Internet DRAFT - draft-madi-dnsop-drzom
draft-madi-dnsop-drzom
DNSOP Di Ma
Internet Draft Feng Han
Intended status: Informational ZDNS
Expires: May 30, 2015 Linjian Song
BII
November 26, 2014
Considerations on the evolution of DNS root zone operation
and management
draft-madi-dnsop-drzom-00
Abstract
Given responsibilities and importance it bears, DNS root system
architecture remains largely unchanged. Over the years, the topics
together with some proposals of scaling the root have been discussed
in various communities, trying to offer solutions or insights to a
specific issue of DNS root operation. This document gathers and
describes issues relating to the root zone operation and management
and comb corresponding technical requirements for evolution
directions of root zone operation and management in new groundwork.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 30, 2015.
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
Di Ma, et al. Expires May 30, 2015 [Page 1]
Internet-Draft Evolution of DNS root November 2014
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
1. Introduction
DNS service links naming space and addressing system, a connecting
thread through the Internet infrastructure. DNS was designed as a
hierarchical system with a few TLDs and slow update frequency. Rarely
has the domain name system faced so many significant changes in its
root zone operation and management, with DNSSEC-signed zone file,
IPv6 adoption and new gTLD. Besides, DNS is expected to deliver more
responsibilities by supporting DANE (DNS-based Authentication of
Named Entities) that allow Internet applications to establish
cryptographically secured communications by using information made
available in DNS, which by the way, has been launching discussions in
IETF DANE WG. Given responsibilities and importance it bears, DNS
root system architecture remains largely unchanged. Issues of root
security and stability have been stated in many technical reports
[RFC2870] [SAC042] [SAC046]. Over the years, the topics together with
some proposals of scaling the root have been discussed in various
communities, trying to offer solutions or insights to a specific
issue of DNS root operation.
"Scaling the root" was one of remarkable issues when it comes to
evolve the current root system. It could be to extend the number of
root name servers, or it could be to make the root operation
mechanism scale to bigger zone file and higher update frequency, or
it could still be to establish a more open root zone publication
system. DNS root operation is critical service to the Internet and
any changes to it ought to be in a prudent way, assuring security and
stability. Among others, zone file management, the focal thing in
root operation, is a systematic task, involving kinds of multi-
stakeholders in Internet community. We cannot get the pleasing
outcome for root scaling without reviewing the DNS root operation and
management on the whole.
This document, inspired by [icann-ITI] and [RSST], is intended to
gather and describe issues relating to the root zone operation and
management and comb corresponding technical requirements for root
zone evolution directions, before the IETF community gives solutions
to the very issues.
Di Ma, et al. Expires May 30, 2015 [Page 2]
Internet-Draft Evolution of DNS root November 2014
2. Modeling DNS root system operation
2.1. DNS root system components
As described in many technical reports and also a common view, there
are three sub-systems involving DNS root zone operation and
management:
The Resolving System publically interfaces with DNS resolvers, by
responding to root zone query requests via DNS protocol data units.
The Publication System distributes the root zone file to the root
servers (including anycast clones) and arranges for the information
in the root zone file to be available for the construction of
responses to queries.
The Provisioning System processes change requests, maintains the
authoritative database of root zone information, and periodically
creates a root zone file that contains the authoritative root zone
information.
2.2. Roles in DNS root system operation
In accordance with this model, DNS root system roles could be
therefore identified:
Root Zone Coordinator (RZC): RZC works as an administration body of
root zone operation. RZC, as a workflow interface with TLD
registries, receives and processes root zone change requests and
executes administration to TLD registries. With DNSSEC deployment,
RZC additionally delivers the responsibility of root zone Key Signing
Key (KSK) management. Accordingly, RZC is recognized as a root zone
operation representative to the public. The role of RZC is part of
IANA functions, acted by ICANN currently.
Root Zone Host (RZH): The role of RZH is to maintain reliable,
secure, and accurate operation of the DNS name servers that publish
root zone data they fetch from RZC (IANA). As a distribution channel
for root zone data, RZH is responds to root zone information queries
via DNS messages. As well known, there are 13 sets of root name
server IPv4/IPv6 addresses reflecting hundreds of individual machines
representing RZH, denoted by 13 letters from A to M, operated by 12
independent organizations worldwide.
Root Zone Maintainer (RZM): RZM is the backend operator of root zone.
