Re: [DNSOP] New draft on delegation revalidation

Patrick Mevzek <mevzek@uniregistry.com> Wed, 22 April 2020 20:48 UTC

Return-Path: <mevzek@uniregistry.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0D673A0991 for <dnsop@ietfa.amsl.com>; Wed, 22 Apr 2020 13:48:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=uniregistry.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D9opfNw8R_km for <dnsop@ietfa.amsl.com>; Wed, 22 Apr 2020 13:48:29 -0700 (PDT)
Received: from a-mx.uniregistry.com (a-mx.uniregistry.com [64.96.177.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E12B3A0988 for <dnsop@ietf.org>; Wed, 22 Apr 2020 13:48:23 -0700 (PDT)
Abuse: Forward to abuse@uniregistry.com with full headers
X-Virus-Scanned: Content filter at a-mx.uniregistry.com
Powered-By: https://www.uniregistry.com
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=uniregistry.com; s=bravo; t=1587588500; bh=V4oGh3ozR+qLBEmEeHf/zQTFTIEobqRR/GnLY5BDpjI=; h=Subject:To:Cc:References:From:Date:In-Reply-To; b=rMgq4irhd5yfMJ4Rs7hwNEsDZpjYnElthV/w3ruo2Bqpqkp4IjsEDVd1VvNqsThr8 lf4pbSycgokIvHsKZ+/JuflYrrBUIQOH6HucRQ1aou2So5To+F2phi7D89wbuOQDO6 B/5HyTB/Y4CYVF6Wtr1uP3OwhGZa+DfYxYfTYfQE2vIoXHVBQaIzWgUrkNzNOvbJmF RFaKyIPoKOa3Y0JGTaXunAAnWhBviLf295Ax6buw+G+RBgl0HIGI+qY07OBGN3xJef ZXZjxKgTvzjq4jIR/yxRnvie7PCS8A/qTizS4jJkB6skgvulymXKPfij49/Ao8uoHD cnlB0Dqn40y9A==
Received: from EPPguy.local (b01.uniregistrar.net [52.204.70.64]) (authenticated bits=0) by a-mx.uniregistry.com (8.15.2/8.15.2/Debian-8) with ESMTPSA id 03MKmIpM020223 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT); Wed, 22 Apr 2020 20:48:19 GMT
To: Shumon Huque <shuque@gmail.com>, Gavin McCullagh <gmccullagh@gmail.com>
Cc: Tim Wicinski <tjw.ietf@gmail.com>, Bob Harold <rharolde@umich.edu>, "dnsop@ietf.org WG" <dnsop@ietf.org>
References: <CAHPuVdV9eSCLQOqMF0cq8fHcuSZs7nCgjhHMfMoaV5H=ekbtSA@mail.gmail.com> <CADyWQ+Gugw5ScSGDhDWLvrMQB-nNS+cOAcETQ9ssf2wPMFYq3w@mail.gmail.com> <CA+nkc8DkHaVR91koywh4KMx+-Pmw2gRR1KnuwUcP_j0G+k3S7A@mail.gmail.com> <CAHPuVdWSAX8Ha=djd_6qGC8NvaKAPjnNxu5UX8XW7fwZ6t_U_A@mail.gmail.com> <CA+nkc8DDHsocDkReb1GA1=6d_yau_jXLgwxZRhMFAfdJHaXMiw@mail.gmail.com> <CAHQ5LGpys=rDCDyvoBRW1_p4=V9XRCq+v5+cmqKaWHHbsCTNOA@mail.gmail.com> <CAHPuVdUEWQ+-OU8VTPwbZ8WDN8iTRk7dC0EASJNJVFr4FovaXA@mail.gmail.com>
From: Patrick Mevzek <mevzek@uniregistry.com>
Organization: Uniregistry
Message-ID: <9ea4731d-c5b9-0f0b-2ca6-cf3262c09781@uniregistry.com>
Date: Wed, 22 Apr 2020 15:48:17 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.7.0
MIME-Version: 1.0
In-Reply-To: <CAHPuVdUEWQ+-OU8VTPwbZ8WDN8iTRk7dC0EASJNJVFr4FovaXA@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/-n3TRZCq0Y-q1pkgT_r9896J2lo>
Subject: Re: [DNSOP] New draft on delegation revalidation
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Apr 2020 20:48:32 -0000

On 22/04/2020 14:32, Shumon Huque wrote:
> Based on history to date, it seems to be rather intractable, but I would
> love to be proven wrong. The interfaces that registrars use to update
> delegation records in the registries don't even offer any TTL
> configuration option that I've seen (even if the registries were willing
> to support it). Does the EPP DNS mapping even support setting TTL?

I am not sure what you refer to by "EPP DNS mapping".

In EPP world there are host objects (or host attributes).
Those are created by the registrar, in the registry system, and the
registry will use them to publish NS records, and potentially glues.

Those objects have name, IP addresses and a few extra meta data but
nothing about TTL.
And when you update domains for new NS you just specify the host object
IDs you want to use (which are in fact there name). For registries using
hosts as attributes instead you then there provide also glues, if
needed, but nothing more.

To give another data point, that goes into your direction, there is a
secDNS extension, that registrars uses to pass DS/DNSKEY materials to
registries, for publication.

It has the following specified:

        An OPTIONAL <secDNS:maxSigLife> element that indicates a
         child's preference for the number of seconds after signature
         generation when the parent's signature on the DS information
         provided by the child will expire.  A client SHOULD specify the
         same <secDNS:maxSigLife> value for all <secDNS:dsData> elements
         associated with a domain.  If the <secDNS:maxSigLife> is not
         present, or if multiple <secDNS:maxSigLife> values are
         requested, the default signature expiration policy of the
         server operator (as determined using an out-of-band mechanism)
         applies.

and

   The <secDNS:update> element contains an OPTIONAL "urgent" attribute.
   In addition, the <secDNS:dsData> element contains OPTIONAL <secDNS:
   maxSigLife> and <secDNS:keyData> elements.  The server MUST abort
   command processing and respond with an appropriate EPP error if the
   values provided by the client can not be accepted for syntax or
   policy reasons.


While those are not TTL per se they are in the same bag: they try to
influence what the registry publishes at the DNS level.

And while most registries implement this EPP extension to do DNSSEC
operations I know of not one of them honoring the above two parameters
(but I can certainly miss some).

So I am pretty sure that even if you defined an EPP mapping to pass TTL
data, very few registries, if not none, would use it. But that is just
my opinion, I am not a registry nor speaking for them.


-- 
Patrick Mevzek