Re: [DNSOP] I-D Action: draft-ietf-dnsop-rfc5011-security-considerations-08.txt

Paul Vixie <paul@redbarn.org> Mon, 11 December 2017 06:57 UTC

Return-Path: <paul@redbarn.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6DD8A1270A7 for <dnsop@ietfa.amsl.com>; Sun, 10 Dec 2017 22:57:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3ZBnV_tuanAv for <dnsop@ietfa.amsl.com>; Sun, 10 Dec 2017 22:57:53 -0800 (PST)
Received: from family.redbarn.org (family.redbarn.org [IPv6:2001:559:8000:cd::5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 73785120726 for <dnsop@ietf.org>; Sun, 10 Dec 2017 22:57:53 -0800 (PST)
Received: from localhost.localdomain (dhcp-153.access.lah1.vix.su [24.104.150.153]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by family.redbarn.org (Postfix) with ESMTPSA id C91B061FA2; Mon, 11 Dec 2017 06:57:52 +0000 (UTC)
From: Paul Vixie <paul@redbarn.org>
To: dnsop@ietf.org
Cc: Michael StJohns <msj@nthpermutation.com>, Wes Hardaker <wjhns1@hardakers.net>
Date: Sun, 10 Dec 2017 22:57:52 -0800
Message-ID: <10441571.LRbvcOIgNt@localhost.localdomain>
Organization: none
User-Agent: KMail/4.13.0.30 (Linux/4.13.16-202.fc26.x86_64; KDE/4.14.32; x86_64; ; )
In-Reply-To: <CANeU+ZDbj90Yw6M0mkO5-oW+VgK4Z-ymAxZdQ-6LX0=1pEdh7w@mail.gmail.com>
References: <151199364931.4845.3034001091375154653@ietfa.amsl.com> <6d239b9a-fd1e-46a3-c705-6851dd8ffe0a@nthpermutation.com> <CANeU+ZDbj90Yw6M0mkO5-oW+VgK4Z-ymAxZdQ-6LX0=1pEdh7w@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="nextPart2147251.61dtZJkxrn"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/0mkKmgq2XOmznHLf7kAp8rz82JE>
Subject: Re: [DNSOP] I-D Action: draft-ietf-dnsop-rfc5011-security-considerations-08.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Dec 2017 06:57:55 -0000

On Friday, December 08, 2017 06:27:07 AM Michael StJohns wrote:
> To try this out, let’s use a ttl of 28 hours and an expiration of 7 days to
> get an active refresh as below.

Mike, I very much appreciate the analysis of the text and the proposed method that 
you've done. I am picking this message as my entry point to this thread even though 
my comments are also applicable to Message-ID: <6d239b9a-fd1e-46a3-
c705-6851dd8ffe0a@nthpermutation.com>.

> Take an activeRefresh of 14 hours (giving a fast retry of 2.8 hours and an
> addHoldDown time of 30 days (720 hour). That gives you an
> activeRefreshOffset of 6 hours.   A perfect resolver will make 51 queries
> in 714 hours and the last triggering query at 728 hours.
> 
> Assume a 4% failure rate (to make the math easy) in queries and assume the
> first retry always works. Which adds approx two fast retry intervals to the
> time making the total time to do 51 queries 719.8 hour for an actual offset
> of .2 hours.  The next and last query needed to take place to trigger the
> trust anchor installation will take place at 733.8 hours.
> 
> The point is that retransmission drift makes the whole concept of
> activeRefreshOffset nonsensical in any population of resolvers with any
> losses at all.

Authors, I suggest and request that you both model and simulate the proposed 
method, along the lines Mike has done in this thread but with more than one set of 
parameters and conditions, in order that the second-set-of-eyes can be readily 
provided by more than one reviewer.

This timing based approach to online DNSSEC signing key changes is subtle beyond 
anybody's expectations, and because it will be used by the root zone, it is vital that we 
do more than simply whiteboard our proposed methods.

-- 
P. Vixie
-- 
P. Vixie