draft-ietf-dnsop-dnssec-operational-practices-08.txt

来自「非常好的dns解析软件」· 文本 代码 · 共 1,507 行 · 第 1/5 页

TXT
1,507
字号
4.3.1.  KSK Compromise   A zone containing a DNSKEY RRSet with a compromised KSK is vulnerable   as long as the compromised KSK is configured as trust anchor or a   parental DS points to it.   A compromised KSK can be used to sign the key set of an attacker's   zone.  That zone could be used to poison the DNS.   Therefore when the KSK has been compromised, the trust anchor or the   parental DS, should be replaced as soon as possible.  It is local   policy whether to break the trust chain during the emergency   rollover.  The trust chain would be broken when the compromised KSK   is removed from the child's zone while the parent still has a DS   pointing to the compromised KSK (the assumption is that there is only   one DS at the parent.  If there are multiple DSs this does not apply   -- however the chain of trust of this particular key is broken).   Note that an attacker's zone still uses the compromised KSK and theKolkman & Gieben        Expires September 7, 2006              [Page 22]Internet-Draft        DNSSEC Operational Practices            March 2006   presence of a parental DS would cause the data in this zone to appear   as valid.  Removing the compromised key would cause the attacker's   zone to appear as valid and the child's zone as Bogus.  Therefore we   advise not to remove the KSK before the parent has a DS to a new KSK   in place.4.3.1.1.  Keeping the Chain of Trust Intact   If we follow this advice the timing of the replacement of the KSK is   somewhat critical.  The goal is to remove the compromised KSK as soon   as the new DS RR is available at the parent.  And also make sure that   the signature made with a new KSK over the key set with the   compromised KSK in it expires just after the new DS appears at the   parent.  Thus removing the old cruft in one swoop.   The procedure is as follows:   1.  Introduce a new KSK into the key set, keep the compromised KSK in       the key set.   2.  Sign the key set, with a short validity period.  The validity       period should expire shortly after the DS is expected to appear       in the parent and the old DSs have expired from caches.   3.  Upload the DS for this new key to the parent.   4.  Follow the procedure of the regular KSK rollover: Wait for the DS       to appear in the authoritative servers and then wait as long as       the TTL of the old DS RRs.  If necessary re-sign the DNSKEY RRSet       and modify/extend the expiration time.   5.  Remove the compromised DNSKEY RR from the zone and re-sign the       key set using your "normal" validity interval.   An additional danger of a key compromise is that the compromised key   could be used to facilitate a legitimate DNSKEY/DS rollover and/or   nameserver changes at the parent.  When that happens the domain may   be in dispute.  An authenticated out-of-band and secure notify   mechanism to contact a parent is needed in this case.   Note that this is only a problem when the DNSKEY and or DS records   are used for authentication at the parent.4.3.1.2.  Breaking the Chain of Trust   There are two methods to break the chain of trust.  The first method   causes the child zone to appear as 'Bogus' to validating resolvers.   The other causes the the child zone to appear as 'insecure'.  These   are described below.   In the method that causes the child zone to appear as 'Bogus' to   validating resolvers, the child zone replaces the current KSK with a   new one and resigns the key set.  Next it sends the DS of the new keyKolkman & Gieben        Expires September 7, 2006              [Page 23]Internet-Draft        DNSSEC Operational Practices            March 2006   to the parent.  Only after the parent has placed the new DS in the   zone, the child's chain of trust is repaired.   An alternative method of breaking the chain of trust is by removing   the DS RRs from the parent zone altogether.  As a result the child   zone would become insecure.4.3.2.  ZSK Compromise   Primarily because there is no parental interaction required when a   ZSK is compromised, the situation is less severe than with a KSK   compromise.  The zone must still be re-signed with a new ZSK as soon   as possible.  As this is a local operation and requires no   communication between the parent and child this can be achieved   fairly quickly.  However, one has to take into account that just as   with a normal rollover the immediate disappearance of the old   compromised key may lead to verification problems.  Also note that as   long as the RRSIG over the compromised ZSK is not expired the zone   may be still at risk.4.3.3.  Compromises of Keys Anchored in Resolvers   A key can also be pre-configured in resolvers.  For instance, if   DNSSEC is successfully deployed the root key may be pre-configured in   most security aware resolvers.   If trust-anchor keys are compromised, the resolvers using these keys   should be notified of this fact.  Zone administrators may consider   setting up a mailing list to communicate the fact that a SEP key is   about to be rolled over.  This communication will of course need to   be authenticated e.g. by using digital signatures.   End-users faced with the task of updating an anchored key should   always validate the new key.  New keys should be authenticated out-   of-band, for example, looking them up on an SSL secured announcement   website.4.4.  Parental Policies4.4.1.  Initial Key Exchanges and Parental Policies Considerations   The initial key exchange is always subject to the policies set by the   parent.  When designing a key exchange policy one should take into   account that the authentication and authorization mechanisms used   during a key exchange should be as strong as the authentication and   authorization mechanisms used for the exchange of delegation   information between parent and child.  I.e. there is no implicit need   in DNSSEC to make the authentication process stronger than it was inKolkman & Gieben        Expires September 7, 2006              [Page 24]Internet-Draft        DNSSEC Operational Practices            March 2006   DNS.   Using the DNS itself as the source for the actual DNSKEY material,   with an out-of-band check on the validity of the DNSKEY, has the   benefit that it reduces the chances of user error.  A DNSKEY query   tool can make use of the SEP bit [3] to select the proper key from a   DNSSEC key set; thereby reducing the chance that the wrong DNSKEY is   sent.  It can validate the self-signature over a key; thereby   verifying the ownership of the private key material.  Fetching the   DNSKEY from the DNS ensures that the chain of trust remains intact   once the parent publishes the DS RR indicating the child is secure.   Note: the out-of-band verification is still needed when the key-   material is fetched via the DNS.  The parent can never be sure   whether the DNSKEY RRs have been spoofed or not.4.4.2.  Storing Keys or Hashes?   When designing a registry system one should consider which of the   DNSKEYs and/or the corresponding DSs to store.  Since a child zone   might wish to have a DS published using a message digest algorithm   not yet understood by the registry, the registry can't count on being   able to generate the DS record from a raw DNSKEY.  Thus, we recommend   that registry systems at least support storing DS records.   It may also be useful to store DNSKEYs, since having them may help   during troubleshooting and, as long as the child's chosen message   digest is supported, the overhead of generating DS records from them   is minimal.  Having an out-of-band mechanism, such as a registry   directory (e.g.  Whois), to find out which keys are used to generate   DS Resource Records for specific owners and/or zones may also help   with troubleshooting.   The storage considerations also relate to the design of the customer   interface and the method by which data is transferred between   registrant and registry; Will the child zone administrator be able to   upload DS RRs with unknown hash algorithms or does the interface only   allow DNSKEYs?  In the registry-registrar model one can use the   DNSSEC EPP protocol extension [16] which allows transfer of DS RRs   and optionally DNSKEY RRs.4.4.3.  Security Lameness   Security Lameness is defined as what happens when a parent has a DS   RR pointing to a non-existing DNSKEY RR.  When this happens the   child's zone may be marked as "Bogus" by verifying DNS clients.   As part of a comprehensive delegation check the parent could, at keyKolkman & Gieben        Expires September 7, 2006              [Page 25]Internet-Draft        DNSSEC Operational Practices            March 2006   exchange time, verify that the child's key is actually configured in   the DNS.  However if a parent does not understand the hashing   algorithm used by child the parental checks are limited to only   comparing the key id.   Child zones should be very careful removing DNSKEY material,   specifically SEP keys, for which a DS RR exists.   Once a zone is "security lame", a fix (e.g. removing a DS RR) will   take time to propagate through the DNS.4.4.4.  DS Signature Validity Period   Since the DS can be replayed as long as it has a valid signature, a   short signature validity period over the DS minimizes the time a   child is vulnerable in the case of a compromise of the child's   KSK(s).  A signature validity period that is too short introduces the   possibility that a zone is marked Bogus in case of a configuration   error in the signer.  There may not be enough time to fix the   problems before signatures expire.  Something as mundane as operator   unavailability during weekends shows the need for DS signature   validity periods longer than 2 days.  We recommend an absolute   minimum for a DS signature validity period of a few days.   The maximum signature validity period of the DS record depends on how   long child zones are willing to be vulnerable after a key compromise.   On the other hand shortening the DS signature validity interval   increases the operational risk for the parent.  Therefore the parent   may have policy to use a signature validity interval that is   considerably longer than the child would hope for.   A compromise between the operational constraints of the parent and   minimizing damage for the child may result in a DS signature validity   period somewhere between the order of a week to order of months.   In addition to the signature validity period, which sets a lower   bound on the number of times the zone owner will need to sign the   zone data and which sets an upper bound to the time a child is   vulnerable after key compromise, there is the TTL value on the DS   RRs.  Shortening the TTL means that the authoritative servers will   see more queries.  But on the other hand, a short TTL lowers the   persistence of DS RRSets in caches thereby increases the speed with   which updated DS RRSets propagate through the DNS.5.  IANA Considerations   This overview document introduces no new IANA considerations.Kolkman & Gieben        Expires September 7, 2006              [Page 26]Internet-Draft        DNSSEC Operational Practices            March 20066.  Security Considerations   DNSSEC adds data integrity to the DNS.  This document tries to assess   the operational considerations to maintain a stable and secure DNSSEC   service.  Not taking into account the 'data propagation' properties   in the DNS will cause validation failures and may make secured zones   unavailable to security aware resolvers.7.  Acknowledgments   Most of the ideas in this draft were the result of collective efforts   during workshops, discussions and try outs.   At the risk of forgetting individuals who were the original   contributors of the ideas we would like to acknowledge people who   were actively involved in the compilation of this document.  In   random order: Rip Loomis, Olafur Gudmundsson, Wesley Griffin, Michael   Richardson, Scott Rose, Rick van Rein, Tim McGinnis, Gilles Guette   Olivier Courtay, Sam Weiler, Jelte Jansen, Niall O'Reilly, Holger   Zuleger, Ed Lewis, Hilarie Orman, Marcos Sanz and Peter Koch.   Some material in this document has been copied from RFC 2541 [12].   Mike StJohns designed the key exchange between parent and child   mentioned in the last paragraph of Section 4.2.2   Section 4.2.4 was supplied by G. Guette and O. Courtay.   Emma Bretherick, Adrian Bedford and Lindy Foster corrected many of   the spelling and style issues.   Kolkman and Gieben take the blame for introducing all miscakes(SIC).   Kolkman was employed by the RIPE NCC while working on this document.8.  References8.1.  Normative References   [1]  Mockapetris, P., "Domain names - concepts and facilities",        STD 13, RFC 1034, November 1987.   [2]  Mockapetris, P., "Domain names - implementation and        specification", STD 13, RFC 1035, November 1987.   [3]  Kolkman, O., Schlyter, J., and E. Lewis, "Domain 

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?