David Conrad wrote:
Brian,

On Aug 21, 2008, at 8:45 AM, Brian Dickson wrote:
How stable is the content of the root zone?
(Really, really stable, I'd guess.)

On average, there are about 20-30 changes to the root zone per month (not including SOA serial number increments) with the trend increasing. August has been a bit special (48 changes to date) due to the Kaminsky thing.


That's reasonably stable, I'd say.

And, if the signed root zone were pulled after that period, and replaced with the unsigned version, how long would the "good" aspects of the cached DNSSEC bits continue to be useful?

Obviously depends on the validity period of the signatures and the TTL of the RRs.


For the root zone itself, it looks like the minimum is 86400, and lots of RRs in the zone have various longer TTLs, such as 518400 (for the authority records for "."), and 3600000 for A records for [a-m].root-servers.net.

If the root zone were to "strobe" between signed and unsigned, what minimum duration of "signed", and what maximum duration of "unsigned" would be likely to not cause operational problems for the aforementioned
DNSSEC-configured caching, validating resolvers?

I'm unclear how going from a signed root zone to an unsigned root zone would work. If you've configured your root trust anchor and you get back a response that isn't signed, wouldn't that be treated as a validation failure?


Yes, it would. The question is, if there is a cached (validated) RRset for the whole root zone, would the result of an attempted refresh where the validation fails, result in the cached version still being kept and considered valid?

In which case, things that normally trigger SOA serial number changes, would ideally trigger the chain:
a) root zone content change
b) root zone SOA SN change
c) root zone gets signed
d) root zone SOA SN increments
e) serve signed root zone for TTL(refresh) * N + M (for some values N and M)
f) strip signatures from root zone, but don't change TTL (yes, I know, bad practice, danger, danger, high voltage!)
or
f) strip signatures from root zone, increment TTL, server for TTL(something else)

When time-out of TTL(something else) occurs, or when a change to the root zone content is needed (including any new DS on child zone(s)), go to (a).

Or even doing this one some subset of root servers or root server instances?

I think it would likely be a mistake for the root servers to not be serving the same data. It would probably be challenging to debug for most folks.

Now, I've always thought a separate root infrastructure that you had to opt in to would be a good way to go, but this quickly gets bogged down in extremely annoying (at least to me) layer 9 politics and I'll let someone else try to push that boulder up the mountain this time (Who me? Bitter? Never).

Perhaps this could be handled for volunteer clients, via extra rules on the front-end load balancers on one or more root zone instances. It is also conceivable that load balancers could look at D0 and choose root server back-end instances based on whether or not DNSSEC versions of the root zone make sense.

Brian
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to