DNS Extensions                                                   S. Rose
Internet-Draft                                                      NIST
Expires: August 5, 2003                                 February 4, 2003


                     DNS Security Document Roadmap
                  draft-ietf-dnsext-dnssec-roadmap-07

Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at http://
   www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on August 5, 2003.

Copyright Notice

   Copyright (C) The Internet Society (2003).  All Rights Reserved.

Abstract

   DNS Security (DNSSEC) technology is composed of extensions to the
   Domain Name System (DNS) protocol that provide data integrity and
   authentication to security aware resolvers and applications through
   the use of cryptographic digital signatures.  Several documents exist
   to describe these extensions and the implementation-specific details
   regarding specific digital signing schemes.  The interrelationship
   between these different documents is discussed here.  A brief
   overview of what to find in which document and author guidelines for
   what to include in new DNS Security documents, or revisions to
   existing documents, is described.





Rose                     Expires August 5, 2003                 [Page 1]


Internet-Draft          DNSSEC Document Roadmap            February 2003


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Interrelationship of DNS Security Documents  . . . . . . . . .  4
   3.  Relationship of DNS Security Documents to other DNS
       Documents  . . . . . . . . . . . . . . . . . . . . . . . . . .  8
   4.  Recommended Content for new DNS Security Documents . . . . . .  9
   4.1 Security Related Resource Records  . . . . . . . . . . . . . .  9
   4.2 Digital Signature Algorithm Implementations  . . . . . . . . .  9
   4.3 Refinement of Security Procedures  . . . . . . . . . . . . . . 10
   4.4 The Use of DNS Security Extensions with Other Protocols  . . . 10
   5.  Security Considerations  . . . . . . . . . . . . . . . . . . . 11
   6.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 12
       Normative References . . . . . . . . . . . . . . . . . . . . . 13
       Informative References . . . . . . . . . . . . . . . . . . . . 15
       Author's Address . . . . . . . . . . . . . . . . . . . . . . . 15
       Full Copyright Statement . . . . . . . . . . . . . . . . . . . 16


































Rose                     Expires August 5, 2003                 [Page 2]


Internet-Draft          DNSSEC Document Roadmap            February 2003


1. Introduction

   This document is intended to provide guidelines for the development
   of supplemental documents describing security extensions to the
   Domain Name System (DNS).

   The main goal of the DNS Security (DNSSEC) extensions is to add data
   authentication and integrity services to the DNS protocol.  These
   protocol extensions should be differentiated from DNS operational
   security issues, which are beyond the scope of this effort.  DNS
   Security documents fall into one or possibly more of the following
   sub-categories: new DNS security resource records, implementation
   details of specific digital signing algorithms for use in DNS
   Security and DNS transaction authentication.  Since the goal of DNS
   Security extensions is to become part of the DNS protocol standard,
   additional documents that seek to refine a portion of the security
   extensions will be introduced as the specifications progress along
   the IETF standards track.

   There is a set of basic guidelines for each sub-category of documents
   that explains what should be included, what should be considered a
   protocol extension, and what should be considered an operational
   issue.  Currently, there are at least two documents that fall under
   operational security considerations that deal specifically with the
   DNS security extensions: the first is RFC 2541 [6] which deals with
   the operational side of implementing the security extensions; the
   other is the CAIRN DNSSEC testbed Internet draft [CAIRN].  These
   documents should be considered part of the operational side of DNS,
   but will be addressed as a supplemental part of the DNS Security
   roadmap.  That is not to say that these two documents are not
   important to securing a DNS zone, but they do not directly address
   the proposed DNS security extensions.  Authors of documents that seek
   to address the operational concerns of DNS security should be aware
   of the structure of DNS Security documentation.

   It is assumed the reader has some knowledge of the Domain Name System
   [2] and the Domain Name System Security Extensions.














Rose                     Expires August 5, 2003                 [Page 3]


Internet-Draft          DNSSEC Document Roadmap            February 2003


2. Interrelationship of DNS Security Documents

   The DNSSEC set of documents can be partitioned into five main groups
   as depicted in Figure 1.  All of these documents in turn are under
   the larger umbrella group of DNS base protocol documents.  It is
   possible that some documents fall into more than one of these
   categories, such as RFC 2535, and should follow the guidelines for
   the all of the document groups it falls into.  However, it is wise to
   limit the number of "uberdocuments" that try to be everything to
   everyone.  The documents listed in each category are current as to
   the time of writing.








































Rose                     Expires August 5, 2003                 [Page 4]


Internet-Draft          DNSSEC Document Roadmap            February 2003


   ---------------------------------------------------------------------



                    +--------------------------------+
                    |                                |
                    |    Base DNS Protocol Docs.     |
                    |   [RFC1035, RFC2181, etc.]     |
                    |                                |
                    +--------------------------------+
                                    |
                                    |
                                    |
      +------------+          +-----------+          +-------------+
      |  New       |          |  DNSSEC   |          |  New        |
      |  Security  |----------|  protocol |----------|  Security   |
      |  RRs       |          |           |          |  Uses       |
      +------------+          |           |          +-------------+
                              +-----------+
                                    |
                                    |
             +----------------------+***********************
             |                      *                      *
             |                      *                      *
       +------------+       +---------------+      +-*-*-*-*-*-*-*-*-+
       |  DS        |       |               |      | Implementation  |
       |  Algorithm |       |  Transactions |      * Notes           *
       |  Impl.     |       |               |      |                 |
       +------------+       +---------------+      +-*-*-*-*-*-*-*-*-+




                        DNSSEC Document Roadmap

   ---------------------------------------------------------------------

   The "DNSSEC protocol" document set refers to the document that makes
   up the groundwork for adding security to the DNS protocol [1]and
   updates to this document.  RFC 2535 laid out the goals and
   expectations of DNS Security and the new security-related Resource
   Records KEY, SIG, DS, and NXT [23].  Expanding from this document,
   related document groups include the implementation documents of
   various digital signature algorithms with DNSSEC, and documents
   further refining the transaction of messages.  It is expected that
   RFC 2535 will be obsoleted by one or more documents that refine the
   set of security extensions [22], [23], [24].  Documents that seek to
   modify or clarify the base protocol documents should state so clearly



Rose                     Expires August 5, 2003                 [Page 5]


Internet-Draft          DNSSEC Document Roadmap            February 2003


   in the introduction of the document (as well as proscribe to the IETF
   guidelines of RFC/Internet Draft author guidelines).  Also, the
   portions of the specification to be modified should be synopsized in
   the new document for the benefit of the reader.  The "DNSSEC
   protocol" set includes the documents [1], [11], [12], [9], [14],
   [15], [21], [16], [OPTIN], [17] and their derivative documents.

   The "New Security RRs" set refers to the group of documents that seek
   to add additional Resource Records to the set of base DNS Record
   types.  These new records can be related to securing the DNS protocol
   [1], [8], or using DNS security for other purposes such as storing
   certificates [5].  Another related document is [26].  While not
   detailing a new RR type, it defines a flag bit in the existing KEY
   RR.  This flag bit does not affect the protocol interpretation of the
   RR, only a possible operational difference.  Therefore, this draft is
   place here and not with the protocol document set.

   The "DS Algorithm Impl" document set refers to the group of documents
   that describe how a specific digital signature algorithm is
   implemented to fit the DNSSEC Resource Record format.  Each one of
   these documents deals with one specific digital signature algorithm.
   Examples of this set include [4], [5], [25], [19][18] and [13].

   The "Transactions" document set refers to the group of documents that
   deal with the message transaction sequence of security-related DNS
   operations.  The contents and sequence for operations such as dynamic
   update [3], [11] and transaction signatures [10] are described in
   this document category.  Additional message transaction schemes to
   support DNSSEC operation would also fall under this group, including
   secret key establishment [7], [RENEW], and verification.

   The final document set, "New Security Uses", refers to documents that
   seek to use proposed DNS Security extensions for other security
   related purposes.  Documents that fall in this category include the
   use of DNS in the storage and distribution of certificates and
   individual user public keys (PGP, e-mail, etc.)  Some documents in
   this group may fall beyond the DNSEXT WG scope, but they are included
   because of their use of the security extensions.  The documents in
   this group should not propose any changes to the DNS protocol to
   support other protocols; only how existing DNS security records and
   transactions can be used to support other protocols.  Such documents
   include [SSH-DNS] and [IPSEC-DNS] which deals with storing SSH and
   IPSec keying information the DNS using new records and utilizing
   DNSSEC to provide authentication and integrity checking.

   Lastly, there is a set of documents that should be classified as
   "Implementation Notes".  Because the DNS security extensions are
   still in the developmental stage, there is an audience for documents



Rose                     Expires August 5, 2003                 [Page 6]


Internet-Draft          DNSSEC Document Roadmap            February 2003


   that detail the transition and implementation of the security
   extensions.  These have more to do with the practical side of DNS
   operations, but can also point to places in the protocol
   specifications that need improvement.  An example of this type is the
   report on the CAIRN DNSSEC testbed [CAIRN] This document was
   submitted through the DNSOP Working Group at the time of this
   writing, however the main concern of this document is the
   implementation and limitations of the DNS security extensions, hence
   their interest to the DNS security community.  The CAIRN draft deals
   with the implementation of a secure DNS.  Authors of documents that
   deal with the implementation and operational side of the DNSSEC
   specifications would be advised/encouraged to submit their documents
   to any other relevant DNS related WG meeting in the problem space.






































Rose                     Expires August 5, 2003                 [Page 7]


Internet-Draft          DNSSEC Document Roadmap            February 2003


3.  Relationship of DNS Security Documents to other DNS Documents

   The DNS security-related extensions should be considered a subset of
   the DNS protocol.  Therefore, all DNS security-related documents
   should be seen as a subset of the main DNS architecture documents.
   It is a good idea for authors of future DNS security documents to be
   familiar with the contents of these base protocol documents.












































Rose                     Expires August 5, 2003                 [Page 8]


Internet-Draft          DNSSEC Document Roadmap            February 2003


4.  Recommended Content for new DNS Security Documents

   Documents that seek to make additions or revisions to the DNS
   protocol to add security should follow common guidelines as to
   minimum required content and structure.  It is the purpose of this
   document roadmap to establish criteria for content that any new DNS
   security protocol specifications document should contain.  These
   criteria should be interpreted as a minimum set of information
   required/needed in a document, any additional information regarding
   the specific extension should also be included in the document.
   These criteria are not officially part of the IETF guidelines
   regarding RFC/Internet Drafts, but should be considered as guidance
   to promote uniformity to Working Group documents.

   Since the addition of security to the DNS protocol is now considered
   a general extension to the DNS protocol, any guideline for the
   contents of a DNS Security document could be taken as a framework
   suggestion for the contents of any DNS extension document.  The
   development process of the DNS security extensions could be used as a
   model framework for any, more general DNS extensions.

4.1 Security Related Resource Records

   Documents describing a new type of DNS Security Resource Record (RR)
   should contain information describing the structure and use of the
   new RR type.  It is a good idea to only discuss one new type in a
   document, unless the set of new resource records are closely related
   or a protocol extension requires the use of more than one new record
   type.  Specifically, each document detailing a new security-related
   RR type should include the following information:

   o  The format of the new RR type, both "on the wire" (bit format) and
      ASCII representation (for text zone files), if appropriate;

   o  when and in what section of a DNS query/response this new RR type
      is to be included;

   o  at which level of the DNS hierarchy this new RR type is to be
      considered authoritative (i.e.  in a zone, in a zone's superzone)
      and who is authoritative to sign the new RR;


4.2 Digital Signature Algorithm Implementations

   Documents describing the implementation details of a specific digital
   signature algorithm such as [4] ,[13] (and others as new digital
   signatures schemes are introduced) for use with DNS Security should
   include the following information:



Rose                     Expires August 5, 2003                 [Page 9]


Internet-Draft          DNSSEC Document Roadmap            February 2003


   o  The format/encoding of the algorithm's public key for use in a KEY
      Resource Record;

   o  the acceptable key size for use with the algorithm;

   o  the current known status of the algorithm (as one of REQUIRED,
      RECOMMENDED, or OPTIONAL).

   In addition, authors are encouraged to include any necessary
   description of the algorithm itself, as well as any know/suspected
   weaknesses as an appendix to the document.  This is for reference
   only, as the goals of the DNSEXT working group is to propose
   extensions to the DNS protocol, not cryptographic research.

4.3 Refinement of Security Procedures

   This set of documents includes DNS protocol operations that
   specifically relate to DNS Security, such as DNS secret key
   establishment [7]  and security extensions to pre-existing or
   proposed DNS operations such as dynamic update [3].  Documents that
   describe a new set of DNS message transactions, or seek to refine a
   current series of transactions that make up a DNS operation should
   include the following information:

   o  The order in which the DNS messages are sent by the operation
      initiator and target;

   o  the format of these DNS messages;

   o  any required authentication mechanisms for each stage of the
      operation and the required authority for that mechanism (i.e.
      zone, host, or some other trusted authority such as a DNS
      administrator or certificate authority);


4.4 The Use of DNS Security Extensions with Other Protocols

   Because of the flexibility and ubiquity of the DNS, there may exist
   other Internet protocols and applications that could make use of, or
   extend, the DNS security protocols.  Examples of this type of
   document include the use of DNS to support IPSEC [IPSEC-DNS], SSH
   [SSH-DNS] the Public Key Infrastructure (PKI).  It is beyond the
   scope of this roadmap to describe the contents of this class of
   documents.  However, if uses or extensions require the addition or
   modification of a DNS Resource Record type or DNS query/response
   transactions, then the guidelines laid out in the previous sections
   of this document should be adhered to.




Rose                     Expires August 5, 2003                [Page 10]


Internet-Draft          DNSSEC Document Roadmap            February 2003


5. Security Considerations

   This document provides a roadmap and guidelines for writing DNS
   Security related documents.  This document does not discuss the
   aspects of the DNS security extensions.  The reader should refer to
   the documents outlined here for the details of the services and
   shortcomings of DNS security.












































Rose                     Expires August 5, 2003                [Page 11]


Internet-Draft          DNSSEC Document Roadmap            February 2003


6. Acknowledgements

   In addition to the RFCs mentioned in this document, there are also
   numerous Internet drafts that fall in one or more of the categories
   of DNS Security documents mentioned above.  Depending on where (and
   if) these documents are on the IETF standards track, the reader may
   not be able to access these documents through the RFC repositories.
   All of these documents are "Work in Progress" and are subject to
   change; therefore a version number is not supplied for the current
   revision.  Some Internet Drafts are in the RFC editor's queue or
   nearing WG Last Call at the time of writing.  These Drafts have been
   placed in the References section.  The drafts below are still subject
   to agreement in the IETF.

   o  CAIRN:  D.  Massey, T.  Lehman, and E.  Lewis.  "DNSSEC
      Implementation in the CAIRN Testbed".  draft-ietf-dnsop-
      dnsseccairn-NN.txt

   o  OPTIN:  M.  Kosters.  "DNSSEC Opt-in for Large Zones"  draft-
      kosters-dnsext-dnssec-opt-in-NN.txt

   o  SSH-DNS:  W.  Griffin, J.  Schlyter.  "Using DNS to securely
      publish SSH key fingerprints"  draft-ietf-secsh-dns-NN.txt

   o  IPSEC-DNS:  M.  Richardson.  "A method for storing IPsec keying
      material in DNS".  draft-richardson-ipsec-rr-NN.txt

   o  RENEW:  Y.  Kamite, M.  Nakayama.  "TKEY Secret Key Renewal Mode".
      draft-ietf-dnsext-tkey-renewal-mode-NN.txt






















Rose                     Expires August 5, 2003                [Page 12]


Internet-Draft          DNSSEC Document Roadmap            February 2003


Normative References

   [1]   Eastlake, D., "Domain Name System Security Extensions", RFC
         2535, March 1999.

   [2]   Mockapetris, P., "Domain names - implementation and
         specification", STD 13, RFC 1035, November 1987.

   [3]   Eastlake, D., "Secure Domain Name System Dynamic Update", RFC
         2137, April 1997.

   [4]   Eastlake, D., "DSA KEYs and SIGs in the Domain Name System
         (DNS)", RFC 2536, March 1999.

   [5]   Eastlake, D. and O. Gudmundsson, "Storing Certificates in the
         Domain Name System (DNS)", RFC 2538, March 1999.

   [6]   Eastlake, D., "DNS Security Operational Considerations", RFC
         2541, March 1999.

   [7]   Eastlake, D., "Secret Key Establishment for DNS (TKEY RR)", RFC
         2930, September 2000.

   [8]   Eastlake, D., "DNS Request and Transaction Signatures (
         SIG(0)s)", RFC 2931, September 2000.

   [9]   Lewis, E., "DNS Security Extension Clarification on Zone
         Status", RFC 3090, March 2001.

   [10]  Vixie, P., Gudmundsson, O., Eastlake, D. and B. Wellington,
         "Secret Key Transaction Authentication for DNS (TSIG)", RFC
         2845, May 2000.

   [11]  Wellington, B., "Secure Domain Name System (DNS) Dynamic
         Update", RFC 3007, November 2000.

   [12]  Wellington, B., "Domain Name System Security (DNSSEC) Signing
         Authority", RFC 3008, April 2000.

   [13]  Eastlake, D., "RSA/SHA-1 SIGs and RSA KEYs in the Domain Name
         System (DNS)", RFC 3110, May 2001.

   [14]  Conrad, D., "Indicating Resolver Support of DNSSEC", RFC 3225,
         December 2001.

   [15]  Gudmundsson, O., "DNSSEC and IPv6 A6 aware server/resolver
         message size requirements", RFC 3226, December 2001.




Rose                     Expires August 5, 2003                [Page 13]


Internet-Draft          DNSSEC Document Roadmap            February 2003


   [16]  Massey, D. and S. Rose, "Limiting the Scope of the KEY Resource
         Record (RR)", RFC 3445, December 2002.

















































Rose                     Expires August 5, 2003                [Page 14]


Internet-Draft          DNSSEC Document Roadmap            February 2003


Informative References

   [17]  Austein, R. and D. Atkins, "Threat Analysis of the Domain Name
         System (Work in Progress)", RFC XXXX.

   [18]  Eastlake, R., "Storage of Diffie-Hellman Keys in the Domain
         Name System (DNS) (Work in Progress)", RFC XXXX.

   [19]  Eastlake, D. and R. Schroeppel, "Elliptic Curve KEYs in the DNS
         (Work in Progress)", RFC XXXX.

   [20]  Gundmundsson, O., "Delegation Signer Record in Parent (Work in
         Progress)", RFC XXXX.

   [21]  Wellington, B., "Redefinition of the DNS AD bit (Work in
         Progress)", RFC XXXX.

   [22]  Arends, R., Larson, M., Massey, D. and S. Rose, "DNS Security
         Introduction and Requirements (Work in Progress)", RFC XXXX.

   [23]  Arends, R., Larson, M., Massey, D. and S. Rose, "Resource
         Records for DNS Security Extensions (Work in Progress)", RFC
         XXXX.

   [24]  Arends, R., Larson, M., Massey, D. and S. Rose, "Protocol
         Modifications for the DNS Security Extensions (Work in
         Progress)", RFC XXXX.

   [25]  Kwan, S., Garg, P., Gilroy, J. and L. Esibov, "GSS Algorithm
         for TSIG (Work in Progress)", RFC XXXX.

   [26]  Kolkman, O. and J. Schlyter, "KEY RR Key-Signing-Key (KSK) Flag
         (Work in Progress)", RFC XXXX.


Author's Address

   Scott Rose
   National Institute for Standards and Technology
   100 Bureau Drive
   Gaithersburg, MD  20899-3460
   USA

   EMail: scott.rose@nist.gov







Rose                     Expires August 5, 2003                [Page 15]


Internet-Draft          DNSSEC Document Roadmap            February 2003


Full Copyright Statement

   Copyright (C) The Internet Society (2003).  All Rights Reserved.

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works.  However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Acknowledgement

   Funding for the RFC Editor function is currently provided by the
   Internet Society.



















Rose                     Expires August 5, 2003                [Page 16]