279 lines
8.3 KiB
Plaintext
279 lines
8.3 KiB
Plaintext
|
||
DNSSEC Working Group Brian Wellington (TISLabs)
|
||
INTERNET-DRAFT February 1999
|
||
|
||
<draft-ietf-dnssec-simple-update-01.txt>
|
||
|
||
Updates: RFC 2065, RFC 2136, [TSIG]
|
||
Replaces: RFC 2137, [update2]
|
||
|
||
|
||
|
||
Simple Secure Domain Name System (DNS) Dynamic Update
|
||
|
||
|
||
Status of this Memo
|
||
|
||
This document is an Internet-Draft and is in full conformance with
|
||
all provisions of Section 10 of RFC2026.
|
||
|
||
Internet-Drafts are working documents of the Internet Engineering
|
||
Task Force (IETF), its areas, and its working groups. Note that
|
||
other groups may also distribute working documents as Internet-
|
||
Drafts.
|
||
|
||
Internet-Drafts are draft documents valid for a maximum of six months
|
||
and may be updated, replaced, or obsoleted by other documents at any
|
||
time. It is inappropriate to use Internet-Drafts as reference
|
||
material or to cite them other than as ``work in progress.''
|
||
|
||
The list of current Internet-Drafts can be accessed at
|
||
http://www.ietf.org/ietf/1id-abstracts.txt
|
||
|
||
The list of Internet-Draft Shadow Directories can be accessed at
|
||
http://www.ietf.org/shadow.html
|
||
|
||
|
||
Abstract
|
||
|
||
This draft proposes an alternative method for performing secure
|
||
Domain Name System (DNS) dynamic updates. The method described here
|
||
is both simple and flexible enough to represent any policy decisions.
|
||
Secure communication based on request/transaction signatures [TSIG]
|
||
is used to provide authentication and authorization.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Expires August 1999 [Page 1]
|
||
|
||
INTERNET-DRAFT Simple Secure Dynamic Update February 1999
|
||
|
||
|
||
1 - Introduction
|
||
|
||
Dynamic update operations for the Domain Name System are defined in
|
||
[RFC2136], but no mechanisms for security have been defined. Request
|
||
and transaction signatures are defined in [TSIG].
|
||
|
||
Familiarity with the DNS system [RFC1034, RFC1035] as well as the
|
||
proposals mentioned above is assumed. Familiarity with DNS Security
|
||
[RFC2065, secext2] is assumed in section (4).
|
||
|
||
1.1 - Overview of DNS Dynamic Update
|
||
|
||
DNS dynamic update defines a new DNS opcode and a new interpretation of
|
||
the DNS message if that opcode is used. An update can specify
|
||
insertions or deletions of data, along with prerequisites necessary for
|
||
the updates to occur. All tests and changes for a DNS update request
|
||
are restricted to a single zone, and are performed at the primary server
|
||
for the zone. The primary server for a dynamic zone must increment the
|
||
zone SOA serial number when an update occurs or before the next
|
||
retrieval of the SOA.
|
||
|
||
1.2 - Overview of DNS Transaction Security
|
||
|
||
[TSIG] provides a means for two processes that share a secret key to
|
||
authenticate DNS requests and responses sent between them. This is done
|
||
by appending TSIG digital signature (keyed hash) RRs to those messages.
|
||
Keyed hashes are simple to calculate and verify, and do not require
|
||
caching of data.
|
||
|
||
2 - Authentication
|
||
|
||
TSIG records are attached to all secure dynamic update messages. This
|
||
allows the server to verifiably determine the originator of the message.
|
||
It can then use this information in the decision of whether to accept
|
||
the update. DNSSEC SIG records may be included in an update message,
|
||
but MAY NOT be used for authentication purposes in the update protocol.
|
||
If a message fails the authentication test due to an unauthorized key,
|
||
the failure is indicated with the REFUSED rcode. Other TSIG or dynamic
|
||
update errors are returned unchanged.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Expires August 1999 [Page 2]
|
||
|
||
INTERNET-DRAFT Simple Secure Dynamic Update February 1999
|
||
|
||
|
||
3 - Policy
|
||
|
||
All policy is dictated by the server and is configurable by the zone
|
||
administrator. The server's policy defines criteria which determine if
|
||
the key used to sign the update is permitted to update the records
|
||
requested. By default, a key cannot make any changes to the zone; the
|
||
key's scope must be explicitly enabled. There are several reasons that
|
||
this process is implemented in the server and not the protocol (as in
|
||
[RFC2137, update2], where the signatory bits of KEY records may define
|
||
the policy).
|
||
|
||
3.1 - Flexibility
|
||
|
||
Storing policy in the signatory fields of DNS keys is overly
|
||
restrictive. Only a fixed number of bits are present, which means that
|
||
only a fixed number of policy decisions are representable. There are
|
||
many decisions that do not fit into the framework imposed by the
|
||
signatory field; a zone administrator cannot effectively impose a policy
|
||
not implemented in the draft defining the field.
|
||
|
||
There may be any number of policies applied in the process of
|
||
authorization, and there are no restrictions on the scope of these
|
||
policies. Implementation of the policies is beyond the scope of this
|
||
document.
|
||
|
||
3.2 - Simplicity
|
||
|
||
Policy decisions in the server could be used as an adjunct to policy
|
||
fields in the KEY records. This could lead to confusion if the policies
|
||
are inconsistent. Furthermore, since there is no need to expose
|
||
policies, a central configuration point is more logical.
|
||
|
||
3.3 - Extendibility
|
||
|
||
If a policy is changed, there are no changes made to the DNS protocol or
|
||
the data on the wire. This means that new policies can be defined at
|
||
any point without adverse effects or interoperability concerns.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Expires August 1999 [Page 3]
|
||
|
||
INTERNET-DRAFT Simple Secure Dynamic Update February 1999
|
||
|
||
|
||
4 - Interaction with DNSSEC
|
||
|
||
A successful update request may or may not include SIG records for each
|
||
RRset. Since SIG records are not used for authentication in this
|
||
protocol, they are not required. If the updated zone is signed, the
|
||
server will generate SIG records for each incoming RRset with the Zone
|
||
key (which MUST be online). If there are any non-DNSSEC SIG records
|
||
present, they are retained. If there are SIG records that have been
|
||
generated by the appropriate zone KEY, these SIGs are verified and
|
||
retained if the verification is successful. DNSSEC SIG records
|
||
generated by other KEYs are dropped. The server will generate SIG
|
||
records for each set with the Zone key, unless one has already been
|
||
verified. The server will also generate a new SOA record and possibly
|
||
new NXT records, and sign these with the Zone key.
|
||
|
||
The server MUST update the SOA record and MAY generate new NXT records
|
||
when an update is received. Unlike traditional dynamic update, the
|
||
client is forbidden from updating SOA 1 NXT records.
|
||
|
||
5 - Security considerations
|
||
|
||
For a secure zone to support dynamic update, the Zone key MUST be online
|
||
(unlike [RFC2137]). No additional protection is offered by having the
|
||
Zone key offline and an Update key online, since compromising any key
|
||
that can sign the zone's data compromises the zone itself.
|
||
|
||
6 - References
|
||
|
||
[RFC1034] P. Mockapetris, ``Domain Names - Concepts and Facilities,''
|
||
RFC 1034, ISI, November 1987.
|
||
|
||
[RFC1035] P. Mockapetris, ``Domain Names - Implementation and
|
||
Specification,'' RFC 1035, ISI, November 1987.
|
||
|
||
[RFC2065] D. Eastlake, C. Kaufman, ``Domain Name System Security
|
||
Extensions,'' RFC 2065, CyberCash & Iris, January 1997.
|
||
|
||
[RFC2136] P. Vixie (Ed.), S. Thomson, Y. Rekhter, J. Bound ``Dynamic
|
||
Updates in the Domain Name System,'' RFC 2136, ISC & Bellcore
|
||
& Cisco & DEC, April 1997.
|
||
|
||
[RFC2137] D. Eastlake ``Secure Domain Name System Dynamic Update,'' RFC
|
||
2137, CyberCash, April 1997.
|
||
|
||
[secext2] D. Eastlake ``Domain Name System Security Extensions,''
|
||
draft-ietf-dnssec-secext2-07.txt, IBM, December 1998.
|
||
|
||
|
||
|
||
|
||
|
||
Expires August 1999 [Page 4]
|
||
|
||
INTERNET-DRAFT Simple Secure Dynamic Update February 1999
|
||
|
||
|
||
[TSIG] P. Vixie (ed), O. Gudmundsson, D. Eastlake, B. Wellington
|
||
``Secret Key Transaction Signatures for DNS (TSIG),'' draft-
|
||
ietf-dnsind-tsig-08.txt, ISC & TISLabs & IBM & TISLabs,
|
||
February 1999.
|
||
|
||
[update2] D. Eastlake ``Secure Domain Name System (DNS) Dynamic
|
||
Update,'' draft-ietf-dnssec-update2-00.txt, Transfinite
|
||
Systems Company, August 1998.
|
||
|
||
7 - Author's Address
|
||
|
||
|
||
Brian Wellington
|
||
TISLabs at Network Associates
|
||
3060 Washington Road, Route 97
|
||
Glenwood, MD 21738
|
||
+1 443 259 2369
|
||
<bwelling@tislabs.com>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Expires August 1999 [Page 5]
|
||
|