2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-31 22:45:39 +00:00
This commit is contained in:
Mark Andrews
2002-07-02 23:41:24 +00:00
parent 7fd9fd9e4c
commit 6b82bb6ab6

View File

@@ -5,8 +5,8 @@
DNSEXT Working Group Olafur Gudmundsson DNSEXT Working Group Olafur Gudmundsson
INTERNET-DRAFT March 2002 INTERNET-DRAFT June 2002
<draft-ietf-dnsext-delegation-signer-06.txt> <draft-ietf-dnsext-delegation-signer-08.txt>
Updates: RFC 1035, RFC 2535, RFC 3008, RFC 3090. Updates: RFC 1035, RFC 2535, RFC 3008, RFC 3090.
@@ -38,7 +38,7 @@ Status of this Memo
Comments should be sent to the authors or the DNSEXT WG mailing list Comments should be sent to the authors or the DNSEXT WG mailing list
namedroppers@ops.ietf.org namedroppers@ops.ietf.org
This draft expires on September 1, 2002. This draft expires on December 30, 2002.
Copyright Notice Copyright Notice
@@ -56,9 +56,9 @@ Abstract
Gudmundsson Expires August 2002 [Page 1] Gudmundsson Expires December 2002 [Page 1]
INTERNET-DRAFT Delegation Signer Record March 2002 INTERNET-DRAFT Delegation Signer Record June 2002
operational considerations. The intent is to use this resource record operational considerations. The intent is to use this resource record
@@ -113,24 +113,25 @@ INTERNET-DRAFT Delegation Signer Record March 2002
Gudmundsson Expires August 2002 [Page 2] Gudmundsson Expires December 2002 [Page 2]
INTERNET-DRAFT Delegation Signer Record March 2002 INTERNET-DRAFT Delegation Signer Record June 2002
Another complication of the DNSSEC key model is that the KEY record Another complication of the DNSSEC key model is that the KEY record
can be used to store public keys for other protocols in addition to can be used to store public keys for other protocols in addition to
DNSSEC keys. There are number of potential problems with this, DNSSEC keys. There are number of potential problems with this,
including: including:
1. The KEY RRset can become quite large if many applications and 1. The KEY RRset can become quite large if many applications and
protocols store their keys at the zone apex. Possible protocols are protocols store their keys at the zone apex. Possible protocols
IPSEC, HTTP, SMTP, SSH and others that use public key cryptography. are IPSEC, HTTP, SMTP, SSH and others that use public key
2. The KEY RRset may require frequent updates. cryptography.
3. The probability of compromised or lost keys, which trigger 2. The KEY RRset may require frequent updates.
emergency key rollover procedures, increases. 3. The probability of compromised or lost keys, which trigger
4. The parent may refuse sign KEY RRsets with non-DNSSEC zone keys. emergency key rollover procedures, increases.
5. The parent may not meet the child's expectations in turnaround 4. The parent may refuse sign KEY RRsets with non-DNSSEC zone keys.
time for resigning the KEY RRset. 5. The parent may not meet the child's expectations in turnaround
time for resigning the KEY RRset.
Given these and other reasons, there is good reason to explore Given these and other reasons, there is good reason to explore
alternatives to using only KEY records to create a chain of trust. alternatives to using only KEY records to create a chain of trust.
@@ -152,7 +153,10 @@ INTERNET-DRAFT Delegation Signer Record March 2002
"RECOMMENDED", "SHOULD", and "SHOULD NOT" in this document are to be "RECOMMENDED", "SHOULD", and "SHOULD NOT" in this document are to be
interpreted as described in RFC2119. interpreted as described in RFC2119.
2 DS (Delegation KEY Signer) 2 Specification of the Delegation key Signer
This section defines the Delegation Signer (DS) RR type and the
changes to DNS to accommodate it.
2.1 Delegation Signer Record Model 2.1 Delegation Signer Record Model
@@ -163,18 +167,18 @@ INTERNET-DRAFT Delegation Signer Record March 2002
The chain of trust is now established by verifying the parent KEY The chain of trust is now established by verifying the parent KEY
RRset, the DS RRset from the parent and the KEY RRset at the child. RRset, the DS RRset from the parent and the KEY RRset at the child.
Gudmundsson Expires December 2002 [Page 3]
INTERNET-DRAFT Delegation Signer Record June 2002
This is cryptographically equivalent to using just KEY records. This is cryptographically equivalent to using just KEY records.
Communication between the parent and child is greatly reduced, since Communication between the parent and child is greatly reduced, since
the child only needs to notify the parent about changes in keys that the child only needs to notify the parent about changes in keys that
Gudmundsson Expires August 2002 [Page 3]
INTERNET-DRAFT Delegation Signer Record March 2002
sign its apex KEY RRset. The parent is ignorant of all other keys in sign its apex KEY RRset. The parent is ignorant of all other keys in
the child's apex KEY RRset. Furthermore, the child maintains full the child's apex KEY RRset. Furthermore, the child maintains full
control over the apex KEY RRset and its content. The child can control over the apex KEY RRset and its content. The child can
@@ -185,11 +189,11 @@ INTERNET-DRAFT Delegation Signer Record March 2002
to sign only its apex KEY RRset and other keys to sign the other to sign only its apex KEY RRset and other keys to sign the other
RRsets in the zone. RRsets in the zone.
This model fits well with a slow rollout of DNSSEC and the islands of This model fits well with a slow roll out of DNSSEC and the islands
security model. In this model, someone who trusts "good.example." can of security model. In this model, someone who trusts "good.example."
preconfigure a key from "good.example." as a trusted key, and from can preconfigure a key from "good.example." as a trusted key, and
then on trusts any data signed by that key or that has a chain of from then on trusts any data signed by that key or that has a chain
trust to that key. If "example." starts advertising DS records, of trust to that key. If "example." starts advertising DS records,
"good.example." does not have to change operations by suspending "good.example." does not have to change operations by suspending
self-signing. DS records can also be used to identify trusted keys self-signing. DS records can also be used to identify trusted keys
instead of KEY records. Another significant advantage is that the instead of KEY records. Another significant advantage is that the
@@ -206,32 +210,33 @@ INTERNET-DRAFT Delegation Signer Record March 2002
2.2 Protocol Change 2.2 Protocol Change
All DNS servers and resolvers that support DS MUST support the OK bit All DNS servers and resolvers that support DS MUST support the OK bit
[RFC3225] and a larger message size [RFC3226]. Each secure [RFC3225] and a larger message size [RFC3226]. In order for a
delegation in a secure zone MUST contain a DS RRset. If a query delegation to be considered secure the delegation MUST contain a DS
contains the OK bit, a server returning a referral for the delegation RRset. If a query contains the OK bit, a server returning a referral
MUST include the following RRsets in the authority section in this for the delegation MUST include the following RRsets in the authority
order: section in this order:
parent NS parent NS RRset
DS and SIG(DS) (if present) DS and SIG(DS) (if DS is present)
parent NXT and SIG(parent NXT) parent NXT and SIG(NXT) (If no DS)
This increases the size of referral messages and may cause some or This increases the size of referral messages and may cause some or
all glue to be omitted. If the DS or NXT RRsets or their signatures all glue to be omitted. If the DS or NXT RRsets with signatures do
do not fit in the DNS message, the TC bit MUST be set. Additional not fit in the DNS message, the TC bit MUST be set. Additional
section processing is not changed. section processing is not changed.
Gudmundsson Expires December 2002 [Page 4]
INTERNET-DRAFT Delegation Signer Record June 2002
A DS RRset accompanying an NS RRset indicates that the child zone is A DS RRset accompanying an NS RRset indicates that the child zone is
secure. If an NS RRset exists without a DS RRset, the child zone is secure. If an NS RRset exists without a DS RRset, the child zone is
unsecure. DS RRsets MUST NOT appear at non-delegation points or at a unsecure. DS RRsets MUST NOT appear at non-delegation points or at a
zone's apex. zone's apex.
Gudmundsson Expires August 2002 [Page 4]
INTERNET-DRAFT Delegation Signer Record March 2002
The following section 2.2.1 replaces RFC2535 sections 2.3.4 and 3.4, The following section 2.2.1 replaces RFC2535 sections 2.3.4 and 3.4,
section 2.2.2 replaces RFC3008 section 2.7, and RFC3090 updates are section 2.2.2 replaces RFC3008 section 2.7, and RFC3090 updates are
in section 2.2.3. in section 2.2.3.
@@ -250,47 +255,41 @@ INTERNET-DRAFT Delegation Signer Record March 2002
since one server could be serving both the zone above and below a since one server could be serving both the zone above and below a
delegation point [RFC 2181]. delegation point [RFC 2181].
For every secure delegation there MUST be a DS RRset stored in the Each DS RRset stored in the parent zone MUST be signed by one of the
parent zone signed by the parent zone's private key. The parent zone parent zone's private key. The parent zone MUST NOT contain a KEY
MUST NOT contain a KEY RRset at any delegation points. Delegations in RRset at any delegation point. Delegations in the parent MAY contain
the parent MAY contain only the following RR types: NS, DS, NXT and only the following RR types: NS, DS, NXT and SIG. The NS RRset MUST
SIG. The NS RRset MUST NOT be signed. The NXT RRset is the NOT be signed. The NXT RRset is the exceptional case: it will always
exceptional case: it will always appear differently and appear differently and authoritatively in both the parent and child
authoritatively in both the parent and child zones if both are zones if both are secure.
secure.
A secure zones MUST contain a self-signed KEY RRset at its apex. A secure zone MUST contain a self-signed KEY RRset at its apex. Upon
Upon verifying the DS RRset from the parent, a resolver MAY trust any verifying the DS RRset from the parent, a resolver MAY trust any KEY
KEY identified in the DS RRset as a valid signer of the child's apex identified in the DS RRset as a valid signer of the child's apex KEY
KEY RRset. Resolvers configured to trust one of the keys signing the RRset. Resolvers configured to trust one of the keys signing the KEY
KEY RRset MAY now treat any data signed by the zone keys in the KEY RRset MAY now treat any data signed by the zone keys in the KEY RRset
RRset as secure. In all other cases resolvers MUST consider the zone as secure. In all other cases resolvers MUST consider the zone
unsecure. A DS RRset MUST NOT appear at a zone's apex. unsecure. A DS RRset MUST NOT appear at a zone's apex.
An authoritative server queried for type DS MUST return the DS RRset An authoritative server queried for type DS MUST return the DS RRset
in the answer section along with the corresponding NXT RRset in the in the answer section.
authority section. If the server is authoritative for both parent
and child zones, the answer MUST be from the parent. A caching
server MUST behave the same way, returning the DS RRset and the
parent's NXT RRset, if records are available.
2.2.2 Signer's Name (replaces RFC3008 section 2.7) 2.2.2 Signer's Name (replaces RFC3008 section 2.7)
The signer's name field of a data SIG MUST contain the name of the The signer's name field of a SIG RR MUST contain the name of the zone
zone to which the data and signature belong. The combination of to which the data and signature belong. The combination of signer's
signer's name, key tag, and algorithm MUST identify a zone key if the name, key tag, and algorithm MUST identify a zone key if the SIG is
SIG is to be considered material. This document defines a standard to be considered material. This document defines a standard policy
Gudmundsson Expires August 2002 [Page 5] Gudmundsson Expires December 2002 [Page 5]
INTERNET-DRAFT Delegation Signer Record March 2002 INTERNET-DRAFT Delegation Signer Record June 2002
policy for DNSSEC validation; local policy may override the standard for DNSSEC validation; local policy may override the standard policy.
policy.
There are no restrictions on the signer field of a SIG(0) record. There are no restrictions on the signer field of a SIG(0) record.
The combination of signer's name, key tag, and algorithm MUST The combination of signer's name, key tag, and algorithm MUST
@@ -338,15 +337,15 @@ INTERNET-DRAFT Delegation Signer Record March 2002
Over the years there have been various discussions surrounding the Over the years there have been various discussions surrounding the
DNS delegation model, declaring it to be broken because there is no DNS delegation model, declaring it to be broken because there is no
good way to assert if a delegation exists. In the RFC2535 version of good way to assert if a delegation exists. In the RFC2535 version of
Gudmundsson Expires August 2002 [Page 6]
INTERNET-DRAFT Delegation Signer Record March 2002
DNSSEC, the presence of the NS bit in the NXT bit map proves there is DNSSEC, the presence of the NS bit in the NXT bit map proves there is
Gudmundsson Expires December 2002 [Page 6]
INTERNET-DRAFT Delegation Signer Record June 2002
a delegation at this name. Something more explicit is needed and the a delegation at this name. Something more explicit is needed and the
DS record addresses this need for secure delegations. DS record addresses this need for secure delegations.
@@ -355,9 +354,9 @@ INTERNET-DRAFT Delegation Signer Record March 2002
it will cause interoperability problems and requires a flag day for it will cause interoperability problems and requires a flag day for
DNSSEC. Many old servers and resolvers MUST be upgraded to take DNSSEC. Many old servers and resolvers MUST be upgraded to take
advantage of DS. Some old servers will be able to be authoritative advantage of DS. Some old servers will be able to be authoritative
for zones with DS records but will not add the NXT and DS records to for zones with DS records but will not add the NXT or DS records to
the authority section. The same is true for caching servers; in the authority section. The same is true for caching servers; in
fact, some may even refuse to pass on the DS and NXT records. fact, some may even refuse to pass on the DS or NXT records.
2.4 Wire Format of the DS record 2.4 Wire Format of the DS record
@@ -387,22 +386,26 @@ INTERNET-DRAFT Delegation Signer Record March 2002
MUST be allowed to sign DNS data. The digest type is an identifier MUST be allowed to sign DNS data. The digest type is an identifier
for the digest algorithm used. The digest is calculated over the for the digest algorithm used. The digest is calculated over the
canonical name of the delegated domain name followed by the whole canonical name of the delegated domain name followed by the whole
RDATA of the KEY record. RDATA of the KEY record (all four fields).
digest = hash( canonical FQDN on KEY RR | KEY_RR_rdata)
KEY_RR_rdata = Flags | Protocol | Algorithm | Public Key
Digest type value 0 is reserved, value 1 is SHA-1, and reserving Digest type value 0 is reserved, value 1 is SHA-1, and reserving
other types requires IETF standards action. For interoperability other types requires IETF standards action. For interoperability
reasons, as few digest algorithms as possible should be reserved. The reasons, as few digest algorithms as possible should be reserved. The
Gudmundsson Expires December 2002 [Page 7]
INTERNET-DRAFT Delegation Signer Record June 2002
only reason to reserve additional digest types is to increase only reason to reserve additional digest types is to increase
security. security.
Gudmundsson Expires August 2002 [Page 7]
INTERNET-DRAFT Delegation Signer Record March 2002
DS records MUST point to zone KEY records that are allowed to DS records MUST point to zone KEY records that are allowed to
authenticate DNS data. The indicated KEY record's protocol field authenticate DNS data. The indicated KEY record's protocol field
MUST be set to 3; flag field bits 0 and 6 MUST be set to 0; bit 7 MUST be set to 3; flag field bits 0 and 6 MUST be set to 0; bit 7
@@ -410,7 +413,7 @@ INTERNET-DRAFT Delegation Signer Record March 2002
purposes of this document. purposes of this document.
The size of the DS RDATA for type 1 (SHA-1) is 24 bytes, regardless The size of the DS RDATA for type 1 (SHA-1) is 24 bytes, regardless
of key size. of key size, new digest types probably will have larger digests.
2.4.1 Justifications for Fields 2.4.1 Justifications for Fields
@@ -418,11 +421,11 @@ INTERNET-DRAFT Delegation Signer Record March 2002
quickly identify the candidate KEY records to examine. SHA-1 is a quickly identify the candidate KEY records to examine. SHA-1 is a
strong cryptographic checksum: it is computationally infeasible for strong cryptographic checksum: it is computationally infeasible for
an attacker to generate a KEY record that has the same SHA-1 digest. an attacker to generate a KEY record that has the same SHA-1 digest.
Combining the name of the key and the key data as input to the digest Combining the name of the key and the key rdata as input to the
provides stronger assurance of the binding. Having the key tag in digest provides stronger assurance of the binding. Having the key
the DS record adds greater assurance than the SHA-1 digest alone, as tag in the DS record adds greater assurance than the SHA-1 digest
there are now two different mapping functions that a KEY RR must alone, as there are now two different mapping functions that a KEY RR
match. must match.
This format allows concise representation of the keys that the child This format allows concise representation of the keys that the child
will use, thus keeping down the size of the answer for the will use, thus keeping down the size of the answer for the
@@ -439,7 +442,7 @@ INTERNET-DRAFT Delegation Signer Record March 2002
The presentation format of the DS record consists of three numbers The presentation format of the DS record consists of three numbers
(key tag, algorithm and digest type) followed by the digest itself (key tag, algorithm and digest type) followed by the digest itself
presented in hex: presented in hex:
foo.example. DS 12345 3 1 123456789abcdef67890 example. DS 12345 3 1 123456789abcdef67890123456789abcdef67890
2.6 Transition Issues for Installed Base 2.6 Transition Issues for Installed Base
@@ -449,17 +452,17 @@ INTERNET-DRAFT Delegation Signer Record March 2002
delegations are locally secure. This is bad, but the DNSEXT Working delegations are locally secure. This is bad, but the DNSEXT Working
Group has determined that rather than dealing with both Group has determined that rather than dealing with both
RFC2535-secured zones and DS-secured zones, a rapid adoption of DS is RFC2535-secured zones and DS-secured zones, a rapid adoption of DS is
Gudmundsson Expires December 2002 [Page 8]
INTERNET-DRAFT Delegation Signer Record June 2002
preferable. Thus the only option for early adopters is to upgrade to preferable. Thus the only option for early adopters is to upgrade to
DS as soon as possible. DS as soon as possible.
Gudmundsson Expires August 2002 [Page 8]
INTERNET-DRAFT Delegation Signer Record March 2002
2.6.1 Backwards compatibility with RFC2535 and RFC1035 2.6.1 Backwards compatibility with RFC2535 and RFC1035
This section documents how a resolver determines the type of This section documents how a resolver determines the type of
@@ -476,9 +479,9 @@ INTERNET-DRAFT Delegation Signer Record March 2002
NXT bit map contains: NS SIG KEY NXT NXT bit map contains: NS SIG KEY NXT
KEY must be a NULL key. KEY must be a NULL key.
DS has the following two states: DNSSEC with DS has the following two states:
Secure DS: NS + DS + SIG(DS) + NXT + SIG(NXT) Secure DS: NS + DS + SIG(DS)
NXT bit map contains: NS SIG NXT DS NXT bit map contains: NS SIG NXT DS
Unsecure DS: NS + NXT + SIG(NXT) Unsecure DS: NS + NXT + SIG(NXT)
NXT bit map contains: NS SIG NXT NXT bit map contains: NS SIG NXT
@@ -497,57 +500,56 @@ INTERNET-DRAFT Delegation Signer Record March 2002
document obsoletes the NULL KEY in parent zones, which is a difficult document obsoletes the NULL KEY in parent zones, which is a difficult
enough change that a flag day is required. enough change that a flag day is required.
2.7 KEY and corresponding DS record example
This is a example of a KEY record and corresponding DS record.
dskey.example. KEY 256 3 1 (
AQPwHb4UL1U9RHaU8qP+Ts5bVOU1s7fYbj2b3CCbzNdj
4+/ECd18yKiyUQqKqQFWW5T3iVc8SJOKnueJHt/Jb/wt
) ; key id = 28668
DS 28668 1 1 49FD46E6C4B45C55D4AC69CBD3CD34AC1AFE51DE
Gudmundsson Expires December 2002 [Page 9]
Gudmundsson Expires August 2002 [Page 9]
INTERNET-DRAFT Delegation Signer Record March 2002 INTERNET-DRAFT Delegation Signer Record June 2002
3 Resolver Example 3 Resolver
3.1 DS Example
To create a chain of trust, a resolver goes from trusted KEY to DS to To create a chain of trust, a resolver goes from trusted KEY to DS to
KEY. KEY.
Assume the key for domain "example." is trusted. Zone "example." Assume the key for domain "example." is trusted. Zone "example."
contains at least the following records: contains at least the following records:
example. SOA <soa stuff> example. SOA <soa stuff>
example. NS ns.example. example. NS ns.example.
example. KEY <stuff> example. KEY <stuff>
example. NXT NS SOA KEY SIG NXT example. NXT NS SOA KEY SIG NXT secure.example.
example. SIG(SOA) example. SIG(SOA)
example. SIG(NS) example. SIG(NS)
example. SIG(NXT) example. SIG(NXT)
example. SIG(KEY) example. SIG(KEY)
secure.example. NS ns1.secure.example. secure.example. NS ns1.secure.example.
secure.example. DS tag=10243 alg=3 digest_type=1 <foofoo> secure.example. DS tag=12345 alg=3 digest_type=1 <foofoo>
secure.example. NXT NS SIG NXT DS unsecure.example. secure.example. NXT NS SIG NXT DS unsecure.example.
secure.example. SIG(NXT) secure.example. SIG(NXT)
secure.example. SIG(DS) secure.example. SIG(DS)
unsecure.example NS ns1.unsecure.example. unsecure.example NS ns1.unsecure.example.
unsecure.example. NXT NS SIG NXT .example. unsecure.example. NXT NS SIG NXT example.
unsecure.example. SIG(NXT) unsecure.example. SIG(NXT)
In zone "secure.example." following records exist: In zone "secure.example." following records exist:
secure.example. SOA <soa stuff> secure.example. SOA <soa stuff>
secure.example. NS ns1.secure.example. secure.example. NS ns1.secure.example.
secure.example. KEY <tag=12345 alg=3> secure.example. KEY <tag=12345 alg=3>
secure.example. SIG(KEY) <key-tag=12345 alg=3> secure.example. SIG(KEY) <key-tag=12345 alg=3>
secure.example. SIG(SOA) <key-tag=12345 alg=3> secure.example. SIG(SOA) <key-tag=12345 alg=3>
secure.example. SIG(NS) <key-tag=12345 alg=5> secure.example. SIG(NS) <key-tag=12345 alg=5>
In this example the private key for "example." signs the DS record In this example the private key for "example." signs the DS record
for "secure.example.", making that a secure delegation. The DS record for "secure.example.", making that a secure delegation. The DS record
@@ -567,11 +569,9 @@ INTERNET-DRAFT Delegation Signer Record March 2002
Gudmundsson Expires December 2002 [Page 10]
Gudmundsson Expires August 2002 [Page 10]
INTERNET-DRAFT Delegation Signer Record March 2002 INTERNET-DRAFT Delegation Signer Record June 2002
3.1 Resolver Cost Estimates for DS Records 3.1 Resolver Cost Estimates for DS Records
@@ -607,10 +607,14 @@ INTERNET-DRAFT Delegation Signer Record March 2002
local control over its own KEY RRset. local control over its own KEY RRset.
There is a remote possibility that an attacker could generate a valid There is a remote possibility that an attacker could generate a valid
KEY that matches all the DS fields and thus forge data from the KEY that matches all the DS fields, of a specific DS set, and thus
child. This possibility is considered impractical, as on average more forge data from the child. This possibility is considered
than 2^80 keys would have to be generated before a match would be impractical, as on average more than
found. 2 ^ (160 - <Number of keys in DS set>)
keys would have to be generated before a match would be found.
An attacker that wants to match any DS record will have to generate
on average at least 2^80 keys.
The DS record represents a change to the DNSSEC protocol and there is The DS record represents a change to the DNSSEC protocol and there is
an installed base of implementations, as well as textbooks on how to an installed base of implementations, as well as textbooks on how to
@@ -622,38 +626,36 @@ INTERNET-DRAFT Delegation Signer Record March 2002
Gudmundsson Expires December 2002 [Page 11]
Gudmundsson Expires August 2002 [Page 11]
INTERNET-DRAFT Delegation Signer Record March 2002 INTERNET-DRAFT Delegation Signer Record June 2002
5 IANA Considerations: 5 IANA Considerations:
IANA needs to allocate an RR type code for DS from the standard RR IANA needs to allocate an RR type code for DS from the standard RR
type space. type space (type 43 requested).
IANA needs to open a new registry for the DS type for digest IANA needs to open a new registry for the DS RR type for digest
algorithms. Defined types are: 0 is Reserved, 1 is SHA-1. Adding new algorithms. Defined types are:
reservations requires IETF standards action. 0 is Reserved,
1 is SHA-1.
Adding new reservations requires IETF standards action.
4 Acknowledgments 6 Acknowledgments
Over the last few years a number of people have contributed ideas Over the last few years a number of people have contributed ideas
that are captured in this document. The core idea of using one key to that are captured in this document. The core idea of using one key to
sign only the KEY RRset comes from discussions with Bill Manning and sign only the KEY RRset comes from discussions with Bill Manning and
Perry Metzger on how to put in a single root key in all resolvers. Perry Metzger on how to put in a single root key in all resolvers.
Alexis Yushin, Brian Wellington, Paul Vixie, Jakob Schlyter, Scott Alexis Yushin, Brian Wellington, Paul Vixie, Jakob Schlyter, Scott
Rosen, Edward Lewis, Lars-Johan Liman, Matt Larson, Mark Kosters, Dan Rose, Edward Lewis, Lars-Johan Liman, Matt Larson, Mark Kosters, Dan
Massey, Olaf Kolman, Phillip Hallam-Baker, Miek Gieben, Havard Massey, Olaf Kolman, Phillip Hallam-Baker, Miek Gieben, Havard
Eidnes, Donald Eastlake 3rd., Randy Bush, David Blacka, Steve Eidnes, Donald Eastlake 3rd., Randy Bush, David Blacka, Steve
Bellovin, Rob Austein, Derek Atkins, Roy Arends, Harald Alvestrand, Bellovin, Rob Austein, Derek Atkins, Roy Arends, Harald Alvestrand,
and others have provided useful comments. and others have provided useful comments.
References: Normative References:
[RFC1035] P. Mockapetris, ``Domain Names - Implementation and [RFC1035] P. Mockapetris, ``Domain Names - Implementation and
Specification'', STD 13, RFC 1035, November 1987. Specification'', STD 13, RFC 1035, November 1987.
@@ -681,11 +683,9 @@ References:
Gudmundsson Expires December 2002 [Page 12]
Gudmundsson Expires August 2002 [Page 12]
INTERNET-DRAFT Delegation Signer Record March 2002 INTERNET-DRAFT Delegation Signer Record June 2002
Author Address Author Address
@@ -696,63 +696,6 @@ Author Address
USA USA
<ogud@ogud.com> <ogud@ogud.com>
Appendix A: Changes from Prior versions
Changes from version 05
Major wording changes for clarity contributed by Matt Larson.
Added explicit rule that query for type DS MUST be answered from the
upper side of delegation.
Changes from version 04
Reworded document to obsolete RFC2535 chain of trust, no backwards
compatibility. Require DS and NXT records in referrals in authority
section. Removed the NODS bit.
Added the requirement for OK bit and Message size.
Rewrote Abstract to better express what is in the document.
Removed size field from examples and simplified them.
Changes from version 03
Added strict rules on what KEY records can be pointed to by DS.
Changes from version 02
Added text outlawing DS at non delegations.
Added table showing the contents of DS, SIG@child, and RFC1034
delegations.
Added the NODS type/bit definition to distinguish insecure DS
delegation from secure SIG@child one.
Added the requirement that NXT be returned with referral answers.
Minor text edits.
Changes from version 01
Deleted KEY size field as it did not contribute anything but
complexity.
Number of wordsmith changes to make document more readable.
The word CAN was used when SHOULD was intended.
Deleted section 2.4 "Justifications for compact format" moved
relevant text to section 2.2.
Reverse alphabetized the acknowledgments section.
Reorganized sections 1 and 2 for readability.
Gudmundsson Expires August 2002 [Page 13]
INTERNET-DRAFT Delegation Signer Record March 2002
Changes from version 00
Changed name from DK to DS based on working group comments.
Dropped verbose format based on WG comments.
Added text about TTL issue/problem in caching servers.
Added text about islands of security and clarified the cost impact.
Major editing of arguments and some reordering of text for clarity.
Added section on transition issues.
Full Copyright Statement Full Copyright Statement
Copyright (C) The Internet Society (2002). All Rights Reserved. Copyright (C) The Internet Society (2002). All Rights Reserved.
@@ -797,4 +740,4 @@ Full Copyright Statement
Gudmundsson Expires August 2002 [Page 14] Gudmundsson Expires December 2002 [Page 13]