1*00b67f09SDavid van Moolenbroek<?xml version="1.0" encoding="utf-8"?> 2*00b67f09SDavid van Moolenbroek<!-- 3*00b67f09SDavid van Moolenbroek - Copyright (C) 2010 Internet Systems Consortium, Inc. ("ISC") 4*00b67f09SDavid van Moolenbroek - 5*00b67f09SDavid van Moolenbroek - Permission to use, copy, modify, and/or distribute this software for any 6*00b67f09SDavid van Moolenbroek - purpose with or without fee is hereby granted, provided that the above 7*00b67f09SDavid van Moolenbroek - copyright notice and this permission notice appear in all copies. 8*00b67f09SDavid van Moolenbroek - 9*00b67f09SDavid van Moolenbroek - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH 10*00b67f09SDavid van Moolenbroek - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY 11*00b67f09SDavid van Moolenbroek - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, 12*00b67f09SDavid van Moolenbroek - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM 13*00b67f09SDavid van Moolenbroek - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE 14*00b67f09SDavid van Moolenbroek - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR 15*00b67f09SDavid van Moolenbroek - PERFORMANCE OF THIS SOFTWARE. 16*00b67f09SDavid van Moolenbroek--> 17*00b67f09SDavid van Moolenbroek 18*00b67f09SDavid van Moolenbroek<!-- Id: managed-keys.xml,v 1.3 2010/02/03 23:49:07 tbox Exp --> 19*00b67f09SDavid van Moolenbroek 20*00b67f09SDavid van Moolenbroek<sect1 id="rfc5011.support"> 21*00b67f09SDavid van Moolenbroek <title>Dynamic Trust Anchor Management</title> 22*00b67f09SDavid van Moolenbroek <para>BIND 9.7.0 introduces support for RFC 5011, dynamic trust 23*00b67f09SDavid van Moolenbroek anchor management. Using this feature allows 24*00b67f09SDavid van Moolenbroek <command>named</command> to keep track of changes to critical 25*00b67f09SDavid van Moolenbroek DNSSEC keys without any need for the operator to make changes to 26*00b67f09SDavid van Moolenbroek configuration files.</para> 27*00b67f09SDavid van Moolenbroek <sect2> 28*00b67f09SDavid van Moolenbroek <title>Validating Resolver</title> 29*00b67f09SDavid van Moolenbroek <!-- TODO: command tag is overloaded for configuration and executables --> 30*00b67f09SDavid van Moolenbroek <para>To configure a validating resolver to use RFC 5011 to 31*00b67f09SDavid van Moolenbroek maintain a trust anchor, configure the trust anchor using a 32*00b67f09SDavid van Moolenbroek <command>managed-keys</command> statement. Information about 33*00b67f09SDavid van Moolenbroek this can be found in 34*00b67f09SDavid van Moolenbroek <xref linkend="managed-keys" />.</para> 35*00b67f09SDavid van Moolenbroek <!-- TODO: managed-keys examples 36*00b67f09SDavid van Moolenbroekalso in DNSSEC section above here in ARM --> 37*00b67f09SDavid van Moolenbroek </sect2> 38*00b67f09SDavid van Moolenbroek <sect2> 39*00b67f09SDavid van Moolenbroek <title>Authoritative Server</title> 40*00b67f09SDavid van Moolenbroek <para>To set up an authoritative zone for RFC 5011 trust anchor 41*00b67f09SDavid van Moolenbroek maintenance, generate two (or more) key signing keys (KSKs) for 42*00b67f09SDavid van Moolenbroek the zone. Sign the zone with one of them; this is the "active" 43*00b67f09SDavid van Moolenbroek KSK. All KSK's which do not sign the zone are "stand-by" 44*00b67f09SDavid van Moolenbroek keys.</para> 45*00b67f09SDavid van Moolenbroek <para>Any validating resolver which is configured to use the 46*00b67f09SDavid van Moolenbroek active KSK as an RFC 5011-managed trust anchor will take note 47*00b67f09SDavid van Moolenbroek of the stand-by KSKs in the zone's DNSKEY RRset, and store them 48*00b67f09SDavid van Moolenbroek for future reference. The resolver will recheck the zone 49*00b67f09SDavid van Moolenbroek periodically, and after 30 days, if the new key is still there, 50*00b67f09SDavid van Moolenbroek then the key will be accepted by the resolver as a valid trust 51*00b67f09SDavid van Moolenbroek anchor for the zone. Any time after this 30-day acceptance 52*00b67f09SDavid van Moolenbroek timer has completed, the active KSK can be revoked, and the 53*00b67f09SDavid van Moolenbroek zone can be "rolled over" to the newly accepted key.</para> 54*00b67f09SDavid van Moolenbroek <para>The easiest way to place a stand-by key in a zone is to 55*00b67f09SDavid van Moolenbroek use the "smart signing" features of 56*00b67f09SDavid van Moolenbroek <command>dnssec-keygen</command> and 57*00b67f09SDavid van Moolenbroek <command>dnssec-signzone</command>. If a key with a publication 58*00b67f09SDavid van Moolenbroek date in the past, but an activation date which is unset or in 59*00b67f09SDavid van Moolenbroek the future, " 60*00b67f09SDavid van Moolenbroek <command>dnssec-signzone -S</command>" will include the DNSKEY 61*00b67f09SDavid van Moolenbroek record in the zone, but will not sign with it:</para> 62*00b67f09SDavid van Moolenbroek <screen> 63*00b67f09SDavid van Moolenbroek$ <userinput>dnssec-keygen -K keys -f KSK -P now -A now+2y example.net</userinput> 64*00b67f09SDavid van Moolenbroek$ <userinput>dnssec-signzone -S -K keys example.net</userinput> 65*00b67f09SDavid van Moolenbroek</screen> 66*00b67f09SDavid van Moolenbroek <para>To revoke a key, the new command 67*00b67f09SDavid van Moolenbroek <command>dnssec-revoke</command> has been added. This adds the 68*00b67f09SDavid van Moolenbroek REVOKED bit to the key flags and re-generates the 69*00b67f09SDavid van Moolenbroek <filename>K*.key</filename> and 70*00b67f09SDavid van Moolenbroek <filename>K*.private</filename> files.</para> 71*00b67f09SDavid van Moolenbroek <para>After revoking the active key, the zone must be signed 72*00b67f09SDavid van Moolenbroek with both the revoked KSK and the new active KSK. (Smart 73*00b67f09SDavid van Moolenbroek signing takes care of this automatically.)</para> 74*00b67f09SDavid van Moolenbroek <para>Once a key has been revoked and used to sign the DNSKEY 75*00b67f09SDavid van Moolenbroek RRset in which it appears, that key will never again be 76*00b67f09SDavid van Moolenbroek accepted as a valid trust anchor by the resolver. However, 77*00b67f09SDavid van Moolenbroek validation can proceed using the new active key (which had been 78*00b67f09SDavid van Moolenbroek accepted by the resolver when it was a stand-by key).</para> 79*00b67f09SDavid van Moolenbroek <para>See RFC 5011 for more details on key rollover 80*00b67f09SDavid van Moolenbroek scenarios.</para> 81*00b67f09SDavid van Moolenbroek <para>When a key has been revoked, its key ID changes, 82*00b67f09SDavid van Moolenbroek increasing by 128, and wrapping around at 65535. So, for 83*00b67f09SDavid van Moolenbroek example, the key "<filename>Kexample.com.+005+10000</filename>" becomes 84*00b67f09SDavid van Moolenbroek "<filename>Kexample.com.+005+10128</filename>".</para> 85*00b67f09SDavid van Moolenbroek <para>If two keys have ID's exactly 128 apart, and one is 86*00b67f09SDavid van Moolenbroek revoked, then the two key ID's will collide, causing several 87*00b67f09SDavid van Moolenbroek problems. To prevent this, 88*00b67f09SDavid van Moolenbroek <command>dnssec-keygen</command> will not generate a new key if 89*00b67f09SDavid van Moolenbroek another key is present which may collide. This checking will 90*00b67f09SDavid van Moolenbroek only occur if the new keys are written to the same directory 91*00b67f09SDavid van Moolenbroek which holds all other keys in use for that zone.</para> 92*00b67f09SDavid van Moolenbroek <para>Older versions of BIND 9 did not have this precaution. 93*00b67f09SDavid van Moolenbroek Exercise caution if using key revocation on keys that were 94*00b67f09SDavid van Moolenbroek generated by previous releases, or if using keys stored in 95*00b67f09SDavid van Moolenbroek multiple directories or on multiple machines.</para> 96*00b67f09SDavid van Moolenbroek <para>It is expected that a future release of BIND 9 will 97*00b67f09SDavid van Moolenbroek address this problem in a different way, by storing revoked 98*00b67f09SDavid van Moolenbroek keys with their original unrevoked key ID's.</para> 99*00b67f09SDavid van Moolenbroek </sect2> 100*00b67f09SDavid van Moolenbroek</sect1> 101