Internet DRAFT - draft-yoneya-dnssec-kskro-failure-recovery

draft-yoneya-dnssec-kskro-failure-recovery






Network Working Group                                          Y. Yoneya
Internet-Draft                                                      JPRS
Intended status: Informational                              P. Wallstrom
Expires: March 9, 2013                                               .SE
                                                       September 5, 2012


             DNSSEC KSK rollover failure recovery practices
             draft-yoneya-dnssec-kskro-failure-recovery-01

Abstract

   This document describes a set of common problems and possible
   recovery methods for DNSSEC when there is a DS published in the
   parent zone which does no longer match any DNSKEY in the child zone.
   As DNSSEC validators are becoming widely deployed, this will have
   serious effect on the availability of the zone, and the need for a
   quick recovery is needed.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on March 9, 2013.

Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of



Yoneya & Wallstrom        Expires March 9, 2013                 [Page 1]

Internet-Draft              DNSSEC practices              September 2012


   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

















































Yoneya & Wallstrom        Expires March 9, 2013                 [Page 2]

Internet-Draft              DNSSEC practices              September 2012


1.  Introduction

   When a zone is signed and a DS has been published in the parent zone
   DNS name resolution will fail when DS in the parent zone and the
   DNSKEY in child zone become inconsistent.  The impact of a DS
   mismatch will be much more severe when it occurs high up in the DNS
   hierarchy, such as for a TLD where it could make millions of child
   zones unresolvable.  IANA have a defined process for registering DS
   records for a TLD to the root zone [IANAPROC] and a validation
   procedure of registered DS [ROOTDNSSEC], but there will still be a
   non-zero risk of human error.  Having a set of best practices for
   emergency countermeasures in the case of a KSK rollover failure will
   be helpful for a stable DNSSEC operation.






































Yoneya & Wallstrom        Expires March 9, 2013                 [Page 3]

Internet-Draft              DNSSEC practices              September 2012


2.  Examples of KSK rollover failures

   A DNS operator can cause the chain of trust between the parent and
   child to break in some different ways.  These are just some examples:
   The key storage for the main DNSSEC signer is broken (or even the
   whole machine).  The DNS operator in this case will have to restore
   the keys and the DNSSEC signer process to a normal state, and this
   can take some time - and in some cases it can be impossible to
   restore the system and the keys.  The KSK rollover process misbehaves
   causing the zone to be signed with keys not matched by any DS record
   published in the parent zone.  TODO: more examples?








































Yoneya & Wallstrom        Expires March 9, 2013                 [Page 4]

Internet-Draft              DNSSEC practices              September 2012


3.  Countermeasures for KSK rollover failures

   This section lists several countermeasures for KSK rollover failures.

3.1.  Case 1 - remove failing DS

   Countermeasure:

      Ask the parent zone administrator to delete the DS records from
      the parent zone or to replace the wrong DS records with the
      correct set of DS.  For a quick recovery there is also a need to
      ask every major DNSSEC validating resolver operator to flush the
      cache for the failing zone.

   Pros:

      No need to consider TTL of DNS records.

   Cons:

      It is an impossible task to communicate with all the resolver
      operators.

3.2.  Case 2

   Countermeasure:

      Specify short time for TTLs of DS and NS records in parent zone to
      make reflection duration shorter for modification (deletion of
      wrong DS or replace wrong DS with correct DS) to correspond
      registration of wrong DS.

   Pros:

      Modification to correct NS and/or DS will be reflected to full
      resolvers in short duration.

   Cons:

      Increases queries to parent zone and therefore consumes network
      bandwidth and disk space of servers when logging.

3.3.  Case 3








Yoneya & Wallstrom        Expires March 9, 2013                 [Page 5]

Internet-Draft              DNSSEC practices              September 2012


   Countermeasure:

      Specify short time for TTL of DS record in parent zone to make
      reflection duration shorter for modification (deletion of wrong DS
      or replace wrong DS with correct DS) to correspond registration of
      wrong DS.

   Pros:

      Modification to correct DS will be reflected to full resolvers in
      short duration.

   Cons:

      Increases queries to parent zone and therefore consumes network
      bandwidth and disk space of servers when logging.

3.4.  Case 4

   Countermeasure:

      Specify short time for TTL of newly registered/modified NS and/or
      DS in parent zone to make reflection duration shorter for
      modification (deletion of wrong DS or replace wrong DS with
      correct DS) to correspond registration of wrong DS.  After a
      certain duration passed, TTL of NS and/or DS be made longer time.

   Pros:

      Modification to correct NS and/or DS will be reflected in short
      duration.

   Cons:

      Registration system (or zone generation system) of parent zone
      will be complicated.

3.5.  Case 5

   Countermeasure:

      Do nothing because registration of wrong DS is responsibility of
      registrant.

   Pros:






Yoneya & Wallstrom        Expires March 9, 2013                 [Page 6]

Internet-Draft              DNSSEC practices              September 2012


      No changes to current system/procedure.

   Cons:

      If TTLs of NS and DS in parent zone are long time, it will take a
      time until extinguish of influence since correction of error.













































Yoneya & Wallstrom        Expires March 9, 2013                 [Page 7]

Internet-Draft              DNSSEC practices              September 2012


4.  Considerations

   Followings are (not comprehensive) list of points to consider which
   case is the best practice for quick recovery from DS registration
   failure.

   o  TTLs of NS and DS in parent zone should be the same or not.

   o  What are the impacts of combination of long NS TTL (~1day) and
      short DS TTL (~a few hours).

   o  What is the appropriate DS TTL.

   o  How wide range of ISPs should TLDs know point of contacts (PoC)
      for emergency call.  For example, ccTLDs should know PoC of
      domestic major ISPs.



































Yoneya & Wallstrom        Expires March 9, 2013                 [Page 8]

Internet-Draft              DNSSEC practices              September 2012


5.  IANA Considerations

   This document does not specify any IANA actions.
















































Yoneya & Wallstrom        Expires March 9, 2013                 [Page 9]

Internet-Draft              DNSSEC practices              September 2012


6.  Security Considerations

   TBD.
















































Yoneya & Wallstrom        Expires March 9, 2013                [Page 10]

Internet-Draft              DNSSEC practices              September 2012


7.  References

   [IANAPROC]
              IANA, "Placing TLD delegation signer information in the
              root zone",
               http://www.iana.org/procedures/root-dnssec-records.html,
              2010.

   [ROOTDNSSEC]
              Root DNSSEC, "Enhancements to DNSSEC validation for the
              DNS Root Zone change requests",
               http://www.root-dnssec.org/2011/01/27/rrsig-checking/,
              2011.






































Yoneya & Wallstrom        Expires March 9, 2013                [Page 11]

Internet-Draft              DNSSEC practices              September 2012


Appendix A.  Change Log

A.1.  Changes since -00

   o  New co-author joined.

   o  Some editorial collections and cleanup texts.

   o  Add section 2 to show examples of KSK rollover failures.










































Yoneya & Wallstrom        Expires March 9, 2013                [Page 12]

Internet-Draft              DNSSEC practices              September 2012


Authors' Addresses

   Yoshiro Yoneya
   JPRS
   Chiyoda First Bldg. East 13F
   3-8-1 Nishi-Kanda
   Chiyoda-ku, Tokyo  101-0065
   Japan

   Phone: +81 3 5215 8451
   Email: yoshiro.yoneya@jprs.co.jp


   Patrik Wallstrom
   .SE
   Box 7399
   Stockholm, Stockholm  103 91
   Sweden

   Phone: +46 733 173956
   Email: pawal@iis.se






























Yoneya & Wallstrom        Expires March 9, 2013                [Page 13]