Time is a pain in the neck. Conversations over the meaning of timers and time fields have gone on for a long time.

Keep in mind the difference between absolute (or wall clock) time and relative time. The latter is even stickier because the time may be relative to an event that is local and not even zone-wide.

What timers are used to do is to govern different, often orthogonal operations and events in the DNS system. The TTL is there to govern freshness of cached records in a server. The SOA timers are there to govern the freshness of a copy of a zone in a slave server. Authority (only) servers have no notion of time and we've made strides to keep it that way. (At least in the protocol.)

DNSSEC came along with absolute time. That is a novelty of the extensions. The time was used to do two things - protect the cryptographic relevance of the signature and to limit the impact of replay attempts.

Along the way many have confused the meaning of the timers. TTL trimming to the signature expiration is one abuse, arguably one that makes sense. In the purity of the protocol it doesn't but given operational realities that there may be a forced downstream validator that needs this trimming to be done.

At 11:43 -0400 6/2/11, Olafur Gudmundsson wrote:

Strictly speaking from a protocol point of view any signature that expires
before (zone expiry + RR TTL) is a potential validation failure.

The signature expiration is in absolute time. Zone expiry (and refresh/retry) is a relative time. TTL is also a relative time.

Whether the signature expiration time will arrive before the expiration of the zone or the cache entry is a question relative to the time you ask.

The base time for, say zone expiry, is relative to the slave server and is not revealed via the protocol. And it is server specific, not zone specific!

So - there's no way to determine if "any signature ... expires before" zone expiry or RR TTL.

Any Signature that expires before corresponding TTL is a likely validation
failure if there is a non DNSSEC validating cache in the path.

What do you mean by "in the path"?

There's no protocol error in shipping an expired signature. It's up to the receiver to decide if that matters. We stopped requiring zone loading to check signatures like 10 years ago.

Any Signature that has expired is bad.

http://tools.ietf.org/html/draft-wijngaards-dnsop-trust-history-02 says differently.

The issue is that many zone owners do not

a) Do not know how long it takes to distribute their modified zone to all
the servers in the NS set. (frequent assumption is 0 seconds)

b) Forget about the possible impact of zone expiry when secondary server
can not reach distribution server.

c) Forget about maximum TTL in zone

I'm not sure where you are going here - but C isn't a problem in caches that do TTL trimming. A & B aren't limited to being DNSSEC issues.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar                    You can leave a voice message at +1-571-434-5468

Now, don't say I'm always complaining.
Wait, that's a complaint, isn't it?
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to