Internet DRAFT - draft-yu-dnsops-disdm
draft-yu-dnsops-disdm
Domain Name System Operations H. Yu
Internet-Draft D. Gong
Intended status: Informational Y. Song
Expires: 22 December 2022 Y. Liu
Guangzhou Root Chain International Network Research Institute Co., Ltd.
20 June 2022
Multi Distribution master
draft-yu-dnsops-disdm-04
Abstract
DM (Distribution Master) is used to transfer zone file data between
the registry and the authoritative server. The centralized DM system
has the risk of a single point of failure. The distributed DM
architecture allows nodes to join and exit at any time to solve the
single point of failure problem.
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119] [RFC8174]
when, and only when, they appear in all capitals, as shown here.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 22 December 2022.
Copyright Notice
Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved.
Yu, et al. Expires 22 December 2022 [Page 1]
Internet-Draft MDM June 2022
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. research status . . . . . . . . . . . . . . . . . . . . . . . 2
3. Multi-DM innovation . . . . . . . . . . . . . . . . . . . . . 3
4. Distributed multi-DM network management system . . . . . . . 3
5. Node consensus technology . . . . . . . . . . . . . . . . . . 4
6. Threshold signatures . . . . . . . . . . . . . . . . . . . . 5
7. Security Considerations . . . . . . . . . . . . . . . . . . . 5
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 5
10. References . . . . . . . . . . . . . . . . . . . . . . . . . 6
10.1. Normative References . . . . . . . . . . . . . . . . . . 6
10.2. Informative References . . . . . . . . . . . . . . . . . 6
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 6
1. Introduction
Blockchain makes up for the shortcomings of the traditional DM
system. The distributed feature improves the security of the system,
the unlimited expansion feature improves the stability of the DM
system, and the high autonomy feature brings the transparency of DNS
data management. At the same time, the blockchain is the nemesis of
DDoS attacks. Even if a certain node is attacked, other nodes can
still operate normally without causing system breakdown. This draft
is dedicated to building a distributed DM system and upgrading the
traditional centralized DM node to a DM system without a central
node. Using the existing blockchain technology, each node processes
the domain file after reaching a consensus to ensure the uniformity
and effectiveness of the domain file.
2. research status
In recent years, there have been few researches on DNS in foreign
countries, and the main research is in the direction of architecture
and innovating on the architecture. The Russian National Nuclear
Energy Research University proposed the main advantages and
disadvantages of blockchain technology in the process of implementing
a distributed DNS system, as well as the threats posed by blockchain
Yu, et al. Expires 22 December 2022 [Page 2]
Internet-Draft MDM June 2022
. South Korea proposed a method to implement DNS using distributed
ledger technology blockchain, and implement it using an Ethereum-
based platform. In addition, a qualitative analysis and performance
comparison evaluation of the existing domain name registration and
domain name servers are carried out, and the security evaluation of
the proposed system is carried out to improve the security problems
of the existing DNS . The Institute of Electrical and Electronics
Engineers puts forward a new blockchain-based decentralized DNS data
storage method by studying the principles and characteristics of the
blockchain, and implements a DNS decentralized system, establishes
multiple parallel DNS nodes and storage areas The key information of
file parsing data . Georgia State University proposes a system that
can replace the current top DNS system and certification authority,
providing higher scalability, security, and robustness. Based on
distributed hash table, and using the domain name ownership system
based on Bitcoin blockchain.
3. Multi-DM innovation
Multi-DM has the following two innovations: (1) Distributed DM system
This project is dedicated to building a distributed DM system,
upgrading the traditional centralized DM node to a DM system without
a central node. Using the existing blockchain technology, each node
processes the domain file after reaching a consensus to ensure the
uniformity and effectiveness of the domain file. (2) Elastic
contraction and expansion Traditional DM is a single node, which
leads to excessive power of this node. If it is invaded or
collapsed, it will paralyze the entire Internet. The nodes in the DM
can withdraw or join at any time to ensure that the power of each
node is consistent and dilute the power of the original single node.
4. Distributed multi-DM network management system
The distributed multi-DM network management system is the core of the
architecture, and its responsibilities are as follows; (1) Load
initial configuration, including DM static IP list, etc.;
(2) Use the election and heartbeat mechanism of the RAFT algorithm to
elect the primary node, and initiate a heartbeat to other nodes
through the primary node;
(3) Manage the joining and exit of DM. The joining of a new node
requires that all nodes can recognize the node, and the exit needs to
notify each node to delete the corresponding information and the
information stored by itself;
(4) Maintain the update of DM, including the change of node
information in the system, etc.
Yu, et al. Expires 22 December 2022 [Page 3]
Internet-Draft MDM June 2022
Each DM runs on a P2P network, where the P2P network can ensure that
each node can communicate, that is, two DMs can communicate at
random, and the heartbeat mechanism is integrated on the P2P network.
There is an IP list in each DM, which stores the IP information of
all nodes in the system, and subsequent operations on the system are
performed on this list. The addition of a new node means that the IP
information of the new node is added to this list. When the node
exits, the information about this node in this list is deleted. Node
update means that the information of this node in this list is
changed. The DM network management platform system has two states:
(1) Initialization state The initialization state is the process of
establishing the network. Each node loads a static list. After the
loading is completed, the IP of each node is recorded in each DM, and
the primary node is elected. After the primary node election is
completed, the state ends.
(2) Steady state After the election, it enters a stable state, and
the primary node sends a heartbeat detection to the ordinary node to
ensure the normal operation of each node. The joining, exiting and
updating of new nodes are only allowed in a stable state. The
joining of new nodes requires the approval of DMMC. The sign of
joining is that the IP of the new node is added to the IP list of
each node. When a node exits, it needs to completely delete its own
information, while other nodes delete related information (identity
verification information, IP information, etc.) of the node.
5. Node consensus technology
RAFT is a consensus algorithm. The so-called consensus is that
multiple nodes reach a consensus on something, even in the case of
partial node failures, network delays, and network partitions.
Consensus algorithm is the core of blockchain technology, and in
distributed systems, consensus algorithms are more used to improve
the fault tolerance of the system, such as replication in distributed
storage. The two main technical points of RAFT are problem
decomposition and state simplification. Problem decomposition is to
divide the complex problem of "node consistency in replication set"
into several sub-problems that can be independently explained,
understood, and solved. In RAFT, sub-problems include leader
election, log replication, safety, and membership changes. The state
simplification is better understood, which is to make some
restrictions on the algorithm, reduce the number of states that need
to be considered, and make the algorithm clearer and less uncertain.
PBFT provides (n-1)/3 fault tolerance on the premise of guaranteeing
availability and safety (liveness and safety), which means that if
there are n machines in the system, the maximum number of malicious/
faulty nodes that the system can tolerate is (n-1)/3 pieces. (The
Yu, et al. Expires 22 December 2022 [Page 4]
Internet-Draft MDM June 2022
malicious node may not respond or respond with wrong information).
The distributed DM system uses a new algorithm combining RAFT and
PBFT to solve the problem of trust and fault tolerance between nodes.
6. Threshold signatures
Threshold signatures introduce HSM, which is a system that provides a
low-cost and high-security solution for key storage. For sensitive
information such as keys, HSM provides logical and physical
protection to prevent unauthorized access and intrusion. HSM
provides tamper evidence (tamper evidence) and tamper resistance
(tamper evidence) in two ways to prevent tampering. It is used in
threshold signatures and is responsible for generating and storing
the keys used to sign DNS zone files. The management of HSM is
rotated by DMMC, and two HSMs are set up to achieve high availability
of the system. HSM has the following functions:
Security key generation Security key storage and management Encrypt
sensitive information Uninstall symmetric and asymmetric encryption
calculations of the application server
The specific process is as follows: A. Leader node enters the
signing status. B. Leader obtains the secret key from HSM, and
generates the corresponding number of private key shares SKI
according to the number of nodes. C. Leader will distribute the
generated private key share to each node, and the node will reply the
confirmation message after receiving it to ensure the success of
distribution. D. Other nodes use private key shares to sign zone
file data. E. After the node signs, the signed data is sent to the
leader. F. When the Leader splits the private key shares according
to the threshold, and the number is greater than the threshold value
set, the signature is successful. G. Leader node sends the complete
signature file to each node.
Each node uses the private key share to sign, and returns the digest
with the signature to the HSM to form a complete signature, and the
signature file is stored in the Primary node.
7. Security Considerations
8. IANA Considerations
This document does not include an IANA request.
9. Acknowledgements
The authors would like to acknowledge XXX for their valuable review
and comments.
Yu, et al. Expires 22 December 2022 [Page 5]
Internet-Draft MDM June 2022
10. References
10.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
10.2. Informative References
[RFC1035] Mockapetris, P., "Domain names - implementation and
specification", STD 13, RFC 1035, DOI 10.17487/RFC1035,
November 1987, <https://www.rfc-editor.org/info/rfc1035>.
Authors' Addresses
Haisheng Yu
Guangzhou Root Chain International Network Research Institute Co., Ltd.
Xiangjiang International Technology Innovation Center, 41 Jinlong Road, Nansha District, Guangzhou
Guangzhou
China
Email: hsyu@biigroup.cn
Daobiao Gong
Guangzhou Root Chain International Network Research Institute Co., Ltd.
Xiangjiang International Technology Innovation Center, 41 Jinlong Road, Nansha District, Guangzhou
Guangzhou
China
Email: dbgong@biigroup.cn
Yang Song
Guangzhou Root Chain International Network Research Institute Co., Ltd.
Xiangjiang International Technology Innovation Center, 41 Jinlong Road, Nansha District, Guangzhou
Guangzhou
China
Email: ysong@biigroup.cn
Yu, et al. Expires 22 December 2022 [Page 6]
Internet-Draft MDM June 2022
Yan Liu
Guangzhou Root Chain International Network Research Institute Co., Ltd.
Xiangjiang International Technology Innovation Center, 41 Jinlong Road, Nansha District, Guangzhou
Guangzhou
China
Email: yliu@cfiec.net
Yu, et al. Expires 22 December 2022 [Page 7]