updated drafts

This commit is contained in:
Andreas Gustafsson 2000-06-09 18:04:36 +00:00
parent 630a955711
commit b8bfcbe1aa
3 changed files with 269 additions and 268 deletions

View file

@ -1,6 +1,7 @@
INTERNET DRAFT M. Ohta
draft-ietf-dnsext-ixfr-00.txt Tokyo Institute of Technology
March 2000
draft-ietf-dnsext-ixfr-01.txt Tokyo Institute of Technology
June 2000
Incremental Zone Transfer in DNS
@ -49,20 +50,19 @@ Abstract
M. Ohta Expires on September 5, 2000 [Page 1]
M. Ohta Expires on December 5, 2000 [Page 1]
INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
INTERNET DRAFT Incremental Zone Transfer in DNS June 2000
In this document, a secondary name server which requests IXFR is
called an IXFR client and a primary or secondary name server which
responds to the request is called an IXFR server.
The AXFR specification is very terse, and in practice it does not
contain sufficient information to construct interoperable
implementations. [XFRCLARIFY] gives the clarification on the AXFR
specification based on existing practice, which is, unless otherwise
noted, also applicable to IXFR.
The current AXFR specification in [STD13] is very terse, and in
practice it does not contain sufficient information to construct
interoperable implementations. This memo assumes AXFR protocol used
in existing interoperable implementations.
2. Brief Description of the Protocol
@ -102,16 +102,15 @@ INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
ensuring backward compatibility. If the query response is a single
packet with the entire new zone, or if the server does not have a
newer version than the client, everything is done. Otherwise, a TCP
M. Ohta Expires on September 5, 2000 [Page 2]
INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
IXFR query should be tried.
M. Ohta Expires on December 5, 2000 [Page 2]
INTERNET DRAFT Incremental Zone Transfer in DNS June 2000
To ensure integrity, servers should use UDP checksums for all UDP
responses. A cautious client which receives a UDP packet with a
checksum value of zero should ignore the result and try a TCP IXFR
@ -144,30 +143,37 @@ INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
Modification of an RR is performed first by removing the original RR
and then adding the modified one.
Each individual difference sequence must leave the zone in a
consistent state with contents identical to those visible in the
master at the time identified by the new SOA serial number. During a
transfer, the slave server may save the zone data to stable storage
and use it in responding to queries after applying one or more
complete difference sequences even if they do not yet form a complete
incremental transfer.
A difference sequence which indicates the removal of a non-existent
RR is an indication of an error that the IXFR client is out-of-sync
with the IXFR server. The IXFR SHOULD be aborted, and an AXFR
requested from the same server. A difference sequence which
indicates the addition of a seemingly duplicate (through a node may
have multiple TXT RRs of the duplicated content) or conflicting RR
may just be a result of malformed zone ando should be treated just as
a AXFR with malformed zone content.
indicates the addition of a seemingly duplicate (though a node may
have multiple TXT RR's with duplicate content) or conflicting RR may
just be a malformed zone. In any case the IXFR should be aborted and
AXFR performed.
M. Ohta Expires on December 5, 2000 [Page 3]
INTERNET DRAFT Incremental Zone Transfer in DNS June 2000
The sequences of differential information are ordered oldest first
newest last. Thus, the differential sequences are the history of
changes made since the version known by the IXFR client up to the
server's current version.
M. Ohta Expires on September 5, 2000 [Page 3]
INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
RR sets (RRs of the same RR types) in the incremental transfer
messages may be partial. For examle, if a single RR of multiple RRs
messages may be partial. For example, if a single RR of multiple RRs
of the same RR type changes, only the changed RR needs to be
transferred.
@ -179,28 +185,55 @@ INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
followed by the SOA of the client's version which is about to be
replaced.
To determine whether an IXFR response received over TCP is
incremental or not, it is necessary to try to receive the first two
answer RRs in the answer stream (which may or may not involve
receiving two TCP DNS messages). The first RR is always an SOA. If
the second RR does not exist, the client copy of the zone is up to
date and no zone transfer is necessary. If the second RR is an SOA
with a serial number different from the first SOA, the response is
incremental, in IXFR format. If it is a non-SOA RR or a SOA RR with
the same serial number as the initial SOA RR, it is a nonincremental
response in AXFR format. The last case cannot arise unless the zone
is malformed containing only the SOA record without NS records.
A slave receiving an IXFR response needs to classify it as one of the
following four cases:
This is the only way to identify an incremental response. A slave
cannot reliably identify an incremental response based on the
presence or absence of a question section, the QTYPE field of a
possible question section, or the number of response RRs per message,
UDP-overflow An indication that the transfer will not fit in a
UDP packet and should be retried over TCP
up-to-date An indication that the serial number of the
request is current and no transfer is necessary
incremental An incremental transfer
nonincremental A full zone transfer
Performing this classification requires some care. For example,
UDP-overflow responses differ from UDP up-to-date responses only in
the value of the SOA serial number. Also, to distinguish between a
nonincremental and an incremental transfer, the slave needs to
receive the first two response RRs and check whether the second one
is a SOA. If the master chose to transmit each RR in a separate TCP
message, this involves waiting for a second TCP response message. On
the other hand, in the case of an up-to-date response, the slave must
not wait for a second TCP message as doing so would cause it to hang
waiting for a message the master will never send. Therefore, the
slave must examine the first message and eliminate the possibility
that it is a TCP up-to-date response before it attempts to receive a
second message.
Slaves must not attempt to classify a response based on incidental
information such as the presence or absence of a question section,
the QTYPE field of a possible question section, or the number of
M. Ohta Expires on December 5, 2000 [Page 4]
INTERNET DRAFT Incremental Zone Transfer in DNS June 2000
response RRs in a TCP response message.
An example algorithm for classifying IXFR responses appears in
Appendix A.
5. Purging Strategy
An IXFR server can not be required to hold all previous versions
forever and may delete them anytime. In general, there is a trade-off
between the size of storage space and the possibility of using IXFR.
forever and may delete them anytime. In general, there is a trade-
off between the size of storage space and the possibility of using
IXFR.
Information about older versions should be purged if the total length
of an IXFR response would be longer than that of an AXFR response.
@ -214,14 +247,6 @@ INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
6. Optional Condensation of Multiple Versions
An IXFR server may optionally condense multiple difference sequences
M. Ohta Expires on September 5, 2000 [Page 4]
INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
into a single difference sequence, thus, dropping information on
intermediate versions.
@ -246,6 +271,14 @@ INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
client's IXFR request with a version number known not to exist (which
means that the server has versions with version numbers newer and
older than, but not equal to, the version number) and should,
M. Ohta Expires on December 5, 2000 [Page 5]
INTERNET DRAFT Incremental Zone Transfer in DNS June 2000
instead, attempt to perform a full zone transfer by replying with a
single SOA record of the server's current version (UDP case) or with
a full zone content (UDP or TCP case).
@ -255,65 +288,64 @@ INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
Given the following three generations of data with the current serial
number of 3,
JAIN.AD.JP. IN SOA NS.JAIN.AD.JP. mohta.jain.ad.jp. (
example.domain. IN SOA ns.example.domain. rt.example.domain. (
1 600 600 3600000 604800)
IN NS NS.JAIN.AD.JP.
NS.JAIN.AD.JP. IN A 133.69.136.1
NEZU.JAIN.AD.JP. IN A 133.69.136.5
IN NS ns.example.domain.
ns.example.domain. IN A 10.0.0.1
ftp.example.domain. IN A 10.0.1.1
NEZU.JAIN.AD.JP. is removed and JAIN-BB.JAIN.AD.JP. is added.
ftp.example.domain. is removed and www.example.domain. is added.
jain.ad.jp. IN SOA ns.jain.ad.jp. mohta.jain.ad.jp. (
example.domain. IN SOA ns.example.domain. rt.example.domain. (
2 600 600 3600000 604800)
IN NS NS.JAIN.AD.JP.
NS.JAIN.AD.JP. IN A 133.69.136.1
JAIN-BB.JAIN.AD.JP. IN A 133.69.136.4
IN A 192.41.197.2
IN NS ns.example.domain.
ns.example.domain. IN A 10.0.0.1
www.example.domain. IN A 10.0.1.2
IN A 10.0.2.1
One of the IP addresses of www.example.domain. is changed.
M. Ohta Expires on September 5, 2000 [Page 5]
INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
One of the IP addresses of JAIN-BB.JAIN.AD.JP. is changed.
JAIN.AD.JP. IN SOA ns.jain.ad.jp. mohta.jain.ad.jp. (
example.domain. IN SOA ns.example.domain. rt.example.domain. (
3 600 600 3600000 604800)
IN NS NS.JAIN.AD.JP.
NS.JAIN.AD.JP. IN A 133.69.136.1
JAIN-BB.JAIN.AD.JP. IN A 133.69.136.3
IN A 192.41.197.2
IN NS ns.example.domain.
ns.example.domain. IN A 10.0.0.1
www.example.domain. IN A 10.0.3.1
IN A 10.0.2.1
The following IXFR query
+---------------------------------------------------+
Header | OPCODE=SQUERY |
+---------------------------------------------------+
Question | QNAME=JAIN.AD.JP., QCLASS=IN, QTYPE=IXFR |
Question | QNAME=example.domain., QCLASS=IN, QTYPE=IXFR |
+---------------------------------------------------+
Answer | <empty> |
+---------------------------------------------------+
Authority | JAIN.AD.JP. IN SOA serial=1 |
Authority | example.domain. IN SOA serial=1 |
+---------------------------------------------------+
Additional | <empty> |
+---------------------------------------------------+
could be replied to with the following full zone transfer message:
M. Ohta Expires on December 5, 2000 [Page 6]
INTERNET DRAFT Incremental Zone Transfer in DNS June 2000
+---------------------------------------------------+
Header | OPCODE=SQUERY, RESPONSE |
+---------------------------------------------------+
Question | QNAME=JAIN.AD.JP., QCLASS=IN, QTYPE=IXFR |
Question | QNAME=example.domain., QCLASS=IN, QTYPE=IXFR |
+---------------------------------------------------+
Answer | JAIN.AD.JP. IN SOA serial=3 |
| JAIN.AD.JP. IN NS NS.JAIN.AD.JP. |
| NS.JAIN.AD.JP. IN A 133.69.136.1 |
| JAIN-BB.JAIN.AD.JP. IN A 133.69.136.3 |
| JAIN-BB.JAIN.AD.JP. IN A 192.41.197.2 |
| JAIN.AD.JP. IN SOA serial=3 |
Answer | example.domain. IN SOA serial=3 |
| example.domain. IN NS NS.JAIN.AD.JP. |
| ns.example.domain. IN A 10.0.0.1 |
| www.example.domain. IN A 10.0.3.1 |
| www.example.domain. IN A 10.0.2.1 |
| example.domain. IN SOA serial=3 |
+---------------------------------------------------+
Authority | <empty> |
+---------------------------------------------------+
@ -325,27 +357,19 @@ INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
+---------------------------------------------------+
Header | OPCODE=SQUERY, RESPONSE |
+---------------------------------------------------+
Question | QNAME=JAIN.AD.JP., QCLASS=IN, QTYPE=IXFR |
M. Ohta Expires on September 5, 2000 [Page 6]
INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
Question | QNAME=example.domain., QCLASS=IN, QTYPE=IXFR |
+---------------------------------------------------+
Answer | JAIN.AD.JP. IN SOA serial=3 |
| JAIN.AD.JP. IN SOA serial=1 |
| NEZU.JAIN.AD.JP. IN A 133.69.136.5 |
| JAIN.AD.JP. IN SOA serial=2 |
| JAIN-BB.JAIN.AD.JP. IN A 133.69.136.4 |
| JAIN-BB.JAIN.AD.JP. IN A 192.41.197.2 |
| JAIN.AD.JP. IN SOA serial=2 |
| JAIN-BB.JAIN.AD.JP. IN A 133.69.136.4 |
| JAIN.AD.JP. IN SOA serial=3 |
| JAIN-BB.JAIN.AD.JP. IN A 133.69.136.3 |
| JAIN.AD.JP. IN SOA serial=3 |
Answer | example.domain. IN SOA serial=3 |
| example.domain. IN SOA serial=1 |
| ftp.example.domain. IN A 10.0.1.1 |
| example.domain. IN SOA serial=2 |
| www.example.domain. IN A 10.0.1.2 |
| www.example.domain. IN A 10.0.2.1 |
| example.domain. IN SOA serial=2 |
| www.example.domain. IN A 10.0.1.2 |
| example.domain. IN SOA serial=3 |
| www.example.domain. IN A 10.0.3.1 |
| example.domain. IN SOA serial=3 |
+---------------------------------------------------+
Authority | <empty> |
+---------------------------------------------------+
@ -357,15 +381,23 @@ INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
+---------------------------------------------------+
Header | OPCODE=SQUERY, RESPONSE |
+---------------------------------------------------+
Question | QNAME=JAIN.AD.JP., QCLASS=IN, QTYPE=IXFR |
Question | QNAME=example.domain., QCLASS=IN, QTYPE=IXFR |
+---------------------------------------------------+
Answer | JAIN.AD.JP. IN SOA serial=3 |
| JAIN.AD.JP. IN SOA serial=1 |
| NEZU.JAIN.AD.JP. IN A 133.69.136.5 |
| JAIN.AD.JP. IN SOA serial=3 |
| JAIN-BB.JAIN.AD.JP. IN A 133.69.136.3 |
| JAIN-BB.JAIN.AD.JP. IN A 192.41.197.2 |
| JAIN.AD.JP. IN SOA serial=3 |
M. Ohta Expires on December 5, 2000 [Page 7]
INTERNET DRAFT Incremental Zone Transfer in DNS June 2000
Answer | example.domain. IN SOA serial=3 |
| example.domain. IN SOA serial=1 |
| ftp.example.domain. IN A 10.0.1.1 |
| example.domain. IN SOA serial=3 |
| www.example.domain. IN A 10.0.3.1 |
| www.example.domain. IN A 10.0.2.1 |
| example.domain. IN SOA serial=3 |
+---------------------------------------------------+
Authority | <empty> |
+---------------------------------------------------+
@ -374,28 +406,12 @@ INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
or, if UDP packet overflow occurs, with the following message:
M. Ohta Expires on September 5, 2000 [Page 7]
INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
+---------------------------------------------------+
Header | OPCODE=SQUERY, RESPONSE |
+---------------------------------------------------+
Question | QNAME=JAIN.AD.JP., QCLASS=IN, QTYPE=IXFR |
Question | QNAME=example.domain., QCLASS=IN, QTYPE=IXFR |
+---------------------------------------------------+
Answer | JAIN.AD.JP. IN SOA serial=3 |
Answer | example.domain. IN SOA serial=3 |
+---------------------------------------------------+
Authority | <empty> |
+---------------------------------------------------+
@ -421,9 +437,40 @@ INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
[STD13] Mockapetris, P., "Domain Name System" (RFC1034 and RFC1035),
November 1987.
[XFRCLARIFY]
10. Appendix A Appendix A. Pseudocode for response classification
10. Security Considerations
M. Ohta Expires on December 5, 2000 [Page 8]
INTERNET DRAFT Incremental Zone Transfer in DNS June 2000
The following pseudocode outlines one possible algorithm for
classifying IXFR responses.
receive the first response message;
extract the first response RR, always an SOA;
if (the serial number of this SOA RR is less
than or equal to that of the request) {
the response is an up-to-date response;
} else {
if (the response message was received by UDP and
contains no more RRs after the initial SOA) {
the response is a UDP-overflow response;
} else {
extract the second response RR, waiting for a second TCP
response message if necessary;
if (this second RR is an SOA) {
the response is an incremental transfer;
} else {
the response is a nonincremental transfer;
}
}
}
11. Security Considerations
Though DNS is related to several security problems, no attempt is
made to fix them in this document.
@ -431,21 +478,13 @@ INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
This document is believed to introduce no additional security
problems to the current DNS protocol.
11. Author's Address
12. Author's Address
Masataka Ohta
Computer Center, Tokyo Institute of Technology
2-12-1, O-okayama, Meguro-ku, Tokyo 152-8550, JAPAN
Phone: +81-3-5734-3299, Fax: +81-3-5734-3415
M. Ohta Expires on September 5, 2000 [Page 8]
INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
EMail: mohta@necom830.hpcl.titech.ac.jp
Comments should be directed to DNSEXT WG <namedroppers@ops.ietf.org>.
@ -459,50 +498,12 @@ INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
M. Ohta Expires on September 5, 2000 [Page 9]
M. Ohta Expires on December 5, 2000 [Page 9]
INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
INTERNET DRAFT Incremental Zone Transfer in DNS June 2000
12. Full Copyright Statement
13. Full Copyright Statement
"Copyright (C) The Internet Society (March/5/2000). All Rights
Reserved.
@ -553,5 +554,5 @@ INTERNET DRAFT Incremental Zone Transfer in DNS March 2000
M. Ohta Expires on September 5, 2000 [Page 10]
M. Ohta Expires on December 5, 2000 [Page 10]

View file

@ -2,13 +2,13 @@
INTERNET-DRAFT Donald E. Eastlake 3rd
UPDATES RFC 2535 Motorola
Expires: October 2000 April 2000
Expires: December 2000 June 2000
DNS Request and Transaction Signatures ( SIG(0)s )
--- ------- --- ----------- ---------- - ------- -
<draft-ietf-dnsext-sig-zero-01.txt>
<draft-ietf-dnsext-sig-zero-02.txt>
@ -25,11 +25,10 @@ Status of This Document
and its working groups. Note that other groups may also distribute
working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months. Internet-Drafts may be updated, replaced, or obsoleted by
other documents at any time. It is not appropriate to use Internet-
Drafts as reference material or to cite them other than as a
``working draft'' or ``work in progress.''
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet- Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
@ -54,20 +53,21 @@ Abstract
D. Eastlake 3rd [Page 1]
INTERNET-DRAFT DNS SIG(0) April 2000
INTERNET-DRAFT DNS SIG(0) June 2000
Acknowledgments
The significant contributions and suggestions of the following
persons (in alphabetic order) to this draft are gratefully
acknowledged:
The contributions and suggestions of the following persons (in
alphabetic order) to this draft are gratefully acknowledged:
Olafur Gudmundsson
Ed Lewis
Erik Nordmark
Brian Wellington
@ -115,7 +115,7 @@ Table of Contents
D. Eastlake 3rd [Page 2]
INTERNET-DRAFT DNS SIG(0) April 2000
INTERNET-DRAFT DNS SIG(0) June 2000
1. Introduction
@ -158,7 +158,7 @@ INTERNET-DRAFT DNS SIG(0) April 2000
Transaction authentication means that a requester can be sure it is
at least getting the messages from the server it queried and that the
received messages are in response to me query it sent. This is
received messages are in response to the query it sent. This is
accomplished by optionally adding either a TSIG RR [draft-ietf-
dnsext-tsig-*.txt] or, as described herein, a SIG(0) resource record
at the end of the response which digitally signs the concatenation of
@ -173,7 +173,7 @@ INTERNET-DRAFT DNS SIG(0) April 2000
D. Eastlake 3rd [Page 3]
INTERNET-DRAFT DNS SIG(0) April 2000
INTERNET-DRAFT DNS SIG(0) June 2000
2.2 Request Authentication
@ -231,7 +231,7 @@ INTERNET-DRAFT DNS SIG(0) April 2000
D. Eastlake 3rd [Page 4]
INTERNET-DRAFT DNS SIG(0) April 2000
INTERNET-DRAFT DNS SIG(0) June 2000
verifying the corresponding KEY which can be an expensive and lengthy
@ -274,7 +274,7 @@ INTERNET-DRAFT DNS SIG(0) April 2000
meaningless. The TTL fields SHOULD be zero and the CLASS field
SHOULD be ANY. To conserve space, the owner name SHOULD be root (a
single zero octet). When SIG(0) authentication on a response is
desired, that SIG RR must be considered the highest priority of any
desired, that SIG RR MUST be considered the highest priority of any
additional information for inclusion in the response. If the SIG(0)
RR cannot be added without causing the message to be truncated, the
server MUST alter the response so that a SIG(0) can be included.
@ -289,7 +289,7 @@ INTERNET-DRAFT DNS SIG(0) April 2000
D. Eastlake 3rd [Page 5]
INTERNET-DRAFT DNS SIG(0) April 2000
INTERNET-DRAFT DNS SIG(0) June 2000
3.1 Calculating Request and Transaction SIGs
@ -302,10 +302,10 @@ INTERNET-DRAFT DNS SIG(0) April 2000
for the inclusions of the request SIG(0).
It is calculated by using a "data" (see [RFC 2535], Section 4.1.8) of
(1) the SIG's RDATA section omitting the signature subfield itself,
(2) the entire DNS query messages, including DNS header, but not the
UDP/IP header and before the reply RR counts have been adjusted for
the inclusion of the SIG(0). That is
(1) the SIG's RDATA section entirely omitting (not just zeroing) the
signature subfield itself, (2) the DNS query messages, including DNS
header, but not the UDP/IP header and before the reply RR counts have
been adjusted for the inclusion of the SIG(0). That is
data = RDATA | request - SIG(0)
@ -347,7 +347,7 @@ INTERNET-DRAFT DNS SIG(0) April 2000
D. Eastlake 3rd [Page 6]
INTERNET-DRAFT DNS SIG(0) April 2000
INTERNET-DRAFT DNS SIG(0) June 2000
not the TCP/IP header. Support of SIG(0) for TCP is OPTIONAL. As an
@ -358,7 +358,7 @@ INTERNET-DRAFT DNS SIG(0) April 2000
privileged request, servers are not required to check a request
SIG(0).
Note: requests and response can either have a single TSIG or one
Note: requests and responses can either have a single TSIG or one
SIG(0) but not both a TSIG and a SIG(0).
@ -373,7 +373,7 @@ INTERNET-DRAFT DNS SIG(0) April 2000
mode in use. For all other responses, it MAY be checked and the
message rejected if the checks fail.
If a responses SIG(0) check succeed, such a transaction
If a response's SIG(0) check succeed, such a transaction
authentication SIG does NOT directly authenticate the validity any
data-RRs in the message. However, it authenticates that they were
sent by the queried server and have not been diddled. (Only a proper
@ -405,7 +405,7 @@ INTERNET-DRAFT DNS SIG(0) April 2000
D. Eastlake 3rd [Page 7]
INTERNET-DRAFT DNS SIG(0) April 2000
INTERNET-DRAFT DNS SIG(0) June 2000
The inclusion of the SIG(0) inception and expiration time under the
@ -415,7 +415,7 @@ INTERNET-DRAFT DNS SIG(0) April 2000
5. IANA Considerations
No new parameters are created or parameter values assigned by the
No new parameters are created or parameter values assigned by this
document.
@ -463,19 +463,20 @@ References
D. Eastlake 3rd [Page 8]
INTERNET-DRAFT DNS SIG(0) April 2000
INTERNET-DRAFT DNS SIG(0) June 2000
Author's Address
Donald E. Eastlake 3rd
Motorola
65 Shindegan Hill Road
Carmel, NY 10512 USA
140 Forest Avenue
Hudson, MA 01749 USA
Telephone: +1-914-276-2668(h)
Telephone: +1-978-562-2827(h)
+1-508-261-5434(w)
fax: +1-508-261-4447(w)
fax: +1 978-567-7941(h)
+1-508-261-4447(w)
email: Donald.Eastlake@motorola.com
@ -483,9 +484,9 @@ Author's Address
Expiration and File Name
This draft expires October 2000.
This draft expires December 2000.
Its file name is draft-ietf-dnsext-sig-zero-01.txt.
Its file name is draft-ietf-dnsext-sig-zero-02.txt.
@ -503,7 +504,7 @@ Appendix: SIG(0) Changes from RFC 2535
Add discussion of appropriate inception and expiration times for
SIG(0).
Add working to indicate that either a TSIG or one or more SIG(0)s may
Add wording to indicate that either a TSIG or one or more SIG(0)s may
be present but not both.
Reword some areas for clarity.
@ -517,6 +518,5 @@ Appendix: SIG(0) Changes from RFC 2535
D. Eastlake 3rd [Page 9]

View file

@ -1,13 +1,13 @@
DNSEXT Working Group Donald E. Eastlake, 3rd
INTERNET-DRAFT Motorola
Expires: October 2000 April 2000
Expires: December 2000 June 2000
Secret Key Establishment for DNS (TKEY RR)
------ --- ------------- --- --- ----- ---
<draft-ietf-dnsext-tkey-02.txt>
<draft-ietf-dnsext-tkey-03.txt>
@ -24,11 +24,10 @@ Status of This Document
and its working groups. Note that other groups may also distribute
working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months. Internet-Drafts may be updated, replaced, or obsoleted by
other documents at any time. It is not appropriate to use Internet-
Drafts as reference material or to cite them other than as a
``working draft'' or ``work in progress.''
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet- Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
@ -54,10 +53,11 @@ Status of This Document
Donald Eastlake 3rd [Page 1]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
Abstract
@ -83,9 +83,9 @@ Acknowledgments
Ed Lewis (TIS)
Brian Wellington (TIS)
Erik Nordmark (SUN)
Brian Wellington (Nominum)
@ -115,7 +115,7 @@ Acknowledgments
Donald Eastlake 3rd [Page 2]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
Table of Contents
@ -173,7 +173,7 @@ Table of Contents
Donald Eastlake 3rd [Page 3]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
1. Introduction
@ -231,7 +231,7 @@ INTERNET-DRAFT The DNS TKEY RR April 2000
Donald Eastlake 3rd [Page 4]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
servers which is currently used only for key deletion.
@ -289,7 +289,7 @@ INTERNET-DRAFT The DNS TKEY RR April 2000
Donald Eastlake 3rd [Page 5]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
name SHOULD be a domain locally unique at the resolver, less than 128
@ -347,7 +347,7 @@ INTERNET-DRAFT The DNS TKEY RR April 2000
Donald Eastlake 3rd [Page 6]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
To avoid different interpretations of the inception and expiration
@ -405,7 +405,7 @@ INTERNET-DRAFT The DNS TKEY RR April 2000
Donald Eastlake 3rd [Page 7]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
RR and DNS header error field could have unrelated non-zero error
@ -463,7 +463,7 @@ INTERNET-DRAFT The DNS TKEY RR April 2000
Donald Eastlake 3rd [Page 8]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
TKEY queries MUST be authenticated for all modes except GSS-API and,
@ -521,7 +521,7 @@ INTERNET-DRAFT The DNS TKEY RR April 2000
Donald Eastlake 3rd [Page 9]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
algorithm field is set to the authentication algorithm the resolver
@ -579,7 +579,7 @@ INTERNET-DRAFT The DNS TKEY RR April 2000
Donald Eastlake 3rd [Page 10]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
the discarded key.
@ -637,7 +637,7 @@ INTERNET-DRAFT The DNS TKEY RR April 2000
Donald Eastlake 3rd [Page 11]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
the keying material to be used. The KEY RR that appears in the query
@ -681,7 +681,7 @@ INTERNET-DRAFT The DNS TKEY RR April 2000
4.5 Query for Resolver Assigned Keying
Optionally, a server can accept resolver assigned keys. The keying
material must be encrypted under a server key for protection in
material MUST be encrypted under a server key for protection in
transmission as described in Section 6.
The resolver sends a TKEY query with a TKEY RR that specifies the
@ -695,14 +695,15 @@ INTERNET-DRAFT The DNS TKEY RR April 2000
Donald Eastlake 3rd [Page 12]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
the corresponding private key, or it will not be able to decrypt the
keying material and will return a FORMERR, and for which no untrusted
party (preferably no other party than the server) has the private
key, or the untrusted private key holder can capture the messages to
the server, learn the shared secret, and spoof valid TSIGs.
keying material and will return a FORMERR. It is also important that
no untrusted party (preferably no other party than the server) has
the private key corresponding to the KEY RR because, if they do, they
can capture the messages to the server, learn the shared secret, and
spoof valid TSIGs.
The query TKEY RR inception and expiry give the time period the
querier intends to consider the keying material valid. The server
@ -741,19 +742,18 @@ INTERNET-DRAFT The DNS TKEY RR April 2000
information in a response would mean that the client might use a key
that the server had discarded and would then get an error indication.
For server assigned and Diffie-Hellman keys, the client must truly
"discard" all active state associated with the key. For querier
assigned keys, the querier MAY simply mark the key as no longer
retained by the server and may re-send it in a future query
specifying querier assigned keying material.
For server assigned and Diffie-Hellman keys, the client MUST
"discard" active state associated with the key. For querier assigned
keys, the querier MAY simply mark the key as no longer retained by
the server and may re-send it in a future query specifying querier
assigned keying material.
Donald Eastlake 3rd [Page 13]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
6. Methods of Encryption
@ -802,16 +802,16 @@ INTERNET-DRAFT The DNS TKEY RR April 2000
Specification Required as defined in [RFC 2434].
Mode values should not be changed when the status of their use
changes. For example, a mode value assigned for an Experimental
Standard should not be changed later just because that standard's
status is changed to Proposed.
changes. For example, a mode value assigned based just on providing
a specification should not be changed later just because that use's
status is changed to standards track.
Donald Eastlake 3rd [Page 14]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
The following assignments are documented herein:
@ -869,7 +869,7 @@ INTERNET-DRAFT The DNS TKEY RR April 2000
Donald Eastlake 3rd [Page 15]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
References
@ -927,29 +927,29 @@ References
Donald Eastlake 3rd [Page 16]
INTERNET-DRAFT The DNS TKEY RR April 2000
INTERNET-DRAFT The DNS TKEY RR June 2000
Author's Address
Donald E. Eastlake 3rd
Motorola
65 Shindegan Hill Road, RR #1
Carmel, NY 10512 USA
140 Forest Avenue
Hudson, MA 01749 USA
Telephone: +1 914-276-2668 (h)
Telephone: +1 978-562-2827 (h)
+1 508-261-5434 (w)
FAX: +1 508-261-4447 (w)
FAX: +1 978-567-7941 (h)
+1 508-261-4447 (w)
email: Donald.Eastlake@motorola.com
Expiration and File Name
This draft expires October 2000.
Its file name is draft-ietf-dnsext-tkey-02.txt.
This draft expires December 2000.
Its file name is draft-ietf-dnsext-tkey-03.txt.