diff options
Diffstat (limited to 'doc/draft/draft-ietf-dnsext-dnssec-roadmap-07.txt')
-rw-r--r-- | doc/draft/draft-ietf-dnsext-dnssec-roadmap-07.txt | 896 |
1 files changed, 896 insertions, 0 deletions
diff --git a/doc/draft/draft-ietf-dnsext-dnssec-roadmap-07.txt b/doc/draft/draft-ietf-dnsext-dnssec-roadmap-07.txt new file mode 100644 index 00000000..b56f293c --- /dev/null +++ b/doc/draft/draft-ietf-dnsext-dnssec-roadmap-07.txt @@ -0,0 +1,896 @@ + + +DNS Extensions S. Rose +Internet-Draft NIST +Expires: August 5, 2003 February 4, 2003 + + + DNS Security Document Roadmap + draft-ietf-dnsext-dnssec-roadmap-07 + +Status of this Memo + + This document is an Internet-Draft and is in full conformance with + all provisions of Section 10 of RFC2026. + + Internet-Drafts are working documents of the Internet Engineering + Task Force (IETF), its areas, and its working groups. Note that + other groups may also distribute working documents as Internet- + Drafts. + + Internet-Drafts are draft documents valid for a maximum of six months + and may be updated, replaced, or obsoleted by other documents at any + time. It is inappropriate to use Internet-Drafts as reference + material or to cite them other than as "work in progress." + + The list of current Internet-Drafts can be accessed at http:// + www.ietf.org/ietf/1id-abstracts.txt. + + The list of Internet-Draft Shadow Directories can be accessed at + http://www.ietf.org/shadow.html. + + This Internet-Draft will expire on August 5, 2003. + +Copyright Notice + + Copyright (C) The Internet Society (2003). All Rights Reserved. + +Abstract + + DNS Security (DNSSEC) technology is composed of extensions to the + Domain Name System (DNS) protocol that provide data integrity and + authentication to security aware resolvers and applications through + the use of cryptographic digital signatures. Several documents exist + to describe these extensions and the implementation-specific details + regarding specific digital signing schemes. The interrelationship + between these different documents is discussed here. A brief + overview of what to find in which document and author guidelines for + what to include in new DNS Security documents, or revisions to + existing documents, is described. + + + + + +Rose Expires August 5, 2003 [Page 1] + +Internet-Draft DNSSEC Document Roadmap February 2003 + + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 + 2. Interrelationship of DNS Security Documents . . . . . . . . . 4 + 3. Relationship of DNS Security Documents to other DNS + Documents . . . . . . . . . . . . . . . . . . . . . . . . . . 8 + 4. Recommended Content for new DNS Security Documents . . . . . . 9 + 4.1 Security Related Resource Records . . . . . . . . . . . . . . 9 + 4.2 Digital Signature Algorithm Implementations . . . . . . . . . 9 + 4.3 Refinement of Security Procedures . . . . . . . . . . . . . . 10 + 4.4 The Use of DNS Security Extensions with Other Protocols . . . 10 + 5. Security Considerations . . . . . . . . . . . . . . . . . . . 11 + 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 12 + Normative References . . . . . . . . . . . . . . . . . . . . . 13 + Informative References . . . . . . . . . . . . . . . . . . . . 15 + Author's Address . . . . . . . . . . . . . . . . . . . . . . . 15 + Full Copyright Statement . . . . . . . . . . . . . . . . . . . 16 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Rose Expires August 5, 2003 [Page 2] + +Internet-Draft DNSSEC Document Roadmap February 2003 + + +1. Introduction + + This document is intended to provide guidelines for the development + of supplemental documents describing security extensions to the + Domain Name System (DNS). + + The main goal of the DNS Security (DNSSEC) extensions is to add data + authentication and integrity services to the DNS protocol. These + protocol extensions should be differentiated from DNS operational + security issues, which are beyond the scope of this effort. DNS + Security documents fall into one or possibly more of the following + sub-categories: new DNS security resource records, implementation + details of specific digital signing algorithms for use in DNS + Security and DNS transaction authentication. Since the goal of DNS + Security extensions is to become part of the DNS protocol standard, + additional documents that seek to refine a portion of the security + extensions will be introduced as the specifications progress along + the IETF standards track. + + There is a set of basic guidelines for each sub-category of documents + that explains what should be included, what should be considered a + protocol extension, and what should be considered an operational + issue. Currently, there are at least two documents that fall under + operational security considerations that deal specifically with the + DNS security extensions: the first is RFC 2541 [6] which deals with + the operational side of implementing the security extensions; the + other is the CAIRN DNSSEC testbed Internet draft [CAIRN]. These + documents should be considered part of the operational side of DNS, + but will be addressed as a supplemental part of the DNS Security + roadmap. That is not to say that these two documents are not + important to securing a DNS zone, but they do not directly address + the proposed DNS security extensions. Authors of documents that seek + to address the operational concerns of DNS security should be aware + of the structure of DNS Security documentation. + + It is assumed the reader has some knowledge of the Domain Name System + [2] and the Domain Name System Security Extensions. + + + + + + + + + + + + + + +Rose Expires August 5, 2003 [Page 3] + +Internet-Draft DNSSEC Document Roadmap February 2003 + + +2. Interrelationship of DNS Security Documents + + The DNSSEC set of documents can be partitioned into five main groups + as depicted in Figure 1. All of these documents in turn are under + the larger umbrella group of DNS base protocol documents. It is + possible that some documents fall into more than one of these + categories, such as RFC 2535, and should follow the guidelines for + the all of the document groups it falls into. However, it is wise to + limit the number of "uberdocuments" that try to be everything to + everyone. The documents listed in each category are current as to + the time of writing. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Rose Expires August 5, 2003 [Page 4] + +Internet-Draft DNSSEC Document Roadmap February 2003 + + + --------------------------------------------------------------------- + + + + +--------------------------------+ + | | + | Base DNS Protocol Docs. | + | [RFC1035, RFC2181, etc.] | + | | + +--------------------------------+ + | + | + | + +------------+ +-----------+ +-------------+ + | New | | DNSSEC | | New | + | Security |----------| protocol |----------| Security | + | RRs | | | | Uses | + +------------+ | | +-------------+ + +-----------+ + | + | + +----------------------+*********************** + | * * + | * * + +------------+ +---------------+ +-*-*-*-*-*-*-*-*-+ + | DS | | | | Implementation | + | Algorithm | | Transactions | * Notes * + | Impl. | | | | | + +------------+ +---------------+ +-*-*-*-*-*-*-*-*-+ + + + + + DNSSEC Document Roadmap + + --------------------------------------------------------------------- + + The "DNSSEC protocol" document set refers to the document that makes + up the groundwork for adding security to the DNS protocol [1]and + updates to this document. RFC 2535 laid out the goals and + expectations of DNS Security and the new security-related Resource + Records KEY, SIG, DS, and NXT [23]. Expanding from this document, + related document groups include the implementation documents of + various digital signature algorithms with DNSSEC, and documents + further refining the transaction of messages. It is expected that + RFC 2535 will be obsoleted by one or more documents that refine the + set of security extensions [22], [23], [24]. Documents that seek to + modify or clarify the base protocol documents should state so clearly + + + +Rose Expires August 5, 2003 [Page 5] + +Internet-Draft DNSSEC Document Roadmap February 2003 + + + in the introduction of the document (as well as proscribe to the IETF + guidelines of RFC/Internet Draft author guidelines). Also, the + portions of the specification to be modified should be synopsized in + the new document for the benefit of the reader. The "DNSSEC + protocol" set includes the documents [1], [11], [12], [9], [14], + [15], [21], [16], [OPTIN], [17] and their derivative documents. + + The "New Security RRs" set refers to the group of documents that seek + to add additional Resource Records to the set of base DNS Record + types. These new records can be related to securing the DNS protocol + [1], [8], or using DNS security for other purposes such as storing + certificates [5]. Another related document is [26]. While not + detailing a new RR type, it defines a flag bit in the existing KEY + RR. This flag bit does not affect the protocol interpretation of the + RR, only a possible operational difference. Therefore, this draft is + place here and not with the protocol document set. + + The "DS Algorithm Impl" document set refers to