like a crude hack, and I think the proper solution
should be a real multi-query option, which incidentally provides a
superset of RRSERIAL capabilities.
A multi-query option would also work multi-master architectures that
cannot rely on SOA serial but on some other (presumably queriable)
information.
Epilogue
========
Generally, I think SOA serial design was fine in 1985 but is ill-fitted
for 2021. (I have to admit I'm biased because I'm implemented
multi-master auth in topologies with tens of DNS servers, all accepting
dynamic updates at the same time.)
For this reason, I think the DNS protocol should be gradually getting
rid of the dependency on SOA serial, not increasing it.
--
Petr Špaček
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop