📄 draft-ietf-dnsext-zone-status-03.txt
字号:
DNSEXT WG Edward LewisINTERNET DRAFT NAI LabsCategory:I-D September 19, 2000 DNS Security Extension Clarification on Zone Status <draft-ietf-dnsext-zone-status-03.txt>Status of this MemoThis document is an Internet-Draft and is in full conformance with allprovisions of Section 10 of RFC2026.Internet-Drafts are working documents of the Internet Engineering TaskForce (IETF), its areas, and its working groups. Note that othergroups may also distribute working documents as Internet-Drafts.Internet-Drafts are draft documents valid for a maximum of six monthsand may be updated, replaced, or obsoleted by other documents at anytime. It is inappropriate to use Internet-Drafts as referencematerial or to cite them other than as "work in progress."The list of current Internet-Drafts can be accessed athttp://www.ietf.org/ietf/1id-abstracts.txtThe list of Internet-Draft Shadow Directories can be accessed athttp://www.ietf.org/shadow.html.Comments should be sent to the authors or the DNSEXT WG mailing listnamedroppers@ops.ietf.org.This draft expires on March, 19, 2001.Copyright NoticeCopyright (C) The Internet Society (1999, 2000). All rights reserved.AbstractThe definition of a secured zone is presented, clarifying and updatingsections of RFC 2535. RFC 2535 defines a zone to be secured based on aper algorithm basis, e.g., a zone can be secured with RSA keys, andnot secured with DSA keys. This document changes this to define azone to be secured or not secured regardless of the key algorithm used(or not used). To further simplify the determination of a zone'sstatus, "experimentally secure" status is deprecated.1 IntroductionWhether a DNS zone is "secured" or not is a question asked in at leastfour contexts. A zone administrator asks the question whenconfiguring a zone to use DNSSEC. A dynamic update server asks thequestion when an update request arrives, which may require DNSSECprocessing. A delegating zone asks the question of a child zone whenthe parent enters data indicating the status the child. A resolverasks the question upon receipt of data belonging to the zone.Expires March 19, 2001 [Page 1]Internet Draft September 19, 20001.1 When a Zone's Status is ImportantA zone administrator needs to be able to determine what steps areneeded to make the zone as secure as it can be. Realizing that due tothe distributed nature of DNS and its administration, any single zoneis at the mercy of other zones when it comes to the appearance ofsecurity. This document will define what makes a zone qualify assecure.A name server performing dynamic updates needs to know whether a zonebeing updated is to have signatures added to the updated data, NXTrecords applied, and other required processing. In this case, it isconceivable that the name server is configured with the knowledge, butbeing able to determine the status of a zone by examining the data isa desirable alternative to configuration parameters.A delegating zone is required to indicate whether a child zone issecured. The reason for this requirement lies in the way in which aresolver makes its own determination about a zone (next paragraph). Toshorten a long story, a parent needs to know whether a child should beconsidered secured. This is a two part question. Under whatcircumstances does a parent consider a child zone to be secure, andhow does a parent know if the child conforms?A resolver needs to know if a zone is secured when the resolver isprocessing data from the zone. Ultimately, a resolver needs to knowwhether or not to expect a usable signature covering the data. Howthis determination is done is out of the scope of this document,except that, in some cases, the resolver will need to contact theparent of the zone to see if the parent states that the child issecured.1.2 Islands of SecurityThe goal of DNSSEC is to have each zone secured, from the root zoneand the top-level domains down the hierarchy to the leaf zones.Transitioning from an unsecured DNS, as we have now, to a fullysecured - or "as much as will be secured" - tree will take some time.During this time, DNSSEC will be applied in various locations in thetree, not necessarily "top down."For example, at a particular instant, the root zone and the "test."TLD might be secured, but region1.test. might not be. (For reference,let's assume that region2.test. is secured.) However,subarea1.region1.test. may have gone through the process of becomingsecured, along with its delegations. The dilemma here is thatsubarea1 cannot get its zone keys properly signed as its parent zone,region1, is not secured.The colloquial phrase describing the collection of contiguous securedzones at or below subarea1.region1.test. is an "island of security." The only way in which a DNSSEC resolver will come to trust any datafrom this island is if the resolver is pre-configured with the zonekey(s) for subarea1.region1.test., i.e., the root of the island ofExpires March 19, 2001 [Page 2]Internet Draft September 19, 2000security. Other resolvers (not so configured) will recognize thisisland as unsecured.An island of security begins with one zone whose public key ispre-configured in resolvers. Within this island are subzones whichare also secured. The "bottom" of the island is defined bydelegations to unsecured zones. One island may also be on top ofanother - meaning that there is at least one unsecured zone betweenthe bottom of the upper island and the root of the lower securedisland.Although both subarea1.region1.test. and region2.test. have both beenproperly brought to a secured state by the administering staff, onlythe latter of the two is actually "globally" secured - in the sensethat all DNSSEC resolvers can and will verify its data. The former,subarea1, will be seen as secured by a subset of those resolvers, justthose appropriately configured. This document refers to such zones asbeing "locally" secured.In RFC 2535, there is a provision for "certification authorities,"entities that will sign public keys for zones such as subarea1. Thereis another draft, [SIGAUTH], that restricts this activity. Regardlessof the other draft, resolvers would still need proper configuration tobe able to use the certification authority to verify the data for thesubarea1 island.1.2.1 Determing the closest security rootGiven a domain, in order to determine whether it is secure or not, thefirst step is to determine the closest security root. The closestsecurity root is the top of an island of security whose name has themost matching (in order from the root) right-most labels to the givendomain.For example, given a name "sub.domain.testing.signed.exp.test.", andgiven the secure roots "exp.test.", "testing.signed.exp.test." and"not-the-same.xy.", the middle one is the closest. The first secureroot shares 2 labels, the middle 4, and the last 0.The reason why the closest is desired is to eliminate false senses ofinsecurity becuase of a NULL key. Continuing with the example, thereason both "testing..." and "exp.test." are listed as secure root ispresumably because "signed.exp.test." is unsecured (has a NULL key). If we started to descend from "exp.test." to our given domain(sub...), we would encounter a NULL key and conclude that sub... wasunsigned. However, if we descend from "testing..." and find keys"domain...." then we can conclude that "sub..." is secured.Note that this example assumes one-label deep zones, and assumes thatwe do not configure overlapping islands of security. To be clear, thedefinition given should exclude "short.xy.test." from being a closestsecurity root for "short.xy." even though 2 labels match.Overlapping islands of security introduce no conceptually interestingExpires March 19, 2001 [Page 3]Internet Draft September 19, 2000ideas and do not impact the protocol in anyway. However, protocolimplementers are advised to make sure their code is not thrown for aloop by overlaps. Overlaps are sure to be configuration problems asislands of security grow to encompass larger regions of the namespace.1.3 Parent Statement of Child SecurityIn 1.1 of this document, there is the comment "the parent states thatthe child is secured." This has caused quite a bit of confusion.The need to have the parent "state" the status of a child is derivedfrom the following observation. If you are looking to see if ananswer is secured, that it comes from an "island of security" and isproperly signed, you must begin at the (appropriate) root of theisland of security.To find the answer you are inspecting, you may have to descend throughzones within the island of security. Beginning with the trusted rootof the island, you descend into the next zone down. As you trust theupper zone, you need to get data from it about the next zone down,otherwise there is a vulnerable point in which a zone can be hijacked. When or if you reach a point of traversing from a secured zone to anunsecured zone, you have left the island of security and shouldconclude that the answer is unsecured.However, in RFC 2535, section 2.3.4, these words seem to conflict withthe need to have the parent "state" something about a child: There MUST be a zone KEY RR, signed by its superzone, for every subzone if the superzone is secure. This will normally appear in the subzone and may also be included in the superzone. But, in the case of an unsecured subzone which can not or will not be modified to add any security RRs, a KEY declaring the subzone to be unsecured MUST appear with the superzone signature in the superzone, if the superzone is secure.The confusion here is that in RFC 2535, a secured parent states that achild is secured by SAYING NOTHING ("may also be" as opposed to "MUSTalso be"). This is counter intuitive, the fact that an absence ofdata means something is "secured." This notion, while acceptable in atheoretic setting has met with some discomfort in an operationsetting. However, the use of "silence" to state something does indeedwork in this case, so there hasn't been sufficient need demonstratedto change the definition.1.4 Impact on RFC 2535This document updates sections of RFC 2535. The definition of asecured zone is an update to section 3.4 of the RFC. Section 3.4 isupdated to eliminate the definition of experimental keys andillustrate a way to still achieve the functionality they were designedto provide. Section 3.1.3 is updated by the specifying the value ofthe protocol octet in a zone key.Expires March 19, 2001 [Page 4]Internet Draft September 19, 20001.5 "MUST" and other key wordsThe key words "MUST", "REQUIRED", "SHOULD", "RECOMMENDED", and "MAY"in this document are to be interpreted as described in [RFC 2119]. Currently, only "MUST" is used in this document.2 Status of a ZoneIn this section, rules governing a zone's DNSSEC status are presented.There are three levels of security defined: global, local, andunsecured. A zone is globally secure when it complies with thestrictest set of DNSSEC processing rules. A zone is locally securedwhen it is configured in such a way that only resolvers that areappropriately configured see the zone as secured. All other zones areunsecured.Note: there currently is no document completely defining DNSSECverification rules. For the purposes of this document, the strictestrules are assumed to state that the verification chain of zone keysparallels the delegation tree up to the root zone. (See 2.b below.) This is not intended to disallow alternate verification paths, just toestablish a baseline definition.To avoid repetition in the rules below, the following terms aredefined.2.a. Zone signing KEY RR - A KEY RR whose flag field has the value 01for name type (indicating a zone key) and either value 00 or value 01for key type (indicating a key permitted to authenticate data). (See
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -