rolling the root zone dnssec key signing key
play

Rolling the Root Zone DNSSEC Key Signing Key Presented by Carlos - PowerPoint PPT Presentation

Rolling the Root Zone DNSSEC Key Signing Key Presented by Carlos Martnez, on behalf of ICANN | 1 Motivation for the Talk ICANN is about to change an important configuration parameter in DNSSEC For a network DNS operator, this may


  1. Rolling the Root Zone DNSSEC Key Signing Key Presented by Carlos Martínez, on behalf of ICANN | 1

  2. Motivation for the Talk ¤ ICANN is about to change an important configuration parameter in DNSSEC ¤ For a network DNS operator, this may create a need for action ¤ This discussion is meant to inform: What is happening, when, and what to do if troubleshooting is needed | 2 | 2

  3. DNSSEC in the Root Zone ¤ DNSSEC in the Root Zone is managed by: o ICANN, as the IANA Functions Operator o Verisign, as the Root Zone Maintainer (RZM) ¤ In coordination with U.S. Department of Commerce’s National Telecommunications and Information Administration (NTIA) per agreements | 3 | 3

  4. DNSSEC Key Management in the Root Zone ¤ DNSSEC key management is divided into: o Key Signing Key (KSK), self-signs the key set o Zone Signing Key (ZSK), signs other zone data ¤ These roles are meaningful to the operators of signed zones o The significance is that the roles are separated | 4 | 4

  5. KSK and ZSK ¤ ICANN, as IANA Functions Operator, manages the KSK o Same KSK since operations began in 2010 o The KSK signs the ZSK quarterly in a ceremony ¤ Verisign, as Root Zone Maintainer, manages the ZSK o ZSK is changed quarterly | 5 | 5

  6. Activities Underway ¤ Extending signature durations o Recommendations in Root Server System Advisory Committee’s (RSSAC) report on root zone TTLs (RSSAC003) ¤ The ZSK lengthening (visible late 2016) o Activity managed by Verisign, covered elsewhere ¤ The KSK changing (visible throughout 2017) o A new trust anchor is needed by all DNSSEC validating DNS caches/clients ¤ Separate but coordinated activities | 6 | 6

  7. Why Change the KSK? ¤ Primary reason – operational preparedness o KSK has no expiration date, currently no weakness o No key should live forever: bad crypto practice o DNSSEC Practice Statement states the key will be rolled o Prefer to exercise process in normal conditions • As opposed to abnormal, such as key compromise ¤ Big challenge o Involves countless/uncountable participants o No test environment can cover all possibilities | 7 | 7

  8. The KSK Roll Plan Documents ¤ The plan consists of five documents: o 2017 KSK Rollover Operational Implementation Plan o 2017 KSK Rollover Systems Test Plan o 2017 KSK Rollover Monitoring Plan o 2017 KSK Rollover External Test Plan o 2017 KSK Rollover Back Out Plan ¤ The documents are available at: https://www.icann.org/kskroll | 8 | 8

  9. Communications Approach ¤ Target technical audiences performing DNSSEC validation (e.g., Network Operating Groups) o How to participate in the KSK rollover ¤ Broader communication o General awareness, resources available ¤ Integrated communications approach o Traditional channel (email, presentations) o Social media (#KeyRoll) o Leverage ICANN staff and stakeholder groups | 9 | 9

  10. Operational Implementation Plan Phases ¤ Preparation Phases o System engineering, KSK creation and replication o Little to no operational impact on Internet ¤ Automated Updates (RFC 5011) Phases o KSK-2017 (new) pre-published, signs DNSKEY set o KSK-2010 (current) is revoked ¤ Post Rollover Phases o Deletion of KSK-2010 from system o Project experiences documented | 10 | 10

  11. Operational Implementation Plan Dates ¤ Plans publicly available from July 22, 2016 ¤ Key signing ceremonies o Q4 2016 ceremony (October 27): generate new KSK o Q1 2017 ceremony (February): KSK operationally ready ¤ DNS changes o New KSK in root zone on July 11, 2017 o New KSK signs DNSKEY RRset beginning October 11, 2017 o Current KSK revoked on January 11, 2018 (Timing contingent on successful ZSK size increase) | 11 | 11

  12. Operational Implementation Plan Timeline Phase A Phase B Phase C Phase D – Publication Phase E – Rollover Phase F – Revocation Generation Replication First SKR 2016 Q4 2017 Q1 2017 Q2 2017 Q3 2017 Q4 2018 Q1 Slot 1…9 Slot 1…9 Slot 1…9 Slot 1 Slot 2…8 Slot 9 Slot 1 Slot 2…8 Slot 9 Slot 1 Slot 2…8 Slot 9 ZSK-… post-publish ZSK-q1 ZSK-q1 ZSK-q1 ZSK-q1 post-publish ZSK-q2 ZSK-q2 ZSK-q2 ZSK-q2 ZSK-q2 pre-publish post-publish ZSK-q3 ZSK-q3 ZSK-q3 ZSK-q3 pre-publish ZSK-… pre-publish KSK-2010 KSK-2010 KSK-2010 KSK-2010 KSK-2010 KSK-2010 KSK-2010 KSK-2010 publish+sign publish+sign publish+sign publish+sign publish publish publish revoke+sign KSK-2017 KSK-2017 KSK-2017 KSK-2017 KSK-2017 KSK-2017 KSK-2017 KSK-2017 publish publish publish publish+sign publish+sign publish+sign publish+sign publish+sign New KSK New KSK First SKR created in 1st replicated to with new KSK First packet Second packet Delayed revocation Rollover KMF 2nd KMF signed size increase size increase of KSK-2010 | 12 | 12

  13. Systems Test Plan ¤ Testing internal systems for these components ¤ Key Management o Lifecycle ¤ Key Processing o Key Signing Request to Signed Key Response ¤ Trust Anchor Publication o Generation of the trust anchor file as formatted in eXtensible Markup Language (XML) | 13 | 13

  14. Monitoring Plan ¤ Automated monitoring involving o ICANN’s L-root server o Information Science Institute’s B-root server ¤ Looking for o Low-level fragmentation issues, indicating responses are too large o Elevated query rates for the DNSKEY resource record set, indicating misconfigured trust anchors ¤ Plus a means for ad hoc reporting | 14 | 14

  15. External Test Plan ¤ Resources targeted for software developers o Two third-party “accelerated” RFC 5011 test environments with accelerated clocks • http://toot-servers.net • http://keyroll.systems ¤ Resources more suitable for operators o “Real time” RFC 5011 test environment being developed by ICANN o Roll a test zone trust anchor with actual 30-day Add Hold- Down timer | 15 | 15

  16. Back Out Plan ¤ Plan includes back out capability o If necessary, can stay in current state or back out at every phase o Until old key revoked in Q1 2018 ¤ Multiple back out DNSKEY Resource Record Sets (RRsets) signed at each ceremony o Back out can be immediate o No need for extra key ceremony | 16 | 16

  17. What You Need to Know ¤ Manage Your Trust Anchors o Be aware of your software tools for managing trust anchors o Be aware of the new KSK ¤ When Events Happen o Keep an eye on dates o Be mindful of when changes are scheduled and monitor appropriately | 17 | 17

  18. Managing Trust Anchors ¤ Trust anchors are configured data in DNSSEC validators o If Automated Updates of DNSSEC Trust Anchors (RFC 5011) is enabled and working, the rollover is automatic o Otherwise manual intervention is required • Add the new KSK before October 11, 2017 (assuming all is on track) • Remove the old KSK at a later date | 18 | 18

  19. Planned KSK Rollover Dates ¤ Plans publicly available from July 22, 2016 ¤ Key signing ceremonies o Q4 2016 ceremony (October 27): generate new KSK o Q1 2017 ceremony (February): KSK operationally ready ¤ DNS changes o New KSK in root zone on July 11, 2017 o New KSK signs DNSKEY RRset beginning October 11, 2017 o Current KSK revoked on January 11, 2018 (Timing contingent on successful ZSK size increase) | 19 | 19

  20. For More Information ¤ Join the ksk-rollover@icann.org mailing list: o https://mm.icann.org/listinfo/ksk-rollover ¤ Follow on Twitter o @ICANN o Hashtag: #KeyRoll ¤ Visit the web page: o https://www.icann.org/kskroll | 20 | 20

  21. Engage with ICANN Thank You and Questions Reach me at: Email: ksk-rollover@icann.org Website: icann.org/kskroll gplus.to/icann twitter.com/icann facebook.com/icannorg weibo.com/ICANNorg linkedin.com/company/icann flickr.com/photos/icann youtube.com/user/icannnews slideshare.net/icannpresentations | 21 | 21

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend