mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-09-03 08:05:21 +00:00
new rev
This commit is contained in:
@@ -1,293 +0,0 @@
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
DNSEXT Working Group Brian Wellington
|
|
||||||
INTERNET-DRAFT Olafur Gudmundsson
|
|
||||||
<draft-ietf-dnsext-ad-is-secure-05.txt> March 2002
|
|
||||||
|
|
||||||
Updates: RFC 2535
|
|
||||||
|
|
||||||
Redefinition of DNS AD bit
|
|
||||||
|
|
||||||
|
|
||||||
Status of this Memo
|
|
||||||
|
|
||||||
This document is an Internet-Draft and is in full conformance with
|
|
||||||
all provisions of Section 10 of RFC2026.
|
|
||||||
|
|
||||||
Internet-Drafts are working documents of the Internet Engineering
|
|
||||||
Task Force (IETF), its areas, and its working groups. Note that
|
|
||||||
other groups may also distribute working documents as Internet-
|
|
||||||
Drafts.
|
|
||||||
|
|
||||||
Internet-Drafts are draft documents valid for a maximum of six months
|
|
||||||
and may be updated, replaced, or obsoleted by other documents at any
|
|
||||||
time. It is inappropriate to use Internet-Drafts as reference
|
|
||||||
material or to cite them other than as ``work in progress.''
|
|
||||||
|
|
||||||
The list of current Internet-Drafts can be accessed at
|
|
||||||
http://www.ietf.org/ietf/1id-abstracts.txt
|
|
||||||
|
|
||||||
The list of Internet-Draft Shadow Directories can be accessed at
|
|
||||||
http://www.ietf.org/shadow.html
|
|
||||||
|
|
||||||
Comments should be sent to the authors or the DNSEXT WG mailing list
|
|
||||||
namedroppers@ops.ietf.org
|
|
||||||
|
|
||||||
This draft expires on September 25, 2002.
|
|
||||||
|
|
||||||
Copyright Notice
|
|
||||||
|
|
||||||
Copyright (C) The Internet Society (2002). All rights reserved.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Abstract
|
|
||||||
|
|
||||||
Based on implementation experience, the current definition of the AD
|
|
||||||
bit in the DNS header is not useful. This draft changes the
|
|
||||||
specification so that the AD bit is only set on answers where
|
|
||||||
signatures have been cryptographically verified or the server is
|
|
||||||
authoritative for the data and is allowed to set the bit by policy.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires September 2002 [Page 1]
|
|
||||||
|
|
||||||
INTERNET-DRAFT AD bit set on secure answers March 2002
|
|
||||||
|
|
||||||
|
|
||||||
1 - Introduction
|
|
||||||
|
|
||||||
Familiarity with the DNS system [RFC1035] and DNS security extensions
|
|
||||||
[RFC2535] is helpful but not necessary.
|
|
||||||
|
|
||||||
As specified in RFC 2535 (section 6.1), the AD bit indicates in a
|
|
||||||
response that all data included in the answer and authority sections
|
|
||||||
of the response have been authenticated by the server according to
|
|
||||||
the policies of that server. This is not especially useful in
|
|
||||||
practice, since a conformant server should never reply with data that
|
|
||||||
failed its security policy.
|
|
||||||
|
|
||||||
This draft proposes to redefine the AD bit such that it is only set
|
|
||||||
if all data in the response has been cryptographically verified or
|
|
||||||
otherwise meets the server's local security policy. Thus, a response
|
|
||||||
containing properly delegated insecure data will not have AD set, nor
|
|
||||||
will a response from a server configured without DNSSEC keys. As
|
|
||||||
before, data which failed to verify will not be returned. An
|
|
||||||
application running on a host that has trust relationship with the
|
|
||||||
server performing the recursive query can now use the value of the AD
|
|
||||||
bit to determine if the data is secure or not.
|
|
||||||
|
|
||||||
1.1 - Requirements
|
|
||||||
|
|
||||||
The key words "MAY", "MAY NOT" "MUST", "MUST NOT", "SHOULD", "SHOULD
|
|
||||||
NOT", in this document are to be interpreted as described in RFC2119.
|
|
||||||
|
|
||||||
1.2 - Updated documents and sections
|
|
||||||
|
|
||||||
The definition of the AD bit in RFC2535, Section 6.1, is changed.
|
|
||||||
|
|
||||||
2 - Setting of AD bit
|
|
||||||
|
|
||||||
The presence of the CD (checking disabled) bit in a query does not
|
|
||||||
affect the setting of the AD bit in the response. If the CD bit is
|
|
||||||
set, the server will not perform checking, but SHOULD still set the
|
|
||||||
AD bit if the data has already been checked or complies with local
|
|
||||||
policy. The AD bit MUST only be set if DNSSEC records have been
|
|
||||||
requested [RFC3225] and relevant SIG records are returned.
|
|
||||||
|
|
||||||
2.1 - Setting of AD bit by recursive servers
|
|
||||||
|
|
||||||
Section 6.1 of RFC2535 says:
|
|
||||||
|
|
||||||
"The AD bit MUST NOT be set on a response unless all of the RRs in
|
|
||||||
the answer and authority sections of the response are either
|
|
||||||
Authenticated or Insecure."
|
|
||||||
|
|
||||||
The replacement text reads:
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires September 2002 [Page 2]
|
|
||||||
|
|
||||||
INTERNET-DRAFT AD bit set on secure answers March 2002
|
|
||||||
|
|
||||||
|
|
||||||
"The AD bit MUST NOT be set on a response unless all of the RRsets in
|
|
||||||
the answer and authority sections of the response are Authenticated."
|
|
||||||
|
|
||||||
"The AD bit SHOULD be set if and only if all RRs in the answer
|
|
||||||
section and any relevant negative response RRs in the authority
|
|
||||||
section are Authenticated."
|
|
||||||
|
|
||||||
A recursive DNS server following this modified specification will
|
|
||||||
only set the AD bit when it has cryptographically verified the data
|
|
||||||
in the answer.
|
|
||||||
|
|
||||||
2.2 - Setting of AD bit by authoritative servers
|
|
||||||
|
|
||||||
Primary server for a secure zone the data, MAY have the policy of
|
|
||||||
treating authoritative secure zones as Authenticated. Secondary
|
|
||||||
servers MAY have the same policy, but SHOULD NOT consider zone data
|
|
||||||
Authenticated unless the zone was transfered securely and/or the data
|
|
||||||
was verified. An authoritative server MUST only set the AD bit for
|
|
||||||
authoritative answers from a secure zone if it has been explicitly
|
|
||||||
configured to do so. The default for this behavior SHOULD be off.
|
|
||||||
|
|
||||||
2.2.1 - Justification for setting AD bit w/o verifying data
|
|
||||||
|
|
||||||
The setting of the AD bit by authoritative servers affects only a
|
|
||||||
small set of resolvers that are configured to directly query and
|
|
||||||
trust authoritative servers. This only affects servers that function
|
|
||||||
as both recursive and authoritative. All recursive resolvers SHOULD
|
|
||||||
ignore the AD bit.
|
|
||||||
|
|
||||||
The cost of verifying all signatures on load by an authoritative
|
|
||||||
server can be high and increases the delay before it can begin
|
|
||||||
answering queries. Verifying signatures at query time is also
|
|
||||||
expensive and could lead to resolvers timing out on many queries
|
|
||||||
after the server reloads zones.
|
|
||||||
|
|
||||||
Organizations that require that all DNS responses contain
|
|
||||||
cryptographically verified data must separate the functions of
|
|
||||||
authoritative and recursive servers, as authoritative servers are not
|
|
||||||
required to validate local secure data.
|
|
||||||
|
|
||||||
3 - Interpretation of the AD bit
|
|
||||||
|
|
||||||
A response containing data marked Insecure in the answer or authority
|
|
||||||
section will never have the AD bit set. In this case, the resolver
|
|
||||||
SHOULD treat the data as Insecure whether or not SIG records are
|
|
||||||
present.
|
|
||||||
|
|
||||||
A resolver MUST NOT blindly trust the AD bit unless it communicates
|
|
||||||
with the server over a secure transport mechanism or using message
|
|
||||||
authentication such as TSIG [RFC2845] or SIG(0) [RFC2931] and is
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires September 2002 [Page 3]
|
|
||||||
|
|
||||||
INTERNET-DRAFT AD bit set on secure answers March 2002
|
|
||||||
|
|
||||||
|
|
||||||
configured to trust the server.
|
|
||||||
|
|
||||||
4 - Security Considerations:
|
|
||||||
|
|
||||||
This document redefines a bit in the DNS header. If a resolver
|
|
||||||
trusts the value of the AD bit, it must be sure that the server is
|
|
||||||
using the updated definition, which is any server supporting the OK
|
|
||||||
bit.
|
|
||||||
|
|
||||||
Authoritative servers that set the AD bit on answers without doing
|
|
||||||
cryptographic checks must only do so if explicitly configured to.
|
|
||||||
This only affects resolvers that directly query and trust the
|
|
||||||
authoritative server, and this functionality should only be used on
|
|
||||||
servers that act both as authoritative servers and recursive
|
|
||||||
resolver.
|
|
||||||
|
|
||||||
Authoritative servers that set the AD bit on answers without doing
|
|
||||||
cryptographic checks must only do so on explicit zone by zone
|
|
||||||
enablement. This only affects resolvers that trust the server and
|
|
||||||
this functionality should only be used on servers that act both as
|
|
||||||
authoritative servers and recursive resolver.
|
|
||||||
|
|
||||||
Resolvers (full or stub) that blindly trust the AD bit without
|
|
||||||
knowing the security policy of the server generating the answer can
|
|
||||||
not be considered security aware.
|
|
||||||
|
|
||||||
5 - IANA Considerations:
|
|
||||||
|
|
||||||
None.
|
|
||||||
|
|
||||||
6 - Internationalization Considerations:
|
|
||||||
|
|
||||||
None, this document does not change any textual data in any protocol.
|
|
||||||
|
|
||||||
7 - Acknowledgments:
|
|
||||||
|
|
||||||
The following people have provided input on this document: Andreas
|
|
||||||
Gustafsson, Bob Halley, Steven Jacob, Edward Lewis, Jakob Schlyter,
|
|
||||||
Roy Arends, Ted Lindgreen.
|
|
||||||
|
|
||||||
References:
|
|
||||||
|
|
||||||
[RFC1035] P. Mockapetris, ``Domain Names - Implementation and
|
|
||||||
Specification'', STD 13, RFC 1035, November 1987.
|
|
||||||
|
|
||||||
[RFC2535] D. Eastlake, ``Domain Name System Security Extensions'', RFC
|
|
||||||
2535, March 1999.
|
|
||||||
|
|
||||||
[RFC2845] P. Vixie, O. Gudmundsson, D. Eastlake, B. Wellington,
|
|
||||||
``Secret Key Transaction Authentication for DNS (TSIG)'', RFC
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires September 2002 [Page 4]
|
|
||||||
|
|
||||||
INTERNET-DRAFT AD bit set on secure answers March 2002
|
|
||||||
|
|
||||||
|
|
||||||
2845, May 2000.
|
|
||||||
|
|
||||||
[RFC2931] D. Eastlake, ``DNS Request and Transaction Signatures
|
|
||||||
(SIG(0))'', RFC 2931, September 2000.
|
|
||||||
|
|
||||||
[RFC3225] D. Conrad, ``Indicating Resolver Support of DNSSEC'', RFC
|
|
||||||
3225, December 2001.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Authors Addresses
|
|
||||||
|
|
||||||
Brian Wellington Olafur Gudmundsson
|
|
||||||
Nominum Inc.
|
|
||||||
2385 Bay Street 3826 Legation Street, NW
|
|
||||||
Redwood City, CA, 94063 Washington, DC, 20015
|
|
||||||
USA USA
|
|
||||||
<Brian.Wellington@nominum.com> <ogud@ogud.com>
|
|
||||||
|
|
||||||
|
|
||||||
Full Copyright Statement
|
|
||||||
|
|
||||||
Copyright (C) The Internet Society (2002>. All Rights Reserved.
|
|
||||||
|
|
||||||
This document and translations of it may be copied and furnished to
|
|
||||||
others, and derivative works that comment on or otherwise explain it
|
|
||||||
or assist in its implementation may be prepared, copied, published
|
|
||||||
and distributed, in whole or in part, without restriction of any
|
|
||||||
kind, provided that the above copyright notice and this paragraph are
|
|
||||||
included on all such copies and derivative works. However, this
|
|
||||||
document itself may not be modified in any way, such as by removing
|
|
||||||
the copyright notice or references to the Internet Society or other
|
|
||||||
Internet organizations, except as needed for the purpose of
|
|
||||||
developing Internet standards in which case the procedures for
|
|
||||||
copyrights defined in the Internet Standards process must be
|
|
||||||
followed, or as required to translate it into languages other than
|
|
||||||
English.
|
|
||||||
|
|
||||||
The limited permissions granted above are perpetual and will not be
|
|
||||||
revoked by the Internet Society or its successors or assigns.
|
|
||||||
|
|
||||||
This document and the information contained herein is provided on an
|
|
||||||
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
|
||||||
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
|
||||||
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
|
||||||
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
|
||||||
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE."
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Expires September 2002 [Page 5]
|
|
||||||
|
|
408
doc/draft/draft-ietf-dnsext-ad-is-secure-06.txt
Normal file
408
doc/draft/draft-ietf-dnsext-ad-is-secure-06.txt
Normal file
@@ -0,0 +1,408 @@
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
DNSEXT Working Group Brian Wellington
|
||||||
|
INTERNET-DRAFT Olafur Gudmundsson
|
||||||
|
<draft-ietf-dnsext-ad-is-secure-06.txt> June 2002
|
||||||
|
|
||||||
|
Updates: RFC 2535
|
||||||
|
|
||||||
|
Redefinition of DNS AD bit
|
||||||
|
|
||||||
|
|
||||||
|
Status of this Memo
|
||||||
|
|
||||||
|
This document is an Internet-Draft and is in full conformance with
|
||||||
|
all provisions of Section 10 of RFC2026.
|
||||||
|
|
||||||
|
Internet-Drafts are working documents of the Internet Engineering
|
||||||
|
Task Force (IETF), its areas, and its working groups. Note that
|
||||||
|
other groups may also distribute working documents as Internet-
|
||||||
|
Drafts.
|
||||||
|
|
||||||
|
Internet-Drafts are draft documents valid for a maximum of six months
|
||||||
|
and may be updated, replaced, or obsoleted by other documents at any
|
||||||
|
time. It is inappropriate to use Internet-Drafts as reference
|
||||||
|
material or to cite them other than as ``work in progress.''
|
||||||
|
|
||||||
|
The list of current Internet-Drafts can be accessed at
|
||||||
|
http://www.ietf.org/ietf/1id-abstracts.txt
|
||||||
|
|
||||||
|
The list of Internet-Draft Shadow Directories can be accessed at
|
||||||
|
http://www.ietf.org/shadow.html
|
||||||
|
|
||||||
|
Comments should be sent to the authors or the DNSEXT WG mailing list
|
||||||
|
namedroppers@ops.ietf.org
|
||||||
|
|
||||||
|
This draft expires on December 25, 2002.
|
||||||
|
|
||||||
|
Copyright Notice
|
||||||
|
|
||||||
|
Copyright (C) The Internet Society (2002). All rights reserved.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Abstract
|
||||||
|
|
||||||
|
Based on implementation experience, the RFC2535 definition of the
|
||||||
|
Authenticated Data (AD) bit in the DNS header is not useful. This
|
||||||
|
draft changes the specification so that the AD bit is only set on
|
||||||
|
answers where signatures have been cryptographically verified or the
|
||||||
|
server is authoritative for the data and is allowed to set the bit by
|
||||||
|
policy.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Expires December 2002 [Page 1]
|
||||||
|
|
||||||
|
INTERNET-DRAFT AD bit set on secure answers June 2002
|
||||||
|
|
||||||
|
|
||||||
|
1 - Introduction
|
||||||
|
|
||||||
|
Familiarity with the DNS system [RFC1035] and DNS security extensions
|
||||||
|
[RFC2535] is helpful but not necessary.
|
||||||
|
|
||||||
|
As specified in RFC 2535 (section 6.1), the AD (Authenticated Data)
|
||||||
|
bit indicates in a response that all data included in the answer and
|
||||||
|
authority sections of the response have been authenticated by the
|
||||||
|
server according to the policies of that server. This is not
|
||||||
|
especially useful in practice, since a conformant server SHOULD never
|
||||||
|
reply with data that failed its security policy.
|
||||||
|
|
||||||
|
This draft redefines the AD bit such that it is only set if all data
|
||||||
|
in the response has been cryptographically verified or otherwise
|
||||||
|
meets the server's local security policy. Thus, a response
|
||||||
|
containing properly delegated insecure data will not have AD set, nor
|
||||||
|
will a response from a server configured without DNSSEC keys. As
|
||||||
|
before, data which failed to verify will not be returned. An
|
||||||
|
application running on a host that has a trust relationship with the
|
||||||
|
server performing the recursive query can now use the value of the AD
|
||||||
|
bit to determine if the data is secure or not.
|
||||||
|
|
||||||
|
1.1 - Motivation
|
||||||
|
|
||||||
|
A full DNSSEC capable resolver called directly from an application
|
||||||
|
can return to the application the security status of the RRsets in
|
||||||
|
the answer. However, most applications use a limited stub resolver
|
||||||
|
that relies on an external full resolver. The remote resolver can
|
||||||
|
use the AD bit in a response to indicate the security status of the
|
||||||
|
data in the answer, and the local resolver can pass this information
|
||||||
|
to the application. The application in this context can be either a
|
||||||
|
human using a DNS tool or a software application.
|
||||||
|
|
||||||
|
The AD bit SHOULD be used by the local resolver if and only if it has
|
||||||
|
been explicitly configured to trust the remote resolver. The AD bit
|
||||||
|
SHOULD be ignored when the remote resolver is not trusted.
|
||||||
|
|
||||||
|
An alternate solution would be to embed a full DNSSEC resolver into
|
||||||
|
every application. This has several disadvantages.
|
||||||
|
|
||||||
|
- DNSSEC validation is both CPU and network intensive, and caching
|
||||||
|
SHOULD be used whenever possible.
|
||||||
|
|
||||||
|
- DNSSEC requires non-trivial configuration - the root key must be
|
||||||
|
configured, as well as keys for any "islands of security" that will
|
||||||
|
exist until DNSSEC is fully deployed. The number of configuration
|
||||||
|
points should be minimized.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Expires December 2002 [Page 2]
|
||||||
|
|
||||||
|
INTERNET-DRAFT AD bit set on secure answers June 2002
|
||||||
|
|
||||||
|
|
||||||
|
1.2 - Requirements
|
||||||
|
|
||||||
|
The key words "MAY", "MAY NOT" "MUST", "MUST NOT", "SHOULD", "SHOULD
|
||||||
|
NOT", "RECOMMENDED", in this document are to be interpreted as
|
||||||
|
described in RFC2119.
|
||||||
|
|
||||||
|
1.3 - Updated documents and sections
|
||||||
|
|
||||||
|
The definition of the AD bit in RFC2535, Section 6.1, is changed.
|
||||||
|
|
||||||
|
2 - Setting of AD bit
|
||||||
|
|
||||||
|
The presence of the CD (Checking Disabled) bit in a query does not
|
||||||
|
affect the setting of the AD bit in the response. If the CD bit is
|
||||||
|
set, the server will not perform checking, but SHOULD still set the
|
||||||
|
AD bit if the data has already been cryptographically verified or
|
||||||
|
complies with local policy. The AD bit MUST only be set if DNSSEC
|
||||||
|
records have been requested via the OK bit [RFC3225] and relevant SIG
|
||||||
|
records are returned.
|
||||||
|
|
||||||
|
2.1 - Setting of AD bit by recursive servers
|
||||||
|
|
||||||
|
Section 6.1 of RFC2535 says:
|
||||||
|
|
||||||
|
"The AD bit MUST NOT be set on a response unless all of the RRs in
|
||||||
|
the answer and authority sections of the response are either
|
||||||
|
Authenticated or Insecure."
|
||||||
|
|
||||||
|
The replacement text reads:
|
||||||
|
|
||||||
|
"The AD bit MUST NOT be set on a response unless all of the RRsets in
|
||||||
|
the answer and authority sections of the response are Authenticated."
|
||||||
|
|
||||||
|
"The AD bit SHOULD be set if and only if all RRs in the answer
|
||||||
|
section and any relevant negative response RRs in the authority
|
||||||
|
section are Authenticated."
|
||||||
|
|
||||||
|
A recursive DNS server following this modified specification will
|
||||||
|
only set the AD bit when it has cryptographically verified the data
|
||||||
|
in the answer.
|
||||||
|
|
||||||
|
2.2 - Setting of AD bit by authoritative servers
|
||||||
|
|
||||||
|
A primary server for a secure zone MAY have the policy of treating
|
||||||
|
authoritative secure zones as Authenticated. Secondary servers MAY
|
||||||
|
have the same policy, but SHOULD NOT consider zone data Authenticated
|
||||||
|
unless the zone was transferred securely and/or the data was
|
||||||
|
verified. An authoritative server MUST only set the AD bit for
|
||||||
|
authoritative answers from a secure zone if it has been explicitly
|
||||||
|
configured to do so. The default for this behavior SHOULD be off.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Expires December 2002 [Page 3]
|
||||||
|
|
||||||
|
INTERNET-DRAFT AD bit set on secure answers June 2002
|
||||||
|
|
||||||
|
|
||||||
|
2.2.1 - Justification for setting AD bit w/o verifying data
|
||||||
|
|
||||||
|
The setting of the AD bit by authoritative servers affects only a
|
||||||
|
small set of resolvers that are configured to directly query and
|
||||||
|
trust authoritative servers. This only affects servers that function
|
||||||
|
as both recursive and authoritative. All recursive resolvers SHOULD
|
||||||
|
ignore the AD bit.
|
||||||
|
|
||||||
|
The cost of verifying all signatures on load by an authoritative
|
||||||
|
server can be high and increases the delay before it can begin
|
||||||
|
answering queries. Verifying signatures at query time is also
|
||||||
|
expensive and could lead to resolvers timing out on many queries
|
||||||
|
after the server reloads zones.
|
||||||
|
|
||||||
|
Organizations that require that all DNS responses contain
|
||||||
|
cryptographically verified data MUST separate the functions of
|
||||||
|
authoritative and recursive servers, as authoritative servers are not
|
||||||
|
required to validate local secure data.
|
||||||
|
|
||||||
|
3 - Interpretation of the AD bit
|
||||||
|
|
||||||
|
A response containing data marked Insecure in the answer or authority
|
||||||
|
section MUST never have the AD bit set. In this case, the resolver
|
||||||
|
SHOULD treat the data as Insecure whether or not SIG records are
|
||||||
|
present.
|
||||||
|
|
||||||
|
A resolver MUST NOT blindly trust the AD bit unless it communicates
|
||||||
|
with the full function resolver over a secure transport mechanism or
|
||||||
|
using message authentication such as TSIG [RFC2845] or SIG(0)
|
||||||
|
[RFC2931] and is explicitly configured to trust this resolver.
|
||||||
|
|
||||||
|
4 - Applicability statement
|
||||||
|
|
||||||
|
The AD bit is intended to allow the transmission of the indication
|
||||||
|
that a resolver has verified the DNSSEC signatures accompanying the
|
||||||
|
records in the Answer and Authority section. The AD bit MUST only be
|
||||||
|
trusted when the end consumer of the DNS data has confidence that the
|
||||||
|
intermediary resolver setting the AD bit is trustworthy. This can
|
||||||
|
only be accomplished via out of band mechanism such as:
|
||||||
|
|
||||||
|
- Fiat: An organization can dictate that it is OK to trust certain DNS
|
||||||
|
servers.
|
||||||
|
- Personal: Because of a personal relationship or the reputation of a
|
||||||
|
resolver operator, a DNS consumer can decide to trust that
|
||||||
|
resolver.
|
||||||
|
- Knowledge: If a resolver operator posts the configured policy of a
|
||||||
|
resolver a consumer can decide that resolver is trustworthy.
|
||||||
|
|
||||||
|
In the absence of one or more of these factors AD bit from a resolver
|
||||||
|
SHOULD NOT be trusted. For example, home users frequently depend on
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Expires December 2002 [Page 4]
|
||||||
|
|
||||||
|
INTERNET-DRAFT AD bit set on secure answers June 2002
|
||||||
|
|
||||||
|
|
||||||
|
their ISP to provide recursive DNS service; it is not advisable to
|
||||||
|
trust these resolvers. A roaming/traveling host SHOULD not use DNS
|
||||||
|
resolvers offered by DHCP when looking up information where security
|
||||||
|
status matters.
|
||||||
|
|
||||||
|
When faced with a situation where there are no satisfactory recursive
|
||||||
|
resolvers available, running one locally is RECOMMENDED. This has
|
||||||
|
the advantage that it can be trusted, and the AD bit can still be
|
||||||
|
used to allow applications to use stub resolvers.
|
||||||
|
|
||||||
|
|
||||||
|
4 - Security Considerations:
|
||||||
|
|
||||||
|
This document redefines a bit in the DNS header. If a resolver
|
||||||
|
trusts the value of the AD bit, it must be sure that the responder is
|
||||||
|
using the updated definition, which is any DNS server/resolver
|
||||||
|
supporting the OK bit[RFC3225].
|
||||||
|
|
||||||
|
Authoritative servers can be explicitly configured to set the AD bit
|
||||||
|
on answers without doing cryptographic checks. This behavior MUST be
|
||||||
|
off by default. The only affected resolvers are those that directly
|
||||||
|
query and trust the authoritative server, and this functionality
|
||||||
|
SHOULD only be used on servers that act both as authoritative servers
|
||||||
|
and recursive resolver.
|
||||||
|
|
||||||
|
Resolvers (full or stub) that trust the AD bit on answers from a
|
||||||
|
configured set of resolvers are DNSSEC security compliant.
|
||||||
|
|
||||||
|
|
||||||
|
5 - IANA Considerations:
|
||||||
|
|
||||||
|
None.
|
||||||
|
|
||||||
|
6 - Internationalization Considerations:
|
||||||
|
|
||||||
|
None. This document does not change any textual data in any
|
||||||
|
protocol.
|
||||||
|
|
||||||
|
7 - Acknowledgments:
|
||||||
|
|
||||||
|
The following people have provided input on this document: Robert
|
||||||
|
Elz, Andreas Gustafsson, Bob Halley, Steven Jacob, Erik Nordmark,
|
||||||
|
Edward Lewis, Jakob Schlyter, Roy Arends, Ted Lindgreen.
|
||||||
|
|
||||||
|
Normative References:
|
||||||
|
|
||||||
|
[RFC1035] P. Mockapetris, ``Domain Names - Implementation and
|
||||||
|
Specification'', STD 13, RFC 1035, November 1987.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Expires December 2002 [Page 5]
|
||||||
|
|
||||||
|
INTERNET-DRAFT AD bit set on secure answers June 2002
|
||||||
|
|
||||||
|
|
||||||
|
[RFC2535] D. Eastlake, ``Domain Name System Security Extensions'', RFC
|
||||||
|
2535, March 1999.
|
||||||
|
|
||||||
|
[RFC2845] P. Vixie, O. Gudmundsson, D. Eastlake, B. Wellington,
|
||||||
|
``Secret Key Transaction Authentication for DNS (TSIG)'', RFC
|
||||||
|
2845, May 2000.
|
||||||
|
|
||||||
|
[RFC2931] D. Eastlake, ``DNS Request and Transaction Signatures
|
||||||
|
(SIG(0))'', RFC 2931, September 2000.
|
||||||
|
|
||||||
|
[RFC3225] D. Conrad, ``Indicating Resolver Support of DNSSEC'', RFC
|
||||||
|
3225, December 2001.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Authors Addresses
|
||||||
|
|
||||||
|
Brian Wellington Olafur Gudmundsson
|
||||||
|
Nominum Inc.
|
||||||
|
2385 Bay Road 3826 Legation Street, NW
|
||||||
|
Redwood City, CA, 94063 Washington, DC, 20015
|
||||||
|
USA USA
|
||||||
|
<Brian.Wellington@nominum.com> <ogud@ogud.com>
|
||||||
|
|
||||||
|
|
||||||
|
Full Copyright Statement
|
||||||
|
|
||||||
|
Copyright (C) The Internet Society (2002>. All Rights Reserved.
|
||||||
|
|
||||||
|
This document and translations of it may be copied and furnished to
|
||||||
|
others, and derivative works that comment on or otherwise explain it
|
||||||
|
or assist in its implementation may be prepared, copied, published
|
||||||
|
and distributed, in whole or in part, without restriction of any
|
||||||
|
kind, provided that the above copyright notice and this paragraph are
|
||||||
|
included on all such copies and derivative works. However, this
|
||||||
|
document itself may not be modified in any way, such as by removing
|
||||||
|
the copyright notice or references to the Internet Society or other
|
||||||
|
Internet organizations, except as needed for the purpose of
|
||||||
|
developing Internet standards in which case the procedures for
|
||||||
|
copyrights defined in the Internet Standards process must be
|
||||||
|
followed, or as required to translate it into languages other than
|
||||||
|
English.
|
||||||
|
|
||||||
|
The limited permissions granted above are perpetual and will not be
|
||||||
|
revoked by the Internet Society or its successors or assigns.
|
||||||
|
|
||||||
|
This document and the information contained herein is provided on an
|
||||||
|
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||||||
|
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||||||
|
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Expires December 2002 [Page 6]
|
||||||
|
|
||||||
|
INTERNET-DRAFT AD bit set on secure answers June 2002
|
||||||
|
|
||||||
|
|
||||||
|
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||||||
|
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE."
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Expires December 2002 [Page 7]
|
Reference in New Issue
Block a user