On Wed, Apr 13, 2011 at 06:04:31PM -0000, John Levine wrote:

> Since the TTL on a negative cache entry comes from the TTL on the SOA
> returned with the NXDOMAIN, this means that they'll be returning SOAs
> with different TTLs on different responses.  This strikes me as
> something that's not technically illegal, but that people who write
> DNS caches didn't anticipate.  Is it likely to break anything?

Strictly, the TTL on a negative cache entry comes from the minimum of
the TTL of the SOA and the SOA.MINIMUM subfield.  So the strategy
won't work if the latter is too low.  I'll ignore that and just assume
you're dealing with it.

In principle, a cache will need to be able to cope with the
possibility that the TTL will change on a record in between times the
cache looked.  That's for two reasons: the authoritative server's
records could change, or there could be a cache in between.

It strikes me that a cache might not actually overwrite its negative
cache for a zone if it already has a negative TTL longer than the one
it gets in a given answer, on the grounds that having been given the
longer TTL before it is permitted to continue using that.  So I think
you'll probably need to test widely in order to learn whether your
strategy will actually work in practice.

> Bonus question: with DNSSEC, a cache can use NSEC info to synthesize
> NXDOMAIN responses for nearby addresses.  Will inconsistent TTLs break
> anything then?

I think you'd have to ask implementers of such synthesizing caches.
But I can't see how.

A

-- 
Andrew Sullivan
a...@shinkuro.com
Shinkuro, Inc.
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to