Re: [DNSOP] Measuring DNS TTL Violations in the wild

Mukund Sivaraman <muks@isc.org> Sat, 02 December 2017 14:39 UTC

Return-Path: <muks@isc.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 95F051286B1 for <dnsop@ietfa.amsl.com>; Sat, 2 Dec 2017 06:39:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.234
X-Spam-Level:
X-Spam-Status: No, score=-1.234 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_SOFTFAIL=0.665, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JiRLCZ4kkyAG for <dnsop@ietfa.amsl.com>; Sat, 2 Dec 2017 06:39:33 -0800 (PST)
Received: from mail.banu.com (mail.banu.com [IPv6:2a01:4f8:140:644b::225]) by ietfa.amsl.com (Postfix) with ESMTP id 09757128656 for <DNSOP@ietf.org>; Sat, 2 Dec 2017 06:39:32 -0800 (PST)
Received: from jurassic.lan.banu.com (unknown [115.118.156.171]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.banu.com (Postfix) with ESMTPSA id 47C1956A0806; Sat, 2 Dec 2017 14:39:28 +0000 (GMT)
Date: Sat, 02 Dec 2017 20:09:25 +0530
From: Mukund Sivaraman <muks@isc.org>
To: Ólafur Guðmundsson <olafur@cloudflare.com>
Cc: "Wessels, Duane" <dwessels@verisign.com>, dnsop <DNSOP@ietf.org>, "Giovane C. M. Moura" <giovane.moura@sidn.nl>
Message-ID: <20171202143925.GA20446@jurassic.lan.banu.com>
References: <aec2510c-e543-6c4a-873d-5c2db7df5a78@sidn.nl> <CAN6NTqytiDj-FfixD6aKD4AKa5oik7SEtP=82JhP4GR=SyWjYw@mail.gmail.com> <9E8E7EAA-7D37-4841-9144-F49C216ABD7B@verisign.com> <CAN6NTqx2Gq5XK6VDz-dVSbL8k5Yg8G=xM12qdQJHsBP=fp6pCw@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <CAN6NTqx2Gq5XK6VDz-dVSbL8k5Yg8G=xM12qdQJHsBP=fp6pCw@mail.gmail.com>
User-Agent: Mutt/1.9.1 (2017-09-22)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/j7stxqXRAN0Ml0MnRzUnYYh7fT0>
Subject: Re: [DNSOP] Measuring DNS TTL Violations in the wild
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 02 Dec 2017 14:39:34 -0000

On Fri, Dec 01, 2017 at 05:16:47PM +0000, Ólafur Guðmundsson wrote:
> On Fri, Dec 1, 2017 at 5:02 PM, Wessels, Duane <dwessels@verisign.com>
> wrote:
> 
> >
> > > On Dec 1, 2017, at 8:38 AM, Ólafur Guðmundsson <olafur@cloudflare.com>
> > wrote:
> > >
> > > I strongly disagree with your "terminology", TTL is a hint about maximum
> > caching period, not a demand or a contract.
> >
> > You say its just a hint.  If you put a TTL of 1 hour on your data, and I
> > have a recursive name server that reuses it for 2 hours, 12 hours, 5
> > days... thats okay?
> >
> > If its just a hint then we are we spending all this effort on "serve
> > stale"?
> >
> > DW
> >
> >
> Strictly speaking yes, it is the same as when a Secondary does not update
> the zone for a long time.

An authoritiative server operator knows what the consequence of setting
SOA RDATA fields is. It isn't the same as a cache extending TTL as it
sees fit, in spite of the loose coherency among primary and secondaries.

I don't agree a downstream cache has authoritiative say about extending
TTLs (except exceptional circumstances where the authority is
unreachable ~serve-stale).

		Mukund