draft-ietf-dnsop-dnssec-operational-practices-08.txt

来自「非常好的dns解析软件」· 文本 代码 · 共 1,507 行 · 第 1/5 页

TXT
1,507
字号
DNSOP                                                         O. KolkmanInternet-Draft                                                 R. GiebenObsoletes: 2541 (if approved)                                 NLnet LabsExpires: September 7, 2006                                 March 6, 2006                      DNSSEC Operational Practices          draft-ietf-dnsop-dnssec-operational-practices-08.txtStatus of this Memo   By submitting this Internet-Draft, each author represents that any   applicable patent or other IPR claims of which he or she is aware   have been or will be disclosed, and any of which he or she becomes   aware will be disclosed, in accordance with Section 6 of BCP 79.   Internet-Drafts are working documents of the Internet Engineering   Task Force (IETF), its areas, and its working groups.  Note that   other groups may also distribute working documents as Internet-   Drafts.   Internet-Drafts are draft documents valid for a maximum of six months   and may be updated, replaced, or obsoleted by other documents at any   time.  It is inappropriate to use Internet-Drafts as reference   material or to cite them other than as "work in progress."   The list of current Internet-Drafts can be accessed at   http://www.ietf.org/ietf/1id-abstracts.txt.   The list of Internet-Draft Shadow Directories can be accessed at   http://www.ietf.org/shadow.html.   This Internet-Draft will expire on September 7, 2006.Copyright Notice   Copyright (C) The Internet Society (2006).Abstract   This document describes a set of practices for operating the DNS with   security extensions (DNSSEC).  The target audience is zone   administrators deploying DNSSEC.   The document discusses operational aspects of using keys and   signatures in the DNS.  It discusses issues as key generation, key   storage, signature generation, key rollover and related policies.Kolkman & Gieben        Expires September 7, 2006               [Page 1]Internet-Draft        DNSSEC Operational Practices            March 2006   This document obsoletes RFC 2541, as it covers more operational   ground and gives more up to date requirements with respect to key   sizes and the new DNSSEC specification.Table of Contents   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4     1.1.  The Use of the Term 'key'  . . . . . . . . . . . . . . . .  4     1.2.  Time Definitions . . . . . . . . . . . . . . . . . . . . .  5   2.  Keeping the Chain of Trust Intact  . . . . . . . . . . . . . .  5   3.  Keys Generation and Storage  . . . . . . . . . . . . . . . . .  6     3.1.  Zone and Key Signing Keys  . . . . . . . . . . . . . . . .  6       3.1.1.  Motivations for the KSK and ZSK Separation . . . . . .  7       3.1.2.  KSKs for High Level Zones  . . . . . . . . . . . . . .  8     3.2.  Key Generation . . . . . . . . . . . . . . . . . . . . . .  8     3.3.  Key Effectivity Period . . . . . . . . . . . . . . . . . .  9     3.4.  Key Algorithm  . . . . . . . . . . . . . . . . . . . . . .  9     3.5.  Key Sizes  . . . . . . . . . . . . . . . . . . . . . . . . 10     3.6.  Private Key Storage  . . . . . . . . . . . . . . . . . . . 12   4.  Signature generation, Key Rollover and Related Policies  . . . 12     4.1.  Time in DNSSEC . . . . . . . . . . . . . . . . . . . . . . 12       4.1.1.  Time Considerations  . . . . . . . . . . . . . . . . . 13     4.2.  Key Rollovers  . . . . . . . . . . . . . . . . . . . . . . 14       4.2.1.  Zone Signing Key Rollovers . . . . . . . . . . . . . . 15       4.2.2.  Key Signing Key Rollovers  . . . . . . . . . . . . . . 19       4.2.3.  Difference Between ZSK and KSK Rollovers . . . . . . . 20       4.2.4.  Automated Key Rollovers  . . . . . . . . . . . . . . . 21     4.3.  Planning for Emergency Key Rollover  . . . . . . . . . . . 22       4.3.1.  KSK Compromise . . . . . . . . . . . . . . . . . . . . 22       4.3.2.  ZSK Compromise . . . . . . . . . . . . . . . . . . . . 24       4.3.3.  Compromises of Keys Anchored in Resolvers  . . . . . . 24     4.4.  Parental Policies  . . . . . . . . . . . . . . . . . . . . 24       4.4.1.  Initial Key Exchanges and Parental Policies               Considerations . . . . . . . . . . . . . . . . . . . . 24       4.4.2.  Storing Keys or Hashes?  . . . . . . . . . . . . . . . 25       4.4.3.  Security Lameness  . . . . . . . . . . . . . . . . . . 25       4.4.4.  DS Signature Validity Period . . . . . . . . . . . . . 26   5.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 26   6.  Security Considerations  . . . . . . . . . . . . . . . . . . . 27   7.  Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 27   8.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 27     8.1.  Normative References . . . . . . . . . . . . . . . . . . . 27     8.2.  Informative References . . . . . . . . . . . . . . . . . . 28   Appendix A.  Terminology . . . . . . . . . . . . . . . . . . . . . 29   Appendix B.  Zone Signing Key Rollover Howto . . . . . . . . . . . 30   Appendix C.  Typographic Conventions . . . . . . . . . . . . . . . 31   Appendix D.  Document Details and Changes  . . . . . . . . . . . . 33Kolkman & Gieben        Expires September 7, 2006               [Page 2]Internet-Draft        DNSSEC Operational Practices            March 2006     D.1.  draft-ietf-dnsop-dnssec-operational-practices-00 . . . . . 33     D.2.  draft-ietf-dnsop-dnssec-operational-practices-01 . . . . . 33     D.3.  draft-ietf-dnsop-dnssec-operational-practices-02 . . . . . 33     D.4.  draft-ietf-dnsop-dnssec-operational-practices-03 . . . . . 33     D.5.  draft-ietf-dnsop-dnssec-operational-practices-04 . . . . . 34     D.6.  draft-ietf-dnsop-dnssec-operational-practices-05 . . . . . 34     D.7.  draft-ietf-dnsop-dnssec-operational-practices-06 . . . . . 34     D.8.  draft-ietf-dnsop-dnssec-operational-practices-07 . . . . . 34     D.9.  draft-ietf-dnsop-dnssec-operational-practices-08 . . . . . 34   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 35   Intellectual Property and Copyright Statements . . . . . . . . . . 36Kolkman & Gieben        Expires September 7, 2006               [Page 3]Internet-Draft        DNSSEC Operational Practices            March 20061.  Introduction   This document describes how to run a DNSSEC (DNS SECure) enabled   environment.  It is intended for operators who have knowledge of the   DNS (see RFC 1034 [1] and RFC 1035 [2]) and want deploy DNSSEC.  See   RFC 4033 [4] for an introduction into DNSSEC and RFC 4034 [5] for the   newly introduced Resource Records and finally RFC 4035 [6] for the   protocol changes.   During workshops and early operational deployment tests, operators   and system administrators have gained experience about operating the   DNS with security extensions (DNSSEC).  This document translates   these experiences into a set of practices for zone administrators.   At the time of writing, there exists very little experience with   DNSSEC in production environments; this document should therefore   explicitly not be seen as representing 'Best Current Practices'.   The procedures herein are focused on the maintenance of signed zones   (i.e. signing and publishing zones on authoritative servers).  It is   intended that maintenance of zones such as re-signing or key   rollovers be transparent to any verifying clients on the Internet.   The structure of this document is as follows.  In Section 2 we   discuss the importance of keeping the "chain of trust" intact.   Aspects of key generation and storage of private keys are discussed   in Section 3; the focus in this section is mainly on the private part   of the key(s).  Section 4 describes considerations concerning the   public part of the keys.  Since these public keys appear in the DNS   one has to take into account all kinds of timing issues, which are   discussed in Section 4.1.  Section 4.2 and Section 4.3 deal with the   rollover, or supercession, of keys.  Finally Section 4.4 discusses   considerations on how parents deal with their children's public keys   in order to maintain chains of trust.   The typographic conventions used in this document are explained in   Appendix C.   Since this is a document with operational suggestions and there are   no protocol specifications, the RFC 2119 [9] language does not apply.   This document obsoletes RFC 2541 [12].1.1.  The Use of the Term 'key'   It is assumed that the reader is familiar with the concept of   asymmetric keys on which DNSSEC is based (Public Key Cryptography   [18]).  Therefore, this document will use the term 'key' rather   loosely.  Where it is written that 'a key is used to sign data' it isKolkman & Gieben        Expires September 7, 2006               [Page 4]Internet-Draft        DNSSEC Operational Practices            March 2006   assumed that the reader understands that it is the private part of   the key pair that is used for signing.  It is also assumed that the   reader understands that the public part of the key pair is published   in the DNSKEY resource record and that it is the public part that is   used in key exchanges.1.2.  Time Definitions   In this document we will be using a number of time related terms.   The following definitions apply:   o  "Signature validity period"         The period that a signature is valid.  It starts at the time         specified in the signature inception field of the RRSIG RR and         ends at the time specified in the expiration field of the RRSIG         RR.   o  "Signature publication period"         Time after which a signature (made with a specific key) is         replaced with a new signature (made with the same key).  This         replacement takes place by publishing the relevant RRSIG in the         master zone file.         After one stops publishing an RRSIG in a zone it may take a         while before the RRSIG has expired from caches and has actually         been removed from the DNS.   o  "Key effectivity period"         The period during which a key pair is expected to be effective.         This period is defined as the time between the first inception         time stamp and the last expiration date of any signature made         with this key, regardless of any discontinuity in the use of         the key.         The key effectivity period can span multiple signature validity         periods.   o  "Maximum/Minimum Zone Time to Live (TTL)"         The maximum or minimum value of the TTLs from the complete set         of RRs in a zone.  Note that the minimum TTL is not the same as         the MINIMUM field in the SOA RR.  See [11] for more         information.2.  Keeping the Chain of Trust Intact   Maintaining a valid chain of trust is important because broken chains   of trust will result in data being marked as Bogus (as defined in [4]   section 5), which may cause entire (sub)domains to become invisible   to verifying clients.  The administrators of secured zones have to   realize that their zone is, to verifying clients, part of a chain of   trust.   As mentioned in the introduction, the procedures herein are intendedKolkman & Gieben        Expires September 7, 2006               [Page 5]Internet-Draft        DNSSEC Operational Practices            March 2006   to ensure that maintenance of zones, such as re-signing or key   rollovers, will be transparent to the verifying clients on the   Internet.   Administrators of secured zones will have to keep in mind that data   published on an authoritative primary server will not be immediately   seen by verifying clients; it may take some time for the data to be   transferred to other secondary authoritative nameservers and clients   may be fetching data from caching non-authoritative servers.  In this   light it is good to note that the time for a zone transfer from   master to slave is negligible when using NOTIFY [8] and IXFR [7],   increasing by reliance on AXFR, and more if you rely on the SOA   timing parameters for zone refresh.   For the verifying clients it is important that data from secured   zones can be used to build chains of trust regardless of whether the   data came directly from an authoritative server, a caching nameserver   or some middle box.  Only by carefully using the available timing   parameters can a zone administrator assure that the data necessary

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?