diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc1713.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc1713.txt')
-rw-r--r-- | doc/rfc/rfc1713.txt | 731 |
1 files changed, 731 insertions, 0 deletions
diff --git a/doc/rfc/rfc1713.txt b/doc/rfc/rfc1713.txt new file mode 100644 index 0000000..7562454 --- /dev/null +++ b/doc/rfc/rfc1713.txt @@ -0,0 +1,731 @@ + + + + + + +Network Working Group A. Romao +Request for Comments: 1713 FCCN +FYI: 27 November 1994 +Category: Informational + + + Tools for DNS debugging + +Status of this Memo + + This memo provides information for the Internet community. This memo + does not specify an Internet standard of any kind. Distribution of + this memo is unlimited. + +Abstract + + Although widely used (and most of the times unnoticed), DNS (Domain + Name System) is too much overlooked, in the sense that people, + especially administrators, tend to ignore possible anomalies as long + as applications that need name-to-address mapping continue to work. + This document presents some tools available for domain administrators + to detect and correct those anomalies. + +1. Introduction + + Today more than 3,800,000 computers are inter-connected in a global + Internet [1], comprising several millions of end-users, able to reach + any of those machines just by naming it. This facility is possible + thanks to the world widest distributed database, the Domain Name + System, used to provide distributed applications various services, + the most notable one being translating names into IP addresses and + vice-versa. This happens when you do an FTP or Telnet, when your + gopher client follows a link to some remote server, when you click on + a hypertext item and have to reach a server as defined by the URL, + when you talk to someuser@some.host, when your mail has to be routed + through a set to gateways before it reaches the final recipient, when + you post an article to Usenet and want it propagated all over the + world. While these may be the most visible uses of DNS, a lot more + applications rely on this system to operate, e.g., network security, + monitoring and accounting tools, just to mention a few. + + DNS owes much of its success to its distributed administration. Each + component (called a zone, the same as a domain in most cases), is + seen as an independent entity, being responsible for what happens + inside its domain of authority, how and what information changes and + for letting the tree grow downwards, creating new components. + + + + + +Romao [Page 1] + +RFC 1713 Tools for DNS debugging November 1994 + + + On the other hand, many inconsistencies arise from this distributed + nature: many administrators make mistakes in the way they configure + their domains and when they delegate authority to sub-domains; many + of them don't even know how to do these things properly, letting + problems last and propagate. Also, many problems occur due to bad + implementations of both DNS clients and servers, especially very old + ones, either by not following the standards or by being error prone, + creating or allowing many of the above problems to happen. + + All these anomalies make DNS less efficient than it could be, causing + trouble to network operations, thus affecting the overall Internet. + This document tries to show how important it is to have DNS properly + managed, including what is already in place to help administrators + taking better care of their domains. + +2. DNS debugging + + To help finding problems in DNS configurations and/or implementations + there is a set of tools developed specifically for this purpose. + There is probably a lot of people in charge of domain administration + having no idea of these tools (and, worse, not aware of the anomalies + that may exist in their configurations). What follows is a + description of some of these programs, their scope, motivations and + availability, and is hoped to serve as an introduction to the subject + of DNS debugging, as well as a guide to those who are looking for + something to help them finding out how healthy their domains and + servers are. + + Some prior knowledge from the reader is assumed, both on DNS basics + and some other tools (e.g., dig and nslookup), which are not analyzed + in detail here; hopefully they are well-known enough from daily + usage. + +2.1. Host + + Host is a program used to retrieve DNS information from name servers. + This information may be used simply to get simple things like + address-to-name mapping, or some more advanced purposes, e.g., + performing sanity checks on the data. It was created at Rutgers + University, but then Eric Wassenaar from Nikhef did a major rewrite + and still seems to be actively working on improving it. The program + is available from ftp://ftp.nikhef.nl/pub/network/host_YYMMDD.tar.Z + (YYMMDD is the date of the latest release). + + By default, host just maps host names to Internet addresses, querying + the default servers or some specific one. It is possible, though, to + get any kind of data (resource records) by specifying different query + types and classes and asking for verbose or debugging output, from + + + +Romao [Page 2] + +RFC 1713 Tools for DNS debugging November 1994 + + + any name server. You can also control several parameters like + recursion, retry times, timeouts, use of virtual circuits vs. + datagrams, etc., when talking to name servers. This way you can + simulate a resolver behavior, in order to find any problems + associated with resolver operations (which is to say, any application + using the resolver library). As a query program it may be as + powerful as others like nslookup or dig. + + As a debugger, host analyzes some set of the DNS space (e.g., an + entire zone) and produces reports with the results of its operation. + To do this, host first performs a zone transfer, which may be + recursive, getting information from a zone and all its sub-zones. + This data is then analyzed as requested by the arguments given on the + command line. Note that zone transfers are done by contacting + authoritative name servers for that zone, so it must be possible to + make this kind of request from such servers: some of them refuse zone + transfers (except from secondaries) to avoid congestion. + + With host you may look for anomalies like those concerning authority + (e.g., lame delegations, described below) or some more exotic cases + like extrazone hosts (a host of the form host.some.dom.ain, where + some.dom.ain is not a delegated zone of dom.ain). These errors are + produced upon explicit request on the command line, but you may get a + variety of other error messages as a result of host's operations, + something like secondary effects. These may be mere warnings (which + may be suppressed) or serious errors - in fact, warning messages are + not that simple, most of them are due to misconfigured zones, so it + might not be a good idea to just ignore them. + + Error messages have to do with serious anomalies, either with the + packets exchanged with the queried servers (size errors, invalid + ancounts, nscounts and the like), or others related to the DNS + information itself (also called "status messages" in the program's + documentation): inconsistencies between SOA records as shown by + different servers for a domain, unexpected address-to-name mappings, + name servers not responding, not reachable, not running or not + existing at all, and so on. + + Host performs all its querying on-line, i.e., it only works with data + received from name servers, which means you have to query a name + server more than once if you want to get different kinds of reports + on some particular piece of data. You can always arrange arguments + in such a way that you get all information you want by running it + once, but if you forget something or for any reason have to run it + again, this means extra zone transfers, extra load on name servers, + extra DNS traffic. + + + + + +Romao [Page 3] + +RFC 1713 Tools for DNS debugging November 1994 + + + Host is an excellent tool, if used carefully. Like most other + querying programs it may generate lots of traffic, just by issuing a + simple command. Apart from that, its resolver simulation and debug + capabilities make it useful to find many common and some not so + common DNS configuration errors, as well as generate useful reports + and statistics about the DNS tree. As an example, RIPE (Reseaux IP + Europeens) NCC uses it to generate a monthly european hostcount, + giving an overview of the Internet usage evolution in Europe. Along + with these counts, error reports are generated, one per country, and + the whole information is made available in the RIPE archive. + +2.2. Dnswalk + + Dnswalk is a DNS debugger written in Perl by David Barr, from + Pennsylvania State University. You'll find the latest version at + ftp://ftp.pop.psu.edu/pub/src/dnswalk. With the software comes a + small document where the author points some useful advice so it may + be worth reading it. + + The program checks domain configurations stored locally, with data + arranged hierarchically in directories, resembling the DNS tree + organization of domains. To set up this information dnswalk may + first perform zone transfers from authoritative name servers. You can + have a recursive transfer of a domain and its sub-domains, though you + should be careful when doing this, as it may generate a great amount + of traffic. If the data is already present, dnswalk may skip these + transfers, provided that it is up to date. + + Dnswalk looks for inconsistencies in resource records, such as MX and + aliases pointing to aliases or to unknown hosts, incoherent PTR, A + and CNAME records, invalid characters in names, missing trailing + dots, unnecessary glue information, and so on. It also does some + checking on authority information, namely lame delegations and + domains with only one name server. It is easy to use, you only have + to specify the domain to analyze and some optional parameters and the + program does the rest. Only one domain (and its sub-domains, if + that's the case) can be checked at a time, though. + + While in the process of checking data, dnswalk uses dig and resolver + routines (gethostbyXXXX from the Perl library) a lot, to get such + data as authority information from the servers of the analyzed + domains, names from IP addresses so as to verify the existence of PTR + records, aliases and so on. So, besides the zone transfers you may + count on some more extra traffic (maybe not negligible if you are + debugging a relatively large amount of data and care about query + retries and timeouts), just by running the program. + + + + + +Romao [Page 4] + +RFC 1713 Tools for DNS debugging November 1994 + + +2.3. Lamers + + A lame delegation is a serious error in DNS configurations, yet a + (too) common one. It happens when a name server is listed in the NS + records for some domain and in fact it is not a server for that + domain. Queries are thus sent to the wrong servers, who don't know + nothing (at least not as expected) about the queried domain. + Furthermore, sometimes these hosts (if they exist!) don't even run + name servers. As a result, queries are timed out and resent, only to + fail, thus creating (more) unnecessary traffic. + + It's easy to create a lame delegation: the most common case happens + when an administrator changes the NS list for his domain, dropping + one or more servers from that list, without informing his parent + domain administration, who delegated him authority over the domain. + From now on the parent name server announces one or more servers for + the domain, which will receive queries for something they don't know + about. (On the other hand, servers may be added to the list without + the parent's servers knowing, thus hiding valuable information from + them - this is not a lame delegation, but shouldn't happen either.) + Other examples are the inclusion of a name in an NS list without + telling the administrator of that host, or when a server suddenly + stops providing name service for a domain. + + To detect and warn DNS administrators all over the world about this + kind of problem, Bryan Beecher from University of Michigan wrote + lamers, a program to analyze named (the well-known BIND name server) + logging information [2]. To produce useful logs, named was applied a + patch to detect and log lame delegations (this patch was originally + written by Don Lewis from Silicon Systems and is now part of the + latest release of BIND thanks to Bryan Beecher, so it is expected to + be widely available in the near future). Lamers is a small shell + script that simply scans these logs and reports the lame delegations + found. This reporting is done by sending mail to the hostmasters of + the affected domains, as stated in the SOA record for each of them. + If this is not possible, the message is sent to the affected name + servers' postmasters instead. Manual processing is needed in case of + bounces, caused by careless setup of those records or invalid + postmaster addresses. A report of the errors found by the U-M + servers is also posted twice a month on the USENET newsgroup + comp.protocols.tcp-ip.domains. + + If you ever receive such a report, you should study it carefully in + order to find and correct problems in your domain, or see if your + servers are being affected by the spreading of erroneous information. + Better yet, lamers could be run on your servers to detect more lame + delegations (U-M can't see them all!). Also, if you receive mail + reporting a lame delegation affecting your domain or some of your + + + +Romao [Page 5] + +RFC 1713 Tools for DNS debugging November 1994 + + + hosts, please don't just ignore it or flame the senders. They're + really trying to help! + + You can get lamers from ftp://terminator.cc.umich.edu/dns/lame- + delegations. + +2.4. DOC + + Authority information is one of the most significant parts of the DNS + data, as the whole mechanism depends on it to correctly traverse the + domain tree. Incorrect authority information leads to problems such + as lame delegations or even, in extreme cases, the inaccessibility of + a domain. Take the case where the information given about all its + name servers is incorrect: being unable to contact the real servers + you may end up being unable to reach anything inside that domain. + This may be exaggerated, but if you're on the DNS business long + enough you've probably have seen some enlightened examples of this + scenario. + + To look for this kind of problems Paul Mockapetris and Steve Hotz, + from the Information Sciences Institute, wrote a C-shell script + called DOC (Domain Obscenity Control), an automated domain testing + tool that uses dig to query the appropriate name servers about + authority for a domain and analyzes the responses. + + DOC limits its analysis to authority data since the authors + anticipated that people would complain about such things as invasion + of privacy. Also, at the time it was written most domains were so + messy that they thought there wouldn't be much point in checking + anything deeper until the basic problems weren't fixed. + + Only one domain is analyzed each time: the program checks if all the + servers for the parent domain agree about the delegation information + for the domain. DOC then picks a list of name servers for the domain + (obtained from one of the parent's servers) and starts checking on + their information, querying each of them: looks for the SOA record, + checks if the response is authoritative, compares the various records + retrieved, gets each one's list of NS, compares the lists (both among + these servers and the parent's), and for those servers inside the + domain the program looks for PTR records for them. + + Due to several factors, DOC seems to have frozen since its first + public release, back in 1990. Within the distribution there is an + RFC draft about automated domain testing, which was never published. + Nevertheless, it may provide useful reading. The software can be + fetched from ftp://ftp.uu.net/networking/ip/dns/doc.2.0.tar.Z. + + + + + +Romao [Page 6] + +RFC 1713 Tools for DNS debugging November 1994 + + +2.5. DDT + + DDT (Domain Debug Tools) is a package of programs to scan DNS + information for error detection, developed originally by Jorge Frazao + from PUUG - Portuguese UNIX Users Group and later rewritten by the + author, at the time at the Faculty of Sciences of University of + Lisbon. Each program is specialized in a given set of anomalies: you + have a checker for authority information, another for glue data, mail + exchangers, reverse-mappings and miscellaneous errors found in all + kinds of resource records. As a whole, they do a rather extensive + checking on DNS configurations. + + These tools work on cached DNS data, i.e., data stored locally after + performing zone transfers (presently done by a slightly modified + version of BIND's named-xfer, called ddt-xfer, which allows recursive + transfers) from the appropriate servers, rather than querying name + servers on-line each time they run. This option was taken for + several reasons [3]: (1) efficiency, since it reads data from disk, + avoiding network transit delays, (2) reduced network traffic, data + has to be fetched only once and then run the programs over it as many + times as you wish and (3) accessibility - in countries with limited + Internet access, as was the case in Portugal by the time DDT was in + its first stages, this may be the only practical way to use the + tools. + + Point (2) above deserves some special considerations: first, it is + not entirely true that there aren't additional queries while + processing the information, one of the tools, the authority checker, + queries (via dig) each domain's purported name servers in order to + test the consistency of the authority information they provide about + the domain. Second, it may be argued that when the actual tests are + done the information used may be out of date. While this is true, + you should note that this is the DNS nature, if you obtain some piece + of information you can't be sure that one second later it is still + valid. Furthermore, if your source was not the primary for the + domain then you can't even be sure of the validity in the exact + moment you got it in the first place. But experience shows that if + you see an error, it is likely to be there in the next version of the + domain information (and if it isn't, nothing was lost by having + detected it in the past). On the other side, of course there's + little point in checking one month old data... + + The list of errors looked for includes lame delegations, version + number mismatches between servers (this may be a transient problem), + non-existing servers, domains with only one server, unnecessary glue + information, MX records pointing to hosts not in the analyzed domain + (may not be an error, it's just to point possibly strange or + expensive mail-routing policies), MX records pointing to aliases, A + + + +Romao [Page 7] + +RFC 1713 Tools for DNS debugging November 1994 + + + records without the respective PTR and vice-versa, missing trailing + dots, hostnames with no data (A or CNAME records), aliases pointing + to aliases, and some more. Given the specialized nature of each + tool, it is possible to look for a well defined set of errors, + instead of having the data analyzed in all possible ways. + + Except for ddt-xfer, all the programs are written in Perl. A new + release may come into existence in a near future, after a thorough + review of the methods used, the set of errors checked for and some + bug fixing (in particular, a Perl version of ddt-xfer is expected). + In the mean time, the latest version is available from + ftp://ns.dns.pt/pub/dns/ddt-2.0.1.tar.gz. + +2.6. The Checker Project + + The problem of the huge amount of DNS traffic over the Internet is + getting researchers close attention for quite some time, mainly + because most of it is unnecessary. Observations have shown that DNS + consumes something like twenty times more bandwidth than it should + [4]. Some causes for this undoubtedly catastrophic scenario lie on + deficient resolver and name server implementations spread all over + the world, from personal to super-computers, running all sorts of + operating systems. + + While the panacea is yet to be found (claims are made that the latest + official version of BIND is a great step forward [5]), work has been + done in order to identify sources of anomalies, as a first approach + in the search for a solution. The Checker Project is one such + effort, developed at the University of Southern California [6]. It + consists of a set of C code patched into BIND's named, for monitoring + server activity, building a database with the history of that + operation (queries and responses). It is then possible to generate + reports from the database summarizing activity and identifying + behavioral patterns from client requests, looking for anomalies. The + named code alteration is small and simple unless you want do have PEC + checking enabled (see below). You may find sources and documentation + at ftp://catarina.usc.edu/pub/checker. + + Checker only does this kind of collection and reporting, it does not + try to enforce any rules on the administrators of the defective sites + by any means whatsoever. Authors hope that the simple exhibition of + the evidences is a reason strong enough for those administrators to + have their problems fixed. + + An interesting feature is PEC (proactive error checking): the server + pretends to be unresponsive for some queries by randomly choosing + some name and start refusing replies for queries on that name during + a pre-determined period. Those queries are recorded, though, to try + + + +Romao [Page 8] + +RFC 1713 Tools for DNS debugging November 1994 + + + to reason about the retry and timeout schemes used by name servers + and resolvers. It is expected that properly implemented clients will + choose another name server to query, while defective ones will keep + on trying with the same server. This feature seems to be still under + testing as it is not completely clear yet how to interpret the + results. A PEC-only error checker is available from USC that is much + simpler than the full error checker. It examines another name server + client every 30 minutes to see if this client causes excessive load. + + Presently Checker has been running on a secondary for the US domain + for more than a year with little trouble. Authors feel confident it + should run on any BSD platform (at least SunOS) without problems, and + is planned to be included as part of the BIND name server. + + Checker is part of a research project lead by Peter Danzig from USC, + aimed to implement probabilistic error checking mechanisms like PEC + on distributed systems [7]. DNS is one such system and it was chosen + as the platform for testing the validity of these techniques over the + NSFnet. It is hoped to achieve enough knowledge to provide means to + improve performance and reliability of distributed systems. + Anomalies like undetected server failures, query loops, bad + retransmission backoff algorithms, misconfigurations and resubmission + of requests after negative replies are some of the targets for these + checkers to detect. + +2.7. Others + + All the tools described above are the result of systematic work on + the issue of DNS debugging, some of them included in research + projects. For the sake of completeness several other programs are + mentioned here. These, though just as serious, seem to have been + developed in a somewhat ad-hoc fashion, without an implicit intention + of being used outside the environments where they were born. This + impression is, of course, arguable, nevertheless there was no + necessity of dedicating an entire section to any of them. This + doesn't mean they are not valuable contributions, in some cases they + may be just what you are looking for, without having to install a + complete package to do some testings on your domain. + + The reference taken was the contrib directory in the latest BIND + distribution (where some of the above programs can also be found). + There you will find tools for creating your DNS configuration files + and NIS maps from /etc/hosts and vice-versa or generate PTR from A + records (these things may be important as a means of avoiding common + typing errors and inconsistencies between those tables), syntax + checkers for zone files, programs for querying and monitoring name + servers, all the small programs presented in [8], and more. It is + worth spending some time looking at them, maybe you'll find that + + + +Romao [Page 9] + +RFC 1713 Tools for DNS debugging November 1994 + + + program you were planning to write yourself. The latest public + version of BIND can be found at + ftp://gatekeeper.dec.com/pub/misc/vixie/4.9.2-940221.tar.gz. As of + this writing BIND-4.9.3 is in its final beta stages and a public + release is expected soon, also at gatekeeper.dec.com. + + You may also want to consider using a version control system like + SCCS or RCS to maintain your configuration files consistent through + updates, or use tools like M4 macros to generate those files. As + stated above, it's important to avoid human-generated errors, + creating problems that are difficult to track down, since they're + often hidden behind some mistyped name. Errors like this may end up + in many queries for a non-existing name, just to mention the less + serious kind. See [9] for a description of the most common errors + made while configuring domains. + +3. Why look after DNS? + + Several pieces of software were presented to help people administer + and debug their name services. They exhibit many differences in + their way of doing things, scope and requirements and it may be + difficult just to choose one of them to work with. For one thing, + people's expectations from these tools vary according to their kind + of involvement with DNS. If you are responsible for a big domain, + e.g., a top-level one or a big institution with many hosts and sub- + domains, you probably want to see how well is the tree below your + node organized, since the consequences of errors tend to propagate + upwards, thus affecting your own domain and servers. For that you + need some program that recursively descends the domain tree and + analyzes each domain per se and the interdependencies between them + all. You will have to consider how deep you want your analysis to + be, the effects it will have on the network infrastructure, i.e., + will it generate traffic only inside a campus network, no matter how + big it is, or will it be spread over, say, a whole country (of + course, your kind of connectivity plays an important role here). + + You may simply want to perform some sanity checks on your own domain, + without any further concerns. Or you may want to participate in some + kind of global effort to monitor name server traffic, either for + research purposes or just to point out the "trouble-queries" that + flow around. + + Whatever your interest may be, you can almost surely find a tool to + suit it. Eliminating problems like those described in this document + is a major contribution for the efficiency of an important piece of + the Internet mechanism. Just to have an idea of this importance, + think of all the applications that depend on it, not just to get + addresses out of names. Many systems rely on DNS to store, retrieve + + + +Romao [Page 10] + +RFC 1713 Tools for DNS debugging November 1994 + + + and spread the information they need: Internet electronic mail was + already mentioned (see [10] for details) and work is in progress to + integrate X.400 operations with DNS [11]; others include "remote + printing" services [12], distributed file systems and network routing + purposes, among others. These features may be accomplished by some + standard, well-known resource records [13], or by new, experimental + ones [14, 15]. Even if some of them won't succeed, one may well + expect some more load on the DNS burden. + + The ubiquitous DNS thus deserves a great deal of attention, perhaps + much more than it generally has. One may say that it is a victim of + its own success: if a user triggers an excessive amount of queries + only to have one request satisfied, he won't worry about it (in fact, + he won't notice it), won't complain to his system administrator, and + things will just go on like this. Of course, DNS was designed to + resist and provide its services despite all these anomalies. But by + doing so it is frequently forgotten, as long as people can Telnet or + ftp. As DNS will be given new responsibilities, as pointed in the + above paragraph, the problems described in this text will grow more + serious and new ones may appear (notably security ones [16], with a + lot of work being presently in progress addressing security in DNS), + if nothing is done to purge them. + +References + + [1] Lottor, M., "Internet Domain Survey, October 1994", + http://www.nw.com/zone/WWW/report.html, October 1994. + + [2] Beecher, B., "Dealing With Lame Delegations", Univ. Michigan, + LISA VI, October 1992. + + [3] Frazao, J. and J. L. Martins, "Ddt - Domain Debug Tools, A + Package to Debug the DNS Tree", Dept. Informatica Faculdade + Ciencias Univ. Lisboa, DI-FCUL-1992-04, January 1992. + + [4] Danzig, P., "Probabilistic Error Checkers: Fixing DNS", Univ. + Southern California, Technical Report, February 1992. + + [5] Kumar, A., J. Postel, C. Neuman, P. Danzig and S. Miller, "Common + DNS Implementation Errors and Suggested Fixes", RFC 1536, + USC/Information Sciences Institute, October 1993. + + [6] Miller, S. and P. Danzig, "The Checker Project, Installation and + Operator's Manual", Univ. Southern California, TR CS94-560, 1994. + + [7] Danzig, P., K. Obraczka and A. Kumar, "An Analisys of Wide-Area + Name Server Traffic", Univ. Southern California, TR 92-504, 1992. + + + + +Romao [Page 11] + +RFC 1713 Tools for DNS debugging November 1994 + + + [8] Albitz, P. and C. Liu, "DNS and BIND", O'Reilly and Associates + Inc., October 1992. + + [9] Beertema, P., "Common DNS Data File Configuration Errors", RFC + 1537, CWI, October 1993. + + [10] Partridge, C., "Mail Routing and the Domain System", STD 14, RFC + 974, CSNET CIC BBN Laboratories Inc., January 1986. + + [11] Allocchio, C., A. Bonito, B. Cole, S. Giordano and R. Hagens, + "Using the Internet DNS to Distribute RFC1327 Mail Address + Mapping Tables", RFC 1664, GARR, Cisco Systems Inc., Centro + Svizzero Calcolo Scientifico, ANS, August 1994. + + [12] Malamud, C. and M. Rose, "Principles of Operation for the TPC.INT + Subdomain: General Principles and Policy", RFC 1530, Internet + Multicasting Service, Dover Beach Consulting Inc., October 1993. + + [13] Rosenbaum, R., "Using the Domain Name System to Store Arbitrary + String Attributes", RFC 1464, Digital Equipment Corporation, May + 1993. + + [14] Everhart, C., L. Mamakos, R. Ullmann and P. Mockapetris (Ed.), + "New DNS RR Definitions", RFC 1183, Transarc, Univ. Maryland, + Prime Computer, Information Sciences Institute, October 1990. + + [15] Manning, B., and R. Colella, "DNS NSAP Resource Records", RFC + 1706, USC/Information Sciences Institute, NIST, October 1994. + + [16] Gavron, E., "A Security Problem and Proposed Correction With + Widely Deployed DNS Software", RFC 1535, ACES Research Inc., + October 1993 + + + + + + + + + + + + + + + + + + + +Romao [Page 12] + +RFC 1713 Tools for DNS debugging November 1994 + + +Security Considerations + + Security issues are not discussed in this memo (although security is + briefly mentioned at the end of section 3). + +Author's Address + + Artur Romao + DI - Faculdade de Ciencias e Tecnologia + Universidade Nova de Lisboa + Quinta da Torre + P-2825 Monte de Caparica + Portugal + + Phone: +351 1 294 28 44 + Fax: +351 1 295 77 86 + EMail: artur@fct.unl.pt + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Romao [Page 13] + |