Документ взят из кэша поисковой машины. Адрес оригинального документа : http://mirror.msu.net/pub/rfc-editor/rfc-ed-all/pdfrfc/rfc7304.txt.pdf
Дата изменения: Mon Jul 7 23:44:23 2014
Дата индексирования: Sun Apr 10 16:45:55 2016
Кодировка:
Independent Submission Request for Comments: 7304 Category: Informational ISSN: 2070-1721

W. Kumari Google July 2014

A Method for Mitigating Namespace Collisions Abstract This document outlines a possible, but not recommended, method to mitigate the effect of collisions in the DNS namespace by providing a means for end users to disambiguate the conflict. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This is a contribution to the RFC Series, independently of any other RFC stream. The RFC Editor has chosen to publish this document at its discretion and makes no statement about its value for implementation or deployment. Documents approved for publication by the RFC Editor are not a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc7304. Copyright Notice Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.

Kumari

Informational

[Page 1]


RFC 7304

DNS Collision Mitigation

July 2014

Table of Contents 1. 2. 3. 4. 5. 1. Introduction/Background . Mitigation . . . . . . . Implementation/Disclaimers Security Considerations . Acknowledgements . . . . ... ... .. ... ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2 3 3 4

Introduction/Background Collisions in the DNS occur in multiple ways. One common case is that an organization has used a subdomain (foo) of its primary domain (example.com) for corporate infrastructure, and then the string 'foo' is delegated as a Top-Level Domain (TLD). When an employee of the organization enters 'www.foo', is the goal to reach a machine in the internal namespace (www.foo.example.com) or the hostname 'www' in the 'foo' TLD? This document describes a means of disambiguating this and similar cases. Implementation of this method is not recommended; it is documented here to explain some of the pitfalls with such an approach.

2.

Mitigation The mitigation described in this document involves presenting multiple options to the user and allowing them to indicate which of the names is the one they are trying to reach. The mitigation would look up the name in multiple namespaces. If a conflict is detected, it would then provide a means for the user to indicate which one of the colliding names they wish to connect to, and return the disambiguated answer to the application. An additional feature of mitigation could be to cache the user's choice and/or provide a means to set priorities. This could be accomplished in a number of ways, including: o Intercepting the resolution requests from the application in a "shim" type library Replacing the resolver library entirely Integrating this type of mitigation into applications (some web browsers already do something similar to this)

o o

Kumari

Informational

[Page 2]


RFC 7304

DNS Collision Mitigation

July 2014

o

Proxying the request to a server that provides an interstitial page that allows the user to indicate the intended name (for applications such as HTTP)

There are a number of issues with this solution, including but not limited to: o There may not be a human available to disambiguate the answer (unattended machines, mail servers, etc.). The human/user may have no idea which is the correct choice, especially in the case of a phishing attack or other malicious intent. The additional latency introduced may cause the originating application to time out. The experience would be time consuming for users as they must select each site and subsite intended (e.g., www.intranet, images.intranet, etc.). Caching the responses could lead to problems when the user changes location (internal sites would fail when offsite or otherwise lead to incorrect sites being loaded).

o

o

o

o

For these and other reasons, implementation of this technique is not recommended. 3. Implementation/Disclaimers This document does not reference an numerous issues described above, we solution be implemented. This is a not recommend that it be viewed as collision problem. 4. Security Considerations While this method may make some users more aware of which version of a name they are going to use (and so careful users may avoid some phishing attacks), the security risks described above outweigh this potential benefit. There are numerous security implications in this approach, including leaking internal names (e.g., secret-project.corp.example.com), users being tricked into selecting the incorrect choice when trying to disambiguate answers, etc. implementation. Due to the do not recommend that this very slight mitigation, and we do a solution to the namespace

Kumari

Informational

[Page 3]


RFC 7304

DNS Collision Mitigation

July 2014

For these reasons, it is not recommended that this solution be deployed. 5. Acknowledgements The author wishes to thank the Braden, Carsten Bormann, Nevil Carpenter, Benoit Claise, Keith Harrington, Paul Hoffamn, John Author's Address Warren Kumari Google 1600 Amphitheatre Parkway Mountain View, CA 94043 US EMail: warren@kumari.net following individuals: Fred Baker, Bob Brownlee, Eric Burger, Brian Drage, Martin J. Duerst, David Levine, and Ted Lemon.

Kumari

Informational

[Page 4]