Internet DRAFT - draft-huang-dnsop-synchronization-resolver-server
draft-huang-dnsop-synchronization-resolver-server
dnsop WG C. Wang
Internet-Draft W. Meng
Intended status: Standards Track S. Huang
Expires: January 3, 2016 ZTE Corporation
July 2, 2015
Synchroniztion between resolvers and servers
draft-huang-dnsop-synchronization-resolver-server-00
Abstract
This document proposes how to synchronize the RRs in the resolvers
along with the RRs in the authoritative servers when changes are
occurred on the RRs in the authoritative servers.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 3, 2016.
Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Wang, et al. Expires January 3, 2016 [Page 1]
Internet-Draft SYNC July 2015
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Convention and Terminology . . . . . . . . . . . . . . . . . . 4
3. an analysis on DNS . . . . . . . . . . . . . . . . . . . . . . 5
3.1. Resolvers . . . . . . . . . . . . . . . . . . . . . . . . 5
3.2. Authoritative DNS servers . . . . . . . . . . . . . . . . 5
4. Definition of the Cache-Sync RRType . . . . . . . . . . . . . 7
5. Definition of the Notification Message . . . . . . . . . . . . 8
6. Definition of the session table of the cached RRs
information on resolvers . . . . . . . . . . . . . . . . . . . 9
7. operational considerations . . . . . . . . . . . . . . . . . . 10
8. Security Considerations . . . . . . . . . . . . . . . . . . . 11
9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12
10. Normative References . . . . . . . . . . . . . . . . . . . . . 13
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 14
Wang, et al. Expires January 3, 2016 [Page 2]
Internet-Draft SYNC July 2015
1. Introduction
DNS is defined in [RFC1034] and [RFC1035].
It has been a challenge that how to steer the traffic to the correct
destination when the RRs in the authoritative servers have changed,
while the cached RRs information locally in the resolvers is still
alive. This document tries to describe how to synchronize
automatically the cached RRs in the resolvers along with the RRs
information in the authoritative servers when changes are occurred on
the RRs information in the authoritative servers. Specifically, this
document tries to provide:
In section 3, In section 3, an analysis on DNS
In section 4, definition of the Cache-Sync RRType
In section 5, definition of the Notification Message
In section 6, definition of the session table of the cached RRs
information on resolvers
In section 7, operational considerations
In section 8, security considerations
Wang, et al. Expires January 3, 2016 [Page 3]
Internet-Draft SYNC July 2015
2. Convention and Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
The terms about DNS are all defined in [RFC1034] and [RFC1035].
Wang, et al. Expires January 3, 2016 [Page 4]
Internet-Draft SYNC July 2015
3. an analysis on DNS
3.1. Resolvers
According to the description in [RFC1034], resolvers are programs
that extract information from name servers in response to client
requests. Resolvers must be able to access at least one name server
and retrieve the RRs information from name servers!_ responses, and
then store RRs information in the local cache, and use this RRs
information to answer a query directly, or pursue the query using
referrals to other name servers. How long the RRs information would
be cached in resolvers is decided by the Time To Live field in the
DNS response messages. Before it is expired, the resolver use this
cached RRs information to answer a query directly if the QNAME/QTYPE/
QCLASS in the query is matched.
Sometimes, the resolver is located on the same machine as the program
that requests the resolver!_s services. And sometimes, the resolver
is located on an unauthorized name server which supports recursive
queries. In the latter case, it is widely used to centralize the
cache for a whole local network or organization.
Conventionally, the RRs information in the authoritative name servers
is authoritative, while the cached RRs information in the resolvers
is unauthorized. When changes occur on the authoritative RRs
information, how these changes are notified to the resolvers to
update the cached RRs information before this information is expired
is an open issue. If the cached RRs information doesn!_t update
immediately, the resolver would use the old cached RRs information to
answer the client instead of the recently changed RRs information,
which may mislead the client!_s traffic to the old and wrong
destination.
This document tries to propose a mechanism which can eliminate this
issue. After caching the RRs information from the authoritative name
server, the resolver sends a notification message to that name
server. Then, that name server updates the session table of the
cached RRs information with corresponding resolvers. Once changes
occur on the cached RRs information in the authoritative name severs,
this name server sends update messages to the corresponding resolvers
which cache this changed RR information.
3.2. Authoritative DNS servers
According to description in [RFC1034], name servers are programs
which hold information about the domain name space and associated
RRs. A name server may cache domain name space or associated RRs
information about any part of the domain tree, but in general a
Wang, et al. Expires January 3, 2016 [Page 5]
Internet-Draft SYNC July 2015
particular name server has complete information about a subset of the
domain space, and pointers to other name servers that can be used to
lead to information from any part of the domain space. Name servers
know the parts of domain space for which they have complete
information; a name server is said to be an AUTHORITY for these parts
of the name space. Authoritative information is organized into units
called ZONES, and how these zones synchronize cached name space and
associated RRs information is out of scope. This document focuses on
how to synchronize this RRs information between resolvers and these
name servers.
In fact, after receiving the query from the resolver, if the query is
matched in local cache, the DNS name server answers the authoritative
RRs information in the response message to the resolver. Meanwhile,
if the name server supports the control of caching notification, the
name server carries the caching notification control information in
the response message together.
After receiving the response message, the resolver caches the RRs
information in the response message and decides whether to send a
notification message or not according to whether there is caching
notification control information carried in the response message. If
there is caching notification control information, then the resolver
sends a notification message, otherwise, do nothing.
In some situation, instead of managing the cached RRs information on
resolvers in a distributed manner, there is a central caching
manager, which can manage all the cached RRs on resolvers and
corresponding resolvers. When authoritative name server sends the
response message with the caching notification control information,
the central caching manager's address can be carried together in the
response message to the resolver. Then, the resolver knows where the
notification message is send to.
Wang, et al. Expires January 3, 2016 [Page 6]
Internet-Draft SYNC July 2015
4. Definition of the Cache-Sync RRType
As for the caching notification control information, here tries to
extend an new RRType to carry them. The new Cache-Sync RRType
contains, in its RDATA component, a flag which identifies whether the
resolver need to send notification message, and an address where the
notification message is sent to. In Figure 1, there is a guideline
about the Cache-Sync RRType format.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flag | Address |
+-+-+-+-+-+-+-+-+ +
~ ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 1: Cache-Sync RDATA format
Flag: identifies whether the resolver need to send notification
message. By default, this field is set to zero, which means do not
need to send notification message;
Address: identifies where the notification message is sent to. By
default, it is the address of the name server who responses the DNS
query. When there is a central caching manager, it is the address of
the central caching manager.Address: identifies where the
notification message is sent to. By default, it is the address of
the name server who responses the DNS query. When there is a central
caching manager, it is the address of the central caching manager.
Wang, et al. Expires January 3, 2016 [Page 7]
Internet-Draft SYNC July 2015
5. Definition of the Notification Message
TBD
Wang, et al. Expires January 3, 2016 [Page 8]
Internet-Draft SYNC July 2015
6. Definition of the session table of the cached RRs information on
resolvers
When DNS name server has no session table of the cached RRs
information on resolvers, they need create this session table first
when receiving the first notification message from the resolver. In
this session table, it includes: the cached RRs information and
corresponding resolver who caches this RRs information, caching
timestamp, TTL, and caching status as well.
After this session table is created, the following notification
messages trigger to update the session items in this session table as
well as add session items in this session table.
When the TTL is expired, the corresponding session item would be
discarded in the session table.
When a RR information in the authoritative name server is changed
proactively, the DNS name server sends update message to the
corresponding resolver according to the session item stored in the
session table.
Wang, et al. Expires January 3, 2016 [Page 9]
Internet-Draft SYNC July 2015
7. operational considerations
TBD
Wang, et al. Expires January 3, 2016 [Page 10]
Internet-Draft SYNC July 2015
8. Security Considerations
TBD
Wang, et al. Expires January 3, 2016 [Page 11]
Internet-Draft SYNC July 2015
9. IANA Considerations
TBD
Wang, et al. Expires January 3, 2016 [Page 12]
Internet-Draft SYNC July 2015
10. Normative References
[RFC1034] Mockapetris, P., "Domain names - concepts and facilities",
STD 13, RFC 1034, November 1987.
[RFC1035] Mockapetris, P., "Domain names - implementation and
specification", STD 13, RFC 1035, November 1987.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
Wang, et al. Expires January 3, 2016 [Page 13]
Internet-Draft SYNC July 2015
Authors' Addresses
Cui Wang
ZTE Corporation
No.50 Software Avenue, Yuhuatai District
Nanjing
China
Email: wang.cui1@zte.com.cn
Wei Meng
ZTE Corporation
No.50 Software Avenue, Yuhuatai District
Nanjing
China
Email: meng.wei2@zte.com.cn,vally.meng@gmail.com
Sunliang Huang
ZTE Corporation
No.50 Software Avenue, Yuhuatai District
Nanjing
China
Email: huang.sunliang@zte.com.cn
Wang, et al. Expires January 3, 2016 [Page 14]