In message <44c21cd9ee514b039eafeafa707a2...@local>, "George Barwood" writes: > > ----- Original Message ----- > From: "Patrik Wallstrom" <pa...@blipp.com> > To: "George Barwood" <george.barw...@blueyonder.co.uk> > Cc: <dnsop@ietf.org> > Sent: Thursday, May 13, 2010 9:06 AM > Subject: Re: [DNSOP] KSK rollover > > > > >On May 13, 2010, at 9:56 AM, George Barwood wrote: > > >> I have been thinking about KSK rollover in my DNSSEC implementation, and i > t seems > > that there is currently no specification for KSK rollover within the DNSSE > C protocol. > >> > >> There is this expired requirements draft > >> > >> http://tools.ietf.org/wg/dnsop/draft-ietf-dnsop-key-rollover-requirements/ > >> > >> but that's all I found. > >> > >> Have I missed something? It seems to me that this is a rather vital compon > ent if > >> DNSSEC is to be widely deployed. > >> > >> Are there any plans to revive and/or implement these requirements? > > > You probably want to read the Key Timing Considerations draft: > > http://tools.ietf.org/html/draft-morris-dnsop-dnssec-key-timing-02 > > That is certainly relevant to rollover, but it doesn't specify any means by > which the new DS records can be placed in the parent zone. > > http://tools.ietf.org/html/rfc5011 "Automated Updates of DNS Security > (DNSSEC) Trust Anchors" > > has some relevance, but doesn't provide for parent notification, or for > publishing a DS record *before* the key is published in the zone, which > is I think desirable.
RFC5011 really isn't applicable to this case. > The mechanism that occurs to me is to have a new RRtype, say "CDS", with > identical format to the DS record, but placed in the child zone ( and > signed by the child zone). The parent, at regular intervals, or on > receiving a notification from the child, would retrieve the contents of > the CDS RRset, and use it as the new DS RRset ( of course after validating > it using the old DS RRset ). There are lots of way to do this. * Use UPDATE to update the delegation records in the parent. This would work today it only requires a willingness to do so. This can be done securely (TSIG) and will scale. UPDATE was designed to support this. * Try to guess which keys should have DS's based on SEP bits. * Use a different RR type (DLV does this). poll/notify to incorporate. (Ed the daily delegation check could do this. :-)) * Use some epp extension. * Use a modified UPDATE which accepts and forwards to the registrar for inclusion in the zone rather than immediately updates the zone. When a registrar is not involved it is handled as a plain UPDATE. * .... > There probably needs to be consideration of how the system can recover after > a KSK is compromised, maybe there should be some minimum time interval > before a new DS record is fully trusted. I have not thought that through. > > Well, that's just my immediate thoughts, there may be a better way. > > I'm somewhat puzzled that thre is no specification, and apparently no > activity on this. There is plenty of activity. Most of it has been people looking at how to fit this into the registry/registrar model and worries about patent infringement that are claimed to have been filed for some of the above. I doubt that any thing we do in this area is truly novel but the USPO grants patents on such trivial things that its become a issue. Mark > KSK rollover is probably a fairly rare event (maybe once every few years), so > possibly the feeling is that manual procedures will be sufficient. I think a > standardized, automated in-protocol mechanism would be advisable though. > Maybe I'm wrong. > > Best regards, > George -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop