Internet DRAFT - draft-fujiwara-dnsop-delegation-information-signer
draft-fujiwara-dnsop-delegation-information-signer
Network Working Group K. Fujiwara
Internet-Draft JPRS
Intended status: Standards Track November 03, 2020
Expires: May 7, 2021
Delegation Information (Referrals) Signer for DNSSEC
draft-fujiwara-dnsop-delegation-information-signer-00
Abstract
DNSSEC does not protect delegation information, it contains NS RRSet
on the parent side and glue records. This document defines
delegation information signer (DiS) resource record for protecting
the delegation information, by inserting on the parent side of zone
cut to hold a hash of delegation information. The DiS resource
record reuses the type code and wire format of DS resource record,
and distinguishes it from existing DS RRSet by using a new digest
type. This document also describes the usage of DiS resource record
and shows the implications on security-aware resolvers. The
definition and usage are compatible with current DNSSEC.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 7, 2021.
Copyright Notice
Copyright (c) 2020 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
Fujiwara Expires May 7, 2021 [Page 1]
Internet-Draft referral-signer November 2020
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Specification of the Delegation information Signer . . . . . 3
3.1. New DS RR Usage: Delegation information signer (DiS) . . 3
3.2. DiS resource record in a Zone . . . . . . . . . . . . . . 4
3.3. Change of Authoritative servers . . . . . . . . . . . . . 4
3.4. Change of validating resolvers . . . . . . . . . . . . . 4
4. Compatibility with the current DNSSEC . . . . . . . . . . . . 4
5. Signing Priming Responses . . . . . . . . . . . . . . . . . . 5
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
7. Security Considerations . . . . . . . . . . . . . . . . . . . 5
8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 5
9. Normative References . . . . . . . . . . . . . . . . . . . . 5
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 6
1. Introduction
The current DNSSEC specifications [RFC4033], [RFC4034], [RFC4035] do
not protect the parent side NS RRSet and glue contained in the
delegation information.
Recently, the word "in-domain" is defined by [RFC8499]. The in-
domain glue is necessary and sufficient glue information for name
resolution. [I-D.ietf-dnsop-glue-is-not-optional] proposes that Glue
records are expected to be returned as part of a referral and if they
cannot be fitted into the UDP response, TC=1 MUST be set to inform
the client that the response is incomplete and that TCP SHOULD be
used to retrieve the full response.
Then, we can define complete delegation information set that contains
the parent side NS RRSet and all in-domain glue. We can generate a
hash of the parent side NS RRSet and in-domain glue, and put it in
DNS as a parent side information.
The delegation information signer (DiS) resource record (RR) is
inserted at a zone cut (i.e., a delegation point) to hold a hash of
delegation information (parent side NS RRSet) and required glue. The
DiS resource record reuses DS resource record and distinguishes it
from DS RRSet by using a new digest type and a new algorithm number.
Fujiwara Expires May 7, 2021 [Page 2]
Internet-Draft referral-signer November 2020
Recent DNSSEC validators ignore DS resource records whose algorithm
and digest type are unknown. Therefore, DiS resource record does not
affect current DNSSEC validation.
DNSSEC validators that support DiS resource record can verify NS
RRSet and in-domain glue.
This document defines new DS RR usage, gives examples of how it is
used and describes the implications on resolvers. This change is
compatible with current DNSSEC.
The meaning and processing the delegation information (parent side NS
RRSet and glue) are not changed. The delegation information is used
for name resolution process, and not used as the result of the name
resolution.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
Many of the specialized terms used in this document are defined in
DNS Terminology [RFC8499].
3. Specification of the Delegation information Signer
This section defines a new usage of the Delegation Signer (DS) RR
type.
3.1. New DS RR Usage: Delegation information signer (DiS)
This document specifies that the new DNSSEC Digest Type XX (it will
be assigned by IANA) to the Delegation information Signer with
SHA-256 (DISSHA256) for another DS usage.
The key tag and algorithm field may require further discussion.
The digest field is calculated over the parent side NS RRSet
corresponding to the owner name of the DiS resource record and whole
in-domain glue for its delegation.
digest = SHA-256 hash( NS RRSet | in-domain glue RRSets)
NS RRSet and in-domain glue RRSets are ordered as
[I-D.ietf-dnsop-dns-zone-digest].
Fujiwara Expires May 7, 2021 [Page 3]
Internet-Draft referral-signer November 2020
Sibling glue and out-of-bailiwick glue are not the data to be signed.
Wire format and Presentation format are the same as DS Resource
Record.
3.2. DiS resource record in a Zone
The DiS resource record enables delegation information (parent side
NS RRSet and in-domain glue records) signature validation in a
validating resolver.
A DiS RRSet is present at all delegation point even if there is no DS
RRSet. Since DiS RRSet has the same type code as DS RRSet except for
digest type and hash data, details of DiS resource record is the same
as DS resource record defined in [RFC4035].
When DNSSEC signer signes a zone, DNSSEC signer
o Remove all DiS resource records
o for all delegation points, generate new DiS resource record
o sign all DS RRSets
3.3. Change of Authoritative servers
Authoritative servers need to support
[I-D.ietf-dnsop-glue-is-not-optional]. Then, referral responses MUST
contain parent side NS RRSet and whole in-domain glue.
3.4. Change of validating resolvers
When a validating resolver receives a referral response with DS RRSet
and the DS RRSet contains a DS resource record that have DISSHA256
digest type, the validating resolver SHOULD validate referral NS
RRSet and in-domain glue. First, calculate digest from NS RRSet and
in-domain glue from the referral response. Compare the digest and
the digest field from the DiS resource record. If the digests
differ, the referral is compromised or modified. The validating
resolver can drop the referral.
4. Compatibility with the current DNSSEC
Current DNSSEC validators do not know DS resource records with digest
type DISSHA256 and these DS records should be ignored. (See
Section 5.2 of [RFC4035]).
Fujiwara Expires May 7, 2021 [Page 4]
Internet-Draft referral-signer November 2020
5. Signing Priming Responses
Another use case for DiS resource record is the protection of priming
responses.
The priming response is not a referral. However, it is similar to
the referral and the priming response is deterministic.
Then we can put DiS resource record in the root and it can be signed.
The root DiS resource record contains digest consist of the root NS
RRSet and all root servers' A and AAAA resource records.
Currently, TTL value of root servers' A/AAAA differ between root
servers. Before considering DiS resource record in root, the TTL
value of each root server A/AAAA for the root zone and root-
servers.net zone must match.
6. IANA Considerations
IANA is requested to allocate new digest type code for DS resource
record.
7. Security Considerations
8. Acknowledgments
9. Normative References
[I-D.ietf-dnsop-dns-zone-digest]
Wessels, D., Barber, P., Weinberg, M., Kumari, W., and W.
Hardaker, "Message Digest for DNS Zones", draft-ietf-
dnsop-dns-zone-digest-14 (work in progress), October 2020.
[I-D.ietf-dnsop-glue-is-not-optional]
Andrews, M., "Glue In DNS Referral Responses Is Not
Optional", draft-ietf-dnsop-glue-is-not-optional-00 (work
in progress), June 2020.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and S.
Rose, "DNS Security Introduction and Requirements",
RFC 4033, DOI 10.17487/RFC4033, March 2005,
<https://www.rfc-editor.org/info/rfc4033>.
Fujiwara Expires May 7, 2021 [Page 5]
Internet-Draft referral-signer November 2020
[RFC4034] Arends, R., Austein, R., Larson, M., Massey, D., and S.
Rose, "Resource Records for the DNS Security Extensions",
RFC 4034, DOI 10.17487/RFC4034, March 2005,
<https://www.rfc-editor.org/info/rfc4034>.
[RFC4035] Arends, R., Austein, R., Larson, M., Massey, D., and S.
Rose, "Protocol Modifications for the DNS Security
Extensions", RFC 4035, DOI 10.17487/RFC4035, March 2005,
<https://www.rfc-editor.org/info/rfc4035>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
[RFC8499] Hoffman, P., Sullivan, A., and K. Fujiwara, "DNS
Terminology", BCP 219, RFC 8499, DOI 10.17487/RFC8499,
January 2019, <https://www.rfc-editor.org/info/rfc8499>.
Author's Address
Kazunori Fujiwara
Japan Registry Services Co., Ltd.
Chiyoda First Bldg. East 13F, 3-8-1 Nishi-Kanda
Chiyoda-ku, Tokyo 101-0065
Japan
Phone: +81 3 5215 8451
Email: fujiwara@jprs.co.jp
Fujiwara Expires May 7, 2021 [Page 6]