On 2011-06-20, at 08:20, Olafur Gudmundsson wrote:

>> Are other aspects to operations which you think should be included in the 
>> document? (Or do you think the scope is too narrow?)
>> 
> 
> I think the document needs to be clearer as to what is NOT covered in a DSP.
> 
> It is fine for the document to say that it only covers: (in section 1.3)
> "As to DNS operational aspects of the zone, Normal DNS operation is outside 
> the scope of this document but best DNS operational practices are expected".
> (as this is a product of the dnsop WG you need to say that or some readers 
> may have expectations as how to set up name-servers).
> 
> Having said that does the document need to spell out how to recover if the 
> signing infrastructure fails?

I'm fine with clarifying the scope. Although, I strongly believe we should try 
real hard to not give recommendations as how to run a zone in the DPS framework 
document:

1.2.  Purpose

   The purpose of this document is twofold.  Firstly, the document aims
   to explain the concept of a DNSSEC Policy (DP) and a DNSSEC Practice
   Statement (DPS), and describe the relationship between a DP and a
   DPS.  Second, this document aims to present a framework to encourage
   and assist writers of Policies and Practice Statements in creating
   heterogenous and comparable documents.  In particular, the framework
   identifies the elements that should be considered in formulating a
   DP/DPS.  It does not, however, define a particular Policy or Practice
   Statement, not does it seek to provide legal advice or
   recommendations as to the contents.

>> Yes. It currently reads:
>> 
>>    This subsection addresses the controls around the verification of the
>>    resource records in order to validate and authenticate the data to be
>>    signed.
>> 
>> Should we clarify in that? Suggestions?
> 
> What I want to know is, how does a failure in the signing system, show up?
> 1) updates to be blocked i.e. zone will stop processing updates.
> 2) New versions of zone will not show up on schedule
> 3) bad data will be published but will be replaced as soon as possible?
> 4) something else.
> 
> as this may affect Service level agreements having this spelled out is a good 
> thing.

Doesn't this belong in section 4.5.2 (Corrupted computing resources, software, 
and/or data) of a DPS - described in section 4.4.5 in the framework document?

>>> Questions:
>>> 
>>> c)  should the DPS have a section describing if/when/how a zone (i.e. the 
>>> one covered by the DPS) goes to unsigned?
>> 
>> There has been discussions about this among the authors, but so far we've 
>> agreed on that such procedure is a DR-procedure and may be described in 4.5.
> 
> I agree this frequently is a Disaster Recovery, but this may also be a policy 
> decision.
> In particular for a tld. having DS removed is estimated to take 2 days, 
> flushing the DS takes another day, DNSKEY may still trusted by resolvers for 
> the DNSKEY TTL.
> Thus in the case of loss of zone signing the DS must be removed 3 days + 
> DNSKEY TTL before the first signature in the zone expires.
> 
> If the zone is going to bring up a new signing system (with new keys) is the 
> zone going be dual signed until old keys are flushed from the system.

The intention is that this is to be covered in the same sections as mentioned 
above (4.4.5 in the framework document). That is where a TLD (or other zone 
operator) would spell out the policy for recovering from a lost or compromised 
key.


>>> d) Should the DPS have a section describing the zone's policy as how to 
>>> perform an algorithm rollover ?
>>> what I'm in particular looking for is in particular how long the zone 
>>> expects to be signed by both algorithms.
>> 
>> I'm thinking that whatever forces a zone to change the algorithm is an 
>> unexpected event which has many dependencies to unknown factors (such as 
>> resolver implementations, new algorithms .. ), which is really hard to plan 
>> ahead for in such detail.
> 
> Still does not cover if/how long the zone is going to be dual signed.
> 
> As to the planning for algorithm rollover.
> 
> The DSP may say
>    "before any algorithm rollover a new DSP will be published x months before 
> the event"
> or   "in case of introduction of new algorithm in the zone the zone will be 
> dual signed for x days"
> or   "zone will NEVER roll algorithm only go to longer keys"
> or   "zone will change from NSEC3 to NSEC 6 months after x% of the zone has 
> DS records"
> 
> Algorithm rollover is the scariest part of DNSSEC operation,

Ok, I see what you mean. Good point. I'm thinking maybe clarifying on this 
under "Key lengths and algorithms" (and possibly also under "Authenticated 
denial of existence"), or do you think we should create a new subsection for it?


>> Although, the emergency case (where a algorithm has been fundamentally 
>> broken) should be covered in 4.5.3 (Entity private key compromise 
>> procedures).
> 
> I think there are two different cases, that need to be covered, key 
> compromised and algorithm compromised.
> 
> The first one is important the second one is not a big deal as
> DNSSEC is only one of many security systems that will be affected and slow 
> and deliberate process in this case is better for everyone than quick 
> over-reaction.
> 
> Thus the document should focus on the first case, by recommending that the 
> zone publish a time-line for algorithm rollover and include a policy as how 
> long the zone is going to be dual-signed.

Agreed. Although I think it may be worth mentioning the case of algorithm 
compromise under "Entity private key compromise procedures". Planning for that 
case may reduce the risk of quick over-reaction.

- f

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to