rfc9103v3.txt | rfc9103.txt | |||
---|---|---|---|---|
skipping to change at line 73 ¶ | skipping to change at line 73 ¶ | |||
4. Design Considerations for XoT | 4. Design Considerations for XoT | |||
5. Connection and Data Flows in Existing XFR Mechanisms | 5. Connection and Data Flows in Existing XFR Mechanisms | |||
5.1. AXFR Mechanism | 5.1. AXFR Mechanism | |||
5.2. IXFR Mechanism | 5.2. IXFR Mechanism | |||
5.3. Data Leakage of NOTIFY and SOA Message Exchanges | 5.3. Data Leakage of NOTIFY and SOA Message Exchanges | |||
5.3.1. NOTIFY | 5.3.1. NOTIFY | |||
5.3.2. SOA | 5.3.2. SOA | |||
6. Updates to Existing Specifications | 6. Updates to Existing Specifications | |||
6.1. Update to RFC 1995 for IXFR over TCP | 6.1. Update to RFC 1995 for IXFR over TCP | |||
6.2. Update to RFC 5936 for AXFR over TCP | 6.2. Update to RFC 5936 for AXFR over TCP | |||
6.3. Updates to RFC 1995 and RFC 5936 for XFR over TCP | 6.3. Updates to RFCs 1995 and 5936 for XFR over TCP | |||
6.3.1. Connection Reuse | 6.3.1. Connection Reuse | |||
6.3.2. AXFRs and IXFRs on the Same Connection | 6.3.2. AXFRs and IXFRs on the Same Connection | |||
6.3.3. XFR Limits | 6.3.3. XFR Limits | |||
6.3.4. The edns-tcp-keepalive EDNS(0) Option | 6.3.4. The edns-tcp-keepalive EDNS(0) Option | |||
6.3.5. Backwards Compatibility | 6.3.5. Backwards Compatibility | |||
6.4. Update to RFC 7766 | 6.4. Update to RFC 7766 | |||
7. XoT Specification | 7. XoT Specification | |||
7.1. Connection Establishment | 7.1. Connection Establishment | |||
7.2. TLS Versions | 7.2. TLS Versions | |||
7.3. Port Selection | 7.3. Port Selection | |||
skipping to change at line 595 ¶ | skipping to change at line 595 ¶ | |||
6.2. Update to RFC 5936 for AXFR over TCP | 6.2. Update to RFC 5936 for AXFR over TCP | |||
For clarity, an AXFR-over-TCP server compliant with this | For clarity, an AXFR-over-TCP server compliant with this | |||
specification MUST be able to handle multiple concurrent AXoT | specification MUST be able to handle multiple concurrent AXoT | |||
sessions on a single TCP connection (for the same and different | sessions on a single TCP connection (for the same and different | |||
zones). The response streams for concurrent AXFRs MAY be | zones). The response streams for concurrent AXFRs MAY be | |||
intermingled, and AXFR-over-TCP clients compliant with this | intermingled, and AXFR-over-TCP clients compliant with this | |||
specification, which pipeline AXFR requests, MUST be able to handle | specification, which pipeline AXFR requests, MUST be able to handle | |||
this. | this. | |||
6.3. Updates to RFC 1995 and RFC 5936 for XFR over TCP | 6.3. Updates to RFCs 1995 and 5936 for XFR over TCP | |||
6.3.1. Connection Reuse | 6.3.1. Connection Reuse | |||
As specified, XFR-over-TCP clients SHOULD reuse any existing open TCP | As specified, XFR-over-TCP clients SHOULD reuse any existing open TCP | |||
connection when starting any new XFR request to the same primary, and | connection when starting any new XFR request to the same primary, and | |||
for issuing SOA queries, instead of opening a new connection. The | for issuing SOA queries, instead of opening a new connection. The | |||
number of TCP connections between a secondary and primary SHOULD be | number of TCP connections between a secondary and primary SHOULD be | |||
minimized (also see Section 6.4). | minimized (also see Section 6.4). | |||
Valid reasons for not reusing existing connections might include: | Valid reasons for not reusing existing connections might include: | |||
skipping to change at line 902 ¶ | skipping to change at line 902 ¶ | |||
opportunistic encryption has also been raised as a possibility; | opportunistic encryption has also been raised as a possibility; | |||
therefore, it is highly likely that use of encryption by | therefore, it is highly likely that use of encryption by | |||
authoritative servers will evolve in the coming years. | authoritative servers will evolve in the coming years. | |||
This raises questions in the short term with regard to TLS connection | This raises questions in the short term with regard to TLS connection | |||
and message handling for authoritative servers. In particular, there | and message handling for authoritative servers. In particular, there | |||
is likely to be a class of authoritative servers that wish to use XoT | is likely to be a class of authoritative servers that wish to use XoT | |||
in the near future with a small number of configured secondaries but | in the near future with a small number of configured secondaries but | |||
that do not wish to support DoT for regular queries from recursives | that do not wish to support DoT for regular queries from recursives | |||
in that same time frame. These servers have to potentially cope with | in that same time frame. These servers have to potentially cope with | |||
probing and direct queries from recursives and test servers and also | probing and direct queries from recursives and from test servers and | |||
potential attacks that might wish to make use of TLS to overload the | also potential attacks that might wish to make use of TLS to overload | |||
server. | the server. | |||
[RFC5936] clearly states that non-AXFR session traffic can use an | [RFC5936] clearly states that non-AXFR session traffic can use an | |||
open connection; however, this requirement needs to be reevaluated | open connection; however, this requirement needs to be reevaluated | |||
when considering the application of the same model to XoT. Proposing | when considering the application of the same model to XoT. Proposing | |||
that a server should also start responding to all queries received | that a server should also start responding to all queries received | |||
over TLS just because it has enabled XoT would be equivalent to | over TLS just because it has enabled XoT would be equivalent to | |||
defining a form of authoritative DoT. This specification does not | defining a form of authoritative DoT. This specification does not | |||
propose that, but it also does not prohibit servers from answering | propose that, but it also does not prohibit servers from answering | |||
queries unrelated to XFR exchanges over TLS. Rather, this | queries unrelated to XFR exchanges over TLS. Rather, this | |||
specification simply outlines in later sections: | specification simply outlines in later sections: | |||
skipping to change at line 1107 ¶ | skipping to change at line 1107 ¶ | |||
provides a brief summary of some of the existing authentication and | provides a brief summary of some of the existing authentication and | |||
validation mechanisms (both transport independent and TLS specific) | validation mechanisms (both transport independent and TLS specific) | |||
that are available when performing zone transfers. Section 10 then | that are available when performing zone transfers. Section 10 then | |||
discusses in more detail specifically how a combination of TLS | discusses in more detail specifically how a combination of TLS | |||
authentication, TSIG, and IP-based ACLs interact for XoT. | authentication, TSIG, and IP-based ACLs interact for XoT. | |||
In this document, the mechanisms are classified based on the | In this document, the mechanisms are classified based on the | |||
following properties: | following properties: | |||
Data Origin Authentication (DO): | Data Origin Authentication (DO): | |||
Authentication that the DNS message originated from the party with | Authentication 1) of the fact that the DNS message originated from | |||
whom credentials were shared and of the data integrity of the | the party with whom credentials were shared and 2) of the data | |||
message contents (the originating party may or may not be the | integrity of the message contents (the originating party may or | |||
party operating the far end of a TCP/TLS connection in a 'proxy' | may not be the party operating the far end of a TCP/TLS connection | |||
scenario). | in a 'proxy' scenario). | |||
Channel Confidentiality (CC): | Channel Confidentiality (CC): | |||
Confidentiality of the communication channel between the client | Confidentiality of the communication channel between the client | |||
and server (i.e., the two endpoints of a TCP/TLS connection) from | and server (i.e., the two endpoints of a TCP/TLS connection) from | |||
passive surveillance. | passive surveillance. | |||
Channel Authentication (CA): | Channel Authentication (CA): | |||
Authentication of the identity of the party to whom a TCP/TLS | Authentication of the identity of the party to whom a TCP/TLS | |||
connection is made (this might not be a direct connection between | connection is made (this might not be a direct connection between | |||
the primary and secondary in a proxy scenario). | the primary and secondary in a proxy scenario). | |||
skipping to change at line 1511 ¶ | skipping to change at line 1511 ¶ | |||
Hardaker, "Message Digest for DNS Zones", RFC 8976, | Hardaker, "Message Digest for DNS Zones", RFC 8976, | |||
DOI 10.17487/RFC8976, February 2021, | DOI 10.17487/RFC8976, February 2021, | |||
<https://www.rfc-editor.org/info/rfc8976>. | <https://www.rfc-editor.org/info/rfc8976>. | |||
[RFC9076] Wicinski, T., Ed., "DNS Privacy Considerations", RFC 9076, | [RFC9076] Wicinski, T., Ed., "DNS Privacy Considerations", RFC 9076, | |||
DOI 10.17487/RFC9076, July 2021, | DOI 10.17487/RFC9076, July 2021, | |||
<https://www.rfc-editor.org/info/rfc9076>. | <https://www.rfc-editor.org/info/rfc9076>. | |||
[TLS-ESNI] Rescorla, E., Oku, K., Sullivan, N., and C. A. Wood, "TLS | [TLS-ESNI] Rescorla, E., Oku, K., Sullivan, N., and C. A. Wood, "TLS | |||
Encrypted Client Hello", Work in Progress, Internet-Draft, | Encrypted Client Hello", Work in Progress, Internet-Draft, | |||
draft-ietf-tls-esni-12, 7 July 2021, | draft-ietf-tls-esni-13, 12 August 2021, | |||
<https://datatracker.ietf.org/doc/html/draft-ietf-tls- | <https://datatracker.ietf.org/doc/html/draft-ietf-tls- | |||
esni-12>. | esni-13>. | |||
Appendix A. XoT Server Connection Handling | Appendix A. XoT Server Connection Handling | |||
This appendix provides a non-normative outline of the pros and cons | This appendix provides a non-normative outline of the pros and cons | |||
of XoT server connection-handling options. | of XoT server connection-handling options. | |||
For completeness, it is noted that an earlier draft version of this | For completeness, it is noted that an earlier draft version of this | |||
document suggested using a XoT-specific ALPN to negotiate TLS | document suggested using a XoT-specific ALPN to negotiate TLS | |||
connections that supported only a limited set of queries (SOA, XFRs); | connections that supported only a limited set of queries (SOA, XFRs); | |||
however, this did not gain support. Reasons given included | however, this did not gain support. Reasons given included | |||
End of changes. 6 change blocks. | ||||
12 lines changed or deleted | 12 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |