Re: [Add] [EXTERNAL] Re: TTL of resolver.arpa

Steffen Nurpmeso <steffen@sdaoden.eu> Wed, 05 January 2022 19:20 UTC

Return-Path: <steffen@sdaoden.eu>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 99CC63A0D0E for <add@ietfa.amsl.com>; Wed, 5 Jan 2022 11:20:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RtA1gaCiMh1I for <add@ietfa.amsl.com>; Wed, 5 Jan 2022 11:20:00 -0800 (PST)
Received: from sdaoden.eu (sdaoden.eu [217.144.132.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4F6493A0D06 for <add@ietf.org>; Wed, 5 Jan 2022 11:19:59 -0800 (PST)
Received: from kent.sdaoden.eu (kent.sdaoden.eu [10.5.0.2]) by sdaoden.eu (Postfix) with ESMTPS id 21C5E1605A; Wed, 5 Jan 2022 20:19:56 +0100 (CET)
Received: by kent.sdaoden.eu (Postfix, from userid 1000) id B78742B40; Wed, 5 Jan 2022 20:19:21 +0100 (CET)
Date: Wed, 05 Jan 2022 20:19:21 +0100
Author: Steffen Nurpmeso <steffen@sdaoden.eu>
From: Steffen Nurpmeso <steffen@sdaoden.eu>
To: Tommy Jensen <Jensen.Thomas=40microsoft.com@dmarc.ietf.org>
Cc: Ben Schwartz <bemasc=40google.com@dmarc.ietf.org>, Daniel Migault <mglt.ietf@gmail.com>, Eric Orth <ericorth@google.com>, Paul Wouters <paul@nohats.ca>, ADD Mailing list <add@ietf.org>
Message-ID: <20220105191921.UmisZ%steffen@sdaoden.eu>
In-Reply-To: <CO1PR00MB1307F935EDDF19AD941BE551FA4B9@CO1PR00MB1307.namprd00.prod.outlook.com>
References: <SJ0PR00MB1318A7693D1BCE72AB05D4EAFA499@SJ0PR00MB1318.namprd00.prod.outlook.com> <9363D704-18FF-46CE-9B7A-38874C49D724@nohats.ca> <CADZyTkkC2wY+38NjJ0OM-uCzeY6k3+2x9C3uiGphP0=opnVuFg@mail.gmail.com> <CAHbrMsDVRmZAZfe2y6uN5mkG0B9+j1f_95zYZwj9-OzVicg2+g@mail.gmail.com> <CO1PR00MB1307F935EDDF19AD941BE551FA4B9@CO1PR00MB1307.namprd00.prod.outlook.com>
Mail-Followup-To: Tommy Jensen <Jensen.Thomas=40microsoft.com@dmarc.ietf.org>, Ben Schwartz <bemasc=40google.com@dmarc.ietf.org>, Daniel Migault <mglt.ietf@gmail.com>, Eric Orth <ericorth@google.com>, Paul Wouters <paul@nohats.ca>, ADD Mailing list <add@ietf.org>
User-Agent: s-nail v14.9.23-206-gfff8ce373d
OpenPGP: id=EE19E1C1F2F7054F8D3954D8308964B51883A0DD; url=https://ftp.sdaoden.eu/steffen.asc; preference=signencrypt
BlahBlahBlah: Any stupid boy can crush a beetle. But all the professors in the world can make no bugs.
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/bHJl9p2nA4kRCEa1QV8boKylS9E>
Subject: Re: [Add] [EXTERNAL] Re: TTL of resolver.arpa
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jan 2022 19:20:06 -0000

Tommy Jensen wrote in
 <CO1PR00MB1307F935EDDF19AD941BE551FA4B9@CO1PR00MB1307.namprd00.prod.outl\
 ook.com>:
 |I’m in full agreement with Ben on all points.
 |
 |Re-reading the draft, I see that the understanding that DDR designations \
 |are only valid for the network they were discovered on was left unspoken. \
 |I’ll open a new issue and prepare text to provide that guidance.
 |
 |As for the TTL topic, using a TTL is necessary for network configuration \
 |changes. If any given resolver doesn’t want to be polled, they are \
 |free to set a very large TTL. If a resolver wants to frequently confirm \
 |designations, they can set a very short TTL. Taking away that flexibility \
 |doesn’t make sense to me. As far as the meaning of TTL: it is obviously \
 |treated as a term of validity in the wild and not assuming that is \
 |the case is not practical.

Yes.  Here are configurable conf_(min|max|neg)_ttl variables in
order to allow overwriting of what DNS gives.  The former defaults
to 60 (1<60<120), (min<U32_MAX-1) the last to 60 (30<60<300,
talking about RFCs 1034, 1536 and 2308), pretty straightforward.
Special treatment for resolver.arpa provided addresses has to
happen (no file-based monitoring applies for them), but the lesser
the impact the better i would cite.

Thanks and ciao,

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)