Network Working Group                                          R. Arends
Request for Comments: 4033                          Telematica Instituut
Obsoletes: 2535, 3008, 3090, 3445, 3655, 3658,                R. Austein
          3755, 3757, 3845                                          ISC
Updates: 1034, 1035, 2136, 2181, 2308, 3225,                   M. Larson
        3007, 3597, 3226                                       VeriSign
Category: Standards Track                                      D. Massey
                                              Colorado State University
                                                                S. Rose
                                                                   NIST
                                                             March 2005


              DNS Security Introduction and Requirements

Status of This Memo

  This document specifies an Internet standards track protocol for the
  Internet community, and requests discussion and suggestions for
  improvements.  Please refer to the current edition of the "Internet
  Official Protocol Standards" (STD 1) for the standardization state
  and status of this protocol.  Distribution of this memo is unlimited.

Copyright Notice

  Copyright (C) The Internet Society (2005).

Abstract

  The Domain Name System Security Extensions (DNSSEC) add data origin
  authentication and data integrity to the Domain Name System.  This
  document introduces these extensions and describes their capabilities
  and limitations.  This document also discusses the services that the
  DNS security extensions do and do not provide.  Last, this document
  describes the interrelationships between the documents that
  collectively describe DNSSEC.















Arends, et al.              Standards Track                     [Page 1]

RFC 4033       DNS Security Introduction and Requirements     March 2005


Table of Contents

  1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . .   2
  2.  Definitions of Important DNSSEC Terms  . . . . . . . . . . .   3
  3.  Services Provided by DNS Security  . . . . . . . . . . . . .   7
      3.1.  Data Origin Authentication and Data Integrity  . . . .   7
      3.2.  Authenticating Name and Type Non-Existence . . . . . .   9
  4.  Services Not Provided by DNS Security  . . . . . . . . . . .   9
  5.  Scope of the DNSSEC Document Set and Last Hop Issues . . . .   9
  6.  Resolver Considerations  . . . . . . . . . . . . . . . . . .  10
  7.  Stub Resolver Considerations . . . . . . . . . . . . . . . .  11
  8.  Zone Considerations  . . . . . . . . . . . . . . . . . . . .  12
      8.1.  TTL Values vs. RRSIG Validity Period . . . . . . . . .  13
      8.2.  New Temporal Dependency Issues for Zones . . . . . . .  13
  9.  Name Server Considerations . . . . . . . . . . . . . . . . .  13
  10. DNS Security Document Family . . . . . . . . . . . . . . . .  14
  11. IANA Considerations  . . . . . . . . . . . . . . . . . . . .  15
  12. Security Considerations  . . . . . . . . . . . . . . . . . .  15
  13. Acknowledgements . . . . . . . . . . . . . . . . . . . . . .  17
  14. References . . . . . . . . . . . . . . . . . . . . . . . . .  17
      14.1. Normative References . . . . . . . . . . . . . . . . .  17
      14.2. Informative References . . . . . . . . . . . . . . . .  18
  Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . .  20
  Full Copyright Statement . . . . . . . . . . . . . . . . . . . .  21

1.  Introduction

  This document introduces the Domain Name System Security Extensions
  (DNSSEC).  This document and its two companion documents ([RFC4034]
  and [RFC4035]) update, clarify, and refine the security extensions
  defined in [RFC2535] and its predecessors.  These security extensions
  consist of a set of new resource record types and modifications to
  the existing DNS protocol ([RFC1035]).  The new records and protocol
  modifications are not fully described in this document, but are
  described in a family of documents outlined in Section 10.  Sections
  3 and 4 describe the capabilities and limitations of the security
  extensions in greater detail.  Section 5 discusses the scope of the
  document set.  Sections 6, 7, 8, and 9 discuss the effect that these
  security extensions will have on resolvers, stub resolvers, zones,
  and name servers.

  This document and its two companions obsolete [RFC2535], [RFC3008],
  [RFC3090], [RFC3445], [RFC3655], [RFC3658], [RFC3755], [RFC3757], and
  [RFC3845].  This document set also updates but does not obsolete
  [RFC1034], [RFC1035], [RFC2136], [RFC2181], [RFC2308], [RFC3225],
  [RFC3007], [RFC3597], and the portions of [RFC3226] that deal with
  DNSSEC.




Arends, et al.              Standards Track                     [Page 2]

RFC 4033       DNS Security Introduction and Requirements     March 2005


  The DNS security extensions provide origin authentication and
  integrity protection for DNS data, as well as a means of public key
  distribution.  These extensions do not provide confidentiality.

2.  Definitions of Important DNSSEC Terms

  This section defines a number of terms used in this document set.
  Because this is intended to be useful as a reference while reading
  the rest of the document set, first-time readers may wish to skim
  this section quickly, read the rest of this document, and then come
  back to this section.

  Authentication Chain: An alternating sequence of DNS public key
     (DNSKEY) RRsets and Delegation Signer (DS) RRsets forms a chain of
     signed data, with each link in the chain vouching for the next.  A
     DNSKEY RR is used to verify the signature covering a DS RR and
     allows the DS RR to be authenticated.  The DS RR contains a hash
     of another DNSKEY RR and this new DNSKEY RR is authenticated by
     matching the hash in the DS RR.  This new DNSKEY RR in turn
     authenticates another DNSKEY RRset and, in turn, some DNSKEY RR in
     this set may be used to authenticate another DS RR, and so forth
     until the chain finally ends with a DNSKEY RR whose corresponding
     private key signs the desired DNS data.  For example, the root
     DNSKEY RRset can be used to authenticate the DS RRset for
     "example."  The "example." DS RRset contains a hash that matches
     some "example." DNSKEY, and this DNSKEY's corresponding private
     key signs the "example." DNSKEY RRset.  Private key counterparts
     of the "example." DNSKEY RRset sign data records such as
     "www.example." and DS RRs for delegations such as
     "subzone.example."

  Authentication Key: A public key that a security-aware resolver has
     verified and can therefore use to authenticate data.  A
     security-aware resolver can obtain authentication keys in three
     ways.  First, the resolver is generally configured to know about
     at least one public key; this configured data is usually either
     the public key itself or a hash of the public key as found in the
     DS RR (see "trust anchor").  Second, the resolver may use an
     authenticated public key to verify a DS RR and the DNSKEY RR to
     which the DS RR refers.  Third, the resolver may be able to
     determine that a new public key has been signed by the private key
     corresponding to another public key that the resolver has
     verified.  Note that the resolver must always be guided by local
     policy when deciding whether to authenticate a new public key,
     even if the local policy is simply to authenticate any new public
     key for which the resolver is able verify the signature.





Arends, et al.              Standards Track                     [Page 3]

RFC 4033       DNS Security Introduction and Requirements     March 2005


  Authoritative RRset: Within the context of a particular zone, an
     RRset is "authoritative" if and only if the owner name of the
     RRset lies within the subset of the name space that is at or below
     the zone apex and at or above the cuts that separate the zone from
     its children, if any.  All RRsets at the zone apex are
     authoritative, except for certain RRsets at this domain name that,
     if present, belong to this zone's parent.  These RRset could
     include a DS RRset, the NSEC RRset referencing this DS RRset (the
     "parental NSEC"), and RRSIG RRs associated with these RRsets, all
     of which are authoritative in the parent zone.  Similarly, if this
     zone contains any delegation points, only the parental NSEC RRset,
     DS RRsets, and any RRSIG RRs associated with these RRsets are
     authoritative for this zone.

  Delegation Point: Term used to describe the name at the parental side
     of a zone cut.  That is, the delegation point for "foo.example"
     would be the foo.example node in the "example" zone (as opposed to
     the zone apex of the "foo.example" zone).  See also zone apex.

  Island of Security: Term used to describe a signed, delegated zone
     that does not have an authentication chain from its delegating
     parent.  That is, there is no DS RR containing a hash of a DNSKEY
     RR for the island in its delegating parent zone (see [RFC4034]).
     An island of security is served by security-aware name servers and
     may provide authentication chains to any delegated child zones.
     Responses from an island of security or its descendents can only
     be authenticated if its authentication keys can be authenticated
     by some trusted means out of band from the DNS protocol.

  Key Signing Key (KSK): An authentication key that corresponds to a
     private key used to sign one or more other authentication keys for
     a given zone.  Typically, the private key corresponding to a key
     signing key will sign a zone signing key, which in turn has a
     corresponding private key that will sign other zone data.  Local
     policy may require that the zone signing key be changed
     frequently, while the key signing key may have a longer validity
     period in order to provide a more stable secure entry point into
     the zone.  Designating an authentication key as a key signing key
     is purely an operational issue: DNSSEC validation does not
     distinguish between key signing keys and other DNSSEC
     authentication keys, and it is possible to use a single key as
     both a key signing key and a zone signing key.  Key signing keys
     are discussed in more detail in [RFC3757].  Also see zone signing
     key.







Arends, et al.              Standards Track                     [Page 4]

RFC 4033       DNS Security Introduction and Requirements     March 2005


  Non-Validating Security-Aware Stub Resolver: A security-aware stub
     resolver that trusts one or more security-aware recursive name
     servers to perform most of the tasks discussed in this document
     set on its behalf.  In particular, a non-validating security-aware
     stub resolver is an entity that sends DNS queries, receives DNS
     responses, and is capable of establishing an appropriately secured
     channel to a security-aware recursive name server that will
     provide these services on behalf of the security-aware stub
     resolver.  See also security-aware stub resolver, validating
     security-aware stub resolver.

  Non-Validating Stub Resolver: A less tedious term for a
     non-validating security-aware stub resolver.

  Security-Aware Name Server: An entity acting in the role of a name
     server (defined in section 2.4 of [RFC1034]) that understands the
     DNS security extensions defined in this document set.  In
     particular, a security-aware name server is an entity that
     receives DNS queries, sends DNS responses, supports the EDNS0
     ([RFC2671]) message size extension and the DO bit ([RFC3225]), and
     supports the RR types and message header bits defined in this
     document set.

  Security-Aware Recursive Name Server: An entity that acts in both the
     security-aware name server and security-aware resolver roles.  A
     more cumbersome but equivalent phrase would be "a security-aware
     name server that offers recursive service".

  Security-Aware Resolver: An entity acting in the role of a resolver
     (defined in section 2.4 of [RFC1034]) that understands the DNS
     security extensions defined in this document set.  In particular,
     a security-aware resolver is an entity that sends DNS queries,
     receives DNS responses, supports the EDNS0 ([RFC2671]) message
     size extension and the DO bit ([RFC3225]), and is capable of using
     the RR types and message header bits defined in this document set
     to provide DNSSEC services.

  Security-Aware Stub Resolver: An entity acting in the role of a stub
     resolver (defined in section 5.3.1 of [RFC1034]) that has enough
     of an understanding the DNS security extensions defined in this
     document set to provide additional services not available from a
     security-oblivious stub resolver.  Security-aware stub resolvers
     may be either "validating" or "non-validating", depending on
     whether the stub resolver attempts to verify DNSSEC signatures on
     its own or trusts a friendly security-aware name server to do so.
     See also validating stub resolver, non-validating stub resolver.





Arends, et al.              Standards Track                     [Page 5]

RFC 4033       DNS Security Introduction and Requirements     March 2005


  Security-Oblivious <anything>: An <anything> that is not
     "security-aware".

  Signed Zone: A zone whose RRsets are signed and that contains
     properly constructed DNSKEY, Resource Record Signature (RRSIG),
     Next Secure (NSEC), and (optionally) DS records.

  Trust Anchor: A configured DNSKEY RR or DS RR hash of a DNSKEY RR.  A
     validating security-aware resolver uses this public key or hash as
     a starting point for building the authentication chain to a signed
     DNS response.  In general, a validating resolver will have to
     obtain the initial values of its trust anchors via some secure or
     trusted means outside the DNS protocol.  Presence of a trust
     anchor also implies that the resolver should expect the zone to
     which the trust anchor points to be signed.

  Unsigned Zone: A zone that is not signed.

  Validating Security-Aware Stub Resolver: A security-aware resolver
     that sends queries in recursive mode but that performs signature
     validation on its own rather than just blindly trusting an
     upstream security-aware recursive name server.  See also
     security-aware stub resolver, non-validating security-aware stub
     resolver.

  Validating Stub Resolver: A less tedious term for a validating
     security-aware stub resolver.

  Zone Apex: Term used to describe the name at the child's side of a
     zone cut.  See also delegation point.

  Zone Signing Key (ZSK): An authentication key that corresponds to a
     private key used to sign a zone.  Typically, a zone signing key
     will be part of the same DNSKEY RRset as the key signing key whose
     corresponding private key signs this DNSKEY RRset, but the zone
     signing key is used for a slightly different purpose and may
     differ from the key signing key in other ways, such as validity
     lifetime.  Designating an authentication key as a zone signing key
     is purely an operational issue; DNSSEC validation does not
     distinguish between zone signing keys and other DNSSEC
     authentication keys, and it is possible to use a single key as
     both a key signing key and a zone signing key.  See also key
     signing key.








Arends, et al.              Standards Track                     [Page 6]

RFC 4033       DNS Security Introduction and Requirements     March 2005


3.  Services Provided by DNS Security

  The Domain Name System (DNS) security extensions provide origin
  authentication and integrity assurance services for DNS data,
  including mechanisms for authenticated denial of existence of DNS
  data.  These mechanisms are described below.

  These mechanisms require changes to the DNS protocol.  DNSSEC adds
  four new resource record types: Resource Record Signature (RRSIG),
  DNS Public Key (DNSKEY), Delegation Signer (DS), and Next Secure
  (NSEC).  It also adds two new message header bits: Checking Disabled
  (CD) and Authenticated Data (AD).  In order to support the larger DNS
  message sizes that result from adding the DNSSEC RRs, DNSSEC also
  requires EDNS0 support ([RFC2671]).  Finally, DNSSEC requires support
  for the DNSSEC OK (DO) EDNS header bit ([RFC3225]) so that a
  security-aware resolver can indicate in its queries that it wishes to
  receive DNSSEC RRs in response messages.

  These services protect against most of the threats to the Domain Name
  System described in [RFC3833].  Please see Section 12 for a
  discussion of the limitations of these extensions.

3.1.  Data Origin Authentication and Data Integrity

  DNSSEC provides authentication by associating cryptographically
  generated digital signatures with DNS RRsets.  These digital
  signatures are stored in a new resource record, the RRSIG record.
  Typically, there will be a single private key that signs a zone's
  data, but multiple keys are possible.  For example, there may be keys
  for each of several different digital signature algorithms.  If a
  security-aware resolver reliably learns a zone's public key, it can
  authenticate that zone's signed data.  An important DNSSEC concept is
  that the key that signs a zone's data is associated with the zone
  itself and not with the zone's authoritative name servers.  (Public
  keys for DNS transaction authentication mechanisms may also appear in
  zones, as described in [RFC2931], but DNSSEC itself is concerned with
  object security of DNS data, not channel security of DNS
  transactions.  The keys associated with transaction security may be
  stored in different RR types.  See [RFC3755] for details.)

  A security-aware resolver can learn a zone's public key either by
  having a trust anchor configured into the resolver or by normal DNS
  resolution.  To allow the latter, public keys are stored in a new
  type of resource record, the DNSKEY RR.  Note that the private keys
  used to sign zone data must be kept secure and should be stored
  offline when practical.  To discover a public key reliably via DNS
  resolution, the target key itself has to be signed by either a
  configured authentication key or another key that has been



Arends, et al.              Standards Track                     [Page 7]

RFC 4033       DNS Security Introduction and Requirements     March 2005


  authenticated previously.  Security-aware resolvers authenticate zone
  information by forming an authentication chain from a newly learned
  public key back to a previously known authentication public key,
  which in turn either has been configured into the resolver or must
  have been learned and verified previously.  Therefore, the resolver
  must be configured with at least one trust anchor.

  If the configured trust anchor is a zone signing key, then it will
  authenticate the associated zone; if the configured key is a key
  signing key, it will authenticate a zone signing key.  If the
  configured trust anchor is the hash of a key rather than the key
  itself, the resolver may have to obtain the key via a DNS query.  To
  help security-aware resolvers establish this authentication chain,
  security-aware name servers attempt to send the signature(s) needed
  to authenticate a zone's public key(s) in the DNS reply message along
  with the public key itself, provided that there is space available in
  the message.

  The Delegation Signer (DS) RR type simplifies some of the
  administrative tasks involved in signing delegations across
  organizational boundaries.  The DS RRset resides at a delegation
  point in a parent zone and indicates the public key(s) corresponding
  to the private key(s) used to self-sign the DNSKEY RRset at the
  delegated child zone's apex.  The administrator of the child zone, in
  turn, uses the private key(s) corresponding to one or more of the
  public keys in this DNSKEY RRset to sign the child zone's data.  The
  typical authentication chain is therefore
  DNSKEY->[DS->DNSKEY]*->RRset, where "*" denotes zero or more
  DS->DNSKEY subchains.  DNSSEC permits more complex authentication
  chains, such as additional layers of DNSKEY RRs signing other DNSKEY
  RRs within a zone.

  A security-aware resolver normally constructs this authentication
  chain from the root of the DNS hierarchy down to the leaf zones based
  on configured knowledge of the public key for the root.  Local
  policy, however, may also allow a security-aware resolver to use one
  or more configured public keys (or hashes of public keys) other than
  the root public key, may not provide configured knowledge of the root
  public key, or may prevent the resolver from using particular public
  keys for arbitrary reasons, even if those public keys are properly
  signed with verifiable signatures.  DNSSEC provides mechanisms by
  which a security-aware resolver can determine whether an RRset's
  signature is "valid" within the meaning of DNSSEC.  In the final
  analysis, however, authenticating both DNS keys and data is a matter
  of local policy, which may extend or even override the protocol
  extensions defined in this document set.  See Section 5 for further
  discussion.




Arends, et al.              Standards Track                     [Page 8]

RFC 4033       DNS Security Introduction and Requirements     March 2005


3.2.  Authenticating Name and Type Non-Existence

  The security mechanism described in Section 3.1 only provides a way
  to sign existing RRsets in a zone.  The problem of providing negative
  responses with the same level of authentication and integrity
  requires the use of another new resource record type, the NSEC
  record.  The NSEC record allows a security-aware resolver to
  authenticate a negative reply for either name or type non-existence
  with the same mechanisms used to authenticate other DNS replies.  Use
  of NSEC records requires a canonical representation and ordering for
  domain names in zones.  Chains of NSEC records explicitly describe
  the gaps, or "empty space", between domain names in a zone and list
  the types of RRsets present at existing names.  Each NSEC record is
  signed and authenticated using the mechanisms described in Section
  3.1.

4.  Services Not Provided by DNS Security

  DNS was originally designed with the assumptions that the DNS will
  return the same answer to any given query regardless of who may have
  issued the query, and that all data in the DNS is thus visible.
  Accordingly, DNSSEC is not designed to provide confidentiality,
  access control lists, or other means of differentiating between
  inquirers.

  DNSSEC provides no protection against denial of service attacks.
  Security-aware resolvers and security-aware name servers are
  vulnerable to an additional class of denial of service attacks based
  on cryptographic operations.  Please see Section 12 for details.

  The DNS security extensions provide data and origin authentication
  for DNS data.  The mechanisms outlined above are not designed to
  protect operations such as zone transfers and dynamic update
  ([RFC2136], [RFC3007]).  Message authentication schemes described in
  [RFC2845] and [RFC2931] address security operations that pertain to
  these transactions.

5.  Scope of the DNSSEC Document Set and Last Hop Issues

  The specification in this document set defines the behavior for zone
  signers and security-aware name servers and resolvers in such a way
  that the validating entities can unambiguously determine the state of
  the data.

  A validating resolver can determine the following 4 states:

  Secure: The validating resolver has a trust anchor, has a chain of
     trust, and is able to verify all the signatures in the response.



Arends, et al.              Standards Track                     [Page 9]

RFC 4033       DNS Security Introduction and Requirements     March 2005


  Insecure: The validating resolver has a trust anchor, a chain of
     trust, and, at some delegation point, signed proof of the
     non-existence of a DS record.  This indicates that subsequent
     branches in the tree are provably insecure.  A validating resolver
     may have a local policy to mark parts of the domain space as
     insecure.

  Bogus: The validating resolver has a trust anchor and a secure
     delegation indicating that subsidiary data is signed, but the
     response fails to validate for some reason: missing signatures,
     expired signatures, signatures with unsupported algorithms, data
     missing that the relevant NSEC RR says should be present, and so
     forth.

  Indeterminate: There is no trust anchor that would indicate that a
     specific portion of the tree is secure.  This is the default
     operation mode.

  This specification only defines how security-aware name servers can
  signal non-validating stub resolvers that data was found to be bogus
  (using RCODE=2, "Server Failure"; see [RFC4035]).

  There is a mechanism for security-aware name servers to signal
  security-aware stub resolvers that data was found to be secure (using
  the AD bit; see [RFC4035]).

  This specification does not define a format for communicating why
  responses were found to be bogus or marked as insecure.  The current
  signaling mechanism does not distinguish between indeterminate and
  insecure states.

  A method for signaling advanced error codes and policy between a
  security-aware stub resolver and security-aware recursive nameservers
  is a topic for future work, as is the interface between a security-
  aware resolver and the applications that use it.  Note, however, that
  the lack of the specification of such communication does not prohibit
  deployment of signed zones or the deployment of security aware
  recursive name servers that prohibit propagation of bogus data to the
  applications.

6.  Resolver Considerations

  A security-aware resolver has to be able to perform cryptographic
  functions necessary to verify digital signatures using at least the
  mandatory-to-implement algorithm(s).  Security-aware resolvers must
  also be capable of forming an authentication chain from a newly
  learned zone back to an authentication key, as described above.  This
  process might require additional queries to intermediate DNS zones to



Arends, et al.              Standards Track                    [Page 10]

RFC 4033       DNS Security Introduction and Requirements     March 2005


  obtain necessary DNSKEY, DS, and RRSIG records.  A security-aware
  resolver should be configured with at least one trust anchor as the
  starting point from which it will attempt to establish authentication
  chains.

  If a security-aware resolver is separated from the relevant
  authoritative name servers by a recursive name server or by any sort
  of intermediary device that acts as a proxy for DNS, and if the
  recursive name server or intermediary device is not security-aware,
  the security-aware resolver may not be capable of operating in a
  secure mode.  For example, if a security-aware resolver's packets are
  routed through a network address translation (NAT) device that
  includes a DNS proxy that is not security-aware, the security-aware
  resolver may find it difficult or impossible to obtain or validate
  signed DNS data.  The security-aware resolver may have a particularly
  difficult time obtaining DS RRs in such a case, as DS RRs do not
  follow the usual DNS rules for ownership of RRs at zone cuts.  Note
  that this problem is not specific to NATs: any security-oblivious DNS
  software of any kind between the security-aware resolver and the
  authoritative name servers will interfere with DNSSEC.

  If a security-aware resolver must rely on an unsigned zone or a name
  server that is not security aware, the resolver may not be able to
  validate DNS responses and will need a local policy on whether to
  accept unverified responses.

  A security-aware resolver should take a signature's validation period
  into consideration when determining the TTL of data in its cache, to
  avoid caching signed data beyond the validity period of the
  signature.  However, it should also allow for the possibility that
  the security-aware resolver's own clock is wrong.  Thus, a
  security-aware resolver that is part of a security-aware recursive
  name server will have to pay careful attention to the DNSSEC
  "checking disabled" (CD) bit ([RFC4034]).  This is in order to avoid
  blocking valid signatures from getting through to other
  security-aware resolvers that are clients of this recursive name
  server.  See [RFC4035] for how a secure recursive server handles
  queries with the CD bit set.

7.  Stub Resolver Considerations

  Although not strictly required to do so by the protocol, most DNS
  queries originate from stub resolvers.  Stub resolvers, by
  definition, are minimal DNS resolvers that use recursive query mode
  to offload most of the work of DNS resolution to a recursive name
  server.  Given the widespread use of stub resolvers, the DNSSEC





Arends, et al.              Standards Track                    [Page 11]

RFC 4033       DNS Security Introduction and Requirements     March 2005


  architecture has to take stub resolvers into account, but the
  security features needed in a stub resolver differ in some respects
  from those needed in a security-aware iterative resolver.

  Even a security-oblivious stub resolver may benefit from DNSSEC if
  the recursive name servers it uses are security-aware, but for the
  stub resolver to place any real reliance on DNSSEC services, the stub
  resolver must trust both the recursive name servers in question and
  the communication channels between itself and those name servers.
  The first of these issues is a local policy issue: in essence, a
  security-oblivious stub resolver has no choice but to place itself at
  the mercy of the recursive name servers that it uses, as it does not
  perform DNSSEC validity checks on its own.  The second issue requires
  some kind of channel security mechanism; proper use of DNS
  transaction authentication mechanisms such as SIG(0) ([RFC2931]) or
  TSIG ([RFC2845]) would suffice, as would appropriate use of IPsec.
  Particular implementations may have other choices available, such as
  operating system specific interprocess communication mechanisms.
  Confidentiality is not needed for this channel, but data integrity
  and message authentication are.

  A security-aware stub resolver that does trust both its recursive
  name servers and its communication channel to them may choose to
  examine the setting of the Authenticated Data (AD) bit in the message
  header of the response messages it receives.  The stub resolver can
  use this flag bit as a hint to find out whether the recursive name
  server was able to validate signatures for all of the data in the
  Answer and Authority sections of the response.

  There is one more step that a security-aware stub resolver can take
  if, for whatever reason, it is not able to establish a useful trust
  relationship with the recursive name servers that it uses: it can
  perform its own signature validation by setting the Checking Disabled
  (CD) bit in its query messages.  A validating stub resolver is thus
  able to treat the DNSSEC signatures as trust relationships between
  the zone administrators and the stub resolver itself.

8.  Zone Considerations

  There are several differences between signed and unsigned zones.  A
  signed zone will contain additional security-related records (RRSIG,
  DNSKEY, DS, and NSEC records).  RRSIG and NSEC records may be
  generated by a signing process prior to serving the zone.  The RRSIG
  records that accompany zone data have defined inception and
  expiration times that establish a validity period for the signatures
  and the zone data the signatures cover.





Arends, et al.              Standards Track                    [Page 12]

RFC 4033       DNS Security Introduction and Requirements     March 2005


8.1.  TTL Values vs. RRSIG Validity Period

  It is important to note the distinction between a RRset's TTL value
  and the signature validity period specified by the RRSIG RR covering
  that RRset.  DNSSEC does not change the definition or function of the
  TTL value, which is intended to maintain database coherency in
  caches.  A caching resolver purges RRsets from its cache no later
  than the end of the time period specified by the TTL fields of those
  RRsets, regardless of whether the resolver is security-aware.

  The inception and expiration fields in the RRSIG RR ([RFC4034]), on
  the other hand, specify the time period during which the signature
  can be used to validate the covered RRset.  The signatures associated
  with signed zone data are only valid for the time period specified by
  these fields in the RRSIG RRs in question.  TTL values cannot extend
  the validity period of signed RRsets in a resolver's cache, but the
  resolver may use the time remaining before expiration of the
  signature validity period of a signed RRset as an upper bound for the
  TTL of the signed RRset and its associated RRSIG RR in the resolver's
  cache.

8.2.  New Temporal Dependency Issues for Zones

  Information in a signed zone has a temporal dependency that did not
  exist in the original DNS protocol.  A signed zone requires regular
  maintenance to ensure that each RRset in the zone has a current valid
  RRSIG RR.  The signature validity period of an RRSIG RR is an
  interval during which the signature for one particular signed RRset
  can be considered valid, and the signatures of different RRsets in a
  zone may expire at different times.  Re-signing one or more RRsets in
  a zone will change one or more RRSIG RRs, which will in turn require
  incrementing the zone's SOA serial number to indicate that a zone
  change has occurred and re-signing the SOA RRset itself.  Thus,
  re-signing any RRset in a zone may also trigger DNS NOTIFY messages
  and zone transfer operations.

9.  Name Server Considerations

  A security-aware name server should include the appropriate DNSSEC
  records (RRSIG, DNSKEY, DS, and NSEC) in all responses to queries
  from resolvers that have signaled their willingness to receive such
  records via use of the DO bit in the EDNS header, subject to message
  size limitations.  Because inclusion of these DNSSEC RRs could easily
  cause UDP message truncation and fallback to TCP, a security-aware
  name server must also support the EDNS "sender's UDP payload"
  mechanism.





Arends, et al.              Standards Track                    [Page 13]

RFC 4033       DNS Security Introduction and Requirements     March 2005


  If possible, the private half of each DNSSEC key pair should be kept
  offline, but this will not be possible for a zone for which DNS
  dynamic update has been enabled.  In the dynamic update case, the
  primary master server for the zone will have to re-sign the zone when
  it is updated, so the private key corresponding to the zone signing
  key will have to be kept online.  This is an example of a situation
  in which the ability to separate the zone's DNSKEY RRset into zone
  signing key(s) and key signing key(s) may be useful, as the key
  signing key(s) in such a case can still be kept offline and may have
  a longer useful lifetime than the zone signing key(s).

  By itself, DNSSEC is not enough to protect the integrity of an entire
  zone during zone transfer operations, as even a signed zone contains
  some unsigned, nonauthoritative data if the zone has any children.
  Therefore, zone maintenance operations will require some additional
  mechanisms (most likely some form of channel security, such as TSIG,
  SIG(0), or IPsec).

10.  DNS Security Document Family

  The DNSSEC document set can be partitioned into several main groups,
  under the larger umbrella of the DNS base protocol documents.

  The "DNSSEC protocol document set" refers to the three documents that
  form the core of the DNS security extensions:

  1.  DNS Security Introduction and Requirements (this document)

  2.  Resource Records for DNS Security Extensions [RFC4034]

  3.  Protocol Modifications for the DNS Security Extensions [RFC4035]

  Additionally, any document that would add to or change the core DNS
  Security extensions would fall into this category.  This includes any
  future work on the communication between security-aware stub
  resolvers and upstream security-aware recursive name servers.

  The "Digital Signature Algorithm Specification" document set refers
  to the group of documents that describe how specific digital
  signature algorithms should be implemented to fit the DNSSEC resource
  record format.  Each document in this set deals with a specific
  digital signature algorithm.  Please see the appendix on "DNSSEC
  Algorithm and Digest Types" in [RFC4034] for a list of the algorithms
  that were defined when this core specification was written.

  The "Transaction Authentication Protocol" document set refers to the
  group of documents that deal with DNS message authentication,
  including secret key establishment and verification.  Although not



Arends, et al.              Standards Track                    [Page 14]

RFC 4033       DNS Security Introduction and Requirements     March 2005


  strictly part of the DNSSEC specification as defined in this set of
  documents, this group is noted because of its relationship to DNSSEC.

  The final document set, "New Security Uses", refers to documents that
  seek to use proposed DNS Security extensions for other security
  related purposes.  DNSSEC does not provide any direct security for
  these new uses but may be used to support them.  Documents that fall
  in this category include those describing the use of DNS in the
  storage and distribution of certificates ([RFC2538]).

11.  IANA Considerations

  This overview document introduces no new IANA considerations.  Please
  see [RFC4034] for a complete review of the IANA considerations
  introduced by DNSSEC.

12.  Security Considerations

  This document introduces DNS security extensions and describes the
  document set that contains the new security records and DNS protocol
  modifications.  The extensions provide data origin authentication and
  data integrity using digital signatures over resource record sets.
  This section discusses the limitations of these extensions.

  In order for a security-aware resolver to validate a DNS response,
  all zones along the path from the trusted starting point to the zone
  containing the response zones must be signed, and all name servers
  and resolvers involved in the resolution process must be
  security-aware, as defined in this document set.  A security-aware
  resolver cannot verify responses originating from an unsigned zone,
  from a zone not served by a security-aware name server, or for any
  DNS data that the resolver is only able to obtain through a recursive
  name server that is not security-aware.  If there is a break in the
  authentication chain such that a security-aware resolver cannot
  obtain and validate the authentication keys it needs, then the
  security-aware resolver cannot validate the affected DNS data.

  This document briefly discusses other methods of adding security to a
  DNS query, such as using a channel secured by IPsec or using a DNS
  transaction authentication mechanism such as TSIG ([RFC2845]) or
  SIG(0) ([RFC2931]), but transaction security is not part of DNSSEC
  per se.

  A non-validating security-aware stub resolver, by definition, does
  not perform DNSSEC signature validation on its own and thus is
  vulnerable both to attacks on (and by) the security-aware recursive
  name servers that perform these checks on its behalf and to attacks
  on its communication with those security-aware recursive name



Arends, et al.              Standards Track                    [Page 15]

RFC 4033       DNS Security Introduction and Requirements     March 2005


  servers.  Non-validating security-aware stub resolvers should use
  some form of channel security to defend against the latter threat.
  The only known defense against the former threat would be for the
  security-aware stub resolver to perform its own signature validation,
  at which point, again by definition, it would no longer be a
  non-validating security-aware stub resolver.

  DNSSEC does not protect against denial of service attacks.  DNSSEC
  makes DNS vulnerable to a new class of denial of service attacks
  based on cryptographic operations against security-aware resolvers
  and security-aware name servers, as an attacker can attempt to use
  DNSSEC mechanisms to consume a victim's resources.  This class of
  attacks takes at least two forms.  An attacker may be able to consume
  resources in a security-aware resolver's signature validation code by
  tampering with RRSIG RRs in response messages or by constructing
  needlessly complex signature chains.  An attacker may also be able to
  consume resources in a security-aware name server that supports DNS
  dynamic update, by sending a stream of update messages that force the
  security-aware name server to re-sign some RRsets in the zone more
  frequently than would otherwise be necessary.

  Due to a deliberate design choice, DNSSEC does not provide
  confidentiality.

  DNSSEC introduces the ability for a hostile party to enumerate all
  the names in a zone by following the NSEC chain.  NSEC RRs assert
  which names do not exist in a zone by linking from existing name to
  existing name along a canonical ordering of all the names within a
  zone.  Thus, an attacker can query these NSEC RRs in sequence to
  obtain all the names in a zone.  Although this is not an attack on
  the DNS itself, it could allow an attacker to map network hosts or
  other resources by enumerating the contents of a zone.

  DNSSEC introduces significant additional complexity to the DNS and
  thus introduces many new opportunities for implementation bugs and
  misconfigured zones.  In particular, enabling DNSSEC signature
  validation in a resolver may cause entire legitimate zones to become
  effectively unreachable due to DNSSEC configuration errors or bugs.

  DNSSEC does not protect against tampering with unsigned zone data.
  Non-authoritative data at zone cuts (glue and NS RRs in the parent
  zone) are not signed.  This does not pose a problem when validating
  the authentication chain, but it does mean that the non-authoritative
  data itself is vulnerable to tampering during zone transfer
  operations.  Thus, while DNSSEC can provide data origin
  authentication and data integrity for RRsets, it cannot do so for
  zones, and other mechanisms (such as TSIG, SIG(0), or IPsec) must be
  used to protect zone transfer operations.



Arends, et al.              Standards Track                    [Page 16]

RFC 4033       DNS Security Introduction and Requirements     March 2005


  Please see [RFC4034] and [RFC4035] for additional security
  considerations.

13.  Acknowledgements

  This document was created from the input and ideas of the members of
  the DNS Extensions Working Group.  Although explicitly listing
  everyone who has contributed during the decade in which DNSSEC has
  been under development would be impossible, the editors would
  particularly like to thank the following people for their
  contributions to and comments on this document set: Jaap Akkerhuis,
  Mark Andrews, Derek Atkins, Roy Badami, Alan Barrett, Dan Bernstein,
  David Blacka, Len Budney, Randy Bush, Francis Dupont, Donald
  Eastlake, Robert Elz, Miek Gieben, Michael Graff, Olafur Gudmundsson,
  Gilles Guette, Andreas Gustafsson, Jun-ichiro Itojun Hagino, Phillip
  Hallam-Baker, Bob Halley, Ted Hardie, Walter Howard, Greg Hudson,
  Christian Huitema, Johan Ihren, Stephen Jacob, Jelte Jansen, Simon
  Josefsson, Andris Kalnozols, Peter Koch, Olaf Kolkman, Mark Kosters,
  Suresh Krishnaswamy, Ben Laurie, David Lawrence, Ted Lemon, Ed Lewis,
  Ted Lindgreen, Josh Littlefield, Rip Loomis, Bill Manning, Russ
  Mundy, Thomas Narten, Mans Nilsson, Masataka Ohta, Mike Patton, Rob
  Payne, Jim Reid, Michael Richardson, Erik Rozendaal, Marcos Sanz,
  Pekka Savola, Jakob Schlyter, Mike StJohns, Paul Vixie, Sam Weiler,
  Brian Wellington, and Suzanne Woolf.

  No doubt the above list is incomplete.  We apologize to anyone we
  left out.

14.  References

14.1.  Normative References

  [RFC1034]  Mockapetris, P., "Domain names - concepts and facilities",
             STD 13, RFC 1034, November 1987.

  [RFC1035]  Mockapetris, P., "Domain names - implementation and
             specification", STD 13, RFC 1035, November 1987.

  [RFC2535]  Eastlake 3rd, D., "Domain Name System Security
             Extensions", RFC 2535, March 1999.

  [RFC2671]  Vixie, P., "Extension Mechanisms for DNS (EDNS0)", RFC
             2671, August 1999.

  [RFC3225]  Conrad, D., "Indicating Resolver Support of DNSSEC", RFC
             3225, December 2001.





Arends, et al.              Standards Track                    [Page 17]

RFC 4033       DNS Security Introduction and Requirements     March 2005


  [RFC3226]  Gudmundsson, O., "DNSSEC and IPv6 A6 aware server/resolver
             message size requirements", RFC 3226, December 2001.

  [RFC3445]  Massey, D. and S. Rose, "Limiting the Scope of the KEY
             Resource Record (RR)", RFC 3445, December 2002.

  [RFC4034]  Arends, R., Austein, R., Larson, M., Massey, D., and S.
             Rose, "Resource Records for DNS Security Extensions", RFC
             4034, March 2005.

  [RFC4035]  Arends, R., Austein, R., Larson, M., Massey, D., and S.
             Rose, "Protocol Modifications for the DNS Security
             Extensions", RFC 4035, March 2005.

14.2.  Informative References

  [RFC2136]  Vixie, P., Thomson, S., Rekhter, Y., and J. Bound,
             "Dynamic Updates in the Domain Name System (DNS UPDATE)",
             RFC 2136, April 1997.

  [RFC2181]  Elz, R. and R. Bush, "Clarifications to the DNS
             Specification", RFC 2181, July 1997.

  [RFC2308]  Andrews, M., "Negative Caching of DNS Queries (DNS
             NCACHE)", RFC 2308, March 1998.

  [RFC2538]  Eastlake 3rd, D. and O. Gudmundsson, "Storing Certificates
             in the Domain Name System (DNS)", RFC 2538, March 1999.

  [RFC2845]  Vixie, P., Gudmundsson, O., Eastlake 3rd, D., and B.
             Wellington, "Secret Key Transaction Authentication for DNS
             (TSIG)", RFC 2845, May 2000.

  [RFC2931]  Eastlake 3rd, D., "DNS Request and Transaction Signatures
             ( SIG(0)s )", RFC 2931, September 2000.

  [RFC3007]  Wellington, B., "Secure Domain Name System (DNS) Dynamic
             Update", RFC 3007, November 2000.

  [RFC3008]  Wellington, B., "Domain Name System Security (DNSSEC)
             Signing Authority", RFC 3008, November 2000.

  [RFC3090]  Lewis, E., "DNS Security Extension Clarification on Zone
             Status", RFC 3090, March 2001.

  [RFC3597]  Gustafsson, A., "Handling of Unknown DNS Resource Record
             (RR) Types", RFC 3597, September 2003.




Arends, et al.              Standards Track                    [Page 18]

RFC 4033       DNS Security Introduction and Requirements     March 2005


  [RFC3655]  Wellington, B. and O. Gudmundsson, "Redefinition of DNS
             Authenticated Data (AD) bit", RFC 3655, November 2003.

  [RFC3658]  Gudmundsson, O., "Delegation Signer (DS) Resource Record
             (RR)", RFC 3658, December 2003.

  [RFC3755]  Weiler, S., "Legacy Resolver Compatibility for Delegation
             Signer (DS)", RFC 3755, May 2004.

  [RFC3757]  Kolkman, O., Schlyter, J., and E. Lewis, "Domain Name
             System KEY (DNSKEY) Resource Record (RR) Secure Entry
             Point (SEP) Flag", RFC 3757, April 2004.

  [RFC3833]  Atkins, D. and R. Austein, "Threat Analysis of the Domain
             Name System (DNS)", RFC 3833, August 2004.

  [RFC3845]  Schlyter, J., "DNS Security (DNSSEC) NextSECure (NSEC)
             RDATA Format", RFC 3845, August 2004.

































Arends, et al.              Standards Track                    [Page 19]

RFC 4033       DNS Security Introduction and Requirements     March 2005


Authors' Addresses

  Roy Arends
  Telematica Instituut
  Brouwerijstraat 1
  7523 XC  Enschede
  NL

  EMail: [email protected]


  Rob Austein
  Internet Systems Consortium
  950 Charter Street
  Redwood City, CA  94063
  USA

  EMail: [email protected]


  Matt Larson
  VeriSign, Inc.
  21345 Ridgetop Circle
  Dulles, VA  20166-6503
  USA

  EMail: [email protected]


  Dan Massey
  Colorado State University
  Department of Computer Science
  Fort Collins, CO 80523-1873

  EMail: [email protected]


  Scott Rose
  National Institute for Standards and Technology
  100 Bureau Drive
  Gaithersburg, MD  20899-8920
  USA

  EMail: [email protected]







Arends, et al.              Standards Track                    [Page 20]

RFC 4033       DNS Security Introduction and Requirements     March 2005


Full Copyright Statement

  Copyright (C) The Internet Society (2005).

  This document is subject to the rights, licenses and restrictions
  contained in BCP 78, and except as set forth therein, the authors
  retain all their rights.

  This document and the information contained herein are provided on an
  "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
  OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
  ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
  INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
  INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
  WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

  The IETF takes no position regarding the validity or scope of any
  Intellectual Property Rights or other rights that might be claimed to
  pertain to the implementation or use of the technology described in
  this document or the extent to which any license under such rights
  might or might not be available; nor does it represent that it has
  made any independent effort to identify any such rights.  Information
  on the procedures with respect to rights in RFC documents can be
  found in BCP 78 and BCP 79.

  Copies of IPR disclosures made to the IETF Secretariat and any
  assurances of licenses to be made available, or the result of an
  attempt made to obtain a general license or permission for the use of
  such proprietary rights by implementers or users of this
  specification can be obtained from the IETF on-line IPR repository at
  http://www.ietf.org/ipr.

  The IETF invites any interested party to bring to its attention any
  copyrights, patents or patent applications, or other proprietary
  rights that may cover technology that may be required to implement
  this standard.  Please address the information to the IETF at ietf-
  [email protected].

Acknowledgement

  Funding for the RFC Editor function is currently provided by the
  Internet Society.







Arends, et al.              Standards Track                    [Page 21]