[dns-operations] Unplanned DLV zone outage on 2009-Apr-06

Mark Andrews Mark_Andrews at isc.org
Wed Apr 15 08:58:17 UTC 2009


In message <EFE30A3F-AB88-48C1-AA2C-2413FE97E10B at CS.UCLA.EDU>, Eric Osterweil writes:
> >
> > In message <F095B7FC-F8BF-4E89-847A-B77EA42E3C8C at CS.UCLA.EDU>, Eric  
> > Osterweil writes:
> >> -----BEGIN PGP SIGNED MESSAGE-----
> >> Hash: SHA1
> >>
> >>
> >> On Apr 14, 2009, at 4:16 PM, Jeremy C. Reed wrote:
> >>
> >>> On Tue, 14 Apr 2009, Eric Osterweil wrote:
> >>>
> >>> What happens if the unknowing zone decided to become unsigned but
> >>> the DLV
> >>> still indicates that it should be signed? (Due to no relationship  
> >>> and
> >>> communication with the DLV.)
> >>
> >> We only serve keys that were seen during the last poll and that have
> >> valid RRSIGs (i.e. if they've expired we don't list them).  If a zone
> >> signs for (say) a month, and then removes its signed material the  
> >> next
> >> day, that's already a bit of a faux pas.
> >
> > 	Garbage.
> 
> <snip>
> 
> Ignoring flame.

	What flames?

	Until a zone has declared that it is using DNSSEC in a
	operational manner it shouldn't matter what the operator
	does.  GOV was a perfect example of a operator changing
	things willy nilly up until it declared the zone was signed.
	DNSKEYs that worked one day didn't the next.
 
> > 	When I publish trusted keys then I need to consider other people.
> > 	Until I publish trusted keys I don't need to consider other people.
> >
> > 	I can publish trusted keys in multiple manners.
> > 	* provide DS/DNSKEY to parent, key changes are now constained by  
> > parent/child
> > 	  relationship and associated TTLs.
> 
> Unsigned parent?

	I didn't say that *all* methods were applicable to all
	zones.  Publishing a parent is only possible if the parent
	is signed.
	
> > 	* provide DS/DNSKEY to DLV, key changes are now constained by DLV/ 
> > zone
> > 	  relationship and associated TTLs.
> 
> Which DLV?  Does everyone have to agree to use only 1?

	You can publish in multiple DLV's. 
 
> > 	* publish the DNSKEYs via HTTP and provide the roll over mechanism  
> > details.
> 
> How does any given resolver learn of your zone's web page?

	This is where scraping could be useful.  It gives you a *hint* to
	look for published trust-anchors. 

> > 	* publish the DNSKEYs in the newspaper and provide the roll over  
> > mechanism
> > 	  details.
> 
> ibid.
> 
> >
> > 	* publish the DNSKEYs via a TAR, key changes are now constained by  
> > the TAR's
> > 	  refresh policies.
> 
> I'll refrain from discussing things that don't exist yet.

	Except they do.

	For my zones I publish in the parent and in ISC's DLV
	depending apon whether the parent is signed or not.  For
	those parents that arn't signed I'm encouraging them to get
	signed.  I don't publish on the web.

	Mark
 
> Eric
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: Mark_Andrews at isc.org



More information about the dns-operations mailing list