Attachment 'rfc4892.txt'
Download 1 Network Working Group S. Woolf
2 Request for Comments: 4892 Internet Systems Consortium, Inc.
3 Category: Informational D. Conrad
4 ICANN
5 June 2007
6
7
8 Requirements for a Mechanism Identifying a Name Server Instance
9
10 Status of This Memo
11
12 This memo provides information for the Internet community. It does
13 not specify an Internet standard of any kind. Distribution of this
14 memo is unlimited.
15
16 Copyright Notice
17
18 Copyright (C) The IETF Trust (2007).
19
20 Abstract
21
22 With the increased use of DNS anycast, load balancing, and other
23 mechanisms allowing more than one DNS name server to share a single
24 IP address, it is sometimes difficult to tell which of a pool of name
25 servers has answered a particular query. A standardized mechanism to
26 determine the identity of a name server responding to a particular
27 query would be useful, particularly as a diagnostic aid for
28 administrators. Existing ad hoc mechanisms for addressing this need
29 have some shortcomings, not the least of which is the lack of prior
30 analysis of exactly how such a mechanism should be designed and
31 deployed. This document describes the existing convention used in
32 some widely deployed implementations of the DNS protocol, including
33 advantages and disadvantages, and discusses some attributes of an
34 improved mechanism.
35
36 1. Introduction and Rationale
37
38 Identifying which name server is responding to queries is often
39 useful, particularly in attempting to diagnose name server
40 difficulties. This is most obviously useful for authoritative
41 nameservers in the attempt to diagnose the source or prevalence of
42 inaccurate data, but can also conceivably be useful for caching
43 resolvers in similar and other situations. Furthermore, the ability
44 to identify which server is responding to a query has become more
45 useful as DNS has become more critical to more Internet users, and as
46 network and server deployment topologies have become more complex.
47
48
49
50
51
52 Woolf & Conrad Informational [Page 1]
53
54 RFC 4892 Serverid June 2007
55
56
57 The conventional means for determining which of several possible
58 servers is answering a query has traditionally been based on the use
59 of the server's IP address as a unique identifier. However, the
60 modern Internet has seen the deployment of various load balancing,
61 fault-tolerance, or attack-resistance schemes such as shared use of
62 unicast IP addresses as documented in [RFC3258]. An unfortunate side
63 effect of these schemes has been to make the use of IP addresses as
64 identifiers associated with DNS (or any other) service somewhat
65 problematic. Specifically, multiple dedicated DNS queries may not go
66 to the same server even though sent to the same IP address. Non-DNS
67 methods such as ICMP ping, TCP connections, or non-DNS UDP packets
68 (such as those generated by tools like "traceroute"), etc., may well
69 be even less certain to reach the same server as the one which
70 receives the DNS queries.
71
72 There is a well-known and frequently-used technique for determining
73 an identity for a nameserver more specific than the possibly-non-
74 unique "server that answered the query I sent to IP address A.B.C.D".
75 The widespread use of the existing convention suggests a need for a
76 documented, interoperable means of querying the identity of a
77 nameserver that may be part of an anycast or load-balancing cluster.
78 At the same time, however, it also has some drawbacks that argue
79 against standardizing it as it's been practiced so far.
80
81 2. Existing Conventions
82
83 For some time, the commonly deployed Berkeley Internet Name Domain
84 (BIND) implementation of the DNS protocol suite from the Internet
85 Systems Consortium [BIND] has supported a way of identifying a
86 particular server via the use of a standards-compliant, if somewhat
87 unusual, DNS query. Specifically, a query to a recent BIND server
88 for a TXT resource record in class 3 (CHAOS) for the domain name
89 "HOSTNAME.BIND." will return a string that can be configured by the
90 name server administrator to provide a unique identifier for the
91 responding server. (The value defaults to the result of a
92 gethostname() call). This mechanism, which is an extension of the
93 BIND convention of using CHAOS class TXT RR queries to sub-domains of
94 the "BIND." domain for version information, has been copied by
95 several name server vendors.
96
97 A refinement to the BIND-based mechanism, which dropped the
98 implementation-specific label, replaces "BIND." with "SERVER.". Thus
99 the query label to learn the unique name of a server may appear as
100 "ID.SERVER.".
101
102 (For reference, the other well-known name used by recent versions of
103 BIND within the CHAOS class "BIND." domain is "VERSION.BIND.". A
104 query for a CHAOS TXT RR for this name will return an
105
106
107
108 Woolf & Conrad Informational [Page 2]
109
110 RFC 4892 Serverid June 2007
111
112
113 administratively defined string which defaults to the software
114 version of the server responding. This is, however, not generally
115 implemented by other vendors.)
116
117 2.1. Advantages
118
119 There are several valuable attributes to this mechanism, which
120 account for its usefulness.
121
122 1. The "HOSTNAME.BIND." or "ID.SERVER." query response mechanism is
123 within the DNS protocol itself. An identification mechanism that
124 relies on the DNS protocol is more likely to be successful
125 (although not guaranteed) in going to the same system as a
126 "normal" DNS query.
127
128 2. Since the identity information is requested and returned within
129 the DNS protocol, it doesn't require allowing any other query
130 mechanism to the server, such as holes in firewalls for
131 otherwise-unallowed ICMP Echo requests. Thus it is likely to
132 reach the same server over a path subject to the same routing,
133 resource, and security policy as the query, without any special
134 exceptions to site security policy.
135
136 3. It is simple to configure. An administrator can easily turn on
137 this feature and control the results of the relevant query.
138
139 4. It allows the administrator complete control of what information
140 is given out in the response, minimizing passive leakage of
141 implementation or configuration details. Such details are often
142 considered sensitive by infrastructure operators.
143
144 2.2. Disadvantages
145
146 At the same time, there are some serious drawbacks to the CHAOS/TXT
147 query mechanism that argue against standardizing it as it currently
148 operates.
149
150 1. It requires an additional query to correlate between the answer
151 to a DNS query under normal conditions and the supposed identity
152 of the server receiving the query. There are a number of
153 situations in which this simply isn't reliable.
154
155 2. It reserves an entire class in the DNS (CHAOS) for what amounts
156 to one zone. While CHAOS class is defined in [RFC1034] and
157 [RFC1035], it's not clear that supporting it solely for this
158 purpose is a good use of the namespace or of implementation
159 effort.
160
161
162
163
164 Woolf & Conrad Informational [Page 3]
165
166 RFC 4892 Serverid June 2007
167
168
169 3. The initial and still common form, using "BIND.", is
170 implementation specific. BIND is one DNS implementation. At the
171 time of this writing, it is probably most prevalent for
172 authoritative servers. This does not justify standardizing on
173 its ad hoc solution to a problem shared across many operators and
174 implementors. Meanwhile, the aforementioned refinement changes
175 the query label but preserves the ad hoc CHAOS/TXT mechanism.
176
177 4. There is no convention or shared understanding of what
178 information an answer to such a query for a server identity could
179 or should contain, including a possible encoding or
180 authentication mechanism.
181
182 5. Hypothetically, since DNSSEC has been defined to cover all DNS
183 classes, the TXT RRs returned in response to the "ID.SERVER."
184 query could be signed, which has the advantages described in
185 [RFC4033]. However, since DNSSEC deployment for the CHAOS class
186 is neither existent nor foreseeable, and since the "ID.SERVER."
187 TXT RR is expected to be unique per server, this would be
188 impossible in practice.
189
190 The first of the listed disadvantages may be technically the most
191 serious. It argues for an attempt to design a good answer to the
192 problem, "I need to know what nameserver is answering my queries",
193 not simply a convenient one.
194
195 3. Characteristics of an Implementation Neutral Convention
196
197 The discussion above of advantages and disadvantages to the
198 "HOSTNAME.BIND." mechanism suggest some requirements for a better
199 solution to the server identification problem. These are summarized
200 here as guidelines for any effort to provide appropriate protocol
201 extensions:
202
203 1. The mechanism adopted must be in-band for the DNS protocol. That
204 is, it needs to allow the query for the server's identifying
205 information to be part of a normal, operational query. It should
206 also permit a separate, dedicated query for the server's
207 identifying information. But it should preserve the ability of
208 the CHAOS/TXT query-based mechanism to work through firewalls and
209 in other situations where only DNS can be relied upon to reach
210 the server of interest.
211
212 2. The new mechanism should not require dedicated namespaces or
213 other reserved values outside of the existing protocol mechanisms
214 for these, i.e., the OPT pseudo-RR. In particular, it should not
215 propagate the existing drawback of requiring support for a CLASS
216
217
218
219
220 Woolf & Conrad Informational [Page 4]
221
222 RFC 4892 Serverid June 2007
223
224
225 and top level domain in the authoritative server (or the querying
226 tool) to be useful.
227
228 3. Support for the identification functionality should be easy to
229 implement and easy to enable. It must be easy to disable and
230 should lend itself to access controls on who can query for it.
231
232 4. It should be possible to return a unique identifier for a server
233 without requiring the exposure of information that may be non-
234 public and considered sensitive by the operator, such as a
235 hostname or unicast IP address maintained for administrative
236 purposes.
237
238 5. It should be possible to authenticate the received data by some
239 mechanism analogous to those provided by DNSSEC. In this
240 context, the need could be met by including encryption options in
241 the specification of a new mechanism.
242
243 6. The identification mechanism should not be implementation-
244 specific.
245
246 4. IANA Considerations
247
248 This document proposes no specific IANA action. Protocol extensions,
249 if any, to meet the requirements described are out of scope for this
250 document. A proposed extension, specified and adopted by normal IETF
251 process, is described in [NSID], including relevant IANA action.
252
253 5. Security Considerations
254
255 Providing identifying information as to which server is responding to
256 a particular query from a particular location in the Internet can be
257 seen as information leakage and thus a security risk. This motivates
258 the suggestion above that a new mechanism for server identification
259 allow the administrator to disable the functionality altogether or
260 partially restrict availability of the data. It also suggests that
261 the server identification data should not be readily correlated with
262 a hostname or unicast IP address that may be considered private to
263 the nameserver operator's management infrastructure.
264
265 Propagation of protocol or service meta-data can sometimes expose the
266 application to denial of service or other attack. As the DNS is a
267 critically important infrastructure service for the production
268 Internet, extra care needs to be taken against this risk for
269 designers, implementors, and operators of a new mechanism for server
270 identification.
271
272
273
274
275
276 Woolf & Conrad Informational [Page 5]
277
278 RFC 4892 Serverid June 2007
279
280
281 Both authentication and confidentiality of server identification data
282 are potentially of interest to administrators -- that is, operators
283 may wish to make such data available and reliable to themselves and
284 their chosen associates only. This constraint would imply both an
285 ability to authenticate it to themselves and to keep it private from
286 arbitrary other parties, which leads to characteristics 4 and 5 of an
287 improved solution.
288
289 6. Acknowledgements
290
291 The technique for host identification documented here was initially
292 implemented by Paul Vixie of the Internet Software Consortium in the
293 Berkeley Internet Name Daemon package. Comments and questions on
294 earlier versions were provided by Bob Halley, Brian Wellington,
295 Andreas Gustafsson, Ted Hardie, Chris Yarnell, Randy Bush, and
296 members of the ICANN Root Server System Advisory Committee. The
297 newest version takes a significantly different direction from
298 previous versions, owing to discussion among contributors to the
299 DNSOP working group and others, particularly Olafur Gudmundsson, Ed
300 Lewis, Bill Manning, Sam Weiler, and Rob Austein.
301
302 7. References
303
304 7.1. Normative References
305
306 [RFC1034] Mockapetris, P., "Domain Names - Concepts and Facilities",
307 STD 13, RFC 1034, November 1987.
308
309 [RFC1035] Mockapetris, P., "Domain Names - Implementation and
310 Specification", STD 13, RFC 1035, November 1987.
311
312 [RFC3258] Hardie, T., "Distributing Authoritative Name Servers via
313 Shared Unicast Addresses", RFC 3258, April 2002.
314
315 7.2. Informative References
316
317 [BIND] ISC, "BIND 9 Configuration Reference".
318
319 [NSID] Austein, R., "DNS Name Server Identifier Option (NSID)",
320 Work in Progress, June 2006.
321
322 [RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and S.
323 Rose, "DNS Security Introduction and Requirements", RFC
324 4033, March 2005.
325
326
327
328
329
330
331
332 Woolf & Conrad Informational [Page 6]
333
334 RFC 4892 Serverid June 2007
335
336
337 Authors' Addresses
338
339 Suzanne Woolf
340 Internet Systems Consortium, Inc.
341 950 Charter Street
342 Redwood City, CA 94063
343 US
344
345 Phone: +1 650 423-1333
346 EMail: woolf@isc.org
347 URI: http://www.isc.org/
348
349
350 David Conrad
351 ICANN
352 4676 Admiralty Way
353 Marina del Rey, CA 90292
354 US
355
356 Phone: +1 310 823 9358
357 EMail: david.conrad@icann.org
358 URI: http://www.iana.org/
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388 Woolf & Conrad Informational [Page 7]
389
390 RFC 4892 Serverid June 2007
391
392
393 Full Copyright Statement
394
395 Copyright (C) The IETF Trust (2007).
396
397 This document is subject to the rights, licenses and restrictions
398 contained in BCP 78, and except as set forth therein, the authors
399 retain all their rights.
400
401 This document and the information contained herein are provided on an
402 "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
403 OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
404 THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
405 OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
406 THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
407 WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
408
409 Intellectual Property
410
411 The IETF takes no position regarding the validity or scope of any
412 Intellectual Property Rights or other rights that might be claimed to
413 pertain to the implementation or use of the technology described in
414 this document or the extent to which any license under such rights
415 might or might not be available; nor does it represent that it has
416 made any independent effort to identify any such rights. Information
417 on the procedures with respect to rights in RFC documents can be
418 found in BCP 78 and BCP 79.
419
420 Copies of IPR disclosures made to the IETF Secretariat and any
421 assurances of licenses to be made available, or the result of an
422 attempt made to obtain a general license or permission for the use of
423 such proprietary rights by implementers or users of this
424 specification can be obtained from the IETF on-line IPR repository at
425 http://www.ietf.org/ipr.
426
427 The IETF invites any interested party to bring to its attention any
428 copyrights, patents or patent applications, or other proprietary
429 rights that may cover technology that may be required to implement
430 this standard. Please address the information to the IETF at
431 ietf-ipr@ietf.org.
432
433 Acknowledgement
434
435 Funding for the RFC Editor function is currently provided by the
436 Internet Society.
437
438
439
440
441
442
443
444 Woolf & Conrad Informational [Page 8]
445
Attached Files
To refer to attachments on a page, use attachment:filename, as shown below in the list of files. Do NOT use the URL of the [get] link, since this is subject to change and can break easily.You are not allowed to attach a file to this page.