Fredrik,
On 19/06/2011 12:22 PM, Fredrik Ljunggren wrote:
On 2011-06-17, at 13:31, Olafur Gudmundsson wrote:
Few nits and questions below:
a) DP and DSP should be included in the Definitions section 2, even though the
abbreviations are are defined in section 1.2
Alternatively spell out in section 3.1. and 3.2 titles what DP and DPS are.
Makes perfect sense. I prefer spelling it out in the section headers to keep
the document from growing even further.
Good
b) The document for all practical purposes is about the process until a zone
has been signed/resigned. There is almost no discussion about the operation of
the signed zone is this intentional or an omission ?
(the exceptions are the key rollover sections 4.5.4+5)
The document is intended to cover all security-related aspects and topics
(including operational) which is impacted by the introduction DNSSEC in a zone.
So in this context, technical operation of the signed zone is covered in the
key-rollover sections (6.4, 6.5), in the signing/re-signing section (6.6) and
the verification of the data to be signed (6.7, 6.8). From a
business-operational perspective, contingency and disaster-recovery planning is
covered in 4.5 and 4.6. For key management life-cycle operations (such as
generation of new keys and possibly also distribution, backup and destruction),
should be covered in sections 5.1 and 5.3.
Are other aspects to operations which you think should be included in the
document? (Or do you think the scope is too narrow?)
I think the document needs to be clearer as to what is NOT covered in a
DSP.
It is fine for the document to say that it only covers: (in section 1.3)
"As to DNS operational aspects of the zone, Normal DNS operation is
outside the scope of this document but best DNS operational practices
are expected".
(as this is a product of the dnsop WG you need to say that or some
readers may have expectations as how to set up name-servers).
Having said that does the document need to spell out how to recover if
the signing infrastructure fails?
c) Section 4.6.9 should not limit itself to TTL's to types it should cover all
types in the zone as the Maximum TTL in the zone impacts how fast keys can be
added/removed from DNSKEY set.
Good point, you are absolutely right. SOA expire and negative caching is also
part of the equation.
d) Section 4.6.8 does not indicate what the purpose of this test is.
I think the purpose is to prevent bad data from showing up in the DNS.
Yes. It currently reads:
This subsection addresses the controls around the verification of the
resource records in order to validate and authenticate the data to be
signed.
Should we clarify in that? Suggestions?
What I want to know is, how does a failure in the signing system, show up?
1) updates to be blocked i.e. zone will stop processing updates.
2) New versions of zone will not show up on schedule
3) bad data will be published but will be replaced as soon as possible?
4) something else.
as this may affect Service level agreements having this spelled out is a
good thing.
f) There needs to be section (4.6.x) for zones that use NSEC3 as to the policy
for changing NSEC3 parameters as this is similar to a ZSK roll-over.
The intention is to have this in 6.2. But I see that there are no mentions of
policy for changing of NSEC3-parameters in 4.6.2 of the draft. I'm thinking of
adding a sentence to the text in 4.6.2 instead of creating a new subsection?
That is fine,
Questions:
c) should the DPS have a section describing if/when/how a zone (i.e. the one
covered by the DPS) goes to unsigned?
There has been discussions about this among the authors, but so far we've
agreed on that such procedure is a DR-procedure and may be described in 4.5.
I agree this frequently is a Disaster Recovery, but this may also be a
policy decision.
In particular for a tld. having DS removed is estimated to take 2 days,
flushing the DS takes another day, DNSKEY may still trusted by resolvers
for the DNSKEY TTL.
Thus in the case of loss of zone signing the DS must be removed 3 days +
DNSKEY TTL before the first signature in the zone expires.
If the zone is going to bring up a new signing system (with new keys) is
the zone going be dual signed until old keys are flushed from the system.
d) Should the DPS have a section describing the zone's policy as how to perform
an algorithm rollover ?
what I'm in particular looking for is in particular how long the zone expects
to be signed by both algorithms.
I'm thinking that whatever forces a zone to change the algorithm is an
unexpected event which has many dependencies to unknown factors (such as
resolver implementations, new algorithms .. ), which is really hard to plan
ahead for in such detail.
Still does not cover if/how long the zone is going to be dual signed.
As to the planning for algorithm rollover.
The DSP may say
"before any algorithm rollover a new DSP will be published x months
before the event"
or "in case of introduction of new algorithm in the zone the zone will
be dual signed for x days"
or "zone will NEVER roll algorithm only go to longer keys"
or "zone will change from NSEC3 to NSEC 6 months after x% of the zone
has DS records"
Algorithm rollover is the scariest part of DNSSEC operation,
Although, the emergency case (where a algorithm has been fundamentally broken)
should be covered in 4.5.3 (Entity private key compromise procedures).
I think there are two different cases, that need to be covered, key
compromised and algorithm compromised.
The first one is important the second one is not a big deal as
DNSSEC is only one of many security systems that will be affected and
slow and deliberate process in this case is better for everyone than
quick over-reaction.
Thus the document should focus on the first case, by recommending that
the zone publish a time-line for algorithm rollover and include a
policy as how long the zone is going to be dual-signed.
Olafur
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop