[Opendnssec-develop] Questions unanswered

Jakob Schlyter jakob at kirei.se
Wed Jan 14 22:29:39 UTC 2009


On 14 jan 2009, at 16.07, Matthijs Mekking wrote:

> Question 1 is based on the assumption that the Signer Engine is
> responsible for re-signing. It is actually not a real question, but a
> remark: The Signer Engine determines the inception and expiration  
> times
> on signatures given the refresh interval value it retrieved from KASP,
> right?

correct, altough the signer engine receives configuration data form  
the kasp enforcer. the actual configuration data is calculated from  
the KASP (i.e. the policy), but you know that.


> Question 2: What's the difference between zone resigning interval and
> signature refresh interval? Imho, they are the same, but described  
> differently.

no, they are not quite the same. for some applications (like we do  
for .se today) we want to run the a signer pass (the resigning  
interval). in that case the resigning interval is simply what we would  
have put in cron (.se will resign once every 2 hours, but will keep  
signatures that are within the refresh window).


> Question 4: What is meant with signature jitter and clockskew? Does  
> this
> affect the zone content? If so, in what way?

jitter is used to tween the signature lifetimes in order to distribute  
signature expiration times. from the BIND docs (which I wrote):

            When signing a zone with a fixed signature lifetime, all  
RRSIG
            records issued at the time of signing expires  
simultaneously. If
            the zone is incrementally signed, i.e. a previously-signed  
zone is
            passed as input to the signer, all expired signatures have  
to be
            regenerated at about the same time. The jitter option  
specifies a
            jitter window that will be used to randomize the signature  
expire
            time, thus spreading incremental signature regeneration  
over time.

            Signature lifetime jitter also to some extent benefits  
validators
            and servers by spreading out cache expiration, i.e. if large
            numbers of RRSIGs don't expire at the same time from all  
caches
            there will be less congestion than if all validators need to
            refetch at mostly the same time.


> And an extra question: Why should KASP store the TTL for NSECs.

yes.

> Shouldn't these be derived from the SOA's minimum field for negative
> caching?

could be, but you might want to tweek those more specific I guess.


	jakob




More information about the Opendnssec-develop mailing list