-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi,
I agree that the Double-DS approach is more practicable than the current rollover for cooperating operators. This is mentioned very briefly in the -06 version (last paragraph 4.3.5.1). However, we do want to provide an alternative for registries and registrars that does not allow a Double-DS rollover scheme. I do want to describe the cons of the current approach in more detail (the ones you have mentioned in your mail). If it is necessary to add the corresponding figure, it should then probably go into an appendix. Proposed text (to replace the last paragraph in 4.3.5.1): The requirement to exchange signatures has a couple of drawbacks. It requires more operational overhead, because not only the operators have to exchange public keys, they also have to exchange the signatures of the new DNSKEY RRset. Also, it disallows the children to refresh the signatures when they expire for a certain period. Both drawbacks do not exist if you replace the Double Signature KSK rollover with a Double-DS KSK rollover. Thus, if the registry and registrars allow for DS records to be published, that do not point to a published DNSKEY in the child zone, the Double-DS KSK rollover is preferred (also known as Pre- Publication KSK Rollover, see Figure 5), in combination with the Pre- Publish ZSK rollover. This does not require to share the KSK signatures between the operators. Both the losing and the gaining operator still need to publish the public ZSK of each other. Best regards, Matthijs On 04/20/2011 01:43 PM, Antoin Verschuren wrote: > On 20-04-11 11:58, Matthijs Mekking wrote: >> Hi Antoin, > >> It is assumed that in the cooperating case, both operators allow >> publishing of the signatures. > >> So they don't create the signature themselves, they merely copy the >> signature and publish it in their version of the zone. > > Ok, so that's a second option I hadn't thought about, because it is > impractical in practice. I guess in theory this will work, but only if > the zone, DNSKEYset and RRSIGs are static for the complete rollover period. > > In the case I have seen and discussed so far, only the public keys were > exchanged, and not the signatures. Exchanging signatures takes again > another step in the process, as a new signature can only be created > after recieving the new keys. And it only works if the signatures have > an expire that is longer than the transfer process. > > When you use the Doule-DS rollover, child A only needs to recieve B's > new public keys, and signs it only with KSK_A. child B has allready > queried A's public keys and has allready signed the DNSKEY set with only > KSK_B. > For the Double-DS method, that is sufficiant. > > I guess you can now also have child A copy RRSIG_K_B(DNSKEY) and child B > copy RRSIG_K_A(DNSKEY), but this is another step in the process that > consumes propagation time and extra interaction. It also disallows the > childs to refresh the signatures when they expire, unless they have yet > another interaction. > > This was the scheme I had in mind with Double-DS and cooperating DNS > providers: > > ------------------------------------------------------------ > initial | Double DS | > ------------------------------------------------------------ > Parent: > NS_A NS_A > DS_A DS_A > DS_B > ------------------------------------------------------------ > Child at A: Child at A: Child at B: > SOA_A0 SOA_A1 SOA_B0 > RRSIG_Z_A(SOA) RRSIG_Z_A(SOA) RRSIG_Z_B(SOA) > > NS_A NS_A NS_B > RRSIG_Z_A(NS) RRSIG_Z_A(NS) RRSIG_Z_B(NS) > > > DNSKEY_Z_A DNSKEY_Z_A DNSKEY_Z_A > DNSKEY_K_A DNSKEY_Z_B DNSKEY_Z_B > RRSIG_K_A(DNSKEY) DNSKEY_K_A DNSKEY_K_A > DNSKEY_K_B DNSKEY_K_B > RRSIG_K_A(DNSKEY) RRSIG_K_B(DNSKEY) > ------------------------------------------------------------ > > ------------------------------------------------------------ > Redelegation | post migration | > ------------------------------------------------------------ > Parent: > NS_B NS_B > DS_A DS_B > DS_B > ------------------------------------------------------------ > Child at A: Child at B: Child at B: > > SOA_A2 SOA_B1 SOA_B2 > RRSIG_Z_A(SOA) RRSIG_Z_B(SOA) RRSIG_Z_B(SOA) > > NS_B NS_B NS_B > RRSIG_Z_A(NS) RRSIG_Z_B(NS) RRSIG_Z_B(NS) > > > DNSKEY_Z_A DNSKEY_Z_A DNSKEY_Z_B > DNSKEY_Z_B DNSKEY_Z_B DNSKEY_K_B > DNSKEY_K_A DNSKEY_K_A RRSIG_K_B(DNSKEY) > DNSKEY_K_B DNSKEY_K_B > RRSIG_K_A(DNSKEY) RRSIG_K_B(DNSKEY) > > > ------------------------------------------------------------ > > There is less data to exchange. > > _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEcBAEBAgAGBQJNrtIpAAoJEA8yVCPsQCW53+EIALPXM+p5pHPyc3ZmEXvbwMJz YEUanA6RJioVDrM2UCtu6c5MToYTBI4tLUbTzNJy7ngR36MG55GkHnasIHKA3Jxw K8ETro5Y1FZsxRS4q5FWXCVNBcd62/W0b2oI3LwZZ3d25oH+1QWfothzmmQMgkSH QFRd5iJXbL3iiNEaC+VG322eNNn65LUwtu32mMwnng0Gj64GV8dKjCk+84ct2EIK aQQvNHEf2bgrxtyS+7KYP2HiVaInb/EU6d+JzsVwIdUHuJgEi8OU/9zBEFbBZJPf DDd0hE2TLZbyup7Fcy9v3vbmDaqYt0OhilIoTK2JWG9IMrDNsP59Z8bgFPvkh3c= =ukah -----END PGP SIGNATURE----- _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop