On Jun 27, 2014, at 4:19 PM, Monica Chew <[email protected]> wrote:

> ----- Original Message -----
>> 
>> 
>> ----- Original Message -----
>>> 60 seconds is still a large enough window for some users to be
>>> affected by DNS changes, right? We're just looking for a reason why
>>> fxa might be more affected than our other properties, and "it's the
>>> only service with such frequent DNS changes" seems like a decent one.
>> 
>> No matter how small you set a window, there will always be someone in it :-)
>> 
>> Combine that with the fact that there are always resolvers in between clients
>> and our nameservers that can and will mess with things and can have their
>> own ideas about TTLs. It is less common these days but it still happens.
>> 
>> Do we have a page that explains the pinning we do?
> 
> https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning
> https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning/SiteOperators
> 
>> Maybe for IP changes we need we different strategy? Like keeping the old IP
>> alive for a longer time? Or pin to multiple IPs during changes?
> 
> Pinning doesn't have anything to do with IPs directly. It's just a way to 
> assert that the site uses certificates issued by root CA X. If DNS is 
> pointing to the wrong IP, then there are bigger problems. At this point we 
> could either
> 

It could just be that a user is caught in the TTL window after a switch and the 
IP has already been assigned to another TLS endpoint. This would cause a pin 
failure. The client *could* use a pin failure as a signal to flush the DNS 
cache and try again. I think we hold on to these IPs for a bit after we switch 
to new ones, so I’m confused how this is still happening though.

-chris


> 1) Broaden the pinset (only makes sense if we think it is incorrect), or
> 2) Turn it on and wait for bugs to flow in.
> 3) Continue waiting an unbounded amount of time for SSL error reporting to be 
> finished to diagnose the problem further.
> 
> I don't think 1) makes sense.
> 
> Thanks,
> Monica

_______________________________________________
Dev-fxacct mailing list
[email protected]
https://mail.mozilla.org/listinfo/dev-fxacct

Reply via email to