1
2
3
4
5
6
7Network Working Group R. Arends
8Request for Comments: 4956 Nominet
9Category: Experimental M. Kosters
10 D. Blacka
11 VeriSign, Inc.
12 July 2007
13
14
15 DNS Security (DNSSEC) Opt-In
16
17Status of This Memo
18
19 This memo defines an Experimental Protocol for the Internet
20 community. It does not specify an Internet standard of any kind.
21 Discussion and suggestions for improvement are requested.
22 Distribution of this memo is unlimited.
23
24Copyright Notice
25
26 Copyright (C) The IETF Trust (2007).
27
28Abstract
29
30 In the DNS security (DNSSEC) extensions, delegations to unsigned
31 subzones are cryptographically secured. Maintaining this
32 cryptography is not always practical or necessary. This document
33 describes an experimental "Opt-In" model that allows administrators
34 to omit this cryptography and manage the cost of adopting DNSSEC with
35 large zones.
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58Arends, et al. Experimental [Page 1]
59
60RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
61
62
63Table of Contents
64
65 1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
66 2. Definitions and Terminology . . . . . . . . . . . . . . . . . 3
67 3. Experimental Status . . . . . . . . . . . . . . . . . . . . . 4
68 4. Protocol Additions . . . . . . . . . . . . . . . . . . . . . . 5
69 4.1. Server Considerations . . . . . . . . . . . . . . . . . . 6
70 4.1.1. Delegations Only . . . . . . . . . . . . . . . . . . . 6
71 4.1.2. Insecure Delegation Responses . . . . . . . . . . . . 6
72 4.1.3. Dynamic Update . . . . . . . . . . . . . . . . . . . . 6
73 4.2. Client Considerations . . . . . . . . . . . . . . . . . . 7
74 4.2.1. Delegations Only . . . . . . . . . . . . . . . . . . . 7
75 4.2.2. Validation Process Changes . . . . . . . . . . . . . . 7
76 4.2.3. NSEC Record Caching . . . . . . . . . . . . . . . . . 8
77 4.2.4. Use of the AD bit . . . . . . . . . . . . . . . . . . 8
78 5. Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
79 6. Example . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
80 7. Transition Issues . . . . . . . . . . . . . . . . . . . . . . 11
81 8. Security Considerations . . . . . . . . . . . . . . . . . . . 11
82 9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 13
83 10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 13
84 10.1. Normative References . . . . . . . . . . . . . . . . . . . 13
85 10.2. Informative References . . . . . . . . . . . . . . . . . . 13
86 Appendix A. Implementing Opt-In Using "Views" . . . . . . . . . . 15
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114Arends, et al. Experimental [Page 2]
115
116RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
117
118
1191. Overview
120
121 The cost to cryptographically secure delegations to unsigned zones is
122 high for large delegation-centric zones and zones where insecure
123 delegations will be updated rapidly. For these zones, the costs of
124 maintaining the NextSECure (NSEC) record chain may be extremely high
125 relative to the gain of cryptographically authenticating existence of
126 unsecured zones.
127
128 This document describes an experimental method of eliminating the
129 superfluous cryptography present in secure delegations to unsigned
130 zones. Using "Opt-In", a zone administrator can choose to remove
131 insecure delegations from the NSEC chain. This is accomplished by
132 extending the semantics of the NSEC record by using a redundant bit
133 in the type map.
134
1352. Definitions and Terminology
136
137 Throughout this document, familiarity with the DNS system (RFC 1035
138 [1]), DNS security extensions ([4], [5], and [6], referred to in this
139 document as "standard DNSSEC"), and DNSSEC terminology (RFC 3090
140 [10]) is assumed.
141
142 The following abbreviations and terms are used in this document:
143
144 RR: is used to refer to a DNS resource record.
145
146 RRset: refers to a Resource Record Set, as defined by [8]. In this
147 document, the RRset is also defined to include the covering RRSIG
148 records, if any exist.
149
150 signed name: refers to a DNS name that has, at minimum, a (signed)
151 NSEC record.
152
153 unsigned name: refers to a DNS name that does not (at least) have an
154 NSEC record.
155
156 covering NSEC record/RRset: is the NSEC record used to prove
157 (non)existence of a particular name or RRset. This means that for
158 a RRset or name 'N', the covering NSEC record has the name 'N', or
159 has an owner name less than 'N' and "next" name greater than 'N'.
160
161 delegation: refers to an NS RRset with a name different from the
162 current zone apex (non-zone-apex), signifying a delegation to a
163 subzone.
164
165
166
167
168
169
170Arends, et al. Experimental [Page 3]
171
172RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
173
174
175 secure delegation: refers to a signed name containing a delegation
176 (NS RRset), and a signed DS RRset, signifying a delegation to a
177 signed subzone.
178
179 insecure delegation: refers to a signed name containing a delegation
180 (NS RRset), but lacking a DS RRset, signifying a delegation to an
181 unsigned subzone.
182
183 Opt-In insecure delegation: refers to an unsigned name containing
184 only a delegation NS RRset. The covering NSEC record uses the
185 Opt-In methodology described in this document.
186
187 The key words "MUST, "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
188 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY, and "OPTIONAL" in this
189 document are to be interpreted as described in RFC 2119 [2].
190
1913. Experimental Status
192
193 This document describes an EXPERIMENTAL extension to DNSSEC. It
194 interoperates with non-experimental DNSSEC using the technique
195 described in [7]. This experiment is identified with the following
196 private algorithms (using algorithm 253):
197
198 "3.optin.verisignlabs.com": is an alias for DNSSEC algorithm 3, DSA,
199 and
200
201 "5.optin.verisignlabs.com": is an alias for DNSSEC algorithm 5,
202 RSASHA1.
203
204 Servers wishing to sign and serve zones that utilize Opt-In MUST sign
205 the zone with only one or more of these private algorithms and MUST
206 NOT use any other algorithms.
207
208 Resolvers MUST NOT apply the Opt-In validation rules described in
209 this document unless a zone is signed using one or more of these
210 private algorithms.
211
212 This experimental protocol relaxes the restriction that validators
213 MUST ignore the setting of the NSEC bit in the type map as specified
214 in RFC 4035 [6] Section 5.4.
215
216 The remainder of this document assumes that the servers and resolvers
217 involved are aware of and are involved in this experiment.
218
219
220
221
222
223
224
225
226Arends, et al. Experimental [Page 4]
227
228RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
229
230
2314. Protocol Additions
232
233 In DNSSEC, delegation NS RRsets are not signed, but are instead
234 accompanied by an NSEC RRset of the same name and (possibly) a DS
235 record. The security status of the subzone is determined by the
236 presence or absence of the DS RRset, cryptographically proven by the
237 NSEC record. Opt-In expands this definition by allowing insecure
238 delegations to exist within an otherwise signed zone without the
239 corresponding NSEC record at the delegation's owner name. These
240 insecure delegations are proven insecure by using a covering NSEC
241 record.
242
243 Since this represents a change of the interpretation of NSEC records,
244 resolvers must be able to distinguish between RFC standard DNSSEC
245 NSEC records and Opt-In NSEC records. This is accomplished by
246 "tagging" the NSEC records that cover (or potentially cover) insecure
247 delegation nodes. This tag is indicated by the absence of the NSEC
248 bit in the type map. Since the NSEC bit in the type map merely
249 indicates the existence of the record itself, this bit is redundant
250 and safe for use as a tag.
251
252 An Opt-In tagged NSEC record does not assert the (non)existence of
253 the delegations that it covers (except for a delegation with the same
254 name). This allows for the addition or removal of these delegations
255 without recalculating or resigning records in the NSEC chain.
256 However, Opt-In tagged NSEC records do assert the (non)existence of
257 other RRsets.
258
259 An Opt-In NSEC record MAY have the same name as an insecure
260 delegation. In this case, the delegation is proven insecure by the
261 lack of a DS bit in the type map, and the signed NSEC record does
262 assert the existence of the delegation.
263
264 Zones using Opt-In MAY contain a mixture of Opt-In tagged NSEC
265 records and standard DNSSEC NSEC records. If an NSEC record is not
266 Opt-In, there MUST NOT be any insecure delegations (or any other
267 records) between it and the RRsets indicated by the 'next domain
268 name' in the NSEC RDATA. If it is Opt-In, there MUST only be
269 insecure delegations between it and the next node indicated by the
270 'next domain name' in the NSEC RDATA.
271
272 In summary,
273
274 o An Opt-In NSEC type is identified by a zero-valued (or not-
275 specified) NSEC bit in the type bit map of the NSEC record.
