Expires: October 2000 April 2000

Similar documents
INTERNET-DRAFT The DNS TKEY RR April Abstract

Request for Comments: 3007 Updates: 2535, 2136 November 2000 Obsoletes: 2137 Category: Standards Track. Secure Domain Name System (DNS) Dynamic Update

Request for Comments: 2930 Category: Standards Track September 2000

Updates: 2535 November 2003 Category: Standards Track

Request for Comments: 2535 Obsoletes: 2065 March 1999 Updates: 2181, 1035, 1034 Category: Standards Track

Network Working Group. Category: Standards Track December 2001

Request for Comments: 3110 Obsoletes: 2537 May 2001 Category: Standards Track. RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)

September 1997 Expires March Storing Certificates in the Domain Name System

Expires: June 16, 2004 VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST December 17, 2003

Request for Comments: 2536 Category: Standards Track March DSA KEYs and SIGs in the Domain Name System (DNS)

Expires: November 15, 2004 VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST May 17, 2004

Expires: August 1998 February DNS Operational Security Considerations Status of This Document

Request for Comments: 2537 Category: Standards Track March RSA/MD5 KEYs and SIGs in the Domain Name System (DNS)

Iris Expires: 10 April October Domain Name System Security Extensions Status of This Document

November 1998 Expires May Storing Certificates in the Domain Name System (DNS)

Request for Comments: TIS Labs March Storing Certificates in the Domain Name System (DNS)

Expiration Date: July 1997 Randy Bush RGnet, Inc. January Clarifications to the DNS Specification. draft-ietf-dnsind-clarify-04.

Network Working Group Request for Comments: 2671 Category: Standards Track August 1999

Expiration Date: May 1997 Randy Bush RGnet, Inc. November Clarifications to the DNS Specification. draft-ietf-dnsind-clarify-02.

Request for Comments: 4255 Category: Standards Track SPARTA January Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints

Request for Comments: E. Brunner-Williams. Category: Best Current Practice. B. Manning ISI September 2000

Network Working Group

Intended status: Standards Track Expires: August 17, 2014 C. Griffiths Dyn R. Weber Nominum February 13, 2014

July Incremental Zone Transfer in DNS. Status of this Memo

E. Lewis ARIN September 23, KEY RR Secure Entry Point Flag draft-ietf-dnsext-keyrr-key-signing-flag-09. Status of this Memo

Internet Engineering Task Force (IETF) Request for Comments: Category: Best Current Practice ISSN: March 2017

Internet Engineering Task Force (IETF) Obsoletes: 2671, 2673 Category: Standards Track. April 2013

Network Working Group Request for Comments: 5702 Category: Standards Track October 2009

Request for Comments: 4509 Category: Standards Track May Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)

Network Working Group Request for Comments: 5155 Category: Standards Track Nominet D. Blacka VeriSign, Inc. March 2008

Request for Comments: 2672 Category: Standards Track August 1999

Request for Comments: 2539 Category: Standards Track March Storage of Diffie-Hellman Keys in the Domain Name System (DNS)

IPv6 How-To for a Registry 17th CENTR Technical Workshop

Internet Engineering Task Force (IETF) Request for Comments: E. Hunt ISC January 2019

Expiration Date: August 2003 February Access Control Prefix Router Advertisement Option for IPv6 draft-bellovin-ipv6-accessprefix-01.

DNS Security DNSSEC. * zo.net/papers/dnssec/dnss ec.html. IT352 Network Security Najwa AlGhamdi

Network Working Group Request for Comments: Category: Standards Track J. Westhead Microsoft Corp. R. Hall Lucent Technologies October 2003

Internet Engineering Task Force. Intended Status: Informational. Additional Reserved Top Level Domains draft-chapin-additional-reserved-tlds-00

Network Working Group. Updates: 1034, 1035, 1123 Category: Standards Track July 1997

Internet Engineering Task Force (IETF) Obsoletes: 5205 October 2016 Category: Standards Track ISSN:

Applicability Statement: DNS Security (DNSSEC) DNSKEY Algorithm Implementation Status

[MS-GSSA-Diff]: Generic Security Service Algorithm for Secret Key Transaction Authentication for DNS (GSS-TSIG) Protocol

draft-ietf-ipsec-nat-t-ike-01.txt W. Dixon, B. Swander Microsoft V. Volpe Cisco Systems L. DiBurro Nortel Networks 23 October 2001

Response Differences between NSD and other DNS Servers

Internet Engineering Task Force (IETF) April Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC

D. Crocker, Ed. Updates: RFC4871 June 10, 2009 (if approved) Intended status: Standards Track Expires: December 12, 2009

Point-to-Point Extensions Working Group Internet Draft April EAP SIM Authentication (Version 1) draft-haverinen-pppext-eap-sim-01.

