Hi,
I support publication of this document, but I agree that some things
should be improved before its ready to do so. Mainly the RFC2119
language (raised by Patrik), the rule of removing the CDS/CDNSKEY RRset
at the child and missing/no clear guidelines to prevent "DS flapping".
Besides some nits which I will send the editors off-list, here are my
comments:
2.1. DNS delegations
But this
fails to meet some operating needs, including the child having no
influence what DS digest algorithms are used and DS records can only
be published for keys that are in the DNSKEY RRset.
The reason why that is bad is because it then would not be compatible
with the Double-DS key rollover method. Perhaps it is good to add that
explicitly.
4.1. CDS / CDNSKEY processing rules
If there are no CDS / CDNSKEY resource records in the child, this
signals that no change should be made to the current DS set. This
means that, once the child and parent are in sync, the child DNS
operator SHOULD remove all CDS records from the zone.
I would rather see MAY here, having the retain RRset be the normal case,
agreeing with Patrik Faltstrom earlier comments.
Following acceptance rules are placed on the CDS / CDNSKEY records as
follows:
o Signer: "MUST be signed with a key that is represented in both the
current DNSKEY and DS RRset's."
In other words: The CDS and CDNSKEY RRsets MUST be signed with an active
KSK. This introduces new tasks for keys that have the role of KSK. In
current software, a KSK only signs the DNSKEY RRset. Basically, with
this rule you are extending the role to also sign the CDS and CDNSKEY
RRsets. I am fine with that, they all are there for the same main
purpose: maintaining the chain of trust. But I think this can be
mentioned more explicitly in the document.
Now do we also require the ZSK have signing these RRsets? I don't think
so. So also the signing rules for ZSKs can be adjusted.
5. Child's CDS / CDNSKEY Publication
A child MAY publish both CDS and CDNSKEY. If a child chooses to
publish both, it MUST attempt to maintain consistency (a matching CDS
for each CDNSKEY).
Another weak RFC2119 requirement: MUST attempt. I think you have to get
rid of the word attempt.
6.2. Using the new CDS / CDNSKEY records
Regardless of how the Parental Agent detected changes to a CDS /
CDNSKEY RR, the Parental Agent MUST use a DNSSEC validator to obtain
a validated CDS / CDNSKEY RRset from the Child zone. It would be a
good idea if the Parental Agent checked all NS RRs listed at the
delegation.
Patrik already asked what the RFC2119 equivalent for 'good idea' would
be. Perhaps this is a SHOULD. This way the parental agent can be more
sure of things being in-sync at the child name servers.
The Parental Agent MUST ensure that old versions of the CDS / CDNSKEY
RRset do not overwrite newer versions. This MAY be accomplished by
checking that the signature inception in the RRSIG for CDS / CDNSKEY
is newer and/or the serial number on the child's SOA is greater.
This may require the Parental Agent to maintain some state
information.
Or use the good idea from above, to prevent maintaining state.
Best regards,
Matthijs
On 04/02/2014 09:07 PM, Tim Wicinski wrote:
> Greetings,
>
> This is the starting of the WGLC on Automating DNSSEC delegation trust
> maintenance. This was briefly covered in London and these are ready for
> WGLC. The current versions of this documents can be found here:
>
>
> https://datatracker.ietf.org/doc/draft-ietf-dnsop-delegation-trust-maintainance/
>
> http://www.ietf.org/id/draft-ietf-dnsop-delegation-trust-maintainance-03.txt
>
>
> We'll have a 2 week period for comments, closing on April 16th, 2014.
>
> thanks
> tim
>
>
>
> _______________________________________________
> DNSOP mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/dnsop
>
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop