summaryrefslogtreecommitdiffstats
path: root/doc/draft/draft-ietf-dnsext-keyrr-key-signing-flag-12.txt
blob: 6bffb70423f4e3c65ebf29c2b6271616c31bedd5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560

DNS Extensions                                                O. Kolkman
Internet-Draft                                                  RIPE NCC
Expires: June 17, 2004                                       J. Schlyter

                                                                E. Lewis
                                                                    ARIN
                                                       December 18, 2003


                   DNSKEY RR Secure Entry Point Flag
              draft-ietf-dnsext-keyrr-key-signing-flag-12

Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups. Note that other
   groups may also distribute working documents as Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time. It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at http://
   www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on June 17, 2004.

Copyright Notice

   Copyright (C) The Internet Society (2003). All Rights Reserved.

Abstract

   With the Delegation Signer (DS) resource record the concept of a
   public key acting as a secure entry point has been introduced. During
   exchanges of public keys with the parent there is a need to
   differentiate secure entry point keys from other public keys in the
   DNSKEY resource record (RR) set.  A flag bit in the DNSKEY RR is
   defined to indicate that DNSKEY is to be used as a secure entry
   point. The flag bit is intended to assist in operational procedures
   to correctly generate DS resource records, or to indicate what
   DNSKEYs are intended for static configuration. The flag bit is not to



Kolkman, et al.          Expires June 17, 2004                  [Page 1]

Internet-Draft     DNSKEY RR Secure Entry Point Flag       December 2003


   be used in the DNS verification protocol. This document updates RFC
   2535 and RFC 3445.

Table of Contents

   1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 3
   2. The Secure Entry Point (SEP) Flag  . . . . . . . . . . . . . . . 4
   3. DNSSEC Protocol Changes  . . . . . . . . . . . . . . . . . . . . 5
   4. Operational Guidelines . . . . . . . . . . . . . . . . . . . . . 5
   5. Security Considerations  . . . . . . . . . . . . . . . . . . . . 6
   6. IANA Considerations  . . . . . . . . . . . . . . . . . . . . . . 6
   7. Internationalization Considerations  . . . . . . . . . . . . . . 6
   8. Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . . 6
      Normative References . . . . . . . . . . . . . . . . . . . . . . 7
      Informative References . . . . . . . . . . . . . . . . . . . . . 7
      Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7
      Intellectual Property and Copyright Statements . . . . . . . . . 9


































Kolkman, et al.          Expires June 17, 2004                  [Page 2]

Internet-Draft     DNSKEY RR Secure Entry Point Flag       December 2003


1. Introduction

   "All keys are equal but some keys are more equal than others" [6]

   With the definition of the Delegation Signer Resource Record (DS RR)
   [5] it has become important to differentiate between the keys in the
   DNSKEY RR set that are (to be) pointed to by parental DS RRs and the
   other keys in the DNSKEY RR set.  We refer to these public keys as
   Secure Entry Point (SEP) keys.  A SEP key either used to generate a
   DS RR or is distributed to resolvers that use the key as the root of
   a trusted subtree[3].

   In early deployment tests, the use of two (kinds of) key pairs for
   each zone has been prevalent.  For one kind of key pair the private
   key is used to sign just the zone's DNSKEY resource record (RR) set.
   Its public key is intended to be referenced by a DS RR at the parent
   or configured statically in a resolver.  The private key of the other
   kind of key pair is used to sign the rest of the zone's data sets.
   The former key pair is called a key-signing key (KSK) and the latter
   is called a zone-signing key (ZSK).  In practice there have been
   usually one of each kind of key pair, but there will be multiples of
   each at times.

   It should be noted that division of keys pairs into KSK's and ZSK's
   is not mandatory in any definition of DNSSEC, not even with the
   introduction of the DS RR.  But, in testing, this distinction has
   been helpful when designing key roll over (key super-cession)
   schemes.  Given that the distinction has proven helpful, the labels
   KSK and ZSK have begun to stick.

   There is a need to differentiate the public keys for the key pairs
   that are used for key signing from keys that are not used key signing
   (KSKs vs ZSKs). This need is driven by knowing which DNSKEYs are to
   be sent for generating DS RRs, which DNSKEYs are to be distributed to
   resolvers, and which keys are fed to the signer application at the
   appropriate time.

   In other words, the SEP bit provides an in-band method to communicate
   a DNSKEY RR's intended use to third parties. As an example we present
   3 use cases in which the bit is useful:

      The parent is a registry, the parent and the child use secured DNS
      queries and responses, with a preexisting trust-relation, or plain
      DNS over a secured channel to exchange the child's  DNSKEY RR
      sets. Since a DNSKEY RR set will contain a complete DNSKEY RRset
      the SEP bit can be used to isolate the DNSKEYs for which a DS RR
      needs to be created.




Kolkman, et al.          Expires June 17, 2004                  [Page 3]

Internet-Draft     DNSKEY RR Secure Entry Point Flag       December 2003


      An administrator has configured a DNSKEY as root for a trusted
      subtree into security aware resolver. Using a special purpose tool
      that queries for the KEY RRs from that domain's apex, the
      administrator will be able to notice the roll over of the trusted
      anchor by a change of the subset of KEY RRs with the DS flag set.

      A signer might use the SEP bit on the public key to determine
      which private key to use to exclusively sign the DNSKEY RRset and
      which private key to use to sign the other RRsets in the zone.

   As demonstrated in the above examples it is important to be able to
   differentiate the SEP keys from the other keys in a DNSKEY RR set in
   the flow between signer and (parental) key-collector and in the flow
   between the signer and the resolver configuration. The SEP flag is to
   be of no interest to the flow between the verifier and the
   authoritative data store.

   The reason for the term "SEP" is a result of the observation that the
   distinction between KSK and ZSK key pairs is made by the signer, a
   key pair could be used as both a KSK and a ZSK at the same time. To
   be clear, the term SEP was coined to lessen the confusion caused by
   the overlap. ( Once this label was applied, it had the side effect of
   removing the temptation to have both a KSK flag bit and a ZSK flag
   bit.)

   The key words "MAY","MAY NOT", "MUST", "MUST NOT", "REQUIRED",
   "RECOMMENDED", "SHOULD", and "SHOULD NOT" in this document are to be
   interpreted as described in RFC2119 [1].

2. The Secure Entry Point (SEP) Flag


                           1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |              flags          |S|   protocol    |   algorithm   |
      |                             |E|               |               |
      |                             |P|               |               |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                                                               /
      /                        public key                             /
      /                                                               /
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                                DNSKEY RR Format






Kolkman, et al.          Expires June 17, 2004                  [Page 4]

Internet-Draft     DNSKEY RR Secure Entry Point Flag       December 2003


   This document assigns the 15'th bit in the flags field as the secure
   entry point (SEP) bit.  If the the bit is set to 1 the key is
   intended to be used as secure entry point key.  One SHOULD NOT assign
   special meaning to the key if the bit is set to 0.  Operators can
   recognize the secure entry point key by the even or odd-ness of the
   decimal representation of the flag field.

3. DNSSEC Protocol Changes

   The bit MUST NOT be used during the resolving and verification
   process. The SEP flag is only used to provide a hint about the
   different administrative properties of the key and therefore the use
   of the SEP flag does not change the DNS resolution protocol or the
   resolution process.

4. Operational Guidelines

   The SEP bit is set by the key-pair-generator and MAY be used by the
   zone signer to decide whether the public part of the key pair is to
   be prepared for input to a DS RR generation function.  The SEP bit is
   recommended to be set (to 1) whenever the public key of the key pair
   will be distributed to the parent zone to build the authentication
   chain or if the public key is to be distributed for static
   configuration in verifiers.

   When a key pair is created, the operator needs to indicate whether
   the SEP bit is to be set in the DNSKEY RR.  As the SEP bit is within
   the data that is used to compute the 'key tag field' in the SIG RR,
   changing the SEP bit will change the identity of the key within DNS.
   In other words, once a key is used to generate signatures, the
   setting of the SEP bit is to remain constant. If not, a verifier will
   not be able to find the relevant KEY RR.

   When signing a zone, it is intended that the key(s) with the SEP bit
   set (if such keys exist) are used to sign the KEY RR set of the zone.
   The same key can be used to sign the rest of the zone data too.  It
   is conceivable that not all keys with a SEP bit set will sign the
   DNSKEY RR set, such keys might be pending retirement or not yet in
   use.

   When verifying a RR set, the SEP bit is not intended to play a role.
   How the key is used by the verifier is not intended to be a
   consideration at key creation time.

   Although the SEP flag provides a hint on which public key is to be
   used as trusted root, administrators can choose to ignore the fact
   that a DNSKEY has its SEP bit set or not when configuring a trusted
   root for their resolvers.



Kolkman, et al.          Expires June 17, 2004                  [Page 5]

Internet-Draft     DNSKEY RR Secure Entry Point Flag       December 2003


   Using the SEP flag a key roll over can be automated. The parent can
   use an existing trust relation to verify DNSKEY RR sets in which a
   new DNSKEY RR with the SEP flag appears.

5. Security Considerations

   As stated in Section 3 the flag is not to be used in the resolution
   protocol or to determine the security status of a key. The flag is to
   be used for administrative purposes only.

   No trust in a key should be inferred from this flag - trust MUST be
   inferred from an existing chain of trust or an out-of-band exchange.

   Since this flag might be used for automating public key exchanges, we
   think the following consideration is in place.

   Automated mechanisms for roll over of the DS RR might be vulnerable
   to a class of replay attacks.  This might happen after a public key
   exchange where a DNSKEY RR set, containing two DNSKEY RRs with the
   SEP flag set, is sent to the parent.  The parent verifies the DNSKEY
   RR set with the existing trust relation and creates the new DS RR
   from the DNSKEY RR that the current DS RR is not pointing to.  This
   key exchange might be replayed. Parents are encouraged to implement a
   replay defense. A simple defense can be based on a registry of keys
   that have been used to generate DS RRs during the most recent roll
   over. These same considerations apply to entities that configure keys
   in resolvers.

6. IANA Considerations

   The flag bits  in the DNSKEY RR are assigned by IETF consensus and
   registered in the DNSKEY Flags registry (created by [4]). This
   document assigns the 15th bit in the DNSKEY RR as the Secure Entry
   Point (SEP) bit.

7. Internationalization Considerations

   Although SEP is a popular acronym in many different languages, there
   are no internationalization considerations.

8. Acknowledgments

   The ideas documented in this document are inspired by communications
   we had with numerous people and ideas published by other folk. Among
   others Mark Andrews, Rob Austein, Miek Gieben, Olafur Gudmundsson,
   Daniel Karrenberg, Dan Massey, Scott Rose, Marcos Sanz and Sam Weiler
   have contributed ideas and provided feedback.




Kolkman, et al.          Expires June 17, 2004                  [Page 6]

Internet-Draft     DNSKEY RR Secure Entry Point Flag       December 2003


   This document saw the light during a workshop on DNSSEC operations
   hosted by USC/ISI in August 2002.

Normative References

   [1]  Bradner, S., "Key words for use in RFCs to Indicate Requirement
        Levels", BCP 14, RFC 2119, March 1997.

   [2]  Eastlake, D., "Domain Name System Security Extensions", RFC
        2535, March 1999.

   [3]  Lewis, E., "DNS Security Extension Clarification on Zone
        Status", RFC 3090, March 2001.

   [4]  Weiler, S., "Legacy Resolver Compatibility for Delegation
        Signer", draft-ietf-dnsext-dnssec-2535typecode-change-05 (work
        in progress), October 2003.

Informative References

   [5]  Gudmundsson, O., "Delegation Signer Resource Record",
        draft-ietf-dnsext-delegation-signer-15 (work in progress), June
        2003.

   [6]  Orwell, G. and R. Steadman (illustrator), "Animal Farm; a Fairy
        Story", ISBN 0151002177 (50th anniversary edition), April 1996.


Authors' Addresses

   Olaf M. Kolkman
   RIPE NCC
   Singel 256
   Amsterdam  1016 AB
   NL

   Phone: +31 20 535 4444
   EMail: olaf@ripe.net
   URI:   http://www.ripe.net/


   Jakob Schlyter
   Karl Gustavsgatan 15
   Goteborg  SE-411 25
   Sweden

   EMail: jakob@schlyter.se




Kolkman, et al.          Expires June 17, 2004                  [Page 7]

Internet-Draft     DNSKEY RR Secure Entry Point Flag       December 2003


   Edward P. Lewis
   ARIN
   3635 Concorde Parkway Suite 200
   Chantilly, VA  20151
   US

   Phone: +1 703 227 9854
   EMail: edlewis@arin.net
   URI:   http://www.arin.net/










































Kolkman, et al.          Expires June 17, 2004                  [Page 8]

Internet-Draft     DNSKEY RR Secure Entry Point Flag       December 2003


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   intellectual property or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; neither does it represent that it
   has made any effort to identify any such rights. Information on the
   IETF's procedures with respect to rights in standards-track and
   standards-related documentation can be found in BCP-11. Copies of
   claims of rights made available for publication and any assurances of
   licenses to be made available, or the result of an attempt made to
   obtain a general license or permission for the use of such
   proprietary rights by implementors or users of this specification can
   be obtained from the IETF Secretariat.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights which may cover technology that may be required to practice
   this standard. Please address the information to the IETF Executive
   Director.


Full Copyright Statement

   Copyright (C) The Internet Society (2003). All Rights Reserved.

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works. However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assignees.

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION



Kolkman, et al.          Expires June 17, 2004                  [Page 9]

Internet-Draft     DNSKEY RR Secure Entry Point Flag       December 2003


   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.











































Kolkman, et al.          Expires June 17, 2004                 [Page 10]