[DNSOP] Measuring DNS TTL Violations in the wild

2017-12-01 Thread Giovane C. M. Moura
Hi,

In the light of the recent discussions on TTL violations and server
stale here on the list, I decided to take a look on how often resolvers
perform TTL violations in the wild.

To do that, I used almost 10K Ripe Atlas probes. You can find a report
and datasets at:

https://labs.ripe.net/Members/giovane_moura/dns-ttl-violations-in-the-wild-with-ripe-atlas-2

Now, what was more scary were the violations that *increased* the TTL of
 of RR some more than 10x. That may put users at risk of service domains
that may have been already taken down.

/giovane

ps: related thread on oarc list at :
https://lists.dns-oarc.net/pipermail/dns-operations/2017-November/017039.html

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Measuring DNS TTL Violations in the wild

2017-12-01 Thread Ólafur Guðmundsson
I strongly disagree with your "terminology", TTL is a hint about maximum
caching period, not a demand or a contract.
A resolver can at any time for any reason discard cached entries.
Many Authoritative operators have "unreasonable" TTL's like less than 10
seconds or multiple days and I see no reason why resolvers do not
apply minimal and/or max caching rules that are reasonable.

Olafur




On Fri, Dec 1, 2017 at 3:48 PM, Giovane C. M. Moura 
wrote:

> Hi,
>
> In the light of the recent discussions on TTL violations and server
> stale here on the list, I decided to take a look on how often resolvers
> perform TTL violations in the wild.
>
> To do that, I used almost 10K Ripe Atlas probes. You can find a report
> and datasets at:
>
> https://labs.ripe.net/Members/giovane_moura/dns-ttl-
> violations-in-the-wild-with-ripe-atlas-2
>
> Now, what was more scary were the violations that *increased* the TTL of
>  of RR some more than 10x. That may put users at risk of service domains
> that may have been already taken down.
>
> /giovane
>
> ps: related thread on oarc list at :
> https://lists.dns-oarc.net/pipermail/dns-operations/2017-
> November/017039.html
>
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Measuring DNS TTL clamping in the wild

2017-12-01 Thread Jared Mauch


> On Dec 1, 2017, at 11:38 AM, Ólafur Guðmundsson  wrote:
> 
> 
> I strongly disagree with your "terminology", TTL is a hint about maximum 
> caching period, not a demand or a contract. 
> A resolver can at any time for any reason discard cached entries. 

Agreed.

> Many Authoritative operators have "unreasonable" TTL's like less than 10 
> seconds or multiple days and I see no reason why resolvers do not 
> apply minimal and/or max caching rules that are reasonable. 


Yes, I remember a load balancer from the last century that had serious issues 
with DNS requests with low TTLs.  We ended up replacing it.

TTL is certainly a MAX, but no reason you can’t return a shorter value.  My 
stub resolver may see a lower number if an item is about to be evicted from 
cache, should we not see that?  Clamping the max seems helpful and causes the 
least enduser harm, so is quite wise.  

The same would be true hitting a large anycast dns server like 75.75.75.75 or 
8.8.8.8, 4.2.2.1, you may hit a different backend for whatever reason so see 
varying TTLs for the same query within a 10 second interval based on that.  
That’s not bad, it’s working as designed.

I think measurements are interesting though, so identifying TTL clamping in the 
wild would be an interesting study.

- jared
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Measuring DNS TTL Violations in the wild

2017-12-01 Thread Wessels, Duane

> On Dec 1, 2017, at 8:38 AM, Ólafur Guðmundsson  wrote:
> 
> I strongly disagree with your "terminology", TTL is a hint about maximum 
> caching period, not a demand or a contract. 

You say its just a hint.  If you put a TTL of 1 hour on your data, and I have a 
recursive name server that reuses it for 2 hours, 12 hours, 5 days... thats 
okay?

If its just a hint then we are we spending all this effort on "serve stale"?

DW

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Measuring DNS TTL Violations in the wild

2017-12-01 Thread Ólafur Guðmundsson
On Fri, Dec 1, 2017 at 5:02 PM, Wessels, Duane 
wrote:

>
> > On Dec 1, 2017, at 8:38 AM, Ólafur Guðmundsson 
> wrote:
> >
> > I strongly disagree with your "terminology", TTL is a hint about maximum
> caching period, not a demand or a contract.
>
> You say its just a hint.  If you put a TTL of 1 hour on your data, and I
> have a recursive name server that reuses it for 2 hours, 12 hours, 5
> days... thats okay?
>
> If its just a hint then we are we spending all this effort on "serve
> stale"?
>
> DW
>
>
Strictly speaking yes, it is the same as when a Secondary does not update
the zone for a long time.
DNS is not a strict coherency protocol, thus playing  loose with the time
things are with in reason is ok.
Stretching TTL from 1 Hour to 1 day is IMHO BAD, doing it for 10% or 10
minutes is fine.
We are getting into religion here, the original poster called people that
cap TTL's Heretics,
I disagree with that labeling of myself and others that are applying sane
caps.

Olafur
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Measuring DNS TTL Violations in the wild

2017-12-01 Thread Paul Hoffman
On 1 Dec 2017, at 9:16, Ólafur Guðmundsson wrote:

> We are getting into religion here, the original poster called people that
> cap TTL's Heretics,

Looking through the mail archives, no one other than you is using that term.

--Paul Hoffman

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Measuring DNS TTL clamping in the wild

2017-12-01 Thread Jared Mauch


> On Dec 1, 2017, at 12:23 PM, Paul Hoffman  wrote:
> 
> On 1 Dec 2017, at 9:16, Ólafur Guðmundsson wrote:
> 
>> We are getting into religion here, the original poster called people that
>> cap TTL's Heretics,
> 
> Looking through the mail archives, no one other than you is using that term.

I think this is subject to interpretation, some people view the done 
differently.
The subject line felt hostile.. 2nd attempt to adjust subject-line to make it 
less hostile.

- jared

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Measuring DNS TTL clamping in the wild

2017-12-01 Thread Steve Crocker
I would be very interested in a bit more precision here.  Is there a way to say 
what is permissible vs impermissible re TTLs, and is there a way to say what is 
desirable vs undesirable re TTLs?  We all understand that longer TTLs reduce 
the frequency of refresh at the expense of slower response whenever the 
authoritative information changes.  However, some fraction of the recursive 
resolvers impose minimum and/or maximum limits on the TTLs they receive from 
the authoritative servers.

Shortening TTLs increases the amount of traffic between the recursive resolvers 
and authoritative resolvers and lengthens the response time for some queries.  
However, I don’t think there is any service guarantee with respect to an 
individual query that is violated by shortening the TTL.

Lengthening a TTL, on the other hand, does change one of the service 
guarantees.  When there is a change in the entry in the authoritative server, 
what is the maximum time until that change is guaranteed to be propagated 
throughout the net?  This depends primarily on the TTL.  However, when the TTL 
is lengthened by the recursive resolvers, the upper bound for propagation of a 
change is similarly increased.

Is there any common understanding of how much lengthening is permitted?  Is 
commonplace?

Let me make a guess that the only lengthening that takes place in practice is a 
floor of ten seconds.

Comments?

Thanks,

Steve




> On Dec 1, 2017, at 12:52 PM, Jared Mauch  wrote:
> 
> 
> 
>> On Dec 1, 2017, at 12:23 PM, Paul Hoffman  wrote:
>> 
>> On 1 Dec 2017, at 9:16, Ólafur Guðmundsson wrote:
>> 
>>> We are getting into religion here, the original poster called people that
>>> cap TTL's Heretics,
>> 
>> Looking through the mail archives, no one other than you is using that term.
> 
> I think this is subject to interpretation, some people view the done 
> differently.
> The subject line felt hostile.. 2nd attempt to adjust subject-line to make it 
> less hostile.
> 
> - jared
> 
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop