Hi, 

Sorry for the very late reply to this issue.

http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/trust_anchor_configuration

Paul asked for proper use of 5011 to be added to 4641bis. I agree, In fact 
could we go further and give implementation advice?

These are some thoughts on the subject, I know they cross into dnsext space but 
I think 4641bis might want to mention some of them.

1. One thing missing in RFC5011 is a mechanism to signal validator operators 
that RFC5011 key management is being performed.

2. There currently exist several ways in which validator operators can 
configure and manage their DNSSEC TAs. These mechanisms are different in each 
validator, according to the design of the implementors.

The current situation is that all known validators configure their trust 
anchors differently according to whether or not they are 5011 TA's or non-5011 
TA's. There is no good reason for this. In addition, since RFC5011 provides no 
signalling there may be no way for validator operators to know where to 
configure the TA key.

4641bis could suggest to implementors that all TA's be configured in an 
identical manner in any given implementation. Note: 4641bis should say nothing 
about how the implementation should do this, just that all TA keys be treated 
equally in the configuration.

If the validator ever sees a revoke bit set on a key in a self signed RRSet it 
MUST stop trusting it, as described in RFC5011. If the validator never sees a 
revoked bit then as long as the authoritative operator is making the validator 
operator aware of key changes in some other way there will be no issues.

This should help ensure that keys are configured correctly.

2. There are also multiple ways in which the auth nameserver operators will 
manage key rollover.

Authoritative operators should free to decide if they want to manage their keys 
in a RFC5011 manner or not. RFC4641bis should place no restriction on 
authoritative servers.

(3. With RFC5011 we now have some confusion in the current RFCs about the 
status of the SEP bit.

RFC4034 describes the SEP bit as follows 
"Bit 15 of the Flags field is the Secure Entry Point flag, described in 
[RFC3757].  If bit 15 has value 1, then the DNSKEY record holds a key intended 
for use as a secure entry point. This flag is only intended to be a hint to 
zone signing or debugging software as to the intended use of this DNSKEY 
record; validators MUST NOT alter their behaviour during the signature 
validation process in any way based on the setting of this bit."

RFC4041
RFC4041 recommends "In this document, we assume a one-to-one mapping between 
KSK and SEP keys and we assume the SEP flag to be set on all KSKs"
This clearly alters RFC 4034 and gives some meaning to the SEP bit.

RFC5011
RFC5011 describes a method for securely managing key rollover via the use of 
the SEP bit and the addition of a revoke bit. This clearly redefines the 
original meaning of the SEP bit in RFC4034.

Could 4641bis or something mention

1. RFC3757 is not obsolete
2. RFC3757 is updated by RFC5011

The SEP bit is described in [RFC3757] and updated in RFC5011. However, it plays 
no part in the validation process. It may only be used in the automated key 
rollover process as described in RFC5011.)

John
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to