SV_RFC2181_9_TC_not_set - Case of the TC header bit is not set
Verify that a NUT does not set TC bit for results of additional section processing.
Authoritative Server
SV_RFC2181_9_TC_not_set.seq [-tooloption ...]: KOI tool option See also DNSConfig.pm
AP Server1 (TN)
|3ffe:501:ffff:101::10
|192.168.1.10
|
Net-y --+--------+-------------------------- 3ffe:501:ffff:101::/64
| 192.168.1/24
|
|
Router (TN)
|3ffe:501:ffff:100::1
|192.168.0.1
|
|
Net-z --+--------+-----------------+-------- 3ffe:501:ffff:100::/64
| | 192.168.0/24
| |
DNS Server1 (NUT) DNS Client1 (TN)
3ffe:501:ffff:100::XXXX 3ffe:501:ffff:100::20
192.168.0.10 192.168.0.20
XXXX: EUI64
$TTL 86400 ; TTL of 1 day @ IN SOA NS1.example.com. root.example.com. ( 2005081600 ; serial 3600 ; refresh every 1 hr 900 ; retry every 15 min 604800 ; expire after a week 3600 ; Minimum TTL of a 1 hr ) ; IN NS NS1.example.com. NS1 IN A 192.168.0.10 ; A IN A 192.168.1.10 B IN A 192.168.1.100 IN A 192.168.1.101 IN A 192.168.1.102 IN A 192.168.1.103 IN A 192.168.1.104 IN A 192.168.1.105 IN A 192.168.1.106 IN A 192.168.1.107 IN A 192.168.1.108 IN A 192.168.1.109 IN A 192.168.1.110 IN A 192.168.1.111 IN A 192.168.1.112 IN A 192.168.1.113 IN A 192.168.1.114 IN A 192.168.1.115 IN A 192.168.1.116 IN A 192.168.1.117 IN A 192.168.1.118 IN A 192.168.1.119 IN A 192.168.1.120 IN A 192.168.1.121 IN A 192.168.1.122 IN A 192.168.1.123 IN A 192.168.1.124 IN A 192.168.1.125 IN A 192.168.1.126 IN A 192.168.1.127
This test sequence is following.
DNS Client1 (TN) DNS Server1 (NUT)
| |
|------------------------------------->|
| 1. Send standard query |
| QNAME=B.example.com |
| QTYPE=A |
| |
|<-------------------------------------|
| 2. Standard query response |
| (TC bit is not set) |
| QNAME=B.example.com |
| QTYPE=A |
| Answer=192.168.1.100 |
| to 192.168.1.127 |
| AUTHORITY Name=example.org |
| AUTHORITY Name Server |
| = NS1.example.org |
| |
v v
1. TN send standard query QNAME=B.example.com, QTYPE=A to NUT.
2. NUT reply query response w/ A=192.168.1.100 - 192.168.1.127 to TN (Judgment *2)
|
|
||
| IP Header | Source Address | CL1_NETZ |
| Destination Address | NUT_NETZ | |
| UDP Header | Src Port | 2000 |
| Dst Port | 53 | |
| DNS Header | ID | 0x1000 |
| QR | 0 | |
| OPCODE | 0 | |
| AA | 0 | |
| TC | 0 | |
| RD | 1 | |
| RA | 0 | |
| Z | 0 | |
| RCODE | 0 | |
| QDCOUNT | 1 | |
| ANCOUNT | 0 | |
| NSCOUNT | 0 | |
| ARCOUNT | 0 | |
| DNS Question section | QNAME | B.example.com |
| QTYPE | A (0x0001) | |
| QCLASS | IN (0x0001) | |
|
|
||
| IP Header | Source Address | NUT_NETZ |
| Destination Address | CL1_NETZ | |
| UDP Header | Src Port | 53 |
| Dst Port | 2000 | |
| DNS Header | ID | 0x1000 |
| QR | 1 | |
| OPCODE | 0 | |
| AA | 1 | |
| TC | 0 | |
| RD | 1 | |
| RA | ANY | |
| Z | 0 | |
| RCODE | 0 | |
| QDCOUNT | 1 | |
| ANCOUNT | 30 | |
| NSCOUNT | 0 | |
| ARCOUNT | 0 | |
| DNS Question section | QNAME | B.example.com |
| QTYPE | A (0x0001) | |
| QCLASS | IN (0x0001) | |
| DNS Answer section | NAME | B.example.com (Pointer 0xC00C) |
| TYPE | A (0x0001) | |
| CLASS | IN (0x0001) | |
| TTL | 1 day (86400) | |
| RDLENGTH | 4 | |
| ADDRESS | 192.168.1.100 | |
| DNS Answer section X 28 ADDRESS 192.168.1.101 - 192.168.1.126 |
NAME | B.example.com (Pointer 0xC00C) |
| TYPE | A (0x0001) | |
| CLASS | IN (0x0001) | |
| TTL | 1 day (86400) | |
| RDLENGTH | 4 | |
| ADDRESS | **** | |
| DNS Answer section | NAME | B.example.com (Pointer 0xC00C) |
| TYPE | A (0x0001) | |
| CLASS | IN (0x0001) | |
| TTL | 1 day (86400) | |
| RDLENGTH | 4 | |
| ADDRESS | 192.168.1.127 | |
| DNS Authority section | NAME | example.com (Pointer 0xC00E) |
| TYPE | NS (0x0002) | |
| CLASS | IN (0x0001) | |
| TTL | 1 day (86400) | |
| RDLENGTH | 6 | |
| NSDNAME | NS1.example.com (NS1 + Pointer 0xC00E) | |
| NUT_NETZ | DNS Server1's (NUT) Net-z address |
| CL1_NETZ | DNS Client1's (TN) Net-z address |
2. Received standard query response w/ A=192.168.1.100 - 192.168.1.127 that include Authority section (TC bit is not set).
None
RFC2181 Clarifications to the DNS Specification
9. The TC (truncated) header bit