Re: [dnsext] historal root keys for upgrade path?

Joe Abley <jabley@hopcount.ca> Mon, 31 January 2011 12:11 UTC

Return-Path: <jabley@hopcount.ca>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3598F3A6BE6 for <dnsext@core3.amsl.com>; Mon, 31 Jan 2011 04:11:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.571
X-Spam-Level:
X-Spam-Status: No, score=-102.571 tagged_above=-999 required=5 tests=[AWL=0.028, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sYrSUk4Uifn0 for <dnsext@core3.amsl.com>; Mon, 31 Jan 2011 04:11:25 -0800 (PST)
Received: from monster.hopcount.ca (monster.hopcount.ca [216.235.14.38]) by core3.amsl.com (Postfix) with ESMTP id 20B8D3A6938 for <dnsext@ietf.org>; Mon, 31 Jan 2011 04:11:25 -0800 (PST)
Received: from [199.212.90.21] (helo=dh21.r2.owls.hopcount.ca) by monster.hopcount.ca with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.71 (FreeBSD)) (envelope-from <jabley@hopcount.ca>) id 1PjsiZ-000Lbe-E9; Mon, 31 Jan 2011 12:18:52 +0000
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset="us-ascii"
From: Joe Abley <jabley@hopcount.ca>
In-Reply-To: <alpine.LSU.2.00.1101311014030.5244@hermes-1.csi.cam.ac.uk>
Date: Mon, 31 Jan 2011 07:14:31 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <C6218FC5-0261-4763-8DF3-019638A8E612@hopcount.ca>
References: <alpine.LFD.1.10.1101251250040.30991@newtla.xelerance.com> <17A80F45-52CB-43F6-BD4A-3488821F6933@hopcount.ca> <3A1DEE95-8C8E-4C89-97EB-6D8F799ADE25@virtualized.org> <583A62B0-0DBF-469A-AF8A-B81DEDD1E7E2@dotat.at> <86B1D38A-C274-4335-B30E-3C5C0DF05C38@hopcount.ca> <alpine.LSU.2.00.1101311014030.5244@hermes-1.csi.cam.ac.uk>
To: Tony Finch <dot@dotat.at>
X-Mailer: Apple Mail (2.1082)
X-SA-Exim-Connect-IP: 199.212.90.21
X-SA-Exim-Mail-From: jabley@hopcount.ca
X-SA-Exim-Scanned: No (on monster.hopcount.ca); SAEximRunCond expanded to false
Cc: dnsext List <dnsext@ietf.org>
Subject: Re: [dnsext] historal root keys for upgrade path?
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 31 Jan 2011 12:11:26 -0000

On 2011-01-31, at 05:41, Tony Finch wrote:

> Question: Is it in fact practical to keep the standby key in a manner that
> makes it unlikely to be lost or compromised when the live key is? (How do
> you know you haven't lost the standby key if you never use it?!) Perhaps
> it is possible to come up with a better replacement for RFC 5011, because
> no longer need to worry about managing thousands of trust anchors, so we
> could tolerate a more elaborate scheme for establishing trust in the one
> root key.

The DNSSEC Policy and Practice Statements for the root zone have been published for a long time -- there should be no mystery here.

There is no pre-generated standby KSK for the root zone.

If there *was* one, then it would presumably be generated using separate ceremonies and stored in deliberately different places from the current one (otherwise pretty much any compromise scenario for the production KSK might also invalidate the standby key). Even then there would still be elements in common, since the same organisation would be responsible for managing both keys. As you note, there are also operational challenges in maintaining a key that is not regularly exercised.

The root zone KSK management procedures and facilities are designed to minimise the threat of compromise: there are two separate, autonomous, well-guarded and well-monitored facilities; procedures are audited; ceremonies are scrutinised; etc. The approach is intended to minimise the probability of compromise.

RFC 5011 is a mechanism for scheduled key rollovers. There is always the possibility that emergency key rollovers will happen, and that 5011 semantics (in particular the 30-day dual-publish window) might not be followed.

I think the open question is not whether we need a better mechanism to accommodate scheduled key rollovers -- the open question is how best to bootstrap a validator that (for whatever reason) has no working trust anchor installed.


Joe