[DNSOP] Other comments on draft-york-dnsop-deploying-dnssec-crypto-algs-04

Edward Lewis <edward.lewis@icann.org> Fri, 02 December 2016 17:19 UTC

Return-Path: <edward.lewis@icann.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F3C121294F6 for <dnsop@ietfa.amsl.com>; Fri, 2 Dec 2016 09:19:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.095
X-Spam-Level:
X-Spam-Status: No, score=-7.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-2.896, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rKop-U2Zqpb0 for <dnsop@ietfa.amsl.com>; Fri, 2 Dec 2016 09:19:35 -0800 (PST)
Received: from out.west.pexch112.icann.org (pfe112-ca-1.pexch112.icann.org [64.78.40.7]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A164E128B38 for <dnsop@ietf.org>; Fri, 2 Dec 2016 09:19:35 -0800 (PST)
Received: from PMBX112-W1-CA-1.pexch112.icann.org (64.78.40.21) by PMBX112-W1-CA-2.pexch112.icann.org (64.78.40.23) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Fri, 2 Dec 2016 09:19:32 -0800
Received: from PMBX112-W1-CA-1.pexch112.icann.org ([64.78.40.21]) by PMBX112-W1-CA-1.PEXCH112.ICANN.ORG ([64.78.40.21]) with mapi id 15.00.1178.000; Fri, 2 Dec 2016 09:19:31 -0800
From: Edward Lewis <edward.lewis@icann.org>
To: Dan York <york@isoc.org>
Thread-Topic: Other comments on draft-york-dnsop-deploying-dnssec-crypto-algs-04
Thread-Index: AQHSTMA+gbmkiOGv0EWU7JFmMZwajA==
Date: Fri, 02 Dec 2016 17:19:31 +0000
Message-ID: <6FC24658-871B-4A86-9622-5C3FB009A5A9@icann.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/f.1c.1.161117
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.0.47.234]
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha1"; boundary="B_3563525971_1473006879"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/rbfX5Pl7etb6cfJUatG3JNbY1Ng>
Cc: "dnsop@ietf.org" <dnsop@ietf.org>
Subject: [DNSOP] Other comments on draft-york-dnsop-deploying-dnssec-crypto-algs-04
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Dec 2016 17:19:38 -0000

Ref: https://www.ietf.org/id/draft-york-dnsop-deploying-dnssec-crypto-algs-04.txt

 

##      Observations on Deploying New DNSSEC Cryptographic Algorithms

##             draft-york-dnsop-deploying-dnssec-crypto-algs-04

## 

## Abstract

## 

##    As new cryptographic algorithms are developed for use in DNSSEC

##    signing and validation, this document captures the steps needed for

##    new algorithms to be deployed and enter general usage.  The intent is

##    to ensure a common understanding of the typical deployment process

##    and potentially identify opportunities for improvement of operations.

 

"New cryptographic algorithms are" not "developed for use iN DNSSEC" but

new DNS Security Algorithms Numbers are assigned for cryptographic algorithms

and hash functions used in DNSSEC operations when the use is defined.

 

## 1.  Introduction

## 

##    The DNS Security Extensions (DNSSEC), broadly defined in [RFC4033],

##    [RFC4034] and [RFC4035], make use of cryptographic algorithms in both

 

"makes use"

 

##    the signing of DNS records and the validation of DNSSEC signatures by

##    recursive resolvers.

 

also hash functions...

 

##    The current list of cryptographic algorithms can be found in the IANA

##    "Domain Name System Security (DNSSEC) Algorithm Numbers" registry

##    located at <http://www.iana.org/assignments/dns-sec-alg-numbers/>

##    Algorithms are added to this IANA registry through a process defined

##    in [RFC6014].  Note that [RFC6944] provides some guidance as to which

##    of these algorithms should be implemented and supported.

 

The registry is introduced as DNS Security Algorithm Numbers in the IANA

Considerations of "Resource Records for the DNS Security Extensions", a.k.a.

RFC 4034.  The webpage cited has DNSSEC in the top part, but the registry entry

itself says DNS.  I'm not sure where the DNSSEC title came from, I don't see

any traceback to where it came from.  I'd stick with the formal name as defined

in RFC 4034.

 

##    Historically DNSSEC signatures have primarily used cryptographic

##    algorithms based on RSA keys.  As deployment of DNSSEC has increased

##    there has been interest in using newer and more secure algorithms,

##    particularly those using elliptic curve cryptography.

 

"Recently DNSSEC" ...historically we cavepeople used DSA. ;)

 

##    o  Usage in a Delegation Signer ("DS") record {{?RFC3658}} for the

##       "chain of trust" connecting back to the root of DNS

 

RFC 3658 is considered to have been obsoleted by RFC 4034, use the latter

as the reference.

 

##    In order for a new cryptographic algorithm to be fully deployed, all

##    aspects of the DNS infrastructure that interact with DNSSEC must be

##    updated to use the new algorithm.

## 

##    This document outlines the current understanding of the components of

##    the DNS infrastructure that need to be updated to deploy a new

##    cryptographic algorithm.

## 

##    It should be noted that DNSSEC is not alone in complexity of

##    deployment.  The IAB documented "Guidelines for Cryptographic

##    Algorithm Agility" in [?!RFC7696] to highlight the importance of this

##    issue.

 

I'd highlight that this is an issue with software and operational

infrastructure as opposed to protocol development.  Obstacles are more

likely to be found in registration than, say, the validation algorithm,

although the latter is at the mercy of a suitably modern cryptographic

library.

 

## 2.  Aspects of Deploying New Algorithms

## 

##    For a new cryptographic algorithm to be deployed in DNSSEC, the

##    following aspects of the DNS infrastructure must be updated:

## 

##    o  DNS resolvers performing validation

 

Particularly the crypto libraries.

 

## 

## 2.2.  Authoritative DNS Servers

## 

##    The one exception is if the new cryptographic algorithms are used in

##    the creation of NSEC/NSEC3 responses.  In the case of new NSEC/NSEC3

##    algorithms, the authoritative DNS server software would need to be

##    updated to be able to use the new algorithms.

 

This is where the distinction between cryptographic algorithm and DNS

security algorithm number is important.  In NSEC3 the server needs to know

what hash-named owned NSEC3 records are to be returned.  The server needs to

be able to hash the QNAME to know how to react, beyond that nothing else is

needed.  NSEC doesn't have this dependency.

 

## 2.4.  Registries

## 

##    The registry for a top-level domain (TLD) needs to accept DS records

##    using the new cryptographic algorithm.

 

Or be able to make them from DNSKEYs, as some TLDs operate.

 

## 2.5.  Registrars

## 

##    Note that work is currently underway in [I-D.ietf-dnsop-maintain-ds]

##    to provide an automated mechanism to update the DS records with a

##    registry.  If this method becomes widely adopted, registrar web

##    interfaces may no longer be needed.

 

I wouldn't tie this to that.  Just to keep things simple, document processing

wise.  (This document to that document.)

 

Overall, registrars and registries are pretty much the same here - their

provisioning software needs to be appropriately restrictive, and not overly

so.

 

>From reading this, the document needs more work.  First is fixing the the name

of what is to be worked - the DNS Security Algorithm Numbers.  Recognize that

the validation side is free to accept what they choose but encourage that side

to make "good choices."  The signing side is complicated by the registration

and provisioning systems that externally govern the DNS protocol operations.