📄 draft-ietf-dnsop-keyhand-04.txt
字号:
DNSOP WG Edward LewisINTERNET DRAFT NAI LabsCategory: I-D March 2, 2001 Handling of DNS Zone Signing Keys <draft-ietf-dnsop-keyhand-04.txt>Status of this MemoThis document is an Internet-Draft and is in full conformance with allprovisions of Section 10 of RFC2026.Internet-Drafts are working documents of the Internet Engineering TaskForce (IETF), its areas, and its working groups. Note that othergroups may also distribute working documents as Internet-Drafts.Internet-Drafts are draft documents valid for a maximum of six monthsand may be updated, replaced, or obsoleted by other documents at anytime. It is inappropriate to use Internet-Drafts as referencematerial or to cite them other than as "work in progress."The list of current Internet-Drafts can be accessed athttp://www.ietf.org/ietf/1id-abstracts.txtThe list of Internet-Draft Shadow Directories can be accessed athttp://www.ietf.org/shadow.html.Comments should be sent to the authors or the DNSOP WG mailing listdnsop@cafax.se.This draft expires on September 2, 2001Copyright NoticeCopyright (C) The Internet Society (1999-2001). All rights reserved.AbstractDNS Security Extensions require a greater interaction between zoneadministrations sharing a zone cut. The center of the interaction isthe handling of the zone keys of the child and the signature appliedby the parent. DNSSEC does not include a protocol for this, but themeans of this interaction need definition to maintain the security ofDNS.1 IntroductionThis document has existed for quite some time. The purpose of thisdocument is to capture lessons learned regarding DNSSEC zone keys. Inthe past two years numerous workshops have been held, each adding tothe community's lessons learned.In past editions of this document, the outline consisted of describingthe lifecycle of a key and the steps needed to get it validated by theparent. In this edition, a new approach is being taken. The lessonslearned are described without regard to fitting into an operationsprocedure. The hope is to develop a better explanation of the issuessurrounding what will someday describe a "best current practice."2 TerminologyZone keys are explicitly defined in RFC 2535, but there have beencertain phrases that are increasingly used that may cause confusion tonew comers.A zone key really refers to two cryptographic values, called a publickey and a private key. The two values always work in tandem, hencethe singular reference. The phrase "signing with the zone key" refersto using the private key to generate digital signatures. The phrase"verifying with the zone key" refers to the use of the public key toverify the data and signature.3 Threats to KeysThe threats to a zone key center on threats to the private key. Thereare three ways a zone key can be come useless to the owner (andpossibly an advantage to an attacker). The private key could be come"exposed," "discovered," or "lost." The latter case, a lost key,refers to perhaps accidentally deleting the key from storage, and is acase that is of little concern. (Keys can be replaced easily.)An "exposed" key refers to a private key that is seen, or copied, byan unauthorized person. This could happen if the host holding the keyis infiltrated or sloppy transferring of the key (such as inunencrypted email).A "discovered key" is one that is found through performingcryptographic analysis of the public key, data sets and signatures.Depending on various factors, such as algorithm and key size, adetermined analyst can reverse engineer the private key.This latter loss is the most troublesome. This kind of loss is whatcreates the limited lifetime of a key. Because of this, there is aneed to fully develop key changing (or rollover) procedures.Unfortunately, there is no current recommendation on how long it wouldtake to discover a given private key. Such knowledge would beinvaluable in the design on key handling procedures.4 "Lateral Signing"Lateral signing refers to the use of key-signing keys and data-signingkeys to balance the need to change keys (avoiding discovery) and theneed to configure new keys in resolvers.This approach has been developed for the use of TLDs in absence of asigned root zone. This approach is applicable anywhere in the DNShierarchy, and will be needed by the root zone when it is signed.The thought is as follows. A zone assumes that the parent is notsecured, hence must distribute a public key to all resolvers ofinterest. This key is a key-signing key, it will be used to sign aslittle as possible to minimize the risk of discovery. Other keys areused to sign the zone, with these keys changed roughly once a month.At any one time, the zone's key set will have the one key-signing keyand some number of data-signing keys. The key-signing key will signthe zone key set, and the other key or keys, the zone data.A resolver would start with the key-signing key configured. When dataarrives, it does so accompanied by a signature generated by adata-signing key. The resolver then retrieves the data-signing key aspart of the zone key set, which is signed by the key-signing key.Hence the chain is from key-signing key to data-signing key (signed bykey-signing key) to data (signed by data-signing key).The term "lateral" signing comes from the observation that thekey-signing key and the data-signing key are from the same place inthe hierarchy (same owner name).5 Getting ValidationIn order for DNSSEC to scale, zones will need to have their parentsvalidate the zone keys. This process is the most difficult issuefacing DNSSEC deployment.Summarizing this needed process, a child zone sends its zone key setto the parent, the parent signs it and returns the data to the child.This process is complicated by its volume (number of zones) and itsrepetitiveness due - to the key discovery problem.One important issue that has been raised regarding this process iswhat the parent does with the child's keys once they are signed. Oneschool of thought is that the keys and signature are returned to thechild and are forgotten by the parent. Another school of though isthat the parent retains copies of the keys and signature, perhaps evenentering them into the zone file.The former idea enables the child to "close the loop" security-wise byverifying that the parent signed the right keys. It might be possiblefor an attacker to intercept the submission and modify the keys.The latter idea leaves the parent better prepared for a key change inits zone. If the parent changes keys mid-month, or in an emergency,children zones (perhaps signed monthly) need to get the newsignatures. On one workshop, this step was mishandled, resulting inthe loss of many delegations.6 Changing KeysWhen the time comes to change a zone's keys, one issue is whether itis appropriate to retain old keys in the zone or to abruptly changethe key set (with the exception of any key-signing key). The reasonto retain old keys is to enable old but still valid signatures to beverified in caches. Arguments for abrupt change include theobservation that this is the only way in which DNS can revokesignatures.8 Size and validity periodAn often-asked question is what is an appropriate key size. Asmentioned earlier, a good guide is lacking. In general, peralgorithm, a longer key compared to a shorter key is more difficult todiscovery but takes longer to use. Longer keys can generally be usedlonger, but signing and verification are slower.The period of time in which a key should be used is an unknownquantity. This will likely be a decision based upon staffing, and ona calendar basis. Once a week is likely for zones requiring tightsecurity, once a month for others.9 Random NumbersOne easily overlooked issue is the source of random numbers. A goodrandom number generator is needed to generate truly strong keys. Inthe worst case, a random number generator always returning the samenumber would result in the same pair of keys being generated. If azone generates a pair of keys this way and an attacker gets hold ofthe same key generation software, it would be possible to discover theprivate key simply by generating a pair of keys. This, by the way,has already been observed in workshops.It is unfortunate that some current operating systems have poor randomnumber generators. While this is improving, the machines used for keygeneration and use should be selected carefully.10 Dynamic UpdateDynamic update raises an issue regarding the protection of privatekeys. As mentioned earlier, one threat is the exposure of the privatekey. This is possible of the private key is on the same machine asthe name server, or even on any other reachable server. Therefore,conventional wisdom is to use non-network connected machines (perhapsbehind a firewall) for all signing activity.Dynamic update requires the server to sign data submitted to it for azone. This means the private key must be available to the name server(on the network).To counter this, a recommendation is offered to segregate dynamicupdate zones from static zones. This limits the risk to static dataif a dynamic update zone key is exposed. In addition, some issueshave been discovered with signed dynamic update zones, particularlythe mechanism by which to refresh signatures, which also call forseparating crucial static data from dynamic data.11 IANA ConsiderationsThis document does not place any requirements on the assigned numbersauthority.12 Security ConsiderationsThis entire document is a note on security considerations. If thezone key is mishandled, in a way that compromises its security, thenthe security of its zone is compromised.13 ReferencesAt some point.14 Author's AddressEdward Lewis<lewis@tislabs.com>3060 Washington Rd (Rte 97)Glenwood, MD 21738+1(443)259-235215 AcknowledgementsThe following individuals and groups have made significant input intothe content of this document: the attendees of the NIC-SE work shop onDNSSEC, May 18 and 19, 1999, also Olafur Gudmundsson, and BrianWellington.A second workshop held by the CAIRN research network September 29 and30th also provided input to this document. Dan Massey has providedinput based upon this workshop and experience with DNSSEC in CAIRN.More workshops are to be acknowledged.16 Full Copyright StatementCopyright (C) The Internet Society (1999-2001). All Rights Reserved.This document and translations of it may be copied and furnished toothers, and derivative works that comment on or otherwise explain itor assist in its implementation may be prepared, copied, published anddistributed, in whole or in part, without restriction of any kind,provided that the above copyright notice and this paragraph areincluded on all such copies and derivative works. However, thisdocument itself may not be modified in any way, such as by removingthe copyright notice or references to the Internet Society or otherInternet organizations, except as needed for the purpose of developingInternet standards in which case the procedures for copyrights definedin the Internet Standards process must be followed, or as required totranslate it into languages other than English.The limited permissions granted above are perpetual and will not berevoked by the Internet Society or its successors or assigns.This document and the information contained herein is provided on an"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERINGTASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUTNOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREINWILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OFMERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE."-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-Edward Lewis NAI LabsPhone: +1 443-259-2352 Email: lewis@tislabs.comDilbert is an optimist.Opinions expressed are property of my evil twin, not my employer.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -