Dear colleagues:

While reviewing this document and working in the DPS for .NZ, I found
little coverage about how to pick a signature validity period.

Section 3.1.2 indicates

   The Zone Signing Key can be used to sign all the data in a zone on a
   regular basis.  When a Zone Signing Key is to be rolled, no
   interaction with the parent is needed.  This allows for signature
   validity periods on the order of days.

Placing the signature validity period in the range of days

Then section 4.1.1 explores certain relations between the signature
validity period and parameters of the zone (Max zone TTL, Min zone TTL,
SOA expire) which are useful because they provide context and suggest
minimum values, but not maximum values.

Then section 4.4.4 recommends a minimum signature validity for DS
records in the order of few days.

The only reference I could find about an argument for a higher limit for
signature validity was in a presentation from Richard Lamb about DNSSEC
deployment @ IANA [1]. That presentation says "Signatures on zone
records are only valid for six days to prevent replay attacks".

So, my first question is: should the document include recommendations
about a maximum value for the signature validity? Does the order of days
mean up to 15 days? 21 days? 30?

Second, based on observations from the current DNSSEC deployment and in
the text itself I identified three different cases for signature
validities depending on the record type:

1. Signatures for DNSKEY records
2. Signatures for DS records
3. Signatures for the rest of data in the zone

In the "wild", you can observe the signature validity period for DNSKEY
is, in some cases, different from the signature validity period for
NSEC/NSEC3 records.

You can view this clearer in the following table

Zone            DNSKEY Sig-validity     SOA/NSEC/NSEC3 sig-validity
arpa            15 days                 7 days
br              71 days                 7 days
cz              ~13 days                ~11 days
org             14 days                 14 days
pr              30 days                 30 days
pt              30 days                 30 days
se              ~6 days                 ~6 days
uk              14 days                 14 days
us              30 days                 30 days
.               15 days                 7 days

Note: the validity is calculated as the difference between the
expiration and inception of the signature covering the corresponding record.

For the root zone DNSKEY's signature validity is aligned with the slot
they have defined to pre-generate signatures in order to reduce the
access to the KSK, I assume "arpa" have similar policy.

Should the document include text to describe the convenience (or
inconvenience) of having different validities depending on the record
type, and also document this policy for the root zone about dividing the
ZSK rollover period in predefined slots to make the pre-generation of
signatures more easy? In my particular opinion, that solution is very
handy to reduce the access to the KSK.


Kind Regards

[1] http://www.ripe.net/ripe/meetings/ripe-55/presentations/lamb-dnssec.pdf
[2] https://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-dps-framework/
-- 
Sebastian Castro
DNS Specialist
.nz Registry Services (New Zealand Domain Name Registry Limited)
desk: +64 4 495 2337
mobile: +64 21 400535
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to