By saying things like "We load the authoritative data into memory so that is also cached data" and other nonsense the vendor is stating that this behavior is in compliance with the RFCs and refusing to fix their code. Very frustrating, as I believe this behavior is clearly wrong and also seems to me to be a security issue.

Thanks for your help anyway!
Maria

On May 11, 2009, at 2:33 PM, Kevin Darcy wrote:

The "resolver algorithm" in RFC 1034, Section 5.3.3, states

  1. See if the answer is in local information, and if so return

        it to the client.


and is further detailed as

Step 1 searches the cache for the desired data. If the data is in the cache, it is assumed to be good enough for normal use. Some resolvers have an option at the user interface which will force the resolver to ignore the cached data and consult with an authoritative server. This is not recommended as the default. If the resolver has direct access to
  a name server's zones, it should check to see if the desired data is
present in authoritative form, and if so, use the authoritative data in
  preference to cached data.

This would be a case where the resolver "has direct access to the name server's zones", so there is no debate, in my opinion, that the resolver in question is doing The Wrong Thing.

RFC 2181 also makes it clear that authoritative data ranks higher than cached data, so that could also be used as a relevant normative reference.

- Kevin

Maria Iano wrote:
My apologies if this is considered to be too off-topic.

I have a situation where my company uses a number of servers with a commercial DNS implementation (in addition to our BIND servers). The other implementation is Windows DNS, and there is some behavior that I do not think is acceptable, but which the vendor claims is acceptable behavior. I really want them to fix this bug (as I consider it), but first I need to get general agreement that it is a bug. I will be looking through the RFCs as much as I can time for, but haven't found what I need yet. Since my next meeting with the vendor is tomorrow, I thought I would also ask if anyone can already point me to a relevant RFC or other reference.

Here is the behavior that I think is not acceptable.

We have configured a zone on the windows server - dmz.example.com. This zone contains an A record for foo.dmz.example.com with IP address 10.240.240.240. The zone example.com is hosted elsewhere and contains a CNAME record foo.example.com pointing to foo.dmz.example.com.

If the cache has just been cleared, and a client asks the WIndows DNS server for foo.example.com, it has a forwarding server to which it forwards the request. The forwarding server hands it back the CNAME record but it also hands back an A record for foo.dmz.example.com pointing to an incorrect IP address 192.168.240.240. The Windows DNS server accepts this A record for foo.dmz.example.com with an incorrect IP address into its cache, and hands out that incorrect information to the client. Even though it concurrently has dmz.gannett.com configured on it as a primary zone with a record for that same owner name pointing to a different IP address.

I believe it shouldn't do that. Since it hosts dmz.example.com as a primary zone, I think it should discard that bad A record and hand back its own.

The vendor's argument is that it should blindly trust the forwarding resolver.

Can anyone point me to an RFC or reference about this?

Thanks,
Maria
_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to