1 something. I also believe it should scale as to the size of the subscription base in some way. Basically, this should answer the question of “ given a set of subscribers of size N, a per request failure rate of f, a retry time of R, how long do you have to wait until P% of the subscribers have had a successful query?”
So with P == 99.99%, R being the fast retry time, f being 5%? And N being 10M, it should be possible to calculate how long to wait. Basically a cumulative distribution function. When I get back to my laptop, I’ll check in with excel and see if I can give you an idea of what this looks like. That gives you a reasonable lower bounds for the uptake AFTER dealing with expiring old records and reprents N resolvers doing their last query to validate the new trust anchor. I estimated it as a log function time retry time in an earlier email. Later, mike On Fri, Nov 17, 2017 at 13:27 Bob Harold <rharo...@umich.edu> wrote: > On Thu, Nov 16, 2017 at 8:33 AM, Matthijs Mekking <matth...@pletterpet.nl> > wrote: > >> Wes, >> >> My preference is to include safetyMargin and have text to explain it >> exists because of network delays etcetera, and also reference to RFC 5011's >> retryTime. So that's some mix of 1B 1C or 2B I guess :) >> >> Best regards, >> Matthijs >> >> >> On 15-11-17 02:49, Wes Hardaker wrote: >> >>> >>> The discussion has been long with respect to the safetyMargin in the >>> 5011 security considerations document. There hasn't been a huge >>> conclusion and many different ideas have been floated by, and we're now >>> at the point where we need to pick between them. Below, I try to lay >>> out the primary and sub-options available based on discussions so far. >>> Please provide your opinions on your preference so I can wrap up this >>> draft. >>> >>> Background: This document is not intended to provide operational >>> guidance on what you SHOULD do. It's intended to draw the timing line >>> below which you MUST NOT venture. The safetyMargin was introduced to >>> prevent race conditions based on network delays, eg, which can mean that >>> a RFC5011 Resolver operating at the same time as a PEP Publisher making >>> a change at exactly at the minimum addWaitTime or addWallClockTime >>> values would lead to a failure. So the primary question today is "how >>> do we want to deal with this issue of real-world speed-of-light and >>> other issues?". To complicate this a bit further, packets are never >>> guaranteed to be delivered and network losses can entirely prevent a >>> 5011 Resolver from succeeding at all for a given operation. >>> >>> Option 1. Include a safetyMargin of some value. >>> >>> 1A) safetyMargin = MAX(2*TTL, 1.5Hr) -- current draft >>> >>> 1B) safetyMargin = something based on the retryTime, >>> (an example solution was suggested by MSJ) >>> >>> 1C) Your value here >>> >>> Option 2. Don't include a safetyMargin >>> >>> 2A) Just ignore the issues entirely >>> >>> 2B) Explain that this document does not cover operational >>> complexities like retries (already in the -07 version), >>> network delays and other operational issues. >>> >>> >>> After thinking about this for far far too long, I've now switched my own >>> opinion to that of 2C for the principal reason that this is the >>> line-in-the-sand document, and to be honest people should be using >>> values much larger than this, per MSJ's guidance on how 5011 should be >>> used. Thus, it makes more sense to define this as the "MUST NOT go >>> below this line" without trying to be precise about a value that can >>> never be >>> perfectly accurate, by definition. >>> >>> But, forget my opinion. What's yours? If nothing else, pick one of the >>> [12][ABC] options above please, even without any text defining why you >>> think so (until someone pokes you). >>> >>> > I prefer 1A since the reasoning is well documented. > or MAX(1A,1B), but that is more complex for little gain. > > -- > Bob Harold > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop >
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop