<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.32 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-hardaker-dnsop-intentionally-temporary-insec-01" category="bcp">

  <front>
    <title abbrev="Intentionally Temporarily Degraded or Insecure">Intentionally Temporarily Degraded or Insecure</title>

    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>

    <date year="2021" month="October" day="20"/>

    
    
    

    <abstract>


<t>Performing DNSKEY algorithm transitions with DNSSEC signing is
unfortunately challenging to get right in practice without decent
tooling support.  This document weighs the correct, completely secure
way of rolling keys against an alternate, significantly simplified,
method that takes a zone through an insecure state.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Performing DNSKEY <xref target="RFC4035"/> algorithm transitions with DNSSEC
<xref target="RFC4033"/> signing is unfortunately challenging to get right in
practice without decent tooling support.  This document weighs the
correct, completely secure way of rolling keys against an alternate,
significantly simplified, method that takes a zone through an insecure
state.</t>

<t>Section 4.1.4 of <xref target="RFC6781"/> describes the necessary steps required
when a new signing key is published for a zone that uses a different
signing algorithm than the currently published keys.  These are the
steps that MUST be followed when zone owners wish to have
uninterrupted DNSSEC protection for their zones.  The steps in this
document are designed to ensure that all DNSKEY records and all DS
<xref target="RFC4509"/> records (and the rest of a zone records) are properly
validatable by validating resolvers throughout the entire process.</t>

<t>Unfortunately, there are a number of these steps that are challenging
to accomplish either because the timing is tricky to get right or
because current software doesn’t support automating the process
easily.  Some examples:</t>

<t><list style="numbers">
  <t>The second step in Section 4.1.4 of <xref target="RFC6781"/> requires that a new
key with the new algorithm (which we refer to as K_new) be created,
but not yet published.  This step also requires that both the old
key (K_old) and K_new sign and generate signatures for the zone,
but with only the K_old key is published even though signatures
from K_new are included.  After this odd mix has been published for
a sufficient time length, based on the TTL, can K_new be safely
introduced and published into the zone as well.</t>
  <t>The new algorithm to be deployed isn’t supported in the existing
DNSSEC signing software and it is not possible (or not desired) to
move the private key into the DNSSEC signer that supports the new
algorithm choice.</t>
</list></t>

<t>Although many DNSSEC signing solutions may automate the algorithm
rollover steps (making operator involvement unnecessary), many other
tools do not support automated algorithm updates.  In these
environments, the most challenging step is requiring that certain
RRSIGs be published without the corresponding DNSKEYs that created
them.  This will likely require operators to use a text editor on the
contents of a signed zone to carefully select zone records to extract
before publication.  This introduces potentially significant operator
error(s).</t>

<t>This document proposes an alternate, potentially more operationally
robust but less secure, approach to performing algorithm DNSKEY
rollovers for use in these situations.</t>

<section anchor="requirements-notation" title="Requirements notation">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
   “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”,
   and “OPTIONAL” in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>

</section>
</section>
<section anchor="temporary-transition-mechanisms" title="Temporary transition mechanisms">

<section anchor="transitioning-temporarily-through-insecurity" title="Transitioning temporarily through insecurity">

<t>An alternate approach to rolling DNSKEYs, especially when the toolsets
being used do not provide easy algorithm rollover approaches, is to
intentionally make the zone become insecure while the DNSKEYs and
algorithms are swapped.  At a high level, this means removing all DS
records from the parent zone during the removal of the old key and the
introduction of a new key using a new algorithm.  Zone TTLs may be
significantly shortened during this period to minimize the period of
insecurity.</t>

<t>Below are the enumerated steps required by this alternate transition
mechanism.  Note that there are still two critical waiting time
requirements (steps 2 and 6) that must be followed carefully.</t>

<t><list style="numbers">
  <t>Optional: lower the TTLs of the zone’s DS record (if possible),
and the TTL of the DNSKEY RRset.</t>
  <t>Remove all DS records from the parent zone.</t>
  <t>Ensure the zone is considered unsigned by all validating resolvers
by waiting 2 times the maximum TTL length for the DS record, and/or 2 times the largest TTL found in the zone (whichever is larger) to
expire from caches.  This is the most critical timing.  The author
of this document failed to wait the required time once.  It was not
pretty.</t>
  <t>Replace the old DNSKEY(s) with the old algorithm with new DNSKEY(s)
with the new algorithm(s) in the zone and publish the zone.</t>
  <t>Wait 2 times the largest TTL found in the zone to ensure
the new DNSKEYs will be found by validating resolvers.</t>
  <t>Add the DS record(s) for the new DNSKEYs to the parent zone.</t>
  <t>If the TTLs were modified in the optional step 1, change them back
to their preferred values.</t>
</list></t>

</section>
<section anchor="transitioning-using-two-dns-servers" title="Transitioning using two DNS servers">

<t>Another option for performing an algorithm roll is to make use of two
(or more) NS records, where one of them continues to serve a zone
signed by the old algorithm and the other authoritative server
switches to serving the zone using the new DNSKEY and its new
algorithm.  This allows for clients that end up at the wrong NS to
eventually give up and switch to the other, containing the expected
algorithm.  The downside of this approach is the deliberate delay in
resolutions for resolvers that query the wrong authoritative server
for the DS record they are trying to match.</t>

<t>The steps for deploying this technique to switch algorithms is as follows:</t>

<t><list style="numbers">
  <t>Optional: lower the TTLs of the zone’s DS record (if possible) and
the SOA’s negative TTL (MINIMUM) <xref target="RFC1035"/>.</t>
  <t>Ensure your zone has matching NS records in both the child data and
in the parent data.</t>
  <t>Leaving the old algorithm DS record in the parent zone.  Resign the
child zone using a new DNSKEY with the new algorithm and publish it
on roughly 50% of the zone’s authoritative nameservers.</t>
  <t>Wait a period of time equal to max(TTL in the zone, DS record).</t>
  <t>Simultaneously remove the old DS record from the parent, and
publish a new DS record that refers to the new DNSKEY (and its new
algorithm).</t>
  <t>Wait a period of time equal to max(TTL in the zone, DS record).</t>
  <t>Update the authoritative nameservers that remained publishing the
older copy of the zone.  All authoritative servers can now publish
the updated zone with the new DNSKEYs.</t>
</list></t>

<t>Credit for this idea goes to Tuomo Soini and Paul Wouters.</t>

</section>
</section>
<section anchor="operational-considerations" title="Operational considerations">

<t>The process of replacing a DNSKEY with an older algorithm, such as
RSAMD5 or RSASHA1 with a more modern one such as RSASHA512 or
ECDSAP256SHA256 can be a daunting task if the zone’s current tooling
doesn’t provide an easy-to-use solution.  This is the case for zone
owners that potentially use command line tools that are integrated
into their zone production environment.</t>

<t>This document describes an alternative approach to rolling DNSKEY
algorithms that may be significantly less prone to operational
mistakes.  However, understanding of the security considerations of
using this approach is paramount.</t>

<t>The document recommends waiting 2 times TTL values in certain cases
for added assurance that the waiting period is long enough for caches
to expire.  In reality, waiting only 1 TTL may be sufficient assuming
all clocks around the world are operating with perfection.</t>

</section>
<section anchor="security-considerations" title="Security considerations">

<t>DNSSEC provides an data integrity protection for DNS data.  This
document specifically calls out a reason why a zone owner may desire
to deliberately turn off DNSSEC while changing the zone’s DNSKEY’s
cryptographic algorithms.  Thus, this is deliberately turning off
security which is potentially harmful if an attacker knows when this
will occur and can use that time window to launch DNS modification
attacks (for example, cache poisoning attacks) against validating
resolvers or other validating DNS infrastructure.</t>

<t>Most importantly, this will deliberately break certain types of DNS
records that must be validatable for them to be effective.  This
includes for example, but not limited to, all DS records for child
zones, DANE <xref target="RFC6698"/><xref target="RFC7671"/><xref target="RFC7672"/>, PGP keys <xref target="RFC7929"/>,
and SSHFP<xref target="RFC4255"/>.  Zone owners must carefully consider which
records within their zone depend on DNSSEC being available before
using the procedure outlined in this document.</t>

<t>Given all of this, it leaves the question of: “why would a zone owner
want to deliberately turn off security temporarily then?”, to which
there is one principal answer.  Simply put, if the the complexity of
doing it the correct way is difficult with existing tooling then the
chances of performing the more complex procedure and introducing an
error, likely making the entire zone unavailable during that time
period, may be significantly higher than the chances of the zone being
attacked during the transition period of the simpler approach where
zone availability is less likely to be impacted.  Simply put, an
invalid zone created by a botched algorithm roll is potentially worse
than an unsigned but still available zone.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC1035" target='https://www.rfc-editor.org/info/rfc1035'>
<front>
<title>Domain names - implementation and specification</title>
<author initials='P.V.' surname='Mockapetris' fullname='P.V. Mockapetris'><organization /></author>
<date year='1987' month='November' />
<abstract><t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1035'/>
<seriesInfo name='DOI' value='10.17487/RFC1035'/>
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC4033" target='https://www.rfc-editor.org/info/rfc4033'>
<front>
<title>DNS Security Introduction and Requirements</title>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'><organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'><organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'><organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'><organization /></author>
<date year='2005' month='March' />
<abstract><t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4033'/>
<seriesInfo name='DOI' value='10.17487/RFC4033'/>
</reference>



<reference  anchor="RFC4035" target='https://www.rfc-editor.org/info/rfc4035'>
<front>
<title>Protocol Modifications for the DNS Security Extensions</title>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'><organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'><organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'><organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'><organization /></author>
<date year='2005' month='March' />
<abstract><t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC).  The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS.  This document describes the DNSSEC protocol modifications.  This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC.  These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications. </t><t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4035'/>
<seriesInfo name='DOI' value='10.17487/RFC4035'/>
</reference>



<reference  anchor="RFC4509" target='https://www.rfc-editor.org/info/rfc4509'>
<front>
<title>Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)</title>
<author initials='W.' surname='Hardaker' fullname='W. Hardaker'><organization /></author>
<date year='2006' month='May' />
<abstract><t>This document specifies how to use the SHA-256 digest type in DNS Delegation Signer (DS) Resource Records (RRs).  DS records, when stored in a parent zone, point to DNSKEYs in a child zone.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4509'/>
<seriesInfo name='DOI' value='10.17487/RFC4509'/>
</reference>



<reference  anchor="RFC6781" target='https://www.rfc-editor.org/info/rfc6781'>
<front>
<title>DNSSEC Operational Practices, Version 2</title>
<author initials='O.' surname='Kolkman' fullname='O. Kolkman'><organization /></author>
<author initials='W.' surname='Mekking' fullname='W. Mekking'><organization /></author>
<author initials='R.' surname='Gieben' fullname='R. Gieben'><organization /></author>
<date year='2012' month='December' />
<abstract><t>This document describes a set of practices for operating the DNS with security extensions (DNSSEC).  The target audience is zone administrators deploying DNSSEC.</t><t>The document discusses operational aspects of using keys and signatures in the DNS.  It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.</t><t>This document obsoletes RFC 4641, as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the DNSSEC operations.</t></abstract>
</front>
<seriesInfo name='RFC' value='6781'/>
<seriesInfo name='DOI' value='10.17487/RFC6781'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference  anchor="RFC7929" target='https://www.rfc-editor.org/info/rfc7929'>
<front>
<title>DNS-Based Authentication of Named Entities (DANE) Bindings for OpenPGP</title>
<author initials='P.' surname='Wouters' fullname='P. Wouters'><organization /></author>
<date year='2016' month='August' />
<abstract><t>OpenPGP is a message format for email (and file) encryption that lacks a standardized lookup mechanism to securely obtain OpenPGP public keys.  DNS-Based Authentication of Named Entities (DANE) is a method for publishing public keys in DNS.  This document specifies a DANE method for publishing and locating OpenPGP public keys in DNS for a specific email address using a new OPENPGPKEY DNS resource record.  Security is provided via Secure DNS, however the OPENPGPKEY record is not a replacement for verification of authenticity via the &quot;web of trust&quot; or manual verification.  The OPENPGPKEY record can be used to encrypt an email that would otherwise have to be sent unencrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7929'/>
<seriesInfo name='DOI' value='10.17487/RFC7929'/>
</reference>



<reference  anchor="RFC7671" target='https://www.rfc-editor.org/info/rfc7671'>
<front>
<title>The DNS-Based Authentication of Named Entities (DANE) Protocol: Updates and Operational Guidance</title>
<author initials='V.' surname='Dukhovni' fullname='V. Dukhovni'><organization /></author>
<author initials='W.' surname='Hardaker' fullname='W. Hardaker'><organization /></author>
<date year='2015' month='October' />
<abstract><t>This document clarifies and updates the DNS-Based Authentication of Named Entities (DANE) TLSA specification (RFC 6698), based on subsequent implementation experience.  It also contains guidance for implementers, operators, and protocol developers who want to use DANE records.</t></abstract>
</front>
<seriesInfo name='RFC' value='7671'/>
<seriesInfo name='DOI' value='10.17487/RFC7671'/>
</reference>



<reference  anchor="RFC7672" target='https://www.rfc-editor.org/info/rfc7672'>
<front>
<title>SMTP Security via Opportunistic DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS)</title>
<author initials='V.' surname='Dukhovni' fullname='V. Dukhovni'><organization /></author>
<author initials='W.' surname='Hardaker' fullname='W. Hardaker'><organization /></author>
<date year='2015' month='October' />
<abstract><t>This memo describes a downgrade-resistant protocol for SMTP transport security between Message Transfer Agents (MTAs), based on the DNS-Based Authentication of Named Entities (DANE) TLSA DNS record. Adoption of this protocol enables an incremental transition of the Internet email backbone to one using encrypted and authenticated Transport Layer Security (TLS).</t></abstract>
</front>
<seriesInfo name='RFC' value='7672'/>
<seriesInfo name='DOI' value='10.17487/RFC7672'/>
</reference>



<reference  anchor="RFC6698" target='https://www.rfc-editor.org/info/rfc6698'>
<front>
<title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='J.' surname='Schlyter' fullname='J. Schlyter'><organization /></author>
<date year='2012' month='August' />
<abstract><t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6698'/>
<seriesInfo name='DOI' value='10.17487/RFC6698'/>
</reference>



<reference  anchor="RFC4255" target='https://www.rfc-editor.org/info/rfc4255'>
<front>
<title>Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</title>
<author initials='J.' surname='Schlyter' fullname='J. Schlyter'><organization /></author>
<author initials='W.' surname='Griffin' fullname='W. Griffin'><organization /></author>
<date year='2006' month='January' />
<abstract><t>This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC).  The document defines a new DNS resource record that contains a standard SSH key fingerprint.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4255'/>
<seriesInfo name='DOI' value='10.17487/RFC4255'/>
</reference>




    </references>


<section anchor="acknowledgments" title="Acknowledgments">

<t>The author has discussed the pros and cons of this approach with
multiple people, including:</t>

<t><list style="symbols">
  <t>Viktor Dukhovni</t>
  <t>Warren Kumari.</t>
  <t>Tuomo Soini</t>
  <t>Paul Wouters</t>
</list></t>

</section>
<section anchor="github-version-of-this-document" title="Github Version of this document">

<t>While this document is under development, it can be viewed, tracked,
issued, pushed with PRs, … here:</t>

<t>https://github.com/hardaker/draft-hardaker-dnsop-intentionally-temporarily-insecure</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

