Wrong thread, so I changed the subject..  Thanks for feedback; most of 
these seem to be caused by confusion that this would be a normative 
reference for implementors, managers and users; it is not.  Maybe this 
needs to be strengthened in the Introduction..

On Tue, 23 Mar 2004, J-F C. (Jefsey)  Morfin wrote:
> 1.2 Independence of DNS Transport and DNS Records
> 
>     DNS has been designed to present a single, globally unique name space
>     [6].  This property should be maintained, as described here and in
>     Section 1.3.
> 
> | the meaning of the word "global" differs in American and in English.
> | the reference to RFC 2826 is inadequate. The reason why is that RFC 2826
> | is for information, is ambiguous and over disputed. RFC 883 says the
> | same thing better - even if contradicted by RFC 882 at the time.
> 
> | When introducing a tool of globality such as IPv6, it is inappropriate
> | to refer to obsolete documents. RFC 2826 is obsoleted by ICP-3 which
> | considers that future (IPv6?) might lead to a non unique authoritative
> | root file.
> 
> | the DNS has not been designed to present "a" single unique name space.
> | The current use of the only "IN" RR leads to that. As an example the
> | preparation of the 2005 WSIS in Tunis considers the demand of the users
> | as the defintion of "Tunnet". The use of a "TN" RR would permit to
> | test them without disrupting the current Internet. This kind of
> | experimentation, under these terms, is what is called for by ICP-3.
> | The experiementation of new IPv6 features should be proposed under
> | an experimentatal name space, for example "I6". This RFC should
> | document it as a way to transition and safely experimenting.

This document represent current practice and understanding, not what 
might be or could be, (or what some others may hope will never be).

Thus I do not see a need to make changes here.

>     In DNS, the IP version used to transport the queries and responses is
>     independent of the records being queried: AAAA records can be queried
>     over IPv4, and A records over IPv6. The DNS servers must not make any
>     assumptions about what data to return for Answer and Authority
>     sections.
> 
>     However, there is some debate whether the addresses in Additional
>     section could be selected or filtered using hints obtained from which
>     transport was being used; this has some obvious problems because in
>     many cases the transport protocol does not correlate with the
>     requests, and because a "bad" answer is in a way worse than no answer
>     at all (consider the case where the client is led to believe that a
>     name received in the additional record does not have any AAAA records
>     to begin with).
> 
> | this leads to accept a layer violation as a legitimate consideration.
> | the DNS is about resolving 0-Z strings into IP adresses. External issues
> | such as used protocols are orthogonal, except when a part of the
> | query - like for mail services and "MX". Phrasing should underline this?

Note that the latter paragraph only describes that there has been 
debate about a subject, and states why this is a bad idea.  If you 
think this is insufficient (and as there was some other pushback about 
changes), could you propose text you'd like to see changed (and how)?

> 2.1 Limited-scope Addresses
> 
>     The IPv6 addressing architecture [5] includes two kinds of local-use
>     addresses: link-local (fe80::/10) and site-local (fec0::/10).  The
>     site-local addresses are being deprecated [7], and are only discussed
>     in Appendix A.
> 
>     Link-local addresses should never be published in DNS, because they
>     have only local (to the connected link) significance [8].
> 
> | "should" ? Should it not be possible to enforce this in writing codes
> | voiding the concerned RRs if entered ?

Enforcing anything is beyond the scope of this document.  It may give 
hints to implementers and the DNS spec writers, but that's all about 
it.

> 5.2 Recursive DNS Resolver Discovery
> 
>     Recursive IPv6 DNS resolver discovery is a subject of active debate
>     at the moment: the main proposed mechanisms include the use of
>     well-known addresses [21], the use of Router Advertisements to convey
>     the information [22], and using DHCPv6 (or the stateless subset of it
>     [23]) for DNS resolver configuration. No consensus has been reached
>     yet.
> 
>     Note that IPv6 DNS resolver discovery, while an important topic, is
>     not required for dual-stack nodes in dual-stack networks: IPv6 DNS
>     records can very well be queried over IPv4 as well.
> 
> | it seems inadequate to publish a comprehensive document with such a
> | lack of consensus. Or to mention that as a point for a further RFC.

This subject is out of scope for this work, and is being solved 
separately.  I think the question is which is better, publishing a 
document describing current understanding or waiting for long time to 
get consensus so that every issue has already been decided.  For 
informational purposes, I think publishing (even if still raw) results 
is appropriate.

However, there is work in progress to describe this at more length
before the next IETF -- but that's a separate topic.

> 7.1 Applicability of Reverse DNS
[...]
>     It is not clear whether it makes sense to require or recommend that
>     reverse DNS records be updated.  In many cases, it would just make
>     more sense to use proper mechanisms for security (or topological
>     information lookup) in the first place.  At minimum, the applications
>     which use it as a generic authorization (in the sense that a record
>     exists at all) should be modified as soon as possible to avoid such
>     lookups completely.
> 
> | wording seems unadequate for an RFC? Should it not be afirmative?
> | Saying "there are diferent positions" : as a developper or a
> | manager, I cannot make any sense out of this?

That's as it should be, in this case: this document is not trying to 
be *normative* reference on how things must be done, but to point out 
different arguments (if there are more than one) to give the reader 
the opportunity to judge on his own.

> 7.3 DDNS with Stateless Address Autoconfiguration
> 
>     Dynamic DNS with SLAAC is a bit complicated, but manageable with a
>     rather low form of security with some implementation.
> 
> | quite subjective, unprecise and uninformative "a bit", "rather low"?

Yes, but this is explained at more length below.  Other suggestions?  
Note that anything is likely to be subjective here :-)
 
>     Every node on a link must then be allowed to insert its own reverse
>     DNS record in the reverse zone.  However, in the typical case, there
>     can be no stronger form of authentication between the nodes and the
>     server than the source IP address (the user may roam to other
>     administrative domains as well, requiring updates to foreign DNS
>     servers), which might make attacks more lucrative.
> 
> | "lucrative" seems subjective :-). It does not tell the kind of risk.
> | As a user I want to understand what I am to do and why.

It is intended to point out that attacking is eas(y/ier) if you just 
use IP addresses as a form of authentication.  I agree that this 
wording should be better.  Maybe along the lines of:

             .  In this case the attacker would only need to be able to 
     spoof the source address to be able to hijack a DDNS-managed 
     name -- compared to obtaining breaking cryptographic keys if a 
     more secure form of DDNS management was used.
     
sound good enough? other suggestions?
 
>     Moreover, the reverse zones must be cleaned up by some janitorial
>     process: the node does not typically know a priori that it will be
>     disconnected, and cannot send a DNS update using the correct source
>     address to remove a record.
> 
> | "some" ? Janitorial ? What is the process to specifically carry ?
> | I should understand what I am to develop.

This document is not meant to be normative, so the details are left as 
an exercise of the reader; I don't think it is useful to try to 
specify the exact steps here, but if you have suggestions what to add 
here...?

-- 
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings


.
dnsop resources:_____________________________________________________
web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html

Reply via email to