On 9/30/21 2:42 PM, Viktor Dukhovni wrote:
On 30 Sep 2021, at 2:00 pm, Peter van Dijk <[email protected]> wrote:

Judging from dnsviz, a DS was present in the .com zone for slack.com
around 15:25 UTC today, and records inside slack.com were correctly
signed with the related KSK/ZSK set.

In more detail, it sure looks like they may have deployed their DS RRSet
prematurely for the first time today (with the domain initially signed and
working at that time) and then made the mistake of quickly yanking the DS
records.  I see no prior history in the DNSSEC/DANE survey data of DS
records for slack.com.

As you probably realize, but others may not, yanking the DS records per se didn't kill them; it was the fact that they yanked the DS records *and* made the mistake of pulling their DNSKEY and RRSIG records from their zone.

Given that there are still reports of resolvers out there with cached DS records, has anyone who may be in contact with the Slack admins advised them to bring back the DNSKEY records and RRSIGs without bringing back the DS records? Once the negative cache ttl expires (5 min according to the SOA minimum), people will start resolving and validating stuff again, rather than having to force-flush or wait for the 24 hour DS TTL to expire. (By my calculation, we still have 17 hours to go, vs. 5 minutes.)

michael

_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Reply via email to