mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-30 14:07:59 +00:00
new draft
This commit is contained in:
@@ -4,11 +4,11 @@
|
|||||||
|
|
||||||
Network Working Group M. StJohns
|
Network Working Group M. StJohns
|
||||||
Internet-Draft Nominum, Inc.
|
Internet-Draft Nominum, Inc.
|
||||||
Expires: February 16, 2006 August 15, 2005
|
Expires: July 14, 2006 January 10, 2006
|
||||||
|
|
||||||
|
|
||||||
Automated Updates of DNSSEC Trust Anchors
|
Automated Updates of DNSSEC Trust Anchors
|
||||||
draft-ietf-dnsext-trustupdate-timers-01
|
draft-ietf-dnsext-trustupdate-timers-02
|
||||||
|
|
||||||
Status of this Memo
|
Status of this Memo
|
||||||
|
|
||||||
@@ -33,11 +33,11 @@ Status of this Memo
|
|||||||
The list of Internet-Draft Shadow Directories can be accessed at
|
The list of Internet-Draft Shadow Directories can be accessed at
|
||||||
http://www.ietf.org/shadow.html.
|
http://www.ietf.org/shadow.html.
|
||||||
|
|
||||||
This Internet-Draft will expire on February 16, 2006.
|
This Internet-Draft will expire on July 14, 2006.
|
||||||
|
|
||||||
Copyright Notice
|
Copyright Notice
|
||||||
|
|
||||||
Copyright (C) The Internet Society (2005).
|
Copyright (C) The Internet Society (2006).
|
||||||
|
|
||||||
Abstract
|
Abstract
|
||||||
|
|
||||||
@@ -53,45 +53,48 @@ Abstract
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
StJohns Expires February 16, 2006 [Page 1]
|
StJohns Expires July 14, 2006 [Page 1]
|
||||||
|
|
||||||
Internet-Draft trustanchor-update August 2005
|
Internet-Draft trustanchor-update January 2006
|
||||||
|
|
||||||
|
|
||||||
addition of a single flag bit to the DNSKEY record.
|
addition of a single flag bit to the DNSKEY record.
|
||||||
|
|
||||||
|
|
||||||
Table of Contents
|
Table of Contents
|
||||||
|
|
||||||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
|
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
|
||||||
1.1 Compliance Nomenclature . . . . . . . . . . . . . . . . . 3
|
1.1. Compliance Nomenclature . . . . . . . . . . . . . . . . . 3
|
||||||
1.2 Changes since -00 . . . . . . . . . . . . . . . . . . . . 3
|
1.2. Changes since -00 . . . . . . . . . . . . . . . . . . . . 3
|
||||||
2. Theory of Operation . . . . . . . . . . . . . . . . . . . . . 4
|
2. Theory of Operation . . . . . . . . . . . . . . . . . . . . . 4
|
||||||
2.1 Revocation . . . . . . . . . . . . . . . . . . . . . . . . 4
|
2.1. Revocation . . . . . . . . . . . . . . . . . . . . . . . . 4
|
||||||
2.2 Add Hold-Down . . . . . . . . . . . . . . . . . . . . . . 4
|
2.2. Add Hold-Down . . . . . . . . . . . . . . . . . . . . . . 5
|
||||||
2.3 Remove Hold-down . . . . . . . . . . . . . . . . . . . . . 5
|
2.3. Remove Hold-down . . . . . . . . . . . . . . . . . . . . . 5
|
||||||
2.4 Active Refresh . . . . . . . . . . . . . . . . . . . . . . 6
|
2.4. Active Refresh . . . . . . . . . . . . . . . . . . . . . . 6
|
||||||
2.5 Resolver Parameters . . . . . . . . . . . . . . . . . . . 6
|
2.5. Resolver Parameters . . . . . . . . . . . . . . . . . . . 6
|
||||||
2.5.1 Add Hold-Down Time . . . . . . . . . . . . . . . . . . 6
|
2.5.1. Add Hold-Down Time . . . . . . . . . . . . . . . . . . 6
|
||||||
2.5.2 Remove Hold-Down Time . . . . . . . . . . . . . . . . 6
|
2.5.2. Remove Hold-Down Time . . . . . . . . . . . . . . . . 6
|
||||||
2.5.3 Minimum Trust Anchors per Trust Point . . . . . . . . 6
|
2.5.3. Minimum Trust Anchors per Trust Point . . . . . . . . 6
|
||||||
3. Changes to DNSKEY RDATA Wire Format . . . . . . . . . . . . . 6
|
3. Changes to DNSKEY RDATA Wire Format . . . . . . . . . . . . . 6
|
||||||
4. State Table . . . . . . . . . . . . . . . . . . . . . . . . . 6
|
4. State Table . . . . . . . . . . . . . . . . . . . . . . . . . 7
|
||||||
4.1 Events . . . . . . . . . . . . . . . . . . . . . . . . . . 7
|
4.1. Events . . . . . . . . . . . . . . . . . . . . . . . . . . 7
|
||||||
4.2 States . . . . . . . . . . . . . . . . . . . . . . . . . . 7
|
4.2. States . . . . . . . . . . . . . . . . . . . . . . . . . . 8
|
||||||
|
4.3. Trust Point Deletion . . . . . . . . . . . . . . . . . . . 8
|
||||||
5. Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . 8
|
5. Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . 8
|
||||||
5.1 Adding A Trust Anchor . . . . . . . . . . . . . . . . . . 8
|
5.1. Adding A Trust Anchor . . . . . . . . . . . . . . . . . . 9
|
||||||
5.2 Deleting a Trust Anchor . . . . . . . . . . . . . . . . . 9
|
5.2. Deleting a Trust Anchor . . . . . . . . . . . . . . . . . 9
|
||||||
5.3 Key Roll-Over . . . . . . . . . . . . . . . . . . . . . . 9
|
5.3. Key Roll-Over . . . . . . . . . . . . . . . . . . . . . . 9
|
||||||
5.4 Active Key Compromised . . . . . . . . . . . . . . . . . . 9
|
5.4. Active Key Compromised . . . . . . . . . . . . . . . . . . 9
|
||||||
5.5 Stand-by Key Compromised . . . . . . . . . . . . . . . . . 9
|
5.5. Stand-by Key Compromised . . . . . . . . . . . . . . . . . 10
|
||||||
6. Security Considerations . . . . . . . . . . . . . . . . . . . 10
|
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
|
||||||
6.1 Key Ownership vs Acceptance Policy . . . . . . . . . . . . 10
|
7. Security Considerations . . . . . . . . . . . . . . . . . . . 10
|
||||||
6.2 Multiple Key Compromise . . . . . . . . . . . . . . . . . 10
|
7.1. Key Ownership vs Acceptance Policy . . . . . . . . . . . . 10
|
||||||
6.3 Dynamic Updates . . . . . . . . . . . . . . . . . . . . . 10
|
7.2. Multiple Key Compromise . . . . . . . . . . . . . . . . . 10
|
||||||
7. Normative References . . . . . . . . . . . . . . . . . . . . . 10
|
7.3. Dynamic Updates . . . . . . . . . . . . . . . . . . . . . 11
|
||||||
Editorial Comments . . . . . . . . . . . . . . . . . . . . . . 11
|
8. Normative References . . . . . . . . . . . . . . . . . . . . . 11
|
||||||
Author's Address . . . . . . . . . . . . . . . . . . . . . . . 11
|
Editorial Comments . . . . . . . . . . . . . . . . . . . . . . . .
|
||||||
Intellectual Property and Copyright Statements . . . . . . . . 12
|
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 12
|
||||||
|
Intellectual Property and Copyright Statements . . . . . . . . . . 13
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -106,12 +109,9 @@ Table of Contents
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
StJohns Expires July 14, 2006 [Page 2]
|
||||||
|
|
||||||
|
|
||||||
StJohns Expires February 16, 2006 [Page 2]
|
|
||||||
|
|
||||||
Internet-Draft trustanchor-update August 2005
|
Internet-Draft trustanchor-update January 2006
|
||||||
|
|
||||||
|
|
||||||
1. Introduction
|
1. Introduction
|
||||||
@@ -153,27 +153,32 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
document DOES NOT discuss the general problem of the initial
|
document DOES NOT discuss the general problem of the initial
|
||||||
configuration of trust anchors for the resolver.
|
configuration of trust anchors for the resolver.
|
||||||
|
|
||||||
1.1 Compliance Nomenclature
|
1.1. Compliance Nomenclature
|
||||||
|
|
||||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||||||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
||||||
document are to be interpreted as described in BCP 14, [RFC2119].
|
document are to be interpreted as described in BCP 14, [RFC2119].
|
||||||
|
|
||||||
1.2 Changes since -00
|
1.2. Changes since -00
|
||||||
|
|
||||||
Added the concept of timer triggered resolver queries to refresh the
|
Added the concept of timer triggered resolver queries to refresh the
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
StJohns Expires February 16, 2006 [Page 3]
|
StJohns Expires July 14, 2006 [Page 3]
|
||||||
|
|
||||||
Internet-Draft trustanchor-update August 2005
|
Internet-Draft trustanchor-update January 2006
|
||||||
|
|
||||||
|
|
||||||
resolvers view of the trust anchor key RRSet.
|
resolvers view of the trust anchor key RRSet.
|
||||||
|
|
||||||
Re-submitted expired draft as -01. Updated DNSSEC RFC References.
|
Re-submitted expired draft as -01. Updated DNSSEC RFC References.
|
||||||
|
|
||||||
|
Draft -02. Added the IANA Considerations section. Added text to
|
||||||
|
describe what happens if all trust anchors at a trust point are
|
||||||
|
deleted.
|
||||||
|
|
||||||
|
|
||||||
2. Theory of Operation
|
2. Theory of Operation
|
||||||
|
|
||||||
The general concept of this mechanism is that existing trust anchors
|
The general concept of this mechanism is that existing trust anchors
|
||||||
@@ -190,7 +195,7 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
compromise, an attacker could add a new key and revoke all the other
|
compromise, an attacker could add a new key and revoke all the other
|
||||||
old keys.
|
old keys.
|
||||||
|
|
||||||
2.1 Revocation
|
2.1. Revocation
|
||||||
|
|
||||||
Assume two trust anchor keys A and B. Assume that B has been
|
Assume two trust anchor keys A and B. Assume that B has been
|
||||||
compromised. Without a specific revocation bit, B could invalidate A
|
compromised. Without a specific revocation bit, B could invalidate A
|
||||||
@@ -199,13 +204,13 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
of the private key of a DNSKEY to revoke that DNSKEY.
|
of the private key of a DNSKEY to revoke that DNSKEY.
|
||||||
|
|
||||||
A key is considered revoked when the resolver sees the key in a self-
|
A key is considered revoked when the resolver sees the key in a self-
|
||||||
signed RRSet and the key has the REVOKE bit set to '1'. Once the
|
signed RRSet and the key has the REVOKE bit (see Section 6 below) set
|
||||||
resolver sees the REVOKE bit, it MUST NOT use this key as a trust
|
to '1'. Once the resolver sees the REVOKE bit, it MUST NOT use this
|
||||||
anchor or for any other purposes except validating the RRSIG over the
|
key as a trust anchor or for any other purposes except validating the
|
||||||
DNSKEY RRSet specifically for the purpose of validating the
|
RRSIG over the DNSKEY RRSet specifically for the purpose of
|
||||||
revocation. Unlike the 'Add' operation below, revocation is
|
validating the revocation. Unlike the 'Add' operation below,
|
||||||
immediate and permanent upon receipt of a valid revocation at the
|
revocation is immediate and permanent upon receipt of a valid
|
||||||
resolver.
|
revocation at the resolver.
|
||||||
|
|
||||||
N.B. A DNSKEY with the REVOKE bit set has a different fingerprint
|
N.B. A DNSKEY with the REVOKE bit set has a different fingerprint
|
||||||
than one without the bit set. This affects the matching of a DNSKEY
|
than one without the bit set. This affects the matching of a DNSKEY
|
||||||
@@ -213,19 +218,19 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
used to configure a trust point. [msj3]
|
used to configure a trust point. [msj3]
|
||||||
|
|
||||||
In the given example, the attacker could revoke B because it has
|
In the given example, the attacker could revoke B because it has
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
StJohns Expires July 14, 2006 [Page 4]
|
||||||
|
|
||||||
|
Internet-Draft trustanchor-update January 2006
|
||||||
|
|
||||||
|
|
||||||
knowledge of B's private key, but could not revoke A.
|
knowledge of B's private key, but could not revoke A.
|
||||||
|
|
||||||
2.2 Add Hold-Down
|
2.2. Add Hold-Down
|
||||||
|
|
||||||
Assume two trust point keys A and B. Assume that B has been
|
Assume two trust point keys A and B. Assume that B has been
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
StJohns Expires February 16, 2006 [Page 4]
|
|
||||||
|
|
||||||
Internet-Draft trustanchor-update August 2005
|
|
||||||
|
|
||||||
|
|
||||||
compromised. An attacker could generate and add a new trust anchor
|
compromised. An attacker could generate and add a new trust anchor
|
||||||
key - C (by adding C to the DNSKEY RRSet and signing it with B), and
|
key - C (by adding C to the DNSKEY RRSet and signing it with B), and
|
||||||
then invalidate the compromised key. This would result in the both
|
then invalidate the compromised key. This would result in the both
|
||||||
@@ -265,24 +270,23 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
their own (e.g. using the example, signed only by B). This is no
|
their own (e.g. using the example, signed only by B). This is no
|
||||||
worse than the current situation assuming a compromised key.
|
worse than the current situation assuming a compromised key.
|
||||||
|
|
||||||
2.3 Remove Hold-down
|
2.3. Remove Hold-down
|
||||||
|
|
||||||
A new key which has been seen by the resolver, but hasn't reached
|
A new key which has been seen by the resolver, but hasn't reached
|
||||||
it's add hold-down time, MAY be removed from the DNSKEY RRSet by the
|
it's add hold-down time, MAY be removed from the DNSKEY RRSet by the
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
StJohns Expires July 14, 2006 [Page 5]
|
||||||
|
|
||||||
|
Internet-Draft trustanchor-update January 2006
|
||||||
|
|
||||||
|
|
||||||
zone owner. If the resolver sees a validated DNSKEY RRSet without
|
zone owner. If the resolver sees a validated DNSKEY RRSet without
|
||||||
this key, it waits for the remove hold-down time and then, if the key
|
this key, it waits for the remove hold-down time and then, if the key
|
||||||
hasn't reappeared, SHOULD discard any information about the key.
|
hasn't reappeared, SHOULD discard any information about the key.
|
||||||
|
|
||||||
|
2.4. Active Refresh
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
StJohns Expires February 16, 2006 [Page 5]
|
|
||||||
|
|
||||||
Internet-Draft trustanchor-update August 2005
|
|
||||||
|
|
||||||
|
|
||||||
2.4 Active Refresh
|
|
||||||
|
|
||||||
A resolver which has been configured for automatic update of keys
|
A resolver which has been configured for automatic update of keys
|
||||||
from a particular trust point MUST query that trust point (e.g. do a
|
from a particular trust point MUST query that trust point (e.g. do a
|
||||||
@@ -297,9 +301,9 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
lesser of 1 day or 10% of the original TTL or 10% of the original
|
lesser of 1 day or 10% of the original TTL or 10% of the original
|
||||||
expiration interval.
|
expiration interval.
|
||||||
|
|
||||||
2.5 Resolver Parameters
|
2.5. Resolver Parameters
|
||||||
|
|
||||||
2.5.1 Add Hold-Down Time
|
2.5.1. Add Hold-Down Time
|
||||||
|
|
||||||
The add hold-down time is 30 days or the expiration time of the TTL
|
The add hold-down time is 30 days or the expiration time of the TTL
|
||||||
of the first trust point DNSKEY RRSet which contained the key,
|
of the first trust point DNSKEY RRSet which contained the key,
|
||||||
@@ -307,15 +311,16 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
DNSKEY RRSets which contain the new key MUST be seen by the resolver
|
DNSKEY RRSets which contain the new key MUST be seen by the resolver
|
||||||
prior to the key's acceptance.
|
prior to the key's acceptance.
|
||||||
|
|
||||||
2.5.2 Remove Hold-Down Time
|
2.5.2. Remove Hold-Down Time
|
||||||
|
|
||||||
The remove hold-down time is 30 days.
|
The remove hold-down time is 30 days.
|
||||||
|
|
||||||
2.5.3 Minimum Trust Anchors per Trust Point
|
2.5.3. Minimum Trust Anchors per Trust Point
|
||||||
|
|
||||||
A compliant resolver MUST be able to manage at least five SEP keys
|
A compliant resolver MUST be able to manage at least five SEP keys
|
||||||
per trust point.
|
per trust point.
|
||||||
|
|
||||||
|
|
||||||
3. Changes to DNSKEY RDATA Wire Format
|
3. Changes to DNSKEY RDATA Wire Format
|
||||||
|
|
||||||
Bit n [msj2] of the DNSKEY Flags field is designated as the 'REVOKE'
|
Bit n [msj2] of the DNSKEY Flags field is designated as the 'REVOKE'
|
||||||
@@ -324,20 +329,21 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
consider this key permanently invalid for all purposes except for
|
consider this key permanently invalid for all purposes except for
|
||||||
validing the revocation.
|
validing the revocation.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
StJohns Expires July 14, 2006 [Page 6]
|
||||||
|
|
||||||
|
Internet-Draft trustanchor-update January 2006
|
||||||
|
|
||||||
|
|
||||||
4. State Table
|
4. State Table
|
||||||
|
|
||||||
The most important thing to understand is the resolver's view of any
|
The most important thing to understand is the resolver's view of any
|
||||||
key at a trust point. The following state table describes that view
|
key at a trust point. The following state table describes that view
|
||||||
at various points in the key's lifetime. The table is a normative
|
at various points in the key's lifetime. The table is a normative
|
||||||
part of this specification. The initial state of the key is 'Start'.
|
part of this specification. The initial state of the key is 'Start'.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
StJohns Expires February 16, 2006 [Page 6]
|
|
||||||
|
|
||||||
Internet-Draft trustanchor-update August 2005
|
|
||||||
|
|
||||||
|
|
||||||
The resolver's view of the state of the key changes as various events
|
The resolver's view of the state of the key changes as various events
|
||||||
occur.
|
occur.
|
||||||
|
|
||||||
@@ -364,8 +370,7 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
Removed | | | | | | |
|
Removed | | | | | | |
|
||||||
----------------------------------------------------------
|
----------------------------------------------------------
|
||||||
|
|
||||||
|
4.1. Events
|
||||||
4.1 Events
|
|
||||||
NewKey The resolver sees a valid DNSKEY RRSet with a new SEP key.
|
NewKey The resolver sees a valid DNSKEY RRSet with a new SEP key.
|
||||||
That key will become a new trust anchor for the named trust point
|
That key will become a new trust anchor for the named trust point
|
||||||
after its been present in the RRSet for at least 'add time'.
|
after its been present in the RRSet for at least 'add time'.
|
||||||
@@ -380,20 +385,19 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
"REVOKED" bit set, and there is an RRSig over the DNSKEY RRSet
|
"REVOKED" bit set, and there is an RRSig over the DNSKEY RRSet
|
||||||
signed by this key.
|
signed by this key.
|
||||||
|
|
||||||
4.2 States
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
StJohns Expires July 14, 2006 [Page 7]
|
||||||
|
|
||||||
|
Internet-Draft trustanchor-update January 2006
|
||||||
|
|
||||||
|
|
||||||
|
4.2. States
|
||||||
Start The key doesn't yet exist as a trust anchor at the resolver.
|
Start The key doesn't yet exist as a trust anchor at the resolver.
|
||||||
It may or may not exist at the zone server, but hasn't yet been
|
It may or may not exist at the zone server, but hasn't yet been
|
||||||
seen at the resolver.
|
seen at the resolver.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
StJohns Expires February 16, 2006 [Page 7]
|
|
||||||
|
|
||||||
Internet-Draft trustanchor-update August 2005
|
|
||||||
|
|
||||||
|
|
||||||
AddPend The key has been seen at the resolver, has its 'SEP' bit set,
|
AddPend The key has been seen at the resolver, has its 'SEP' bit set,
|
||||||
and has been included in a validated DNSKEY RRSet. There is a
|
and has been included in a validated DNSKEY RRSet. There is a
|
||||||
hold-down time for the key before it can be used as a trust
|
hold-down time for the key before it can be used as a trust
|
||||||
@@ -410,8 +414,8 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
point key, but was not seen at the resolver in the last validated
|
point key, but was not seen at the resolver in the last validated
|
||||||
DNSKEY RRSet. This is an abnormal state because the zone operator
|
DNSKEY RRSet. This is an abnormal state because the zone operator
|
||||||
should be using the REVOKE bit prior to removal. [Discussion
|
should be using the REVOKE bit prior to removal. [Discussion
|
||||||
item: Should a missing key be considered revoked after some
|
item: Should a missing key be considered revoked after some period
|
||||||
period of time?]
|
of time?]
|
||||||
Revoked This is the state a key moves to once the resolver sees an
|
Revoked This is the state a key moves to once the resolver sees an
|
||||||
RRSIG(DNSKEY) signed by this key where that DNSKEY RRSet contains
|
RRSIG(DNSKEY) signed by this key where that DNSKEY RRSet contains
|
||||||
this key with its REVOKE bit set to '1'. Once in this state, this
|
this key with its REVOKE bit set to '1'. Once in this state, this
|
||||||
@@ -420,6 +424,16 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
key may be purged from the resolver. A key in the removed state
|
key may be purged from the resolver. A key in the removed state
|
||||||
MUST NOT be considered a valid trust anchor.
|
MUST NOT be considered a valid trust anchor.
|
||||||
|
|
||||||
|
4.3. Trust Point Deletion
|
||||||
|
|
||||||
|
A trust point which has all of its trust anchors revoked is
|
||||||
|
considered deleted and is treated as if the trust point was never
|
||||||
|
configured. If there are no superior trust points, data at and below
|
||||||
|
the deleted trust point are considered insecure. If there there ARE
|
||||||
|
superior trust points, data at and below the deleted trust point are
|
||||||
|
evaluated with respect to the superior trust point.
|
||||||
|
|
||||||
|
|
||||||
5. Scenarios
|
5. Scenarios
|
||||||
|
|
||||||
The suggested model for operation is to have one active key and one
|
The suggested model for operation is to have one active key and one
|
||||||
@@ -428,6 +442,14 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
RRSet, but the resolver will accept it as a trust anchor if/when it
|
RRSet, but the resolver will accept it as a trust anchor if/when it
|
||||||
sees the signature on the trust point DNSKEY RRSet.
|
sees the signature on the trust point DNSKEY RRSet.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
StJohns Expires July 14, 2006 [Page 8]
|
||||||
|
|
||||||
|
Internet-Draft trustanchor-update January 2006
|
||||||
|
|
||||||
|
|
||||||
Since the stand-by key is not in active signing use, the associated
|
Since the stand-by key is not in active signing use, the associated
|
||||||
private key may (and SHOULD) be provided with additional protections
|
private key may (and SHOULD) be provided with additional protections
|
||||||
not normally available to a key that must be used frequently. E.g.
|
not normally available to a key that must be used frequently. E.g.
|
||||||
@@ -436,20 +458,10 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
but that will be dependent on operational concerns not addressed
|
but that will be dependent on operational concerns not addressed
|
||||||
here.
|
here.
|
||||||
|
|
||||||
5.1 Adding A Trust Anchor
|
5.1. Adding A Trust Anchor
|
||||||
|
|
||||||
Assume an existing trust anchor key 'A'.
|
Assume an existing trust anchor key 'A'.
|
||||||
1. Generate a new key pair.
|
1. Generate a new key pair.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
StJohns Expires February 16, 2006 [Page 8]
|
|
||||||
|
|
||||||
Internet-Draft trustanchor-update August 2005
|
|
||||||
|
|
||||||
|
|
||||||
2. Create a DNSKEY record from the key pair and set the SEP and Zone
|
2. Create a DNSKEY record from the key pair and set the SEP and Zone
|
||||||
Key bits.
|
Key bits.
|
||||||
3. Add the DNSKEY to the RRSet.
|
3. Add the DNSKEY to the RRSet.
|
||||||
@@ -457,7 +469,7 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
'A'.
|
'A'.
|
||||||
5. Wait a while.
|
5. Wait a while.
|
||||||
|
|
||||||
5.2 Deleting a Trust Anchor
|
5.2. Deleting a Trust Anchor
|
||||||
|
|
||||||
Assume existing trust anchors 'A' and 'B' and that you want to revoke
|
Assume existing trust anchors 'A' and 'B' and that you want to revoke
|
||||||
and delete 'A'.
|
and delete 'A'.
|
||||||
@@ -467,7 +479,7 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
the RRSet for at least the remove hold-down time, but then may remove
|
the RRSet for at least the remove hold-down time, but then may remove
|
||||||
it from the DNSKEY RRSet.
|
it from the DNSKEY RRSet.
|
||||||
|
|
||||||
5.3 Key Roll-Over
|
5.3. Key Roll-Over
|
||||||
|
|
||||||
Assume existing keys A and B. 'A' is actively in use (i.e. has been
|
Assume existing keys A and B. 'A' is actively in use (i.e. has been
|
||||||
signing the DNSKEY RRSet.) 'B' was the stand-by key. (i.e. has been
|
signing the DNSKEY RRSet.) 'B' was the stand-by key. (i.e. has been
|
||||||
@@ -482,12 +494,19 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
the revoked 'A' in the RRSet for at least the remove hold-down time,
|
the revoked 'A' in the RRSet for at least the remove hold-down time,
|
||||||
but may then remove it from the DNSKEY RRSet.
|
but may then remove it from the DNSKEY RRSet.
|
||||||
|
|
||||||
5.4 Active Key Compromised
|
5.4. Active Key Compromised
|
||||||
|
|
||||||
This is the same as the mechanism for Key Roll-Over (Section 5.3)
|
This is the same as the mechanism for Key Roll-Over (Section 5.3)
|
||||||
above assuming 'A' is the active key.
|
above assuming 'A' is the active key.
|
||||||
|
|
||||||
5.5 Stand-by Key Compromised
|
|
||||||
|
|
||||||
|
StJohns Expires July 14, 2006 [Page 9]
|
||||||
|
|
||||||
|
Internet-Draft trustanchor-update January 2006
|
||||||
|
|
||||||
|
|
||||||
|
5.5. Stand-by Key Compromised
|
||||||
|
|
||||||
Using the same assumptions and naming conventions as Key Roll-Over
|
Using the same assumptions and naming conventions as Key Roll-Over
|
||||||
(Section 5.3) above:
|
(Section 5.3) above:
|
||||||
@@ -500,15 +519,16 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
included in the RRSet for the remove hold-down time.
|
included in the RRSet for the remove hold-down time.
|
||||||
|
|
||||||
|
|
||||||
|
6. IANA Considerations
|
||||||
|
|
||||||
StJohns Expires February 16, 2006 [Page 9]
|
The IANA will need to assign a bit in the DNSKEY flags field (see
|
||||||
|
section 4.3 of [RFC3755]) for the REVOKE bit. There are no other
|
||||||
Internet-Draft trustanchor-update August 2005
|
IANA actions required.
|
||||||
|
|
||||||
|
|
||||||
6. Security Considerations
|
7. Security Considerations
|
||||||
|
|
||||||
6.1 Key Ownership vs Acceptance Policy
|
7.1. Key Ownership vs Acceptance Policy
|
||||||
|
|
||||||
The reader should note that, while the zone owner is responsible
|
The reader should note that, while the zone owner is responsible
|
||||||
creating and distributing keys, it's wholly the decision of the
|
creating and distributing keys, it's wholly the decision of the
|
||||||
@@ -523,7 +543,7 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
will need to establish a mechanism for manual or other out-of-band
|
will need to establish a mechanism for manual or other out-of-band
|
||||||
updates outside the scope of this document.
|
updates outside the scope of this document.
|
||||||
|
|
||||||
6.2 Multiple Key Compromise
|
7.2. Multiple Key Compromise
|
||||||
|
|
||||||
This scheme permits recovery as long as at least one valid trust
|
This scheme permits recovery as long as at least one valid trust
|
||||||
anchor key remains uncompromised. E.g. if there are three keys, you
|
anchor key remains uncompromised. E.g. if there are three keys, you
|
||||||
@@ -534,7 +554,15 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
manual or other out-of-band update of all resolvers will be required
|
manual or other out-of-band update of all resolvers will be required
|
||||||
if all trust anchor keys at a trust point are compromised.
|
if all trust anchor keys at a trust point are compromised.
|
||||||
|
|
||||||
6.3 Dynamic Updates
|
|
||||||
|
|
||||||
|
|
||||||
|
StJohns Expires July 14, 2006 [Page 10]
|
||||||
|
|
||||||
|
Internet-Draft trustanchor-update January 2006
|
||||||
|
|
||||||
|
|
||||||
|
7.3. Dynamic Updates
|
||||||
|
|
||||||
Allowing a resolver to update its trust anchor set based in-band key
|
Allowing a resolver to update its trust anchor set based in-band key
|
||||||
information is potentially less secure than a manual process.
|
information is potentially less secure than a manual process.
|
||||||
@@ -543,7 +571,7 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
lack of a standard management framework for DNS, this approach is no
|
lack of a standard management framework for DNS, this approach is no
|
||||||
worse than the existing situation.
|
worse than the existing situation.
|
||||||
|
|
||||||
7. Normative References
|
8. Normative References
|
||||||
|
|
||||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||||||
Requirement Levels", BCP 14, RFC 2119, March 1997.
|
Requirement Levels", BCP 14, RFC 2119, March 1997.
|
||||||
@@ -551,17 +579,13 @@ Internet-Draft trustanchor-update August 2005
|
|||||||
[RFC2535] Eastlake, D., "Domain Name System Security Extensions",
|
[RFC2535] Eastlake, D., "Domain Name System Security Extensions",
|
||||||
RFC 2535, March 1999.
|
RFC 2535, March 1999.
|
||||||
|
|
||||||
|
[RFC3755] Weiler, S., "Legacy Resolver Compatibility for Delegation
|
||||||
|
Signer (DS)", RFC 3755, May 2004.
|
||||||
|
|
||||||
[RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and S.
|
[RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and S.
|
||||||
Rose, "DNS Security Introduction and Requirements",
|
Rose, "DNS Security Introduction and Requirements",
|
||||||
RFC 4033, March 2005.
|
RFC 4033, March 2005.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
StJohns Expires February 16, 2006 [Page 10]
|
|
||||||
|
|
||||||
Internet-Draft trustanchor-update August 2005
|
|
||||||
|
|
||||||
|
|
||||||
[RFC4034] Arends, R., Austein, R., Larson, M., Massey, D., and S.
|
[RFC4034] Arends, R., Austein, R., Larson, M., Massey, D., and S.
|
||||||
Rose, "Resource Records for the DNS Security Extensions",
|
Rose, "Resource Records for the DNS Security Extensions",
|
||||||
RFC 4034, March 2005.
|
RFC 4034, March 2005.
|
||||||
@@ -585,6 +609,15 @@ Editorial Comments
|
|||||||
at the trust anchor, they won't be able to match.
|
at the trust anchor, they won't be able to match.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
StJohns Expires July 14, 2006 [Page 11]
|
||||||
|
|
||||||
|
Internet-Draft trustanchor-update January 2006
|
||||||
|
|
||||||
|
|
||||||
Author's Address
|
Author's Address
|
||||||
|
|
||||||
Michael StJohns
|
Michael StJohns
|
||||||
@@ -613,9 +646,32 @@ Author's Address
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
StJohns Expires February 16, 2006 [Page 11]
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
StJohns Expires July 14, 2006 [Page 12]
|
||||||
|
|
||||||
Internet-Draft trustanchor-update August 2005
|
Internet-Draft trustanchor-update January 2006
|
||||||
|
|
||||||
|
|
||||||
Intellectual Property Statement
|
Intellectual Property Statement
|
||||||
@@ -642,11 +698,6 @@ Intellectual Property Statement
|
|||||||
this standard. Please address the information to the IETF at
|
this standard. Please address the information to the IETF at
|
||||||
ietf-ipr@ietf.org.
|
ietf-ipr@ietf.org.
|
||||||
|
|
||||||
The IETF has been notified of intellectual property rights claimed in
|
|
||||||
regard to some or all of the specification contained in this
|
|
||||||
document. For more information consult the online list of claimed
|
|
||||||
rights.
|
|
||||||
|
|
||||||
|
|
||||||
Disclaimer of Validity
|
Disclaimer of Validity
|
||||||
|
|
||||||
@@ -661,19 +712,11 @@ Disclaimer of Validity
|
|||||||
|
|
||||||
Copyright Statement
|
Copyright Statement
|
||||||
|
|
||||||
Copyright (C) The Internet Society (2005). This document is subject
|
Copyright (C) The Internet Society (2006). This document is subject
|
||||||
to the rights, licenses and restrictions contained in BCP 78, and
|
to the rights, licenses and restrictions contained in BCP 78, and
|
||||||
except as set forth therein, the authors retain all their rights.
|
except as set forth therein, the authors retain all their rights.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
StJohns Expires February 16, 2006 [Page 12]
|
|
||||||
|
|
||||||
Internet-Draft trustanchor-update August 2005
|
|
||||||
|
|
||||||
|
|
||||||
Acknowledgment
|
Acknowledgment
|
||||||
|
|
||||||
Funding for the RFC Editor function is currently provided by the
|
Funding for the RFC Editor function is currently provided by the
|
||||||
@@ -682,49 +725,6 @@ Acknowledgment
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
StJohns Expires July 14, 2006 [Page 13]
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
StJohns Expires February 16, 2006 [Page 13]
|
|
||||||
|
|
||||||
|
|
Reference in New Issue
Block a user