diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc2010.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc2010.txt')
-rw-r--r-- | doc/rfc/rfc2010.txt | 395 |
1 files changed, 395 insertions, 0 deletions
diff --git a/doc/rfc/rfc2010.txt b/doc/rfc/rfc2010.txt new file mode 100644 index 0000000..7e43bfc --- /dev/null +++ b/doc/rfc/rfc2010.txt @@ -0,0 +1,395 @@ + + + + + + +Network Working Group B. Manning +Request for Comments: 2010 ISI +Category: Informational P. Vixie + ISC + October 1996 + + + Operational Criteria for Root Name Servers + +Status of this Memo + + This memo provides information for the Internet community. This memo + does not specify an Internet standard of any kind. Distribution of + this memo is unlimited. + +Abstract + + This document specifies the operational requirements of root name + servers, including host hardware capacities, name server software + revisions, network connectivity, and physical environment. + +1 - Rationale and Scope + + 1.1. Historically, the name servers responsible for the root (".") + zone have also been responsible for all international top-level + domains (iTLD's, for example: COM, EDU, INT, ARPA). These name + servers have been operated by a cadre of highly capable volunteers, + and their administration has been loosely coordinated by the NIC + (first SRI-NIC and now InterNIC). Ultimate responsibility for the + correct operation of these servers and for the content of the DNS + zones they served has always rested with the IANA. + + 1.2. As described in [Postel96], many new TLD's may be created + shortly. Servers for all new and existing iTLD's will be subject to + the operational requirements given in [Postel96]. The set of servers + for the root (".") zone is likely to become disjoint from the set of + servers for any TLD or group of TLD's, including those maintained by + the InterNIC. + + + + + + + + + + + + + +Manning & Vixie Informational [Page 1] + +RFC 2010 DNSSVR Criteria October 1996 + + + 1.3. In spite of the similarities in operational requirements between + the servers for the iTLD's and the servers for the root (".") zone, + they are in fact different server sets with different administrators + and slightly different operational requirements. It is likely that + many contry code tld servers will have even more divergent + operational requirements. That said, the requirements set down in + this document could be successfully applied to any name server + (whether root, top level, or any other level), but may be more + draconian than necessary for servers other than those of the root + (".") zone. + + Disclaimer: The selection of name server locations and + administrators, and the procedures for addressing + noncompliance with these stated operational + requirements, are outside the scope of this document. + + Definition: For the purpose of this document, the term "zone master" + shall be used to designate the administrative owner of + the content of a zone. This person is expected to have + final responsibility for the selection and correct + operation of all of the zone's servers. For the root + (".") zone, this is the IANA. + +2 - Operational Requirements + + 2.1. Name server software. The zone master shall initially and + periodically choose a name server package to run on all of the zone's + servers. It is expected that the BIND server will be used, at least + initially, and that new versions or other servers will be specified + from time to time. + + Rationale: This requirement is based on the wide and free + availability of BIND's source code, and the active + analysis and development it constantly receives from + several members of the IETF. + + Name server software upgrades will be specified and scheduled by the + zone master, and must occur on all of a zone's servers within a + specified 96 hour window. + + Rationale: In some cases it has proven necessary to "cold start" a + zone's servers in order to clear out oscillating bad + data. By forcing all software upgrades to happen at + about the same time, it will be possible to coordinate + a software change with a zone content change. + + + + + + +Manning & Vixie Informational [Page 2] + +RFC 2010 DNSSVR Criteria October 1996 + + + 2.2. UDP checksums. UDP checksums must be generated when sending + datagrams, and verified when receiving them. + + Rationale: Some vendors turn off UDP checksums for performance + reasons, citing the presence of MAC-level frame checks + (CRC, for example) as "strong enough." This has been + a disaster in actual practice. + + 2.3. Dedicated host. A name server host should have no other + function, and no login accounts other than for system or network + administrators. No other network protocols should be served by a + name server host (e.g., SMTP, NNTP, FTP, et al). If login is + permitted from other than the system console, then the login service + must be by encrypted channel (e.g., Kerberized and encrypted + rlogin/telnet, the secure shell (SSH), or an equivilent). + + Rationale: Each additional service performed by a host makes it + less reliable and potentially less secure, as well as + complicating fault isolation procedures. While name + service does not consume very much in the way of system + resources, it is thought best that a host do a few + things well rather than many things poorly. + + 2.4. Clock synchronization. A name server host should synchronize + its clock using the NTP protocol (currnet version) with + authentication. At least two NTP servers should be used. As an + exception to section 2.3 above, a name server host can be an NTP + server as well. + + Rationale: For distributed fault isolation reasons, synchronized + time stamps in system event logs are quite helpful. + NTP is easily spoofed by UDP blast attacks, thus the + requirement for authentication between the name server + host and its NTP servers. A name server host is + allowed to be an NTP server because it has been + observed that a single host running both name service + and stratum 1 NTP is still quite reliable and secure. + + 2.5. Network interfaces. Name servers must send UDP responses with + an IP source address (and UDP source port number) equal to the IP + destination address (and UDP destination port number) of the request. + Also, a name server might have multiple real interfaces, but only one + will be advertised in the zone's NS RRset and associated glue A RRs. + The advertised address should be that of the "best" interface on the + host, in terms of network performance and reliability to the largest + number of destinations. + + + + + +Manning & Vixie Informational [Page 3] + +RFC 2010 DNSSVR Criteria October 1996 + + + Rationale: While not required by [RFC1035], many extant DNS + implementations require the source address and port of + a reply to match the destination address and port to + which the request was sent. The number of advertised + addresses is limited to one (1) so that DNS delegation + responses containing this name server can be as short + as possible. + + 2.6. Physical environment. A name server host must be located in a + secure space such as a locked computer room or a data center with + restricted access. The power supply should be redundant, using + batteries, generators or some other means to protect against utility + power failures. Network connectivity should be redundant, so that a + single wide area line failure cannot completely isolate the name + server host from the rest of the network. + + 2.7. Network security. The system and network administrators should + educate themselves about potential threats, and stay current on CERT + bulletins regarding network breakins. The system staff should + periodically audit the name server host's activity logs and be able + to detect breakins during or after the fact. + + 2.8. Host performance. As of the time of this writing, a name server + must be able to answer 1,200 UDP transactions per second with less + than 5 milliseconds of average latency. Because the network is still + growing at a high rate, the ability to grow to 2,000 transactions per + second and still support a 5 millisecond latency is highly desirable. + Note that this requirement affects both the host and the network + infrastructure to which that host is attached. + + 2.9. Response time. The administrators responsible for a name server + will respond to e-mail trouble reports within 24 hours. Personnel + issues such as vacations and illness will cause responsibilities to + be delegated and/or reassigned rather than ignored. After hours + telephone numbers must be made available to the zone master for + nonpublished use in emergencies. An escalation contact name, e-mail + address, and telephone number will also be made available to the zone + master in the event of nonresponse through the normal channel. + + 2.10. Zone transfer access control. The name server shall be + configured so that outbound zone transfers are permitted only to + destinations on the server's local networks, and to whichever + networks the zone master designates for remote debugging purposes. + + + + + + + + +Manning & Vixie Informational [Page 4] + +RFC 2010 DNSSVR Criteria October 1996 + + + Rationale: Zone transfers can present a significant load on a name + server, especially if several transfers are started + simultaneously against the same server. There is no + operational reason to allow anyone outside the name + server's and zone's administrators to transfer the + entire zone. + + 2.11. Zone transfer protocol. DNS AXFR shall be used in preference + to FTP or any other non-DNS transfer protocol. DNS NOTIFY (see + [NOTIFY]) and DNS IXFR (see [IXFR]) shall be supported and enabled + when available. + + Rationale: Historically, the common implementations of DNS + (a.k.a., BIND) did not support zone transfer of the + root (".") zone due to programming errors. Thus, FTP + was used. In the future, DNS implementations which do + not support zone transfer of all zones will not be + considered suitable for use as root name servers. The + benefits of [IXFR] and [NOTIFY] should be obvious. + + 2.12. Recursion shall be disabled for queries. + + Rationale: Recursion is a major source of cache pollution, and can + be a major drain on name server performance. An + organization's recursive DNS needs should be served by + some other host than its root name server(s). An + exception is made for missing glue since it's possible + that glue needed for some delegations will not be + within or beneath any zone for which the server is + authoritative. Such glue must be fetched via + recursive lookups to other servers. + + 2.13. Outages shall be reported. All outages, scheduled or not, + shall be reported to the zone master via e-mail. If an outage is + unscheduled or if an outage is scheduled less than 24 hours in + advance, then an additional notification of the zone master shall be + made via telephone. Extended or repeated outages may beget special + handling by the zone master. + + 2.14. Inverse name lookups. The PTR RR associated with a server's + primary interface address (that is, the address shown in in the + zone's delegation) shall have its target specified by the zone + master. + + + + + + + + +Manning & Vixie Informational [Page 5] + +RFC 2010 DNSSVR Criteria October 1996 + + + Rationale: Since each organization has local control of their + network's PTR RRs, and since it is necessary for the + correct operation of some software that the forward and + reverse lookups have symmetrical results, it is left + up to the zone master to select the name for each + authority server's primary address. + +3 - Possible Selection Criteria + + 3.1. Host population. A server's location on the network should be + such that it has a low IP hop count to a high number of end hosts. + Duplication of service should be avoided, such that any given set of + end hosts needs to have a low IP hop count to at most one authority + server for any given zone. + + 3.2. Infrastructure diversity. A server's location on the network + should be such that most failures capable of isolating it from a + large number of end hosts are diverse from the failures capable of + similarly isolating other authority servers for the same zone(s). + +4 - Security Considerations + + See section 2.7. + +5 - References + + [RFC1035] + Mockapetris, P., "Domain Names - Implementation and Specification", + STD 13, RFC 1035, USC/Information Sciences Institute, November + 1987. + + [Postel96] + Postel, J., "New Registries and the Delegation of International Top + Level Domains", Work in Progress. + + [IXFR] + Ohta, M., "Incremental Zone Transfer", RFC 1995, August 1996. + + [NOTIFY] + Vixie, P., "A Mechanism for Prompt Notification of Zone Changes", + RFC 1996, August 1996. + +6 - Acknowledgements + + Constructive comments have been received from: Jon Postel, Michael + Patton, Andrew Partan, Michael Dillon, Don Mitchell Steven Doyle, + Owen DeLong and other members of the internet community. + + + + +Manning & Vixie Informational [Page 6] + +RFC 2010 DNSSVR Criteria October 1996 + + +7 - Authors' Addresses + + Bill Manning + USC/ISI + 4676 Admiralty Way + Marina del Rey, CA 90292 + + Phone: +1 310 822 1511 + EMail: bmanning@isi.edu + + + Paul Vixie + Internet Software Consortium + Star Route Box 159A + Woodside, CA 94062 + + Phone: +1 415 747 0204 + EMail: paul@vix.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Manning & Vixie Informational [Page 7] + |