⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-dnsext-dnssec-intro-05.txt

📁 bind-3.2.
💻 TXT
📖 第 1 页 / 共 3 页
字号:
DNS Extensions                                                 R. ArendsInternet-Draft                                      Telematica InstituutExpires: August 15, 2003                                      R. Austein                                                                     ISC                                                               M. Larson                                                                VeriSign                                                               D. Massey                                                                 USC/ISI                                                                 S. Rose                                                                    NIST                                                       February 14, 2003               DNS Security Introduction and Requirements                   draft-ietf-dnsext-dnssec-intro-05Status of this Memo   This document is an Internet-Draft and is in full conformance with   all provisions of Section 10 of RFC2026.   Internet-Drafts are working documents of the Internet Engineering   Task Force (IETF), its areas, and its working groups.  Note that   other groups may also distribute working documents as Internet-   Drafts.   Internet-Drafts are draft documents valid for a maximum of six months   and may be updated, replaced, or obsoleted by other documents at any   time.  It is inappropriate to use Internet-Drafts as reference   material or to cite them other than as "work in progress."   The list of current Internet-Drafts can be accessed at http://   www.ietf.org/ietf/1id-abstracts.txt.   The list of Internet-Draft Shadow Directories can be accessed at   http://www.ietf.org/shadow.html.   This Internet-Draft will expire on August 15, 2003.Copyright Notice   Copyright (C) The Internet Society (2003).  All Rights Reserved.Abstract   The Domain Name System Security Extensions (DNSSEC) add data origin   authentication and data integrity to the Domain Name System.  This   document introduces these extensions, and describes their   capabilities and limitations.  This document also discusses theArends, et al.           Expires August 15, 2003                [Page 1]Internet-Draft    DNSSEC Introduction and Requirements     February 2003   services that the DNS security extensions do and do not provide.   Last, this document describes the interrelationships between the   group of documents that collectively describe DNSSEC.Table of Contents   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3   2.  Definitions of Important DNSSEC Terms  . . . . . . . . . . . .  4   3.  Services Provided by DNS Security  . . . . . . . . . . . . . .  6   3.1 Data Origin Authentication and Data Integrity  . . . . . . . .  6   3.2 Authenticating Name and Type Non-Existence . . . . . . . . . .  7   4.  Services Not Provided by DNS Security  . . . . . . . . . . . .  9   5.  Resolver Considerations  . . . . . . . . . . . . . . . . . . . 10   6.  Stub Resolver Considerations . . . . . . . . . . . . . . . . . 11   7.  Zone Considerations  . . . . . . . . . . . . . . . . . . . . . 12   7.1 TTL values vs. SIG validity period . . . . . . . . . . . . . . 12   7.2 New Temporal Dependency Issues for Zones . . . . . . . . . . . 12   8.  Name Server Considerations . . . . . . . . . . . . . . . . . . 13   9.  DNS Security Document Family . . . . . . . . . . . . . . . . . 14   9.1 DNS Security Document Roadmap  . . . . . . . . . . . . . . . . 14   9.2 Categories of DNS Security Documents . . . . . . . . . . . . . 14   10. IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 16   11. Security Considerations  . . . . . . . . . . . . . . . . . . . 17   12. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 19       Normative References . . . . . . . . . . . . . . . . . . . . . 20       Informative References . . . . . . . . . . . . . . . . . . . . 21       Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 21       Full Copyright Statement . . . . . . . . . . . . . . . . . . . 23Arends, et al.           Expires August 15, 2003                [Page 2]Internet-Draft    DNSSEC Introduction and Requirements     February 20031. Introduction   This document introduces the Domain Name System Security Extensions   (DNSSEC).  This document and its two companion documents ([13] and   [14]) update, clarify, and refine the security extensions originally   defined in RFC 2535 [3].  These security extensions consist of a set   of new resource record types and modifications to the existing DNS   protocol [2].  The new records and protocol modifications are not   fully described in this document, but are described in a family of   documents outlined in Section 9.  Section 3 and Section 4 describe   the capabilities and limitations of the security extensions in   greater detail.  Section 5, Section 6, Section 7, and Section 8   discuss the effect that these security extensions will have on   resolvers, stub resolvers, zones and name servers.   This document and its two companions update and obsolete RFCs 2535,   3008, 3090, 3225, 3226, and 3445, as well as several works in   progress: "Redefinition of the AD bit", "Delegation Signer Resource   Record", and "DNSSEC Opt-In".  See [18] for more details on these   documents.   The DNS security extensions provide origin authentication and   integrity protection for DNS data, as well as a means of public key   distribution.  These extensions do not provide protection against   other types of attack, nor do they provide confidentiality.Arends, et al.           Expires August 15, 2003                [Page 3]Internet-Draft    DNSSEC Introduction and Requirements     February 20032. Definitions of Important DNSSEC Terms   authentication chain: In the DNSSEC model, a KEY RR signs a DS RR,      which hashes one RR in another KEY RRset, which in turn signs      another DS RR, which hashes one RR in yet another KEY RRset, and      so forth, finally ending, if all goes well, with a KEY RR which      signs whatever DNS data the end user was looking for in the first      place.  This alternating succession of KEY RRsets and DS RRs forms      a chain of signed data, with each link in the chain vouching for      the next.  If a signature somewhere in this chain has been      generated by an authentication key known to a security-aware      resolver, then the resolver can attempt to verify and authenticate      the signed chain of KEY and DS RRs from that point down to the      target data.   authentication key: A public key which a security-aware resolver      trusts and can therefore use to verify data.  A security-aware      resolver can discover trusted authentication keys in three ways.      First, the resolver is generally preconfigured to know about at      least one key which it should trust.  Second, the resolver may be      able to discover both a new key and an associated DS RR which      contains a valid hash of the new key and which has been signed by      a key which the resolver trusts.  Third, the resolver may be able      to determine that a new key has been signed by another key which      the resolver trusts.  Note that the resolver must always be guided      by local policy when deciding whether to trust a new key, even if      the local policy is simply to trust any new key for which the      resolver is able verify the signature.   key signing key: An authentication key which is used to sign one or      more other authentication keys.  Typically, a key signing key will      sign a zone signing key, which in turn will sign other zone data.      Local policy may require the zone signing key to be changed      frequently, while the key signing key may have a longer validity      period in order to provide a more stable secure entry point into      the zone.  Designating an authentication key as a key signing key      is purely an operational issue: DNSSEC itself does not distinguish      between key signing keys and other DNSSEC authentication keys.      Key signing keys are discussed in more detail in [12].   security-aware name server: An entity acting in the role of a name      server (defined in section 2.4 of [1]) which understands the DNS      security extensions defined in this document set.  In particular,      a security-aware name server is an entity which receives DNS      queries, sends DNS responses, supports the EDNS0 [4] message size      extension and the DO bit [8], and supports the RR types and      message header bits defined in this document set.Arends, et al.           Expires August 15, 2003                [Page 4]Internet-Draft    DNSSEC Introduction and Requirements     February 2003   security-aware recursive name server: An entity which acts in both      the security-aware name server and security-aware resolver roles.      A more cumbersome equivalent phrase would be "a security-aware      name server which offers recursive service".   security-aware resolver: An entity acting in the role of a resolver      (defined in section 2.4 of [1]) which understands the DNS security      extensions defined in this document set.  In particular, a      security-aware resolver is an entity which sends DNS queries,      receives DNS responses, supports the EDNS0 [4] message size      extension and the DO bit [8], and is capable of using the RR types      and message header bits defined in this document set to provide      DNSSEC services.   security-aware stub resolver: An entity acting in the role of a      resolver (defined in section 2.4 of [1]) which has at least a      minimal understanding the DNS security extensions defined in this      document set, but which trusts one or more security-aware      recursive name servers to perform most of the tasks discussed in      this document set on its behalf.  In particular, a security-aware      stub resolver is an entity which sends DNS queries, receives DNS      responses, and is capable of establishing an appropriately secured      channel to a security-aware recursive name server which will      provide these services on behalf of the security-aware stub      resolver.  Note that the distinction between security-aware      resolvers and security-aware stub resolvers is different from the      distinction between iterative-mode and recursive-mode resolvers in      the base DNS specification: a particular security-aware resolver      may operate exclusively in recursive mode, but still performs its      own DNSSEC signature validity checks, while a security-aware stub      resolver does not, by definition.   security-oblivious: The opposite of "security-aware".   signed zone: A zone whose RRsets are signed and which contains      properly constructed KEY, SIG, NXT and (optionally) DS records.   unsigned zone: The opposite of a "signed zone".   zone signing key: An authentication key which is used to sign a zone.      See key signing key, above.  Typically a zone signing key will be      part of the same KEY RRset as the key signing key which signs it,      but is used for a slightly different purpose and may differ from      the key signing key in other ways, such as validity lifetime.Arends, et al.           Expires August 15, 2003                [Page 5]Internet-Draft    DNSSEC Introduction and Requirements     February 20033. Services Provided by DNS Security   The Domain Name System (DNS) security extensions provide origin   authentication and integrity assurance services for DNS data,   including mechanisms for authenticated denial of existence of DNS   data.  These mechanisms are described below.   These mechanisms require minor changes to the DNS protocol.  DNSSEC   adds four new resource record types (SIG, KEY, DS and NXT) and two   new message header bits (CD and AD).  In order to support the larger   DNS message sizes that result from adding the DNSSEC RRs, DNSSEC also   requires EDNS0 support [4].  Finally, DNSSEC requires support for the   DO bit [8], so that a security-aware resolver can indicate in its   queries that it wishes to receive DNSSEC RRs in response messages.   These services protect against most of the threats to the Domain Name   System described in [11].3.1 Data Origin Authentication and Data Integrity   DNSSEC provides authentication by associating cryptographically   generated digital signatures with DNS RRsets.  These digital   signatures are stored in a new resource record, the SIG record.   Typically, there will be a single private key that signs a zone's   data, but multiple keys are possible: for example, there may be keys   for each of several different digital signature algorithms.  If a   security-aware resolver reliably learns a zone's public key, it can   authenticate that zone's signed data.  An important DNSSEC concept is   that the key that signs a zone's data is associated with the zone   itself and not with the zone's authoritative name servers (public   keys for DNS transaction authentication mechanisms may also appear in   zones, as described in [7], but DNSSEC itself is concerned with   object security of DNS data, not channel security of DNS   transactions).   A security-aware resolver can learn a zone's public key either by   having the key preconfigured into the resolver or by normal DNS   resolution.  To allow the latter, public keys are stored in a new   type of resource record, the KEY RR.  Note that the private keys used   to sign zone data must be kept secure, and should be stored offline   when practical to do so.  To discover a public key reliably via DNS   resolution, the target key itself needs to be signed by either a   preconfigured authentication key or another key that has been   authenticated previously.  Security-aware resolvers authenticate zone   information by forming an authentication chain from a newly learned   public key back to a previously known authentication public key,   which in turn either must have been preconfigured into the resolver   or must have been learned and verified previously.  Therefore, theArends, et al.           Expires August 15, 2003                [Page 6]Internet-Draft    DNSSEC Introduction and Requirements     February 2003   resolver must be configured with at least one public key: if the   preconfigured key is a zone signing key, then it will authenticate   the associated zone; if the preconfigured key is a key signing key,   it will authenticate a zone signing key.  To help security-aware   resolvers establish this authentication chain, security-aware name   servers attempt to send the signature(s) needed to authenticate a   zone's public key in the DNS reply message along with the public key   itself, provided there is space available in the message.   The authentication chain specified in the original DNS security   extensions proceeded from signed KEY record to signed KEY record, as   necessary, and finally to the queried RRset.  The current   specification adds a new Delegation Signer (DS) RR type to simplify   some of the administrative tasks involved in signing delegations   across organizational boundaries.  The DS RRset resides at a   delegation point in a parent zone and indicates the key or keys used   by the delegated child zone to self-sign the KEY RRset at the child   zone's apex.  The child zone, in turn, uses one or more of the keys   in this KEY RRset to sign its zone data.  The authentication chain is   therefore KEY->[DS->KEY]*->RRset, where "*" denotes zero or more DS-   >KEY subchains.   This authentication chain is normally constructed from the root of   the DNS hierarchy down to the leaf zones, and is normally based on   preconfigured knowledge of the public key for the root.  Local   policy, however, may also allow a security-aware resolver to trust   one or more preconfigured keys other than the root key, or may not   provide preconfigured knowledge of the root key, or may even prevent   the resolver from trusting particular keys for arbitrary reasons even   if those keys are properly signed with verifiable signatures.  DNSSEC   provides mechanisms by which a security-aware resolver can determine   whether an RRset's signature is "valid" within the meaning of DNSSEC,   but authentication and trust, in the final analysis, are matters of   local policy, which may extend or even override the protocol   extensions defined in this document set.3.2 Authenticating Name and Type Non-Existence   The security mechanism described in Section 3.1 only provides a way   to sign existing RRsets in a zone.  The problem of providing negative   responses with the same level of authentication and integrity   requires the use of another new resource record type, the NXT record.   The NXT record allows a security-aware resolver to authenticate a   negative reply for either name or type non-existence via the same   mechanisms used to authenticate other DNS replies.  Use of NXT   records require a canonical representation and ordering for domain   names in zones.  Chains of NXT records explicitly describe the gaps,   or "empty space", between domain names in a zone, as well as listingArends, et al.           Expires August 15, 2003                [Page 7]Internet-Draft    DNSSEC Introduction and Requirements     February 2003   the types of RRsets present at existing names.  Each NXT record is   signed and authenticated using the mechanisms described in Section   3.1.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -