Hi Scott,

Thanks for the response. I have another question in that case. Please see
below.


On Thu, Aug 3, 2017 at 6:17 PM, Rose, Scott <scott.r...@nist.gov> wrote:

> Hi,
>
> (800-81 author here)
>
> That needs to be updated as it was from the earlier revision of 800-81. It
> really should stress the use of RFC 5011 automated trust anchor update
> process. The first version of the doc assumed RFC 5011 was not available in
> the majority of implementations, which is not the case now. I’d probably
> update that to recommend (and stress) to always use the RFC 5011 rollover
> process.
>
> As for emergency rollovers, some admins do worry about it and plan for it
> by having a pre-published KSK in the DNSKEY RRset at all times (not just
> during an actual rollover process). RFC 5011 can be used there too (see the
> “Scenarios” section in RFC 5011).
>
A DNSKEY RRset with pre-published KSK is signed by the old (now
compromised) KSK. When the resolver uses RFC 5011 for the trust anchor
update, the attacker can inject a new KSK (signed by the compromised KSK).
Which KSK is now the new T*rust Anchor  *for the resolver?


> There isn’t a single doc that focuses on KSK rollovers, but it is
> discussed in the BCP docs like RFC 6781 and other implementation-specific
> documents.
>
> Scott
>
> On 3 Aug 2017, at 11:50, Aanchal Malhotra wrote:
>
> Dear all,
>
> May be this has been discussed long ago on the list or elsewhere. Please
> guide me to proper pointers, if any.
>
> Section 11.2.1 in [1]
> <http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81-2.pdf>
> states the following for KSK rollover for *locally secure zones*:
>
> "*In rolling over the KSK, the secure zone may not know which resolvers
> have stored the public key as a trust anchor. If the network administrator
> has an out-of-band method of contacting resolver administrators that have
> stored the public key as a trust anchor (such as e-mail), the network
> administrator should send out appropriate warnings and set up a trusted
> means of disseminating the new trust anchor. Otherwise, the DNS
> administrator can do nothing except pre-publish the new KSK with ample time
> to give resolver administrators enough time to learn the new KSK.*"
>
> I have the following questions:
>
> a) This might work in case of an active KSK rollover. However in case of
> KSK compromise, which would require an emergency KSK rollover, what does
> the network administrator do in the '*Otherwise*' situation from the
> above quote?
>
> b) I am just curious to know if this is even an issue or do network
> administrators care about it? And if it is, Is there any RFC or relevant
> doc or mailing list that discusses this problem/solutions, etc.?
>
> References:
> [1] http://nvlpubs.nist.gov/nistpubs/SpecialPublications/
> NIST.SP.800-81-2.pdf
>
> Thanks,
> Aanchal Malhotra.
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
> ===================================
> Scott Rose
> NIST ITL
> scott.r...@nist.gov
> +1-301-975-8439 <%28301%29%20975-8439>
> GV: +1-571-249-3671 <%28571%29%20249-3671>
> ===================================
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to