Multi Provider DNSSEC
draft-huque-dnsop-multi-provider-dnssec-02
Shumon Huque March 22nd 2018 DNSOP Working Group, IETF101, London, U.K.
Multi Provider DNSSEC draft-huque-dnsop-multi-provider-dnssec-02 - - PowerPoint PPT Presentation
Multi Provider DNSSEC draft-huque-dnsop-multi-provider-dnssec-02 Shumon Huque March 22 nd 2018 DNSOP Working Group, IETF101, London, U.K. Note to the DNS Camel* This document does not propose any new extensions to the DNS protocol. It
draft-huque-dnsop-multi-provider-dnssec-02
Shumon Huque March 22nd 2018 DNSOP Working Group, IETF101, London, U.K.
protocol.
multiple providers. * https://datatracker.ietf.org/meeting/101/materials/slides-101-dnsop-sessa-the-dns-camel-01
IETF 101, March 23rd 2018, London 2
any new extensions to the DNS protocol.
deployment models for DNSSEC with multiple providers. *
https://datatracker.ietf.org/meeting/101/mater ials/slides-101-dnsop-sessa-the-dns-camel-01
IETF 101, March 23rd 2018, London 3
distribute their authoritative DNS service.
IETF 101, March 23rd 2018, London 4
and are not ideal because they combine the weaknesses of both.
IETF 101, March 23rd 2018, London 5
serve false data, without detection by validating resolvers.
IETF 101, March 23rd 2018, London 6
serve false data, without detection by validating resolvers.
features that are fairly widely used in the DNS industry today.
IETF 101, March 23rd 2018, London 7
responses, etc.
inspecting dynamic state in the network
server itself, at the time of the query, or both.
mechanisms are already deployed.
IETF 101, March 23rd 2018, London 8
to update zone content.
primary focus of this document.
IETF 101, March 23rd 2018, London 9
capable of signing the response data generated by these features.
determine at query time which response + signature needs to be returned.
IETF 101, March 23rd 2018, London 10
such that validation is always possible, not matter which provider you query and obtain the response from.
the other providers into their DNSKEY RRset.
IETF 101, March 23rd 2018, London 11
managed DNS providers.
IETF 101, March 23rd 2018, London 12
common DNSKEY RRset, signs it, and distributes it to the providers.
update the DNSKEY RRset (KSK and ZSK) and DS RRset (KSK).
IETF 101, March 23rd 2018, London 13
into the DNSKEY RRset.
KSKs.
update the DS (KSK) and DNSKEY (for ZSK).
IETF 101, March 23rd 2018, London 14
configuration and why ZSK cross sharing is needed to ensure that all answers are validatable.
IETF 101, March 23rd 2018, London 15
IETF 101, March 23rd 2018, London 16