-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

Stephen asked me to send this suggestion we had (surfaced from
discussions) to the list. We would like to have input before the
upcoming IETF meeting.

Modification to the key states
==============================

As you might know, I had this idea of unraveling key states. Instead
of having states that describe the overall state of the key, we would
have states for components of the key. How to divide the key into
components is based on the parts that can be published:

- - DNSKEY
- - DS
- - RRSIG
- - RRSIG DNSKEY

We can call this the representation of the key (which components are
visible in the zone and/or caches). The RRSIG for zone contents and
for the DNSKEY RRset need specifically be split to support a Single
Type Singing Key in a later stadium.

Each component follows a certain publication path. Initially it is
Hidden, it will be Introduced into the zone, it is long enough in the
zone to be Propagated to all caches, it will be Withdrawn from the
zone and it will become Hidden again (as it has expired from caches):

    Hidden --> Introduced --> Propagated --> Withdrawn --> Hidden.

(Note: a component could be removed from the zone before it was
propagated, so a transition between Introduced and Withdrawn. The
other way around is also true: A record can be reintroduced before it
had expired from all the caches. The idea is to consider full
rollovers only, so these transitions will be out of scope.)

The overall key states from draft-ietf-dnsop-dnssec-key-timing-03.txt
map (but not one-to-one) to the unraveled key states:

For example, for ZSK Rollovers:

Generated -> (DNSKEY Hidden, RRSIG Hidden)
Published -> (DNSKEY Published, RRSIG Hidden) [Pre-publish]
          -> (DNSKEY Hidden, RRSIG Published)  [Double-RRSIG]
Ready     -> (DNSKEY Propagated, RRSIG Hidden) [Pre-publish]
          -> (DNSKEY Hidden, RRSIG Propagated) [Double-RRSIG]
Active    -> (DNSKEY Propagated, RRSIG Introduced) [Pre-publish]
          -> (DNSKEY Introduced, RRSIG Propagated) [Double-RRSIG]
          -> (DNSKEY Introduced, RRSIG Introduced) [Double-Signature]
Retired   -> (DNSKEY Propagated, RRSIG Withdrawn) [Pre-publish]
          -> (DNSKEY Withdrawn, RRSIG Propagated)  [Double-RRSIG]
          -> (DNSKEY Propagated, RRSIG Propagated) [Double-Signature]
Dead      -> (DNSKEY Propagated, RRSIG Hidden) [Pre-publish]
          -> (DNSKEY Hidden, RRSIG Propagated) [Double-RRSIG]
          -> (DNSKEY Propagated, RRSIG Propagated) [Double-Signature]
Removed   -> (DNSKEY Withdrawn, RRSIG Hidden) [Pre-Publish]
          -> (DNSKEY Hidden, RRSIG Withdrawn) [Double-RRSIG]
          -> (DNSKEY Withdrawn, RRSIG Withdrawn) [Double-Signature]

(I leave the KSK rollovers as an exercise to the reader ;-) )

So you see, the key states as they are now do not map uniquely to how
the key is presented in the zone. I want to propose that either the
document uses the unraveled key states, or otherwise defines a unique
mapping between the overall key states and the representation of the key.

Also, we should not limit to one key state at a time. For example, a
key can be Published and Active at the same time in my opinion.

- From -03:

Published      The DNSKEY record - or information associated with it -
               is published in the zone, but predecessors of the key (or
               associated information) may be held in caches.

Active         The key has started to be used to sign RRsets.  Note that
               when this state is entered, it may not be possible for
               validating resolvers to use the key for validation in all
               cases: the zone signing may not have finished, or the
               data might not have reached the resolver because of
               propagation delays and/or caching issues.  If this is the
               case, the resolver will have to rely on the key's
               predecessor instead.

But both descriptions may be valid at the same point in time. So I
would like to say the key can be Published and Active at the same time.

Finally, I would like to drop "associated information". To keep a
clear definition, a key state should only say something about one key
component. So, the definition for Published would become:

Published      The DNSKEY record is published in the zone, but
               predecessors of the key (or associated information) may
               be held in caches.

or even more simpler:

Published      The DNSKEY record is published in the zone.

So, you would get more states, but with simpler descriptions.


To summarize:

1. Use unraveled key states or define a unique mapping between the
overall key states and the representation of the key.

2. A key can have more than one state at a time.

3. Drop "associated information", a key state only says something
about one key component.


Thoughts?

Best regards,
  Matthijs


On 07/09/2012 07:13 PM, Stephen Morris wrote:
> After much delay, the -03 version of the key timing draft has been 
> submitted.  It incorporates a number of comments made on-list and 
> privately: many thanks to Mark Lampo, Matthijs Mekking and Alfred 
> Hoenes.
> 
> Perhaps the most significant change concerns the timing
> considerations related to the introduction of a new KSK (section
> 3.3.4.1).
> 
> Stephen
> 
> 
> On 9 Jul 2012, at 17:29, internet-dra...@ietf.org wrote:
> 
>> A New Internet-Draft is available from the on-line
>> Internet-Drafts directories. This draft is a work item of the
>> Domain Name System Operations Working Group of the IETF.
>> 
>> Title           : DNSSEC Key Timing Considerations Author(s)
>> : Stephen Morris Johan Ihren John Dickinson Filename        :
>> draft-ietf-dnsop-dnssec-key-timing-03.txt Pages           : 33 
>> Date            : 2012-07-09
>> 
>> Abstract: This document describes the issues surrounding the
>> timing of events in the rolling of a key in a DNSSEC-secured
>> zone.  It presents timelines for the key rollover and explicitly
>> identifies the relationships between the various parameters
>> affecting the process.
>> 
>> 
>> The IETF datatracker status page for this draft is: 
>> https://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-key-timing
>>
>>
>> 
There's also a htmlized version available at:
>> http://tools.ietf.org/html/draft-ietf-dnsop-dnssec-key-timing-03
>> 
>> A diff from previous version is available at: 
>> http://tools.ietf.org/rfcdiff?url2=draft-ietf-dnsop-dnssec-key-timing-03
>>
>>
>>
>> 
Internet-Drafts are also available by anonymous FTP at:
>> ftp://ftp.ietf.org/internet-drafts/
>> 
>> _______________________________________________ DNSOP mailing
>> list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop
> 
> _______________________________________________ DNSOP mailing list 
> DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJQDoysAAoJEA8yVCPsQCW5AaYH/iFlHzxxMaUUsds5kW5M2y6J
UANul10z65dWe0Sng335KmalieBFEuaFBugSo0IONazf6Qj8OWQ8OGHCbGKTDqI2
KOIC5z38AAD/BI82ahYUwVMr5u2aQXKFpjQc1yhH6ujvxspa0MWC+Uzzce5vSoQG
I+ubviuWI2Oen4qN8X/FPf3JmagAzlBy87hf+qX6a2E649eXuQPWocfyyQqGXGWZ
jjtkJ8cOp0BPLwf6OQ3HLYIlx6a/ucEsYaGJrzpDQvMjUj8c+nDngg9yoLqp+bxZ
Stp2PpE83gSqRNeDUJRRrP8CtZvtCl4AH48iHa2z5V5OwZ8bxjWGavHWUPSt0fw=
=XiNc
-----END PGP SIGNATURE-----
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to