TOC |
|
By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”
The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 10, 2006.
Copyright © The Internet Society (2005).
This document defines a new domain, _service., which can be used for automatic service configuration and discovery. The associated anycast prefixes can be used to configure a default DNS server, which provides lookups for a local _service. domain but also acts as a (caching) recursive DNS server, thus allowing DNS clients to use this well-known address as their default DNS server as well as to use it to find various well known services, thus avoiding manual configuration.
1.
Requirements notation
2.
Introduction
3.
The _service domain
3.1
DNS Search Path
3.2
Browsing for services
4.
The _service anycast address
4.1
The _service prefix
4.2
Monitoring
4.3
Discovery and failover
5.
Security Considerations
6.
IANA Considerations
7.
References
7.1
Normative References
7.2
Informative References
§
Author's Address
§
Intellectual Property and Copyright Statements
TOC |
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] (Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” March 1997.).
TOC |
Currently there are a number of methods of configuring a (caching) recursive DNS server into the resolver code of various clients. Amongst these methods are static configuration, DHCP, IPv6 Router Advertisement options, PPP configuration and a multitude of others.
Next to the configuration of a DNS server, the user of the client will also have to configure various other services, eg Outgoing SMTP server, incoming POP3 or IMAP4 server, HTTP proxy server, FTP proxy server or with the advent of IPv6, one of the various IPv6 tunneling techiques and one day one of the various IPv4 tunneling techniques, to allow IPv6 hosts to contact IPv4 hosts.
All these services now have to be manually configured or using some kind of automation, which is likely to be different for each type of service.
SRV records [RFC2782] (Gulbrandsen, A., Vixie, P., and L. Esibov, “A DNS RR for specifying the location of services (DNS SRV),” February 2000.) defines a method of defining services, it does not however define where these records are located nor handles the case when a service has multiple protocols.
This document specifies a method, which allows vendors to hardcode a well known anycast prefix into their resolving clients. This anycast prefix contains a single well known IP address that runs a (caching) recursive DNS server. [RFC1034] (Mockapetris, P., “Domain names - concepts and facilities,” November 1987.) [RFC1035] (Mockapetris, P., “Domain names - implementation and specification,” November 1987.). This server thus allows looking up of all available domains (example.com, example.org etc). Additionally it is provides lookups for the _service. domain which contains the in this document described domain to be used for autoconfiguration.
TOC |
The _service domain contains PTR records to their respective SRV records. Service names should abide SRV naming rules, they are protocol independent though.
Typical contents of a _service domain.
$ORIGIN _service. @ TXT "Example Networks" @ RP helpdesk.example.net. helpdesk.people.example.net. _website PTR _https._tcp.example.net. PTR _http._tcp.example.net. _pgpkey PTR _pgpkey-https._tcp.example.net. PTR _pgpkey-http._tcp.example.net. _imap PTR _imap._tcp.example.net. _mailsubmit PTR _submission._tcp.example.net. _ntp PTR _ntp._tcp.example.net. PTR _ntp._udp.example.net.
The TXT record specifies which organisation is announcing this prefix. This record can be shown in browser functions or to the enduser. The RP record specifies a contact for this service zone.
The above defines a website, available over HTTP and HTTPS, based on the priority and weights given by their SRV records. This allows one to specify that a client must first try the HTTPS variant, if it does not work, or the client does not understand this protocol it can try the HTTP variant. Due to the nature of SRV, these services might be located on different hosts. The NTP service is defined to use either UDP or NTP.
The actual _service. Top Level Domain (TLD) can actually also be a DNAME to the organisations domain, this way the organisation only has to maintain one .service domain.
_service. DNAME _service.example.net.
This also allows an organisation have multiple domain names or clients domains, simply adding the DNAME to the service domain allows the users to pick any of the domains and the configuration information is already available to the user. This is naturally only required when the user is not inside the anycast range of the organisation.
A _service domain SHOULD be AXFR'able [RFC1995] (Ohta, M., “Incremental Zone Transfer in DNS,” August 1996.) this to facilitate browsing of the service zone. An organisation MAY opt to decline AXFR's based on their policy.
Lookups in the _service domain should be done according to the DNS search path. Thus if the DNS search path of host is: example.com example.net then the resolver should try the items in:
_service. _service.example.com. _service.example.net.
This allows the _service domain to be located anywhere in the search path of the client. Additionally this also allows one to specify a remote domain and thus having components be configured based on the service values given for that domain.
In case the user wants to know what kind of services are available for her, as provided by the local organisation, an application could try to AXFR the _service zones of the domains in the search path and then displaying the available services.
TOC |
x.x.x.1 and xxxx::1 (*IANA UPDATE!*) can be hardcoded into any client resolver. These addresses point to the IPv4 and IPv6 variant of a resolver which also provides access to the _service prefix.
On the _service anycast address a full recursive DNS server is responding. It must also provide the lookup facility for the _service. domain. This domain might reside on another DNS server.
This address can be passed to the client using DHCP [RFC2131] (Droms, R., “Dynamic Host Configuration Protocol,” March 1997.), other automatic configuration methods or manual configuration.
x.x.x.1 is part of x.x.x.1/32 and xxxx::1 is part of xxxx::/64.
The prefix SHOULD only be announced in the local IGP of the organisation. The prefix MAY be announced to other organisations when the two parties agree on this setup. The prefix MUST not be seen globally around the world. Though it is of course possible, having the prefix available to the global internet would not have much of a function as the services are most likely only provided for users of the organisation.
Any organisation corresponding to this specification must include a monitoring function, to check that the _service is operational. The router must stop injecting the route leading to the server immediately if it detects that the DNS function is not operational.
A remote host should try to query either the TXT or RP record of the to be monitored service zone to see if the DNS server still answers queries. Other methods can of course also be used.
The DNS client resolver send packets to the DNS service by sending them to the anycast address. These packets will reach the closest service provided by their organisation or by another organisation.
When a client does not have connectivity to this prefix, there will be no routing entry for the anycast prefix and thus a destinatation unreachable will be sent to the host. The resolver then learns that the DNS service in question is not available.
When a _service server somehow breaks it should stop announcing the anycast prefix to the local network. At that point, the local IGP will automatically compute a route towards the "next best" _service server. We expect that adequate monitoring tools will be used to guarantee timely discovery of connectivity losses and should allow seamless functionality for the endusers.
TOC |
This anycast technique introduces an risk, that a rogue router or a rogue AS could introduce a bogus route to their own resolver setup providing rogue _service entries, thereby diverting the traffic to the service they want. Any service using cleartext passwords and having no additional security, eg TLS/SSL, can thus be easily transformed into password collection setups. Care must be taken that nobody can insert a faked _service server into a network.
TOC |
IANA will need to mark the _service. domain and the _service sub domain as reserved to be used solely for this purpose.
IANA will need to allocate a IPv6 /64 and a IPv4 /32 for the purposes of having a well known anycast address in which the (caching) recursive DNS server can operate.
The prefix is only required in the organisation itself and should not be carried in intra-domain routing tables. A global prefix is required so that the prefix can be shared between organisations. eg an organisation providing this service to other autonomous systems.
TOC |
TOC |
[RFC1034] | Mockapetris, P., “Domain names - concepts and facilities,” STD 13, RFC 1034, November 1987. |
[RFC1035] | Mockapetris, P., “Domain names - implementation and specification,” STD 13, RFC 1035, November 1987. |
[RFC2119] | Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” BCP 14, RFC 2119, March 1997 (TXT, HTML, XML). |
[RFC2782] | Gulbrandsen, A., Vixie, P., and L. Esibov, “A DNS RR for specifying the location of services (DNS SRV),” RFC 2782, February 2000. |
TOC |
[RFC1995] | Ohta, M., “Incremental Zone Transfer in DNS,” RFC 1995, August 1996. |
[RFC2131] | Droms, R., “Dynamic Host Configuration Protocol,” RFC 2131, March 1997 (TXT, HTML, XML). |
TOC |
Jeroen Massar | |
Unfix / SixXS | |
Hofpoldersingel 45 | |
Gouda 2807 LW | |
NL | |
Email: | jeroen@unfix.org |
URI: | http://unfix.org/~jeroen/ |
TOC |
The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org.
This document and the information contained herein are provided on an “AS IS” basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright © The Internet Society (2005). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights.
Funding for the RFC Editor function is currently provided by the Internet Society.