⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-dnsext-zone-status-03.txt

📁 bind-3.2.
💻 TXT
📖 第 1 页 / 共 2 页
字号:
RFC 2535, section 3.1.2).  The KEY RR also has a protocol octet valueof DNSSEC (3) or ALL (255).The definition updates RFC 2535's definition of a zone key.  Therequirement that the protocol field be either DNSSEC or ALL is a newrequirement, a change to section 3.1.3.)2.b On-tree Validation - The authorization model in which only theparent zone is recognized to supply a DNSSEC-meaningful signature thatis used by a resolver to build a chain of trust from the child's keysto a recognized root of security.  The term "on-tree" refers tofollowing the DNS domain hierarchy (upwards) to reach a trusted key,presumably the root key if no other key is available.  The term"validation" refers to the digital signature by the parent to provethe integrity, authentication and authorization of the child' key tosign the child's zone data.2.c Off-tree Validation - Any authorization model that permits domainnames other than the parent's to provide a signature over a child'szone keys that will enable a resolver to trust the keys.2.1 Globally SecuredA globally secured zone, in a nutshell, is a zone that uses onlymandatory to implement algorithms (RFC 2535, section 3.2) and reliesExpires March 19, 2001                                      [Page  5]Internet Draft                                     September 19, 2000on a key certification chain that parallels the delegation tree(on-tree validation).  Globally secured zones are defined by thefollowing rules.2.1.a. The zone's apex MUST have a KEY RR set.  There MUST be at leastone zone signing KEY RR (2.a) of a mandatory to implement algorithm inthe set.2.1.b. The zone's apex KEY RR set MUST be signed by a private keybelonging to the parent zone.  The private key's public companion MUSTbe a zone signing KEY RR (2.a) of a mandatory to implement algorithmand owned by the parent's apex.If a zone cannot get a conforming signature from the parent zone, thechild zone cannot be considered globally secured.  The only exceptionto this is the root zone, for which there is no parent zone.2.1.c. NXT records MUST be deployed throughout the zone. (ClarifiesRFC 2535, section 2.3.2.)  Note: there is some operational discomfortwith the current NXT record.  This requirement is open to modificationwhen two things happen.  First, an alternate mechanism to the NXT isdefined and second, a means by which a zone can indicate that it isusing an alternate method.2.1.d. Each RR set that qualifies for zone membership MUST be signedby a key that is in the apex's KEY RR set and is a zone signing KEY RR(2.a) of a mandatory to implement algorithm.  (Updates 2535, section2.3.1.)Mentioned earlier, the root zone is a special case.  The root zonewill be considered to be globally secured provided that if conforms tothe rules for locally secured, with the exception that rule 2.1.a. bealso met (mandatory to implement requirement).2.2 Locally SecuredThe term "locally" stems from the likely hood that the only resolversto be configured for a particular zone will be resolvers "local" to anorganization.A locally secured zone is a zone that complies with rules like thosefor a globally secured zone with the following exceptions.  Thesigning keys may be of an algorithm that is not mandatory to implementand/or the verification of the zone keys in use may rely on averification chain that is not parallel to the delegation tree(off-tree validation).2.2.a. The zone's apex MUST have a KEY RR set.  There MUST be at leastone zone signing KEY RR (2.a) in the set.2.2.b. The zone's apex KEY RR set MUST be signed by a private key andone of the following two subclauses MUST hold true.Expires March 19, 2001                                      [Page  6]Internet Draft                                     September 19, 20002.2.b.1 The private key's public companion MUST be pre-configured inall the resolvers of interest.2.2.b.2 The private key's public component MUST be a zone signing KEYRR (2.a) authorized to provide validation of the zone's apex KEY RRset, as recognized by resolvers of interest.The previous sentence is trying to convey the notion of using atrusted third party to provide validation of keys.  If the domain nameowning the validating key is not the parent zone, the domain name mustrepresent someone the resolver trusts to provide validation.2.2.c. NXT records MUST be deployed throughout the zone.  Note: seethe discussion following 2.1.c.2.2.d. Each RR set that qualifies for zone membership MUST be signedby a key that is in the apex's KEY RR set and is a zone signing KEY RR(2.a).  (Updates 2535, section 2.3.1.)2.3 UnsecuredAll other zones qualify as unsecured.  This includes zones that aredesigned to be experimentally secure, as defined in a later section onthat topic.2.4 Wrap upThe designation of globally secured, locally secured, and unsecuredare merely labels to apply to zones, based on their contents. Resolvers, when determining whether a signature is expected or not,will only see a zone as secured or unsecured.Resolvers that follow the most restrictive DNSSEC verification ruleswill only see globally secured zones as secured, and all others asunsecured, including zones which are locally secured.  Resolvers thatare not as restrictive, such as those that implement algorithms inaddition to the mandatory to implement algorithms, will see somelocally secured zones as secured.The intent of the labels "global" and "local" is to identify thespecific attributes of a zone.  The words are chosen to assist in thewriting of a document recommending the actions a zone administratortake in making use of the DNS security extensions.  The words areexplicitly not intended to convey a state of compliance with DNSsecurity standards.3 Experimental StatusThe purpose of an experimentally secured zone is to facilitate themigration from an unsecured zone to a secured zone.  This distinctionis dropped.The objective of facilitating the migration can be achieved without aspecial designation of an experimentally secure status. ExperimentallyExpires March 19, 2001                                      [Page  7]Internet Draft                                     September 19, 2000secured is a special case of globally secured.  A zone administratorcan achieve this by publishing a zone with signatures and configuringa set of test resolvers with the corresponding public keys.  Even ifthe public key is published in a KEY RR, as long as there is no parentsignature, the resolvers will need some pre-configuration to know toprocess the signatures.  This allows a zone to be secured with in thesphere of the experiment, yet still be registered as unsecured in thegeneral Internet.4 IANA/ICANN ConsiderationsThis document does not request any action from an assigned numberauthority nor recommends any actions.5 Security ConsiderationsWithout a means to enforce compliance with specified protocols orrecommended actions, declaring a DNS zone to be "completely" securedis impossible.  Even if, assuming an omnipotent view of DNS, one candeclare a zone to be properly configured for security, and all of thezones up to the root too, a misbehaving resolver could be duped intobelieving bad data.  If a zone and resolver comply, a non-compliant orsubverted parent could interrupt operations.  The best that can behoped for is that all parties are prepared to be judged secure andthat security incidents can be traced to the cause in short order.6 AcknowledgementsThe need to refine the definition of a secured zone has becomeapparent through the efforts of the participants at two DNSSECworkshops, sponsored by the NIC-SE (.se registrar), CAIRN (aDARPA-funded research network), and other workshops.  Furtherdiscussions leading to the document include Olafur Gudmundsson, RussMundy, Robert Watson, and Brian Wellington.  Roy Arends, Ted Lindgreenand others have contributed significant input via the namedroppersmailing list.7 References[RFC1034] P. Mockapetris, "Domain Names - Concepts and Facilities,"RFC 1034, November 1987.[RFC1035] P. Mockapetris, "Domain Names - Implementation andSpecification," RFC 1034, November 1987.[RFC2119] S. Bradner, "Key words for use in RFCs to IndicateRequirement Levels," RFC 2119, March 1997[RFC2136] P. Vixie (Ed.), S. Thomson, Y. Rekhter, J. Bound "DynamicUpdates in the Domain Name System," RFC 2136, April 1997.[RFC2535] D. Eastlake, "Domain Name System Security Extensions," RFC2535, March 1999.Expires March 19, 2001                                      [Page  8]Internet Draft                                     September 19, 2000[draft-ietf-dnsext-simple-secure-update-xy.txt] B. Wellington, "SimpleSecure Domain Name System (DNS) Dynamic Update," version 00, February2000.[SIGAUTH] B. Wellington, draft-ietf-dnsext-signing-auth-01.txt10 Author InformationEdward Lewis NAI Labs 3060 Washington Road Glenwood, MD 21738 +1 443259 2352 <lewis@tislabs.com>11 Full Copyright StatementCopyright (C) The Internet Society (1999, 2000).  All Rights Reserved.This document and translations of it may be copied and furnished toothers, and derivative works that comment on or otherwise explain itor assist in its implementation may be prepared, copied, published anddistributed, in whole or in part, without restriction of any kind,provided that the above copyright notice and this paragraph areincluded on all such copies and derivative works.  However, thisdocument itself may not be modified in any way, such as by removingthe copyright notice or references to the Internet Society or otherInternet organizations, except as needed for the purpose of developingInternet standards in which case the procedures for copyrights definedin the Internet Standards process must be followed, or as required totranslate it into languages other than English.The limited permissions granted above are perpetual and will not berevoked by the Internet Society or its successors or assigns.This document and the information contained herein is provided on an"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERINGTASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUTNOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREINWILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OFMERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE."Expires March 19, 2001                                      [Page  9]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -