new draft
This commit is contained in:
@@ -1,560 +0,0 @@
|
||||
|
||||
|
||||
DNS Extensions O. Kolkman
|
||||
Internet-Draft RIPE NCC
|
||||
Expires: January 16, 2004 J. Schlyter
|
||||
|
||||
E. Lewis
|
||||
ARIN
|
||||
July 18, 2003
|
||||
|
||||
|
||||
KEY RR Secure Entry Point (SEP) Flag
|
||||
draft-ietf-dnsext-keyrr-key-signing-flag-08
|
||||
|
||||
Status of this Memo
|
||||
|
||||
This document is an Internet-Draft and is in full conformance with
|
||||
all provisions of Section 10 of RFC2026.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering
|
||||
Task Force (IETF), its areas, and its working groups. Note that
|
||||
other groups may also distribute working documents as Internet-
|
||||
Drafts.
|
||||
|
||||
Internet-Drafts are draft documents valid for a maximum of six months
|
||||
and may be updated, replaced, or obsoleted by other documents at any
|
||||
time. It is inappropriate to use Internet-Drafts as reference
|
||||
material or to cite them other than as "work in progress."
|
||||
|
||||
The list of current Internet-Drafts can be accessed at http://
|
||||
www.ietf.org/ietf/1id-abstracts.txt.
|
||||
|
||||
The list of Internet-Draft Shadow Directories can be accessed at
|
||||
http://www.ietf.org/shadow.html.
|
||||
|
||||
This Internet-Draft will expire on January 16, 2004.
|
||||
|
||||
Copyright Notice
|
||||
|
||||
Copyright (C) The Internet Society (2003). All Rights Reserved.
|
||||
|
||||
Abstract
|
||||
|
||||
With the DS resource record the concept of a key acting as a secure
|
||||
entry point has been introduced. During key-exchanges with the
|
||||
parent there is a need to differentiate secure entry point keys from
|
||||
other keys in the KEY resource record set. A flag bit in the KEY RR
|
||||
is defined to indicate that KEY is to be used as a secure entry
|
||||
point.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires January 16, 2004 [Page 1]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point (SEP) Flag July 2003
|
||||
|
||||
|
||||
Table of Contents
|
||||
|
||||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
|
||||
2. The Secure Entry Point (SEP) Flag . . . . . . . . . . . . . . 4
|
||||
3. DNSSEC Protocol Changes . . . . . . . . . . . . . . . . . . . 4
|
||||
4. Operational Guidelines . . . . . . . . . . . . . . . . . . . . 4
|
||||
5. Security Considerations . . . . . . . . . . . . . . . . . . . 5
|
||||
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6
|
||||
7. Internationalization Considerations . . . . . . . . . . . . . 6
|
||||
8. Document Changes . . . . . . . . . . . . . . . . . . . . . . . 6
|
||||
8.1 draft version 00 -> 01 . . . . . . . . . . . . . . . . . . . . 6
|
||||
8.2 draft version 01 -> 02 . . . . . . . . . . . . . . . . . . . . 6
|
||||
8.3 draft version 02 -> 03 . . . . . . . . . . . . . . . . . . . . 6
|
||||
8.4 draft version 03 -> 04 . . . . . . . . . . . . . . . . . . . . 7
|
||||
8.5 draft version 04 -> 05 . . . . . . . . . . . . . . . . . . . . 7
|
||||
8.6 draft version 05 -> 06 . . . . . . . . . . . . . . . . . . . . 7
|
||||
8.7 draft version 06 -> 07 . . . . . . . . . . . . . . . . . . . . 7
|
||||
8.8 draft version 07 -> 08 . . . . . . . . . . . . . . . . . . . . 7
|
||||
9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 8
|
||||
Normative References . . . . . . . . . . . . . . . . . . . . . 8
|
||||
Informative References . . . . . . . . . . . . . . . . . . . . 8
|
||||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 9
|
||||
Full Copyright Statement . . . . . . . . . . . . . . . . . . . 10
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires January 16, 2004 [Page 2]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point (SEP) Flag July 2003
|
||||
|
||||
|
||||
1. Introduction
|
||||
|
||||
"All keys are equal but some keys are more equal than others" [6]
|
||||
|
||||
With the definition of the DS Resource Record [5] it has become
|
||||
important to differentiate between the zone keys that are (to be)
|
||||
pointed to by parental DS RRs and other keys in the zone. We refer
|
||||
to these keys as Secure Entry Point (SEP) keys. A SEP key is either
|
||||
used to generate a DS RR or is distributed to resolvers that use the
|
||||
key as the root of a trusted subtree[3].
|
||||
|
||||
In early deployment tests, the use of two (kinds of) keys in each
|
||||
zone has been prevalent. One key is used to sign just the zone's KEY
|
||||
RR set and is the key referenced by a DS RR at the parent or
|
||||
configured statically in a resolver. Another key is used to sign the
|
||||
rest of the zone's data sets. The former key is called a key-signing
|
||||
key (KSK) and the latter is called a zone-signing key (ZSK). In
|
||||
practice there have been usually one of each kind of key, but there
|
||||
will be multiples of each at times.
|
||||
|
||||
It should be noted that division of zone keys into KSK's and ZSK's is
|
||||
not mandatory in any definition of DNSSEC, not even with the
|
||||
introduction of the DS RR. But, in testing, this distinction has
|
||||
been helpful when designing key roll over (key super-cession)
|
||||
schemes. Given that the distinction has proven helpful, the labels
|
||||
KSK and ZSK have begun to stick.
|
||||
|
||||
There is a need to differentiate between a KSK and a ZSK by the zone
|
||||
administrator. This need is driven by knowing which keys are to be
|
||||
sent for DS RRs, which keys are to be distributed to resolvers, and
|
||||
which keys are fed to the signer application at the appropriate time.
|
||||
|
||||
The reason for the term "SEP" is a result of the observation that the
|
||||
distinction between KSK and ZSK is only significant to the signer
|
||||
element of the DNS. Servers, resolvers and verifiers do not need to
|
||||
make the distinction. Further, distinguishing between a KSK and ZSK
|
||||
requires more than one bit, as a key could be fulfilling both roles.
|
||||
Hence, there is no definition for a ZSK bit and another for a KSK
|
||||
bit, just a single bit to assist operational procedures to correctly
|
||||
generate DS RRs, or to indicate what keys are intended for static
|
||||
configuration.
|
||||
|
||||
In the flow between signer and (parental) key-collector and in the
|
||||
flow between the signer and the resolver configuration it is
|
||||
important to be able to differentiate the SEP keys from the other
|
||||
keys in a KEY RR set. The SEP flag is to be of no interest to the
|
||||
flow between the verifier and the authoritative data store.
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires January 16, 2004 [Page 3]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point (SEP) Flag July 2003
|
||||
|
||||
|
||||
The key words "MAY","MAY NOT", "MUST", "MUST NOT", "REQUIRED",
|
||||
"RECOMMENDED", "SHOULD", and "SHOULD NOT" in this document are to be
|
||||
interpreted as described in RFC2119.
|
||||
|
||||
2. The Secure Entry Point (SEP) Flag
|
||||
|
||||
|
||||
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
|
||||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
||||
| flags |S| protocol | algorithm |
|
||||
| |E| | |
|
||||
| |P| | |
|
||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
||||
| /
|
||||
/ public key /
|
||||
/ /
|
||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
||||
|
||||
KEY RR Format
|
||||
|
||||
|
||||
|
||||
The SEP bit (TBD) in the flags field is assigned to be the secure
|
||||
entry point flag. If the the bit is set to 1 the key is intended to
|
||||
be used as secure entry point key. One SHOULD NOT assign special
|
||||
meaning to the key if the bit is set to 0. The document proposes
|
||||
using the current 15th bit [4] as the SEP bit. This way operators
|
||||
can recognize the secure entry point key by the even or odd-ness of
|
||||
the decimal representation of the flag field.
|
||||
|
||||
3. DNSSEC Protocol Changes
|
||||
|
||||
The bit MUST NOT be used during the resolving and verification
|
||||
process. The SEP flag is only used to provide a hint about the
|
||||
different administrative properties of the key and therefore the use
|
||||
of the SEP flag does not change the DNS resolution and resolution
|
||||
protocol.
|
||||
|
||||
4. Operational Guidelines
|
||||
|
||||
The SEP bit is set by the key-generator and MAY be used by the zone
|
||||
signer to decide whether the key is to be prepared for input to a DS
|
||||
RR generation function. As the SEP bit is within the data that is
|
||||
used to compute a KEY RR's footprint, changing the SEP bit will
|
||||
change the identity of the key within DNS.
|
||||
|
||||
When a key pair is created, the operator needs to indicate whether
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires January 16, 2004 [Page 4]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point (SEP) Flag July 2003
|
||||
|
||||
|
||||
the SEP bit is to be set in the KEY RR. The SEP bit is recommended
|
||||
whenever the public key of the key pair will be distributed to the
|
||||
parent zone to build the authentication chain or if the public key is
|
||||
to be distributed for static configuration in verifiers.
|
||||
|
||||
When signing a zone, it is intended that the key(s) with the SEP bit
|
||||
set (if such keys exist) are used to sign the KEY RR set of the zone.
|
||||
The same key can be used to sign the rest of the zone data too. It
|
||||
is conceivable that not all keys with a SEP bit set will sign the KEY
|
||||
RR set, such keys might be pending retirement or not yet in use.
|
||||
|
||||
When verifying a RR set, the SEP bit is not intended to play a role.
|
||||
How the key is used by the verifier is not intended to be a
|
||||
consideration at key creation time.
|
||||
|
||||
Although the SEP flag provides a hint on which key to be used as
|
||||
trusted root, administrators can choose to ignore the fact that a KEY
|
||||
has its SEP bit set or not when configuring a trusted root for their
|
||||
resolvers.
|
||||
|
||||
Using the flag a key roll over can be automated. The parent can use
|
||||
an existing trust relation to verify key sets in which a new key with
|
||||
the SEP flag appears.
|
||||
|
||||
5. Security Considerations
|
||||
|
||||
As stated in Section 3 the flag is not to used in the resolution
|
||||
protocol or to determine the security status of a key. The flag is
|
||||
to be used for administrative purposes only.
|
||||
|
||||
No trust in a key should be inferred from this flag - trust MUST be
|
||||
inferred from an existing chain of trust or an out-of-band exchange.
|
||||
|
||||
Since this flag might be used for automating key exchanges, we think
|
||||
the following consideration is in place.
|
||||
|
||||
Automated mechanisms for roll over of the DS RR might be vulnerable
|
||||
to a class of replay attacks. This might happen after a key exchange
|
||||
where a key set, containing two keys with the SEP flag set, is sent
|
||||
to the parent. The parent verifies the key set with the existing
|
||||
trust relation and creates the new DS RR from the key that the
|
||||
current DS is not pointing to. This key exchange might be replayed.
|
||||
Parents are encouraged to implement a replay defense. A simple
|
||||
defense can be based on a registry of keys that have been used to
|
||||
generate DS RRs during the most recent roll over. These same
|
||||
considerations apply to entities that configure keys in resolvers.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires January 16, 2004 [Page 5]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point (SEP) Flag July 2003
|
||||
|
||||
|
||||
6. IANA Considerations
|
||||
|
||||
draft-ietf-dnsext-restrict-key-for-dnssec [4] eliminates all flags
|
||||
field except for the zone key flag in the KEY RR. We propose to use
|
||||
the 15'th bit as the SEP bit; the decimal representation of the
|
||||
flagfield will then be odd for key-signing keys.
|
||||
|
||||
7. Internationalization Considerations
|
||||
|
||||
Although SEP is a popular acronym in many different languages, there
|
||||
are no internationalization considerations.
|
||||
|
||||
8. Document Changes
|
||||
|
||||
8.1 draft version 00 -> 01
|
||||
|
||||
Clean up of references and correction of typos;
|
||||
|
||||
modified Abstract text a little;
|
||||
|
||||
Added explicit warning for replay attacks to the security section;
|
||||
|
||||
Removed the text that hinted on a distinction between a key-
|
||||
signing key configured in resolvers and in parent zones.
|
||||
|
||||
|
||||
8.2 draft version 01 -> 02
|
||||
|
||||
Added IANA and Internationalization section.
|
||||
|
||||
Split references into informational and normative.
|
||||
|
||||
Spelling and style corrections.
|
||||
|
||||
|
||||
8.3 draft version 02 -> 03
|
||||
|
||||
Changed the name from KS to KSK, this to prevent confusion with
|
||||
NS, DS and other acronyms in DNS.
|
||||
|
||||
In the security section: Rewrote the section so that it does not
|
||||
suggest to use a particular type of registry and that it is clear
|
||||
that a key registry is only one of the defenses possible.
|
||||
|
||||
Spelling and style corrections.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires January 16, 2004 [Page 6]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point (SEP) Flag July 2003
|
||||
|
||||
|
||||
8.4 draft version 03 -> 04
|
||||
|
||||
Text has been made consistent with the statement: ' No special
|
||||
meaning should be assigned to the bit not being set.'
|
||||
|
||||
Made explicit that the key tag changes in SIG RR.
|
||||
|
||||
|
||||
8.5 draft version 04 -> 05
|
||||
|
||||
One occurrence of must and one occurrence of should uppercased
|
||||
(RFC2119).
|
||||
|
||||
Reordering of sentences in section 3, so that the point of the bit
|
||||
NOT being used in resolving is made directly.
|
||||
|
||||
To make explicit that the KSK is used at key generation and at
|
||||
signing time I added the first sentence to section 4.
|
||||
|
||||
Some minor style and spelling corrections.
|
||||
|
||||
|
||||
8.6 draft version 05 -> 06
|
||||
|
||||
References and acronyms where stripped from the Abstract. the
|
||||
Introduction and the the Operational Guideline section were
|
||||
rewritten in such a way that the draft does not suggest any use of
|
||||
the bit in the verification process and that the draft does not
|
||||
enforce, but suggests, the use of a key- and zone-signing key.
|
||||
|
||||
Added 'and verification' in the sentence "MUST NOT be used during
|
||||
the resolving and verification process" (protocol changes
|
||||
section).
|
||||
|
||||
|
||||
8.7 draft version 06 -> 07
|
||||
|
||||
Based on comments during the last call we changed the name from
|
||||
KSK-flag to SEP flag. The introduction was rewritten to reflect
|
||||
the motivations of this name change and to stress that the SEP key
|
||||
is not relevant to the signer process.
|
||||
|
||||
|
||||
8.8 draft version 07 -> 08
|
||||
|
||||
During the edit of version 07, a paragraph got dropped from the
|
||||
introduction (See message by Lewis dd June 19, subject " Fwd: Re:
|
||||
NOTIFY + SIG(0) + DS => secure parent update?" (http://
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires January 16, 2004 [Page 7]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point (SEP) Flag July 2003
|
||||
|
||||
|
||||
ops.ietf.org/lists/nhamedroppers/namedroppers.2003/msg01336.html).
|
||||
This version re-introduces the paragraph, which caused some
|
||||
reordering and style changes in the introduction.
|
||||
|
||||
|
||||
9. Acknowledgments
|
||||
|
||||
The ideas documented in this document are inspired by communications
|
||||
we had with numerous people and ideas published by other folk. Among
|
||||
others Mark Andrews, Miek Gieben, Olafur Gudmundsson, Daniel
|
||||
Karrenberg, Dan Massey, Marcos Sanz and Sam Weiler have contributed
|
||||
ideas and provided feedback.
|
||||
|
||||
This document saw the light during a workshop on DNSSEC operations
|
||||
hosted by USC/ISI.
|
||||
|
||||
Normative References
|
||||
|
||||
[1] Bradner, S., "Key words for use in RFCs to Indicate Requirement
|
||||
Levels", BCP 14, RFC 2119, March 1997.
|
||||
|
||||
[2] Eastlake, D., "Domain Name System Security Extensions", RFC
|
||||
2535, March 1999.
|
||||
|
||||
[3] Lewis, E., "DNS Security Extension Clarification on Zone
|
||||
Status", RFC 3090, March 2001.
|
||||
|
||||
[4] Massey, D. and S. Rose, "Limiting the Scope of the KEY Resource
|
||||
Record (RR)", RFC 3445, December 2002.
|
||||
|
||||
Informative References
|
||||
|
||||
[5] Gudmundsson, O., "Delegation Signer Resource Record", draft-
|
||||
ietf-dnsext-delegation-signer-14 (work in progress), May 2003.
|
||||
|
||||
[6] Orwell, G. and R. Steadman (illustrator), "Animal Farm; a Fairy
|
||||
Story"", ISBN 0151002177 (50th anniversery edition), April 1996.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires January 16, 2004 [Page 8]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point (SEP) Flag July 2003
|
||||
|
||||
|
||||
Authors' Addresses
|
||||
|
||||
Olaf M. Kolkman
|
||||
RIPE NCC
|
||||
Singel 256
|
||||
Amsterdam 1016 AB
|
||||
NL
|
||||
|
||||
Phone: +31 20 535 4444
|
||||
EMail: olaf@ripe.net
|
||||
URI: http://www.ripe.net/
|
||||
|
||||
|
||||
Jakob Schlyter
|
||||
Karl Gustavsgatan 15
|
||||
Goteborg SE-411 25
|
||||
Sweden
|
||||
|
||||
EMail: jakob@schlyter.se
|
||||
|
||||
|
||||
Edward P. Lewis
|
||||
ARIN
|
||||
3635 Concorde Parkway Suite 200
|
||||
Chantilly, VA 20151
|
||||
US
|
||||
|
||||
Phone: +1 703 227 9854
|
||||
EMail: edlewis@arin.net
|
||||
URI: http://www.arin.net/
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires January 16, 2004 [Page 9]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point (SEP) Flag July 2003
|
||||
|
||||
|
||||
Full Copyright Statement
|
||||
|
||||
Copyright (C) The Internet Society (2003). All Rights Reserved.
|
||||
|
||||
This document and translations of it may be copied and furnished to
|
||||
others, and derivative works that comment on or otherwise explain it
|
||||
or assist in its implementation may be prepared, copied, published
|
||||
and distributed, in whole or in part, without restriction of any
|
||||
kind, provided that the above copyright notice and this paragraph are
|
||||
included on all such copies and derivative works. However, this
|
||||
document itself may not be modified in any way, such as by removing
|
||||
the copyright notice or references to the Internet Society or other
|
||||
Internet organizations, except as needed for the purpose of
|
||||
developing Internet standards in which case the procedures for
|
||||
copyrights defined in the Internet Standards process must be
|
||||
followed, or as required to translate it into languages other than
|
||||
English.
|
||||
|
||||
The limited permissions granted above are perpetual and will not be
|
||||
revoked by the Internet Society or its successors or assigns.
|
||||
|
||||
This document and the information contained herein is provided on an
|
||||
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||||
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||||
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||||
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||||
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
|
||||
Acknowledgement
|
||||
|
||||
Funding for the RFC Editor function is currently provided by the
|
||||
Internet Society.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires January 16, 2004 [Page 10]
|
||||
|
||||
507
doc/draft/draft-ietf-dnsext-keyrr-key-signing-flag-10.txt
Normal file
507
doc/draft/draft-ietf-dnsext-keyrr-key-signing-flag-10.txt
Normal file
@@ -0,0 +1,507 @@
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
DNS Extensions O. Kolkman
|
||||
Internet-Draft RIPE NCC
|
||||
Expires: March 28, 2004 J. Schlyter
|
||||
|
||||
E. Lewis
|
||||
ARIN
|
||||
September 28, 2003
|
||||
|
||||
|
||||
KEY RR Secure Entry Point Flag
|
||||
draft-ietf-dnsext-keyrr-key-signing-flag-10
|
||||
|
||||
Status of this Memo
|
||||
|
||||
This document is an Internet-Draft and is in full conformance with
|
||||
all provisions of Section 10 of RFC2026.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering
|
||||
Task Force (IETF), its areas, and its working groups. Note that other
|
||||
groups may also distribute working documents as Internet-Drafts.
|
||||
|
||||
Internet-Drafts are draft documents valid for a maximum of six months
|
||||
and may be updated, replaced, or obsoleted by other documents at any
|
||||
time. It is inappropriate to use Internet-Drafts as reference
|
||||
material or to cite them other than as "work in progress."
|
||||
|
||||
The list of current Internet-Drafts can be accessed at http://
|
||||
www.ietf.org/ietf/1id-abstracts.txt.
|
||||
|
||||
The list of Internet-Draft Shadow Directories can be accessed at
|
||||
http://www.ietf.org/shadow.html.
|
||||
|
||||
This Internet-Draft will expire on March 28, 2004.
|
||||
|
||||
Copyright Notice
|
||||
|
||||
Copyright (C) The Internet Society (2003). All Rights Reserved.
|
||||
|
||||
Abstract
|
||||
|
||||
With the Delegation Signer (DS) resource record the concept of a key
|
||||
acting as a secure entry point has been introduced. During
|
||||
key-exchanges with the parent there is a need to differentiate secure
|
||||
entry point keys from other keys in the KEY resource record (RR) set.
|
||||
A flag bit in the KEY RR is defined to indicate that KEY is to be
|
||||
used as a secure entry point. The flag bit is intended to assist in
|
||||
operational procedures to correctly generate DS resource records, or
|
||||
to indicate what keys are intended for static configuration. The flag
|
||||
bit is not to be used in the DNS verification protocol. This document
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires March 28, 2004 [Page 1]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point Flag September 2003
|
||||
|
||||
|
||||
updates RFC 2535 and RFC 3445.
|
||||
|
||||
Table of Contents
|
||||
|
||||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 3
|
||||
2. The Secure Entry Point (SEP) Flag . . . . . . . . . . . . . . . 4
|
||||
3. DNSSEC Protocol Changes . . . . . . . . . . . . . . . . . . . . 4
|
||||
4. Operational Guidelines . . . . . . . . . . . . . . . . . . . . . 4
|
||||
5. Security Considerations . . . . . . . . . . . . . . . . . . . . 5
|
||||
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 5
|
||||
7. Internationalization Considerations . . . . . . . . . . . . . . 6
|
||||
8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . 6
|
||||
Normative References . . . . . . . . . . . . . . . . . . . . . . 6
|
||||
Informative References . . . . . . . . . . . . . . . . . . . . . 6
|
||||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7
|
||||
Intellectual Property and Copyright Statements . . . . . . . . . 8
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires March 28, 2004 [Page 2]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point Flag September 2003
|
||||
|
||||
|
||||
1. Introduction
|
||||
|
||||
"All keys are equal but some keys are more equal than others" [6]
|
||||
|
||||
With the definition of the Delegation Signer Resource Record (DS RR)
|
||||
[5] it has become important to differentiate between the zone keys
|
||||
that are (to be) pointed to by parental DS RRs and other keys in the
|
||||
zone. We refer to these keys as Secure Entry Point (SEP) keys. A
|
||||
SEP key is either used to generate a DS RR or is distributed to
|
||||
resolvers that use the key as the root of a trusted subtree[3].
|
||||
|
||||
In early deployment tests, the use of two (kinds of) keys in each
|
||||
zone has been prevalent. One key is used to sign just the zone's KEY
|
||||
resource record (RR) set and is the key referenced by a DS RR at the
|
||||
parent or configured statically in a resolver. Another key is used to
|
||||
sign the rest of the zone's data sets. The former key is called a
|
||||
key-signing key (KSK) and the latter is called a zone-signing key
|
||||
(ZSK). In practice there have been usually one of each kind of key,
|
||||
but there will be multiples of each at times.
|
||||
|
||||
It should be noted that division of zone keys into KSK's and ZSK's is
|
||||
not mandatory in any definition of DNSSEC, not even with the
|
||||
introduction of the DS RR. But, in testing, this distinction has
|
||||
been helpful when designing key roll over (key super-cession)
|
||||
schemes. Given that the distinction has proven helpful, the labels
|
||||
KSK and ZSK have begun to stick.
|
||||
|
||||
There is a need to differentiate between a KSK and a ZSK by the zone
|
||||
administrator. This need is driven by knowing which keys are to be
|
||||
sent for DS RRs, which keys are to be distributed to resolvers, and
|
||||
which keys are fed to the signer application at the appropriate time.
|
||||
|
||||
In the flow between signer and (parental) key-collector and in the
|
||||
flow between the signer and the resolver configuration it is
|
||||
important to be able to differentiate the SEP keys from the other
|
||||
keys in a KEY RR set. The SEP flag is to be of no interest to the
|
||||
flow between the verifier and the authoritative data store.
|
||||
|
||||
The reason for the term "SEP" is a result of the observation that the
|
||||
distinction between KSK and ZSK is made by the signer, a key could be
|
||||
both a KSK and a ZSK. To be clear, the term SEP was coined to lessen
|
||||
the confusion caused by the overlap. (Once this label was applied, it
|
||||
had the side effect of removing the temptation to have a KSK flag bit
|
||||
and a ZSK flag bit, setting on needing just one bit.)
|
||||
|
||||
The key words "MAY","MAY NOT", "MUST", "MUST NOT", "REQUIRED",
|
||||
"RECOMMENDED", "SHOULD", and "SHOULD NOT" in this document are to be
|
||||
interpreted as described in RFC2119 [1].
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires March 28, 2004 [Page 3]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point Flag September 2003
|
||||
|
||||
|
||||
2. The Secure Entry Point (SEP) Flag
|
||||
|
||||
|
||||
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
|
||||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
||||
| flags |S| protocol | algorithm |
|
||||
| |E| | |
|
||||
| |P| | |
|
||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
||||
| /
|
||||
/ public key /
|
||||
/ /
|
||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
||||
|
||||
KEY RR Format
|
||||
|
||||
|
||||
|
||||
The SEP bit (TBD) in the flags field is assigned to be the secure
|
||||
entry point flag. If the the bit is set to 1 the key is intended to
|
||||
be used as secure entry point key. One SHOULD NOT assign special
|
||||
meaning to the key if the bit is set to 0. This document assigns the
|
||||
15'th bit [4] as the SEP bit. This way operators can recognize the
|
||||
secure entry point key by the even or odd-ness of the decimal
|
||||
representation of the flag field.
|
||||
|
||||
3. DNSSEC Protocol Changes
|
||||
|
||||
The bit MUST NOT be used during the resolving and verification
|
||||
process. The SEP flag is only used to provide a hint about the
|
||||
different administrative properties of the key and therefore the use
|
||||
of the SEP flag does not change the DNS resolution protocol or the
|
||||
resolution process.
