| < draft-ietf-dnsext-signing-auth-01.txt | draft-ietf-dnsext-signing-auth-02.txt > | |||
|---|---|---|---|---|
| DNSEXT Working Group Brian Wellington (Nominum) | ||||
| INTERNET-DRAFT October 2000 | ||||
| DNSIND Working Group Brian Wellington (Nominum) | <draft-ietf-dnsext-signing-auth-02.txt> | |||
| INTERNET-DRAFT May 2000 | ||||
| <draft-ietf-dnsext-signing-auth-01.txt> | ||||
| Updates: RFC 2535 | Updates: RFC 2535 | |||
| Domain Name System Security (DNSSEC) Signing Authority | Domain Name System Security (DNSSEC) Signing Authority | |||
| Status of this Memo | Status of this Memo | |||
| This document is an Internet-Draft and is in full conformance with | This document is an Internet-Draft and is in full conformance with | |||
| all provisions of Section 10 of RFC2026. | all provisions of Section 10 of RFC2026. | |||
| skipping to change at page 1, line 33 ¶ | skipping to change at page 1, line 32 ¶ | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as ``work in progress.'' | material or to cite them other than as ``work in progress.'' | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html | http://www.ietf.org/shadow.html | |||
| Comments should be sent to the authors or the DNSIND WG mailing list | Comments should be sent to the authors or the DNSEXT WG mailing list | |||
| namedroppers@internic.net. | namedroppers@ops.ietf.org. | |||
| This draft expires on November 12, 2000. | This draft expires on April 2, 2000. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (C) The Internet Society (2000). All rights reserved. | Copyright (C) The Internet Society (2000). All rights reserved. | |||
| Abstract | Abstract | |||
| This document proposes a revised model of Domain Name System Security | This document proposes a revised model of Domain Name System Security | |||
| (DNSSEC) Signing Authority. The revised model is designed to clarify | (DNSSEC) Signing Authority. The revised model is designed to clarify | |||
| earlier documents and add additional restrictions to simplify the | earlier documents and add additional restrictions to simplify the | |||
| secure resolution process. Specifically, this affects the | secure resolution process. Specifically, this affects the | |||
| authorization of keys to sign sets of records. | authorization of keys to sign sets of records. | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | ||||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | ||||
| document are to be interpreted as described in RFC 2119 [RFC2119]. | ||||
| 1 - Introduction | 1 - Introduction | |||
| This document defines additional restrictions on DNSSEC signatures (SIG) | This document defines additional restrictions on DNSSEC signatures (SIG) | |||
| records relating to their authority to sign associated data. The intent | records relating to their authority to sign associated data. The intent | |||
| is to establish a standard policy followed by a secure resolver; this | is to establish a standard policy followed by a secure resolver; this | |||
| policy can be augmented by local rules. This builds upon [RFC2535], | policy can be augmented by local rules. This builds upon [RFC2535], | |||
| updating section 2.3.6 of that document. | updating section 2.3.6 of that document. | |||
| The most significant change is that in a secure zone, zone data is | The most significant change is that in a secure zone, zone data is | |||
| required to be signed by the zone key. | required to be signed by the zone key. | |||
| skipping to change at page 2, line 39 ¶ | skipping to change at page 2, line 43 ¶ | |||
| ``immaterial'' or ``extra-DNSSEC'', as they are not relevant to DNSSEC | ``immaterial'' or ``extra-DNSSEC'', as they are not relevant to DNSSEC | |||
| validation. Immaterial SIGs may have application defined roles. SIG | validation. Immaterial SIGs may have application defined roles. SIG | |||
| records may exist which are not bound to any RRset; these are also | records may exist which are not bound to any RRset; these are also | |||
| considered immaterial. The validation process determines which SIGs are | considered immaterial. The validation process determines which SIGs are | |||
| material; once a SIG is shown to be immaterial, no other validation is | material; once a SIG is shown to be immaterial, no other validation is | |||
| necessary. | necessary. | |||
| SIGs may also be used for transaction security. In this case, a SIG | SIGs may also be used for transaction security. In this case, a SIG | |||
| record with a type covered field of 0 is attached to a message, and is | record with a type covered field of 0 is attached to a message, and is | |||
| used to protect message integrity. This is referred to as a SIG(0) | used to protect message integrity. This is referred to as a SIG(0) | |||
| [RFC2535]. | [RFC2535, RFC2931]. | |||
| The following sections define requirements for all of the fields of a | The following sections define requirements for all of the fields of a | |||
| SIG record. These requirements MUST be met in order for a DNSSEC | SIG record. These requirements MUST be met in order for a DNSSEC | |||
| capable resolver to process this signature. If any of these | capable resolver to process this signature. If any of these | |||
| requirements are not met, the SIG cannot be further processed. | requirements are not met, the SIG cannot be further processed. | |||
| Additionally, once a KEY has been identified as having generated this | Additionally, once a KEY has been identified as having generated this | |||
| SIG, there are requirements that it MUST meet. | SIG, there are requirements that it MUST meet. | |||
| 2.1 - Type Covered | 2.1 - Type Covered | |||
| skipping to change at page 3, line 41 ¶ | skipping to change at page 3, line 41 ¶ | |||
| 2.6 - Key Tag | 2.6 - Key Tag | |||
| There are no restrictions on the Key Tag field, although it is possible | There are no restrictions on the Key Tag field, although it is possible | |||
| that future algorithms will impose contraints. | that future algorithms will impose contraints. | |||
| 2.7 - Signer's Name | 2.7 - Signer's Name | |||
| The signer's name field of a data SIG MUST contain the name of the zone | The signer's name field of a data SIG MUST contain the name of the zone | |||
| to which the data and signature belong. The combination of signer's | to which the data and signature belong. The combination of signer's | |||
| name, key tag, and algorithm MUST identify a zone key if the SIG is to | name, key tag, and algorithm MUST identify a zone key if the SIG is to | |||
| be considered material. This document defines a standard policy for | be considered material. The only exception that the signer's name field | |||
| DNSSEC validation; local policy may override the standard policy. | in a SIG KEY at a zone apex SHOULD contain the parent zone's name, | |||
| unless the KEY set is self-signed. This document defines a standard | ||||
| policy for DNSSEC validation; local policy may override the standard | ||||
| policy. | ||||
| There are no restrictions on the signer field of a SIG(0) record. The | There are no restrictions on the signer field of a SIG(0) record. The | |||
| combination of signer's name, key tag, and algorithm MUST identify a key | combination of signer's name, key tag, and algorithm MUST identify a key | |||
| if this SIG(0) is to be processed. | if this SIG(0) is to be processed. | |||
| 2.8 - Signature | 2.8 - Signature | |||
| There are no restrictions on the signature field. The signature will be | There are no restrictions on the signature field. The signature will be | |||
| verified at some point, but does not need to be examined prior to | verified at some point, but does not need to be examined prior to | |||
| verification unless a future algorithm imposes constraints. | verification unless a future algorithm imposes constraints. | |||
| skipping to change at page 5, line 4 ¶ | skipping to change at page 5, line 9 ¶ | |||
| ignore all keys that are not zone keys unless local policy dictates | ignore all keys that are not zone keys unless local policy dictates | |||
| otherwise. | otherwise. | |||
| The primary reason that RFC 2535 allows host and user keys to generate | The primary reason that RFC 2535 allows host and user keys to generate | |||
| material DNSSEC signatures is to allow dynamic update without online | material DNSSEC signatures is to allow dynamic update without online | |||
| zone keys; that is, avoid storing private keys in an online server. The | zone keys; that is, avoid storing private keys in an online server. The | |||
| desire to avoid online signing keys cannot be achieved, though, because | desire to avoid online signing keys cannot be achieved, though, because | |||
| they are necessary to sign NXT and SOA sets [SSU]. These online zone | they are necessary to sign NXT and SOA sets [SSU]. These online zone | |||
| keys can sign any incoming data. Removing the goal of having no online | keys can sign any incoming data. Removing the goal of having no online | |||
| keys removes the reason to allow host and user keys to generate material | keys removes the reason to allow host and user keys to generate material | |||
| signatures. in the DNS. | signatures. | |||
| Limiting material signatures to zone keys simplifies the validation | Limiting material signatures to zone keys simplifies the validation | |||
| process. The length of the verification chain is bounded by the name's | process. The length of the verification chain is bounded by the name's | |||
| label depth. The authority of a key is clearly defined; a resolver does | label depth. The authority of a key is clearly defined; a resolver does | |||
| not need to make a potentially complicated decision to determine whether | not need to make a potentially complicated decision to determine whether | |||
| a key can sign data. amount of work to determine if all such keys have | a key can sign data. amount of work to determine if all such keys have | |||
| the proper authority. | the proper authority. | |||
| Finally, there is no additional flexibility granted by allowing | Finally, there is no additional flexibility granted by allowing | |||
| host/user key generated material signatures. As long as users and hosts | host/user key generated material signatures. As long as users and hosts | |||
| skipping to change at page 6, line 32 ¶ | skipping to change at page 6, line 38 ¶ | |||
| Ed Lewis | Ed Lewis | |||
| 6 - References | 6 - References | |||
| [RFC1034] P. Mockapetris, ``Domain Names - Concepts and Facilities,'' | [RFC1034] P. Mockapetris, ``Domain Names - Concepts and Facilities,'' | |||
| RFC 1034, ISI, November 1987. | RFC 1034, ISI, November 1987. | |||
| [RFC1035] P. Mockapetris, ``Domain Names - Implementation and | [RFC1035] P. Mockapetris, ``Domain Names - Implementation and | |||
| Specification,'' RFC 1035, ISI, November 1987. | Specification,'' RFC 1035, ISI, November 1987. | |||
| [RFC2119] S. Bradner, ``Key words for use in RFCs to Indicate | ||||
| Requirement Levels,'' BCP 14, RFC 2119, Harvard, March 1997. | ||||
| [RFC2136] P. Vixie (Ed.), S. Thomson, Y. Rekhter, J. Bound ``Dynamic | [RFC2136] P. Vixie (Ed.), S. Thomson, Y. Rekhter, J. Bound ``Dynamic | |||
| Updates in the Domain Name System,'' RFC 2136, ISC & Bellcore | Updates in the Domain Name System,'' RFC 2136, ISC & Bellcore | |||
| & Cisco & DEC, April 1997. | & Cisco & DEC, April 1997. | |||
| [RFC2535] D. Eastlake, ``Domain Name System Security Extensions,'' RFC | [RFC2535] D. Eastlake, ``Domain Name System Security Extensions,'' RFC | |||
| 2065, IBM, March 1999. | 2535, IBM, March 1999. | |||
| [RFC2931] D. Eastlake, ``DNS Request and Transaction Signatures ( | ||||
| SIG(0)s ),'' RFC 2931, Motorola, September 2000. | ||||
| [SSU] B. Wellington, ``Simple Secure Domain Name System (DNS) | [SSU] B. Wellington, ``Simple Secure Domain Name System (DNS) | |||
| Dynamic Update,'' draft-ietf-dnsext-simple-secure- | Dynamic Update,'' draft-ietf-dnsext-simple-secure- | |||
| update-01.txt, Nominum, May 2000. | update-02.txt, Nominum, October 2000. | |||
| 7 - Author's Address | 7 - Author's Address | |||
| Brian Wellington | Brian Wellington | |||
| Nominum, Inc. | Nominum, Inc. | |||
| 950 Charter Street | 950 Charter Street | |||
| Redwood City, CA 94063 | Redwood City, CA 94063 | |||
| +1 650 779 6022 | +1 650 779 6022 | |||
| <Brian.Wellington@nominum.com> | <Brian.Wellington@nominum.com> | |||
| End of changes. 11 change blocks. | ||||
| 13 lines changed or deleted | 25 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||