On 1-Aug-2006, at 02:30, Paul Vixie wrote:
i'll say again, this deserves a re-read, since it's almost a re-
write vs. -03.
Comments interspersed with text, below.
Apologies in advance for being an amateur grammarian. People with
real linguistic training should feel free to smack me down with
prejudice.
Is it the intention that this draft ultimately be published in the
BCP series?
Abstract
With a mandated default minimum maximum message size of 512
octets,
the DNS protocol presents some special problems for zones
wishing to
expose a moderate or high number of authority servers (NS
RRs). This
document explains the operational issues caused by, or
related to
this response size limit.
... and gives guidance to zone administrators and implementers of DNS
software? (The former with respect to choosing an appropriate NS set
for a zone; the latter with respect to the additional section
ordering discussed later on.)
1 - Introduction and Overview
1.1. The DNS standard (see [RFC1035 4.2.1]) limits message size
to 512
octets. Even though this limitation was due to the required
minimum IP
reassembly limit for IPv4, it became a hard DNS protocol limit
and is
not implicitly relaxed by changes in transport, for example to
IPv6.
1.2. The EDNS0 protocol extension (see [RFC2671 2.3, 4.5]) permits
larger responses by mutual agreement of the requestor and
responder.
I say "requester", possibly because I am not really Canadian. I'll
continue to say that throughout the document, on the off-chance that
it's worth saying.
However, deployment of EDNS0 cannot be expected to reach every
Internet
resolver in the short or medium term. The 512 octet message
size limit
remains in practical effect at this time.
I find the use of "short or medium term" and "at this time" vexing in
a document that will exist in static form for a long time in the future.
Perhaps this could be rephrased as
"The 512 octet message size limit will remain in practical effect
until there is widespread deployment of EDNS0 in DNS resolvers on the
Internet. At the time of publication this is not expected to happen
in the short or medium term."
1.3. Since DNS responses include a copy of the request, the space
available for response data is somewhat less than the full 512
octets.
Negative responses are quite small, but for positive and delegation
responses, every octet must be carefully and sparingly
allocated. This
document specifically addresses delegation response sizes.
2 - Delegation Details
2.1. A delegation response will include the following elements:
Header Section: fixed length (12 octets)
Question Section: original query (name, class, type)
Answer Section: (empty)
Authority Section: NS RRset (nameserver names)
Additional Section: A and AAAA RRsets (nameserver addresses)
2.2. If the total response size would exceed 512 octets, and if
the data
that would not fit was "required", then the TC bit will be set
(indicating truncation). This will usually cause the requestor
to retry
"requester".
You're mixing moods in the first sentence, I think -- if you replace
"would exceed" and "would not fit" with "exceeds" and "does not fit",
then the indicative-mood "will be" will be able to rest more
comfortably in the sentence.
using TCP, depending on what information was desired and what
information was omitted. (For example, truncation in the authority
section is of no interest to a stub resolver who only plans to
consume
the answer section.) If a retry using TCP is needed, the total
cost of
the transaction is much higher. See [RFC1123 6.1.3.2] for
details on
the requirement that UDP be attempted before falling back to TCP.
I think if you lose the brackets around the example it will make the
text clearer.
2.3. RRsets are never sent partially unless TC bit set to indicate
truncation. When TC bit is set, the final apparent RRset in the
final
nonempty section must be considered "possibly damaged" (see
[RFC1035
"non-empty"
6.2], [RFC2181 9]).
2.4. With or without truncation, the glue present in the
additional data
section should be considered "possibly incomplete", and requestors
"requesters"
should be prepared to re-query for any damaged or missing
RRsets. Note
that truncation of the additional data section might not be
signalled
via the TC bit since additional data is often optional.
2.5. DNS label compression allows a domain name to be
instantiated only
once per DNS message, and then referenced with a two-octet
"pointer"
from other locations in that same DNS message. If all
nameserver names
in a message are similar (for example, all ending in ".ROOT-
SERVERS.NET"), then more space will be available for
uncompressable data
"incompressible"
(such as nameserver addresses).
Since the rest of the text is so well-annotated with references, a
reference to [RFC 1035 4.1.4] seems like it belongs somewhere here.
2.6. The query name can be as long as 255 characters of
presentation
data, which can be up to 256 octets of network data. In this
worst case
scenario, the question section will be 260 octets in size, which
would
leave only 240 octets for the authority and additional sections
(after
deducting 12 octets for the fixed length header.)
So, maximum name size is 255 [RFC 1035 2.3.4]; maximum QNAME size is
maximum name size plus 1 for the zero-length root label [RFC 1035
4.1.2]; QTYPE is fixed two octets; QCLASS is fixed two octets. 255 +
1 + 2 + 2 = 260. Or something like that.
Something in me wants to see more working in the text above (perhaps
broken into a table, or some other easy-to-appreciate layout).
2.7. Average and maximum question section sizes can be predicted
by the
zone owner, since they will know what names actually exist, and can
measure which ones are queried for most often. For cost and
performance
reasons, the majority of requests should be satisfied without
truncation
or TCP retry.
Is this true?
If the name AFILIAS.INFO exists, then the largest request to an INFO
server that can give a delegation response still involves a 260-byte
question section (since I can pad my question to the left of
AFILIAS.INFO with big labels).
I don't see how knowledge of the contents of the INFO zone could
allow me to think that the maximum question section size could be
less than 260.
The average section size (for some measure of average) seems like
useful consideration, however, since "average" plays nicely with
"majority".
2.8. Some queries to non-existing names can be large, but this
is not a
problem because negative responses need not contain any answer,
authority or additional records. (See [RFC2308 2.1] for more
information about the format of negative responses.)
I think you can safely lose the round brackets.
2.9. The minimum useful number of name servers is two, for
redundancy
(see [RFC1034 4.1]). In case of multihomed name servers, it is
"multi-homed" (bleh, I am wildly inconsistent with this, so I have no
real business typing anything here.)
advantageous to include an address record from each of several name
servers before including several address records for any one name
server. If address records for more than one transport (for
example, A
and AAAA) are available, then it is advantageous to include
records of
both types early on, before the message is full.
2.10. The best case is no truncation at all. This is because many
requestors will retry using TCP by reflex, or will automatically
re-
"requesters"
query for RRsets that are "possibly truncated", without considering
whether the omitted data was actually necessary.
I think you can lose the quotes around "possibly truncated".
2.11. Each added NS RR for a zone will add a minimum of between
16 and
44 octets to every untruncated referral or negative response
from the
"non-truncated". "Minimum of between X and Y" seems like an odd
phrase (isn't the minimum of between X and Y just X?) but the rest of
the sentence provides context.
zone's authority servers (16 octets for an NS RR, 16 octets for
an A RR,
and 28 octets for an AAAA RR), in addition to whatever space is
taken by
the nameserver name (NS NSDNAME as well as A or AAAA owner name).
2.12. While DNS distinguishes between necessary and optional
resource
records, this distinction is according to protocol elements
necessary to
signify facts, and takes no official notice of protocol content
necessary to ensure correct operation. For example, a
nameserver name
that is in or below the zone cut being described by a delegation is
"necessary content," since there is no way to reach that zone
unless the
parent zone's delegation includes "glue records" describing that
name
server's addresses.
2.13. It is also necessary to distinguish between "explicit
truncation"
where a message could not contain enough records to convey its
intended
meaning, and so the TC bit has been set, and "silent
truncation", where
the message was not large enough to contain some records which
were "not
required", and so the TC bit was not set.
2.14. An delegation response should prioritize glue records as
follows.
So, this part here seems like guidance to implementers. Perhaps it
would be worth isolating the guidance to implementers and that to
zone administrators, and to label them accordingly?
A zone administrator reading the following text might be confused as
to how they configure their nameserver to sort the additional
section, for example. If it was obvious that this was not
configuration work for them but instead behaviour they should expect
and request from their nameserver vendor, that might be useful.
first
All glue RRsets for one name server whose name is in or below
the
zone being delegated, or which has multiple address RRsets
(currently
A and AAAA), or preferrably both;
"preferably". The EPP specifications use the word "subordinate" to
mean "in or below the zone being delegated" (and "superordinate" to
indicate the converse). Those might be useful in the interests of
avoiding repetition of that long phrase.
second
Alternate between adding all glue RRsets for any name servers
whose
names are in or below the zone being delegated, and all glue
RRsets
for any name servers who have multiple address RRsets
(currently A
and AAAA);
thence
All other glue RRsets, in any order.
The goal of this priority scheme is to offer "necessary" glue
first,
avoiding silent truncation for this glue if possible.
What about re-ordering RRsets within each of those categories between
successive queries?
Also, this advice seems to indicate that if I have nameservers
answering on the addresses:
199.212.90.4
204.152.186.101
204.152.186.102
2001:4f8:3:ba:202:b3ff:fe8a:608
2001:4f8:3:ba:202:b3ff:fe8a:605
then it would be better to do something like:
ns1 (199.212.90.4)
ns2 (204.152.186.101, 2001:4f8:3:ba:202:b3ff:fe8a:608)
ns3 (204.152.186.102, 2001:4f8:3:ba:202:b3ff:fe8a:605)
than to separate the v6 addresses out onto separate names, viz:
ns1 (199.212.90.4)
ns2 (204.152.186.101)
ns3 (204.152.186.102)
ns4 (2001:4f8:3:ba:202:b3ff:fe8a:608)
ns5 (2001:4f8:3:ba:202:b3ff:fe8a:605)
since there is less risk of an additional section in a delegation
response only including glue for one transport if I take the first
path rather than the second.
If that's to be the way of things, you might mention this specific
design decision (and indicate why one is preferred over the other).
If in the future there is a third address family that people use to
carry DNS traffic over, how would you place a nameserver that had RRs
corresponding to all three transports, compared with one that had RRs
corresponding to just one or two? Is this worth mentioning?
2.15. If any "necessary content" is silently truncated, then it is
advisable that the TC bit be set in order to force a TCP retry,
rather
than have the zone be unreachable. Note that a parent server's
proper
response to a query for in-child glue or below-child glue is a
referral
rather than an answer, and that this referral MUST be able to
contain
the in-child or below-child glue, and that in outlying cases,
only EDNS
or TCP will be large enough to contain that data.
3 - Analysis
3.1. An instrumented protocol trace of a best case delegation
response
follows. Note that 13 servers are named, and 13 addresses are
given.
This query was artificially designed to exactly reach the 512 octet
limit.
;; flags: qr rd; QUERY: 1, ANS: 0, AUTH: 13, ADDIT: 13
;; QUERY SECTION:
;; [23456789.123456789.123456789.\
123456789.123456789.123456789.com A IN] ;; @80
;; AUTHORITY SECTION:
com. 86400 NS E.GTLD-SERVERS.NET. ;; @112
com. 86400 NS F.GTLD-SERVERS.NET. ;; @128
com. 86400 NS G.GTLD-SERVERS.NET. ;; @144
com. 86400 NS H.GTLD-SERVERS.NET. ;; @160
com. 86400 NS I.GTLD-SERVERS.NET. ;; @176
com. 86400 NS J.GTLD-SERVERS.NET. ;; @192
com. 86400 NS K.GTLD-SERVERS.NET. ;; @208
com. 86400 NS L.GTLD-SERVERS.NET. ;; @224
com. 86400 NS M.GTLD-SERVERS.NET. ;; @240
com. 86400 NS A.GTLD-SERVERS.NET. ;; @256
com. 86400 NS B.GTLD-SERVERS.NET. ;; @272
com. 86400 NS C.GTLD-SERVERS.NET. ;; @288
com. 86400 NS D.GTLD-SERVERS.NET. ;; @304
;; ADDITIONAL SECTION:
A.GTLD-SERVERS.NET. 86400 A 192.5.6.30 ;; @320
B.GTLD-SERVERS.NET. 86400 A 192.33.14.30 ;; @336
C.GTLD-SERVERS.NET. 86400 A 192.26.92.30 ;; @352
D.GTLD-SERVERS.NET. 86400 A 192.31.80.30 ;; @368
E.GTLD-SERVERS.NET. 86400 A 192.12.94.30 ;; @384
F.GTLD-SERVERS.NET. 86400 A 192.35.51.30 ;; @400
G.GTLD-SERVERS.NET. 86400 A 192.42.93.30 ;; @416
H.GTLD-SERVERS.NET. 86400 A 192.54.112.30 ;; @432
I.GTLD-SERVERS.NET. 86400 A 192.43.172.30 ;; @448
J.GTLD-SERVERS.NET. 86400 A 192.48.79.30 ;; @464
K.GTLD-SERVERS.NET. 86400 A 192.52.178.30 ;; @480
L.GTLD-SERVERS.NET. 86400 A 192.41.162.30 ;; @496
M.GTLD-SERVERS.NET. 86400 A 192.55.83.30 ;; @512
;; MSG SIZE sent: 80 rcvd: 512
3.2. For longer query names, the number of address records
supplied will
be lower. Furthermore, it is only by using a common parent name
(which
is GTLD-SERVERS.NET in this example) that all 13 addresses are
able to
fit.
It seems obvious to me, but I think clarity might be served in
mentioning label compression again somewhere around here.
The following output from a response simulator demonstrates these
properties:
You mention further below what "green", "yellow", etc are supposed to
signfy, but I think the secret decoder ring would fit more usefully
before the results. The interpretation of those colours as an
escalating series towards disaster is possibly not universally
understood.
The use of "#" to mean number is also far more common in North
America than in other places (there are plenty of places where in
this context it might be taken initially to be a precursor to a
comment, per sh(1)). So, "4 NS RRs" or "Number of NS: 4" are both
clearer than "# of NS: 4", I think.
% perl respsize.pl a.dns.br b.dns.br c.dns.br d.dns.br
a.dns.br requires 10 bytes
b.dns.br requires 4 bytes
c.dns.br requires 4 bytes
d.dns.br requires 4 bytes
# of NS: 4
For maximum size query (255 byte):
only A is considered: # of A is 4 (green)
A and AAAA are considered: # of A+AAAA is 3 (yellow)
preferred-glue A is assumed: # of A is 4, # of AAAA is 3
(yellow)
For average size query (64 byte):
only A is considered: # of A is 4 (green)
A and AAAA are considered: # of A+AAAA is 4 (green)
preferred-glue A is assumed: # of A is 4, # of AAAA is 4
(green)
% perl respsize.pl ns-ext.isc.org ns.psg.com ns.ripe.net
ns.eu.int
ns-ext.isc.org requires 16 bytes
ns.psg.com requires 12 bytes
ns.ripe.net requires 13 bytes
ns.eu.int requires 11 bytes
# of NS: 4
For maximum size query (255 byte):
only A is considered: # of A is 4 (green)
A and AAAA are considered: # of A+AAAA is 3 (yellow)
preferred-glue A is assumed: # of A is 4, # of AAAA is 2
(yellow)
For average size query (64 byte):
only A is considered: # of A is 4 (green)
A and AAAA are considered: # of A+AAAA is 4 (green)
preferred-glue A is assumed: # of A is 4, # of AAAA is 4
(green)
(Note: The response simulator program is shown in Section 5.)
Here we use the term "green" if all address records could fit, or
"yellow" if two or more could fit, or "orange" if only one could
fit, or
"red" if no address record could fit. It's clear that without a
common
parent for nameserver names, much space would be lost. For these
examples we use an average/common name size of 15 octets,
befitting our
assumption of GTLD-SERVERS.NET as our common parent name.
We're assuming an average query name size of 64 since that is the
typical average maximum size seen in trace data at the time of this
writing. If Internationalized Domain Name (IDN) or any other
technology
which results in larger query names be deployed significantly in
advance
of EDNS, then new measurements and new estimates will have to be
made.
You mentioned earlier that zone administrators should measure their
average query sizes. Rather than risking appearing to present a
definitive, all-zones average here (which seems like a contradiction
with the earlier guidance), you might use the word "medium" instead.
4 - Conclusions
4.1. The current practice of giving all nameserver names a
common parent
(such as GTLD-SERVERS.NET or ROOT-SERVERS.NET) saves space in DNS
responses and allows for more nameservers to be enumerated than
would
otherwise be possible, since the common parent domain name only
appears
once in a DNS message and is referred to via "compression pointers"
thereafter.
4.2. If all nameserver names for a zone share a common parent,
then it
is operationally advisable to make all servers for the zone so
served
"so-served"
also be authoritative for the zone of that common parent. For
example,
the root name servers (?.ROOT-SERVERS.NET) can answer
authoritatively
for the ROOT-SERVERS.NET.
"... for the ROOT-SERVERS.NET zone".
This is to ensure that the zone's servers
always have the zone's nameservers' glue available when delegating.
I don't understand this conclusion; perhaps I'm slow, but I don't see
how it follows from the text that precedes it.
If AUTOMAGIC.ORG is delegated to nameservers which are all named
under HOPCOUNT.CA, you're saying that all those nameservers should
also speak authoritatively for HOPCOUNT.CA?
How important is it to be able to enumerate a full set of glue
records when a resolver has already arrived at a server which has the
answer it was looking for?
4.3. Thirteen (13) seems to be the effective maximum number of
nameserver names usable traditional (non-extended) DNS, assuming a
common parent domain name, and given that response truncation is
undesirable as an average case, and assuming mostly IPv4-only
reachability (only A RRs exist, not AAAA RRs).
XXX 4.4. Adding up to five IPv6 nameserver address records (AAAA
RRs) to
a prototypical delegation that currently contains thirteen (13)
IPv4
nameserver addresses (A RRs) for thirteen (13) nameserver names
under a
common parent, would not have a significant negative operational
impact
on the domain name system.
Extraneous collaborative editing spoor ("XXX").
5 - Source Code
I agree with Robert that this source code would be better placed in
an appendix, since otherwise it obscures the text-filled sections
which follow it.
#!/usr/bin/perl
#
# SYNOPSIS
# repsize.pl [ -z zone ] fqdn_ns1 fqdn_ns2 ...
# if all queries are assumed to have a same zone suffix,
# such as "jp" in JP TLD servers, specify it in -z option
#
use strict;
use Getopt::Std;
my ($sz_msg) = (512);
my ($sz_header, $sz_ptr, $sz_rr_a, $sz_rr_aaaa) = (12, 2, 16, 28);
my ($sz_type, $sz_class, $sz_ttl, $sz_rdlen) = (2, 2, 4, 2);
my (%namedb, $name, $nssect, %opts, $optz);
my $n_ns = 0;
getopt('z', %opts);
if (defined($opts{'z'})) {
server_name_len($opts{'z'}); # just register it
}
foreach $name (@ARGV) {
my $len;
$n_ns++;
$len = server_name_len($name);
print "$name requires $len bytes\n";
$nssect += $sz_ptr + $sz_type + $sz_class + $sz_ttl
+ $sz_rdlen + $len;
}
print "# of NS: $n_ns\n";
arsect(255, $nssect, $n_ns, "maximum");
arsect(64, $nssect, $n_ns, "average");
sub server_name_len {
my ($name) = @_;
my (@labels, $len, $n, $suffix);
$name =~ tr/A-Z/a-z/;
@labels = split(/\./, $name);
$len = length(join('.', @labels)) + 2;
for ($n = 0; $#labels >= 0; $n++, shift @labels) {
$suffix = join('.', @labels);
return length($name) - length($suffix) + $sz_ptr
if (defined($namedb{$suffix}));
$namedb{$suffix} = 1;
}
return $len;
}
sub arsect {
my ($sz_query, $nssect, $n_ns, $cond) = @_;
my ($space, $n_a, $n_a_aaaa, $n_p_aaaa, $ansect);
$ansect = $sz_query + 1 + $sz_type + $sz_class;
$space = $sz_msg - $sz_header - $ansect - $nssect;
$n_a = atmost(int($space / $sz_rr_a), $n_ns);
$n_a_aaaa = atmost(int($space
/ ($sz_rr_a + $sz_rr_aaaa)), $n_ns);
$n_p_aaaa = atmost(int(($space - $sz_rr_a * $n_ns)
/ $sz_rr_aaaa), $n_ns);
printf "For %s size query (%d byte):\n", $cond, $sz_query;
printf " only A is considered: ";
printf "# of A is %d (%s)\n", $n_a, &judge($n_a, $n_ns);
printf " A and AAAA are considered: ";
printf "# of A+AAAA is %d (%s)\n",
$n_a_aaaa, &judge($n_a_aaaa, $n_ns);
printf " preferred-glue A is assumed: ";
printf "# of A is %d, # of AAAA is %d (%s)\n",
$n_a, $n_p_aaaa, &judge($n_p_aaaa, $n_ns);
}
sub judge {
my ($n, $n_ns) = @_;
return "green" if ($n >= $n_ns);
return "yellow" if ($n >= 2);
return "orange" if ($n == 1);
return "red";
}
sub atmost {
my ($a, $b) = @_;
return 0 if ($a < 0);
return $b if ($a > $b);
return $a;
}
The perl seems to run and work as advertised.
6 - Security Considerations
The recommendations contained in this document have no known
security
implications.
7 - IANA Considerations
This document does not call for changes or additions to any IANA
registry.
8 - Acknowledgement The authors thank Peter Koch and Rob Austein
for
their valuable comments and suggestions.
The text seems to have run on to the end of the section title, there.
9 - Refrenaces
"References"
[RFC1034] Mockapetris, P.V., "Domain names - Concepts and
Facilities",
RFC1034, November 1987.
[RFC1035] Mockapetris, P.V., "Domain names - Implementation and
Specification", RFC1035, November 1987.
[RFC1123] Braden, R., Ed., "Requirements for Internet Hosts -
Application and Support", RFC1123, October 1989.
[RFC2308] Andrews, M., "Negative Caching of DNS Queries (DNS
NCACHE)",
RFC2308, March 1998.
[RFC2181] Elz, R., Bush, R., "Clarifications to the DNS
Specification",
RFC2181, July 1997.
[RFC2671] Vixie, P., "Extension Mechanisms for DNS (EDNS0)",
RFC2671,
August 1999.
10 - Authors' Addresses
Paul Vixie
"Internet Systems Consortium"?
950 Charter Street
Redwood City, CA 94063
+1 650 423 1301
[EMAIL PROTECTED]
Akira Kato
University of Tokyo, Information Technology Center
2-11-16 Yayoi Bunkyo
Tokyo 113-8658, JAPAN
+81 3 5841 2750
[EMAIL PROTECTED]
Joe
.
dnsop resources:_____________________________________________________
web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html