Internet Engineering Task Force | J. Daley |
Internet-Draft | .nz Registry Services |
Intended status: Standards Track | November 11, 2013 |
Expires: May 15, 2014 |
Extending DNS UPDATE for 'whole of zone' operations
draft-daley-updatezones-00
This memo describes an extension to the DNS protocol that support the remote provisioning of zones on authoritative servers. This addition is complementary to the existing mechanisms for provisioning zone data using the DNS protocol.
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 15, 2014.
Copyright (c) 2013 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
This memo uses the following DNS server roles in a manner consistent with RFC 2136 [RFC2136]:
This memo uses the term "catalog of zones" in the spirit of RFC 1035 [RFC1035] to describe the set of zones that a server is authoritative for.
It is common practice for Internet service providers and domain name registrars to operate DNS servers that are simultaneously authoritative for many zones. In some case a single DNS server may be authoritative for hundreds of thousands of zones. Despite the large number of zones served, the server is unlikely to also be authoritative for a common parent of these zones and so must operate each zone independently.
The DNS protocol supports the provisioning of resource records in zones already being served by an authoritative DNS server using the DNS UPDATE message described in RFC 2136 [RFC2136]. However no similar operation exists to update the list of zones that a server serves.
This memo describes an extension to the DNS UPDATE message that allows it to be used to instruct an authoritative DNS server to start serving or stop serving zones. This extension supports the remote provisioning of zones in the same manner that DNS UPDATE supports the remote provisioning of Resource Records.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119].
RFC 2136 [RFC2136] defines the DNS UPDATE message which enables the remote provisioning of data within existing zones. The operations enabled by RFC 2136 [RFC2136] are now referred to as 'in zone' operations.
This memo extends the definition of the DNS UPDATE message to enable the remote provisioning of zones. The operations enabled by this memo are referred to as 'whole of zone' operations.
Two 'whole of zone' operations are defined in this memo:
The operations described in this memo operate on the catalog of zones irrespective of whether or not the server is currently responding to queries for a specific zone as a server may at any point time be actively serving only some of the zones in its catalog for operational reasons.
'in zone' operations are distinguished from 'whole of zone' operations by the ZTYPE of the zones in the Zone section of the DNS UPDATE message:
It is not possible to have both 'in zone' and 'whole of zone' operations in the same DNS UPDATE message and so the zones in the Zone section MUST NOT have different ZTYPES.
'whole of zone' operations interpret the data in the Prerequisite, Update and Additional sections differently from 'in zone' operations.
The operation to add new authoritative zones can come in one of two forms:
To add a master zone the DNS UPDATE is constructed as follows:
One zone and only one zone MUST be listed in the Zone section. and the ZTYPE of that zone MUST be set to NS.
The Prerequisitie section MUST be empty.
The Update section MUST contain the SOA record for the new zone. The class of the SOA record MUST NOT be ANY.
The Update section MAY contain any other resource records that are to be added to the zone.
The receiving server MUST add the SOA record and any records in the Update section to the zone before serving the zone.
The Additional section MUST be empty.
To add slave zones the DNS UPDATE is constructed as follows:
One or more zones MUST be listed in the Zone section. and the ZTYPE of those zone MUST be set to NS.
The Prerequisitie section MUST be empty.
The Update section MUST be empty.
The Additional section MUST contain at least one A or AAAA resource record. All A and AAAA records are used by the receiving server to identify the servers it should contact to pull the zones from.
The Additional section MAY contain a TKEY record that the receiving server should use to authenticate itself when it pulls the zones.
The resource records in the Additional section MUST NOT be added to the zones.
To remove zones the DNS UPDATE is constructed as follows:
One or more zones MUST be listed in the Zone section. and the ZTYPE of those zones MUST be set to NS.
The Prerequisitie section MUST be empty.
The Update section MUST contain a SOA record for the zone to be deleted and the class of the SOA record MUST be ANY. This use of a class of ANY to signal the removal of a zone matches the way that a resource record that is to be deleted is identified in RFC 2136 [RFC2136]
The Additional section MUST be empty.
The response sent to acknowledge receipt and processing of a 'whole of zone' operation is the same as specified for an 'in zone' operation in RFC 2136 [RFC2136] with the addition of the following specific error conditions:
It is recognised that not all authoritative nameservers are capable of dynamically loading new zones to serve or dynamically ceasing to serve zones. It is left to the implementor to decide whether to load/unload the zones dynamically; wait for a server restart or to initiate a restart itself.
This memo does not change the requirements for serialisation of UPDATE operations the depend on each other, as specified in section 3.7 of RFC 2136 [RFC2136], which apply equally to 'whole of zone' operations as they do to 'in zone' operations.
A server receiving a 'whole of zone' operation SHOULD NOT assume any particular order to the provisioning of zones and reject the operation as a result. Examples of erroneous rejections include:
The author thanks Mark Andrews for his input.
This memo includes no request to IANA.
Clearly unrestricted access to 'whole of zone' operations is a significant threat and misuse would be likely to cause considerable issues. It is therefore RECOMMENDED that:
The provision of a TKEY record is a significant vulnerability if the DNS UPDATE message containing it is transmitted in clear over the wire. It is therefore RECOMMENDED that such messages are encrypted.
[RFC2119] | Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. |
[RFC2136] | Vixie, P., Thomson, S., Rekhter, Y. and J. Bound, "Dynamic Updates in the Domain Name System (DNS UPDATE)", RFC 2136, April 1997. |
[RFC1035] | Mockapetris, P., "Domain names - implementation and specification", STD 13, RFC 1035, November 1987. |