| < draft-ietf-dnsext-dnssec-online-signing-01.txt | draft-ietf-dnsext-dnssec-online-signing-02.txt > | |||
|---|---|---|---|---|
| Network Working Group S. Weiler | Network Working Group S. Weiler | |||
| Internet-Draft SPARTA, Inc | Internet-Draft SPARTA, Inc | |||
| Updates: 4034, 4035 (if approved) J. Ihren | Updates: 4034, 4035 (if approved) J. Ihren | |||
| Expires: July 9, 2006 Autonomica AB | Expires: July 24, 2006 Autonomica AB | |||
| January 5, 2006 | January 20, 2006 | |||
| Minimally Covering NSEC Records and DNSSEC On-line Signing | Minimally Covering NSEC Records and DNSSEC On-line Signing | |||
| draft-ietf-dnsext-dnssec-online-signing-01 | draft-ietf-dnsext-dnssec-online-signing-02 | |||
| Status of this Memo | Status of this Memo | |||
| By submitting this Internet-Draft, each author represents that any | By submitting this Internet-Draft, each author represents that any | |||
| applicable patent or other IPR claims of which he or she is aware | applicable patent or other IPR claims of which he or she is aware | |||
| have been or will be disclosed, and any of which he or she becomes | have been or will be disclosed, and any of which he or she becomes | |||
| aware will be disclosed, in accordance with Section 6 of BCP 79. | aware will be disclosed, in accordance with Section 6 of BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
| skipping to change at page 1, line 35 ¶ | skipping to change at page 1, line 35 ¶ | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| This Internet-Draft will expire on July 9, 2006. | This Internet-Draft will expire on July 24, 2006. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (C) The Internet Society (2006). | Copyright (C) The Internet Society (2006). | |||
| Abstract | Abstract | |||
| This document describes how to construct DNSSEC NSEC resource records | This document describes how to construct DNSSEC NSEC resource records | |||
| that cover a smaller range of names than called for by RFC4034. By | that cover a smaller range of names than called for by RFC4034. By | |||
| generating and signing these records on demand, authoritative name | generating and signing these records on demand, authoritative name | |||
| servers can effectively stop the disclosure of zone contents | servers can effectively stop the disclosure of zone contents | |||
| otherwise made possible by walking the chain of NSEC records in a | otherwise made possible by walking the chain of NSEC records in a | |||
| signed zone. | signed zone. | |||
| Changes from ietf-01 to ietf-02 | ||||
| Clarified that a generated NSEC RR's type bitmap MUST have the RRSIG | ||||
| and NSEC bits set, to be consistent with DNSSECbis -- previous text | ||||
| said SHOULD. | ||||
| Made the applicability statement a little less oppressive. | ||||
| Changes from ietf-00 to ietf-01 | Changes from ietf-00 to ietf-01 | |||
| Added an applicability statement, making reference to ongoing work on | Added an applicability statement, making reference to ongoing work on | |||
| NSEC3. | NSEC3. | |||
| Added the phrase "epsilon functions", which has been commonly used to | Added the phrase "epsilon functions", which has been commonly used to | |||
| describe the technique and already appeared in the header of each | describe the technique and already appeared in the header of each | |||
| page, in place of "increment and decrement functions". Also added an | page, in place of "increment and decrement functions". Also added an | |||
| explanatory sentence. | explanatory sentence. | |||
| skipping to change at page 3, line 14 ¶ | skipping to change at page 3, line 14 ¶ | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction and Terminology . . . . . . . . . . . . . . . . . 4 | 1. Introduction and Terminology . . . . . . . . . . . . . . . . . 4 | |||
| 2. Applicability of This Technique . . . . . . . . . . . . . . . 4 | 2. Applicability of This Technique . . . . . . . . . . . . . . . 4 | |||
| 3. Minimally Covering NSEC Records . . . . . . . . . . . . . . . 5 | 3. Minimally Covering NSEC Records . . . . . . . . . . . . . . . 5 | |||
| 4. Better Epsilon Functions . . . . . . . . . . . . . . . . . . . 6 | 4. Better Epsilon Functions . . . . . . . . . . . . . . . . . . . 6 | |||
| 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 | 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 6. Security Considerations . . . . . . . . . . . . . . . . . . . 7 | 6. Security Considerations . . . . . . . . . . . . . . . . . . . 7 | |||
| 7. Normative References . . . . . . . . . . . . . . . . . . . . . 8 | 7. Normative References . . . . . . . . . . . . . . . . . . . . . 8 | |||
| Appendix A. Acknowledgments . . . . . . . . . . . . . . . . . . . 9 | Appendix A. Acknowledgments . . . . . . . . . . . . . . . . . . . 8 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 10 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| Intellectual Property and Copyright Statements . . . . . . . . . . 11 | Intellectual Property and Copyright Statements . . . . . . . . . . 11 | |||
| 1. Introduction and Terminology | 1. Introduction and Terminology | |||
| With DNSSEC [1], an NSEC record lists the next instantiated name in | With DNSSEC [1], an NSEC record lists the next instantiated name in | |||
| its zone, proving that no names exist in the "span" between the | its zone, proving that no names exist in the "span" between the | |||
| NSEC's owner name and the name in the "next name" field. In this | NSEC's owner name and the name in the "next name" field. In this | |||
| document, an NSEC record is said to "cover" the names between its | document, an NSEC record is said to "cover" the names between its | |||
| owner name and next name. | owner name and next name. | |||
| skipping to change at page 4, line 40 ¶ | skipping to change at page 4, line 40 ¶ | |||
| document are to be interpreted as described in RFC 2119 [4]. | document are to be interpreted as described in RFC 2119 [4]. | |||
| 2. Applicability of This Technique | 2. Applicability of This Technique | |||
| The technique presented here may be useful to a zone owner that wants | The technique presented here may be useful to a zone owner that wants | |||
| to use DNSSEC, is concerned about exposure of its zone contents via | to use DNSSEC, is concerned about exposure of its zone contents via | |||
| zone walking, and is willing to bear the costs of on-line signing. | zone walking, and is willing to bear the costs of on-line signing. | |||
| As discussed in Section 6, on-line signing has several security | As discussed in Section 6, on-line signing has several security | |||
| risks, including an increased likelihood of private keys being | risks, including an increased likelihood of private keys being | |||
| disclosed and an increased risk of denial of service attack. Due to | disclosed and an increased risk of denial of service attack. Anyone | |||
| these concerns, this technique should only be used when the need to | ||||
| avoid exposure of zone contents is overwhelming. Anyone | ||||
| contemplating use of this technique is strongly encouraged to review | contemplating use of this technique is strongly encouraged to review | |||
| the discussion of the risks of on-line signing in Section 6. | the discussion of the risks of on-line signing in Section 6. | |||
| Furthermore, at the time this document was published, the DNSEXT | Furthermore, at the time this document was published, the DNSEXT | |||
| working group was actively working on a mechanism to prevent zone | working group was actively working on a mechanism to prevent zone | |||
| walking that does not require on-line signing (tentatively called | walking that does not require on-line signing (tentatively called | |||
| NSEC3). This technique is likely to expose slightly more information | NSEC3). The new mechanism is likely to expose slightly more | |||
| about the zone than this technique (e.g. the number of instantiated | information about the zone than this technique (e.g. the number of | |||
| names), but it will still likely be preferable to this technique. | instantiated names), but it may be preferable to this technique. | |||
| Anyone contemplating use of this technique is strongly encouraged to | ||||
| look for such future innovations. | ||||
| 3. Minimally Covering NSEC Records | 3. Minimally Covering NSEC Records | |||
| This mechanism involves changes to NSEC records for instantiated | This mechanism involves changes to NSEC records for instantiated | |||
| names, which can still be generated and signed in advance, as well as | names, which can still be generated and signed in advance, as well as | |||
| the on-demand generation and signing of new NSEC records whenever a | the on-demand generation and signing of new NSEC records whenever a | |||
| name must be proven not to exist. | name must be proven not to exist. | |||
| In the 'next name' field of instantiated names' NSEC records, rather | In the 'next name' field of instantiated names' NSEC records, rather | |||
| than list the next instantiated name in the zone, list any name that | than list the next instantiated name in the zone, list any name that | |||
| skipping to change at page 5, line 32 ¶ | skipping to change at page 5, line 29 ¶ | |||
| with all existing DNSSEC validators. These NSEC records are returned | with all existing DNSSEC validators. These NSEC records are returned | |||
| whenever proving something specifically about the owner name (e.g. | whenever proving something specifically about the owner name (e.g. | |||
| that no resource records of a given type appear at that name). | that no resource records of a given type appear at that name). | |||
| Whenever an NSEC record is needed to prove the non-existence of a | Whenever an NSEC record is needed to prove the non-existence of a | |||
| name, a new NSEC record is dynamically produced and signed. The new | name, a new NSEC record is dynamically produced and signed. The new | |||
| NSEC record has an owner name lexically before the QNAME but | NSEC record has an owner name lexically before the QNAME but | |||
| lexically following any existing name and a 'next name' lexically | lexically following any existing name and a 'next name' lexically | |||
| following the QNAME but before any existing name. | following the QNAME but before any existing name. | |||
| The generated NSEC record's type bitmap SHOULD have the RRSIG and | The generated NSEC record's type bitmap MUST have the RRSIG and NSEC | |||
| NSEC bits set and SHOULD NOT have any other bits set. This relaxes | bits set and SHOULD NOT have any other bits set. This relaxes the | |||
| the requirement in Section 2.3 of RFC4035 that NSEC RRs not appear at | requirement in Section 2.3 of RFC4035 that NSEC RRs not appear at | |||
| names that did not exist before the zone was signed. | names that did not exist before the zone was signed. | |||
| The functions to generate the lexically following and proceeding | The functions to generate the lexically following and proceeding | |||
| names need not be perfect nor consistent, but the generated NSEC | names need not be perfect nor consistent, but the generated NSEC | |||
| records must not cover any existing names. Furthermore, this | records must not cover any existing names. Furthermore, this | |||
| technique works best when the generated NSEC records cover as few | technique works best when the generated NSEC records cover as few | |||
| names as possible. In this document, the functions that generate the | names as possible. In this document, the functions that generate the | |||
| nearby names are called 'epsilon' functions, a reference to the | nearby names are called 'epsilon' functions, a reference to the | |||
| mathematical convention of using the greek letter epsilon to | mathematical convention of using the greek letter epsilon to | |||
| represent small deviations. | represent small deviations. | |||
| skipping to change at page 9, line 12 ¶ | skipping to change at page 9, line 7 ¶ | |||
| [4] Bradner, S., "Key words for use in RFCs to Indicate Requirement | [4] Bradner, S., "Key words for use in RFCs to Indicate Requirement | |||
| Levels", BCP 14, RFC 2119, March 1997. | Levels", BCP 14, RFC 2119, March 1997. | |||
| Appendix A. Acknowledgments | Appendix A. Acknowledgments | |||
| Many individuals contributed to this design. They include, in | Many individuals contributed to this design. They include, in | |||
| addition to the authors of this document, Olaf Kolkman, Ed Lewis, | addition to the authors of this document, Olaf Kolkman, Ed Lewis, | |||
| Peter Koch, Matt Larson, David Blacka, Suzanne Woolf, Jaap Akkerhuis, | Peter Koch, Matt Larson, David Blacka, Suzanne Woolf, Jaap Akkerhuis, | |||
| Jakob Schlyter, Bill Manning, and Joao Damas. | Jakob Schlyter, Bill Manning, and Joao Damas. | |||
| In addition, the editors would like to thank Ed Lewis for his careful | In addition, the editors would like to thank Ed Lewis, Scott Rose, | |||
| review of the document. | and David Blacka for their careful review of the document. | |||
| Authors' Addresses | Authors' Addresses | |||
| Samuel Weiler | Samuel Weiler | |||
| SPARTA, Inc | SPARTA, Inc | |||
| 7075 Samuel Morse Drive | 7075 Samuel Morse Drive | |||
| Columbia, Maryland 21046 | Columbia, Maryland 21046 | |||
| US | US | |||
| Email: weiler@tislabs.com | Email: weiler@tislabs.com | |||
| End of changes. 9 change blocks. | ||||
| 19 lines changed or deleted | 22 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||