On Jun 17, 2010, at 11:15 PM, Olafur Gudmundsson wrote:

> 
> Currently section 3 of the document "mandates" that all zones be signed using 
> the KSK+ZSK model, I content this is outdated advice.

Version 02 of the draft offers the choice. And in fact it starts of by saying 
(in 3.1 second paragraph) that if you do not split KSK and ZSK functionality 
you should set the SEP flag on all keys in your keyset, thereby making the 
choice rather explicit up front.

I agree the document tends to give more arguments for than against a splitting 
KSK and ZSK functionality and that the final sentence of 3.1.1 is rather 
explicit in its advice. But mandate? 


Anyhow... some comments below...


> 
> Background #1: Why bring this up now
> While reviewing draft-ietf-dnsop-dnssec-dps-framework I found myself loving 
> certain sections of the document and hating other sections.
> Before sending out a nasty review, I read the document over again and 
> realized that the sections I hated were all derived from the recommendations 
> in RFC4641, thus I'm starting few threads to talk about
> the major issues I have with this document.
> 
> Background #2: History of KSK+ZSK split
> I have been working on DNSSEC for a long time and during that time I have 
> changed my mind on what is "good" a few times. The split key KSK+ZSK idea is 
> good in certain environments but not in all.
> The original DNSSEC specifications did not have this split.
> The split was introduced after people realized that there might be breaks in 
> the trust chain, or parents might be hard to update.
> The split is introduced by the DS draft (May 2001) and
> SEP flag draft (Sept 2002).
> The point of the SEP flag was to be able to pick out which DNSKEY(s) is 
> supposed be configured as a DS in parent or a Trust Anchor.
> RFC5011 trust anchor maintainer should use the SEP flag while tracking
> changes.


I believe the SEP flag to be orthogonal to the choice of splitting the 
functionality. The SEP flag should be used to indicate that the key is intended 
as the "Secure Entry Point" into the zone. Section 3.1 of version 02 is rather 
explicit about this by saying that if you do not separate the functionality 
between KSK and ZSK you should always set the SEP flag.

Lets treat KSK and ZSK separation independent of the SEP flag.

Also, during editing I coiled the term "Common Signing Key" when the 
distinction between KSK and ZSK is not made.

> 
> Background #3: Key strengths and life time
> RSA and DSA algorithms have the interesting property that the number of bits 
> in the key can be selected, by adding bits to the key the key gets stronger. 
> Stronger keys can be used longer. The idea for KSK's was that the KSK would 
> sign the DNSKEY rrset, be stronger than the ZSK and would live longer than 
> the ZSK ===> reducing the load on parent in changing keys.
> But not all key algorithms have this variable key length property, for 
> example ECC-GOST has fixed length, thus the stronger KSK argument does not 
> apply.
> 

Agreed.

I modified the text in the document (see below) slightly to highlight that 
key-size differences are a weak argument for KSK-ZSK separation:

        Finally there is a risk of cryptanalysis of the key material.
        The cost of such analysis are correlated to the length of the
        key. However, cryptanalysis arguments provide no strong
        motivation for a KSK/ZSK split based on packet size
        considerations: If one differentiates between a KSK and a ZSK,
        requires that the resistance against crypto analysis is the
        same, and the amount of ZSKs rollovers during a KSK
        Effectivity (see <xref target="key_lifetime"/>) period is in
        the order 10s to 100s than the differences key sizes of the
        KSK and ZSK roughly are small enough not to significantly
        affect signing times or DNS packet length..

Not sure if this parses, feedback would be appreciated.


> Background #4: Difficulty in updating parents
> From a child zone perspective a parent can have one of the following 
> behaviors:
>       - unsigned
>       - signed but refusing accepting DS[1]
>       - signed but slower in updating than the child desires[2]
>       - signed and easy to update.
> 
> [1] This can be either either parent policy or a deficiency by an
> intermediary such as the child's registrar.
> 
> [2] This can apply when update takes a while to show up in DNS
> or when the parent has LARGE TTL on the DS record thus it takes a long
> time for the old DS set to expire from caches.
> 
> In the first two cases having KSK+ZSK split may make sense.
> In the last case there is limited/no DNS operational need
> for split key operation.
> The third case is hopefully rare, and can be recommended out of existence.
> 

I think you are missing something here. A key may be configured as a 
trust-anchor. In which case a 3rd party interaction is needed. One that is even 
more difficult to control than the parental interaction. This is (IMHO) not 
academic: In enterprise environments it may be a requirement to have 
trust-anchor for ones own organization in order to not be dependent on external 
parties (at least to some extend).

Also, a rollover of a KSK will involve a state-change from a 3rd party; no 
matter how easy the update is. From a child perspective you have to wait for 
that state change to appear. The speed of signing and updating is not that 
relevant but predictability of the behavior is. I have a text proposal in the 
last paragraph of section 3.1.1 (see below)


> 
> Background #5: Signature size, signing time, DNSKEY set size.
> Strong KSK has larger signature and each signature takes longer to
> generate. But for small zone time difference is in the noise range and
> has to balanced against operational complexity.
> Having different keys in different roles makes the DNSKEY set larger.
> If a zone is small signing with 1536 bit RSA key vs 1024 makes
> practically no difference in either zone size or signing time,
> on modern hardware we are still talking about sub-second operation.



See #3



> 
> 
> Background #6: KSK can be protected better than ZSK as it is used less.
> But if the KSK and ZSK are stored together this is a bogus argument.
> 

In version 2 of the document that was already addressed by "While the arguments 
for differentiation... when the exposure to risk is low"


> 
> Background #7: Root/com will never be signed.
> During the early years of DNSSEC development and deployment there was
> uncertainty if the root zone would ever get signed. In this case there
> was seen need to have "stable" trust anchors for TLD's. Similar
> arguments were made that the com zone would never be signed.
> Well yesterday the root KSK was generated, com is planning to roll out
> DNSSEC early next year, the number of TLD's planning DNSSEC roll-out
> seems to be increasing.
> 
> For these reasons there is hope that we can migrate to a model were we
> assume that the upper parts of the DNS tree are signed. This
> reduces the need for "trust anchors of Islands of trust".


I am not sure if 'trust anchors of Islands of trust' have no operational needs. 
See my remark at #4. 


> The next pressure point will become the registrars.
> 
> Background #8: KISS
> It is much easier to explain to people how to do DNSSEC with a
> single key.
> When each key has a different role there is more of an opportunity for
> mistakes and confusion. We saw this recently with .arpa KSK signatures
> did not get updated, but signatures by ZKS were refreshed.
> 
> This goes to the core of the issue: If KSK is handled differently from
> the ZSK that increases possibility of mistakes/errors. Not all
> DNS operators are as sophisticated as Verisign (arpa DNS operator) who are 
> not likely to repeat the mistake.

I feel a lot for this argument. I would like to make the choice for single type 
keys much more explicit while documenting all considerations and I hope that is 
achieved by the text below.

I will try to give some guidance on what pieces are irrelevant when the choice 
for a single type is made. In other words the text below is a current snapshot 
and subject to change over the next few days (and subject to working group 
consensus, off course)

(...)

Anyway... here is a strawman for section 3.1.1 that will probably end up in 
version 3 of the draft. (I hope to udate the draft before the deadline and I 
understand that this will all be subject to change based on WG consensus.)

Also see 
http://tools.ietf.org//rfcdiff?url1=http://tools.ietf.org/id/draft-ietf-dnsop-rfc4641bis-02.txt&url2=http://www.secret-wg.org/draft-ietf-dnsop-rfc4641bis.txt
for the diffs introduced by these edits.

and http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/KSK-ZSK-Split for 
a record of this 
issue.


---


3.1.1.  Motivations for the KSK and ZSK Separation

   Differentiating between the KSK and ZSK is mostly done for
   operational purposes.

   If the two functions are separated then, for almost any method of key
   management and zone signing, the KSK is used less frequently then the
   ZSK.  Once a key set is signed with the KSK, all the keys in the key
   set can be used as ZSKs.  If there has been an event that increases
   the risk that a ZSK is compromised it can be simply dropped from the
   key set.  The new key set is then re-signed with the KSK.

   Changing a key with secure entry point functionality (a SEP key) is
   relatively expensive as it involves interaction with 3rd parties:
   When a key is only pointed to by the parental DS one needs to



Kolkman & Gieben         Expires August 30, 2010                [Page 7]


Internet-Draft   DNSSEC Operational Practices, Version 2   February 2010


   complete the interaction with the parental registry and wait for the
   transaction to appear in the DNS.  In the case that a SEP key that is
   in use as a trust-anchor one has to wait until one has sufficient
   confidence that all trust anchors have been replaced.  In fact, it
   may be that one is not able to reach the complete user-base with
   information about the key rollover.

   There is also a risk that keys are compromised through theft or loss.
   For keys that are needed to sign dynamically updated records and are
   therefore installed on file-systems of nameservers that are connected
   to the network that risk is relatively high.  For keys that are
   stored on Hardware Signing Modules such risk is relatively low.  By
   separating the KSK and ZSK functionality these risks can be managed
   while making the tradeoff against the costs involved.  For example, a
   KSK can be stored off-line or with more limitation on access control
   than ZSKs which need to be readily available for operational purposes
   such as the addition or deletion of zone data.  More concretely a KSK
   stored on a smartcard, that is kept in a safe, combinded with a ZSK
   stored on a filesystem accessible by operators for daily routine may
   provide more operational flexibility and higher computational
   performance than a single key (with combined KSK and ZSK
   functionality) stored on an HSM.

   Finally there is a risk of cryptanalysis of the key material.  The
   cost of such analysis are correlated to the length of the key.
   However, cryptanalysis arguments provide no strong motivation for a
   KSK/ZSK split based on packet size considerations: If one
   differentiates between a KSK and a ZSK, requires that the resistance
   against crypto analysis is the same, and the amount of ZSKs rollovers
   during a KSK Effectivity (see Section 3.1.3) period is in the order
   10s to 100s than the differences key sizes of the KSK and ZSK roughly
   are small enough not to significantly affect signing times or DNS
   packet length..

   The arguments for differentiation between the ZSK and KSK are weakest
   when:

      the exposure to risk is low (e.g. when keys are stored on HSMs);

      if one can be certain that a key is not used as a trust-anchor;
      and

      the interaction -- in particular the appearance of a new DS record
      in the parent zone -- is predictable.

   If the above hold then the costs of the operational complexity of a
   KSK-ZSK split may outweigh the costs of operational flexibility and
   not separating zone and key signing functionality is then a



Kolkman & Gieben         Expires August 30, 2010                [Page 8]


Internet-Draft   DNSSEC Operational Practices, Version 2   February 2010


   reasonable option.  In other cases we advise that the separation
   between KSKs and ZSKs is made and that the SEP flag is exclusively
   set on KSKs.




________________________________________________________ 

Olaf M. Kolkman                        NLnet Labs
                                       Science Park 140, 
http://www.nlnetlabs.nl/               1098 XG Amsterdam

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to