⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-dnsext-dnssec-trans-02.txt

📁 bind 源码 最新实现 linux/unix/windows平台
💻 TXT
📖 第 1 页 / 共 2 页
字号:
   A new DNSKEY may be defined to declare NSEC optional per zone.2.1.6.1  Coexistence and Migration   Current resolvers/validators will not understand the Flag bit and   will have to treat negative responses as bogus.  Otherwise, no   migration path is needed since NSEC is simply turned off.2.1.6.2  Limitations   NSEC can only be made completely optional at the cost of being unable   to prove unsecure delegations (absence of a DS RR [RFC3658]).  A next   to this approach would just disable authenticated denial for   non-existence of nodes.2.1.6.3  Amendments to DNSSEC-bis   New DNSKEY Flag to be defined.  Resolver/Validator behaviour needs to   be specified in the light of absence of authenticated denial.Arends, et al.           Expires August 25, 2005                [Page 8]Internet-Draft    Evaluating DNSSEC Transition Mechanisms  February 20052.1.6.4  Cons   Doesn't fully meet requirements.  Operational consequences to be   studied.2.1.6.5  Pros   Official version of the "trick" presented in (8).  Operational   problems can be addressed during future work on validators.2.1.7  New Answer Pseudo RR Type   A new pseudo RR type may be defined that will be dynamically created   (and signed) by the responding authoritative server.  The RR in the   response will cover the QNAME, QCLASS and QTYPE and will authenticate   both denial of existence of name (NXDOMAIN) or RRset.2.1.7.1  Coexistence and Migration   Current resolvers/validators will not understand the pseudo RR and   will thus not be able to process negative responses so testified.  A   signaling or solicitation method would have to be specified.2.1.7.2  Limitations   This method can only be used with online keys and online signing   capacity.2.1.7.3  Amendments to DNSSEC-bis   Signaling method needs to be defined.2.1.7.4  Cons   Keys have to be held and processed online with all security   implications.  An additional flag for those keys identifying them as   online or negative answer only keys should be considered.2.1.7.5  Pros   Expands DNSSEC authentication to the RCODE.2.1.8  SIG(0) Based Authenticated Denial2.1.8.1  Coexistence and MigrationArends, et al.           Expires August 25, 2005                [Page 9]Internet-Draft    Evaluating DNSSEC Transition Mechanisms  February 20052.1.8.2  Limitations2.1.8.3  Amendments to DNSSEC-bis2.1.8.4  Cons2.1.8.5  Pros2.2  Mechanisms Without Need of Updating DNSSEC-bis2.2.1  Partial Type-code and Signal Rollover   Carefully crafted type code/signal rollover to define a new   authenticated denial space that extends/replaces DNSSEC-bis   authenticated denial space.  This particular path is illuminated by   Paul Vixie in a Message-Id <20040602070859.0F50913951@sa.vix.com>   posted to <namedroppers@ops.ietf.org> 2004-06-02.2.2.1.1  Coexistence and Migration   To protect the current resolver for future versions, a new DNSSEC-OK   bit must be allocated to make clear it does or does not understand   the future version.  Also, a new DS type needs to be allocated to   allow differentiation between a current signed delegation and a   'future' signed delegation.  Also, current NSEC needs to be rolled   into a new authenticated denial type.2.2.1.2  Limitations   None.2.2.1.3  Amendments to DNSSEC-bis   None.2.2.1.4  Cons   It is cumbersome to carefully craft an TCR that 'just fits'.  The   DNSSEC-bis protocol has many 'borderline' cases that needs special   consideration.  It might be easier to do a full TCR, since a few of   the types and signals need upgrading anyway.Arends, et al.           Expires August 25, 2005               [Page 10]Internet-Draft    Evaluating DNSSEC Transition Mechanisms  February 20052.2.1.5  Pros   Graceful adoption of future versions of NSEC, while there are no   amendments to DNSSEC-bis.2.2.2  A Complete Type-code and Signal Rollover   A new DNSSEC space is defined which can exist independent of current   DNSSEC-bis space.   This proposal assumes that all current DNSSEC type-codes   (RRSIG/DNSKEY/NSEC/DS) and signals (DNSSEC-OK) are not used in any   future versions of DNSSEC.  Any future version of DNSSEC has its own   types to allow for keys, signatures, authenticated denial, etcetera.2.2.2.1  Coexistence and Migration   Both spaces can co-exist.  They can be made completely orthogonal.2.2.2.2  Limitations   None.2.2.2.3  Amendments to DNSSEC-bis   None.2.2.2.4  Cons   With this path we abandon the current DNSSEC-bis.  Though it is easy   to role specific well-known and well-tested parts into the re-write,   once deployment has started this path is very expensive for   implementers, registries, registrars and registrants as well as   resolvers/users.  A TCR is not to be expected to occur frequently, so   while a next generation authenticated denial may be enabled by a TCR,   it is likely that that TCR will only be agreed upon if it serves a   whole basket of changes or additions.  A quick introduction of   NSEC-ng should not be expected from this path.2.2.2.5  Pros   No amendments/changes to current DNSSEC-bis docset needed.  It is   always there as last resort.2.2.3  Unknown Algorithm in RRSIG   This proposal assumes that future extensions make use of the existing   NSEC RDATA syntax, while it may need to change the interpretation ofArends, et al.           Expires August 25, 2005               [Page 11]Internet-Draft    Evaluating DNSSEC Transition Mechanisms  February 2005   the RDATA or introduce an alternative denial mechanism, invoked by   the specific unknown signing algorithm.  The different interpretation   would be signaled by use of different signature algorithms in the   RRSIG records covering the NSEC RRs.   When an entire zone is signed with a single unknown algorithm, it   will cause implementations that follow current dnssec-bis documents   to treat individual RRsets as unsigned.2.2.3.1  Coexistence and migration   Old and new NSEC RDATA interpretation or known and unknown Signatures   can NOT coexist in a zone since signatures cover complete (NSEC)   RRSets.2.2.3.2  Limitations   Validating resolvers agnostic of new interpretation will treat the   NSEC RRset as "not signed".  This affects wildcard and non-existence   proof, as well as proof for (un)secured delegations.  Also, all   positive signatures (RRSIGs on RRSets other than DS, NSEC) appear   insecure/bogus to an old validator.   The algorithm version space is split for each future version of   DNSSEC.  Violation of the 'modular components' concept.  We use the   'validator' to protect the 'resolver' from unknown interpretations.2.2.3.3  Amendments to DNSSEC-bis   None.2.2.3.4  Cons   The algorithm field was not designed for this purpose.  This is a   straightforward hack.2.2.3.5  Pros   No amendments/changes to current DNSSEC-bis docset needed.3.  Recommendation   The authors recommend that the working group commits to and starts   work on a partial TCR, allowing graceful transition towards a future   version of NSEC.  Meanwhile, to accomodate the need for an   immediately, temporary, solution against zone-traversal, we recommend   On-Demand NSEC synthesis.Arends, et al.           Expires August 25, 2005               [Page 12]Internet-Draft    Evaluating DNSSEC Transition Mechanisms  February 2005   This approach does not require any mandatory changes to DNSSEC-bis,   does not violate the protocol and fulfills the requirements.  As a   side effect, it moves the cost of implementation and deployment to   the users (zone owners) of this mechanism.4.  Acknowledgements   The authors would like to thank Sam Weiler and Mark Andrews for their   input and constructive comments.5.  References5.1  Normative References   [I-D.ietf-dnsext-dnssec-intro]              Arends, R., Austein, R., Massey, D., Larson, M. and S.              Rose, "DNS Security Introduction and Requirements",              Internet-Draft draft-ietf-dnsext-dnssec-intro-13, October              2004.   [I-D.ietf-dnsext-dnssec-protocol]              Arends, R., "Protocol Modifications for the DNS Security              Extensions",              Internet-Draft draft-ietf-dnsext-dnssec-protocol-09,              October 2004.   [I-D.ietf-dnsext-dnssec-records]              Arends, R., "Resource Records for the DNS Security              Extensions",              Internet-Draft draft-ietf-dnsext-dnssec-records-11,              October 2004.   [RFC1034]  Mockapetris, P., "Domain names - concepts and facilities",              STD 13, RFC 1034, November 1987.   [RFC1035]  Mockapetris, P., "Domain names - implementation and              specification", STD 13, RFC 1035, November 1987.   [RFC2931]  Eastlake, D., "DNS Request and Transaction Signatures (              SIG(0)s)", RFC 2931, September 2000.5.2  Informative References   [RFC1535]  Gavron, E., "A Security Problem and Proposed Correction              With Widely Deployed DNS Software", RFC 1535, October              1993.   [RFC2535]  Eastlake, D., "Domain Name System Security Extensions",Arends, et al.           Expires August 25, 2005               [Page 13]Internet-Draft    Evaluating DNSSEC Transition Mechanisms  February 2005              RFC 2535, March 1999.   [RFC2629]  Rose, M., "Writing I-Ds and RFCs using XML", RFC 2629,              June 1999.   [RFC3658]  Gudmundsson, O., "Delegation Signer (DS) Resource Record              (RR)", RFC 3658, December 2003.Authors' Addresses   Roy Arends   Telematica Instituut   Brouwerijstraat 1   Enschede  7523 XC   The Netherlands   Phone: +31 53 4850485   Email: roy.arends@telin.nl   Peter Koch   DENIC eG   Wiesenh"uttenplatz 26   Frankfurt  60329   Germany   Phone: +49 69 27235 0   Email: pk@DENIC.DE   Jakob Schlyter   NIC-SE   Box 5774   Stockholm  SE-114 87   Sweden   Email: jakob@nic.se   URI:   http://www.nic.se/Arends, et al.           Expires August 25, 2005               [Page 14]Internet-Draft    Evaluating DNSSEC Transition Mechanisms  February 2005Intellectual Property Statement   The IETF takes no position regarding the validity or scope of any   Intellectual Property Rights or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; nor does it represent that it has   made any independent effort to identify any such rights.  Information   on the procedures with respect to rights in RFC documents can be   found in BCP 78 and BCP 79.   Copies of IPR disclosures made to the IETF Secretariat and any   assurances of licenses to be made available, or the result of an   attempt made to obtain a general license or permission for the use of   such proprietary rights by implementers or users of this   specification can be obtained from the IETF on-line IPR repository at   http://www.ietf.org/ipr.   The IETF invites any interested party to bring to its attention any   copyrights, patents or patent applications, or other proprietary   rights that may cover technology that may be required to implement   this standard.  Please address the information to the IETF at   ietf-ipr@ietf.org.Disclaimer of Validity   This document and the information contained herein are provided on an   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Copyright Statement   Copyright (C) The Internet Society (2005).  This document is subject   to the rights, licenses and restrictions contained in BCP 78, and   except as set forth therein, the authors retain all their rights.Acknowledgment   Funding for the RFC Editor function is currently provided by the   Internet Society.Arends, et al.           Expires August 25, 2005               [Page 15]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -