In message <55e63378.3010...@mirix.org>, Matthias-Christian Ott writes:
> Since 6renum is concluded I thought this WG could most likely help to
> address the following problem:
> 
> If the IPv6 network of an authoritative nameserver is renumbered and the
> parent zones of zones that are served by the nameserver contain glue
> records for the nameserver, the glue records need to be changed as well.
> As described in RFC 7010, the nameserver could update the glue records
> through Secure Dynamic DNS Updates and the nameserver of the parent zone
> could restrict dynamic DNS updates to the AAAA RRs for the name of the
> nameserver through ACLs (principle of least privilege). So in theory the
> problem the problem is solved.
> 
> In practice subdomains registered under public suffixes do not allow
> dynamic DNS updates. Glue records and NS records can only be changed
> through EPP or proprietary protocols of the respective registries and in
> some cases only through fax or letter. Most registrars expose their
> interface to the registry, including glue record management, directly to
> registrants either through a self-service web interface that can be
> scraped, EPP or some proprietary protocol and only few require
> interaction with their customer support. So it is still possible to
> automatically update the glue records of a nameserver when its network
> is renumbered. However, there is no fine-grained access control - even
> if you interface directly with the registry. That means that you have to
> store the credentials that can be used to change all details of your
> domain in the registry on every nameserver if you want that nameserver
> to be able automatically update its glue records. If your domain uses
> DNSSEC with separate KSK and ZSK, it suffices to compromise a secondary
> nameserver to replace the KSK which undermines the security model.
> 
> After some thinking the only countermeasure that I could come up with is
> to either to have a trusted gateway to the registrar/registry that you
> assume to be secure and highly-available or monitor the registry for key
> changes and have an emergency plan to limit the damage. Both
> countermeasures seem unsatisfactory to me.
> 
> Obviously registries and registrars could introduce more fine-grained
> access control but I doubt that this is going to happen, especially
> considering the interfaces provided by registrars.
> 
> Has this problem been addressed somewhere or is there an ongoing effort
> that would address it?

https://datatracker.ietf.org/doc/draft-andrews-dnsop-update-parent-zones/

Provided a mechanism to do this which allowed fine grain access control
base on tsig / sig(0) name.

It could also use SIG(0) instead of TSIG though the draft doesn't state
that.

> - Matthias-Christian
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to