<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.32 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-hardaker-dnsop-intentionally-temporary-insec-00" category="bcp">

  <front>
    <title abbrev="Intentionally Temporarily Insecure">Intentionally Temporarily Insecure</title>

    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>

    <date year="2021" month="February" day="21"/>

    
    
    

    <abstract>


<t>Performing DNSKEY algorithm transitions with DNSSEC signing is
unfortunately challenging to get right in practice without decent
tooling support.  This document weighs the correct, completely secure
way of rolling keys against an alternate, significantly simplified,
method that takes a zone through an insecure state.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Performing DNSKEY <xref target="RFC4035"/> algorithm transitions with DNSSEC
<xref target="RFC4033"/> signing is unfortunately challenging to get right in
practice without decent tooling support.  This document weighs the
correct, completely secure way of rolling keys against an alternate,
significantly simplified, method that takes a zone through an insecure
state.</t>

<t>Section 4.1.4 of <xref target="RFC6781"/> describes the necessary steps required
when a new signing key is published for a zone that uses a different
signing algorithm than the currently published keys.  These are the
steps that MUST be followed when zone owners wish to have
uninterrupted DNSSEC protection for their zones.  The steps in this
document are designed to ensure that all DNSKEY records and all DS
<xref target="RFC4509"/> records (and the rest of a zone records) are properly
validatable by validating resolvers throughout the entire process.</t>

<t>Unfortunately, there are a number of these steps that are challenging
to accomplish either because the timing is tricky to get right or
because current software doesn’t support automating the process
easily.  For example, the second step in Section 4.1.4 of <xref target="RFC6781"/>
requires that a new key with the new algorithm (which we refer to as
K_new) be created, but not yet published.  This step also requires
that both the old key (K_old) and K_new sign and generate signatures
for the zone, but with only the K_old key is published even though
signatures from K_new are included.  After this odd mix has been
published for a sufficient time length, based on the TTL, can K_new be
safely introduced and published into the zone as well.</t>

<t>Although many DNSSEC signing solutions may automate the algorithm
rollover steps (making operator involvement unnecessary), many other
tools do not support automated algorithm updates.  In these
environments, the most challenging step is requiring that certain
RRSIGs be published without the corresponding DNSKEYs that created
them.  This will likely require operators to use a text editor on the
contents of a signed zone to carefully select zone records to extract
before publication.  This introduces potentially significant operator
error(s).</t>

<t>This document proposes an alternate, potentially more operationally
robust but less secure, approach to performing algorithm DNSKEY
rollovers for use in these situations.</t>

<section anchor="requirements-notation" title="Requirements notation">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
   “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”,
   and “OPTIONAL” in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>

</section>
</section>
<section anchor="transitioning-temporarily-through-insecurity" title="Transitioning temporarily through insecurity">

<t>An alternate approach to rolling DNSKEYs, especially when the toolsets
being used do not provide easy algorithm rollover approaches, is to
intentionally make the zone become insecure while the DNSKEYs and
algorithms are swapped.  At a high level, this means removing all DS
records from the parent zone during the removal of the old key and the
introduction of a new key using a new algorithm.  Zone TTLs may be
significantly shortened during this period to minimize the period of
insecurity.</t>

<t>Below are the enumerated steps required by this alternate transition
mechanism.  Note that there are still two critical waiting time
requirements (steps 2 and 6) that must be followed carefully.</t>

<t><list style="numbers">
  <t>Optional: lower the TTLs of the zone’s DS record (if possible) and
the SOA’s negative TTL (MINIMUM) <xref target="RFC1035"/>.</t>
  <t>Remove all DS records from the parent zone.</t>
  <t>Ensure the zone is considered unsigned by all validating resolvers
by waiting 2 times the maximum TTL length for the DS record to
expire from caches.  This is the most critical timing.  The author
of this document failed to wait the required time once.  It was not
pretty.</t>
  <t>Replace the old DNSKEY(s) with the old algorithm with new DNSKEY(s)
with the new algorithm(s) in the zone and publish the zone.</t>
  <t>Wait 2 times the zone SOA’s published negative cache time to ensure
the new DNSKEYs will be found by validating resolvers.</t>
  <t>Add the DS record(s) for the new DNSKEYs to the parent zone.</t>
  <t>If the TTLs were modified in the optional step 1, change them back
to their preferred values.</t>
</list></t>

</section>
<section anchor="operational-considerations" title="Operational considerations">

<t>The process of replacing a DNSKEY with an older algorithm, such as
RSAMD5 or RSASHA1 with a more modern one such as RSASHA512 or
ECDSAP256SHA256 can be a daunting task if the zone’s current tooling
doesn’t provide an easy-to-use solution.  This is the case for zone
owners that potentially use command line tools that are integrated
into their zone production environment.</t>

<t>This document describes an alternative approach to rolling DNSKEY
algorithms that may be significantly less prone to operational
mistakes.  However, understanding of the security considerations of
using this approach is paramount.</t>

<t>The document recommends waiting 2 times TTL values in certain cases
for added assurance that the waiting period is long enough for caches
to expire.  In reality, waiting only 1 TTL may be sufficient assuming
all clocks around the world are operating with perfection.</t>

</section>
<section anchor="security-considerations" title="Security considerations">

<t>DNSSEC provides an data integrity protection for DNS data.  This
document specifically calls out a reason why a zone owner may desire
to deliberately turn off DNSSEC while changing the zone’s DNSKEY’s
cryptographic algorithms.  Thus, this is deliberately turning off
security which is potentially harmful if an attacker knows when this
will occur and can use that time window to launch DNS modification
attacks (for example, cache poisoning attacks) against validating
resolvers or other validating DNS infrastructure.</t>

<t>Most importantly, this will deliberately break certain types of DNS
records that must be validatable for them to be effective.  This
includes for example, but not limited to, all DS records for child
zones, DANE <xref target="RFC6698"/><xref target="RFC7671"/><xref target="RFC7672"/>, PGP keys <xref target="RFC7929"/>,
and SSHFP<xref target="RFC4255"/>.  Zone owners must carefully consider which
records within their zone depend on DNSSEC being available before
using the procedure outlined in this document.</t>

<t>Given all of this, it leaves the question of: “why would a zone owner
want to deliberately turn off security temporarily then?”, to which
there is one principal answer.  Simply put, if the the complexity of
doing it the correct way is difficult with existing tooling then the
chances of performing the more complex procedure and introducing an
error, likely making the entire zone unavailable during that time
period, may be significantly higher than the chances of the zone being
attacked during the transition period of the simpler approach where
zone availability is less likely to be impacted.  Simply put, an
invalid zone created by a botched algorithm roll is potentially worse
than an unsigned but still available zone.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC1035" target='https://www.rfc-editor.org/info/rfc1035'>
<front>
<title>Domain names - implementation and specification</title>
<author initials='P.V.' surname='Mockapetris' fullname='P.V. Mockapetris'><organization /></author>
<date year='1987' month='November' />
<abstract><t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1035'/>
<seriesInfo name='DOI' value='10.17487/RFC1035'/>
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC4033" target='https://www.rfc-editor.org/info/rfc4033'>
<front>
<title>DNS Security Introduction and Requirements</title>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'><organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'><organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'><organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'><organization /></author>
<date year='2005' month='March' />
<abstract><t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4033'/>
<seriesInfo name='DOI' value='10.17487/RFC4033'/>
</reference>



<reference  anchor="RFC4035" target='https://www.rfc-editor.org/info/rfc4035'>
<front>
<title>Protocol Modifications for the DNS Security Extensions</title>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'><organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'><organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'><organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'><organization /></author>
<date year='2005' month='March' />
<abstract><t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC).  The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS.  This document describes the DNSSEC protocol modifications.  This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC.  These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications. </t><t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4035'/>
<seriesInfo name='DOI' value='10.17487/RFC4035'/>
</reference>



<reference  anchor="RFC4509" target='https://www.rfc-editor.org/info/rfc4509'>
<front>
<title>Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)</title>
<author initials='W.' surname='Hardaker' fullname='W. Hardaker'><organization /></author>
<date year='2006' month='May' />
<abstract><t>This document specifies how to use the SHA-256 digest type in DNS Delegation Signer (DS) Resource Records (RRs).  DS records, when stored in a parent zone, point to DNSKEYs in a child zone.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4509'/>
<seriesInfo name='DOI' value='10.17487/RFC4509'/>
</reference>



<reference  anchor="RFC6781" target='https://www.rfc-editor.org/info/rfc6781'>
<front>
<title>DNSSEC Operational Practices, Version 2</title>
<author initials='O.' surname='Kolkman' fullname='O. Kolkman'><organization /></author>
<author initials='W.' surname='Mekking' fullname='W. Mekking'><organization /></author>
<author initials='R.' surname='Gieben' fullname='R. Gieben'><organization /></author>
<date year='2012' month='December' />
<abstract><t>This document describes a set of practices for operating the DNS with security extensions (DNSSEC).  The target audience is zone administrators deploying DNSSEC.</t><t>The document discusses operational aspects of using keys and signatures in the DNS.  It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.</t><t>This document obsoletes RFC 4641, as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the DNSSEC operations.</t></abstract>
</front>
<seriesInfo name='RFC' value='6781'/>
<seriesInfo name='DOI' value='10.17487/RFC6781'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference  anchor="RFC7929" target='https://www.rfc-editor.org/info/rfc7929'>
<front>
<title>DNS-Based Authentication of Named Entities (DANE) Bindings for OpenPGP</title>
<author initials='P.' surname='Wouters' fullname='P. Wouters'><organization /></author>
<date year='2016' month='August' />
<abstract><t>OpenPGP is a message format for email (and file) encryption that lacks a standardized lookup mechanism to securely obtain OpenPGP public keys.  DNS-Based Authentication of Named Entities (DANE) is a method for publishing public keys in DNS.  This document specifies a DANE method for publishing and locating OpenPGP public keys in DNS for a specific email address using a new OPENPGPKEY DNS resource record.  Security is provided via Secure DNS, however the OPENPGPKEY record is not a replacement for verification of authenticity via the &quot;web of trust&quot; or manual verification.  The OPENPGPKEY record can be used to encrypt an email that would otherwise have to be sent unencrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7929'/>
<seriesInfo name='DOI' value='10.17487/RFC7929'/>
</reference>



<reference  anchor="RFC7671" target='https://www.rfc-editor.org/info/rfc7671'>
<front>
<title>The DNS-Based Authentication of Named Entities (DANE) Protocol: Updates and Operational Guidance</title>
<author initials='V.' surname='Dukhovni' fullname='V. Dukhovni'><organization /></author>
<author initials='W.' surname='Hardaker' fullname='W. Hardaker'><organization /></author>
<date year='2015' month='October' />
<abstract><t>This document clarifies and updates the DNS-Based Authentication of Named Entities (DANE) TLSA specification (RFC 6698), based on subsequent implementation experience.  It also contains guidance for implementers, operators, and protocol developers who want to use DANE records.</t></abstract>
</front>
<seriesInfo name='RFC' value='7671'/>
<seriesInfo name='DOI' value='10.17487/RFC7671'/>
</reference>



<reference  anchor="RFC7672" target='https://www.rfc-editor.org/info/rfc7672'>
<front>
<title>SMTP Security via Opportunistic DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS)</title>
<author initials='V.' surname='Dukhovni' fullname='V. Dukhovni'><organization /></author>
<author initials='W.' surname='Hardaker' fullname='W. Hardaker'><organization /></author>
<date year='2015' month='October' />
<abstract><t>This memo describes a downgrade-resistant protocol for SMTP transport security between Message Transfer Agents (MTAs), based on the DNS-Based Authentication of Named Entities (DANE) TLSA DNS record. Adoption of this protocol enables an incremental transition of the Internet email backbone to one using encrypted and authenticated Transport Layer Security (TLS).</t></abstract>
</front>
<seriesInfo name='RFC' value='7672'/>
<seriesInfo name='DOI' value='10.17487/RFC7672'/>
</reference>



<reference  anchor="RFC6698" target='https://www.rfc-editor.org/info/rfc6698'>
<front>
<title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='J.' surname='Schlyter' fullname='J. Schlyter'><organization /></author>
<date year='2012' month='August' />
<abstract><t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6698'/>
<seriesInfo name='DOI' value='10.17487/RFC6698'/>
</reference>



<reference  anchor="RFC4255" target='https://www.rfc-editor.org/info/rfc4255'>
<front>
<title>Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</title>
<author initials='J.' surname='Schlyter' fullname='J. Schlyter'><organization /></author>
<author initials='W.' surname='Griffin' fullname='W. Griffin'><organization /></author>
<date year='2006' month='January' />
<abstract><t>This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC).  The document defines a new DNS resource record that contains a standard SSH key fingerprint.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4255'/>
<seriesInfo name='DOI' value='10.17487/RFC4255'/>
</reference>




    </references>


<section anchor="acknowledgments" title="Acknowledgments">

<t>The author has discussed the pros and cons of this approach with
multiple people, including Viktor Dukhovni and Warren Kumari.</t>

</section>
<section anchor="github-version-of-this-document" title="Github Version of this document">

<t>While this document is under development, it can be viewed, tracked,
issued, pushed with PRs, … here:</t>

<t>https://github.com/hardaker/draft-hardaker-dnsop-intentionally-temporarily-insecure</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