Algorithm for DNSSEC Trusted Key Rollover

Network Working Group Request for Comments: Category: Best Current Practice October 2008

Internet-Draft Intended status: Experimental March 28, 2014 Expires: September 29, 2014

Network Working Group Request for Comments: 3090 Category: Standards Track March DNS Security Extension Clarification on Zone Status

draft-ietf-ipsec-nat-t-ike-00.txt W. Dixon, B. Swander Microsoft V. Volpe Cisco Systems L. DiBurro Nortel Networks 10 June 2001

Internet Engineering Task Force (IETF) Request for Comments: 7043 Category: Informational October 2013 ISSN:

Network Working Group. Category: Standards Track <draft-aboba-radius-iana-03.txt> 30 March 2003 Updates: RFC IANA Considerations for RADIUS

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo

This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026.

DNS Extensions Working Group. Intended status: Standards Track Expires: April 11, 2011 October 8, 2010

Expires in 6 months September Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP <draft-ietf-pkix-ocsp-00.

Copyright (c) 2013 IETF Trust and the persons identified as the document authors. All rights reserved.

Univ. of Sci. and Tech. Beijing. Intended status: Standards Track. T. Watteyne Analog Devices March 30, 2018

Network Working Group

Network Working Group. Updates: 1035 August 1996 Category: Standards Track

Internet Engineering Task Force (IETF) Updates: 1183 April 2010 Category: Standards Track ISSN:

DoCoMo Euro-Labs April Host Identity Protocol (HIP) Domain Name System (DNS) Extension

Intended Category: Standards Track Expires March 2006 September 2005

Expiration Date: July RGnet Tony Li Juniper Networks Yakov Rekhter. cisco Systems

Mutlticast DNS (mdns)

draft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo

Network Working Group. Category: Informational November 2007

Merit Network, Incorporated Bernard Aboba Microsoft March 1997

Internet Engineering Task Force (IETF) Request for Comments: 6725 Category: Standards Track August 2012 ISSN:

Operational Security Capabilities for IP Network Infrastructure

DNS. Some advanced topics. Karst Koymans. Informatics Institute University of Amsterdam. (version 17.2, 2017/09/25 12:41:57)

Internet Engineering Task Force Mark Baugher(Cisco) Expires: April, 2003 October, 2002

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 15 April 2001

Outline NET 412 NETWORK SECURITY PROTOCOLS. Reference: Lecture 7: DNS Security 3/28/2016

Hypertext Transfer Protocol: Access Control List draft-zhao-http-acl-00

Network Working Group Request for Comments: 3363 Updates: 2673, T. Hain Editors August 2002

Network Working Group. Obsoletes: draft-ietf-dhc-new-opt-msg-00.txt June 2000 Expires December 2000

Some advanced topics. Karst Koymans. Tuesday, September 16, 2014

draft-ietf-idn-idna-02.txt Internationalizing Host Names In Applications (IDNA) Status of this Memo

MIP4 Working Group. Generic Notification Message for Mobile IPv4 draft-ietf-mip4-generic-notification-message-16

Expires: October 9, 2005 April 7, 2005

Internet Engineering. DNS Message Format. Contents. Robert Elz.

IP Security Protocol Working Group (IPSEC) draft-ietf-ipsec-nat-t-ike-03.txt. B. Swander Microsoft V. Volpe Cisco Systems 24 June 2002

Request for Comments: Category: Informational October 1994

T.J. Watson Research Center IBM Corp Sue Thomson Bellcore. Dynamic Host Configuration Protocol for IPv6. draft-ietf-dhc-dhcpv6-01.

DNSSEC DNS SECURITY EXTENSIONS INTRODUCTION TO DNSSEC FOR SECURING DNS QUERIES AND INFORMATION

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track. Google July 2017

RFC 4871 DomainKeys Identified Mail (DKIM) Signatures -- Update draft-ietf-dkim-rfc4871-errata-03-01dc

Network Working Group. Intended status: Standards Track October 17, 2016 Expires: April 14, 2017

DNS. Karst Koymans & Niels Sijm. Friday, September 14, Informatics Institute University of Amsterdam

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 1 March 2001

Request for Comments: 5001 Category: Standards Track August 2007

Internet-Draft Intended status: Standards Track July 4, 2014 Expires: January 5, 2015

Network Working Group Internet-Draft August 2005 Expires: February 2, Atom Link No Follow draft-snell-atompub-feed-nofollow-03.

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson

GDS Resource Record: Generalization of the Delegation Signer Model

D. Crocker, Ed. Intended status: Standards Track January 25, 2009 Expires: July 29, 2009

An Overview of DNSSEC. Cesar Diaz! lacnic.net!

Transcription:

INTERNET-DRAFT UPDATES RFC 2535 Donald E. Eastlake 3rd Motorola Expires: October 2000 April 2000 DNS Request and Transaction Signatures ( SIG(0)s ) --- ------- --- ----------- ---------- - ------- - <draft-ietf-dnsext-sig-zero-01.txt> Status of This Document This draft is intended to become a Proposed Standard RFC updating Proposed Standard [RFC 2535]. Distribution of this document is unlimited. Comments should be sent to the DNS Working Group mailing list <namedroppers@internic.net> or to the author. This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months. Internet-Drafts may be updated, replaced, or obsoleted by other documents at any time. It is not appropriate to use Internet- Drafts as reference material or to cite them other than as a working draft or work in progress. The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. Abstract Extensions to the Domain Name System (DNS) are described in [RFC 2535] that can provide data origin and transaction integrity and authentication to security aware resolvers and applications through the use of cryptographic digital signatures. Implementation experience has indicated the need for minor but noninteroperable changes in Request and Transaction signature resource records ( SIG(0)s ). These changes are documented herein. D. Eastlake 3rd [Page 1]

Acknowledgments The significant contributions and suggestions of the following persons (in alphabetic order) to this draft are gratefully acknowledged: Olafur Gudmundsson Ed Lewis Brian Wellington Table of Contents Status of This Document...1 Abstract...1 Acknowledgments...2 Table of Contents...2 1. Introduction...3 2. SIG(0) Design Rationale...3 2.1 Transaction Authentication...3 2.2 Request Authentication...4 2.3 Keying...4 2.4 Differences Between TSIG and SIG(0)...4 3. The SIG(0) Resource Record...5 3.1 Calculating Request and Transaction SIGs...6 3.2 Processing Responses and SIG(0) RRs...7 3.3 SIG(0) Lifetime and Expiration...7 4. Security Considerations...7 5. IANA Considerations...8 References...8 Author s Address...9 Expiration and File Name...9 Appendix: SIG(0) Changes from RFC 2535...9 D. Eastlake 3rd [Page 2]

1. Introduction This document makes minor but non-interoperable changes to part of [RFC 2535], familiarity with which is assumed, and includes additional explanatory text. These changes concern SIG Resource Records (RRs) that are used to digitally sign DNS requests and transactions / responses. Such a resource record, because it has a type covered field of zero, is frequently called a SIG(0). The changes are based on implementation and attempted implementation experience with TSIG [draft-ietf-dnsext-tsig-*.txt] and the [RFC 2535] specification for SIG(0). Sections of [RFC 2535] updated are all of 4.1.8.1 and parts of 4.2 and 4.3. No changes are made herein related to the KEY or NXT RRs or to the processing involved with data origin and denial authentication for DNS data. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC 2119]. 2. SIG(0) Design Rationale SIG(0) provides protection for DNS transactions and requests that is not provided by the regular SIG, KEY, and NXT RRs specified in [RFC 2535]. The authenticated data origin services of secure DNS either provide protected data resource records (RRs) or authenticatably deny their nonexistence. These services provide no protection for glue records, DNS requests, no protection for message headers on requests or responses, and no protection of the overall integrity of a response. 2.1 Transaction Authentication Transaction authentication means that a requester can be sure it is at least getting the messages from the server it queried and that the received messages are in response to me query it sent. This is accomplished by optionally adding either a TSIG RR [draft-ietfdnsext-tsig-*.txt] or, as described herein, a SIG(0) resource record at the end of the response which digitally signs the concatenation of the server s response and the corresponding resolver query. D. Eastlake 3rd [Page 3]

2.2 Request Authentication Requests can also be authenticated by including a TSIG or, as described herein, a special SIG(0) RR at the end of the request. Authenticating requests serves no function in DNS servers the predate the specification of dynamic update. Requests with a non-empty additional information section produce error returns or may even be ignored by a few such older DNS servers. However, this syntax for signing requests is defined for authenticating dynamic update requests [RFC 2136], TKEY requests [draft-ietf-dnsext-tkey-*.txt], or future requests requiring authentication. 2.3 Keying The private keys used in transaction security belong to the host composing the DNS response message, not to the zone involved. Request authentication may also involve the private key of the host or other entity composing the request or of a zone to be affected by the request or other private keys depending on the request authority it is sought to establish. The corresponding public key(s) are normally stored in and retrieved from the DNS for verification as KEY RRs with a protocol byte of 3 (DNSSEC) or 255 (ANY). Because requests and replies are highly variable, message authentication SIGs can not be pre-calculated. Thus it will be necessary to keep the private key on-line, for example in software or in a directly connected piece of hardware. 2.4 Differences Between TSIG and SIG(0) There are significant differences between TSIG and SIG(0). Because TSIG involves secret keys installed at both the requester and server the presence of such a key implies that the other party understands TSIG and very likely has the same key installed. Furthermore, TSIG uses keyed hash authentication codes which are relatively inexpensive to compute. Thus it is common to authenticate requests with TSIG and responses are authenticated with TSIG if the corresponding request is authenticated. SIG(0) on the other hand, uses public key authentication, where the public keys are stored in DNS as KEY RRs and a private key is stored at the signer. Existence of such a KEY RR does not necessarily imply implementation of SIG(0). In addition, SIG(0) involves relatively expensive public key cryptographic operations that should be minimized and the verification of a SIG(0) involves obtaining and D. Eastlake 3rd [Page 4]

verifying the corresponding KEY which can be an expensive and lengthy operation. Indeed, a policy of using SIG(0) on all requests and verifying it before responding would, for some configurations, lead to a deadly embrace with the attempt to obtain and verify the KEY needed to authenticate the request SIG(0) resulting in additional requests accompanied by a SIG(0) leading to further requests accompanied by a SIG(0), etc. Furthermore, omitting SIG(0)s when not required on requests halves the number of public key operations required by the transaction. For these reasons, SIG(0)s SHOULD only be used on requests when necessary to authenticate that the requester has some required privilege or identity. SIG(0)s on replies are defined in such a way as to not require a SIG(0) on the corresponding request and still provide transaction protection. For other replies, whether they are authenticated by the server or required to be authenticated by the requester SHOULD be a local configuration option. 3. The SIG(0) Resource Record The structure of and type number of SIG resource records (RRs) is given in [RFC 2535] Section 4.1. However all of Section 4.1.8.1 and the parts of Sections 4.2 and 4.3 related to SIG(0) should be considered replaced by the material below. Any conflict between [RFC 2535] and this document concerning SIG(0) RRs should be resolved in favor of this document. For all transaction SIG(0)s, the signer field MUST be a name of the originating host and there MUST be a KEY RR at that name with the public key corresponding to the private key used to calculate the signature. (The host domain name used may be the inverse IP address mapping name for an IP address of the host if the relevant KEY is stored there.) For all SIG(0) RRs, the owner name, class, TTL, and original TTL, are meaningless. The TTL fields SHOULD be zero and the CLASS field SHOULD be ANY. To conserve space, the owner name SHOULD be root (a single zero octet). When SIG(0) authentication on a response is desired, that SIG RR must be considered the highest priority of any additional information for inclusion in the response. If the SIG(0) RR cannot be added without causing the message to be truncated, the server MUST alter the response so that a SIG(0) can be included. This response consists of only the question and a SIG(0) record, and has the TC bit set and RCODE 0 (NOERROR). The client should at this point retry the request using TCP. D. Eastlake 3rd [Page 5]

3.1 Calculating Request and Transaction SIGs A DNS request may be optionally signed by including one SIG(0)s at the end of the query additional information section. Such a SIG is identified by having a "type covered" field of zero. It signs the preceding DNS request message including DNS header but not including the UDP/IP header and before the request RR counts have been adjusted for the inclusions of the request SIG(0). It is calculated by using a "data" (see [RFC 2535], Section 4.1.8) of (1) the SIG s RDATA section omitting the signature subfield itself, (2) the entire DNS query messages, including DNS header, but not the UDP/IP header and before the reply RR counts have been adjusted for the inclusion of the SIG(0). That is data = RDATA request - SIG(0) where " " is concatenation and RDATA is the RDATA of the SIG(0) being calculated less the signature itself. Similarly, a SIG(0) can be used to secure a response and the request that produced it. Such transaction signatures are calculated by using a "data" of (1) the SIG s RDATA section omitting the signature itself, (2) the entire DNS query message that produced this response, including the query s DNS header but not its UDP/IP header, and (3) the entire DNS response message, including DNS header but not the UDP/IP header and before the response RR counts have been adjusted for the inclusion of the SIG(0). That is data = RDATA full query response - SIG(0) where " " is concatenation and RDATA is the RDATA of the SIG(0) being calculated less the signature itself. Verification of a response SIG(0) (which is signed by the server host key, not the zone key) by the requesting resolver shows that the query and response were not tampered with in transit, that the response corresponds to the intended query, and that the response comes from the queried server. In the case of a DNS message via TCP, a SIG(0) on the first data packet is calculated with "data" as above and for each subsequent packet, it is calculated as follows: data = RDATA DNS payload - SIG(0) previous packet where " " is concatenations, RDATA is as above, and previous packet is the previous DNS payload including DNS header and the SIG(0) but D. Eastlake 3rd [Page 6]

not the TCP/IP header. Support of SIG(0) for TCP is OPTIONAL. As an alternative, TSIG may be used after, if necessary, setting up a key with TKEY [draft-ietf-dnsext-tkey-*.txt]. Except where needed to authenticate an update, TKEY, or similar privileged request, servers are not required to check a request SIG(0). Note: requests and response can either have a single TSIG or one SIG(0) but not both a TSIG and a SIG(0). 3.2 Processing Responses and SIG(0) RRs If a SIG RR is at the end of the additional information section of a response and has a type covered of zero, it is a transaction signature covering the response and the query that produced the response. For TKEY responses, it MUST be checked and the message rejected if the checks fail unless otherwise specified for the TKEY mode in use. For all other responses, it MAY be checked and the message rejected if the checks fail. If a responses SIG(0) check succeed, such a transaction authentication SIG does NOT directly authenticate the validity any data-rrs in the message. However, it authenticates that they were sent by the queried server and have not been diddled. (Only a proper SIG(0) RR signed by the zone or a key tracing its authority to the zone or to static resolver configuration can directly authenticate data-rrs, depending on resolver policy.) If a resolver or server does not implement transaction and/or request SIGs, it MUST ignore them without error where they are optional and treat them as failing where they are required. 3.3 SIG(0) Lifetime and Expiration The inception and expiration times in SIG(0)s are for the purpose of resisting replay attacks. They should be set to form a time bracket such that messages outside that bracket can be ignored. In IP networks, this time bracket should not normally extend further than 5 minutes into the past and 5 minutes into the future. 4. Security Considerations No additional considerations beyond those in [RFC 2535]. D. Eastlake 3rd [Page 7]

The inclusion of the SIG(0) inception and expiration time under the signature improves resistance to replay attacks. 5. IANA Considerations No new parameters are created or parameter values assigned by the document. References [RFC 1982] - Robert Elz, Randy Bush, "Serial Number Arithmetic", 09/03/1996. [RFC 2119] - S. Bradner, "Key words for use in RFCs to Indicate Requirement Levels", March 1997. [RFC 2136] - P. Vixie, S. Thomson, Y. Rekhter, J. Bound, "Dynamic Updates in the Domain Name System (DNS UPDATE)", 04/21/1997. [RFC 2535] - D. Eastlake, "Domain Name System Security Extensions", March 1999. [draft-ietf-dnsext-tsig-*.txt] - P. Vixie, O. Gudmundsson, D. Eastlake, B. Wellington, "Secret Key Transaction Signatures for DNS (TSIG)". [draft-ietf-dnsext-tkey-*.txt] - D. Eastlake, "Secret Key Establishment for DNS (RR)". D. Eastlake 3rd [Page 8]

Author s Address Donald E. Eastlake 3rd Motorola 65 Shindegan Hill Road Carmel, NY 10512 USA Telephone: fax: email: +1-914-276-2668(h) +1-508-261-5434(w) +1-508-261-4447(w) Donald.Eastlake@motorola.com Expiration and File Name This draft expires October 2000. Its file name is draft-ietf-dnsext-sig-zero-01.txt. Appendix: SIG(0) Changes from RFC 2535 Add explanatory text concerning the differences between TSIG and SIG(0). Change the data over which SIG(0) is calculated to include the SIG(0) RDATA other than the signature itself so as to secure the signature inception and expiration times and resist replay attacks. Specify SIG(0) for TCP. Add discussion of appropriate inception and expiration times for SIG(0). Add working to indicate that either a TSIG or one or more SIG(0)s may be present but not both. Reword some areas for clarity. D. Eastlake 3rd [Page 9]