On Friday, December 08, 2017 06:27:07 AM Michael StJohns wrote:
> To try this out, let’s use a ttl of 28 hours and an expiration of 7 days to
> get an active refresh as below.

Mike, I very much appreciate the analysis of the text and the proposed method 
that 
you've done. I am picking this message as my entry point to this thread even 
though 
my comments are also applicable to Message-ID: <6d239b9a-fd1e-46a3-
c705-6851dd8ff...@nthpermutation.com>.

> Take an activeRefresh of 14 hours (giving a fast retry of 2.8 hours and an
> addHoldDown time of 30 days (720 hour). That gives you an
> activeRefreshOffset of 6 hours.   A perfect resolver will make 51 queries
> in 714 hours and the last triggering query at 728 hours.
> 
> Assume a 4% failure rate (to make the math easy) in queries and assume the
> first retry always works. Which adds approx two fast retry intervals to the
> time making the total time to do 51 queries 719.8 hour for an actual offset
> of .2 hours.  The next and last query needed to take place to trigger the
> trust anchor installation will take place at 733.8 hours.
> 
> The point is that retransmission drift makes the whole concept of
> activeRefreshOffset nonsensical in any population of resolvers with any
> losses at all.

Authors, I suggest and request that you both model and simulate the proposed 
method, along the lines Mike has done in this thread but with more than one set 
of 
parameters and conditions, in order that the second-set-of-eyes can be readily 
provided by more than one reviewer.

This timing based approach to online DNSSEC signing key changes is subtle 
beyond 
anybody's expectations, and because it will be used by the root zone, it is 
vital that we 
do more than simply whiteboard our proposed methods.

-- 
P. Vixie
-- 
P. Vixie
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to