|
||||
|
||||
4. Operational Guidelines
|
||||
|
||||
The SEP bit is set by the key-generator and MAY be used by the zone
|
||||
signer to decide whether the key is to be prepared for input to a DS
|
||||
RR generation function. The SEP bit is recommended to be set (to 1)
|
||||
whenever the public key of the key pair will be distributed to the
|
||||
parent zone to build the authentication chain or if the public key is
|
||||
to be distributed for static configuration in verifiers.
|
||||
|
||||
When a key pair is created, the operator needs to indicate whether
|
||||
the SEP bit is to be set in the KEY RR. As the SEP bit is within the
|
||||
data that is used to compute the 'key tag field' in the SIG RR,
|
||||
changing the SEP bit will change the identity of the key within DNS.
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires March 28, 2004 [Page 4]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point Flag September 2003
|
||||
|
||||
|
||||
In other words, once a key is used to generate signatures, the
|
||||
setting of the SEP bit is to remain constant. If not, a verifier will
|
||||
not be able to find the relevant KEY RR.
|
||||
|
||||
When signing a zone, it is intended that the key(s) with the SEP bit
|
||||
set (if such keys exist) are used to sign the KEY RR set of the zone.
|
||||
The same key can be used to sign the rest of the zone data too. It
|
||||
is conceivable that not all keys with a SEP bit set will sign the KEY
|
||||
RR set, such keys might be pending retirement or not yet in use.
|
||||
|
||||
When verifying a RR set, the SEP bit is not intended to play a role.
|
||||
How the key is used by the verifier is not intended to be a
|
||||
consideration at key creation time.
|
||||
|
||||
Although the SEP flag provides a hint on which key to be used as
|
||||
trusted root, administrators can choose to ignore the fact that a KEY
|
||||
has its SEP bit set or not when configuring a trusted root for their
|
||||
resolvers.
|
||||
|
||||
Using the flag a key roll over can be automated. The parent can use
|
||||
an existing trust relation to verify key sets in which a new key with
|
||||
the SEP flag appears.
|
||||
|
||||
5. Security Considerations
|
||||
|
||||
As stated in Section 3 the flag is not to be used in the resolution
|
||||
protocol or to determine the security status of a key. The flag is to
|
||||
be used for administrative purposes only.
|
||||
|
||||
No trust in a key should be inferred from this flag - trust MUST be
|
||||
inferred from an existing chain of trust or an out-of-band exchange.
|
||||
|
||||
Since this flag might be used for automating key exchanges, we think
|
||||
the following consideration is in place.
|
||||
|
||||
Automated mechanisms for roll over of the DS RR might be vulnerable
|
||||
to a class of replay attacks. This might happen after a key exchange
|
||||
where a key set, containing two keys with the SEP flag set, is sent
|
||||
to the parent. The parent verifies the key set with the existing
|
||||
trust relation and creates the new DS RR from the key that the
|
||||
current DS is not pointing to. This key exchange might be replayed.
|
||||
Parents are encouraged to implement a replay defense. A simple
|
||||
defense can be based on a registry of keys that have been used to
|
||||
generate DS RRs during the most recent roll over. These same
|
||||
considerations apply to entities that configure keys in resolvers.
|
||||
|
||||
6. IANA Considerations
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires March 28, 2004 [Page 5]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point Flag September 2003
|
||||
|
||||
|
||||
IANA considerations: The flag bits in the KEY RR are assigned by
|
||||
IETF consensus. There is no action on IANA.
|
||||
|
||||
7. Internationalization Considerations
|
||||
|
||||
Although SEP is a popular acronym in many different languages, there
|
||||
are no internationalization considerations.
|
||||
|
||||
8. Acknowledgments
|
||||
|
||||
The ideas documented in this document are inspired by communications
|
||||
we had with numerous people and ideas published by other folk. Among
|
||||
others Mark Andrews, Miek Gieben, Olafur Gudmundsson, Daniel
|
||||
Karrenberg, Dan Massey, Scott Rose, Marcos Sanz and Sam Weiler have
|
||||
contributed ideas and provided feedback.
|
||||
|
||||
This document saw the light during a workshop on DNSSEC operations
|
||||
hosted by USC/ISI in August 2002.
|
||||
|
||||
Normative References
|
||||
|
||||
[1] Bradner, S., "Key words for use in RFCs to Indicate Requirement
|
||||
Levels", BCP 14, RFC 2119, March 1997.
|
||||
|
||||
[2] Eastlake, D., "Domain Name System Security Extensions", RFC
|
||||
2535, March 1999.
|
||||
|
||||
[3] Lewis, E., "DNS Security Extension Clarification on Zone
|
||||
Status", RFC 3090, March 2001.
|
||||
|
||||
[4] Massey, D. and S. Rose, "Limiting the Scope of the KEY Resource
|
||||
Record (RR)", RFC 3445, December 2002.
|
||||
|
||||
Informative References
|
||||
|
||||
[5] Gudmundsson, O., "Delegation Signer Resource Record",
|
||||
draft-ietf-dnsext-delegation-signer-15 (work in progress), June
|
||||
2003.
|
||||
|
||||
[6] Orwell, G. and R. Steadman (illustrator), "Animal Farm; a Fairy
|
||||
Story", ISBN 0151002177 (50th anniversary edition), April 1996.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires March 28, 2004 [Page 6]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point Flag September 2003
|
||||
|
||||
|
||||
Authors' Addresses
|
||||
|
||||
Olaf M. Kolkman
|
||||
RIPE NCC
|
||||
Singel 256
|
||||
Amsterdam 1016 AB
|
||||
NL
|
||||
|
||||
Phone: +31 20 535 4444
|
||||
EMail: olaf@ripe.net
|
||||
URI: http://www.ripe.net/
|
||||
|
||||
|
||||
Jakob Schlyter
|
||||
Karl Gustavsgatan 15
|
||||
Goteborg SE-411 25
|
||||
Sweden
|
||||
|
||||
EMail: jakob@schlyter.se
|
||||
|
||||
|
||||
Edward P. Lewis
|
||||
ARIN
|
||||
3635 Concorde Parkway Suite 200
|
||||
Chantilly, VA 20151
|
||||
US
|
||||
|
||||
Phone: +1 703 227 9854
|
||||
EMail: edlewis@arin.net
|
||||
URI: http://www.arin.net/
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires March 28, 2004 [Page 7]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point Flag September 2003
|
||||
|
||||
|
||||
Intellectual Property Statement
|
||||
|
||||
The IETF takes no position regarding the validity or scope of any
|
||||
intellectual property or other rights that might be claimed to
|
||||
pertain to the implementation or use of the technology described in
|
||||
this document or the extent to which any license under such rights
|
||||
might or might not be available; neither does it represent that it
|
||||
has made any effort to identify any such rights. Information on the
|
||||
IETF's procedures with respect to rights in standards-track and
|
||||
standards-related documentation can be found in BCP-11. Copies of
|
||||
claims of rights made available for publication and any assurances of
|
||||
licenses to be made available, or the result of an attempt made to
|
||||
obtain a general license or permission for the use of such
|
||||
proprietary rights by implementors or users of this specification can
|
||||
be obtained from the IETF Secretariat.
|
||||
|
||||
The IETF invites any interested party to bring to its attention any
|
||||
copyrights, patents or patent applications, or other proprietary
|
||||
rights which may cover technology that may be required to practice
|
||||
this standard. Please address the information to the IETF Executive
|
||||
Director.
|
||||
|
||||
|
||||
Full Copyright Statement
|
||||
|
||||
Copyright (C) The Internet Society (2003). All Rights Reserved.
|
||||
|
||||
This document and translations of it may be copied and furnished to
|
||||
others, and derivative works that comment on or otherwise explain it
|
||||
or assist in its implementation may be prepared, copied, published
|
||||
and distributed, in whole or in part, without restriction of any
|
||||
kind, provided that the above copyright notice and this paragraph are
|
||||
included on all such copies and derivative works. However, this
|
||||
document itself may not be modified in any way, such as by removing
|
||||
the copyright notice or references to the Internet Society or other
|
||||
Internet organizations, except as needed for the purpose of
|
||||
developing Internet standards in which case the procedures for
|
||||
copyrights defined in the Internet Standards process must be
|
||||
followed, or as required to translate it into languages other than
|
||||
English.
|
||||
|
||||
The limited permissions granted above are perpetual and will not be
|
||||
revoked by the Internet Society or its successors or assignees.
|
||||
|
||||
This document and the information contained herein is provided on an
|
||||
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||||
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||||
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires March 28, 2004 [Page 8]
|
||||
|
||||
Internet-Draft KEY RR Secure Entry Point Flag September 2003
|
||||
|
||||
|
||||
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||||
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
|
||||
|
||||
Acknowledgment
|
||||
|
||||
Funding for the RFC Editor function is currently provided by the
|
||||
Internet Society.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman, et al. Expires March 28, 2004 [Page 9]
|
||||
|
||||
File diff suppressed because it is too large
Load Diff
Reference in New Issue
Block a user