[DNSOP] I-D Action: draft-ietf-dnsop-dnssec-key-timing-04.txt

2014-07-04 Thread internet-drafts

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Domain Name System Operations Working Group 
of the IETF.

Title   : DNSSEC Key Rollover Timing Considerations
Authors : Stephen Morris
  Johan Ihren
  John Dickinson
  W. (Matthijs) Mekking
Filename: draft-ietf-dnsop-dnssec-key-timing-04.txt
Pages   : 32
Date: 2014-07-04

Abstract:
   This document describes the issues surrounding the timing of events
   in the rolling of a key in a DNSSEC-secured zone.  It presents
   timelines for the key rollover and explicitly identifies the
   relationships between the various parameters affecting the process.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-key-timing/

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-dnsop-dnssec-key-timing-04

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-dnssec-key-timing-04


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Fwd: I-D Action: draft-ietf-dnsop-dnssec-key-timing-04.txt

2014-07-04 Thread Tim Wicinski


In the words of Stephen Morris DNSOP can now do add another skill to 
its list: practicing the art of necromancy.  This is the return of the 
DNSSEC Key Timing draft.   For those who are new; or don't remember; or 
choose not to relive those days, a little bit of history:



Initially, the document draft-ietf-dnsop-dnssec-key-timing-03 had
gone through the working group and was in Working Group Last Call
(WGLC).  The document stalled for various administrative reasons.
Soon after, a companion document titled
draft-mekking-dnsop-dnssec-key-timing-bis appeared, and stalled in
a similar manner.

This version of the document (which will be published as -04) does
reflects the original document, but was driven by the
consensus of the WG (which was and still is ship it). Hence, this
does not include (m)any updates of the draft in
draft-mekking-dnsop-dnssec-key-timing-bis.   At the end of this email is 
the list of larger changes that are spelled out in the appendix.


I am acting as Document Shepherd for this document, and the feeling is 
that we feel this document needs 2-3 weeks of editorial review, and then 
it would head back into WGLC.


*What we do need*  Since this draft has several equations, there is a 
need for 2-3 people to strongly review the changes and make sure 
everything is still correct.


Lastly, I want to thank Stephen Morris, Matthijs Mekking, John Dickinson 
and Johan Ihren for accepting the challenge from the chairs and putting 
this back on track. I will make sure it makes it out this time.


tim

===

(List of changes from previous version, from the Appendix)

o  draft-ietf-dnsop-dnssec-key-timing-04
* Renamed to DNSSEC Key Rollover Timing Considerations
  to emphasise that this draft concerns rollover timings.
* Updated 4641bis reference to RFC 6781.
* Add introductory paragraph to each rollover description
  summarising its essential features.
* Remove detailed description of double-RRSIG ZSK rollover.  It
  is extremely unlikely to be used in any practical
  situation.
* Double-Signature KSK rollover renamed to Double-KSK to
  avoid confusion with the ZSK rollover of the same name.
* Removed section 2.3 (rollover summary) which just listed the
  order in which records are published.
* Matthijs Mekking added as co-author.
* Changed Lzsk and Kzsk definitions: actual lifetime instead
  of intended lifetime.
* Update diagrams and text to better reflect key states and key
  lifetimes.
---BeginMessage---

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Domain Name System Operations Working Group 
of the IETF.

Title   : DNSSEC Key Rollover Timing Considerations
Authors : Stephen Morris
  Johan Ihren
  John Dickinson
  W. (Matthijs) Mekking
Filename: draft-ietf-dnsop-dnssec-key-timing-04.txt
Pages   : 32
Date: 2014-07-04

Abstract:
   This document describes the issues surrounding the timing of events
   in the rolling of a key in a DNSSEC-secured zone.  It presents
   timelines for the key rollover and explicitly identifies the
   relationships between the various parameters affecting the process.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-key-timing/

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-dnsop-dnssec-key-timing-04

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-dnssec-key-timing-04


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

___
I-D-Announce mailing list
i-d-annou...@ietf.org
https://www.ietf.org/mailman/listinfo/i-d-announce
Internet-Draft directories: http://www.ietf.org/shadow.html
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
---End Message---
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Fwd: New Version Notification for draft-mekking-dnsop-kasp-00.txt

2014-07-04 Thread Matthijs Mekking
Hi wg,

I see more and more road maps that include implementing Key and Signing
Policies, so Jerry and I thought it would be a good idea to standardize
the policy model and the behavior of its elements.

Ideally, policies can be used between multiple different software
products, and if you do, you expect the same behavior.

Here is an initial draft for this, we would appreciate your feedback.

Best regards,
  Matthijs

 Original Message 
Subject: New Version Notification for draft-mekking-dnsop-kasp-00.txt
Date: Fri, 04 Jul 2014 01:25:01 -0700
From: internet-dra...@ietf.org
To: W. (Matthijs) Mekking matth...@nlnetlabs.nl, Jerry Lundstroem
jerry.lundst...@iis.se, Jerry Lundstroem jerry.lundst...@iis.se,
Matthijs Mekking matth...@nlnetlabs.nl


A new version of I-D, draft-mekking-dnsop-kasp-00.txt
has been successfully submitted by W. (Matthijs) Mekking and posted to the
IETF repository.

Name:   draft-mekking-dnsop-kasp
Revision:   00
Title:  DNSSEC Key and Signing Policies
Document date:  2014-07-04
Group:  Individual Submission
Pages:  16
URL:
http://www.ietf.org/internet-drafts/draft-mekking-dnsop-kasp-00.txt
Status: https://datatracker.ietf.org/doc/draft-mekking-dnsop-kasp/
Htmlized:   http://tools.ietf.org/html/draft-mekking-dnsop-kasp-00


Abstract:
   This document describes how key policies should look like.





Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] draft-wkumari-dnsop-dist-root-01.txt

2014-07-04 Thread Paul Hoffman
Greetings. Warren and I have done a major revision on this draft, narrowing the 
design goals, and presenting more concrete proposals for how the mechanism 
would work. We welcome more feedback, and hope to discuss it in the WG in 
Toronto.

--Paul Hoffman

Begin forwarded message:

 From: internet-dra...@ietf.org
 Subject: I-D Action: draft-wkumari-dnsop-dist-root-01.txt
 Date: July 3, 2014 at 2:17:46 PM PDT
 To: i-d-annou...@ietf.org
 Reply-To: internet-dra...@ietf.org
 
 
 A New Internet-Draft is available from the on-line Internet-Drafts 
 directories.
 
 
Title   : Securely Distributing the DNS Root
Authors : Warren Kumari
  Paul Hoffman
   Filename: draft-wkumari-dnsop-dist-root-01.txt
   Pages   : 9
   Date: 2014-07-03
 
 Abstract:
   This document recommends that recursive DNS resolvers get copies of
   the root zone, validate it using DNSSEC, populate their caches with
   the information, and also give negative responses from the validated
   zone.
 
   [[ Note: This document is largely a discussion starting point. ]]
 
 
 The IETF datatracker status page for this draft is:
 https://datatracker.ietf.org/doc/draft-wkumari-dnsop-dist-root/
 
 There's also a htmlized version available at:
 http://tools.ietf.org/html/draft-wkumari-dnsop-dist-root-01
 
 A diff from the previous version is available at:
 http://www.ietf.org/rfcdiff?url2=draft-wkumari-dnsop-dist-root-01

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] various approaches to dns channel secrecy

2014-07-04 Thread Paul Vixie
i've now seen a number of proposals reaction to the snowden
disclosures, seeking channel encryption for dns transactions. i have
some thoughts on the matter which are not in response to any specific
proposal, but rather, to the problem statement and the context of any
solution.

first, dns data itself is public -- the data is there for anybody to
query for it, if you know what to query for. only the question,
questioner, and time can be kept secret. answers are only worth keeping
secret because they identify the question, questioner, and time.

second, dns transactions are not secret to protocol agents. whether stub
resolver, full resolver, forwarder, proxy, or authority server -- the
full identity of the question must be knowable to the agent in order to
properly process that question. if the agent does logging, then the
question, questioner, and time will be stored and potentially shared or
analyzed.

by implication, then, the remainder of possible problem statement
material is hide question from on-wire surveillance, there being no
way to hide the questioner or the time. to further narrow this, the
prospective on-wire surveillance has to be from third parties who are
not also operators of on-path dns protocol agents, because any second
party could be using on-wire surveillance as part of their logging
solution, and by (2) above there is no way to hide from them. so we're
left with hide question from on-wire surveillance by third parties.

this is extremely narrow but i can envision activists and dissidents who
rightly fear for their safety based on this narrowly defined threat, so
i'm ready to agree that there should be some method in DNS of providing
this secrecy. and as we know from the history of secrecy, if you only
encrypt the things you care about, then they stand out. therefore,
secrecy of this kind must become ubiquitous.

datagram level channel secrecy (for example, DTLS or IPSEC) offers a
solution which matches the existing datagram level UDP transport used
primarily by DNS. however, the all-pervasive middleboxes (small plastic
CPE devices installed by the hundreds of millions by DSL and Cable and
other providers) have been shown to be more powerful than IPv6, DNSSEC,
and EDNS -- we could expect them to prevent any new datagram level
channel secrecy protocol we might otherwise wish to employ.

TCP/53 is less prone to middlebox data inspection, and may seem to be an
attractive solution here. i think not for two reasons. first, TCP/53
is often blocked outright, and second, because TCP/53 as defined in RFC
1035 has a connection management scheme that prohibits persistent TCP/53
connections at Internet scale, and we cannot afford the setup/teardown
costs of a non-persistent TCP-based channel secrecy protocol for DNS. to
those who suggest redefining TCP/53 and upgrading the entire physical
plant and all software and operating systems, i challenge you to first
show how this is less global effort than other proposals now on the
table, and then show how you would handle the long-tail problem, since
many agents will never be upgraded, or will only be upgraded on a scale
of half-decades. DNS works today because TCP/53 is a fallback for
UDP/53. its definition and deployment makes it unsuitable either
currently or as-would-be upgraded to become the primary transport.

i suggest that any channel secrecy protocol we wish to add to the DNS
system must be suitable as the primary transport, to which the existing
UDP/53 and TCP/53 protocols are fallbacks. i further suggest that any
new transport be operable at internet scale, which demands connection
persistence. finally i suggest that this be done using a protocol that
the internet's middle boxes (cheap CPE devices who think they know
what all valid traffic must look like) will allow to pass without comment.

one candidate for this would be RESTful JSON carried over HTTPS. because
of its extensive use in e-commerce and web API applications, HTTPS
works everywhere. because HTTPS currently depends on X.509 keys, other
groups in the IETF world are already working to make HTTPS proof against
on-path surveillance. (google for perfect forward secrecy to learn
more), and others are working to defend the internet user population
against wildcard or targeted SSL certificates issued by governments and
other anti-secrecy agents with on-path capabilities.

stephane bortzmeyer has already shown us that JSON representation of DNS
transactions is possible. i have heard from another protocol engineer
who is also working in this area (and who credits bortzmeyer for
informing his work).

the special advantage of TCP/443 as a primary transport for persistent
DNS with channel secrecy is that HTTPS's connection management permits
massive scale, as in, a single protocol agent with tens or hundreds of
thousands of open connections, even with local and global load balancing
and connection pinning.

in summary, i agree that we have a narrowly defined problem of on-path
surveillance