the group of documents + that describe how a specific digital signature algorithm is + implemented to fit the DNSSEC Resource Record format. Each one of + these documents deals with one specific digital signature algorithm. + Examples of this set include [4], [5], [25], [19][18] and [13]. + + The "Transactions" document set refers to the group of documents that + deal with the message transaction sequence of security-related DNS + operations. The contents and sequence for operations such as dynamic + update [3], [11] and transaction signatures [10] are described in + this document category. Additional message transaction schemes to + support DNSSEC operation would also fall under this group, including + secret key establishment [7], [RENEW], and verification. + + The final document set, "New Security Uses", refers to documents that + seek to use proposed DNS Security extensions for other security + related purposes. Documents that fall in this category include the + use of DNS in the storage and distribution of certificates and + individual user public keys (PGP, e-mail, etc.) Some documents in + this group may fall beyond the DNSEXT WG scope, but they are included + because of their use of the security extensions. The documents in + this group should not propose any changes to the DNS protocol to + support other protocols; only how existing DNS security records and + transactions can be used to support other protocols. Such documents + include [SSH-DNS] and [IPSEC-DNS] which deals with storing SSH and + IPSec keying information the DNS using new records and utilizing + DNSSEC to provide authentication and integrity checking. + + Lastly, there is a set of documents that should be classified as + "Implementation Notes". Because the DNS security extensions are + still in the developmental stage, there is an audience for documents + + + +Rose Expires August 5, 2003 [Page 6] + +Internet-Draft DNSSEC Document Roadmap February 2003 + + + that detail the transition and implementation of the security + extensions. These have more to do with the practical side of DNS + operations, but can also point to places in the protocol + specifications that need improvement. An example of this type is the + report on the CAIRN DNSSEC testbed [CAIRN] This document was + submitted through the DNSOP Working Group at the time of this + writing, however the main concern of this document is the + implementation and limitations of the DNS security extensions, hence + their interest to the DNS security community. The CAIRN draft deals + with the implementation of a secure DNS. Authors of documents that + deal with the implementation and operational side of the DNSSEC + specifications would be advised/encouraged to submit their documents + to any other relevant DNS related WG meeting in the problem space. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Rose Expires August 5, 2003 [Page 7] + +Internet-Draft DNSSEC Document Roadmap February 2003 + + +3. Relationship of DNS Security Documents to other DNS Documents + + The DNS security-related extensions should be considered a subset of + the DNS protocol. Therefore, all DNS security-related documents + should be seen as a subset of the main DNS architecture documents. + It is a good idea for authors of future DNS security documents to be + familiar with the contents of these base protocol documents. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Rose Expires August 5, 2003 [Page 8] + +Internet-Draft DNSSEC Document Roadmap February 2003 + + +4. Recommended Content for new DNS Security Documents + + Documents that seek to make additions or revisions to the DNS + protocol to add security should follow common guidelines as to + minimum required content and structure. It is the purpose of this + document roadmap to establish criteria for content that any new DNS + security protocol specifications document should contain. These + criteria should be interpreted as a minimum set of information + required/needed in a document, any additional information regarding + the specific extension should also be included in the document. + These criteria are not officially part of the IETF guidelines + regarding RFC/Internet Drafts, but should be considered as guidance + to promote uniformity to Working Group documents. + + Since the addition of security to the DNS protocol is now considered + a general extension to the DNS protocol, any guideline for the + contents of a DNS Security document could be taken as a framework + suggestion for the contents of any DNS extension document. The + development process of the DNS security extensions could be used as a + model framework for any, more general DNS extensions. + +4.1 Security Related Resource Records + + Documents describing a new type of DNS Security Resource Record (RR) + should contain information describing the structure and use of the + new RR type. It is a good idea to only discuss one new type in a + document, unless the set of new resource records are closely related + or a protocol extension requires the use of more than one new record + type. Specifically, each document detailing a new security-related + RR type should include the following information: + + o The format of the new RR type, both "on the wire" (bit format) and + ASCII representation (for text zone files), if appropriate; + + o when and in what section of a DNS query/response this new RR type + is to be included; + + o at which level of the DNS hierarchy this new RR type is to be + considered authoritative (i.e. in a zone, in a zone's superzone) + and who is authoritative to sign the new RR; + + +4.2 Digital Signature Algorithm Implementations + + Documents describing the implementation details of a specific digital + signature algorithm such as [4] ,[13] (and others as new digital + signatures schemes are introduced) for use with DNS Security should + include the following information: + + + +Rose Expires August 5, 2003 [Page 9] + +Internet-Draft DNSSEC Document Roadmap February 2003 + + + o The format/encoding of the algorithm's public key for use in a KEY + Resource Record; + + o the acceptable key size for use with the algorithm; + + o the current known status of the algorithm (as one of REQUIRED, + RECOMMENDED, or OPTIONAL). + + In addition, authors are encouraged to include any necessary + description of the algorithm itself, as well as any know/suspected + weaknesses as an appendix to the document. This is for reference + only, as the goals of the DNSEXT working group is to propose + extensions to the DNS protocol, not cryptographic research. + +4.3 Refinement of Security Procedures + + This set of documents includes DNS protocol operations that + specifically relate to DNS Security, such as DNS secret key + establishment [7] and security extensions to pre-existing or + proposed DNS operations such as dynamic update [3]. Documents that + describe a new set of DNS message transactions, or seek to refine a + current series of transactions that make up a DNS operation should + include the following information: + + o The order in which the DNS messages are sent by the operation + initiator and target; + + o the format of these DNS messages; + + o any required authentication mechanisms for each stage of the + operation and the required authority for that mechanism (i.e. + zone, host, or some other trusted authority such as a DNS + administrator or certificate authority); + + +4.4 The Use of DNS Security Extensions with Other Protocols + + Because of the flexibility and ubiquity of the DNS, there may exist + other Internet protocols and applications that could make use of, or + extend, the DNS security protocols. Examples of this type of + document include the use of DNS to support IPSEC [IPSEC-DNS], SSH + [SSH-DNS] the Public Key Infrastructure (PKI). It is beyond the + scope of this roadmap to describe the contents of this class of + documents. However, if uses or extensions require the addition or + modification of a DNS Resource Record type or DNS query/response + transactions, then the guidelines laid out in the previous sections + of this document should be adhered to. + + + + +Rose Expires August 5, 2003 [Page 10] + +Internet-Draft DNSSEC Document Roadmap February 2003 + + +5. Security Considerations + + This document provides a roadmap and guidelines for writing DNS + Security related documents. This document does not discuss the + aspects of the DNS security extensions. The reader should refer to + the documents outlined here for the details of the services and + shortcomings of DNS security. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Rose Expires August 5, 2003 [Page 11] + +Internet-Draft DNSSEC Document Roadmap February 2003 + + +6. Acknowledgements + + In addition to the RFCs mentioned in this document, there are also + numerous Internet drafts that fall in one or more of the categories + of DNS Security documents mentioned above. Depending on where (and + if) these documents are on the IETF standards track, the reader may + not be able to access these documents through the RFC repositories. + All of these documents are "Work in Progress" and are subject to + change; therefore a version number is not supplied for the current + revision. Some Internet Drafts are in the RFC editor's queue or + nearing WG Last Call at the time of writing. These Drafts have been + placed in the References section. The drafts below are still subject + to agreement in the IETF. + + o CAIRN: D. Massey, T. Lehman, and E. Lewis. "DNSSEC + Implementation in the CAIRN Testbed". draft-ietf-dnsop- + dnsseccairn-NN.txt + + o OPTIN: M. Kosters. "DNSSEC Opt-in for Large Zones" draft- + kosters-dnsext-dnssec-opt-in-NN.txt + + o SSH-DNS: W. Griffin, J. Schlyter. "Using DNS to securely + publish SSH key fingerprints" draft-ietf-secsh-dns-NN.txt + + o IPSEC-DNS: M. Richardson. "A method for storing IPsec keying + material in DNS". draft-richardson-ipsec-rr-NN.txt + + o RENEW: Y. Kamite, M. Nakayama. "TKEY Secret Key Renewal Mode". + draft-ietf-dnsext-tkey-renewal-mode-NN.txt + + + + + + + + + + + + + + + + + + + + + + +Rose Expires August 5, 2003 [Page 12] + +Internet-Draft DNSSEC Document Roadmap February 2003 + + +Normative References + + [1] Eastlake, D., "Domain Name System Security Extensions", RFC + 2535, March 1999. + + [2] Mockapetris, P., "Domain names - implementation and + specification", STD 13, RFC 1035, November 1987. + + [3] Eastlake, D., "Secure Domain Name System Dynamic Update", RFC + 2137, April 1997. + + [4] Eastlake, D., "DSA KEYs and SIGs in the Domain Name System + (DNS)", RFC 2536, March 1999. + + [5] Eastlake, D. and O. Gudmundsson, "Storing Certificates in the + Domain Name System (DNS)", RFC 2538, March 1999. + + [6] Eastlake, D., "DNS Security Operational Considerations", RFC + 2541, March 1999. + + [7] Eastlake, D., "Secret Key Establishment for DNS (TKEY RR)", RFC + 2930, September 2000. + + [8] Eastlake, D., "DNS Request and Transaction Signatures ( + SIG(0)s)", RFC 2931, September 2000. + + [9] Lewis, E., "DNS Security Extension Clarification on Zone + Status", RFC 3090, March 2001. + + [10] Vixie, P., Gudmundsson, O., Eastlake, D. and B. Wellington, + "Secret Key Transaction Authentication for DNS (TSIG)", RFC + 2845, May 2000. + + [11] Wellington, B., "Secure Domain Name System (DNS) Dynamic + Update", RFC 3007, November 2000. + + [12] Wellington, B., "Domain Name System Security (DNSSEC) Signing + Authority", RFC 3008, April 2000. + + [13] Eastlake, D., "RSA/SHA-1 SIGs and RSA KEYs in the Domain Name + System (DNS)", RFC 3110, May 2001. + + [14] Conrad, D., "Indicating Resolver Support of DNSSEC", RFC 3225, + December 2001. + + [15] Gudmundsson, O., "DNSSEC and IPv6 A6 aware server/resolver + message size requirements", RFC 3226, December 2001. + + + + +Rose Expires August 5, 2003 [Page 13] + +Internet-Draft DNSSEC Document Roadmap February 2003 + + + [16] Massey, D. and S. Rose, "Limiting the Scope of the KEY Resource + Record (RR)", RFC 3445, December 2002. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Rose Expires August 5, 2003 [Page 14] + +Internet-Draft DNSSEC Document Roadmap February 2003 + + +Informative References + + [17] Austein, R. and D. Atkins, "Threat Analysis of the Domain Name + System (Work in Progress)", RFC XXXX. + + [18] Eastlake, R., "Storage of Diffie-Hellman Keys in the Domain + Name System (DNS) (Work in Progress)", RFC XXXX. + + [19] Eastlake, D. and R. Schroeppel, "Elliptic Curve KEYs in the DNS + (Work in Progress)", RFC XXXX. + + [20] Gundmundsson, O., "Delegation Signer Record in Parent (Work in + Progress)", RFC XXXX. + + [21] Wellington, B., "Redefinition of the DNS AD bit (Work in + Progress)", RFC XXXX. + + [22] Arends, R., Larson, M., Massey, D. and S. Rose, "DNS Security + Introduction and Requirements (Work in Progress)", RFC XXXX. + + [23] Arends, R., Larson, M., Massey, D. and S. Rose, "Resource + Records for DNS Security Extensions (Work in Progress)", RFC + XXXX. + + [24] Arends, R., Larson, M., Massey, D. and S. Rose, "Protocol + Modifications for the DNS Security Extensions (Work in + Progress)", RFC XXXX. + + [25] Kwan, S., Garg, P., Gilroy, J. and L. Esibov, "GSS Algorithm + for TSIG (Work in Progress)", RFC XXXX. + + [26] Kolkman, O. and J. Schlyter, "KEY RR Key-Signing-Key (KSK) Flag + (Work in Progress)", RFC XXXX. + + +Author's Address + + Scott Rose + National Institute for Standards and Technology + 100 Bureau Drive + Gaithersburg, MD 20899-3460 + USA + + EMail: scott.rose@nist.gov + + + + + + + +Rose Expires August 5, 2003 [Page 15] + +Internet-Draft DNSSEC Document Roadmap February 2003 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2003). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assigns. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + +Rose Expires August 5, 2003 [Page 16] + |