Viewed as a technical role, RZM takes the responsibility of
generating (updating) root zone file together its digital signature,
and distributes DNSSEC-signed zone file to Root Zone Host (RZH). RZM.
Di Ma, et al. Expires May 30, 2015 [Page 3]
Internet-Draft Evolution of DNS root November 2014
At present, VeriSign serves as RZM.
Root Zone Administrator (RZA): RZA is privileged to perform the
review and approval function that authorizes each individual change
to the root zone. The RZA imparts nothing to the root zone but merely
explicitly authorizes these changes by verifying that RZC has
followed established policies and procedures in processing the
requests. At present, the role of RZA is played by National
Telecommunications and Information Agency (NTIA), a governing body of
the United States.
3. Evolution directions
This section is to list the evolution directions with the purpose to
make DNS root system remain an unshakable corner stone of DNS
operation with security, stability as well as high efficiency, while
provide a better and up-to-date service. Responding to root queries
with security and stability is the fundamental among others for root
system. In this document, the evolution of DNS root system is
identified hereby as a set of key issues with respect to resolving
system, publication system and provisioning system.
3.1. DNS protocol data unit and Resolving System
One of the fundamental problems of DNS protocol is the UDP size
limitation, which is caused by the IPv4 MTU setting in the early days
of Internet. Efforts made by EDNS introduce a negotiation mechanism
to support bigger DNS protocol data unit. However, owing to either
capability or filtering policy of intermediate networking devices,
EDNS fails to get the pleasing expectation that it is designed for.
Granted, EDNS is improving over time with updated versions. IPv6 is
yet another thing that DNS protocol data unit can benefit from. IPv6-
capable mandates an MTU of 1280 bytes, which means, even without
EDNS, the size of DNS protocol data unit could be still improved by
the virtue of IPv6 fundamentally. Where and when acceptable, TCP is
still another option for carrying DNS messages [RFC5966].
With a bigger DNS protocol data unit, more information can be
included in DNS message, especially offering a chance to enhance the
Resolving System. By far, there are significant issues regarding the
Resolving System owing to the limitation of the size of DNS protocol
data unit.
When a recursive name resolver is bootstrapped, it uses a hints file
or other statically pre-configured initial glue to find a root
server, and then it asks that root server for the current list of
root servers, with the expected answer the full list of RZH and their
addresses, the process of which is called "priming exchange". For one
Di Ma, et al. Expires May 30, 2015 [Page 4]
Internet-Draft Evolution of DNS root November 2014
thing, with the inclusion of IPv6 addresses for RZHs, the response is
even longer. In the case of 13 RZHs, there is no placing all the IP
addresses of all dual-stake RZHs in a priming response with UDP
limitation of 512 bytes. For another thing, it has been decades since
there were 13 RZHs, which was a calculated one regarding to specific
constraints. The number of RZH is by no means a constant for DNS
system but a variable parameter when and where possible. And still
for another thing, when DNSSEC signatures are added to the root zone,
the response message to the priming query or DNSKEY query will exceed
512 bytes accordingly.
Together with the tendency that DNS is delivering more
responsibilities, bigger protocol data units will therefore
facilitate advancements designed to scale the root system in the days
to come.
3.2. Root zone synchronization and Distribution System
DNS root sub-systems are not organized closely to one another but
root zone keeps changing. Data synchronization is therefore
fundamental to root zone distribution from RZM to RZH via
Distribution System. Considering DNS tends to be more dynamic,
synchronization should be taken into account when a new Distribution
System is introduced.
In alignment with current DNS operation, DNS root name servers ({A-
M}.root-servers.net), serving as RZH, receive queries from clients
using the DNS protocol and provide appropriate responses. As one
important channel to publish root zone information, the root name
servers have been subjected to attacks over the decades, mostly of
the Distributed Denial Of Service (DDOS) variety. Besides,
reachability of the root name server system is required even for
purely local communication, since otherwise local clients have no way
to discover local services. As a point of view from [icann-ITI], in a
world sized distributed system like the Internet, critical services
ought to be extremely well distributed.
Historically and from the perspective of protocol, the channel for
distributing root zone information guarantee the authenticity. This
situation has been changed by DNSSEC that was designed to provide a
security extension to DNS. One of the ways that we can benefit from
DNSSEC is DNSSEC-signed root zone file itself guarantee authenticity
no matter where it is fetched as long as contents of this zone file
could go through the validation based on DNSSEC information with a
globally-trusted single key maintained by IANA. Therefore, the
deployment of DNSSEC and the advantage it brings about could evolve
the root zone Distribution System scaling to a more open fashion.
Accordingly, an open publication system of DNS root zone is
Di Ma, et al. Expires May 30, 2015 [Page 5]
Internet-Draft Evolution of DNS root November 2014
desirable. The role of RZH is expected to be played in a different
way. By the virtue of DNSSEC-signed root zone, theoretically, any
entity with good credit and network could be authorized to host root
zone as long as the hosted zone file is approved and signed by IANA.
Note that the selection process of the RZH candidate is out of the
scope of this document.
Some efforts have been made. For instance, [I-D.dnsop-dist-root]
proposes an enhancement that recursive DNS resolvers, serving as RZH,
get copies of the root zone, validate it using DNSSEC, populate their
caches with the information, and also give negative responses from
the validated zone. While [I-D.dnsop-scalingroot] positions that IANA
produce several additional forms of the DNS root zone by creating yet
another "golden address" pair. It asks the IANA to authorize an un-
owned pair of addresses that anyone can hang root service on.
Although promising, there are problems gripping the designs for open
publication system of DNS root zone. If DNS root zone publication
system operates in an open mode, far more RZHs are expected to take
part in. Given an increasing number of RZH, either recursive
resolvers or "universal anycast" endpoints or anything else, it
should be taken into account how to scale the zone file
synchronization mechanism to the much bigger groups of RZHs, ensuring
consistence and negligible delay. Optimized root zone file
distribution mechanism would be desirable. For example, TLD KSK
rollover should be accomplished within a specific time, requiring the
DS records update should synchronized beforehand timely.
Besides, open publication brings about a more diverse group of RZHs,
including ones that are deployed in a poorly-connected Internet
locations. And an increasing size of root zone file can easily be
served from sites with high-bandwidth connections and ready access to
servers and other computing infrastructure. It cannot easily be
served from sites with poor connectivity or infrastructure. A
synchronization mechanism of this open publication that can scale to
networking diversity is also indispensable.
3.3. Root zone update and Provisioning System
3.3.1. Update frequency
The size of root zone file is attached with significance. "Size" here
is not merely referred to as how many bytes the zone file has, but
also with the number of delegations considered. A conspicuous
observation is root zone has been growing up. As analyzed in [icann-
impact-newgTLD], the number and size of records in the root zone has
successfully grown over time, in part to accommodate new developments
like the introduction of IDN ccTLDs, the first two rounds of new
Di Ma, et al. Expires May 30, 2015 [Page 6]
Internet-Draft Evolution of DNS root November 2014
gTLDs, the introduction of IPv6 glue records, and the deployment of
DNSSEC in the Root Zone. There is also a natural tendency for the
number of name servers per delegation to increase as TLD name server
infrastructure matures over time.
As indicated in [RSST], due to introduction of DNSSEC and TLD update,
the transferring frequency of root zone will, as estimated and
desirable, remarkably increased, bring about the undesirable latency,
which will place a significant impact on root operation. The very
observation and analysis is yet another significance that should be
included into the context of root zone management evolution.
DNS root zone is getting bigger in an unprecedented rate and to an
unpredictable size. Ever since the new gTLD program was launched by
ICANN, more than 400 new gTLDs have been delegated so far. As a
natural tendency and estimated, more and more TLD operators will get
involved in root system, thus the rate of change or update would
increase proportionately. These changes includes:
1. Delegation and re-delegation
These are additions of new top-level domains or the transfer of
operation of a top-level domain from an existing operator to a
new operator. There might also be the removal of a top-level
domain.
2. Changes in contact information
There are usually three official points of contact for a top-
level domain, the formal head of the operator, the administrative
contact and the technical contact. Each of these can change from
time to time. The Root Zone Registration Data ("WHOIS") system is
therefore affected.
3. Changes in the set of name servers
Each top-level domain is served by two or more name servers. Top-
level domain operators occasionally add to, change, or remove
name servers from their set.
4. Changes in the addresses of name servers
Name servers are occasionally renumbered. Also, when a new name
server is added to the set serving a TLD, its address must also
be added.
5. TLD KSK rolling
TLD operators request to update their DS records in root zone.
For each change, current root server system has several parties
involved which including RZA, RZS, RZM and RZHs. And the whole
process consists of several manual steps, which dramatically
Di Ma, et al. Expires May 30, 2015 [Page 7]
Internet-Draft Evolution of DNS root November 2014
decrease the efficiency and predictability of the update process.
To make the whole process automated and use other zone update
policy (for example, dynamic update), measures should be taken to
fulfill the impending improvement to the Provisioning System.
3.3.2. Shared zone control
Over the years, concerns have been raised towards current root
operation is based in the Untied States and subject to the
jurisdiction of the United States. Due to the multi-stakeholder mode
advocated and coordinated by ICANN, shared control on root zone is
desirable by many and technical specification is needed therefore.
One straightforward thought is that root zone data should have
multiple signatures. Some theories have been advanced together with
multiple signing protocols.
Technically, efforts have been made on coordinating DNSSEC signing
information and multiple signing protocols. But how to make these
technologies fit into the context of shared control on DNS root is
still an open question, which should follow current root operation
practices with new risks evaluated. As indicated in [icann-ITI], the
right model is one in which all of the parties sharing control have a
set of capabilities:
1. A system for initiating a shared zone consisting of the zone
itself, rules, and individual journals for each of the
participants to post their requests and actions.
2. Each type of request is visible to all of the other participants
who can approve, disapprove, or timeout.
3. Rules define what happens to a request
* One type of a rule is a vote, which defines the conditions
for a request to succeed. This might include a delay for all
parties to have time to consider the request. For ccTLDs the
WSIS rules would dictate 1 of N, so each Country Code Top
Level Domain (ccTLD) could unilaterally change its own data.
Other domains might use a simple majority
* Specified delays could be important so that others might be
able to point out operational issues and let the requesters
reconsider
* Different conditions might apply for different operations,
such as creating a new vs. editing, etc.
4. Security Considerations
Di Ma, et al. Expires May 30, 2015 [Page 8]
Internet-Draft Evolution of DNS root November 2014
TBD
5. IANA Considerations
TBD
6. Acknowledgements
The authors would like to thank Bill Manning and David Conrad for
reviewing this document.
7. Informative References
[RFC2870] R. Bush, D. Karrenberg, M. Kosters, R. Plzak.,
"Root Name Server Operational Requirements", RFC 2870,
June 2000.
[SAC042] SSAC Comment on the Root Scaling Study Team Report and the
TNO Report,
https://www.icann.org/en/system/files/files/sac-042-en.pdf
[SAC046] Report of the Security and Stability Advisory Committee on
Root Scaling.,
https://www.icann.org/en/system/files/files/sac-046-en.pdf
[RFC5966] R. Bellis., "DNS Transport over TCP - Implementation
Requirements", RFC 5966, August 2010.
[icann-ITI]
Identifier Technology Innovation Panel,
https://www.icann.org/resources/pages/identifier-
technology-2013-10-11-en
[I-D.dnsop-scalingroot]
Xiaodong Lee, Paul Vixie and Zhiwei Yan., "How to scale
the DNS root system", draft-lee-dnsop-scalingroot-00(work-
in-progress), July 2014.
[I-D.dnsop-dist-root]
W. Kumari, P. Hoffman., "Securely Distributing the DNS
Root", draft-wkumari-dnsop-dist-root-01(work-in-progress),
July 2014.
[icann-impact-newgTLD]
Joe Abley and Kim Davies., "Impact on Root Server
Operations and Provisioning Due to New gTLDS", June 2012.
Di Ma, et al. Expires May 30, 2015 [Page 9]
Internet-Draft Evolution of DNS root November 2014
[RSST] Jaap Akkerhuis, Lyman Chapin, Patrik Faltstrom, Glenn
Kowack, Lars-Johan Liman and Bill Manning., "Report on the
Impact on the DNS Root System of Increasing the Size and
Volatility of the Root Zone", September 2009
Authors' Addresses
Di Ma
ZDNS Ltd.
4, South 4th Street, Zhongguancun
Haidian, Beijing 100190
China
Email: madi@zdns.cn
Feng Han
ZDNS Ltd.
4, South 4th Street, Zhongguancun
Haidian, Beijing 100190
China
Email: hanfeng@zdns.cn
Linjian Song
Beijing Internet Institute
2508 Room, 25th Floor, Tower A, Time Fortune
Beijing 100028
China
Email: songlinjian@gmail.com
Di Ma, et al. Expires May 30, 2015 [Page 10]