DNSSEC - 1 RRSIG - expires while in cache

2010-11-27 Thread Marc Lampo
Hello,

In my opinion, the following situation should be avoided,
but I'd welcome motivated second opinions.

A DNSSEC verification script yielded a warning, this morning :

HIDDEN : (soa = HIDDEN) (# RRSIGS : 1) (keyid : HIDDEN)
inception: 20101124231706 ok
now  : 20101127083003
expiration   : 20101129231706 ok
ttl  : 259200
expiration - ttl : 20101126231706 WARNING (becomes invalid during TTL)

In summary :
 There is one (1) RRSIG available,
 Which is valid now and not yet expired.
 However, given the TTL, the signature will expire while still in the
cache.

Q1: If a RRSIG is found in the cache (cache "hit"),
but it is expired.
? should a validating caching name server "ignore" the RRSIG in the
cache
  and look for a "refresh" ?
? will Bind do so ?
Q2: Does Bind "automatic" resigning take the TTL into account ?
 (so that it does not resign later then "present expiration" - "TTL")
Or is this irrelevant because the answer to earlier question
 is that an expired RRSIG in the cache must be refreshed.


Thanks and kind regards,


Marc Lampo
Security Officer
 
    EURid
    Woluwelaan 150
    1831 Diegem - Belgium
    TEL.: +32 (0) 2 401 3030
    MOB.:+32 (0)476 984 391
    marc.la...@eurid.eu
    http://www.eurid.eu
   


Want a .eu web address in your own language? Find out how so you don’t
miss out!


Register your .eu domain name and win an iPod though this X-Mas
http://www.winwith.eu
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNSSEC - 1 RRSIG - expires while in cache

2010-11-27 Thread Kevin Oberman
> From: "Marc Lampo" 
> Date: Sat, 27 Nov 2010 13:09:13 +0100 (CET)
> Sender: bind-users-bounces+oberman=es@lists.isc.org
> 
> Hello,
> 
> In my opinion, the following situation should be avoided,
> but I'd welcome motivated second opinions.
> 
> A DNSSEC verification script yielded a warning, this morning :
> 
> HIDDEN : (soa = HIDDEN) (# RRSIGS : 1) (keyid : HIDDEN)
> inception: 20101124231706 ok
> now  : 20101127083003
> expiration   : 20101129231706 ok
> ttl  : 259200
> expiration - ttl : 20101126231706 WARNING (becomes invalid during TTL)
> 
> In summary :
>  There is one (1) RRSIG available,
>  Which is valid now and not yet expired.
>  However, given the TTL, the signature will expire while still in the
> cache.
> 
> Q1: If a RRSIG is found in the cache (cache "hit"),
> but it is expired.
> ? should a validating caching name server "ignore" the RRSIG in the
> cache
>   and look for a "refresh" ?

Nope. It should refuse to validate.

> ? will Bind do so ?
Pretty sure that it will return SERVFAIL.

> Q2: Does Bind "automatic" resigning take the TTL into account ?
>  (so that it does not resign later then "present expiration" - "TTL")
> Or is this irrelevant because the answer to earlier question
>  is that an expired RRSIG in the cache must be refreshed.

Not sure. The RFCs contain warnings that you MUST take re-signing
interval into account when setting TTL. The interval between ZSK signing
must be set so that the TTL for an expiring key will always expire first
so that the new key will be fetched before the old one expires. I thing
the heading in the RFC is "TTL Considerations", but I am working from
memory. 

I don't use BIND to sign my data, so I am not sure how "smart" BIND is
about these numbers.
-- 
R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
E-mail: ober...@es.net  Phone: +1 510 486-8634
Key fingerprint:059B 2DDF 031C 9BA3 14A4  EADA 927D EBB3 987B 3751
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNSSEC - 1 RRSIG - expires while in cache

2010-11-27 Thread Niobos
On 2010-11-27 13:09, Marc Lampo wrote:
> Q2: Does Bind "automatic" resigning take the TTL into account ?
>  (so that it does not resign later then "present expiration" - "TTL")
Depending on the configuration:

>sig-validity-interval
>Specifies the number of days into the future when DNSSEC signatures 
>automatically generated as a result of dynamic updates (the section
>called "Dynamic Update") will expire. There is an optional second field which 
>specifies how long before expiry that the signatures will be
>regenerated. If not specified, the signatures will be regenerated at 1/4 of 
>base interval. The second field is specified in days if the base
>interval is greater than 7 days otherwise it is specified in hours. The 
>default base interval is 30 days giving a re-signing interval of 7
>1/2 days. The maximum values are 10 years (3660 days).
> 
>The signature inception time is unconditionally set to one hour before the 
>current time to allow for a limited amount of clock skew.
> 
>The sig-validity-interval should be, at least, several multiples of the SOA 
>expire interval to allow for reasonable interaction between the
>various timer and expiry dates.

If your TTL is longer than 7.5 days, bind will NOT resign correctly
without this option.

greetings,
Niobos

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users