276
277
278
279
280
281
282Arends, et al. Experimental [Page 5]
283
284RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
285
286
287 o A standard DNSSEC NSEC type is identified by a one-valued NSEC bit
288 in the type bit map of the NSEC record.
289
290 and
291
292 o An Opt-In NSEC record does not assert the non-existence of a name
293 between its owner name and "next" name, although it does assert
294 that any name in this span MUST be an insecure delegation.
295
296 o An Opt-In NSEC record does assert the (non)existence of RRsets
297 with the same owner name.
298
2994.1. Server Considerations
300
301 Opt-In imposes some new requirements on authoritative DNS servers.
302
3034.1.1. Delegations Only
304
305 This specification dictates that only insecure delegations may exist
306 between the owner and "next" names of an Opt-In tagged NSEC record.
307 Signing tools MUST NOT generate signed zones that violate this
308 restriction. Servers MUST refuse to load and/or serve zones that
309 violate this restriction. Servers also MUST reject AXFR or IXFR
310 responses that violate this restriction.
311
3124.1.2. Insecure Delegation Responses
313
314 When returning an Opt-In insecure delegation, the server MUST return
315 the covering NSEC RRset in the Authority section.
316
317 In standard DNSSEC, NSEC records already must be returned along with
318 the insecure delegation. The primary difference that this proposal
319 introduces is that the Opt-In tagged NSEC record will have a
320 different owner name from the delegation RRset. This may require
321 implementations to search for the covering NSEC RRset.
322
3234.1.3. Dynamic Update
324
325 Opt-In changes the semantics of Secure DNS Dynamic Update [9]. In
326 particular, it introduces the need for rules that describe when to
327 add or remove a delegation name from the NSEC chain. This document
328 does not attempt to define these rules. Until these rules are
329 defined, servers MUST NOT process DNS Dynamic Update requests against
330 zones that use Opt-In NSEC records. Servers SHOULD return responses
331 to update requests with RCODE=REFUSED.
332
333
334
335
336
337
338Arends, et al. Experimental [Page 6]
339
340RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
341
342
3434.2. Client Considerations
344
345 Opt-In imposes some new requirements on security-aware resolvers
346 (caching or otherwise).
347
3484.2.1. Delegations Only
349
350 As stated in Section 4.1 above, this specification restricts the
351 namespace covered by Opt-In tagged NSEC records to insecure
352 delegations only. Clients are not expected to take any special
353 measures to enforce this restriction; instead, it forms an underlying
354 assumption that clients may rely on.
355
3564.2.2. Validation Process Changes
357
358 This specification does not change the resolver's resolution
359 algorithm. However, it does change the DNSSEC validation process.
360
3614.2.2.1. Referrals
362
363 Resolvers MUST be able to use Opt-In tagged NSEC records to
364 cryptographically prove the validity and security status (as
365 insecure) of a referral. Resolvers determine the security status of
366 the referred-to zone as follows:
367
368 o In standard DNSSEC, the security status is proven by the existence
369 or absence of a DS RRset at the same name as the delegation. The
370 existence of the DS RRset indicates that the referred-to zone is
371 signed. The absence of the DS RRset is proven using a verified
372 NSEC record of the same name that does not have the DS bit set in
373 the type map. This NSEC record MAY also be tagged as Opt-In.
374
375 o Using Opt-In, the security status is proven by the existence of a
376 DS record (for signed) or the presence of a verified Opt-In tagged
377 NSEC record that covers the delegation name. That is, the NSEC
378 record does not have the NSEC bit set in the type map, and the
379 delegation name falls between the NSEC's owner and "next" name.
380
381 Using Opt-In does not substantially change the nature of following
382 referrals within DNSSEC. At every delegation point, the resolver
383 will have cryptographic proof that the referred-to subzone is signed
384 or unsigned.
385
3864.2.2.2. Queries for DS Resource Records
387
388 Since queries for DS records are directed to the parent side of a
389 zone cut (see [5], Section 5), negative responses to these queries
390 may be covered by an Opt-In flagged NSEC record.
391
392
393
394Arends, et al. Experimental [Page 7]
395
396RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
397
398
399 Resolvers MUST be able to use Opt-In tagged NSEC records to
400 cryptographically prove the validity and security status of negative
401 responses to queries for DS records. In particular, a NOERROR/NODATA
402 (i.e., RCODE=3, but the answer section is empty) response to a DS
403 query may be proven by an Opt-In flagged covering NSEC record, rather
404 than an NSEC record matching the query name.
