Internet DRAFT - draft-jabley-dnsop-flush-reqs

draft-jabley-dnsop-flush-reqs






Network Working Group                                           J. Abley
Internet-Draft                                                 Dyn, Inc.
Intended status: Experimental                                  W. Kumari
Expires: April 21, 2014                                           Google
                                                        October 18, 2013


  Requirements for a Mechanism for Remote-Triggered DNS Cache Flushes
                    draft-jabley-dnsop-flush-reqs-00

Abstract

   Operational calamaties in the DNS happen from time to time, and in
   many cases problems persist due to DNS caching of bad data.  Lacking
   any robust mechanism to signal that bad data has been flushed, the
   operators of DNS authority servers often resort to unauthenticated
   requests for help being sent to mailing lists, the results of which
   are frequently unsatisfying to all concerned.

   This document aims to present requirements for a more robust
   mechanism by which authoritative server operators can signal to
   recursive server operators that bad data has been published, and that
   targetted cache flushes may be beneficial.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on April 21, 2014.

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents



Abley & Kumari           Expires April 21, 2014                 [Page 1]

Internet-Draft           DNS FLUSH Requirements             October 2013


   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.












































Abley & Kumari           Expires April 21, 2014                 [Page 2]

Internet-Draft           DNS FLUSH Requirements             October 2013


1.  Terminology

   This document makes use of the following taxonomy.  Note that
   although it is thought that these terms (and the meanings presented
   here) are in common use, overloading and ambiguity abounds in
   practice and hence the definitions presented here should not be
   considered universally-applicable.

   Authoritative Server:  A DNS server that serves one or more DNS zones
      authoritatively, and which does not process recursive queries.  An
      Authoritative Server may function as a Master Server, or a Slave
      Server, or both.

   Master Server:  An Authoritative Server with the ability to respond
      to zone transfer requests from one or more Slave Servers and hence
      replicate zone data from master to slave.

   Slave Server:  An Authoritative Server configured to replicate zone
      data from one or more Master Servers.

   Recursive Server:  A DNS server that processes Recursive Queries on
      behalf of Stub Resolvers.  Recursive Servers ultimately obtain
      responses from Authoritative Servers, although particular queries
      from Stub Resolvers may be satisfied using data stored in a local
      cache or obtained from one or more other Recursive Servers.

   Stub Resolver:  A DNS client that communicates with one or more
      configured Recursive Servers in order to obtain responses to
      queries on behalf of an application.

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].


















Abley & Kumari           Expires April 21, 2014                 [Page 3]

Internet-Draft           DNS FLUSH Requirements             October 2013


2.  Introduction

   Operational calamaties in the DNS happen from time to time, and in
   many cases problems persist due to DNS caching of bad data.  Lacking
   any robust mechanism to signal that bad data has been flushed, the
   operators of DNS authority servers often resort to unauthenticated
   requests for help being sent to mailing lists, the results of which
   are frequently unsatisfying to all concerned.

   This document aims to present requirements for a more robust
   mechanism by which authoritative server operators can signal to
   recursive server operators that bad data has been published, and that
   targetted cache flushes may be beneficial.






































Abley & Kumari           Expires April 21, 2014                 [Page 4]

Internet-Draft           DNS FLUSH Requirements             October 2013


3.  Use Cases

   The following are examples of failures that have been observed to
   cause service disruption, and that a mechanism meeting the
   requirements that follow might provide some relief from.

   This is all woefully incomplete.  Specific examples of domain names
   (TLD and otherwise) have been omitted in the interests of avoiding
   undue embarassment.

3.1.  Registrar Compromise, Domain Hijack

   Unauthorised access to a registrant's account at a registrar (or some
   other registrar-level compromise) facilitates the unauthorised
   redelegation of a domain to new nameservers, which serve malicious
   data with long TTLs.

   Remediation is achieved by restoring the correct delegation.  Service
   disruption continues until the malicious data has expired from
   Recursive Server caches used by end-users.

3.2.  Zone Signing Failure

   A failure to sign a zone correctly (e.g. using the wrong keys)
   results in correct zone data being published with signatures that
   cannot be validated.

   Remediation is achieved by fixing the signing problem (e.g. signing
   with the correct keys) and publishing a new revision of the zone.
   Service disruption may continue until particular elements have
   expired from caches (e.g. apex DNSKEY RRSets).

3.3.  Zone Integrity Failure

   Publication of an incomplete (e.g. truncated) zone results in missing
   data, and the absence of that data is subject to negative caching
   [RFC2308].

   Remediation is achieved by resolving the operational problem that led
   to the incomplete zone being published, and publishing a successor
   zone that is complete.  Service disruption may continue until all
   negatively-cached elements have expired from caches.









Abley & Kumari           Expires April 21, 2014                 [Page 5]

Internet-Draft           DNS FLUSH Requirements             October 2013


4.  Requirements

   [These various requirements are somewhat arbitrarily spread over the
   subsections that follow.  Some better organisation would make them
   more readable.]

4.1.  Functional Requirements

   1.  The mechanism MUST be effective; that is, it must be capable of
       being deployed to the extent that it provides a significant
       improvement in remediation of zone publication problems.

   2.  The mechanism MUST accommodate a maximally-constrained scope for
       a flush; that is, the resulting cache flushes MUST be constrained
       to specific parts of the namespace where a flush is beneficial to
       resolve a problem, and MUST minimise collateral damage to other
       cached data.

   3.  The mechanism MUST be opt-in from the perspective of a Recursive
       Server operator; that is, no Recursive Server operator should be
       compelled to act upon a request to flush their cache.

   4.  The mechanism MUST accommodate timely responses to problems.

   5.  The mechanism MUST support idempotency; that is, transmission of
       multiple identical requests to flush MUST NOT result in more than
       one flush operation in a single cache.

   6.  The mechanism SHOULD require minimal changes to DNS software, but
       MIGHT reasonably involve changes to or deployment of surrounding
       administrative scaffolding (scripts, etc).

4.2.  Operational Requirements

   1.  It SHOULD be possible to automate the reception and processing of
       a request using the mechanism on a Recursive Server.

   2.  The mechanism SHOULD be simple for Recursive Server operators to
       implement and operate, since those operators might be the
       recipient of many requests whereas the operators of Authoritative
       Servers should only reasonably expect to exercise this mechanism
       in the event of serious operational failures.

4.3.  Manageability Requirements

   1.  The mechanism's effectiveness SHOULD be easily measurable;
       Authoritative Server operators using the mechanism ought to be
       able to gauge its effect, and Recursive Server operators ought to



Abley & Kumari           Expires April 21, 2014                 [Page 6]

Internet-Draft           DNS FLUSH Requirements             October 2013


       be able to tell whether problem data was present (i.e. whether
       the remedy actually corresponded to a problem).

4.4.  Security Requirements

   1.  The mechanism MUST be authenticated, such that a Recursive Server
       operator can trust that a request to flush is authentic.

   2.  It MUST be possible to rate-limit reception of cache flush
       requests in order to avoid the mechanism being used as a denial-
       of-service attack vector.

   3.  The mechanism MUST NOT facilitate new exploits or compromises
       against Authoritative Servers or Recursive Servers.





































Abley & Kumari           Expires April 21, 2014                 [Page 7]

Internet-Draft           DNS FLUSH Requirements             October 2013


5.  IANA Considerations

   This document makes no request of the IANA.
















































Abley & Kumari           Expires April 21, 2014                 [Page 8]

Internet-Draft           DNS FLUSH Requirements             October 2013


6.  Security Considerations

   This document presents requirements for future work, and does not
   directly impact the security of the Internet.

   Security requirements are described in Section 4.4.













































Abley & Kumari           Expires April 21, 2014                 [Page 9]

Internet-Draft           DNS FLUSH Requirements             October 2013


7.  Acknowledgements

   Your name here, etc.
















































Abley & Kumari           Expires April 21, 2014                [Page 10]

Internet-Draft           DNS FLUSH Requirements             October 2013


8.  References

8.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

8.2.  Informative References

   [RFC2308]  Andrews, M., "Negative Caching of DNS Queries (DNS
              NCACHE)", RFC 2308, March 1998.








































Abley & Kumari           Expires April 21, 2014                [Page 11]

Internet-Draft           DNS FLUSH Requirements             October 2013


Appendix A.  Editorial Notes

   This section (and sub-sections) to be removed prior to publication.

A.1.  Change History

   00 Initial idea, circulated for the purposes of entertainment.












































Abley & Kumari           Expires April 21, 2014                [Page 12]

Internet-Draft           DNS FLUSH Requirements             October 2013


Authors' Addresses

   Joe Abley
   Dyn, Inc.
   470 Moore Street
   London, ON  N6C 2C2
   Canada

   Phone: +1 519 670 9327
   Email: jabley@dyn.com


   Warren Kumarui
   Google
   1600 Amphitheatre Parkway
   Mountain View, CA  94043

   Email: warren@kumari.net

































Abley & Kumari           Expires April 21, 2014                [Page 13]