< draft-zhang-trans-ct-dnssec-01.txt   draft-zhang-trans-ct-dnssec-02.txt >
Network Working Group D. Zhang Network Working Group D. Zhang
Internet-Draft Huawei Internet-Draft
Intended status: Experimental D. Gillmor Intended status: Experimental D. Gillmor
Expires: June 26, 2015 CMRG Expires: November 6, 2015 CMRG
D. He D. He
Huawei Huawei
December 23, 2014 B. Sarikaya
Huawei USA
May 5, 2015
Certificate Transparency for Domain Name System Security Extensions Certificate Transparency for Domain Name System Security Extensions
draft-zhang-trans-ct-dnssec-01 draft-zhang-trans-ct-dnssec-02
Abstract Abstract
In draft-ietf-trans-rfc6962-bis, a solution is proposed for publicly In draft-ietf-trans-rfc6962-bis, a solution is proposed for publicly
logging the existence of Transport Layer Security (TLS) certificates logging the existence of Transport Layer Security (TLS) certificates
using Merkle Hash Trees. This document tries to use this idea in using Merkle Hash Trees. This document tries to use this idea in
DNSSEC and publicly logging the DS RRs in order to notice the DNSSEC and publicly logging the DS RRs in order to notice the
issuance of suspect key signing keys. issuance of suspect key signing keys.
Requirements Language Requirements Language
skipping to change at page 1, line 43 skipping to change at page 1, line 45
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on June 26, 2015. This Internet-Draft will expire on November 6, 2015.
Copyright Notice Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Cryptographic Components of Certificate Transparency . . . . 4 2. Cryptographic Components of Certificate Transparency . . . . 4
3. Motivation Scenario . . . . . . . . . . . . . . . . . . . . . 4 3. Motivation Scenario . . . . . . . . . . . . . . . . . . . . . 4
4. Log Format and Operation . . . . . . . . . . . . . . . . . . 5 4. Log Format and Operation . . . . . . . . . . . . . . . . . . 5
4.1. Log Entries . . . . . . . . . . . . . . . . . . . . . . . 5 4.1. Log Entries . . . . . . . . . . . . . . . . . . . . . . . 5
4.2. Structure of the Signed Certificate Timestamp . . . . . . 6 4.2. Structure of the Signed Certificate Timestamp . . . . . . 7
4.3. Merkle Tree . . . . . . . . . . . . . . . . . . . . . . . 8 4.3. Merkle Tree . . . . . . . . . . . . . . . . . . . . . . . 8
5. Including the Signed Certificate Timestamp into DNS Security 5. Including the Signed Certificate Timestamp into DNS Security
Extensions . . . . . . . . . . . . . . . . . . . . . . . . . 8 Extensions . . . . . . . . . . . . . . . . . . . . . . . . . 9
5.1. SCT RR . . . . . . . . . . . . . . . . . . . . . . . . . 9 5.1. SCT RR . . . . . . . . . . . . . . . . . . . . . . . . . 9
5.1.1. The Key Tag Field . . . . . . . . . . . . . . . . . . 9 5.1.1. The Key Tag Field . . . . . . . . . . . . . . . . . . 10
5.1.2. The Algorithm Field . . . . . . . . . . . . . . . . . 9 5.1.2. The Algorithm Field . . . . . . . . . . . . . . . . . 10
5.1.3. The Digest Type Field . . . . . . . . . . . . . . . . 10 5.1.3. The Digest Type Field . . . . . . . . . . . . . . . . 10
5.1.4. The Digest Field . . . . . . . . . . . . . . . . . . 10 5.1.4. The Digest Field . . . . . . . . . . . . . . . . . . 10
5.1.5. The SCT Field . . . . . . . . . . . . . . . . . . . . 10 5.1.5. The SCT Field . . . . . . . . . . . . . . . . . . . . 10
5.1.6. The Signature Field . . . . . . . . . . . . . . . . . 10 5.1.6. The Signature Field . . . . . . . . . . . . . . . . . 11
5.2. Operations . . . . . . . . . . . . . . . . . . . . . . . 10 5.2. Operations . . . . . . . . . . . . . . . . . . . . . . . 11
6. Log Client Messages . . . . . . . . . . . . . . . . . . . . . 10 6. Log Client Messages . . . . . . . . . . . . . . . . . . . . . 11
6.1. Add DNSSEC RR Chain to Log . . . . . . . . . . . . . . . 10 6.1. Add DNSSEC RR Chain to Log . . . . . . . . . . . . . . . 11
6.2. Retrieve Accepted Root DNSKEY RRs . . . . . . . . . . . . 11 6.2. Retrieve Accepted Root DNSKEY RRs . . . . . . . . . . . . 12
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12
8. Security Considerations . . . . . . . . . . . . . . . . . . . 11 8. Security Considerations . . . . . . . . . . . . . . . . . . . 12
8.1. Logging other types of RRs . . . . . . . . . . . . . . . 11 8.1. Logging other types of RRs . . . . . . . . . . . . . . . 12
8.2. Scalability Concerns . . . . . . . . . . . . . . . . . . 12 8.2. Scalability Concerns . . . . . . . . . . . . . . . . . . 13
9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 12 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 13
10. Normative References . . . . . . . . . . . . . . . . . . . . 12 10. Normative References . . . . . . . . . . . . . . . . . . . . 13
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 13 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 13
1. Introduction 1. Introduction
[I-D.ietf-trans-rfc6962-bis] specifies a Certificate Transparency [I-D.ietf-trans-rfc6962-bis] specifies a Certificate Transparency
(CT) mechanism to disclosing TLS certificates into public logs so as (CT) mechanism to disclosing TLS certificates into public logs so as
to benefit the public to monitor the operations in issuing to benefit the public to monitor the operations in issuing
certificates to improper subscribers. The logs do not prevent mis- certificates to improper subscribers. The logs do not prevent mis-
issuing behavior directly, but the provided public audibility can issuing behavior directly, but the provided public audibility can
increase the possibility in detecting the improper behaviors of increase the possibility in detecting the improper behaviors of
skipping to change at page 12, line 26 skipping to change at page 13, line 17
The log MAY limit accepting entries where the TTL is too short or the The log MAY limit accepting entries where the TTL is too short or the
RRSIG times are too far in the future or the past, to avoid spamming RRSIG times are too far in the future or the past, to avoid spamming
the log. It should probably also put a maximum on the number of the log. It should probably also put a maximum on the number of
child zones to avoid getting spammed. child zones to avoid getting spammed.
9. Acknowledgements 9. Acknowledgements
10. Normative References 10. Normative References
[I-D.ietf-trans-rfc6962-bis] [I-D.ietf-trans-rfc6962-bis]
Laurie, B., Langley, A., Kasper, E., and R. Stradling, Laurie, B., Langley, A., Kasper, E., Messeri, E., and R.
"Certificate Transparency", draft-ietf-trans- Stradling, "Certificate Transparency", draft-ietf-trans-
rfc6962-bis-04 (work in progress), July 2014. rfc6962-bis-07 (work in progress), March 2015.
[RFC1035] Mockapetris, P., "Domain names - implementation and [RFC1035] Mockapetris, P., "Domain names - implementation and
specification", STD 13, RFC 1035, November 1987. specification", STD 13, RFC 1035, November 1987.
[RFC2065] Eastlake, D. and C. Kaufman, "Domain Name System Security [RFC2065] Eastlake, D. and C. Kaufman, "Domain Name System Security
Extensions", RFC 2065, January 1997. Extensions", RFC 2065, January 1997.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
skipping to change at page 13, line 11 skipping to change at page 13, line 49
[RFC4305] Eastlake, D., "Cryptographic Algorithm Implementation [RFC4305] Eastlake, D., "Cryptographic Algorithm Implementation
Requirements for Encapsulating Security Payload (ESP) and Requirements for Encapsulating Security Payload (ESP) and
Authentication Header (AH)", RFC 4305, December 2005. Authentication Header (AH)", RFC 4305, December 2005.
[RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security [RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security
(TLS) Protocol Version 1.2", RFC 5246, August 2008. (TLS) Protocol Version 1.2", RFC 5246, August 2008.
Authors' Addresses Authors' Addresses
Dacheng Zhang Dacheng Zhang
Huawei
Email: zhangdacheng@huawei.com
Email: dacheng.zhang@gmail.com
Daniel Kahn Gillmor Daniel Kahn Gillmor
CMRG CMRG
Email: dkg@fifthhorseman.net Email: dkg@fifthhorseman.net
Danping He Danping He
Huawei Huawei
Email: ana.hedanping@huawei.com Email: ana.hedanping@huawei.com
Behcet Sarikaya
Huawei USA
5340 Legacy Dr. Building 3
Plano, TX 75024
Email: sarikaya@ieee.org
 End of changes. 15 change blocks. 
28 lines changed or deleted 28 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/