summaryrefslogtreecommitdiff
path: root/doc/draft/draft-ietf-dnsop-interim-signed-root-01.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/draft/draft-ietf-dnsop-interim-signed-root-01.txt')
-rw-r--r--doc/draft/draft-ietf-dnsop-interim-signed-root-01.txt769
1 files changed, 769 insertions, 0 deletions
diff --git a/doc/draft/draft-ietf-dnsop-interim-signed-root-01.txt b/doc/draft/draft-ietf-dnsop-interim-signed-root-01.txt
new file mode 100644
index 00000000..eaa6b8d9
--- /dev/null
+++ b/doc/draft/draft-ietf-dnsop-interim-signed-root-01.txt
@@ -0,0 +1,769 @@
+
+
+Internet Draft Johan Ihr‰n
+draft-ietf-dnsop-interim-signed-root-01.txt Autonomica
+February 2003
+Expires in six months
+
+
+ An Interim Scheme for Signing the Public DNS Root
+
+
+Status of this Memo
+
+ This document is an Internet-Draft and is in full conformance with
+ all provisions of Section 10 of RFC2026.
+
+ Internet-Drafts are working documents of the Internet Engineering
+ Task Force (IETF), its areas, and its working groups. Note that
+ other groups may also distribute working documents as
+ Internet-Drafts.
+
+ Internet-Drafts are draft documents valid for a maximum of six
+ months and may be updated, replaced, or obsoleted by other
+ documents at any time. It is inappropriate to use Internet-Drafts
+ as reference material or to cite them other than as "work in
+ progress."
+
+ The list of current Internet-Drafts can be accessed at
+ http://www.ietf.org/ietf/1id-abstracts.txt
+
+ The list of Internet-Draft Shadow Directories can be accessed at
+ http://www.ietf.org/shadow.html.
+
+
+Abstract
+
+ This memo documents a proposed mechanism for a first stage of a
+ transition from an unsigned DNS root to a signed root, such that
+ the data in the root zone is accompanied by DNSSEC signatures to
+ allow validation.
+
+ The underlying reason for signing the root zone is to be able to
+ provide a more secure DNS hierarchy, where it is possible to
+ distinguish false answers from correct answers.
+
+ For the special case of the DNS root zone, an interim scheme is
+ proposed. This scheme is mostly aimed at securing the root zone
+ itself for technical and operational reasons, and to give
+ operational experience of DNSSEC.
+
+
+1. Terminology
+
+ The key words "MUST", "SHALL", "REQUIRED", "SHOULD", "RECOMMENDED",
+ and "MAY" in this document are to be interpreted as described in
+ RFC 2119.
+
+ The term "zone" refers to the unit of administrative control in the
+ Domain Name System. "Name server" denotes a DNS name server that is
+ authoritative (i.e. knows all there is to know) for a DNS zone,
+ typically the root zone. A "resolver", finally, is a DNS "client",
+ i.e. an entity that sends DNS queries to authoritative nameservers
+ and interpret the results.
+
+
+2. Motivation for signing the DNS root
+
+ In the special case of the root zone there are very strong reasons
+ to take a slow and conservative approach to any changes with
+ operational impact. Signing the root is such a change.
+
+ DNSSEC[RFC2535, RFC3090] has been in development for a number of
+ years now and still has not reached the point where the last flag
+ day is behind us.
+
+ However, during the years of DNSSEC development and refinement
+ [RFC2930, RFC3007, RFC3008, RFC3110, RFC3225, RFC3226, AD-secure,
+ Opt-in, Wild-card-optimize], the Internet has matured and more and
+ more businesses and other organizations have become dependent on
+ the stability and constant availability of the Internet.
+
+ It is therefore prudent to do everything in our power to ensure
+ that the DNS infrastructure works as well as possible and, when
+ appropriate and possible, adding enhancements and functionality.
+
+ The time is now right for yet another step of improvement by
+ signing the root zone. By doing that any Internet user that so
+ wishes will obtain the ability of verifying responses received from
+ the root nameservers.
+
+ Since this is new operational ground the objective is not maximum
+ security but rather an "Internet-wide" controlled experiment with a
+ signed root zone, where the trade off is that we utilize the fact
+ that there are operators in place that can help even though they
+ are not sufficiently staffed to do off-line signing in a 24x7
+ mode. For this reason it is fully possible to even do automatic
+ signing, since the purpose is to ensure that DNSSEC works
+ operationally with a signed root zone and gain experience from the
+ exercise.
+
+ It should be pointed out, however, that the experimental part is
+ only the added DNSSEC records. The traditional records in the root
+ zone remain unchanged and the new records will only be visible to
+ DNSSEC-aware resolvers that explicitly ask to see these new
+ records.
+
+
+2.1. Motivation for signing the root zone now
+
+ The reason DNSSEC is not yet widely deployable is that the problem
+ of key management remains unsolved, especially where communication
+ between the zone administrators for a parent zone and child zone is
+ required.
+
+ However, during the past year a solution to this problem has been
+ found (in the form of a new record type, DS aka Delegation Signer)
+ [DS], discussed, implemented and tested. Therefore, it is finally
+ reasonable to consider DNSSEC deployment to be a real possibility
+ within the next 12 months.
+
+ In the case of the root zone the particular importance of managing
+ the transition with zero operational mistakes is a strong reason to
+ separate the signing of the zone itself, with the associated key
+ management issues, from the future management of signed delegations
+ (of top level domains).
+
+ Although support for Delegation Signer has been implemented and
+ tested it is not yet generally available except experimentally. For
+ this reason signed delegations for productions zones will have to
+ wait a bit longer. Furthermore, it will take some time to ensure
+ that the entire RSS aka Root Server System is capable of supporting
+ the protocol changes that accompany the new support for Delegation
+ Signer.
+
+ By signing now it will be possible to work through the operational
+ issues with signing the zone itself without at the same time having
+ to manage the additional complexity of signed delegations. Also, by
+ explicitly not supporting any signed delegations, it is also
+ possible to recover in a graceful way should new operational
+ problems turn up.
+
+ Because of these operational and technical issues there is a
+ "window of opportunity" to sign the root zone before the status of
+ implementation of "full DNSSEC", including Delegation Signer
+ support, change to "generally available", thereby increasing the
+ pressure for signed delegations from the root zone.
+
+
+3. Trust in DNSSEC Keys
+
+ In the end the trust that a validating resolver will be able to put
+ in a key that it cannot validate within DNSSEC will have to be a
+ function of
+
+ * trust in the key issuer
+
+ * trust in the distribution method
+
+ * trust in extra, out-of-band verification
+
+ For any security apex, i.e. a node in the DNS hierarchy that issues
+ out-of-band "trusted keys", it is of critical importance that this
+ function produces a positive result (i.e. the resolver gains
+ sufficient confidence in the keys to decide to trust them). The
+ particular case of the root zone is no different, although possibly
+ it is more crucial than many other security apexes.
+
+ To ensure that the resulting trust is maximized it is necessary to
+ work with all the parameters that are available. In the case of the
+ key issuer there is the possibility of chosing a key issuer that
+ has a large "trust base" (i.e. is already trusted by a large
+ fraction of the resolver population). However, it is also possible
+ to expand the aggregated trust base by using multiple simultaneous
+ key issuers, as described in [Threshold-Validation].
+
+ Furthermore, with multiple trusted keys it will be possible for a
+ validating resolver to optimize for the "right compromise" between
+
+ * maximum security (as expressed by all available signatures by all
+ available keys verifying correctly
+
+ * maximum redundancy (as in the DNS lookup being validated if there
+ is any signature by any trusted key available)
+
+ Without multiple, independent trusted keys the rollover operation
+ will always be a dangerous operation where it is likely that some
+ fraction of the resolver population lose their ability to verify
+ lookups (and hence start to fail hard). I.e. the validating
+ resolver will be forced to adopt the "maximum security" policy,
+ since there is no alternative.
+
+ With multiple, independent trusted keys, however, it is possible to
+ design for improved redundancy by trusting lookups that are only
+ validated against a subset of the available keys. This will make
+ rollovers much less risky to the extent that it will be possible to
+ "survive" even emergency rollovers without any immediate
+ configuration chagnes in the validating resolver.
+
+
+4. Interim signing of the root zone
+
+ At present all the authoritative servers for the root zone pull the
+ zone from a primary master. I.e. any changes at the primary master
+ will propagate via NOTIFY[RFC1996] and subsequent
+ AXFR/IXFR[RFC1995, AXFR-clarify] to the slave servers.
+
+ Between the primary master and the slaves transactions are signed
+ with TSIG[RFC2845] signatures. This mechanism is already in place,
+ and there is operational experience with periodic key rollover of
+ the TSIG keys.
+
+
+4.1. Design philosophy
+
+ By introducing a signing step into the distribution of the zone
+ file complexity is increased. To avoid introducing new single
+ points of failure it is therefore important to ensure that any
+ added or changed steps are as redundant as possible.
+
+ The assumption is that the operators of the root servers are
+ trusted and that consistency of the zone among the root servers is
+ a crucial property that MUST be preserved in emergencies.
+
+ To ensure that consistency is maintained new single points of
+ failure SHOULD NOT be introduced by the signing step. Therefore a
+ structure where several parties have the ability to sign the zone
+ is proposed. Furthermore, such a design helps avoid any individual
+ party becoming a de facto single zone signing authority.
+
+
+4.2. Proposed new management structure for the root zone
+
+ Taking into account the already existing infrastructure for
+ management of TSIG keys and rollover of these keys the following
+ structure is proposed:
+
+ * Day-to-day signing of the root zone is performed by a subgroup of
+ the root server operators referred to as "signing operators". For
+ this task individual, per-operator, Zone Signing Keys, ZSKs, are
+ used.
+
+ * The set of Zone Signing Keys are signed by several Key Signing
+ Keys, KSKs, at any particular time. The public part of KSKs in
+ use have to be statically configured as "trusted keys" in all
+ resolvers that want to be able to perform validation of
+ responses.
+
+ * Key rollover, the operation when an old KSK is exchanged for a
+ new KSK, is managed with minimal overlap and on a frequent basis
+ of no less than three times per year per KSK. The rollover
+ schedule is chosen to be frequent enough to not make long-term
+ trust possible while being low enough to not become operationally
+ infeasible.
+
+
+4.2.1. Management and distribution of the zone file
+
+ The present, unsigned zone is published by the official slaves, the
+ "root nameservers", transferring the zone securely from a primary
+ master and subsequently using the data to respond to queries. This
+ mechanism is changed into:
+
+ * The unsigned root zone is transferred securely from the primary
+ master to a set of "signing primaries" managed by the operators
+ participating in signing the zone. This is done via the
+ traditional mechanisms NOTIFY + AXFR/IXFR + TSIG.
+
+ * The root nameservers change their configuration so that they
+ replace the present, single, primary master as the source of the
+ zone with a set of multiple possible "signing primaries" as
+ masters that provide the signed zone.
+
+ * When a new, unsigned zone, is published by the primary master it
+ will automatically be transferred to the pre-signing servers. The
+ responsible operator will then sign the new zone and publish it
+ from his signing primary. Since the serial number is higher than
+ what the official root nameservers presently have the official
+ root nameservers will all transfer the zone from this source
+ (because of the redundant configuration with multiple possible
+ masters for the signed zone).
+
+ * The operators that participate in signing rotate the signing
+ responsibility among themselves. Should the responsible operator
+ be unable to do this for any reason then any of the others are
+ able to do the signing instead. Traceability is maintained since
+ the zone signing keys are individual.
+
+ * To avoid having several "backup signing operators" possibly sign
+ at exactly the same time backups are allocated "time windows"
+ within which they are allowed to publish a signed zone.
+
+ With N signers, each signer is assigned a unique number R in
+ [1..N].
+
+ T = 2*k*((S-R) mod N)
+
+ T is time to wait in seconds, S current serial number. The length
+ of the window is k, thereby separating each signing window with
+ an interval where signing is not allowed.
+
+ The constant k is used to create sufficient separation of the
+ signers with respect to time used to sign and time needed to
+ distribute the zone. A reasonable value for k would be in the
+ order of 1800 seconds.
+
+ * Because the digital signatures in the signed root zone MUST NOT
+ expire it is necessary to ensure that the unsigned zone does
+ change sufficiently often to cause new signing to occur within
+ the validity period of the old signatures. This is most easily
+ accomplished by a dummy update that only increments the serial
+ number in the SOA record.
+
+ This new requirement will not cause any operational problems,
+ since in fact the root zone is maintained this way since several
+ years back.
+
+
+4.2.2. Management of the Key Signing Keys
+
+ Key Signing Keys, KSKs, are periodically issued by a several "Key
+ Signing Key Holders", KSK holders, individually. These KSKs consist
+ of a private part that should always be kept secret and a public
+ part that should be published as widely as possible since it will
+ be used as a "trusted key" in resolver configurations.
+
+ The public part of each KSK should be included in the keyset for
+ "." as described in [Threshold-Validation]. I.e. the keyset will be
+ the union of the public parts of all KSKs and all ZSKs, Zone
+ Signing Keys.
+
+ * Each KSK holder should generate a sequence of KSKs where the
+ public parts will be used to include in the keyset for "." and
+ the private parts will be used for signing the keyset.
+
+ * Each KSK holder should, on request from the signing operators,
+ send in the public part of the KSK. The union of the public parts
+ of KSKs and the corresponding public parts of ZSKs, as collected
+ by the signing operators, constitute a "keyset".
+
+ * Each KSK holder should, on request from the signing operators,
+ sign the complete keyset with the private part of the associated
+ KSK and send in the resulting signature to the signing operators
+ for inclusion in the signed zone.
+
+
+4.2.3. Management of the Zone Signing Keys and the keyset signatures
+
+ A subgroup of the root operators that choose to participate in
+ signing the zone each hold an individual "Zone Signing Key",
+ ZSK. The subgroup of operators may include all operators, but that
+ is not necessary as long as a sufficient number to achieve
+ redundancy in "signing ability" participates.
+
+ * The complete keyset (i.e. all the public parts of KSKs and ZSKs)
+ should be signed by each KSK holder individually, generating a
+ new signature for the keyset which is sent back to the signing
+ operators via an out-of-band mechanism.
+
+ * The signing operators should verify each received signature
+ against the corresponding key in the keyset and, unless invalid,
+ accept the signature into the set of signatures associated with
+ this keyset as described in [Threshold-Validation].
+
+ * The signing operators should include one of the keysets together
+ with all the KSK signatures in the zone file according to an
+ agreed upon rotation schedule.
+
+
+4.2.4. Management of key rollover
+
+ The Key Signing Keys should, for this interim scheme, be relatively
+ short-lived and rolled over frequently. The direct intent is that
+ it should not be possible to put long term trust in the keys.
+ Therefore, by design, every resolver that chooses to configure
+ these as "trusted keys" (to be able to validate lookups) will have
+ to change the configuration periodically.
+
+ This is, after all, only an interim method of root zone signing.
+
+ * Key rollover is executed by changing from one signed keyset to
+ another. I.e. from a keyset signed by one set of KSKs to a keyset
+ signed by a partially different set of KSKs. By not rolling all
+ the KSKs at the same time redundancy is improved.
+
+ * Technically the signing operators are able to initiate key
+ rollover, although except for the case of a suspected key
+ compromise (with subsequent immediate key rollover) this ability
+ should only be used according to an established schedule.
+
+ * New Key Signing Keys will be published as widely as possible,
+ however exactly how and where to publish the keys is by itself an
+ area where it is necessary to acquire more experience. Especially
+ for the case of individual hosts and other devices this will be a
+ significant issue to deal with.
+
+ * Since the keys expire within a few months the aim is to make it
+ as difficult as possible to configure an interim key and then
+ forget about it long enough to still trust an interim key when a
+ long term design for signing the root zone emerges.
+
+
+4.2.5. The role of the KSK holder
+
+ With multiple KSKs it is possible to have multiple individual KSK
+ holders. Each will perform the role of authenticating the identity
+ of the signing operators, through the act of signing the keyset
+ that includes the operator Zone Signing Keys.
+
+ The chain of authority that defines editorial control over the zone
+ contents is entirely separate from this and is in no way affected.
+
+ I.e. the KSK holder is only asserting identity of the holders of
+ ZSKs and does not in any way take part in issues regarding zone
+ contents. In this respect the role of a KSK holder is much like
+ that of a public notary or a Certificate Authority.
+
+ The primary function that the KSK holder is performing is adding
+ trust to the authenticity of the Zone Signing Keys and this trust
+ has to be propagated down to validating resolvers. Therefore an
+ obvious key characteristic of a KSK holder is that it should
+ already be trusted by as large a fraction of the "resolver
+ population" as possible. In this document that fraction is referred
+ to as the "trust base" of a KSK holder.
+
+ The key characteristics of a KSK holder will be entities that
+
+ * already are trusted by some part of the "resolver population",
+ i.e. have a "trust base"
+
+ * are multiple entities that complement each other (so that the
+ aggregated "trust base" grows)
+
+ * are willing to help work on methods for distributing their
+ trusted keys to the resolvers (hard problem)
+
+ The requirement on the individual KSK holders is that they must be
+ able to
+
+ * establish a secure out-of-band communication path in
+ collaboration with the signing operators which will be used for
+ authenticated exchange of the unsigned keyset and generated
+ signatures
+
+ * periodically generate strong keys using a good random number
+ generator
+
+ * manage their keys (i.e. use them for signing the operator keyset
+ and keeping the private key appropriately secret)
+
+
+4.2.5.6. Suggestions for KSK holders
+
+ Regional Internet Registries, RIRs, are suggested to be one
+ suitable choice of KSK holders. However, since every KSK holder
+ will act on its own there is no requirement that all RIRs
+ participate, although more than one would be good. Other suitable
+ KSK holders may exist and as long as the requirements are met more
+ would be better within the packe size limitations that are
+ discussed in [Threshold-Validation].
+
+ The basis of the suggestion of RIRs is
+
+ * their neutrality
+
+ * their proven record of service to the Internet community
+
+ * that they don't have the domain name system as their primary
+ field of activity
+
+ * their geographical diversity
+
+ * the fact that they are, by definition, not a single entity, but
+ rather a collective of organizations.
+
+
+5. Risk Analysis
+
+ A change in the management of the root zone is always a risk. But
+ that is all the more reason to do it carefully and after due
+ consideration, rather than as a result of an immediate and urgent
+ need. The gains of a signed root zone have to be judged against the
+ added complexity of the signing step.
+
+ However, added complexity, in one form or another, is basically
+ unavoidable. It is possible to argue for or against implementation
+ details, but in the end the benefits of a signed root will have to
+ be compared against some amount of added complexity. If the cost or
+ risk of this complexity is deemed to be too high, then it is not
+ possible to sign the DNS root zone. If that is the conclusion; then
+ it is obviously important to reach it as soon as possible.
+
+ The same is true for the need for operational experience with a
+ signed root zone. There is no method of acquiring this experience
+ except by signing the root zone, so that is what is being proposed.
+
+ Some identified scenarios:
+
+
+5.1. What will the consequences of a signed root zone be for old
+ resolver software?
+
+ Nameservers that are authoritative for signed zones only give out
+ these signatures when explicitly asked for them. Therefore, the
+ presence of signatures in the root zone will not have any impact at
+ all on the majority of resolvers on the Internet that does not
+ validate lookups.
+
+
+5.2. What happens if a signing operator fails to sign the zone on
+ time?
+
+ Literally nothing. I.e. the root zone that is published will be the
+ version prior to the last change. This is not believed to be a
+ major problem, since all changes to the data in the root zone are
+ characterized by long overlaps in time. Furthermore every change is
+ preceded by an administrative process that takes several days or
+ even weeks. Because of this, a failure to install a new version of
+ the root zone for even so long as a day will not noticeably change
+ the turn-around time for changes in the root zone.
+
+
+5.3. What happens if several signing operators by mistake sign the
+ same version?
+
+ Literally nothing. One signing operator will be first, according to
+ the mechanism designed to separate the different backup signing
+ operators described in 3.3.1. The signed zone published by this
+ operator will be the version of the signed root zone that all the
+ root nameservers pick up.
+
+ When the second signing operator signs the zone the serial number
+ in the zone will be unchanged, and therefore the root nameservers
+ will not pick this zone up but instead stay with the first version.
+
+
+5.4. What happens if the unsigned zone is compromised between the
+ primary master and the signing primaries?
+
+ This is basically the same threat as the zone being compromised
+ between the primary master and the root servers in the traditional
+ unsigned case. To guard against this possibility every zone
+ transfer is already protected by a TSIG signature.
+
+ Because of this the root zone file cannot get transferred to the
+ signing primaries unless the transaction signature matches, thereby
+ proving that the zone contents are uncompromised. The consequence
+ is that if the zone transfers are somehow compromised in transit,
+ they will not get signed and therefore the published root zone will
+ remain the signed version of the last uncompromised transfer.
+
+
+5.5. What are the security implications for the new "signing
+ primaries"? Will they not have to be as secure as the primary
+ master is now?
+
+ Yes. However, the entire root server system is based upon trust,
+ i.e. the entire Internet is trusting the present root server system
+ because there is no alternative to doing that. This proposal is not
+ about changing the need for trust in the root server system. It is
+ about providing a method of determining authenticity of data,
+ something that is presently missing.
+
+ The root operators are already trusted to provide a root server
+ system based upon secure servers lacking validation mechanisms. It
+ is therefore a bit difficult to argue for not trusting them to
+ provide an improved system that adds exactly the lacking validation
+ mechanisms on a basis of not trusting them to secure the servers
+ involved. In both cases trust is involved, the difference is that
+ in the latter case validation is possible.
+
+ Furthermore, the proposed signing primaries will not need to have
+ publicly known addresses (just as the present primary master is not
+ publicly known), nor will they need to be able to communicate with
+ anyone outside the well defined set of servers that are part of the
+ root server system. Because of this it will be significantly easier
+ to secure the signing primaries than the already present task of
+ securing the DNS root nameservers.
+
+
+5.6. What happens if a Zone Signing Key is compromised?
+
+ If this happens it is necessary to do an emergency rollover of the
+ keyset that includes the compromised key. I.e. the old keyset (and
+ its signatures) is replaced by a new keyset containing new ZSKs but
+ the same, uncompromised, KSKs and its signatures. Then the root
+ zone is re-signed using one of the new Zone Signing Keys.
+
+ This problem is not unique to a signed root zone, it is inherent in
+ any activity involving cryptographic keys.
+
+ Also note that there will be no need to change any configuration in
+ the resolver end. The rollover is an entirely atomic operation
+ inside the management structure of the root zone.
+
+
+5.7. What happens if a Key Signing Key is compromised?
+
+ Depending on the trust model used by individual validating
+ resolvers one of two things will happen.
+
+ Resolvers that through local policy have chosen to trust this KSK
+ alone will need to change their configuration to instead trust
+ other KSKs, either available from other KSK holders or a new
+ trusted key made available by the same KSK holder that held the
+ compromised key.
+
+ Resolvers that have chosen to require multiple signatures by KSKs
+ for the root zone will not have to do any emergency key rollover at
+ all, since validation of lookups will still work, based upon the
+ integrity of the other trusted keys that have not been compromised.
+
+ In the management end it is necessary to do an emergency rollover
+ of the keyset including the compromised key and the suggested
+ method is by switching to a keyset that only changes the
+ compromised KSK and the ZSKs and keeps all other KSKs. Such keysets
+ should be prepared and signed in advance.
+
+ The new signed keyset is added to the root zone and then the zone
+ is re-signed using one of the new Zone Signing Keys. In this case,
+ since a Key Signing Key is changed, every resolver that choose to
+ trust that KSK holder will over time have to configure the new key
+ to be able to validate lookups.
+
+ This problem is not unique to a signed root zone, it is inherent in
+ any activity involving cryptographic keys.
+
+
+5.8. Does the out-of-band communication between the signing operators
+ and the RIRs holding the key-signing keys add a new failure mode?
+
+ Yes. The traditional DNSSEC design assumes that (for an arbitrary
+ zone, not particularly for the root zone) the key-signing key is
+ managed by the same entity that manages the operator keys and hence
+ no communication issue exists.
+
+ In this case it is important that the signing operators do not hold
+ the responsibility for the key-signing keys. The root server
+ operators should only act as a "publishing service" for the root
+ zone contents, not as the entity that verifies correctness of the
+ published data.
+
+ However, apart from established secure methods of out-of-band
+ communication being available, there is also the very real
+ possibility of managing these exchanges with actual eye-to-eye
+ contact. Representatives for the RIRs and the root server operators
+ already meet on a regular basis during IETF meetings and the
+ different RIR meetings.
+
+
+6. Security Considerations
+
+ Signing the DNS root zone is all about security. A signed root zone
+ may aid applications and organizations all over the Internet in
+ improving their security by enabling validation of DNS lookups.
+
+ Signing the root zone does add a new management step and therefore
+ it is important to ensure that possible failures in this management
+ step does not leave the published root zone in a state that is
+ actually worse than the original unsigned state.
+
+ The various failure modes that have been identified all show this
+ property of not being any worse than the unsigned case.
+
+ There is however one scenario that changes drastically with the
+ proposed distributed signing scheme and that is the consequences of
+ one signing operator intentionally changing the contents of the
+ root zone prior to the actual signing. In the unsigned case this
+ will cause the root zone to become inconsistent (i.e. the responses
+ vary depending upon which server it comes from), while in the
+ signed case the root zone will remain consistent but with erroneous
+ data in it.
+
+ It is my belief (this is impossible to prove) that the risk of
+ human error among the operators, however small, is still far
+ greater than the risk of willful misconduct. Therefore, the
+ proposed design that enforces consistency among the roots, is
+ actually also an improvement in stability and security.
+
+ Se further section 4 for a more complete risk analysis.
+
+
+7. IANA Considerations
+
+ NONE.
+
+
+8. References
+
+8.1. Normative.
+
+ [RFC2535] Domain Name System Security Extensions. D. Eastlake.
+ March 1999.
+
+ [RFC3090] DNS Security Extension Clarification on Zone Status.
+ E. Lewis. March 2001.
+
+ [RFC1995] Incremental Zone Transfer in DNS. M. Ohta. August 1996.
+
+ [RFC1996] A Mechanism for Prompt Notification of Zone Changes
+ (DNS NOTIFY). P. Vixie. August 1996.
+
+ [RFC2845] Secret Key Transaction Authentication for DNS (TSIG).
+ P. Vixie, O. Gudmundsson, D. Eastlake, B. Wellington.
+ May 2000.
+
+8.2. Informative.
+
+ [RFC2930] Secret Key Establishment for DNS (TKEY RR). D. Eastlake.
+ September 2000.
+
+ [RFC3007] Secure Domain Name System (DNS) Dynamic Update.
+ B. Wellington. November 2000.
+
+ [RFC3008] Domain Name System Security (DNSSEC) Signing Authority.
+ B. Wellington. November 2000.
+
+ [RFC3110] RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System
+ (DNS). D. Eastlake 3rd. May 2001.
+
+ [RFC3225] Indicating Resolver Support of DNSSEC. D. Conrad.
+ December 2001.
+
+ [RFC3226] DNSSEC and IPv6 A6 aware server/resolver message size
+ requirements. O. Gudmundsson. December 2001.
+
+ [Delegation-Signer] Delegation Signer Resource Record.
+ O. Gudmundsson. October 2002. Work In Progress.
+
+ [AXFR-clarify] draft-ietf-dnsext-axfr-clarify-NN.txt DNS Zone
+ Transfer Protocol Clarifications. A. Gustafsson. March
+ 2002. Work In Progress.
+
+ [AD-secure] draft-ietf-dnsext-ad-is-secure-NN.txt Redefinition of
+ DNS AD bit. B. Wellington, O Gudmundsson. June 2002.
+ Work In Progress.
+
+ [Opt-In] draft-ietf-dnsext-dnssec-opt-in-NN.txt DNSSEC Opt-In
+ R. Arends, M Kosters, D. Blacka. June 2002. Work In
+ Progress.
+
+ [Wild-card-optimize] draft-olaf-dnsext-dnssec-wildcard-
+ optimization-NN.txt DNSSEC Wildcard optimization.
+ O. Kolkman, J. Ihren, R. Arends. September 2002.
+ Work In Progress.
+
+ [Threshold-Validation]
+ draft-ihren-dnsop-threshold-validation-00.txt Threshold
+ validation: A Mechanism for Improved Trust and Redundancy
+ for DNSSEC Keys. J. Ihren. February 2003. Work In
+ Progress.
+
+9. Acknowledgments.
+
+ To help me produce this document I have received lots and lots of
+ comments from many people around the Internet with suggestions for
+ lots and lots sorely needed improvements. Among the folks who
+ helped out are, in no particular order: Paul Vixie, Bill Manning,
+ Ôlafur Gumundsson, Rob Austein, Patrik F„ltstr÷m, Olaf Kolkman,
+ Harald Alvestrand, Suzanne Woolf, John M. Brown, Lars-Johan Liman
+ and M…ns Nilsson.
+
+
+10. Authors' Address
+
+Johan Ihr‰n
+Autonomica AB
+Bellmansgatan 30
+SE-118 47 Stockholm, Sweden
+johani@autonomica.se