xref: /minix3/external/bsd/bind/dist/doc/arm/managed-keys.xml (revision 00b67f09dd46474d133c95011a48590a8e8f94c7)
1*00b67f09SDavid van Moolenbroek<?xml version="1.0" encoding="utf-8"?>
2*00b67f09SDavid van Moolenbroek<!--
3*00b67f09SDavid van Moolenbroek - Copyright (C) 2010  Internet Systems Consortium, Inc. ("ISC")
4*00b67f09SDavid van Moolenbroek -
5*00b67f09SDavid van Moolenbroek - Permission to use, copy, modify, and/or distribute this software for any
6*00b67f09SDavid van Moolenbroek - purpose with or without fee is hereby granted, provided that the above
7*00b67f09SDavid van Moolenbroek - copyright notice and this permission notice appear in all copies.
8*00b67f09SDavid van Moolenbroek -
9*00b67f09SDavid van Moolenbroek - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10*00b67f09SDavid van Moolenbroek - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11*00b67f09SDavid van Moolenbroek - AND FITNESS.  IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12*00b67f09SDavid van Moolenbroek - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13*00b67f09SDavid van Moolenbroek - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14*00b67f09SDavid van Moolenbroek - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15*00b67f09SDavid van Moolenbroek - PERFORMANCE OF THIS SOFTWARE.
16*00b67f09SDavid van Moolenbroek-->
17*00b67f09SDavid van Moolenbroek
18*00b67f09SDavid van Moolenbroek<!-- Id: managed-keys.xml,v 1.3 2010/02/03 23:49:07 tbox Exp  -->
19*00b67f09SDavid van Moolenbroek
20*00b67f09SDavid van Moolenbroek<sect1 id="rfc5011.support">
21*00b67f09SDavid van Moolenbroek  <title>Dynamic Trust Anchor Management</title>
22*00b67f09SDavid van Moolenbroek  <para>BIND 9.7.0 introduces support for RFC 5011, dynamic trust
23*00b67f09SDavid van Moolenbroek  anchor management. Using this feature allows
24*00b67f09SDavid van Moolenbroek  <command>named</command> to keep track of changes to critical
25*00b67f09SDavid van Moolenbroek  DNSSEC keys without any need for the operator to make changes to
26*00b67f09SDavid van Moolenbroek  configuration files.</para>
27*00b67f09SDavid van Moolenbroek  <sect2>
28*00b67f09SDavid van Moolenbroek    <title>Validating Resolver</title>
29*00b67f09SDavid van Moolenbroek    <!-- TODO: command tag is overloaded for configuration and executables -->
30*00b67f09SDavid van Moolenbroek    <para>To configure a validating resolver to use RFC 5011 to
31*00b67f09SDavid van Moolenbroek    maintain a trust anchor, configure the trust anchor using a
32*00b67f09SDavid van Moolenbroek    <command>managed-keys</command> statement. Information about
33*00b67f09SDavid van Moolenbroek    this can be found in
34*00b67f09SDavid van Moolenbroek    <xref linkend="managed-keys" />.</para>
35*00b67f09SDavid van Moolenbroek    <!-- TODO: managed-keys examples
36*00b67f09SDavid van Moolenbroekalso in DNSSEC section above here in ARM -->
37*00b67f09SDavid van Moolenbroek  </sect2>
38*00b67f09SDavid van Moolenbroek  <sect2>
39*00b67f09SDavid van Moolenbroek    <title>Authoritative Server</title>
40*00b67f09SDavid van Moolenbroek    <para>To set up an authoritative zone for RFC 5011 trust anchor
41*00b67f09SDavid van Moolenbroek    maintenance, generate two (or more) key signing keys (KSKs) for
42*00b67f09SDavid van Moolenbroek    the zone. Sign the zone with one of them; this is the "active"
43*00b67f09SDavid van Moolenbroek    KSK. All KSK's which do not sign the zone are "stand-by"
44*00b67f09SDavid van Moolenbroek    keys.</para>
45*00b67f09SDavid van Moolenbroek    <para>Any validating resolver which is configured to use the
46*00b67f09SDavid van Moolenbroek    active KSK as an RFC 5011-managed trust anchor will take note
47*00b67f09SDavid van Moolenbroek    of the stand-by KSKs in the zone's DNSKEY RRset, and store them
48*00b67f09SDavid van Moolenbroek    for future reference. The resolver will recheck the zone
49*00b67f09SDavid van Moolenbroek    periodically, and after 30 days, if the new key is still there,
50*00b67f09SDavid van Moolenbroek    then the key will be accepted by the resolver as a valid trust
51*00b67f09SDavid van Moolenbroek    anchor for the zone. Any time after this 30-day acceptance
52*00b67f09SDavid van Moolenbroek    timer has completed, the active KSK can be revoked, and the
53*00b67f09SDavid van Moolenbroek    zone can be "rolled over" to the newly accepted key.</para>
54*00b67f09SDavid van Moolenbroek    <para>The easiest way to place a stand-by key in a zone is to
55*00b67f09SDavid van Moolenbroek    use the "smart signing" features of
56*00b67f09SDavid van Moolenbroek    <command>dnssec-keygen</command> and
57*00b67f09SDavid van Moolenbroek    <command>dnssec-signzone</command>. If a key with a publication
58*00b67f09SDavid van Moolenbroek    date in the past, but an activation date which is unset or in
59*00b67f09SDavid van Moolenbroek    the future, "
60*00b67f09SDavid van Moolenbroek    <command>dnssec-signzone -S</command>" will include the DNSKEY
61*00b67f09SDavid van Moolenbroek    record in the zone, but will not sign with it:</para>
62*00b67f09SDavid van Moolenbroek    <screen>
63*00b67f09SDavid van Moolenbroek$ <userinput>dnssec-keygen -K keys -f KSK -P now -A now+2y example.net</userinput>
64*00b67f09SDavid van Moolenbroek$ <userinput>dnssec-signzone -S -K keys example.net</userinput>
65*00b67f09SDavid van Moolenbroek</screen>
66*00b67f09SDavid van Moolenbroek    <para>To revoke a key, the new command
67*00b67f09SDavid van Moolenbroek    <command>dnssec-revoke</command> has been added. This adds the
68*00b67f09SDavid van Moolenbroek    REVOKED bit to the key flags and re-generates the
69*00b67f09SDavid van Moolenbroek    <filename>K*.key</filename> and
70*00b67f09SDavid van Moolenbroek    <filename>K*.private</filename> files.</para>
71*00b67f09SDavid van Moolenbroek    <para>After revoking the active key, the zone must be signed
72*00b67f09SDavid van Moolenbroek    with both the revoked KSK and the new active KSK. (Smart
73*00b67f09SDavid van Moolenbroek    signing takes care of this automatically.)</para>
74*00b67f09SDavid van Moolenbroek    <para>Once a key has been revoked and used to sign the DNSKEY
75*00b67f09SDavid van Moolenbroek    RRset in which it appears, that key will never again be
76*00b67f09SDavid van Moolenbroek    accepted as a valid trust anchor by the resolver. However,
77*00b67f09SDavid van Moolenbroek    validation can proceed using the new active key (which had been
78*00b67f09SDavid van Moolenbroek    accepted by the resolver when it was a stand-by key).</para>
79*00b67f09SDavid van Moolenbroek    <para>See RFC 5011 for more details on key rollover
80*00b67f09SDavid van Moolenbroek    scenarios.</para>
81*00b67f09SDavid van Moolenbroek    <para>When a key has been revoked, its key ID changes,
82*00b67f09SDavid van Moolenbroek    increasing by 128, and wrapping around at 65535. So, for
83*00b67f09SDavid van Moolenbroek    example, the key "<filename>Kexample.com.+005+10000</filename>" becomes
84*00b67f09SDavid van Moolenbroek    "<filename>Kexample.com.+005+10128</filename>".</para>
85*00b67f09SDavid van Moolenbroek    <para>If two keys have ID's exactly 128 apart, and one is
86*00b67f09SDavid van Moolenbroek    revoked, then the two key ID's will collide, causing several
87*00b67f09SDavid van Moolenbroek    problems. To prevent this,
88*00b67f09SDavid van Moolenbroek    <command>dnssec-keygen</command> will not generate a new key if
89*00b67f09SDavid van Moolenbroek    another key is present which may collide. This checking will
90*00b67f09SDavid van Moolenbroek    only occur if the new keys are written to the same directory
91*00b67f09SDavid van Moolenbroek    which holds all other keys in use for that zone.</para>
92*00b67f09SDavid van Moolenbroek    <para>Older versions of BIND 9 did not have this precaution.
93*00b67f09SDavid van Moolenbroek    Exercise caution if using key revocation on keys that were
94*00b67f09SDavid van Moolenbroek    generated by previous releases, or if using keys stored in
95*00b67f09SDavid van Moolenbroek    multiple directories or on multiple machines.</para>
96*00b67f09SDavid van Moolenbroek    <para>It is expected that a future release of BIND 9 will
97*00b67f09SDavid van Moolenbroek    address this problem in a different way, by storing revoked
98*00b67f09SDavid van Moolenbroek    keys with their original unrevoked key ID's.</para>
99*00b67f09SDavid van Moolenbroek  </sect2>
100*00b67f09SDavid van Moolenbroek</sect1>
101