Commit 744c8422 authored by Mark Andrews's avatar Mark Andrews
Browse files

new draft

parent 26629641
This diff is collapsed.
This diff is collapsed.
......@@ -2,16 +2,16 @@
DNS Extensions O. Kolkman
Internet-Draft RIPE NCC
Expires: July 4, 2003 J. Schlyter
Expires: August 18, 2003 J. Schlyter
Carlstedt Research &
Technology
E. Lewis
ARIN
January 3, 2003
February 17, 2003
KEY RR Key-Signing Key (KSK) Flag
draft-ietf-dnsext-keyrr-key-signing-flag-05
draft-ietf-dnsext-keyrr-key-signing-flag-06
Status of this Memo
......@@ -19,9 +19,8 @@ Status of this Memo
all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Task Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
......@@ -34,7 +33,7 @@ Status of this Memo
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on July 4, 2003.
This Internet-Draft will expire on August 18, 2003.
Copyright Notice
......@@ -42,19 +41,20 @@ Copyright Notice
Abstract
With the DS resource record the concept of key-signing and zone-
signing keys has been introduced. During key-exchanges with the
parent there is a need to differentiate between these zone- and key-
signing keys. We propose a flag to indicate which key is used as
With the DS resource record the concept of key-signing and
zone-signing keys has been introduced. During key-exchanges with the
parent there is a need to differentiate between these zone- and
key-signing keys. We propose a flag to indicate which key is used as
key-signing key.
Kolkman, et al. Expires July 4, 2003 [Page 1]
Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
Kolkman, et al. Expires August 18, 2003 [Page 1]
Internet-Draft KEY RR Key-Signing Key (KSK) Flag February 2003
Table of Contents
......@@ -65,18 +65,19 @@ Table of Contents
4. Operational Guidelines . . . . . . . . . . . . . . . . . . . . 4
5. Security Considerations . . . . . . . . . . . . . . . . . . . 5
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
7. Internationalization Considerations . . . . . . . . . . . . . 6
7. Internationalization Considerations . . . . . . . . . . . . . 5
8. Document Changes . . . . . . . . . . . . . . . . . . . . . . . 6
8.1 draft version 00 -> 01 . . . . . . . . . . . . . . . . . . . . 6
8.2 draft version 01 -> 02 . . . . . . . . . . . . . . . . . . . . 6
8.3 draft version 02 -> 03 . . . . . . . . . . . . . . . . . . . . 6
8.4 draft version 03 -> 04 . . . . . . . . . . . . . . . . . . . . 6
8.5 draft version 04 -> 05 . . . . . . . . . . . . . . . . . . . . 7
8.5 draft version 04 -> 05 . . . . . . . . . . . . . . . . . . . . 6
8.6 draft version 05 -> 06 . . . . . . . . . . . . . . . . . . . . 7
9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 7
Normative References . . . . . . . . . . . . . . . . . . . . . 7
Informative References . . . . . . . . . . . . . . . . . . . . 7
Informative References . . . . . . . . . . . . . . . . . . . . 8
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 8
Full Copyright Statement . . . . . . . . . . . . . . . . . . . 9
Intellectual Property and Copyright Statements . . . . . . . . 9
......@@ -107,10 +108,9 @@ Table of Contents
Kolkman, et al. Expires August 18, 2003 [Page 2]
Kolkman, et al. Expires July 4, 2003 [Page 2]
Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
Internet-Draft KEY RR Key-Signing Key (KSK) Flag February 2003
1. Introduction
......@@ -164,13 +164,12 @@ Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
Kolkman, et al. Expires July 4, 2003 [Page 3]
Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
Kolkman, et al. Expires August 18, 2003 [Page 3]
Internet-Draft KEY RR Key-Signing Key (KSK) Flag February 2003
2. The Key-Signing Key (KSK) Flag
2. The Key-Signing Key (KSK) Flag
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
......@@ -186,25 +185,26 @@ Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
KEY RR Format
The KSK bit (TBD) in the flags field is assigned to be the key-
signing key flag. If the the bit is set to 1 the key is intended to
be used as key-signing key. No special meaning should be assigned to
the bit is set to 0. The draft proposes using the current 15th bit
[1] as the KSK bit. This way operators can recognize the key-signing
by the even or odd-ness of the decimal representation of the flag
field.
The KSK bit (TBD) in the flags field is assigned to be the
key-signing key flag. If the the bit is set to 1 the key is intended
to be used as key-signing key. One SHOULD NOT assign special meaning
to the key if the bit is set to 0. The document proposes using the
current 15th bit [1] as the KSK bit. This way operators can recognize
the key-signing by the even or odd-ness of the decimal representation
of the flag field.
3. DNSSEC Protocol Changes
The use of the KSK flag does not change the DNS resolution and
resolution protocol. The KSK flag is only used to provide a hint
about the different administrative properties and MUST NOT be used
during the resolving and verification process.
The bit MUST NOT be used during the resolving and verification
process. The KSK flag is only used to provide a hint about the
different administrative properties of the key and therefore the use
of the KSK flag does not change the DNS resolution and resolution
protocol.
4. Operational Guidelines
The KSK bit is set by the key-generator and used by the zone signer:
The KSK bit is used to indicate that the key represented in the KEY
RR is intended to sign the KEY RR set of the zone. As the KSK bit is
within the data that is used to compute a KEY RR's footprint,
......@@ -216,21 +216,21 @@ Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
parent zone to build the authentication chain or if the public key is
to be distributed for static configuration in verifiers.
When signing a zone, it is intended that a key with the KSK bit set
When signing a zone, it is intended that the key(s) with the KSK bit
Kolkman, et al. Expires July 4, 2003 [Page 4]
Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
Kolkman, et al. Expires August 18, 2003 [Page 4]
Internet-Draft KEY RR Key-Signing Key (KSK) Flag February 2003
be used to sign the KEY RR set of the zone. The same key can be used
to sign the rest of the zone data too. It is conceivable that not
all keys with a KSK bit set will sign the KEY RR set, such keys might
be pending retirement or not yet in use.
When verifying an RR set, the KSK bit is not intended to play a role.
set (if such keys exist) are used to sign the KEY RR set of the zone.
The same key can be used to sign the rest of the zone data too. It
is conceivable that not all keys with a KSK bit set will sign the KEY
RR set, such keys might be pending retirement or not yet in use.
When verifying a RR set, the KSK bit is not intended to play a role.
How the key is used by the verifier is not intended to be a
consideration at key creation time.
......@@ -245,10 +245,10 @@ Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
5. Security Considerations
As stated in Section 3 the flag is not to used in the resolution
protocol or to determine the security status of a key. The flag is
to be used for administrative purposes only.
protocol or to determine the security status of a key. The flag is to
be used for administrative purposes only.
No trust in a key should be inferred from this flag - trust must be
No trust in a key should be inferred from this flag - trust MUST be
inferred from an existing chain of trust or an out-of-band exchange.
Since this flag might be used for automating key exchanges, we think
......@@ -271,19 +271,17 @@ Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
the 15'th bit as the KSK bit; the decimal representation of the
flagfield will then be odd for key-signing keys.
7. Internationalization Considerations
Kolkman, et al. Expires August 18, 2003 [Page 5]
Kolkman, et al. Expires July 4, 2003 [Page 5]
Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
Internet-Draft KEY RR Key-Signing Key (KSK) Flag February 2003
7. Internationalization Considerations
There are no internationalization considerations
There are no internationalization considerations.
8. Document Changes
......@@ -295,8 +293,8 @@ Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
Added explicit warning for replay attacks to the security section;
Removed the text that hinted on a distinction between a key-
signing key configured in resolvers and in parent zones.
Removed the text that hinted on a distinction between a
key-signing key configured in resolvers and in parent zones.
8.2 draft version 01 -> 02
......@@ -317,27 +315,40 @@ Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
suggest to use a particular type of registry and that it is clear
that a key registry is only one of the defences possible.
Spelling and style corrections
Spelling and style corrections.
8.4 draft version 03 -> 04
Text has been made consistent with the statement: ' No special
Text has been made consistent with the statement: 'No special
meaning should be assigned to the bit not being set.'
Made explicit that the keytag changes in SIG RR.
8.5 draft version 04 -> 05
One occurrence of must and one occurrence of should uppercased
Kolkman, et al. Expires July 4, 2003 [Page 6]
Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
Kolkman, et al. Expires August 18, 2003 [Page 6]
Internet-Draft KEY RR Key-Signing Key (KSK) Flag February 2003
8.5 draft version 04 -> 05
(RFC2119).
Reordering of sentences in section 3, so that the point of the bit
NOT being used in resolving is made directly.
To make explicit that the KSK is used at key generation and at
signing time I added the first sentence to section 4.
Some minor style and spelling corrections.
8.6 draft version 05 -> 06
References and acronyms where stripped from the Abstract. the
Introduction and the the Operational Guideline section were
......@@ -352,8 +363,8 @@ Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
9. Acknowledgements
The ideas documented in this draft are inspired by communications we
had with numerous people and ideas published by other folk. Among
The ideas documented in this document are inspired by communications
we had with numerous people and ideas published by other folk. Among
others Mark Andrews, Olafur Gudmundsson, Daniel Karrenberg, Dan
Massey, Marcos Sanz and Sam Weiler have contributed ideas and
provided feedback.
......@@ -374,23 +385,24 @@ Normative References
2535, March 1999.
[4] Lewis, E., "DNS Security Extension Clarification on Zone
Status", RFC 3090, March 2001.
Informative References
[5] Gudmundsson, O., "Delegation Signer Resource Record", draft-
ietf-dnsext-delegation-signer-12 (work in progress), December
2002.
[6] Orwell, G. and R. Steadman (illustrator), "Animal Farm; a Fairy
Story"", ISBN 0151002177 (50th anniversery edition), April 1996.
Kolkman, et al. Expires August 18, 2003 [Page 7]
Internet-Draft KEY RR Key-Signing Key (KSK) Flag February 2003
Status", RFC 3090, March 2001.
Kolkman, et al. Expires July 4, 2003 [Page 7]
Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
Informative References
[5] Gudmundsson, O., "Delegation Signer Resource Record",
draft-ietf-dnsext-delegation-signer-12 (work in progress),
December 2002.
[6] Orwell, G. and R. Steadman (illustrator), "Animal Farm; a Fairy
Story"", ISBN 0151002177 (50th anniversery edition), April 1996.
Authors' Addresses
......@@ -432,21 +444,32 @@ Authors' Addresses
Kolkman, et al. Expires August 18, 2003 [Page 8]
Internet-Draft KEY RR Key-Signing Key (KSK) Flag February 2003
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
intellectual property or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; neither does it represent that it
has made any effort to identify any such rights. Information on the
IETF's procedures with respect to rights in standards-track and
standards-related documentation can be found in BCP-11. Copies of
claims of rights made available for publication and any assurances of
licenses to be made available, or the result of an attempt made to
obtain a general license or permission for the use of such
proprietary rights by implementors or users of this specification can
be obtained from the IETF Secretariat.
Kolkman, et al. Expires July 4, 2003 [Page 8]
Internet-Draft KEY RR Key-Signing Key (KSK) Flag January 2003
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights which may cover technology that may be required to practice
this standard. Please address the information to the IETF Executive
Director.
Full Copyright Statement
......@@ -468,15 +491,24 @@ Full Copyright Statement
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
revoked by the Internet Society or its successors or assignees.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
Kolkman, et al. Expires August 18, 2003 [Page 9]
Internet-Draft KEY RR Key-Signing Key (KSK) Flag February 2003
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
......@@ -500,5 +532,29 @@ Acknowledgement
Kolkman, et al. Expires July 4, 2003 [Page 9]
Kolkman, et al. Expires August 18, 2003 [Page 10]
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment