DNS Extensions S. Rose Internet-Draft NIST Expires: March 6, 2003 September 5, 2002 DNS Security Document Roadmap draft-ietf-dnsext-dnssec-roadmap-06 Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http:// www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on March 6, 2003. Copyright Notice Copyright (C) The Internet Society (2002). All Rights Reserved. Abstract DNS Security (DNSSEC) technology is composed of extensions to the Domain Name System (DNS) protocol that provide data integrity and authentication to security aware resolvers and applications through the use of cryptographic digital signatures. Several documents exist to describe these extensions and the implementation-specific details regarding specific digital signing schemes. The interrelationship between these different documents is discussed here. A brief overview of what to find in which document and author guidelines for what to include in new DNS Security documents, or revisions to existing documents, is described. Rose Expires March 6, 2003 [Page 1] Internet-Draft DNSSEC Document Roadmap September 2002 Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Interrelationship of DNS Security Documents . . . . . . . . . 4 3. Relationship of DNS Security Documents to other DNS Documents . . . . . . . . . . . . . . . . . . . . . . . . . . 8 4. Recommended Content for new DNS Security Documents . . . . . . 9 4.1 Security Related Resource Records . . . . . . . . . . . . . . 9 4.2 Digital Signature Algorithm Implementations . . . . . . . . . 9 4.3 Refinement of Security Procedures . . . . . . . . . . . . . . 10 4.4 The Use of DNS Security Extensions with Other Protocols . . . 10 5. Security Considerations . . . . . . . . . . . . . . . . . . . 11 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 12 References . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Author's Address . . . . . . . . . . . . . . . . . . . . . . . 14 Full Copyright Statement . . . . . . . . . . . . . . . . . . . 15 Rose Expires March 6, 2003 [Page 2] Internet-Draft DNSSEC Document Roadmap September 2002 1. Introduction This document is intended to provide guidelines for the development of supplemental documents describing security extensions to the Domain Name System (DNS). The main goal of the DNS Security (DNSSEC) protocol extensions is to add data authentication and integrity services to the DNS protocol. These protocol extensions should be differentiated from DNS operational security issues, which are beyond the scope of this effort. DNS Security documents fall into one or possibly more of the following sub-categories: new DNS security resource records, implementation details of specific digital signing algorithms for use in DNS Security and Secure DNS transactions. Since the goal of DNS Security extensions is to become part of the DNS protocol standard, additional documents that seek to refine a portion of the security extensions will be introduced as the specifications progress along the IETF standards track. There is a set of basic guidelines for each sub-category of documents that explains what should be included, what should be considered a protocol extension, and what should be considered an operational issue. Currently, there are at least two documents that fall under operational security considerations that deal specifically with the DNS security extensions: the first is RFC 2541 [6] which deals with the operational side of implementing the security extensions; the other is the CAIRN DNSSEC testbed Internet draft [CAIRN]. These documents should be considered part of the operational side of DNS, but will be addressed as a supplemental part of the DNS Security roadmap. That is not to say that these two documents are not important to securing a DNS zone, but they do not directly address the proposed DNS security extensions. Authors of documents that seek to address the operational concerns of DNS security should be aware of the structure of DNS Security documentation if they wish to include their documents in the DNSEXT Working Group in addition to the DNS Operations WG. It is assumed the reader has some knowledge of the Domain Name System [2] and the Domain Name System Security Extensions [1]. Rose Expires March 6, 2003 [Page 3] Internet-Draft DNSSEC Document Roadmap September 2002 2. Interrelationship of DNS Security Documents The DNSSEC set of documents can be partitioned into five main groups as depicted in Figure 1. All of these documents in turn are under the larger umbrella group of DNS base protocol documents. It is possible that some documents fall into more than one of these categories, such as RFC 2535, and should follow the guidelines for the all of the document groups it falls into. However, it is wise to limit the number of "uberdocuments" that try to be everything to everyone. The documents listed in each category are current as to the time of writing. Rose Expires March 6, 2003 [Page 4] Internet-Draft DNSSEC Document Roadmap September 2002 --------------------------------------------------------------------- +--------------------------------+ | | | Base DNS Protocol Docs. | | [RFC1035, RFC2181, etc.] | | | +--------------------------------+ | | | +------------+ +-----------+ +-------------+ | New | | DNSSEC | | New | | Security |----------| protocol |----------| Security | | RRs | | | | Uses | +------------+ | | +-------------+ +-----------+ | | +----------------------+*********************** | | * | | * +------------+ +---------------+ +-*-*-*-*-*-*-*-*-+ | DS | | | | Implementation | | Algorithm | | Transactions | * Notes * | Impl. | | | | | +------------+ +---------------+ +-*-*-*-*-*-*-*-*-+ DNSSEC Document Roadmap --------------------------------------------------------------------- The "DNSSEC protocol" document set refers to the document that makes up the groundwork for adding security to the DNS protocol [1]and updates to this document. RFC 2535 laid out the goals and expectations of DNS Security and the new security-related Resource Records KEY, SIG, DS [19] and NXT. Expanding from this document, related document groups include the implementation documents of various digital signature algorithms with DNSSEC, and documents further refining the transaction of messages. It is expected that RFC 2535 will be obsoleted by one or more documents that refine the set of security extensions and DNS security transactions [22], [23], [24]. Documents that seek to modify or clarify the base protocol Rose Expires March 6, 2003 [Page 5] Internet-Draft DNSSEC Document Roadmap September 2002 documents should state so clearly in the introduction of the document (as well as proscribe to the IETF guidelines of RFC/Internet Draft author guidelines). Also, the portions of the specification to be modified should be synopsized in the new document for the benefit of the reader. The "DNSSEC protocol" set includes the documents [1], [11], [12], [9], [14], [15], [21], [20], [OPTIN], [16] and their derivative documents. The "New Security RRs" set refers to the group of documents that seek to add additional Resource Records to the set of base DNS Record types. These new records can be related to securing the DNS protocol [1], [8], or using DNS security for other purposes such as storing certificates [5]. The "DS Algorithm Impl" document set refers to the group of documents that describe how a specific digital signature algorithm is implemented to fit the DNSSEC Resource Record format. Each one of these documents deals with one specific digital signature algorithm. Examples of this set include [4], [5], [25], [18][17] and [13]. The "Transactions" document set refers to the group of documents that deal with the message transaction sequence of security-related DNS operations. The contents and sequence for operations such as dynamic update [3], [11] and transaction signatures [10] are described in this document category. Additional message transaction schemes to support DNSSEC operation would also fall under this group, including secret key establishment [7], [RENEW], and verification. The final document set, "New Security Uses", refers to documents that seek to use proposed DNS Security extensions for other security related purposes. Documents that fall in this category include the use of DNS in the storage and distribution of certificates and individual user public keys (PGP, e-mail, etc.) Some documents in this group may fall beyond the DNSEXT WG scope, but they are included because of their use of the security extensions. The documents in this group should not propose any changes to the DNS protocol to support other protocols; only how existing DNS security records and transactions can be used to support other protocols. Such documents include [SSH-DNS] and [IPSEC-DNS] which deals with storing SSH and IPSec keying information the DNS using new records and utilizing DNSSEC to provide authentication and integrity checking. Lastly, there is a set of documents that should be classified as "Implementation Notes". Because the DNS security extensions are still in the developmental stage, there is an audience for documents that detail the transition and implementation of the security extensions. These have more to do with the practical side of DNS operations, but can also point to places in the protocol Rose Expires March 6, 2003 [Page 6] Internet-Draft DNSSEC Document Roadmap September 2002 specifications that need improvement. Documents in this set may be offspring of both the DNSEXT and/or DNSOP Working Groups. An example of this type is the report on the CAIRN DNSSEC testbed [CAIRN] This document was submitted through the DNSOP Working Group, however the main concern of this document is the implementation and limitations of the DNS security extensions, hence their interest to the DNS security community. The CAIRN draft deals with the implementation of a secure DNS. Authors of documents that deal with the implementation and operational side of the DNSSEC specifications would be advised/ encouraged to submit their documents to the DNSEXT Working Group as well. Rose Expires March 6, 2003 [Page 7] Internet-Draft DNSSEC Document Roadmap September 2002 3. Relationship of DNS Security Documents to other DNS Documents The DNS security-related extensions should be considered a subset of the DNS protocol. The DNS Security Working Group of the IETF (DNSSEC) has been absorbed into the larger DNS Extensions Working Group (DNSEXT). Therefore, all DNS security-related documents should be seen as a subset of the main DNS architecture documents. It is a good idea for authors of future DNS security documents to be familiar with the contents of these base protocol documents. Rose Expires March 6, 2003 [Page 8] Internet-Draft DNSSEC Document Roadmap September 2002 4. Recommended Content for new DNS Security Documents Documents that seek to make additions or revisions to the DNS protocol to add security should follow common guidelines as to minimum required content and structure. It is the purpose of this document roadmap to establish criteria for content that any new DNS security protocol specifications document should contain. These criteria should be interpreted as a minimum set of information required/needed in a document, any additional information regarding the specific extension should also be included in the document. These criteria are not officially part of the IETF guidelines regarding RFC/Internet Drafts, but should be considered as guidance to promote uniformity to Working Group documents. Since the addition of security to the DNS protocol is now considered a general extension to the DNS protocol, any guideline for the contents of a DNS Security document could be taken as a suggestion for the contents of any DNS extension document. 4.1 Security Related Resource Records Documents describing a new type of DNS Security Resource Record (RR) should contain information describing the structure and use of the new RR type. It is a good idea to only discuss one new type in a document, unless the set of new resource records are closely related or a protocol extension requires the use of more than one new record type. Specifically, each document detailing a new security-related RR type should include the following information: o The format of the new RR type, both "on the wire" (bit format) and ASCII representation (for text zone files), if appropriate; o when and in what section of a DNS query/response this new RR type is to be included; o at which level of the DNS hierarchy this new RR type is to be considered authoritative (i.e. in a zone, in a zone's superzone) and who is authoritative to sign the new RR; 4.2 Digital Signature Algorithm Implementations Documents describing the implementation details of a specific digital signature algorithm such as [4] ,[13] (and others as new digital signatures schemes are introduced) for use with DNS Security should include the following information: o The format/encoding of the algorithm's public key for use in a KEY Rose Expires March 6, 2003 [Page 9] Internet-Draft DNSSEC Document Roadmap September 2002 Resource Record; o the acceptable key size for use with the algorithm; o the current known status of the algorithm (as one of REQUIRED, RECOMMENDED, or OPTIONAL). In addition, authors are encouraged to include any necessary description of the algorithm itself, as well as any know/suspected weaknesses as an appendix to the document. This is for reference only, as the goals of the DNSEXT working group is to propose extensions to the DNS protocol, not cryptographic research. 4.3 Refinement of Security Procedures This set of documents includes DNS protocol operations that specifically relate to DNS Security, such as DNS secret key establishment [7] and security extensions to pre-existing or proposed DNS operations such as dynamic update [3]. Documents that describe a new set of DNS message transactions, or seek to refine a current series of transactions that make up a DNS operation should include the following information: o The order in which the DNS messages are sent by the operation initiator and target; o the format of these DNS messages; o any required authentication mechanisms for each stage of the operation and the required authority for that mechanism (i.e. zone, host, or some other trusted authority such as a DNS administrator or certificate authority); 4.4 The Use of DNS Security Extensions with Other Protocols Because of the flexibility and ubiquity of the DNS, there may exist other Internet protocols and applications that could make use of, or extend, the DNS security protocols. Examples of this type of document include the use of DNS to support IPSEC [IPSEC-DNS], SSH [SSH-DNS} the Public Key Infrastructure (PKI). It is beyond the scope of this roadmap to describe the contents of this class of documents. However, if uses or extensions require the addition or modification of a DNS Resource Record type or DNS query/response transactions, then the guidelines laid out in the previous