DNSSEC Operational Practices, Version 2
draft-ietf-dnsop-rfc4641bis-13
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-12-05
|
(System) | Posted related IPR disclosure: VeriSign, Inc.'s Statement about IPR related to draft-ietf-dnsop-rfc4641bis-13 and draft-koch-dnsop-dnssec-operator-change-04 | |
2012-09-13
|
13 | Cindy Morgan | State changed to RFC Ed Queue from Approved-announcement sent |
2012-09-11
|
13 | (System) | IANA Action state changed to No IC |
2012-09-11
|
13 | Cindy Morgan | State changed to Approved-announcement sent from Approved-announcement to be sent |
2012-09-11
|
13 | Cindy Morgan | IESG has approved the document |
2012-09-11
|
13 | Cindy Morgan | Closed "Approve" ballot |
2012-09-11
|
13 | Cindy Morgan | Ballot approval text was generated |
2012-09-11
|
13 | Cindy Morgan | Ballot writeup was changed |
2012-09-11
|
13 | Ron Bonica | State changed to Approved-announcement to be sent from Approved-announcement to be sent::Point Raised - writeup needed |
2012-09-11
|
13 | Matthijs Mekking | New version available: draft-ietf-dnsop-rfc4641bis-13.txt |
2012-08-30
|
12 | Cindy Morgan | State changed to Approved-announcement to be sent::Point Raised - writeup needed from Waiting for AD Go-Ahead |
2012-08-30
|
12 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Ready with Issues. Reviewer: Shawn Emery. |
2012-08-30
|
12 | Stewart Bryant | [Ballot comment] I have not read this draft, but from the reviews of my IESG colleagues, it is clear that I would have no objection … [Ballot comment] I have not read this draft, but from the reviews of my IESG colleagues, it is clear that I would have no objection to it's publication. |
2012-08-30
|
12 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant |
2012-08-30
|
12 | Pete Resnick | [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick |
2012-08-30
|
12 | Barry Leiba | [Ballot comment] Another vote for "A fine document." And another vote for "Turn Appendix E into a retained summary of changes from 4641." |
2012-08-30
|
12 | Barry Leiba | [Ballot Position Update] New position, Yes, has been recorded for Barry Leiba |
2012-08-30
|
12 | Sean Turner | [Ballot comment] This was a pleasure to read - nicely done. One shameless plug for security considerations of MD5 and SHA-1: RFC 6151 (MD5 Security … |
2012-08-30
|
12 | Sean Turner | [Ballot Position Update] New position, Yes, has been recorded for Sean Turner |
2012-08-29
|
12 | Stephen Farrell | [Ballot comment] Excellent document, thanks. I found the diff from RFC 4641 to be too big to be much use (with the time available for … [Ballot comment] Excellent document, thanks. I found the diff from RFC 4641 to be too big to be much use (with the time available for review) so feel free to tell me where to go if I make a comment on existing 4641 text and you don't wanna think about the comment. - 3.4.1 - I think its fair to say now that rsa-sha256 is widely supported in libraries at least. I've no idea about how well its supported in validators, but the lack of sha256 in libraries was previously the cause of delay elsewhere. - 3.4.4 - Maybe worth a reference to the Lenstra paper [1] as a warning to use good RNGs. They found a non-negligible percentage of keys that were badly generated due (presumably) to a lack of good randomness when e.g. devices were first powered on. [1] http://eprint.iacr.org/2012/064 - 4.4.1 - "to be a fraction of your signature validity period" is unclear. 1/100000 is a fraction as is 9/10 but so is 100000/1. In another reading of that text you might also be asking that the signature validity period be a multiple of the TTL. I think that needs to be made more clear. - 4.4.2.2 - Is "Inception time" well (enough) defined? It is mentioned in 1.2 but I'd forgotten that by the time I got here and 1.2 doesn't have a reference. Might be no harm to say a bit more about what that is in both places. (In particular since here, you also have the inception offset which is not defined in this doc.) Maybe do that in appendix A? typos: - p8, last sentence of 3rd para has a typo, maybe s/are based/that are based/ - p10, typo, s/it's not much point/there's not much point/ |
2012-08-29
|
12 | Stephen Farrell | [Ballot Position Update] New position, Yes, has been recorded for Stephen Farrell |
2012-08-29
|
12 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded for Ralph Droms |
2012-08-29
|
12 | Adrian Farrel | [Ballot comment] I would also like a summary of changes from 4641 to be retained in the final document. |
2012-08-29
|
12 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2012-08-29
|
12 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded for Robert Sparks |
2012-08-29
|
12 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley |
2012-08-28
|
12 | Brian Haberman | [Ballot comment] I have no problems with the publication of this document, but I do have one suggestion... The change information in Appendix E is … [Ballot comment] I have no problems with the publication of this document, but I do have one suggestion... The change information in Appendix E is quite useful, but it currently says it should be deleted prior to publication. I would suggest keeping the appendix, maybe in a more condensed format, to identify the key changes made from RFC 4641. |
2012-08-28
|
12 | Brian Haberman | [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman |
2012-08-28
|
12 | Wesley Eddy | [Ballot Position Update] New position, No Objection, has been recorded for Wesley Eddy |
2012-08-24
|
12 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call |
2012-08-19
|
12 | Ron Bonica | Placed on agenda for telechat - 2012-08-30 |
2012-08-19
|
12 | Ron Bonica | Ballot has been issued |
2012-08-19
|
12 | Ron Bonica | [Ballot Position Update] New position, Yes, has been recorded for Ronald Bonica |
2012-08-19
|
12 | Ron Bonica | Created "Approve" ballot |
2012-08-16
|
12 | Jean Mahoney | Request for Last Call review by GENART is assigned to Mary Barnes |
2012-08-16
|
12 | Jean Mahoney | Request for Last Call review by GENART is assigned to Mary Barnes |
2012-08-16
|
12 | Pearl Liang | IANA has reviewed draft-ietf-dnsop-rfc4641bis-12, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any IANA … IANA has reviewed draft-ietf-dnsop-rfc4641bis-12, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any IANA actions. |
2012-08-10
|
12 | Sam Weiler | Request for Last Call review by SECDIR is assigned to Shawn Emery |
2012-08-10
|
12 | Sam Weiler | Request for Last Call review by SECDIR is assigned to Shawn Emery |
2012-08-10
|
12 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (DNSSEC Operational Practices, Version 2) to … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (DNSSEC Operational Practices, Version 2) to Informational RFC The IESG has received a request from the Domain Name System Operations WG (dnsop) to consider the following document: - 'DNSSEC Operational Practices, Version 2' as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2012-08-24. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document describes a set of practices for operating the DNS with security extensions (DNSSEC). The target audience is zone administrators deploying DNSSEC. The document discusses operational aspects of using keys and signatures in the DNS. It discusses issues of key generation, key storage, signature generation, key rollover, and related policies. This document obsoletes RFC 4641 as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the DNSSEC operations. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-dnsop-rfc4641bis/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-dnsop-rfc4641bis/ballot/ No IPR declarations have been submitted directly on this I-D. |
2012-08-10
|
12 | Amy Vezza | State changed to Last Call Requested from None |
2012-08-10
|
12 | Ron Bonica | Last call was requested |
2012-08-10
|
12 | Ron Bonica | Last call announcement was generated |
2012-08-10
|
12 | Ron Bonica | Ballot approval text was generated |
2012-08-10
|
12 | Ron Bonica | State changed to Last Call Requested from AD Evaluation |
2012-08-10
|
12 | Ron Bonica | State changed to AD Evaluation from Publication Requested |
2012-08-10
|
12 | Ron Bonica | Ballot writeup was changed |
2012-08-10
|
12 | Ron Bonica | Ballot writeup was generated |
2012-07-23
|
12 | Cindy Morgan | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? This draft, , aims at "Informational" status and obsoletes RFC 4641, which has the same status. The WG discussed BCP status but it was felt that there is too little experience beyond root and TLD operations to justofy "best". For the same reason, the document tries to discuss practices and their tradeoffs rather than giving strong recommendations. This is also explained in the Introduction. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document describes a set of practices for operating the DNS with security extensions (DNSSEC). The target audience is DNS zone administrators deploying DNSSEC. The document discusses operational aspects of using keys and signatures in the DNS. It elaborates on issues of key generation, key storage, signature generation, key rollover, and related tasks. Working Group Summary The draft started as an updated version of RFC 4641 in 2009 and and was updated through WG contributions up to version -06 that got WGLC'ed in April 2011. Multiple comments received during the WGLC as well as after this were taken into account with the consent of the WG, leading to version -12 as of today. No part of the document was particluarly contentious, as the draft primarily discusses tradeoffs in favor of making recommendations. That means reasonable dissenting views could be and are reflected in the document. Document Quality This draft is a definitive improvement over RFC 4641, which it strives to replace. Various TLD and other zones' DNSSEC practices are in line with, or within the boundaries of this draft, that therefore reflects the collective wisdom of those active operators who chose to contribute. The draft received significant review within the WG as well as attention outside the IETF. Personnel Peter Koch is the document shepherd, Ron Bonica is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd reviewed this latest -12 version as well as previous versions. NITS level review was applied and addressed in -12. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document has received widespread attention within the DNSOP WG as well as outside the IETF. There are no concerns regarding the depth or breadth of the review. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. As the draft talks about cryptographic parameters, such as DNSSEC key sizes and algorithms, the input of experienced IETF attendees with security and cryptographic background is highly appreciated. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. N/A (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. There is no IPR field against this draft as per (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The WG consensus behind the document is strong. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) N/A (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. The draft passes the IETF ID nits checker with two relevant warnings: RFC 2119 language is used only where the draft quotes other RFCs, therefore the 2119 boilerplate was not used. This is already addressed in the introduction. The draft uses the boilerplate for pre-5378 work, because it is an extended update of RFC 4641. Not all contributors to that RFC (as per the extensive acknowledgement section) have been asked for permission. Both WG chairs, including the shepherd, did independent nits reviews for consistency, language and, well, nits. These have been addressed in -08 and subsequent versions of the draft. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. N/A (13) Have all references within this document been identified as either normative or informative? All core DNS and DNSSEC RFCs are considered Normative. Other RFCs, DNS or otherwise, as well as non-IETF documents are considered Informative. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? N/A (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. N/A (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. This draft intends to obsolete RFC 4641 while maintaining Informational status. This is refelected in the header as well as in the abstract and introduction. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). This document does neither request registrations nor define a IANA registry. This is rightfully addressed in section 7 of the draft. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. N/A (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. There is no such formal language. All DNS examples have been inspected as appropriate and to the extent possible (DNSSEC signatures are intentionally shortened) during the review process. State diagrams in figures 1 through 15 have been reviewed manually. |
2012-07-23
|
12 | Cindy Morgan | Note added 'Peter Koch (pk@ISOC.DE) is the document shepherd.' |
2012-07-23
|
12 | Cindy Morgan | Intended Status changed to Informational |
2012-07-23
|
12 | Cindy Morgan | IESG process started in state Publication Requested |
2012-07-23
|
12 | Peter Koch | IETF state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2012-07-23
|
12 | Peter Koch | Changed protocol writeup |
2012-07-16
|
12 | Peter Koch | WG consensus determined after WGLC, nits addressed in -12, submission to AD |
2012-07-16
|
12 | Matthijs Mekking | New version available: draft-ietf-dnsop-rfc4641bis-12.txt |
2012-04-13
|
11 | Matthijs Mekking | New version available: draft-ietf-dnsop-rfc4641bis-11.txt |
2012-03-30
|
10 | Matthijs Mekking | New version available: draft-ietf-dnsop-rfc4641bis-10.txt |
2012-02-14
|
09 | (System) | New version available: draft-ietf-dnsop-rfc4641bis-09.txt |
2011-12-05
|
09 | Peter Koch | WGLC discussion on the list did not raise objections |
2011-12-05
|
09 | Peter Koch | IETF state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2011-10-31
|
08 | (System) | New version available: draft-ietf-dnsop-rfc4641bis-08.txt |
2011-07-11
|
07 | (System) | New version available: draft-ietf-dnsop-rfc4641bis-07.txt |
2011-06-27
|
09 | Peter Koch | Initial datatracker status update; initiated four week WGLC on 2011-04-18 (ending 2011-05-17) |
2011-06-27
|
09 | Peter Koch | IETF state changed to In WG Last Call from WG Document |
2011-03-11
|
06 | (System) | New version available: draft-ietf-dnsop-rfc4641bis-06.txt |
2010-10-22
|
05 | (System) | New version available: draft-ietf-dnsop-rfc4641bis-05.txt |
2010-08-02
|
04 | (System) | New version available: draft-ietf-dnsop-rfc4641bis-04.txt |
2010-07-12
|
03 | (System) | New version available: draft-ietf-dnsop-rfc4641bis-03.txt |
2010-02-26
|
02 | (System) | New version available: draft-ietf-dnsop-rfc4641bis-02.txt |
2009-09-07
|
09 | (System) | Document has expired |
2009-03-06
|
01 | (System) | New version available: draft-ietf-dnsop-rfc4641bis-01.txt |
2009-03-02
|
00 | (System) | New version available: draft-ietf-dnsop-rfc4641bis-00.txt |