Hi Peter,

> -----Original Message-----
> From: Peter van Dijk <peter.van.d...@powerdns.com>
> Sent: 18 May 2021 18:26
> To: Rob Wilton (rwilton) <rwil...@cisco.com>; The IESG <i...@ietf.org>
> Cc: draft-ietf-dnsop-nsec-...@ietf.org; dnsop-cha...@ietf.org;
> dnsop@ietf.org; tjw.i...@gmail.com
> Subject: Re: [DNSOP] Robert Wilton's No Objection on draft-ietf-dnsop-
> nsec-ttl-04: (with COMMENT)
> 
> Hello Rob,
> 
> On Tue, 2021-05-18 at 08:04 -0700, Robert Wilton via Datatracker wrote:
> > ----------------------------------------------------------------------
> > COMMENT:
> > ----------------------------------------------------------------------
> >
> > Hi,
> >
> > Thanks for this document.
> >
> > Regarding:
> >
> > 3.4.  Updates to RFC8198
> >
> >    [RFC8198] section 5.4 (Consideration on TTL) is completely replaced
> >    by the following text:
> >
> >    |  The TTL value of negative information is especially important,
> >    |  because newly added domain names cannot be used while the negative
> >    |  information is effective.
> >    |
> >    |  Section 5 of [RFC2308] suggests a maximum default negative cache
> >    |  TTL value of 3 hours (10800).  It is RECOMMENDED that validating
> >    |  resolvers limit the maximum effective TTL value of negative
> >    |  responses (NSEC/NSEC3 RRs) to this same value.
> >    |
> >    |  A resolver that supports aggressive use of NSEC and NSEC3 MAY
> >    |  limit the TTL of NSEC and NSEC3 records to the lesser of the
> >    |  SOA.MINIMUM field and the TTL of the SOA in a response, if
> >    |  present.  It MAY also use a previously cached SOA for a zone to
> >    |  find these values.
> >
> > I'm not a DNS expert, and this is just a non binding comment, but I was
> > wondering why it is only "MAY" limit the TTL on NSEC and NSEC3 records
> to the
> > lesser of the SOA.MINIMUM field and the TTL of the SOA in a response
> rather
> > than a "SHOULD".
> 
> Thank you for your comment.
> 
> The old text was this:
> 
> > A resolver that supports aggressive use of NSEC and NSEC3 SHOULD reduce
> the TTL of NSEC and NSEC3 records to match the SOA.MINIMUM field in the
> authority section of a negative response, if SOA.MINIMUM is smaller.
> 
> but this text did nothing (this is also noted in section 1 of the draft),
> as signers/authoritatives already took that TTL from the SOA.MINIMUM field
> - which this document corrects.
> 
> Furthermore, during WG discussion we realised that in many cases, a
> validator handling NSEC/NSEC3 records would not have access to the
> relevant SOA at all - for example, in wildcard responses. 'SHOULD' is
> quite strong language for something that often is not even possible.
[RW] 
I agree.

> 
> And, finally, the MAY you ask about is behaviour that is only useful in
> validators until signers/authoritatives become compliant with this draft.
> It is a secondary measure (that the WG explicitly requested so as to
> attempt to solve the problem in multiple places) that should become
> irrelevant as signers (most of which already have software fixes pending,
> merged, or released) get upgraded.
> 
> I hope this answers your question; please let me know if not.
[RW] 
I think so, or at least I'm happy to defer to the WG's judgement here.

Thanks for the explanation.

Regards,
Rob


> 
> Kind regards,
> --
> Peter van Dijk
> PowerDNS.COM BV - https://www.powerdns.com/

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to