I didn't think this could get worse.  I was wrong.

I can't support any version of this document for publication.   In the same way that activeRefreshOffset is a nonsensical value so to are  driftSafetyMargin and timingSafetyMargin.

1) Drift happens per query.
2) Any drift that happens related to the multiple queries in the addHoldDown interval can safely be ignored with respect to its impact on the overall wait time for the publisher.  (e.g. all the drift is going to do is change the phase of the last query in the interval with respect to the end of the addHoldDown time) 3) The only other drift that may be of interest is the drift at the beginning and end of the queryInterval where the end of the interval is the beginning of the addHoldDown interval. Given that a typical drift is something like 1-60 seconds it can safely be ignored related to all the other stuff.

Timing safety margin is based on the nonsensical driftSafetyMargin and activeRefreshOffset and is then by definition also nonsensical.

(And yes, I realize that Wes has set driftSafetyMargin to activeRefresh meaning that calculated results are identical to what I want, but there's no analysis that supports the use of a driftSafetyMargin and this just seems to be sleight of hand to replace activeRefreshOffset with a term that has a value activeRefresh... *pounds head against wall*)

Please delete 6.1.6, 6.,1.7 and 6.1.8 and fix the formulas accordingly.


Again:

addWaitClockTime = lastSigExpirationTime + activeRefresh + addHoldDownTime + activeRefresh + safetyMargin (which now seems to be labeled retrySafetyMargin).


Mike



On 12/19/2017 1:49 PM, [email protected] wrote:
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Domain Name System Operations WG of the IETF.

         Title           : Security Considerations for RFC5011 Publishers
         Authors         : Wes Hardaker
                           Warren Kumari
        Filename        : 
draft-ietf-dnsop-rfc5011-security-considerations-10.txt
        Pages           : 19
        Date            : 2017-12-19

Abstract:
    This document extends the RFC5011 rollover strategy with timing
    advice that must be followed by the publisher in order to maintain
    security.  Specifically, this document describes the math behind the
    minimum time-length that a DNS zone publisher must wait before
    signing exclusively with recently added DNSKEYs.  This document also
    describes the minimum time-length that a DNS zone publisher must wait
    after publishing a revoked DNSKEY before assuming that all active
    RFC5011 resolvers should have seen the revocation-marked key and
    removed it from their list of trust anchors.

    This document contains much math and complicated equations, but the
    summary is that the key rollover / revocation time is much longer
    than intuition would suggest.  If you are not both publishing a
    DNSSEC DNSKEY, and using RFC5011 to advertise this DNSKEY as a new
    Secure Entry Point key for use as a trust anchor, you probably don't
    need to read this document.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-rfc5011-security-considerations/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-dnsop-rfc5011-security-considerations-10
https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-rfc5011-security-considerations-10

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-rfc5011-security-considerations-10


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop


_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to