Thank you both.

On Wed, Jul 24, 2019 at 6:29 PM Matthijs Mekking <matth...@pletterpet.nl>
wrote:

> RFC 4035 says:
>
>    If the resolver accepts the RRset as authentic, the validator MUST
>    set the TTL of the RRSIG RR and each RR in the authenticated RRset to
>    a value no greater than the minimum of:
>
>    o  the RRset's TTL as received in the response;
>
>    o  the RRSIG RR's TTL as received in the response;
>
>    o  the value in the RRSIG RR's Original TTL field; and
>
>    o  the difference of the RRSIG RR's Signature Expiration time and the
>       current time.
>
> That last bullet point tells that if the signature's expiration time is
> smaller than the TTLs received in the response, the RRset is cached for
> at most the duration until the signature expires.
>
> On 7/24/19 7:50 AM, Nick Johnson wrote:
> > Suppose I receive a response containing an RRSET with records with
> > ttl=3600, signed with an RRSIG that has an expiration timestamp 60
> > seconds from now.
> >
> > After validating the signature, can I cache the RRSET for 3600 seconds,
> > or only for 60 seconds? If the former, and the RRSET is a DNSKEY, can I
> > rely on it to validate other RRSIGs for the entire 3600 seconds?
>
> In your example, the RRset must be cached for at most 60 seconds.
>
> Best regards,
>
> Matthijs
>
>
> >
> > -Nick Johnson
> >
> > _______________________________________________
> > DNSOP mailing list
> > DNSOP@ietf.org
> > https://www.ietf.org/mailman/listinfo/dnsop
> >
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to