405
4064.2.3. NSEC Record Caching
407
408 Caching resolvers MUST be able to retrieve the appropriate covering
409 Opt-In NSEC record when returning referrals that need them. This
410 requirement differs from standard DNSSEC in that the covering NSEC
411 will not have the same owner name as the delegation. Some
412 implementations may have to use new methods for finding these NSEC
413 records.
414
4154.2.4. Use of the AD bit
416
417 The AD bit, as defined by [3] and [6], MUST NOT be set when:
418
419 o sending a Name Error (RCODE=3) response where the covering NSEC is
420 tagged as Opt-In.
421
422 o sending an Opt-In insecure delegation response, unless the
423 covering (Opt-In) NSEC record's owner name equals the delegation
424 name.
425
426 o sending a NOERROR/NODATA response when query type is DS and the
427 covering NSEC is tagged as Opt-In, unless NSEC record's owner name
428 matches the query name.
429
430 This rule is based on what the Opt-In NSEC record actually proves:
431 for names that exist between the Opt-In NSEC record's owner and
432 "next" names, the Opt-In NSEC record cannot prove the non-existence
433 or existence of the name. As such, not all data in the response has
434 been cryptographically verified, so the AD bit cannot be set.
435
4365. Benefits
437
438 Using Opt-In allows administrators of large and/or changing
439 delegation-centric zones to minimize the overhead involved in
440 maintaining the security of the zone.
441
442 Opt-In accomplishes this by eliminating the need for NSEC records for
443 insecure delegations. This, in a zone with a large number of
444 delegations to unsigned subzones, can lead to substantial space
445 savings (both in memory and on disk). Additionally, Opt-In allows
446 for the addition or removal of insecure delegations without modifying
447
448
449
450Arends, et al. Experimental [Page 8]
451
452RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
453
454
455 the NSEC record chain. Zones that are frequently updating insecure
456 delegations (e.g., Top-Level Domains (TLDs)) can avoid the
457 substantial overhead of modifying and resigning the affected NSEC
458 records.
459
4606. Example
461
462 Consider the zone EXAMPLE shown below. This is a zone where all of
463 the NSEC records are tagged as Opt-In.
464
465 Example A: Fully Opt-In Zone.
466
467 EXAMPLE. SOA ...
468 EXAMPLE. RRSIG SOA ...
469 EXAMPLE. NS FIRST-SECURE.EXAMPLE.
470 EXAMPLE. RRSIG NS ...
471 EXAMPLE. DNSKEY ...
472 EXAMPLE. RRSIG DNSKEY ...
473 EXAMPLE. NSEC FIRST-SECURE.EXAMPLE. (
474 SOA NS RRSIG DNSKEY )
475 EXAMPLE. RRSIG NSEC ...
476
477 FIRST-SECURE.EXAMPLE. A ...
478 FIRST-SECURE.EXAMPLE. RRSIG A ...
479 FIRST-SECURE.EXAMPLE. NSEC NOT-SECURE-2.EXAMPLE. A RRSIG
480 FIRST-SECURE.EXAMPLE. RRSIG NSEC ...
481
482 NOT-SECURE.EXAMPLE. NS NS.NOT-SECURE.EXAMPLE.
483 NS.NOT-SECURE.EXAMPLE. A ...
484
485 NOT-SECURE-2.EXAMPLE. NS NS.NOT-SECURE.EXAMPLE.
486 NOT-SECURE-2.EXAMPLE NSEC SECOND-SECURE.EXAMPLE NS RRSIG
487 NOT-SECURE-2.EXAMPLE RRSIG NSEC ...
488
489 SECOND-SECURE.EXAMPLE. NS NS.ELSEWHERE.
490 SECOND-SECURE.EXAMPLE. DS ...
491 SECOND-SECURE.EXAMPLE. RRSIG DS ...
492 SECOND-SECURE.EXAMPLE. NSEC EXAMPLE. NS RRSIG DNSKEY
493 SECOND-SECURE.EXAMPLE. RRSIG NSEC ...
494
495 UNSIGNED.EXAMPLE. NS NS.UNSIGNED.EXAMPLE.
496 NS.UNSIGNED.EXAMPLE. A ...
497
498
499 Example A.
500
501
502
503
504
505
506Arends, et al. Experimental [Page 9]
507
508RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
509
510
511 In this example, a query for a signed RRset (e.g., "FIRST-
512 SECURE.EXAMPLE A") or a secure delegation ("WWW.SECOND-SECURE.EXAMPLE
513 A") will result in a standard DNSSEC response.
514
515 A query for a nonexistent RRset will result in a response that
516 differs from standard DNSSEC by the following: the NSEC record will
517 be tagged as Opt-In, there may be no NSEC record proving the non-
518 existence of a matching wildcard record, and the AD bit will not be
519 set.
520
521 A query for an insecure delegation RRset (or a referral) will return
522 both the answer (in the Authority section) and the corresponding
523 Opt-In NSEC record to prove that it is not secure.
524
525 Example A.1: Response to query for WWW.UNSIGNED.EXAMPLE. A
526
527
528 RCODE=NOERROR, AD=0
529
530 Answer Section:
531
532 Authority Section:
533 UNSIGNED.EXAMPLE. NS NS.UNSIGNED.EXAMPLE
534 SECOND-SECURE.EXAMPLE. NSEC EXAMPLE. NS RRSIG DS
535 SECOND-SECURE.EXAMPLE. RRSIG NSEC ...
536
537 Additional Section:
538 NS.UNSIGNED.EXAMPLE. A ...
539
540 Example A.1
541
542 In the Example A.1 zone, the EXAMPLE. node MAY use either style of
543 NSEC record, because there are no insecure delegations that occur
544 between it and the next node, FIRST-SECURE.EXAMPLE. In other words,
545 Example A would still be a valid zone if the NSEC record for EXAMPLE.
546 was changed to the following RR:
547
548 EXAMPLE. NSEC FIRST-SECURE.EXAMPLE. (SOA NS
549 RRSIG DNSKEY NSEC )
550
551 However, the other NSEC records (FIRST-SECURE.EXAMPLE. and SECOND-
552 SECURE.EXAMPLE.) MUST be tagged as Opt-In because there are insecure
553 delegations in the range they define. (NOT-SECURE.EXAMPLE. and
554 UNSIGNED.EXAMPLE., respectively).
555
556 NOT-SECURE-2.EXAMPLE. is an example of an insecure delegation that is
557 part of the NSEC chain and also covered by an Opt-In tagged NSEC
558 record. Because NOT-SECURE-2.EXAMPLE. is a signed name, it cannot be
559
560
561
562Arends, et al. Experimental [Page 10]
563
564RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
565
566
567 removed from the zone without modifying and resigning the prior NSEC
568 record. Delegations with names that fall between NOT-SECURE-
569 2.EXAMPLE. and SECOND-SECURE.EXAMPLE. may be added or removed without
570 resigning any NSEC records.
571
5727. Transition Issues
573
574 Opt-In is not backwards compatible with standard DNSSEC and is
575 considered experimental. Standard DNSSEC-compliant implementations
576 would not recognize Opt-In tagged NSEC records as different from
577 standard NSEC records. Because of this, standard DNSSEC
578 implementations, if they were to validate Opt-In style responses,
579 would reject all Opt-In insecure delegations within a zone as
580 invalid. However, by only signing with private algorithms, standard
581 DNSSEC implementations will treat Opt-In responses as unsigned.
582
583 It should be noted that all elements in the resolution path between
584 (and including) the validator and the authoritative name server must
585 be aware of the Opt-In experiment and implement the Opt-In semantics
586 for successful validation to be possible. In particular, this
587 includes any caching middleboxes between the validator and
588 authoritative name server.
589
5908. Security Considerations
591
592 Opt-In allows for unsigned names, in the form of delegations to
593 unsigned subzones, to exist within an otherwise signed zone. All
594 unsigned names are, by definition, insecure, and their validity or
595 existence cannot be cryptographically proven.
596
597 In general:
598
599 o Records with unsigned names (whether or not existing) suffer from
600 the same vulnerabilities as records in an unsigned zone. These
601 vulnerabilities are described in more detail in [12] (note in
602 particular Sections 2.3, "Name Games" and 2.6, "Authenticated
603 Denial").
604
605 o Records with signed names have the same security whether or not
606 Opt-In is used.
607
608 Note that with or without Opt-In, an insecure delegation may have its
609 contents undetectably altered by an attacker. Because of this, the
610 primary difference in security that Opt-In introduces is the loss of
611 the ability to prove the existence or nonexistence of an insecure
612 delegation within the span of an Opt-In NSEC record.
613
614
615
616
617
618Arends, et al. Experimental [Page 11]
619
620RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
621
622
623 In particular, this means that a malicious entity may be able to
624 insert or delete records with unsigned names. These records are
625 normally NS records, but this also includes signed wildcard
626 expansions (while the wildcard record itself is signed, its expanded
627 name is an unsigned name), which can be undetectably removed or used
628 to replace an existing unsigned delegation.
629
630 For example, if a resolver received the following response from the
631 example zone above:
632
633 Example S.1: Response to query for WWW.DOES-NOT-EXIST.EXAMPLE. A
634
635 RCODE=NOERROR
636
637 Answer Section:
638
639 Authority Section:
640 DOES-NOT-EXIST.EXAMPLE. NS NS.FORGED.
641 EXAMPLE. NSEC FIRST-SECURE.EXAMPLE. SOA NS \
642 RRSIG DNSKEY
643 EXAMPLE. RRSIG NSEC ...
644
645 Additional Section:
646
647
648 Attacker has forged a name
649
650 The resolver would have no choice but to believe that the referral to
651 NS.FORGED. is valid. If a wildcard existed that would have been
652 expanded to cover "WWW.DOES-NOT-EXIST.EXAMPLE.", an attacker could
653 have undetectably removed it and replaced it with the forged
654 delegation.
655
656 Note that being able to add a delegation is functionally equivalent
657 to being able to add any record type: an attacker merely has to forge
658 a delegation to the nameserver under his/her control and place
659 whatever records are needed at the subzone apex.
660
661 While in particular cases, this issue may not present a significant
662 security problem, in general it should not be lightly dismissed.
663 Therefore, it is strongly RECOMMENDED that Opt-In be used sparingly.
664 In particular, zone signing tools SHOULD NOT default to Opt-In, and
665 MAY choose not to support Opt-In at all.
666
667
668
669
670
671
672
673
674Arends, et al. Experimental [Page 12]
675
676RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
677
678
6799. Acknowledgments
680
681 The contributions, suggestions, and remarks of the following persons
682 (in alphabetic order) to this document are acknowledged:
683
684 Mats Kolkman, Edward Lewis, Ted Lindgreen, Rip Loomis, Bill
685 Manning, Dan Massey, Scott Rose, Mike Schiraldi, Jakob Schlyter,
686 Brian Wellington.
687
68810. References
689
69010.1. Normative References
691
692 [1] Mockapetris, P., "Domain names - implementation and
693 specification", STD 13, RFC 1035, November 1987.
694
695 [2] Bradner, S., "Key words for use in RFCs to Indicate Requirement
696 Levels", BCP 14, RFC 2119, March 1997.
697
698 [3] Wellington, B. and O. Gudmundsson, "Redefinition of DNS
699 Authenticated Data (AD) bit", RFC 3655, November 2003.
700
701 [4] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose,
702 "DNS Security Introduction and Requirements", RFC 4033,
703 March 2005.
704
705 [5] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose,
706 "Resource Records for the DNS Security Extensions", RFC 4034,
707 March 2005.
708
709 [6] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose,
710 "Protocol Modifications for the DNS Security Extensions",
711 RFC 4035, March 2005.
712
713 [7] Blacka, D., "DNSSEC Experiments", RFC 4955, July 2007.
714
71510.2. Informative References
716
717 [8] Elz, R. and R. Bush, "Clarifications to the DNS Specification",
718 RFC 2181, July 1997.
719
720 [9] Wellington, B., "Secure Domain Name System (DNS) Dynamic
721 Update", RFC 3007, November 2000.
722
723 [10] Lewis, E., "DNS Security Extension Clarification on Zone
724 Status", RFC 3090, March 2001.
725
726
727
728
729
730Arends, et al. Experimental [Page 13]
731
732RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
733
734
735 [11] Conrad, D., "Indicating Resolver Support of DNSSEC", RFC 3225,
736 December 2001.
737
738 [12] Atkins, D. and R. Austein, "Threat Analysis of the Domain Name
739 System (DNS)", RFC 3833, August 2004.
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786Arends, et al. Experimental [Page 14]
787
788RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
789
790
791Appendix A. Implementing Opt-In Using "Views"
792
793 In many cases, it may be convenient to implement an Opt-In zone by
794 combining two separately maintained "views" of a zone at request
795 time. In this context, "view" refers to a particular version of a
796 zone, not to any specific DNS implementation feature.
797
798 In this scenario, one view is the secure view, the other is the
799 insecure (or legacy) view. The secure view consists of an entirely
800 signed zone using Opt-In tagged NSEC records. The insecure view
801 contains no DNSSEC information. It is helpful, although not
802 necessary, for the secure view to be a subset (minus DNSSEC records)
803 of the insecure view.
804
805 In addition, the only RRsets that may solely exist in the insecure
806 view are non-zone-apex NS RRsets. That is, all non-NS RRsets (and
807 the zone apex NS RRset) MUST be signed and in the secure view.
808
809 These two views may be combined at request time to provide a virtual,
810 single Opt-In zone. The following algorithm is used when responding
811 to each query:
812
813 V_A is the secure view as described above.
814
815 V_B is the insecure view as described above.
816
817 R_A is a response generated from V_A, following standard DNSSEC.
818
819 R_B is a response generated from V_B, following DNS resolution as
820 per RFC 1035 [1].
821
822 R_C is the response generated by combining R_A with R_B, as
823 described below.
824
825 A query is DNSSEC-aware if it either has the DO bit [11] turned on
826 or is for a DNSSEC-specific record type.
827
828 1. If V_A is a subset of V_B and the query is not DNSSEC-aware,
829 generate and return R_B, otherwise
830
831 2. Generate R_A.
832
833 3. If R_A's RCODE != NXDOMAIN, return R_A, otherwise
834
835
836
837
838
839
840
841
842Arends, et al. Experimental [Page 15]
843
844RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
845
846
847 4. Generate R_B and combine it with R_A to form R_C:
848
849 For each section (ANSWER, AUTHORITY, ADDITIONAL), copy the
850 records from R_A into R_B, EXCEPT the AUTHORITY section SOA
851 record, if R_B's RCODE = NOERROR.
852
853 5. Return R_C.
854
855Authors' Addresses
856
857 Roy Arends
858 Nominet
859 Sandford Gate
860 Sandy Lane West
861 Oxford OX4 6LB
862 UNITED KINGDOM
863
864 Phone: +44 1865 332211
865 EMail: roy@nominet.org.uk
866
867
868 Mark Kosters
869 VeriSign, Inc.
870 21355 Ridgetop Circle
871 Dulles, VA 20166
872 US
873
874 Phone: +1 703 948 3200
875 EMail: mkosters@verisign.com
876 URI: http://www.verisignlabs.com
877
878
879 David Blacka
880 VeriSign, Inc.
881 21355 Ridgetop Circle
882 Dulles, VA 20166
883 US
884
885 Phone: +1 703 948 3200
886 EMail: davidb@verisign.com
887 URI: http://www.verisignlabs.com
888
889
890
891
892
893
894
895
896
897
898Arends, et al. Experimental [Page 16]
899
900RFC 4956 DNS Security (DNSSEC) Opt-In July 2007
901
902
903Full Copyright Statement
904
905 Copyright (C) The IETF Trust (2007).
906
907 This document is subject to the rights, licenses and restrictions
908 contained in BCP 78, and except as set forth therein, the authors
909 retain all their rights.
910
911 This document and the information contained herein are provided on an
912 "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
913 OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
914 THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
915 OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
916 THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
917 WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
918
919Intellectual Property
920
921 The IETF takes no position regarding the validity or scope of any
922 Intellectual Property Rights or other rights that might be claimed to
923 pertain to the implementation or use of the technology described in
924 this document or the extent to which any license under such rights
925 might or might not be available; nor does it represent that it has
926 made any independent effort to identify any such rights. Information
927 on the procedures with respect to rights in RFC documents can be
928 found in BCP 78 and BCP 79.
929
930 Copies of IPR disclosures made to the IETF Secretariat and any
931 assurances of licenses to be made available, or the result of an
932 attempt made to obtain a general license or permission for the use of
933 such proprietary rights by implementers or users of this
934 specification can be obtained from the IETF on-line IPR repository at
935 http://www.ietf.org/ipr.
936
937 The IETF invites any interested party to bring to its attention any
938 copyrights, patents or patent applications, or other proprietary
939 rights that may cover technology that may be required to implement
940 this standard. Please address the information to the IETF at
941 ietf-ipr@ietf.org.
942
943Acknowledgement
944
945 Funding for the RFC Editor function is currently provided by the
946 Internet Society.
947
948
949
950
951
952
953
954Arends, et al. Experimental [Page 17]
955
956