617 lines
26 KiB
Plaintext
617 lines
26 KiB
Plaintext
|
||
|
||
|
||
Domain Name System Operations W. Wijngaards
|
||
Internet-Draft O. Kolkman
|
||
Intended status: Standards Track NLnet Labs
|
||
Expires: December 31, 2010 June 29, 2010
|
||
|
||
|
||
DNSSEC Trust Anchor History Service
|
||
draft-ietf-dnsop-dnssec-trust-history-02
|
||
|
||
Abstract
|
||
|
||
When DNS validators have trusted keys, but have been offline for a
|
||
longer period, key rollover will fail and they are stuck with stale
|
||
trust anchors. History service allows validators to query for older
|
||
DNSKEY RRsets and pick up the rollover trail where they left off.
|
||
|
||
Requirements Language
|
||
|
||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
||
document are to be interpreted as described in RFC 2119 [RFC2119].
|
||
|
||
Status of This Memo
|
||
|
||
This Internet-Draft is submitted in full conformance with the
|
||
provisions of BCP 78 and BCP 79.
|
||
|
||
Internet-Drafts are working documents of the Internet Engineering
|
||
Task Force (IETF). Note that other groups may also distribute
|
||
working documents as Internet-Drafts. The list of current Internet-
|
||
Drafts is at http://datatracker.ietf.org/drafts/current/.
|
||
|
||
Internet-Drafts are draft documents valid for a maximum of six months
|
||
and may be updated, replaced, or obsoleted by other documents at any
|
||
time. It is inappropriate to use Internet-Drafts as reference
|
||
material or to cite them other than as "work in progress."
|
||
|
||
This Internet-Draft will expire on December 31, 2010.
|
||
|
||
Copyright Notice
|
||
|
||
Copyright (c) 2010 IETF Trust and the persons identified as the
|
||
document authors. All rights reserved.
|
||
|
||
This document is subject to BCP 78 and the IETF Trust's Legal
|
||
Provisions Relating to IETF Documents
|
||
(http://trustee.ietf.org/license-info) in effect on the date of
|
||
publication of this document. Please review these documents
|
||
|
||
|
||
|
||
Wijngaards & Kolkman Expires December 31, 2010 [Page 1]
|
||
|
||
Internet-Draft Trust History Service June 2010
|
||
|
||
|
||
carefully, as they describe your rights and restrictions with respect
|
||
to this document. Code Components extracted from this document must
|
||
include Simplified BSD License text as described in Section 4.e of
|
||
the Trust Legal Provisions and are provided without warranty as
|
||
described in the Simplified BSD License.
|
||
|
||
1. Introduction
|
||
|
||
This memo defines a trust history service for DNS validators -- the
|
||
component in a resolver that performs DNSSEC [RFC4034] validation,
|
||
validator for short.
|
||
|
||
A validator that has been offline or missed an (emergency) rollover
|
||
can use this service to reconfigure themselves with the current
|
||
trust-anchor. Using a newly defined resource record (RR) that links
|
||
old DNSKEYS together, the TALINK RR, a validator fetches old DNSKEY
|
||
RRsets and checks they form a chain to the latest key (see
|
||
Section 3). The lists of old DNSKEYS, linked with the TALINK RRs, do
|
||
not necessarily need to be published in the zone for which the DNSKEY
|
||
history is being maintained but can be published in any DNS domain.
|
||
We will call the entity that offers the trust history the History
|
||
Provider. The choice of the History Provider is made by the
|
||
maintainer of the validator, possibly based on a hint provided, using
|
||
the TALINK, by the zone owner.
|
||
|
||
Section 2 provides background on the mechanism and usage. It looks
|
||
at the viewpoints of publishers and consumers of trust anchors, the
|
||
use of keys with revocation flags, and SEP flags.
|
||
|
||
The algorithm that the validator uses to construct a history and
|
||
reconfigure a new key is detailed in Section 4, it uses the TALINK RR
|
||
type defined in Section 3. The algorithms for how providers of trust
|
||
history can fetch the DNSKEY data as published by the zone they track
|
||
and publish that are explained in Section 5.
|
||
|
||
2. Motivation and Description
|
||
|
||
Validators provide a service in DNSSEC that can be seen from two
|
||
ways. Seen from the publisher's point of view, they provide
|
||
assurance that the data as received is as it was when it left the
|
||
publisher's hands. In this way of looking at things, validators
|
||
provide a publication integrity service. The publisher can be
|
||
confident that nobody can alter the published data (if it is
|
||
validated), because any alteration will be detected. So it protects
|
||
a publisher from being seen to send someone to the wrong place.
|
||
|
||
From the consumer's point of view, validators provide a reason to
|
||
trust the data from the network. In this view, the validator is
|
||
|
||
|
||
|
||
Wijngaards & Kolkman Expires December 31, 2010 [Page 2]
|
||
|
||
Internet-Draft Trust History Service June 2010
|
||
|
||
|
||
making a claim about whether the data ought to be accepted or not.
|
||
This is subtly different from the publisher's point of view, because
|
||
the question for the consumer is not whether the data is safe while
|
||
the consumer is not looking, but whether the data is safe for the
|
||
consumer at the moment of consumption. Validation protects a
|
||
consumer from going to the wrong place.
|
||
|
||
These two slightly different ways of looking at the situation result
|
||
in slightly different operational goals. Whereas publishers want to
|
||
make assertions about their data, by controlling the roll over of
|
||
keys, consumers want to get the best assurance that they can get that
|
||
the data they are consuming is correct.
|
||
|
||
If a validator has been offline during a key rollover event for one
|
||
of its trust anchors, then the validator will be unable to validate
|
||
answers that need that trust anchor. For the publisher, this state
|
||
of affairs is acceptable: the publisher is confident that no
|
||
validator ever consumes the wrong data. For the consumer, however,
|
||
this state of affairs represents an outage.
|
||
|
||
Since publishers of trust anchors already use a chained series of
|
||
keys to perform rollovers under some circumstances (see [RFC5011]),
|
||
it is possible to use the history of that chain to allow a validator
|
||
to resume service for the consumer without needing to use an out-of-
|
||
band mechanism to obtain a new trust anchor. This improves the
|
||
experience for consumers of validated data, and increases the chances
|
||
that DNSSEC is useful for consumers of DNS data.
|
||
|
||
The mechanism to do this is a double-linked list that recounts a
|
||
portion of the history of DNSKEY Resource Records. The list is used
|
||
by a validator to catch up with the changes that the validator
|
||
somehow missed. This approach may be thought of as replaying the
|
||
[RFC5011] rollover history, only at a later time.
|
||
|
||
2.1. Considerations for Using a Revoked Key
|
||
|
||
The keys that the publisher rolled are marked REVOKED by the RFC5011
|
||
protocol. At this point the publisher considers the keys revoked,
|
||
but the validators have not yet seen this or marked the keys as
|
||
revoked. In the RFC5011 protocol, the validators probe regularly and
|
||
can then see if keys are revoked. If unable to probe, they will be
|
||
unable to see if keys are revoked. Hence when using a history to
|
||
recount rollovers, the consumer's validator has also missed a number
|
||
of revocations. The goal is to pick up the right keys and also the
|
||
new revocations along the way.
|
||
|
||
Although the keys have been marked by the publisher as REVOKED a long
|
||
time ago, for the consumer these REVOKED keys are new information.
|
||
|
||
|
||
|
||
Wijngaards & Kolkman Expires December 31, 2010 [Page 3]
|
||
|
||
Internet-Draft Trust History Service June 2010
|
||
|
||
|
||
Their storage in the history list makes it possible for consumers to
|
||
pick up key revocations if they missed the revocation announcement
|
||
because they could not probe.
|
||
|
||
This is the allowed usage of REVOKED keys. The publisher is
|
||
announcing their presence. And the validators mark them as REVOKED
|
||
after verification. The initial part of this verification is the
|
||
reverse walk through the history list, which is to avoid exposing
|
||
which key is trusted. This means that older signatures with keys
|
||
that have in the meantime been revoked are used to construct and
|
||
verify the history list by the validator.
|
||
|
||
A consequence is that once a publisher marks keys as REVOKED, there
|
||
will still be consumers who are using such keys, because they have
|
||
not seen the revocation. From the publishers point of view they are
|
||
revoked and the revocation is filed in the historical key list. From
|
||
the consumers point of view, it has not seen a revocation yet, and a
|
||
historical key list lookup algorithm is a state change where a new
|
||
trusted key is obtained while the old key is observed to be revoked.
|
||
|
||
2.2. Motivation for Requiring the SEP Bit
|
||
|
||
The SEP bit is used to differentiate Key Signing Keys from other
|
||
keys. It is defined in [RFC3757], it is used to designate trust
|
||
anchors in [RFC5011]. The protocol herein specified requires that
|
||
DNSKEYs that are subject to use for the trust history service have
|
||
the SEP bit set. The reason for this is to keep the set of keys that
|
||
need to be stored in history small.
|
||
|
||
3. The TALINK Resource Record
|
||
|
||
The DNS Resource Record type TALINK (decimal 58) ties the elements of
|
||
a linked list of DNSKEY RRs together.
|
||
|
||
The rdata consists of two domain names. The first name is the start,
|
||
or previous name, and the other name the end or next name in the
|
||
list. The empty label '.' is used at the endpoints of the list.
|
||
|
||
The presentation format is the two domain names. The wire encoding
|
||
is the two domain names, with no compression so the type can be
|
||
treated according to [RFC3597]. The list is a double linked list,
|
||
because this empowers low memory hosts to perform consistency checks.
|
||
|
||
The TALINK used at the zone apex holds the endpoints of the list.
|
||
The TALINKs that form the lists hold previous and next entries.
|
||
These TALINKs are distinguished by their usage (entrypoint or list
|
||
connection). The double linked list is not circular, because lookups
|
||
must stop when they reach the oldest entry.
|
||
|
||
|
||
|
||
Wijngaards & Kolkman Expires December 31, 2010 [Page 4]
|
||
|
||
Internet-Draft Trust History Service June 2010
|
||
|
||
|
||
4. Trust History Lookup
|
||
|
||
This is the algorithm that a validator uses to detect and resolve the
|
||
situation in which a trust-anchor is out of sync with the DNSKEYs
|
||
published by a zone owner. The algorithm uses the TALINK RR type
|
||
which is used to link various old DNSKEYs as published by the History
|
||
Provider, to arrive from the outdated configured Trust Anchor to one
|
||
that matches the current DNSKEY. The TALINK RR type is defined in
|
||
Section 3.
|
||
|
||
When the algorithm below results in failure the trust history cannot
|
||
be built and a new trust anchor will need to be re-configured using
|
||
another mechanism.
|
||
|
||
Step 1: The validator performs a DNSKEY lookup to the target zone,
|
||
which looks like any other initial DNSKEY lookup that the
|
||
validator needs to match a trust anchor to the currently used
|
||
DNSKEY RR set. If the keyset verifies with the trust anchor
|
||
currently held, the trust-anchor is not out of sync. Otherwise,
|
||
store the DNSKEY RR set as result. The algorithm will
|
||
successfully build a linked list to this DNSKEY RR, or delete the
|
||
trust point, or fail.
|
||
|
||
All nameservers (the ones authoritative for the zone or the
|
||
upstream resolver caches when the validator is not full resolver)
|
||
SHOULD be checked to make sure the DNSKEY RR sets are the same.
|
||
The results can differ if a key-rollover is in progress and not
|
||
all nameservers are in sync yet. This case can be detected by
|
||
checking that the older keyset signs the newer and take the newer
|
||
as result keyset. If both of the keysets sign each other, the
|
||
result keyset has the newest rrsig that validates it using the
|
||
other keyset. Use the the average over the middle of the
|
||
inception and expiration dates of the signatures that are
|
||
validated (and for serial arithmetic assume all dates on these
|
||
signatures lie within 2^(SERIAL_BITS-1) distance). If the keysets
|
||
do not sign each other then this is not a secure change in the
|
||
keyset and the history lookup fails.
|
||
|
||
Step 2: Fetch the trust history list end points. Perform a query of
|
||
QTYPE TALINK and QNAME the domain name that is configured to be
|
||
the History Provider for the particular domain you are trying to
|
||
update the trust-anchor for.
|
||
|
||
Step 3: Go backwards through the trust history list as provided by
|
||
the TALINK linked list. Verify that the keyset validly signs the
|
||
next keyset. This is [RFC4034] validation, but the RRSIG
|
||
expiration date is ignored. Replace the owner domain name with
|
||
the target zone name for verification. One of the keys that signs
|
||
|
||
|
||
|
||
Wijngaards & Kolkman Expires December 31, 2010 [Page 5]
|
||
|
||
Internet-Draft Trust History Service June 2010
|
||
|
||
|
||
the next keyset MUST have the SEP bit set. The middle of
|
||
inception and expiration date from the valid signature MUST be
|
||
older than that of the signature that validates the next keys in
|
||
the list. Take the average if multiple signatures validate (and
|
||
for serial arithmetic assume all dates on these signatures lie
|
||
within 2^(SERIAL_BITS-1) distance). Query type TALINK to get
|
||
previous and next locations.
|
||
|
||
If all SEP keys have the REVOKE flag set at this step, and the
|
||
keyset is signed by all SEP keys, then continue but store that the
|
||
end result is that the trust point is deleted, see Section 5
|
||
[RFC5011].
|
||
|
||
If all SEP keys are of an unknown algorithm at this step, continue
|
||
and at the next step, when you verify if the keyset signs validly:
|
||
if false, continue with result a failure, if true, continue with
|
||
the end result that the trust point is deleted. Thus, the keysets
|
||
with unknown algorithms are stepped over with an end result of
|
||
failure because the validator cannot determine if unknown
|
||
algorithm signatures are valid, until the oldest keyset with
|
||
unknown algorithms is signed by a known algorithm and the result
|
||
is set to deletion and step 3 continues to a known key.
|
||
|
||
Step 4: When the trust anchor currently held by the validator
|
||
verifies the keyset, the algorithm is done. The validator SHOULD
|
||
store the result on stable storage. Use the new trust anchor for
|
||
validation (if using [RFC5011], put it in state VALID).
|
||
|
||
5. Trust History Tracker
|
||
|
||
External trackers can poll the target zone DNSKEY RRset regularly.
|
||
Ignore date changes in the RRSIG. Ignore changes to keys with no SEP
|
||
flag. Copy the newly polled DNSKEY RRset and RRSIGs, change the
|
||
owner name to a new name at the history location. Publish the new
|
||
RRset and TALINK records to make it the last element in the list.
|
||
Update the TALINK that advertises the first and last name.
|
||
|
||
Integrated into the rollover, the keys are stored in the history and
|
||
the TALINK is updated when a new key is used in the rollover process.
|
||
This gives the TALINK and new historical key time to propagate.
|
||
|
||
The signer can support trust history. Trust history key sets need
|
||
only contain SEP keys. To use older signers, move historical RRSIGs
|
||
to another file. Sign the zone, including the TALINK and DNSKEY
|
||
records. Append the historical RRSIGs to the result. Signing the
|
||
zone like this obviates the need for changes to signer and server
|
||
software.
|
||
|
||
|
||
|
||
|
||
Wijngaards & Kolkman Expires December 31, 2010 [Page 6]
|
||
|
||
Internet-Draft Trust History Service June 2010
|
||
|
||
|
||
6. Example
|
||
|
||
In this example the trust history for the 'example.net' zone is
|
||
published in the 'example.com' namespace. The DNSKEY rdata and RRSIG
|
||
rdata is omitted for brevity, it is a copy and paste of the data from
|
||
example.net.
|
||
|
||
$ORIGIN example.com.
|
||
example.com. TALINK h0.example.com. h2.example.com.
|
||
|
||
h0 TALINK . h1.example.com.
|
||
h0 DNSKEY ...
|
||
h0 RRSIG ...
|
||
|
||
h1 TALINK h0.example.com. h2.example.com.
|
||
h1 DNSKEY ...
|
||
h1 RRSIG ...
|
||
|
||
h2 TALINK h1.example.com. .
|
||
h2 DNSKEY ...
|
||
h2 RRSIG ...
|
||
|
||
The example.net zone can advertise the example.com History Provider
|
||
by providing the TALINK shown here at example.com at the apex of the
|
||
example.net zone. The TALINK at example.com is then not needed.
|
||
|
||
7. Deployment
|
||
|
||
The trust history is advertised with TALINK RRs at the zone apex.
|
||
These represent alternative history sources, that can be searched in
|
||
turn. The TALINK at the zone apex contains the first and last name
|
||
of the list of historical keys.
|
||
|
||
The historical list of keys grows perpetually. Since most validators
|
||
have recent keys, their processing time remains similar as the list
|
||
grows. If validators no longer have trust in the keys then they need
|
||
no longer be published. The oldest key entries can be omitted from
|
||
the list to shorten it.
|
||
|
||
The validator decides how long it trusts a key. A recommendation
|
||
from the zone owner can be configured for keys of that zone, or
|
||
recommendations per algorithm and key size can be used (e.g. see
|
||
[NIST800-57]). If a key is older than that, trust history lookup
|
||
fails with it and the trust point can be considered deleted. This
|
||
assumes the validator has decided on a security policy and also can
|
||
take actions when the update of the trust anchor fails. Without such
|
||
policy, or if the alternative is no DNSSEC, the approach below can be
|
||
used.
|
||
|
||
|
||
|
||
Wijngaards & Kolkman Expires December 31, 2010 [Page 7]
|
||
|
||
Internet-Draft Trust History Service June 2010
|
||
|
||
|
||
In general, the decision can be that any key - no matter how old or
|
||
how small - is better than no security. The validator then never
|
||
considers a key too old, and the lookup algorithm becomes an
|
||
unsecured update mechanism at the time where the key can be trivially
|
||
broken. The history provider SHOULD provide these broken keys to
|
||
facilitate clients performing the unsecured update. If a key can not
|
||
be trivially broken then it provides a non-trivial amount of security
|
||
that the history lookup algorithm uses to get the current keys.
|
||
Conceivably after the update the result is stored on stable storage
|
||
and the client is thereafter safe - it performs a leap of faith. The
|
||
validator operator can opt for this set up after considering the
|
||
trade-off between loss of DNSSEC, loss of connectivity, and the
|
||
argument that perceived security is worse than no security.
|
||
|
||
The history lookup can be used on its own. Then, the trust history
|
||
is used whenever the key rolls over and no polling is performed. The
|
||
results of trust history lookup SHOULD be stored on stable storage,
|
||
so that the trust history lookup does not need to be performed if the
|
||
last results are okay and for use as trusted anchor in the next
|
||
history lookup.
|
||
|
||
If a validator is also using [RFC5011] for the target zone, then the
|
||
trust history algorithm SHOULD only be invoked if the [RFC5011]
|
||
algorithm failed due to the inability to perform probes. This is the
|
||
case when the last [RFC5011] successful probe was more than 30 days
|
||
ago. If a new key has been announced, invoke the history if no 2
|
||
probes succeeded during the add hold-down time and there was no
|
||
successful probe after the add hold-down time passed. Therefore the
|
||
time of the last successful probe MUST be stored on stable storage.
|
||
|
||
For testing the potentially very infrequently used lookup, the
|
||
following SHOULD be implemented. For the test the lookup is
|
||
triggered manually by allowing the system to be given a particular
|
||
keyset with a last successful lookup date in the past and a test
|
||
History Provider. The test History Provider provides access to a
|
||
generated back-dated test history.
|
||
|
||
8. Security Considerations
|
||
|
||
The History Provider only provides copies of old data. If that
|
||
historic data is altered or withheld the lookup algorithm fails
|
||
because of validation errors in Step 3 of the algorithm. If the
|
||
History provider or a Man in the Middle Adversary (MIMA) has access
|
||
to the original private keys (through theft, cryptanalisis, or
|
||
otherwise), history can be altered without failure of the algorithm.
|
||
Below we only consider MIMAs and assume the History Provider is a
|
||
trusted party.
|
||
|
||
|
||
|
||
|
||
Wijngaards & Kolkman Expires December 31, 2010 [Page 8]
|
||
|
||
Internet-Draft Trust History Service June 2010
|
||
|
||
|
||
Spoofing by a MIMA of data looked up in step 2 or 3, i.e. spoofing of
|
||
TALINK and DNSKEY data, can present some alternate history. However
|
||
the DNSKEY RR set trusted that the history should arrive at is
|
||
already fixed by step 1. If an attempt is made to subvert the
|
||
algorithm at step 2 or 3, then the result keyset can not be replaced
|
||
by another keyset unnoticed.
|
||
|
||
To change the keyset trusted as the outcome, the step 1 data has to
|
||
be spoofed and the key held by the validator (or a newer historic
|
||
key) has to be compromised. Unless such spoof is targeted to a
|
||
specific victim, a spoof of the step 1 result has a high visibility.
|
||
Since most of the validators that receive the spoof have an up-to-
|
||
date trust anchor most validators that would receive this spoof
|
||
return validation failure for data from the zone that contains the
|
||
DNSKEYs. An adversary will therefore have to target the attack to
|
||
validators that are in the process of an update. Since validators do
|
||
not announce that they use trust history lookup until step 2
|
||
adversaries will not be able to select the validators.
|
||
|
||
A spoof of data in steps 2 and 3, together with a compromised (old)
|
||
key, can result in a downgrade. At steps 2 and 3 a faked trust point
|
||
deletion or algorithm rollover can be inserted in a fake history.
|
||
This avoids the high visibility of spoofing the current key (see
|
||
previous paragraph) and downgrades to insecure.
|
||
|
||
Finally there is the case that one of the keys published by the
|
||
History Providers has been compromised. Since someone spoofing at
|
||
step 1 of the lookup algorithm and presenting some fake history to a
|
||
compromised key, of course does not include key revocations and does
|
||
extend the history to contain the compromised key, it therefore is
|
||
not really useful for a History Provider to remove the key from the
|
||
published history. That only makes lookups fail for those validators
|
||
who are not under attack. Useful action could be to update
|
||
validators using some other means.
|
||
|
||
Rollover with [RFC5011] revokes keys after use. If a History
|
||
Provider is used, then such revoked keys SHOULD be used to perform
|
||
history tracking and history lookup. The trust anchor keys that the
|
||
validator has in its own storage and final current keys that it
|
||
stores MUST NOT be trusted if they are revoked.
|
||
|
||
If the validator operator chooses to operate trust history without
|
||
also using [RFC5011] the trust anchor does not get hold-down timer
|
||
protection. This has associated risks, in that the immediate
|
||
rollover without timeout that it provides could be abused (if private
|
||
keys are compromised). Such abuse could result in the stored lookup
|
||
results to become compromised. The key changes can be logged, to
|
||
inform operators and keep an audit trail.
|
||
|
||
|
||
|
||
Wijngaards & Kolkman Expires December 31, 2010 [Page 9]
|
||
|
||
Internet-Draft Trust History Service June 2010
|
||
|
||
|
||
The SEP bit is checked to make sure that control over the KSK is
|
||
necessary to change the keyset for the target zone.
|
||
|
||
The algorithm can be used to get the inception and expiration times
|
||
of signatures on the current keyset, a clock. A MIMA can attempt to
|
||
shorten history and put back that clock, but the algorithm attempts
|
||
to make this difficult to target and highly visible to others.
|
||
|
||
If the clock of the validator can be influenced, then setting it
|
||
forward is unlikely to give advantage, but setting it backward
|
||
enables a replay attack of old DNSSEC data and signatures. This
|
||
vulnerability exists also in plain DNSSEC.
|
||
|
||
9. IANA Considerations
|
||
|
||
Resource record type TALINK has been defined using RFC5395 expert
|
||
review, it has RR type number 58 (decimal).
|
||
|
||
10. Acknowledgments
|
||
|
||
Thanks to the people who provided review and suggestions, Peter Koch,
|
||
Andrew Sullivan, Joe Abley, George Barwood, Edward Lewis, Michael
|
||
StJohns, Bert Hubert, Mark Andrews, Ted Lemon, Steve Crocker, Bill
|
||
Manning, Eric Osterweil, Wolfgang Nagele, Alfred Hoenes, Olafur
|
||
Gudmundsson, Roy Arends and Matthijs Mekking.
|
||
|
||
11. References
|
||
|
||
11.1. Informative References
|
||
|
||
[NIST800-57] Barker, E., Barker, W., Burr, W., Polk, W., and M.
|
||
Smid, "Recommendations for Key Management", NIST
|
||
SP 800-57, March 2007.
|
||
|
||
[RFC3757] Kolkman, O., Schlyter, J., and E. Lewis, "Domain Name
|
||
System KEY (DNSKEY) Resource Record (RR) Secure Entry
|
||
Point (SEP) Flag", RFC 3757, April 2004.
|
||
|
||
[RFC5011] StJohns, M., "Automated Updates of DNS Security
|
||
(DNSSEC) Trust Anchors", RFC 5011, September 2007.
|
||
|
||
11.2. Normative References
|
||
|
||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||
Requirement Levels", BCP 14, RFC 2119, March 1997.
|
||
|
||
[RFC3597] Gustafsson, A., "Handling of Unknown DNS Resource
|
||
Record (RR) Types", RFC 3597, September 2003.
|
||
|
||
|
||
|
||
Wijngaards & Kolkman Expires December 31, 2010 [Page 10]
|
||
|
||
Internet-Draft Trust History Service June 2010
|
||
|
||
|
||
[RFC4034] Arends, R., Austein, R., Larson, M., Massey, D., and S.
|
||
Rose, "Resource Records for the DNS Security
|
||
Extensions", RFC 4034, March 2005.
|
||
|
||
Authors' Addresses
|
||
|
||
Wouter Wijngaards
|
||
NLnet Labs
|
||
Science Park 140
|
||
Amsterdam 1098 XG
|
||
The Netherlands
|
||
|
||
EMail: wouter@nlnetlabs.nl
|
||
|
||
|
||
Olaf Kolkman
|
||
NLnet Labs
|
||
Science Park 140
|
||
Amsterdam 1098 XG
|
||
The Netherlands
|
||
|
||
EMail: olaf@nlnetlabs.nl
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Wijngaards & Kolkman Expires December 31, 2010 [Page 11]
|
||
|