Internet-Draft ranking March 2025
Fujiwara & Toorop Expires 4 September 2025 [Page]
Workgroup:
Network Working Group
Internet-Draft:
draft-fujiwara-dnsop-ranking-data-00
Updates:
2181 (if approved)
Published:
Intended Status:
Standards Track
Expires:
Authors:
K. Fujiwara
JPRS
W. Toorop
NLnet Labs

Clarifications to the DNS Ranking Data

Abstract

This document obsoletes Section 5.4.1 (Ranking data) of RFC 2181, and specifies directives whereby the source of the data determines for what purposes it may be used.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 4 September 2025.

Table of Contents

1. Introduction

The DNS server assumed in Section 5.4.1 (Ranking data) of [RFC2181] is considered to be a model with a shared database described in Section 2.2 (Common configurations) of [RFC1035] that has both Authoritative server and Recursive Resolver functions. It is assumed that information obtained from zone files, zone transfers, and name resolution will be mixed together.

However, at the time of writing, this is no longer the practice of name servers and resolvers. Zone transfers transfer the same data from primaries to secondary servers without any modification. An authoritative name server function does not mix and return information obtained from name resolution.

2. Terminology

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

Many of the specialized terms used in this document are defined in DNS Terminology [RFC9499].

3. Problem Statement

In the past, recursive resolvers would return data from referral responses, such as delegation information or glue, in the answer section of responses; however, modern recursive resolvers complete name resolution with an authoritative response from an authoritative server that has authority through delegation. However, there is no clear documentation of this.

"The Ranking Data" only indicates the priority among data, not its validity. Attacks using responses that do not correspond to queries and additional data that is not required have been considered and reported, so unnecessary data should be discarded.

Currently, responses from authoritative servers are considered to include authoritative name resolution results (NXDOMAIN, NODATA, the RRSet requested), non-authoritative delegation information, unnecessary data, and other types of errors, and each of these is considered to affect how resolvers handle the data. Therefore, directives on how to handle the data are needed.

4. Directives

  1. Authoritative servers MUST NOT merge zone data. (zone data should be retrieved from a source (zone file, internal database, zone transfer)

  2. Name resolution results (Answer section, or NXDOMAIN, NODATA) MUST be authoritative responses from authoritative servers that has authority through delegation.

  3. Non-authoritative responses (referral/delegation responses) from authoritative servers MUST only be used to query the delegated authoritative server during the name resolution.

  4. Names and IP addresses of the authoritative name servers for zones (such as the root zone) that are built-in or loaded from "hints" files, MUST only be used for priming a resolver for those zones [RFC9609].

5. Additional Considerations

[ Further directives could be made, they may be DNS software implementation guidelines, which would be large in scale, so it is necessary to consider whether to proceed with them. ]

6. IANA Considerations

This document requests no IANA actions.

7. Security Considerations

8. Normative References

[RFC1035]
Mockapetris, P., "Domain names - implementation and specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, , <https://www.rfc-editor.org/rfc/rfc1035>.
[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/rfc/rfc2119>.
[RFC2181]
Elz, R. and R. Bush, "Clarifications to the DNS Specification", RFC 2181, DOI 10.17487/RFC2181, , <https://www.rfc-editor.org/rfc/rfc2181>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/rfc/rfc8174>.
[RFC9499]
Hoffman, P. and K. Fujiwara, "DNS Terminology", BCP 219, RFC 9499, DOI 10.17487/RFC9499, , <https://www.rfc-editor.org/rfc/rfc9499>.
[RFC9609]
Koch, P., Larson, M., and P. Hoffman, "Initializing a DNS Resolver with Priming Queries", BCP 209, RFC 9609, DOI 10.17487/RFC9609, , <https://www.rfc-editor.org/rfc/rfc9609>.

Authors' Addresses

Kazunori Fujiwara
Japan Registry Services Co., Ltd.
Japan
Willem Toorop
NLnet Labs
Science Park 400
1098 XH Amsterdam
Netherlands