<tt><font size=2>Ray.Bellis@nominet.org.uk wrote on 19/10/2009 11:34:13:<br>
<br>
> > Hi Ray, <br>
> > <br>
> > Where do modern implementations get their 'default TTL' value
from <br>
> > if the per record TTL and TTL directives are omitted? <br>
> <br>
> Damned good question. RFC 2308 appears to be silent on that
issue, except to say: <br>
> <br>
> "Where a server does not require RRs to include the TTL value
explicitly, it <br>
> should provide a mechanism, ** not being the value of the MINIMUM
field of the<br>
> SOA record **, from which the missing TTL values are obtained."
(my emphasis). <br>
> <br>
> Ray <br>
</font></tt>
<br><tt><font size=2>Two options:</font></tt>
<br>
<br><tt><font size=2>1) Add an entry in the policy configuration file to
specify a default TTL. (This fits in with the idea of "providing a
mechanism from which the missing TTL values are obtained".)</font></tt>
<br>
<br><tt><font size=2>2) Flag it as an error. If a user is telling
OpenDNSSEC to sign a zone and hasn't specified a TTL, and OpenDNSSEC doesn't
allow a default TTL to be specified, how can the user expect to get anything
other than a random value?</font></tt>
<br>
<br><tt><font size=2>Although my gut instinct is to go for (2), I think
(1) might be more acceptable, especially in the case of thousands of zones
all being signed using the same policy.</font></tt>
<br>
<br><tt><font size=2>Stephen</font></tt>