RFC 8501
RFC 8501
RFC 8501
Howard
Request for Comments: 8501 Retevia
Category: Informational November 2018
ISSN: 2070-1721
Abstract
Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Reverse DNS in IPv4 . . . . . . . . . . . . . . . . . . . 3
1.2. Reverse DNS Considerations in IPv6 . . . . . . . . . . . 4
2. Alternatives in IPv6 . . . . . . . . . . . . . . . . . . . . 4
2.1. Negative Response . . . . . . . . . . . . . . . . . . . . 4
2.2. Wildcard Match . . . . . . . . . . . . . . . . . . . . . 5
2.3. Dynamic DNS . . . . . . . . . . . . . . . . . . . . . . . 5
2.3.1. Dynamic DNS from Individual Hosts . . . . . . . . . . 6
2.3.2. Dynamic DNS through Residential Gateways . . . . . . 7
2.3.3. Automatic DNS Delegations . . . . . . . . . . . . . . 7
2.3.4. Generate Dynamic Records . . . . . . . . . . . . . . 8
2.3.5. Populate from DHCP Server . . . . . . . . . . . . . . 8
2.3.6. Populate from RADIUS Server . . . . . . . . . . . . . 8
2.4. Delegate DNS . . . . . . . . . . . . . . . . . . . . . . 9
2.5. Dynamically Generate PTR When Queried ("On the Fly") . . 9
3. Manual User Updates . . . . . . . . . . . . . . . . . . . . . 10
4. Considerations and Recommendations . . . . . . . . . . . . . 10
5. Security and Privacy Considerations . . . . . . . . . . . . . 11
5.1. Using Reverse DNS for Security . . . . . . . . . . . . . 11
5.2. DNS Security with Dynamic DNS . . . . . . . . . . . . . . 11
5.3. Considerations for Other Uses of the DNS . . . . . . . . 12
5.4. Privacy Considerations . . . . . . . . . . . . . . . . . 12
5.5. User Creativity . . . . . . . . . . . . . . . . . . . . . 12
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12
7. References . . . . . . . . . . . . . . . . . . . . . . . . . 12
7.1. Normative References . . . . . . . . . . . . . . . . . . 12
7.2. Informative References . . . . . . . . . . . . . . . . . 14
Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 14
Author’s Address . . . . . . . . . . . . . . . . . . . . . . . . 15
1. Introduction
1.string.region.example.com. IN A 192.0.2.1
2.string.region.example.com. IN A 192.0.2.2
3.string.region.example.com. IN A 192.0.2.3
254.string.region.example.com. IN A 192.0.2.254
Many ISPs generate PTR records for all IP addresses used for
customers, and many create the matching A record.
a.9.8.7.6.5.e.f.f.f.4.3.2.1.0.0.0.0.0.0.0.0.f.0.8.b.d.0.1.0.0.2
.IP6.ARPA. IN PTR 1.string.region.example.com.
2. Alternatives in IPv6
One way to ensure that forward and reverse records match is for hosts
to update DNS servers dynamically once interface configuration is
complete (whether by SLAAC, DHCPv6, or other means), as described in
[RFC4472]. Hosts would need to provide both AAAA and PTR updates and
would need to know which servers would accept the information.
Once it learns its address and has a resolving name server, the host
must perform an SOA lookup on the IP6.ARPA record to be added in
order to find the owner and eventually the server that is
authoritative for the zone (which might accept dynamic updates).
Several recursive lookups may be required to find the longest prefix
that has been delegated. The DNS administrator must designate the
Primary Master Server for the longest match required. Once found,
the host sends dynamic AAAA and PTR updates using the concatenation
defined above ("hostname.customer.example.com").
An ISP’s DHCPv6 server may populate the forward and reverse zones
when the DHCP request is received if the request contains enough
information [RFC4704].
However, this method will only work for a single host address
(IA_NA); the ISP’s DHCP server would not have enough information to
update all records for a prefix delegation. If the zone authority is
delegated to a home gateway that used this method, the gateway could
update records for residential hosts. To implement this alternative,
users’ residential gateways would have to support the FQDN DHCP
option and would have to either have the zones configured or send
DDNS messages to the ISP’s name server.
For customers who are able to run their own DNS servers, such as
commercial customers, often the best option is to delegate the
reverse DNS zone to them, as described in [RFC2317] (for IPv4).
However, since most residential users have neither the equipment nor
the expertise to run DNS servers, this method is unavailable to
residential ISPs.
An ISP using this option should generate a PTR record on demand and
cache or prepopulate the forward (AAAA) entry for the duration of the
Time to Live of the PTR. Similarly, the ISP would prepopulate the
PTR following a AAAA query. To reduce exposure to a Denial-of-
Service attack, state or storage should be limited. Alternatively,
if an algorithm is used to generate a unique name, it can be employed
on the fly in both directions. This option has the advantage of
assuring matching forward and reverse entries while being simpler
than dynamic DNS. Administrators should consider whether the lack of
user-specified hostnames is a drawback. It may be possible to allow
user-specified hostnames for some records and generate others on the
fly; looking up a record before generating on the fly may slow
responses or may not scale well.
Rejecting mail: A PTR with a certain string may indicate "This host
is not a mail server", which may be useful for rejecting probable
spam. The absence of a PTR leads to the desired behavior.
Log files: Many systems will record the PTR of remote hosts in their
log files to make it easier when reading logs later to see what
network the remote host uses.
Several methods exist for providing encryption keys in the DNS. Any
of the options presented here may interfere with these key
techniques.
6. IANA Considerations
7. References
[RFC2136] Vixie, P., Ed., Thomson, S., Rekhter, Y., and J. Bound,
"Dynamic Updates in the Domain Name System (DNS UPDATE)",
RFC 2136, DOI 10.17487/RFC2136, April 1997,
<https://www.rfc-editor.org/info/rfc2136>.
[RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and
S. Rose, "DNS Security Introduction and Requirements",
RFC 4033, DOI 10.17487/RFC4033, March 2005,
<https://www.rfc-editor.org/info/rfc4033>.
[RFC4035] Arends, R., Austein, R., Larson, M., Massey, D., and
S. Rose, "Protocol Modifications for the DNS Security
Extensions", RFC 4035, DOI 10.17487/RFC4035, March 2005,
<https://www.rfc-editor.org/info/rfc4035>.
Acknowledgements
The author would like to thank Alain Durand, JINMEI Tatuya, David
Freedman, Andrew Sullivan, Chris Griffiths, Darryl Tanner, Ed Lewis,
John Brzozowski, Chris Donley, Wes George, Jason Weil, John Spence,
Ted Lemon, Stephan Lagerholm, Steinar Haug, Mark Andrews, Chris
Roosenraad, Fernando Gont, John Levine, and many others who discussed
and provided suggestions for this document.
Author’s Address
Lee Howard
Retevia
Fairfax, VA 22032
United States of America
Email: lee.howard@retevia.net