SV_RFC2181_9_TC_not_set - Case of the TC header bit is not set
Verify that a NUT does not set TC bit for results of additional section processing.
Authoritative Server
SV_RFC2181_9_TC_not_set.seq [-tooloption ...]: KOI tool option See also DNSConfig.pm
AP Server1 (TN) |3ffe:501:ffff:101::10 |192.168.1.10 | Net-y --+--------+-------------------------- 3ffe:501:ffff:101::/64 | 192.168.1/24 | | Router (TN) |3ffe:501:ffff:100::1 |192.168.0.1 | | Net-z --+--------+-----------------+-------- 3ffe:501:ffff:100::/64 | | 192.168.0/24 | | DNS Server1 (NUT) DNS Client1 (TN) 3ffe:501:ffff:100::XXXX 3ffe:501:ffff:100::20 192.168.0.10 192.168.0.20
XXXX: EUI64
$TTL 86400 ; TTL of 1 day @ IN SOA NS1.example.com. root.example.com. ( 2005081600 ; serial 3600 ; refresh every 1 hr 900 ; retry every 15 min 604800 ; expire after a week 3600 ; Minimum TTL of a 1 hr ) ; IN NS NS1.example.com. NS1 IN A 192.168.0.10 ; A IN A 192.168.1.10 B IN A 192.168.1.100 IN A 192.168.1.101 IN A 192.168.1.102 IN A 192.168.1.103 IN A 192.168.1.104 IN A 192.168.1.105 IN A 192.168.1.106 IN A 192.168.1.107 IN A 192.168.1.108 IN A 192.168.1.109 IN A 192.168.1.110 IN A 192.168.1.111 IN A 192.168.1.112 IN A 192.168.1.113 IN A 192.168.1.114 IN A 192.168.1.115 IN A 192.168.1.116 IN A 192.168.1.117 IN A 192.168.1.118 IN A 192.168.1.119 IN A 192.168.1.120 IN A 192.168.1.121 IN A 192.168.1.122 IN A 192.168.1.123 IN A 192.168.1.124 IN A 192.168.1.125 IN A 192.168.1.126 IN A 192.168.1.127
This test sequence is following.
DNS Client1 (TN) DNS Server1 (NUT) | | |------------------------------------->| | 1. Send standard query | | QNAME=B.example.com | | QTYPE=A | | | |<-------------------------------------| | 2. Standard query response | | (TC bit is not set) | | QNAME=B.example.com | | QTYPE=A | | Answer=192.168.1.100 | | to 192.168.1.127 | | AUTHORITY Name=example.org | | AUTHORITY Name Server | | = NS1.example.org | | | v v
1. TN send standard query QNAME=B.example.com, QTYPE=A to NUT. 2. NUT reply query response w/ A=192.168.1.100 - 192.168.1.127 to TN (Judgment *2)
|
||
IP Header | Source Address | CL1_NETZ |
Destination Address | NUT_NETZ | |
UDP Header | Src Port | 2000 |
Dst Port | 53 | |
DNS Header | ID | 0x1000 |
QR | 0 | |
OPCODE | 0 | |
AA | 0 | |
TC | 0 | |
RD | 1 | |
RA | 0 | |
Z | 0 | |
RCODE | 0 | |
QDCOUNT | 1 | |
ANCOUNT | 0 | |
NSCOUNT | 0 | |
ARCOUNT | 0 | |
DNS Question section | QNAME | B.example.com |
QTYPE | A (0x0001) | |
QCLASS | IN (0x0001) |
|
||
IP Header | Source Address | NUT_NETZ |
Destination Address | CL1_NETZ | |
UDP Header | Src Port | 53 |
Dst Port | 2000 | |
DNS Header | ID | 0x1000 |
QR | 1 | |
OPCODE | 0 | |
AA | 1 | |
TC | 0 | |
RD | 1 | |
RA | ANY | |
Z | 0 | |
RCODE | 0 | |
QDCOUNT | 1 | |
ANCOUNT | 30 | |
NSCOUNT | 0 | |
ARCOUNT | 0 | |
DNS Question section | QNAME | B.example.com |
QTYPE | A (0x0001) | |
QCLASS | IN (0x0001) | |
DNS Answer section | NAME | B.example.com (Pointer 0xC00C) |
TYPE | A (0x0001) | |
CLASS | IN (0x0001) | |
TTL | 1 day (86400) | |
RDLENGTH | 4 | |
ADDRESS | 192.168.1.100 | |
DNS Answer section X 28 ADDRESS 192.168.1.101 - 192.168.1.126 |
NAME | B.example.com (Pointer 0xC00C) |
TYPE | A (0x0001) | |
CLASS | IN (0x0001) | |
TTL | 1 day (86400) | |
RDLENGTH | 4 | |
ADDRESS | **** | |
DNS Answer section | NAME | B.example.com (Pointer 0xC00C) |
TYPE | A (0x0001) | |
CLASS | IN (0x0001) | |
TTL | 1 day (86400) | |
RDLENGTH | 4 | |
ADDRESS | 192.168.1.127 | |
DNS Authority section | NAME | example.com (Pointer 0xC00E) |
TYPE | NS (0x0002) | |
CLASS | IN (0x0001) | |
TTL | 1 day (86400) | |
RDLENGTH | 6 | |
NSDNAME | NS1.example.com (NS1 + Pointer 0xC00E) |
NUT_NETZ | DNS Server1's (NUT) Net-z address |
CL1_NETZ | DNS Client1's (TN) Net-z address |
2. Received standard query response w/ A=192.168.1.100 - 192.168.1.127 that include Authority section (TC bit is not set).
None
RFC2181 Clarifications to the DNS Specification 9. The TC (truncated) header bit