Internet-Draft | The RRSERIAL EDNS option | April 2022 |
Salgado & Vergara Ereche | Expires 8 October 2022 | [Page] |
The "RRSERIAL" EDNS option allows a DNS querier to request a DNS authoritative server to add an EDNS option in the answer of such query with the SOA serial number field of the origin zone which contains the answered Resource Record.¶
This "RRSERIAL" data allows to debug and diagnose problems by helping to recognize the data source of an answer in an atomic single query, by associating the response with a respective zone version.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 8 October 2022.¶
Copyright (c) 2022 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
The "RRSERIAL" EDNS option [RFC6891] allows a DNS querier to request to a DNS authoritative server to add an EDNS option in the answer of such query with the SOA serial number field of the zone associated to the answered Resource Record.¶
This "RRSERIAL" data allows to help debug by recognizing the data source of an answer, associating this answer with a respective zone version.¶
DNS data is of loose coherent nature, meaning that a record obtained by a response could be out-of-sync with other authoritative sources of the same data. This makes it difficult to debug responses, because you'd need to couple an answer with the same version of the zone used to obtain such data. Even when you could use a separate query to ask for the SOA RR of the zone and therefore know its SOA serial, such separate query is performed in a different time and could arrive from another authoritative source (for example, in the case the server is anycasted as described in Section 4.9 of [RFC4786]), so it's not directly correlated with the original query.¶
This EDNS option is aimed to be used only on authoritative servers for a zone. It's intended for hop-to-hop communication (not transitive). Resolver and forwarder behavior is undefined.¶
The RRSERIAL EDNS extension doesn't offer much relevance for zones served by an Authoritative server that don't use the SOA serial versioning as a meaning to its content. There are cases where nameservers use different backends for its data sources, like relational databases or by using a different off-DNS synchronicity. In such cases this extension has no benefit or utility to use in debugging or analysis of a response.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].¶
The OPTION-CODE for the RRSERIAL option is <TBD>.¶
The OPTION-DATA for the RRSERIAL option is an unsigned 32 bit version number as defined in the SERIAL field of the "SOA RDATA Format" in Section 3.3.13 of [RFC1035].¶
The OPTION-LENGTH for the RRSERIAL option MUST have a value of 0 for queries, and MUST have a value of 4 for responses.¶
The EDNS RRSERIAL option MAY be included on any QUERY, by adding a zero-length EDNS RRSERIAL option to the options field of the OPT record when the query is made.¶
If an EDNS RRSERIAL option is sent to a server that is Authoritative for the zone queried, and the RCODE for the answer is NOERROR, a name server that understands the RRSERIAL option and chooses to honor a particular RRSERIAL request, MUST put in the OPTION-DATA a copy of the serial field from the SOA Resource Record of the zone which contains the original QNAME of the reply (as per Section 4 of [RFC8499]).¶
In the case of a SERVFAIL RCODE the responder MAY include the RRSERIAL EDNS option if the QNAME still belongs to an authoritative zone of the server, in which case that serial MUST be the one included in the answer.¶
Otherwise, the answer MUST NOT add an EDNS RRSERIAL option to the response.¶
Note that a NODATA response code as defined in Section 3 of [RFC8499] MUST also include the RRSERIAL answer as declared before even when there's no ANSWER data for the QNAME, as the RCODE corresponds to NOERROR.¶
The authors thanks all the comments and support made in the DNSOPS mailing list, chats and discussions.¶
Request to IANA for a code point registration for "RRSERIAL" option.¶
The EDNS extension data it's not covered by RRSIG records, so there's no way to verify its authenticity nor integrity using DNSSEC and could theoricatelly be tampered by a person-in-the-middle if the transport is made by unsecure means. Caution should be taken to use the EDNS RRSERIAL data for any means besides troubleshooting and debugging. If there's a need to certify the RRSERIAL trustwortiness, it will be necessary to use an encrypted and authenticated DNS transport. If there's a need to authenticate data origin for the RRSERIAL value, it should be compared to a separate regular SOA query with DO flag, whose answer shall be DNSSEC signed, with the cautions about Anycast and others as already stated in Introduction.¶
There's no risk on disclosure of private information, as the SERIAL of the SOA record is already publicly available.¶
There's a patched NSD server 4.1.23 with support for RRSERIAL with the experimental opcode 65024 maintained in https://github.com/huguei/nsd/tree/rrserial , and installed for live testing in 200.1.122.30 address with configured zones dateserial.example.com. and incserial.example.com.; with MX, TXT and AAAA apex records.¶