sections of this document should be adhered to. Rose Expires March 6, 2003 [Page 10] Internet-Draft DNSSEC Document Roadmap September 2002 5. Security Considerations This document provides a roadmap and guidelines for writing DNS Security related documents. The reader should follow all the security procedures and guidelines described in the DNS Security Extensions document [1]. Rose Expires March 6, 2003 [Page 11] Internet-Draft DNSSEC Document Roadmap September 2002 6. Acknowledgements In addition to the RFCs mentioned in this document, there are also numerous Internet drafts that fall in one or more of the categories of DNS Security documents mentioned above. Depending on where (and if) these documents are on the IETF standards track, the reader may not be able to access these documents through the RFC repositories. All of these documents are "Work in Progress" and are subject to change; therefore a version number is not supplied for the current revision. Some Internet Drafts are in the RFC editor's queue or nearing WG Last Call at the time of writing. These Drafts have been placed in the References section. The drafts below are still subject to agreement in the IETF. o CAIRN: D. Massey, T. Lehman, and E. Lewis. "DNSSEC Implementation in the CAIRN Testbed". draft-ietf-dnsop- dnsseccairn-NN.txt o OPTIN: M. Kosters. "DNSSEC Opt-in for Large Zones" draft- kosters-dnsext-dnssec-opt-in-NN.txt o SSH-DNS: W. Griffin, J. Schlyter. "Using DNS to securely publish SSH key fingerprints" draft-ietf-secsh-dns-NN.txt o IPSEC-DNS: M. Richardson. "A method for storing IPsec keying material in DNS". draft-richardson-ipsec-rr-NN.txt o RENEW: Y. Kamite, M. Nakayama. "TKEY Secret Key Renewal Mode". draft-ietf-dnsext-tkey-renewal-mode-NN.txt Rose Expires March 6, 2003 [Page 12] Internet-Draft DNSSEC Document Roadmap September 2002 References [1] Eastlake, D., "Domain Name System Security Extensions", RFC 2535, March 1999. [2] Mockapetris, P., "Domain names - implementation and specification", STD 13, RFC 1035, November 1987. [3] Eastlake, D., "Secure Domain Name System Dynamic Update", RFC 2137, April 1997. [4] Eastlake, D., "DSA KEYs and SIGs in the Domain Name System (DNS)", RFC 2536, March 1999. [5] Eastlake, D. and O. Gudmundsson, "Storing Certificates in the Domain Name System (DNS)", RFC 2538, March 1999. [6] Eastlake, D., "DNS Security Operational Considerations", RFC 2541, March 1999. [7] Eastlake, D., "Secret Key Establishment for DNS (TKEY RR)", RFC 2930, September 2000. [8] Eastlake, D., "DNS Request and Transaction Signatures ( SIG(0)s)", RFC 2931, September 2000. [9] Lewis, E., "DNS Security Extension Clarification on Zone Status", RFC 3090, March 2001. [10] Vixie, P., Gudmundsson, O., Eastlake, D. and B. Wellington, "Secret Key Transaction Authentication for DNS (TSIG)", RFC 2845, May 2000. [11] Wellington, B., "Secure Domain Name System (DNS) Dynamic Update", RFC 3007, November 2000. [12] Wellington, B., "Domain Name System Security (DNSSEC) Signing Authority", RFC 3008, April 2000. [13] Eastlake, D., "RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)", RFC 3110, May 2001. [14] Conrad, D., "Indicating Resolver Support of DNSSEC", RFC 3225, December 2001. [15] Gudmundsson, O., "DNSSEC and IPv6 A6 aware server/resolver message size requirements", RFC 3226, December 2001. Rose Expires March 6, 2003 [Page 13] Internet-Draft DNSSEC Document Roadmap September 2002 [16] Austein, R. and D. Atkins, "Threat Analysis of the Domain Name System (Work in Progress)", RFC XXXX. [17] Eastlake, R., "Storage of Diffie-Hellman Keys in the Domain Name System (DNS) (Work in Progress)", RFC XXXX. [18] Eastlake, D. and R. Schroeppel, "Elliptic Curve KEYs in the DNS (Work in Progress)", RFC XXXX. [19] Gundmundsson, O., "Delegation Signer Record in Parent (Work in Progress)", RFC XXXX. [20] Massey, D. and S. Rose, "Limiting the Scope of the KEY Resource Record (Work in Progress)", RFC XXXX. [21] Wellington, B., "Redefinition of the DNS AD bit (Work in Progress)", RFC XXXX. [22] Arends, R., Larson, M., Massey, D. and S. Rose, "DNS Security Introduction and Requirements (Work in Progress)", RFC XXXX. [23] Arends, R., Larson, M., Massey, D. and S. Rose, "DNS Security Introduction and Requirements (Work in Progress)", RFC XXXX. [24] Arends, R., Larson, M., Massey, D. and S. Rose, "DNS Security Introduction and Requirements (Work in Progress)", RFC XXXX. [25] Kwan, S., Garg, P., Gilroy, J. and L. Esibov, "GSS Algorithm for TSIG (Work in Progress)", RFC XXXX. Author's Address Scott Rose National Institute for Standards and Technology 100 Bureau Drive Gaithersburg, MD 20899-3460 USA EMail: scott.rose@nist.gov Rose Expires March 6, 2003 [Page 14] Internet-Draft DNSSEC Document Roadmap September 2002 Full Copyright Statement Copyright (C) The Internet Society (2002). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Acknowledgement Funding for the RFC Editor function is currently provided by the Internet Society. Rose Expires March 6, 2003 [Page 15]