This commit is contained in:
Brian Wellington
2001-12-10 04:49:32 +00:00
parent 5157792c8d
commit 23924b681e
3 changed files with 641 additions and 19 deletions

View File

@@ -1,14 +1,15 @@
INTERNET-DRAFT Diffie-Hellman Keys in the DNS
OBSOLETES: RFC 2539 Donald Eastlake 3rd
Motorola
Expires: January 2002 July 2001
Expires: May 2002 November 2001
Storage of Diffie-Hellman Keys in the Domain Name System (DNS)
------- -- -------------- ---- -- --- ------ ---- ------ -----
<draft-ietf-dnsext-rfc2539bis-dhk-00.txt>
<draft-ietf-dnsext-rfc2539bis-dhk-01.txt>
Donald E. Eastlake 3rd
@@ -53,7 +54,7 @@ Status of This Document
Donald Eastlake 3rd [Page 1]
D. Eastlake 3rd [Page 1]
INTERNET-DRAFT Diffie-Hellman Keys in the DNS
@@ -111,7 +112,7 @@ Acknowledgements
Donald Eastlake 3rd [Page 2]
D. Eastlake 3rd [Page 2]
INTERNET-DRAFT Diffie-Hellman Keys in the DNS
@@ -169,7 +170,7 @@ Table of Contents
Donald Eastlake 3rd [Page 3]
D. Eastlake 3rd [Page 3]
INTERNET-DRAFT Diffie-Hellman Keys in the DNS
@@ -177,11 +178,11 @@ INTERNET-DRAFT Diffie-Hellman Keys in the DNS
1. Introduction
The Domain Name System (DNS) is the current global hierarchical
replicated distributed database system for Internet addressing, mail
proxy, and similar information. The DNS has been extended to include
digital signatures and cryptographic keys as described in [RFC 2535].
Thus the DNS can now be used for secure key distribution.
The Domain Name System (DNS) is the global hierarchical replicated
distributed database system for Internet addressing, mail proxy, and
similar information. The DNS has been extended to include digital
signatures and cryptographic keys as described in [RFC 2535]. Thus
the DNS can now be secured and used for key distribution.
@@ -189,7 +190,7 @@ INTERNET-DRAFT Diffie-Hellman Keys in the DNS
This document describes how to store Diffie-Hellman keys in the DNS.
Familiarity with the Diffie-Hellman key exchange algorithm is assumed
[Schneier].
[Schneier, RFC 2631].
@@ -227,7 +228,7 @@ INTERNET-DRAFT Diffie-Hellman Keys in the DNS
in deciding on a p and g, see [RFC 2631].
Donald Eastlake 3rd [Page 4]
D. Eastlake 3rd [Page 4]
INTERNET-DRAFT Diffie-Hellman Keys in the DNS
@@ -285,7 +286,7 @@ INTERNET-DRAFT Diffie-Hellman Keys in the DNS
Donald Eastlake 3rd [Page 5]
D. Eastlake 3rd [Page 5]
INTERNET-DRAFT Diffie-Hellman Keys in the DNS
@@ -343,7 +344,7 @@ INTERNET-DRAFT Diffie-Hellman Keys in the DNS
Donald Eastlake 3rd [Page 6]
D. Eastlake 3rd [Page 6]
INTERNET-DRAFT Diffie-Hellman Keys in the DNS
@@ -394,14 +395,14 @@ Author's Address
Expiration and File Name
This draft expires in January 2002.
This draft expires in May 2002.
Its file name is draft-ietf-dnsext-rfc2539bis-dhk-00.txt.
Its file name is draft-ietf-dnsext-rfc2539bis-dhk-01.txt.
Donald Eastlake 3rd [Page 7]
D. Eastlake 3rd [Page 7]
INTERNET-DRAFT Diffie-Hellman Keys in the DNS
@@ -459,7 +460,7 @@ A.2. Well-Known Group 2: A 1024 bit prime
Donald Eastlake 3rd [Page 8]
D. Eastlake 3rd [Page 8]
INTERNET-DRAFT Diffie-Hellman Keys in the DNS
@@ -517,5 +518,5 @@ A.3. Well-Known Group 3: A 1536 bit prime
Donald Eastlake 3rd [Page 9]
D. Eastlake 3rd [Page 9]

View File

@@ -0,0 +1,480 @@
Internet Engineering Task Force Alain Durand
INTERNET-DRAFT SUN Microsystems
November 20, 2001 Johan Ihren
Expires May 21, 2002 Autonomica AB
NGtrans IPv6 DNS operational requirements and roadmap
draft-ietf-ngtrans-dns-ops-req-03.txt
Status of this memo
This memo provides information to the Internet community. It does
not specify an Internet standard of any kind. This memo is in full
conformance with all provisions of Section 10 of RFC2026 [RFC2026].
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Abstract
This document describes IPv6 DNS operational requirements and
deployment roadmap steps. It is the result of discussion from members
of the IPv6, NGtrans, DNSop and DNSext working groups. The DNS is
looked as a critical part of the Internet infrastructure and is used
for much more purposes than name to address resolution. Thus a
smooth operation of the DNS is critical in the IPv6 transition.
Discussion of this memo should happen in the NGtrans mailing list.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
1. DNS issues in a mixed IPv4/IPv6 environment
IPv4 and IPv6 are two versions of the same original concept, but they
are not "binary compatible". That is, a datagram send by one version
of IP cannot be received by the other. Several things can go wrong
when operating DNS in a mixed environment IPv4 and IPv6.
1.1 Following the referral chain
The caching resolver that tries to lookup a name starts out at the
root, and follows referrals until it is referred to a nameserver that
is authoritative for the name. If somewhere down the chain of
referrals it is referred to a nameserver that is only accessible over
a type of transport that is unavailable, a traditional nameserver is
unable to finish the task.
When the Internet moves from IPv4 to a mixture of IPv4 and IPv6 it is
only a matter of time until this starts to happen and the complete
DNS hierarchy starts to fragment into a graph where authoritative
nameservers for certain nodes are only accessible over a certain
transport. What is feared is that a node using only a particular
version of IP, querying information about another node using the same
version of IP can not do it because, somewhere in the chain of
servers accessed during the resolution process, one or more of them
will only be accessible with the other version of IP.
1.2 Examples of problems for an IPv6 only resolver
This problem shows for IPv6 only resolver trying to fetch data from a
zone that is served by IPv6 servers when somewhere in the referral
chain, the list of name servers pointed at does not contain any IPv6
reachable server.
Hints for the root:
X.ROOT-SERVERS.NET IN A 100.100.100.101
X.ROOT-SERVERS.NET IN AAAA 3ffe:ffff:100:100::1
In the root zone:
org. IN NS dot-org.X.ROOT-SERVERS.NET
dot-org.X.ROOT-SERVERS.NET IN A 100.100.100.102
In the .org zone:
foobar.org. IN NS ns.foobar.org
ns.foobar.org IN A 200.200.200.201
ns.foobar.org IN AAAA 3ffe:ffff:200:200::201
In the foobar.org zone:
www.foorbar.org IN AAAA 3ffe:ffff:200:200::202
Although the zone foobar.org and the root are served by an IPv6
server, an IPv6 only resolver can not resolve www.foobar.org because
there is no IPv6 server for the parent zone .org.
1.3 Examples of problems for an IPv4 only resolver
Another instance of the problem shows for an IPv4 only MTA trying to
send mail to someone in an IPv6 only domain which has made provision
to have an IPv4 reachable MX.
In the .org zone:
foobar.org. IN NS ns.foobar.org
ns.foobar.org IN AAAA 3ffe:ffff:200:200::201
3rd_party_dualstack_mail.org. IN NS ns.3rd_party_dualstack.org.
ns.3rd_party_dualstack.org. IN A 100.100.100.103
in the foobar.org zone:
foobar.org IN MX 10 mail6.foobar.org.
foobar.org IN MX 20 mail4.3rd_party_dualstack.org.
mail6.foobar.org. IN AAAA 3ffe:ffff:200:200::202
in the 3rd_party_dualstack_mail.org zone:
mail4.3rd_party_dualstack.org. IN A 100.100.100.104
An IPv4 only host cannot get the information about the IPv4 MX relay
mail4.3rd_party_dualstack_mail.org because the foobar.org zone is not
served by an IPv4 DNS server.
2. Fundamental requirements
2.1 Uniqueness of the DNS root
[RFC2826] requires the existence of a globally unique public name
space derived from a unique root. This root is valid for both IPv4
and IPv6.
--------------------------------------------------------------------
Requirement 1:
The public DNS has a unique root valid for IPv4 & IPv6.
--------------------------------------------------------------------
2.2 DNS should be an IP version agnostic application
Although DNS is regarded as a key component of the Internet
infrastructure, it is an application at layer 7 of OSI model and
should be independent from particular protocol choice at the network
layer. Some record type, like CNAME or MX are clearly IP version
agnostic. Even data like A, AAAA or PTR records contained in the DNS
may be relevant to particular applications requesting then regardless
of the IP version used during the queries. Also, [RFC2826] states, "A
DNS name can be passed from one party to another without altering the
semantic intent of the name." So, this is not because a particular
host can only communicate with a certain version of IP that it should
be prevented to query information regarding the over version of IP.
Another way of saying this is to say that the DNS data are
independent of the particular version of IP used to carry them.
--------------------------------------------------------------------
Requirement 2:
Any node SHOULD be able to query any data from the DNS regardless of
the IP versions used for the transport of the queries and responses
issued by the various parties in place.
--------------------------------------------------------------------
2.3 Transition is a long journey
It is usually believed that transition can happen simultaneously following
two main scenarios.
- Incremental deployment on existing network.
This needs to be done without disturbing IPv4 service. This
strategy relies heavily on dual-stack nodes and tunnels. It is
foreseen that this scenario is likely to happen in corporate
networks.
- Large scale deployment of new infrastructure
This scenario envision large to very large networks where public
IPv4 address space is not available and private address is not
practical. Nodes in this scenario will very likely be IPv6-only
or IPv6-mostly (getting an IPv4 address only on demand). Note
that those networks will still need to communicate with the rest
of the Internet.
Given the two above scenarios, the requirements discussed in this
memo are not targeted at transitioning the DNS from IPv4 only to IPv6
only, but more at the transition of IPv4 only to a mixed environment,
where some systems will be IPv4 only, some will be IPv6 only and
others will be dual-stacked.
It is generally admitted that, the burden of transition should be
placed on the new IPv6 systems and their local IPv6 infrastructure.
Ad-hoc administrative practices such as a local dual stack resolver
or locally Local dual stack resolver or locally administered NAT-PT
translator [RFC2766] could enable networks where some dual stacks
node are available to query IPv4 only DNS servers. (Note that NAT-PT
would have to be modified for that purpose as it translate AAAA
queries into A queries.) Administrative practices requiring any zone
served by IPv6 only servers to be also served by IPv4 servers would
enable IPv4 only resolvers to perform DNS queries for those zones.
However, the requirements described here are looking at solving the
long term problem. Although dual stack networks will be common in the
early days of transition, IPv6 only networks would eventually be a
reality and solutions describe above would not be practical.
--------------------------------------------------------------------
Requirement 3:
A global bridging system IS REQUIRED to enable networks operating
with only one version of IP to query zones of the public DNS that are
only served by systems operating only with the over version of IP.
--------------------------------------------------------------------
The choice and the details of this bridging system are beyond the
scope of this document and should be discussed in the DNSop and
DNSext working groups. It can be the case that a general purpose,
ubiquitous translator will be the right thing or that a DNS specific
solution must be developed. If new pieces of protocols are needed in
the resolvers, due to the extraordinary amount of time it takes to
define then, implement them, test them, ship them into existing
products and get them deployed, works should start as soon as
possible.
3. Bridging system requirements
Even though bridging has to work both ways, it is not strictly
necessary to use the same technique in each direction. That is, it is
perfectly acceptable to build two different mechanisms, one to enable
IPv4 only hosts to query IPv6 only DNS servers and one for IPv6 only
hosts to query IPv4 only DNS servers. It is also possible that part
of the bridging system consists of a set of administrative procedures
required to operate DNS zones.
3.1 IPv4 contraints
Due to the very large IPv4 deployment phase, any solution that will
require any change either on binaries or configurations on every IPv4
resolvers is out of scope.
3.2 Scaling the bridging system
The bridging system that enable a resolver to query data from a
server which use a different IP version will have to be in place for
a long time. It will be a key part of the general IPv6 transition and
will heavily be used.
--------------------------------------------------------------------
Requirement 4:
The bridging system SHOULD have good scaling properties.
--------------------------------------------------------------------
3.3 Scaling even more the bridging system
Auto configuration is the tendency for end systems. Resolver SHOULD
have a way to discover the bridging system components. This
discovery mechanism SHOULD also have good scaling properties.
--------------------------------------------------------------------
Requirement 5:
The discovery mechanism of the bridging system SHOULD have good
scaling properties.
--------------------------------------------------------------------
3.3 Scope of the bridging system
The bridging systems SHOULD be able to bridge any zones. In
particular, until there is an IPv6 root name server, the bridging
systems SHOULD be able to bridge the IPv4 root.
--------------------------------------------------------------------
Requirement 6:
All zones (even the root) SHOULD be reachable via the bridging
system.
--------------------------------------------------------------------
3.4 Security matters
Being a critical piece of the Internet infrastructure, the DNS is a
potential value target and thus should be protected. Great care
should be used not to introduce new security issues while designing
the bridging system.
--------------------------------------------------------------------
Requirement 7:
The bridging system SHOULD NOT introduce new security hazards.
--------------------------------------------------------------------
3.5 bridging from IPv4
Although the details of the bridging systems are beyond the scope of
this document, it may be the case that there is no general solution
to allow an unmodified IPv4 resolver to query an IPv6 only name
server. In that would be the case, the IPv4 to IPv6 bridging system
could consist of an operational procedure:
--------------------------------------------------------------------
Possible operational procedure to bridge from IPv4 to IPv6:
Any zone SHOULD be served by at least one IPv4 DNS server.
--------------------------------------------------------------------
4. Roadmap for DNS service in a mixed environment IPv4/IPv6
4.1 Bridging system
A bridging system satisfying all the above requirements SHOULD be in
place as early as possible to allow large scale IPv6 only DNS
deployment.
--------------------------------------------------------------------
Roadmap step 1:
A robust, scalable bridging system should be defined, agreed and put
in place as soon as possible.
--------------------------------------------------------------------
4.2 Root name service accessible via IPv6
The first DNS query a caching resolver will send is directed to a
root name server. This, if the configuration of the bridging system
is derived automatically from the DNS itself, there is a strong
requirement to make root name service available over IPv6 transport.
If the configuration is derived any other way or is done manually,
there is a possibility to operate the system without an IPv6
accessible root in certain cases. However, as this document does not
want to preclude any particular implementation of the bridging system
at this point, it is highly recommended that some IPv6 enable root
name server be in place as early as possible. It is an important
step to show that IPv6 DNS deployment is possible.
--------------------------------------------------------------------
Roadmap step 2:
The root SHOULD have at least one IPv6 name server.
--------------------------------------------------------------------
4.3 TLDs servers accessible via IPv6
Having the capability to query a root name server using IPv6 is just
the first step. The next one is to query a TLD for a NS record
pointing to a domain name. Again, although not strictly necessary
from a technical perspective, it is important to make sure that some
TLD servers are accessible from the beginning via IPv6 so at least
some label strings are resolvable with IPv6 transport without
resorting to the bridging system.
Also note that great care should be taken when adding IPv6 glue in
the TLD delegation by the root.
--------------------------------------------------------------------
Roadmap step 3:
Each TLD zone SHOULD have at least one IPv6 name server.
--------------------------------------------------------------------
4.4 IPv6 glue at TLD registries.
Whenever glue is needed, it is necessary for domains delegated under
a TLD to be able to specify an IPv6 name server address to the TLD
registry. This is not so much a protocol issue but a management and
procedural issue.
--------------------------------------------------------------------
Roadmap step 4:
Domains registering under TLDs SHOULD be able to specify IPv6 glue
wherever they are specifying IPv4 glue today.
--------------------------------------------------------------------
4.5 Reverse path DNS servers
Reverse DNS queries should also be supported in IPv6, for the same
reasons as direct queries. Today's resolvers do reverse nibbles
queries under the ip6.int tree. [RFC3152] has deprecated ip6.int,
thus reverse DNS queries MUST be moved to ip6.arpa. So, although
again not strictly speaking a technical requirement, it is important
to have at least one server for ip6.arpa accessible via IPv6.
--------------------------------------------------------------------
Roadmap step 5:
The ip6.arpa zone SHOULD have at least one IPv6 server.
--------------------------------------------------------------------
5. Security considerations
Any bridging system, acting as open relay, could be misused to create
denial of service attacks on external DNS servers. Some provision
SHOULD be made in the design of those relay to deal with this issue.
6 Authors addresses
Alain Durand
SUN Microsystems, Inc
901 San Antonio Road
MPK17-202
Palo Alto, CA 94303-4900
USA
Mail: Alain.Durand@sun.com
Johan Ihren
Autonomica AB
Bellmansgatan 30
SE-118 47 Stockholm, Sweden
johani@autonomica.se
7. References
[RFC2026] Bradner, S.,
"The Internet Standards Process -- Revision 3",
BCP 9, RFC 2026, October 1996
[RFC2119] Bradner, S.,
"Key words for use in RFCs to Indicate Requirement Levels",
BCP 14, RFC 2119, March 199
[RFC3152] Bush, R.,
"Delegation of IP6.ARPA",
RFC 3152, August 2001
[RFC2826] Internet Architecture Board,
"IAB Technical Comment on the Unique DNS Root",
RFC 2826, May 2000
[RFC2766] Tsirtsis, G., Srisuresh, P.,
"Network Address Translation - Protocol Translation (NAT-PT)",
RFC 2766, February 2000

View File

@@ -0,0 +1,141 @@
Internet Engineering Task Force Ed Lewis
Internet-Draft NAI Labs
July 9, 2001 Expires: January 9, 2002
DNS KEY Resource Record Generic Protocol Value
<draft-lewis-dnsext-key-genprot-00.txt>
Status of this Memo
This document is an Internet-Draft and is in full conformance with all
provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering Task
Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This draft expires on January 9, 2002.
Copyright Notice
Copyright (C) The Internet Society (2001). All rights reserved.
Abstract
A new protocol value is defined for the KEY Resource Record which
identifies the intended protocol as that identified in the SRV-like
encoding of the KEY RR's owner name.
1.0 Introduction
Starting with discussions concerning the mixing of zone keys and
application keys at a zone apex, with the implication that the signing
of the apex set makes the parent responsible for signing data
inherently specific to the child zone, various proposals have been
made to eliminate that issue. One such proposal is to separate keys
by using the owner name, a la the SRV record. E.g., for a host named
"host.myzone.test." a key used for SSH might be found at
"_ssh._tcp.host.myzone.test." [RFC 2782]
Other motivations for this proposal and approach to naming key is to
address issues including: concerns over size of the apex key set and
the extensive use of sub-typing KEY records. Since it is desirable
to send the apex key set as additional data, it would be good to
limit its size (by not having to include non-zone keys). Subtyping
refers to making a resolver filter a returned RR set to extract
the subset of records that meets the query's intent.
This draft is not intended to document the SRV naming proposal, nor
are any of the examples represented here suggestions for naming
conventions. The intent of the draft is to define a catch-all protocol
value which informs a resolver that the intended protocol for this key
is encoded in the ownership name.
If this (or a) generic protocol proposal is not adopted, yet a naming
convention is used, the impact is that for each new protocol a new
IANA-defined value is needed for the protocol octet in addition to a
new specific naming convention. This proposal is just a means to ease
the burden on IANA.
2.0 KEY RR Protocol Value
The unsigned integer value of <foobar> is reserved to mean that the
owner name indicates the intended protocol of the KEY RR.
3.0 Acknowledgements
This proposal has been made in conversation with Jakob Schylter and
Ilja Hallberg at a DNS meeting in Malmo Sweden.
4.0 IANA Considerations
A protocol number assignment for the DNS Key Resource Record is
requested. The specific value is not considered important.
A suggestion to IANA is made regarding the KEY RR protocol values.
One suggested assignment algorithm (perhaps this needs a different
draft) is to assign the protocol number according to the reserved port
number. This may help in uniqueness.
5.0 Security Considerations
This draft introduces no new security issues.
6.0 References
The text of any RFC may be retrieved by a web browser by requesting
the URL: ftp://ftp.isi.edu/in-notes/rfc<wxyz>.txt, where "wxyz" is the
number of the RFC.
[RFC 2026] "The Internet Standards Process -- Revision 3", Bradner
[RFC 2535] "Domain Name System Security Extensions", Eastlake
[RFC 2782] "A DNS RR for specifying the location of services (DNS SRV)",
Gulbrandsen, Vixie, Esibov
7.0 Editor's Address
Edward Lewis
<lewis@tislabs.com>
3060 Washington Rd (Rte 97)
Glenwood, MD 21738
+1(443)259-2352
8.0 Full Copyright Statement
Copyright (C) The Internet Society 2001. All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published and
distributed, in whole or in part, without restriction of any kind,
provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of developing
Internet standards in which case the procedures for copyrights defined
in the Internet Standards process must be followed, or as required to
translate it into languages other than English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT
NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN
WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.