On Wed, Jan 07, 2015 at 01:47:06PM -0500, John wrote:

> >I am not sure I understand this. Why are you linking the two?
> >I am not linking anything.
>
> I am not sure what TLSA updates has to do with key rotation, other than they
> might be a good idea to do them at the same time. May be its my odd ball way
> of reading it.

I am talking about SMTP server TLS key/cert rotation, not DNSSEC
key rotation.  

And not at the same time, the TLSA RRs for new certs/keys need to
be published before the keys are deployed concurrently with the
live keys.  Let the combination age a few TTLs, then deploy the
new keys.

    https://tools.ietf.org/html/draft-ietf-dane-ops-07#section-8.1
    https://tools.ietf.org/html/draft-ietf-dane-ops-07#section-8.4

With DNSSEC it is the other way around.  Publish old and new DNSKEY
records first, let that bake in for a few TTLs, then publish new
DS RRs.  When removing keys, drop corresponding DS RR first, let
than RRset age a bit, then remove the keys.

    Invariants:

        DNSSEC:  For each not yet expired (TTL) DS RRset there is
        always a corresponding DNSKEY published at the zone apex.

        DANE:  At all times the server's live certificate chain
        matches at least one TLSA record in every not yet expired
        (TTL) TLSA RRset.

Key rotation must maintain these invariants.

    No extant DS RRsets that contain records with no matching DNSKEY.

    No TLS certificate chains that fail to match some record in
    every extant TLSA RRset.

-- 
        Viktor.

Reply via email to