So here's my take on why the MU2 test on certificate discovery fails from my perspective.
This is a result of not getting the modular specifications right leading to some explicit assumptions in the Applicability statement.
I have even had this bite me in the certification stage when I have been quoted back requirements on Direct Applicability incorrectly vis a vis what we worked on, (namely every query always had to go thru DNS each time a certificate was used to send a mail message) and a couple of excellent phone calls with you and John Hall before the latest version of the applicability statement.
If one encounters an SRV load balancing configuration, then the data should be the same no matter which server is contacted. It should look like one server. One is looking at the servers from the point of view of DNS and why SRV was designed. But there is more...
In the case of the test scenario it was misconfigured with different data for DTS-517 either by mistake or intentionally to explore this concept based on the question posed in test scenario.
To me the question was to what extent to continue the chain of responsibility pattern or to stop?
The first server reached due to the SRV value with the DTS 517 query had no user certificate attribute whatsover. Connection, but no attribute. That's a fail in configuration. I remember similar fails in DNS round robin.
That's a limitation on how SRV was intended to work, same data but load balanced.
So a simple misconfiguration giving invalid results solved by replication between the instances, so they converge, or just copying over the correct data for the attribute and certificate. But the real issue is the combination of two patterns.
I don't think a clarification from ONC is required in this case, the test was just set up wrong, and then they also got some erroneous information from DirectTrust, which is not authoritative on setting up Directory certificate results in terms of the network plumbing but highly knowledgeable about the meaning of the certificates, policy, practices, governance, etc.
But this does bring up an interesting point in terms of the comments on the defect, which is how does one get to the built in advantages via SRV of the X.500/LDAP referral, chaining and replication features?
In short one does not. That's really more pertinent to the Law of Demeter software design concept, rather than Chain of Command pattern that we used in S&I for the Hybrid Model.
Where Chain of Responsibility pattern says "try this until you get an acceptable answer" the Law of Demeter says "talk to your friends, without going thru another step or object"
So we separated those two concepts based on knowledge. Global discovery worked really well with DNS SRV so an X.500/LDAP server could be found based on the only the knowledge of the Direct Address and or Domain in the subject alt field.
However the "talk to one's friends" concept really worked well to be making request within that structure in which the directories were themselves linked in the Directory Information Tree via what is called "superior knowledge".
So in that case once you knew the location of the Directory server entry point, one did not need to repeat the query to find it again, since one was within the design of the network tree.
For whatever reason, that did not make it over but was documented in S&I consensus and the error seems to come up around modular specifications ignoring the two different concepts of the design patterns.
http://en.wikipedia.org/wiki/Chain-of-responsibility_pattern
http://en.wikipedia.org/wiki/Law_of_Demeter
http://www.x500standard.com/index.php?n=X500.Navigation