OK -- let's try to summarize this.

1) let's avoid lengthy rat-holing discussions here,
2) a longer applicability statement might be good, but that's 
independent of this document, and
3) it might be useful to add a short warning of QTYPE=* in this 
document.

I propose adding the following as Section 1.4:

        <section title="Query Type 'ANY' and A/AAAA Records">
        <t>QTYPE=* is typically only used for debugging or management
purposes; it is worth keeping in mind that QTYPE=* ("ANY" queries)
literally return any available RRsets, not *all* available RRsets.
Therefore, to get both A and AAAA records reliably, two separate 
queries must be made.</t>
        </section>

Objections, rewording, ...?

On Wed, 5 May 2004, Edward Lewis wrote:
> At 7:57 +0300 5/5/04, Pekka Savola wrote:
> >Isn't the use of QTYPE=* causing more problems than its worth, being
> >unreliable and all that?  Or is it's usefulness precisely restricted
> >to identifying what _is_ in the caches (and what is not)?
> 
> This is an ancillary comment, based on the experience of being 
> involved in DNSSEC and the longer-than-it-should-have-taken road it 
> has travelled.
> 
> I'd address this issue like:
> 
> A) Don't bother discussing the usefulness of QTYPE=* here.  It isn't 
> a v6.  (Debating the value of a feature good "only for 
> troubleshooting" is a rat hole.  There's no objective answer.  Ever.)
> 
> B) Write the guidelines for IPv6 adoption mindful of all the quirks of DNS.
> 
> C) Don't smooth over the hard parts - doing so only creates the 
> dreaded "corner cases."  Overly strict "rules" eventually cause 
> conflict.  Instead, be loose enough to absorb the shocks of running 
> over a rough road.
> 
> DNSSEC at first tried to solve for only the normal cases of DNS, as 
> well as some cases that were interesting to the security community 
> (like alternative chains of trust).  A lot of the delay of the 
> security extensions to DNS came from not having enough of an 
> understanding of the base protocol.
> 
> To address the questions 1,2,3...
> 
> 1) Personally I don't see QTYPE=* as an oddity, it's just not very 
> clear to the causal observer.  I'd not mention in the document 
> anything positive, but a warning against assuming that QTYPE=* will 
> retrieve both A and AAAA if they both exist.
> 
> 2) I doubt there's much value is writing another document on QTYPE=*. 
> It's defined in 1035 +/- 1, well enough I think.  (It's actually 
> QTYPE=ANY, which makes it easier to understand - it's not QTYPE=ALL! 
> The latter is the assumption many make.)
> 
> 3) No - but perhaps we (and I) ought to be clearer and never refer to 
> QTYPE=*.  There are times I rely on the ANY QTYPE for debugging.
> 
> This is off-thread, but a similar situation holds for the truncation 
> discussion.   Ohta's better at it than I, the morale is not to dive 
> into a treatise on the additional section for v6 without more 
> research on the TC bit settings.  There's a lot already written in 
> the topic.  I know - DNSSEC also messed with the rules there. ;)
> 
> 

-- 
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

.
dnsop resources:_____________________________________________________
web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html

Reply via email to