Paper 7
RFC 2535
Domain Name System Security Extensions

Why?

To continue understanding DNS Security. This seems to be the 'overview' RFC

Quick Assessment

Long, really is the defining document, so there is lots of detail.
Main Point:
This storage of keys can support general public key distribution services as well as DNS security. The stored keys enable security aware resolvers to learn the authenticating key of zones in addition to those for which they are initially configured. ...
In addition, the security extensions provide for the optional authentication of DNS protocol transactions and requests.

Introduction

Section 2

Provide 3 security services:

No access control lists, No confidentiality for queries or responses

Key distribution
Resource record format is defined to associate keys with DNS names, therefore DNS can distribute public keys.
KEY RR - algorithm id, actual public key, and bunch of flags

Data Origin Authentication and Integrity
Authentication provided by associating crypto digital signatures with RRsets -
there will be a SINGLE private key that authenticates the entire zone, but there might be multiple keys for different algorithms, signers, etc.
Data origin authentication keys are associated with the zone and NOT the servers storing the data.
resolver can either read a key or have it staticly configured.
resolver must be configured with at least a public key which authenticates one zone as a starting point

SIG Resource Record - cryptographically binds the RRset being signed to the signer and a validity interval.

Issues - TTL in signature vs Ticking down of TTL in caching servers.

Special issues with subzones - leaf in one DNS table, and the primary in another DNS table, e.g., cs.hmc.edu

DNS transaction and request authentication
data origin authentication service does protect retrieved resource records and the non-existence of resource records, but provides NO protection for DNS requests or for message hearders.
Can add a special SIG RR at the end of the reply which digitally signs the concatenation of the server's response and the resolver's query.
These keys belong to the entity composing the reply NOT to the Zone....

Mike Erlinger

Last Modified Tuesday, 04-Apr-2006 12:48:22 PDT