Network Working Group                                     O. Gudmundsson

Request for Comments: 3658                                 December 2003

Updates: 3090, 3008, 2535, 1035

Category: Standards Track

              Delegation Signer (DS) Resource Record (RR)
Status of this Memo
   This document specifies an Internet standards track protocol for the

   Internet community, and requests discussion and suggestions for

   improvements.  Please refer to the current edition of the "Internet

   Official Protocol Standards" (STD 1) for the standardization state

   and status of this protocol.  Distribution of this memo is unlimited.
Copyright Notice
   Copyright (C) The Internet Society (2003).  All Rights Reserved.
Abstract
   The delegation signer (DS) resource record (RR) is inserted at a zone

   cut (i.e., a delegation point) to indicate that the delegated zone is

   digitally signed and that the delegated zone recognizes the indicated

   key as a valid zone key for the delegated zone.  The DS RR is a

   modification to the DNS Security Extensions definition, motivated by

   operational considerations.  The intent is to use this resource

   record as an explicit statement about the delegation, rather than

   relying on inference.
   This document defines the DS RR, gives examples of how it is used and

   describes the implications on resolvers.  This change is not

   backwards compatible with RFC 2535.  This document updates RFC 1035,

   RFC 2535, RFC 3008 and RFC 3090.





























Gudmundsson                 Standards Track                     [Page 1]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

Table of Contents
   1.  Introduction. . . . . . . . . . . . . . . . . . . . . . . . .   3

       1.2.  Reserved Words. . . . . . . . . . . . . . . . . . . . .   4

   2.  Specification of the Delegation key Signer. . . . . . . . . .   4

       2.1.  Delegation Signer Record Model. . . . . . . . . . . . .   4

       2.2.  Protocol Change . . . . . . . . . . . . . . . . . . . .   5

             2.2.1.  RFC 2535 2.3.4 and 3.4: Special Considerations

                     at Delegation Points  . . . . . . . . . . . . .   6

                     2.2.1.1. Special processing for DS queries. . .   6

                     2.2.1.2. Special processing when child and an

                              ancestor share nameserver. . . . . . .   7

                     2.2.1.3. Modification on use of KEY RR in the

                              construction of Responses. . . . . . .   8

             2.2.2.  Signer's Name (replaces RFC3008 section 2.7). .   9

             2.2.3.  Changes to RFC 3090 . . . . . . . . . . . . . .   9

                     2.2.3.1. RFC 3090: Updates to section 1:

                              Introduction . . . . . . . . . . . . .   9

                     2.2.3.2. RFC 3090 section 2.1: Globally

                              Secured. . . . . . . . . . . . . . . .  10

                     2.2.3.3. RFC 3090 section 3: Experimental

                              Status . . . . . . . . . . . . . . . .  10

             2.2.4.  NULL KEY elimination. . . . . . . . . . . . . .  10

       2.3.  Comments on Protocol Changes. . . . . . . . . . . . . .  10

       2.4.  Wire Format of the DS record. . . . . . . . . . . . . .  11

             2.4.1.  Justifications for Fields . . . . . . . . . . .  12

       2.5.  Presentation Format of the DS Record. . . . . . . . . .  12

       2.6.  Transition Issues for Installed Base. . . . . . . . . .  12

             2.6.1.  Backwards compatibility with RFC 2535 and

                     RFC 1035. . . . . . . . . . . . . . . . . . . .  12

       2.7.  KEY and corresponding DS record example . . . . . . . .  13

   3.  Resolver. . . . . . . . . . . . . . . . . . . . . . . . . . .  14

       3.1.  DS Example" . . . . . . . . . . . . . . . . . . . . . .  14

       3.2.  Resolver Cost Estimates for DS Records" . . . . . . . .  15

   4.  Security Considerations . . . . . . . . . . . . . . . . . . .  15

   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  16

   6.  Intellectual Property Statement . . . . . . . . . . . . . . .  16

   7.  Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .  17

   8.  References. . . . . . . . . . . . . . . . . . . . . . . . . .  17

       8.1.  Normative References. . . . . . . . . . . . . . . . . .  17

       8.2.  Informational References. . . . . . . . . . . . . . . .  17

   9.  Author's Address. . . . . . . . . . . . . . . . . . . . . . .  18

   10. Full Copyright Statement. . . . . . . . . . . . . . . . . . .  19













Gudmundsson                 Standards Track                     [Page 2]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

1.  Introduction
   Familiarity with the DNS system [RFC1035], DNS security extensions

   [RFC2535], and DNSSEC terminology [RFC3090] is important.
   Experience shows that when the same data can reside in two

   administratively different DNS zones, the data frequently gets out of

   sync.  The presence of an NS RRset in a zone anywhere other than at

   the apex indicates a zone cut or delegation.  The RDATA of the NS

   RRset specifies the authoritative nameservers for the delegated or

   "child" zone.  Based on actual measurements, 10-30% of all

   delegations on the Internet have differing NS RRsets at parent and

   child.  There are a number of reasons for this, including a lack of

   communication between parent and child and bogus name servers being

   listed to meet registry requirements.
   DNSSEC [RFC2535, RFC3008, RFC3090] specifies that a child zone needs

   to have its KEY RRset signed by its parent to create a verifiable

   chain of KEYs.  There has been some debate on where the signed KEY

   RRset should reside, whether at the child [RFC2535] or at the parent.

   If the KEY RRset resides at the child, maintaining the signed KEY

   RRset in the child requires frequent two-way communication between

   the two parties.  First, the child transmits the KEY RRset to the

   parent and then the parent sends the signature(s) to the child.

   Storing the KEY RRset at the parent was thought to simplify the

   communication.
   DNSSEC [RFC2535] requires that the parent store a NULL KEY record for

   an unsecure child zone to indicate that the child is unsecure.  A

   NULL KEY record is a waste: an entire signed RRset is used to

   communicate effectively one bit of information - that the child is

   unsecure. Chasing down NULL KEY RRsets complicates the resolution

   process in many cases, because nameservers for both parent and child

   need to be queried for the KEY RRset if the child nameserver does not

   return it.  Storing the KEY RRset only in the parent zone simplifies

   this and would allow the elimination of the NULL KEY RRsets entirely.

   For large delegation zones, the cost of NULL keys is a significant

   barrier to deployment.
   Prior to the restrictions imposed by RFC 3445 [RFC3445], another

   implication of the DNSSEC key model is that the KEY record could be

   used to store public keys for other protocols in addition to DNSSEC

   keys.  There are a number of potential problems with this, including:
   1. The KEY RRset can become quite large if many applications and

      protocols store their keys at the zone apex.  Possible protocols

      are IPSEC, HTTP, SMTP, SSH and others that use public key

      cryptography.



Gudmundsson                 Standards Track                     [Page 3]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

   2. The KEY RRset may require frequent updates.
   3. The probability of compromised or lost keys, which trigger

      emergency key roll-over procedures, increases.
   4. The parent may refuse to sign KEY RRsets with non-DNSSEC zone

      keys.
   5. The parent may not meet the child's expectations of turnaround

      time for resigning the KEY RRset.
   Given these reasons, SIG@parent isn't any better than SIG/KEY@Child.
1.2.  Reserved Words
   The key words "MAY", "MAY NOT", "MUST", "MUST NOT", "REQUIRED",

   "RECOMMENDED", "SHOULD", and "SHOULD NOT" in this document are to be

   interpreted as described in BCP 14, RFC 2119 [RFC2119].
2.  Specification of the Delegation key Signer
   This section defines the Delegation Signer (DS) RR type (type code

   43) and the changes to DNS to accommodate it.
2.1.  Delegation Signer Record Model
   This document presents a replacement for the DNSSEC KEY record chain

   of trust [RFC2535] that uses a new RR that resides only at the

   parent.  This record identifies the key(s) that the child uses to

   self-sign its own KEY RRset.
   Even though DS identifies two roles for KEYs, Key Signing Key (KSK)

   and Zone Signing Key (ZSK), there is no requirement that zone uses

   two different keys for these roles.  It is expected that many small

   zones will only use one key, while larger zones will be more likely

   to use multiple keys.
   The chain of trust is now established by verifying the parent KEY

   RRset, the DS RRset from the parent and the KEY RRset at the child.

   This is cryptographically equivalent to using just KEY records.
   Communication between the parent and child is greatly reduced, since

   the child only needs to notify the parent about changes in keys that

   sign its apex KEY RRset.  The parent is ignorant of all other keys in

   the child's apex KEY RRset.  Furthermore, the child maintains full

   control over the apex KEY RRset and its content.  The child can

   maintain any policies regarding its KEY usage for DNSSEC with minimal

   impact on the parent.  Thus, if the child wants to have frequent key



Gudmundsson                 Standards Track                     [Page 4]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

   roll-over for its DNS zone keys, the parent does not need to be aware

   of it.  The child can use one key to sign only its apex KEY RRset and

   a different key to sign the other RRsets in the zone.
   This model fits well with a slow roll out of DNSSEC and the islands

   of security model.  In this model, someone who trusts "good.example."

   can preconfigure a key from "good.example." as a trusted key, and

   from then on trusts any data signed by that key or that has a chain

   of trust to that key.  If "example." starts advertising DS records,

   "good.example." does not have to change operations by suspending

   self-signing.  DS records can be used in configuration files to

   identify trusted keys instead of KEY records.  Another significant

   advantage is that the amount of information stored in large

   delegation zones is reduced: rather than the NULL KEY record at every

   unsecure delegation demanded by RFC 2535, only secure delegations

   require additional information in the form of a signed DS RRset.
   The main disadvantage of this approach is that verifying a zone's KEY

   RRset requires two signature verification operations instead of the

   one in RFC 2535 chain of trust.  There is no impact on the number of

   signatures verified for other types of RRsets.
2.2.  Protocol Change
   All DNS servers and resolvers that support DS MUST support the OK bit

   [RFC3225] and a larger message size [RFC3226].  In order for a

   delegation to be considered secure the delegation MUST contain a DS

   RRset.  If a query contains the OK bit, a nameserver returning a

   referral for the delegation MUST include the following RRsets in the

   authority section in this order:
   If DS RRset is present:

      parent's copy of child's NS RRset

      DS and SIG(DS)
   If no DS RRset is present:

      parent's copy of child's NS RRset

      parent's zone NXT and SIG(NXT)
   This increases the size of referral messages, possibly causing some

   or all glue to be omitted.  If the DS or NXT RRsets with signatures

   do not fit in the DNS message, the TC bit MUST be set.  Additional

   section processing is not changed.
   A DS RRset accompanying a NS RRset indicates that the child zone is

   secure.  If a NS RRset exists without a DS RRset, the child zone is

   unsecure (from the parents point of view).  DS RRsets MUST NOT appear

   at non-delegation points or at a zone's apex.



Gudmundsson                 Standards Track                     [Page 5]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

   Section 2.2.1 defines special considerations related to authoritative

   nameservers responding to DS queries and replaces RFC 2535 sections

   2.3.4 and 3.4.  Section 2.2.2 replaces RFC 3008 section 2.7, and

   section 2.2.3 updates RFC 3090.
2.2.1.  RFC 2535 2.3.4 and 3.4: Special Considerations at Delegation

        Points
   DNS security views each zone as a unit of data completely under the

   control of the zone owner with each entry (RRset) signed by a special

   private key held by the zone manager.  But the DNS protocol views the

   leaf nodes in a zone that are also the apex nodes of a child zone

   (i.e., delegation points) as "really" belonging to the child zone.

   The corresponding domain names appear in two master files and might

   have RRsets signed by both the parent and child zones' keys.  A

   retrieval could get a mixture of these RRsets and SIGs, especially

   since one nameserver could be serving both the zone above and below a

   delegation point [RFC2181].
   Each DS RRset stored in the parent zone MUST be signed by at least

   one of the parent zone's private keys.  The parent zone MUST NOT

   contain a KEY RRset at any delegation point.  Delegations in the

   parent MAY contain only the following RR types: NS, DS, NXT and SIG.

   The NS RRset MUST NOT be signed.  The NXT RRset is the exceptional

   case: it will always appear differently and authoritatively in both

   the parent and child zones, if both are secure.
   A secure zone MUST contain a self-signed KEY RRset at its apex.  Upon

   verifying the DS RRset from the parent, a resolver MAY trust any KEY

   identified in the DS RRset as a valid signer of the child's apex KEY

   RRset.  Resolvers configured to trust one of the keys signing the KEY

   RRset MAY now treat any data signed by the zone keys in the KEY RRset

   as secure.  In all other cases, resolvers MUST consider the zone

   unsecure.
   An authoritative nameserver queried for type DS MUST return the DS

   RRset in the answer section.
2.2.1.1.  Special processing for DS queries
   When a nameserver is authoritative for the parent zone at a

   delegation point and receives a query for the DS record at that name,

   it MUST answer based on data in the parent zone, return DS or

   negative answer.  This is true whether or not it is also

   authoritative for the child zone.









Gudmundsson                 Standards Track                     [Page 6]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

   When the nameserver is authoritative for the child zone at a

   delegation point but not the parent zone, there is no natural

   response, since the child zone is not authoritative for the DS record

   at the zone's apex.  As these queries are only expected to originate

   from recursive nameservers which are not DS-aware, the authoritative

   nameserver MUST answer with:
      RCODE:             NOERROR

      AA bit:            set

      Answer Section:    Empty

      Authority Section: SOA [+ SIG(SOA) + NXT + SIG(NXT)]
   That is, it answers as if it is authoritative and the DS record does

   not exist.  DS-aware recursive nameservers will query the parent zone

   at delegation points, so will not be affected by this.
   A nameserver authoritative for only the child zone, that is also a

   caching server MAY (if the RD bit is set in the query) perform

   recursion to find the DS record at the delegation point, or MAY

   return the DS record from its cache.  In this case, the AA bit MUST

   NOT be set in the response.
2.2.1.2.  Special processing when child and an ancestor share

          nameserver
   Special rules are needed to permit DS RR aware nameservers to

   gracefully interact with older caches which otherwise might falsely

   label a nameserver as lame because of the placement of the DS RR set.
   Such a situation might arise when a nameserver is authoritative for

   both a zone and it's grandparent, but not the parent.  This sounds

   like an obscure example, but it is very real.  The root zone is

   currently served on 13 machines, and "root-servers.net." is served on

   4 of the 13, but "net." is severed on different nameservers.
   When a nameserver receives a query for (<QNAME>, DS, <QCLASS>), the

   response MUST be determined from reading these rules in order:
   1) If the nameserver is authoritative for the zone that holds the DS

      RR set (i.e., the zone that delegates <QNAME>, a.k.a. the "parent"

      zone), the response contains the DS RR set as an authoritative

      answer.
   2) If the nameserver is offering recursive service and the RD bit is

      set in the query, the nameserver performs the query itself

      (according to the rules for resolvers described below) and returns

      its findings.





Gudmundsson                 Standards Track                     [Page 7]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

   3) If the nameserver is authoritative for the zone that holds the

      <QNAME>'s SOA RR set, the response is an authoritative negative

      answer as described in 2.2.1.1.
   4) If the nameserver is authoritative for a zone or zones above the

      QNAME, a referral to the most enclosing (deepest match) zone's

      servers is made.
   5) If the nameserver is not authoritative for any part of the QNAME,

      a response indicating a lame nameserver for QNAME is given.
   Using these rules will require some special processing on the part of

   a DS RR aware resolver.  To illustrate this, an example is used.
   Assuming a nameserver is authoritative for roots.example.net. and for

   the root zone but not the intervening two zones (or the intervening

   two label deep zone).  Assume that QNAME=roots.example.net.,

   QTYPE=DS, and QCLASS=IN.
   The resolver will issue this request (assuming no cached data)

   expecting a referral to a nameserver for .net.  Instead, rule number

   3 above applies and a negative answer is returned by the nameserver.

   The reaction by the resolver is not to accept this answer as final,

   as it can determine from the SOA RR in the negative answer the

   context within which the nameserver has answered.
   A solution would be to instruct the resolver to hunt for the

   authoritative zone of the data in a brute force manner.
   This can be accomplished by taking the owner name of the returned SOA

   RR and striping off enough left-hand labels until a successful NS

   response is obtained.  A successful response here means that the

   answer has NS records in it.  (Entertaining the possibility that a

   cut point can be two labels down in a zone.)
   Returning to the example, the response will include a negative answer

   with either the SOA RR for "roots.example.net." or "example.net."

   depending on whether roots.example.net is a delegated domain.  In

   either case, removing the left most label of the SOA owner name will

   lead to the location of the desired data.
2.2.1.3.  Modification on use of KEY RR in the construction of Responses
   This section updates RFC 2535 section 3.5 by replacing it with the

   following:









Gudmundsson                 Standards Track                     [Page 8]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

   A query for KEY RR MUST NOT trigger any additional section

   processing.  Security aware resolvers will include corresponding SIG

   records in the answer section.
   KEY records SHOULD NOT be added to the additional records section in

   response to any query.
   RFC 2535 specified that KEY records be added to the additional

   section when SOA or NS records were included in an answer.  This was

   done to reduce round trips (in the case of SOA) and to force out NULL

   KEYs (in the NS case).  As this document obsoletes NULL keys, there

   is no need for the inclusion of KEYs with NSs.  Furthermore, as SOAs

   are included in the authority section of negative answers, including

   the KEYs each time will cause redundant transfers of KEYs.
   RFC 2535 section 3.5 also included a rule for adding the KEY RRset to

   the response for a query for A and AAAA types.  As Restrict KEY

   [RFC3090] eliminated use of KEY RR by all applications, this rule is

   no longer needed.
2.2.2.  Signer's Name (replaces RFC 3008 section 2.7)
   The signer's name field of a SIG RR MUST contain the name of the zone

   to which the data and signature belong.  The combination of signer's

   name, key tag, and algorithm MUST identify a zone key if the SIG is

   to be considered material.  This document defines a standard policy

   for DNSSEC validation; local policy MAY override the standard policy.
   There are no restrictions on the signer field of a SIG(0) record. The

   combination of signer's name, key tag, and algorithm MUST identify a

   key if this SIG(0) is to be processed.
2.2.3.  Changes to RFC 3090
   A number of sections in RFC 3090 need to be updated to reflect the DS

   record.
2.2.3.1.  RFC 3090: Updates to section 1: Introduction
   Most of the text is still relevant but the words "NULL key" are to be

   replaced with "missing DS RRset".  In section 1.3, the last three

   paragraphs discuss the confusion in sections of RFC 2535 that are

   replaced in section 2.2.1 above.  Therefore, these paragraphs are now

   obsolete.











Gudmundsson                 Standards Track                     [Page 9]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

2.2.3.2.  RFC 3090 section 2.1: Globally Secured
   Rule 2.1.b is replaced by the following rule:
   2.1.b. The KEY RRset at a zone's apex MUST be self-signed by a

   private key whose public counterpart MUST appear in a zone signing

   KEY RR (2.a) owned by the zone's apex and specifying a mandatory-to-

   implement algorithm.  This KEY RR MUST be identified by a DS RR in a

   signed DS RRset in the parent zone.
   If a zone cannot get its parent to advertise a DS record for it, the

   child zone cannot be considered globally secured.  The only exception

   to this is the root zone, for which there is no parent zone.
2.2.3.3.  RFC 3090 section 3: Experimental Status.
   The only difference between experimental status and globally secured

   is the missing DS RRset in the parent zone.  All locally secured

   zones are experimental.
2.2.4.  NULL KEY elimination
   RFC 3445 section 3 eliminates the top two bits in the flags field of

   KEY RR.  These two bits were used to indicate NULL KEY or NO KEY. RFC

   3090 defines that zone as either secure or not and these rules

   eliminate the need to put NULL keys in the zone apex to indicate that

   the zone is not secured for a algorithm.  Along with this document,

   these other two eliminate all uses for the NULL KEY.  This document

   obsoletes NULL KEY.
2.3.  Comments on Protocol Changes
   Over the years, there have been various discussions surrounding the

   DNS delegation model, declaring it to be broken because there is no

   good way to assert if a delegation exists.  In the RFC 2535 version

   of DNSSEC, the presence of the NS bit in the NXT bit map proves there

   is a delegation at this name.  Something more explicit is required

   and the DS record addresses this need for secure delegations.
   The DS record is a major change to DNS: it is the first resource

   record that can appear only on the upper side of a delegation.

   Adding it will cause interoperability problems and requires a flag

   day for DNSSEC.  Many old nameservers and resolvers MUST be upgraded

   to take advantage of DS.  Some old nameservers will be able to be

   authoritative for zones with DS records but will not add the NXT or

   DS records to the authority section.  The same is true for caching

   nameservers; in fact, some might even refuse to pass on the DS or NXT

   records.



Gudmundsson                 Standards Track                    [Page 10]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

2.4.  Wire Format of the DS record
   The DS (type=43) record contains these fields: key tag, algorithm,

   digest type, and the digest of a public key KEY record that is

   allowed and/or used to sign the child's apex KEY RRset.  Other keys

   MAY sign the child's apex KEY RRset.
                        1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3

    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   |           key tag             |  algorithm    |  Digest type  |

   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   |                digest  (length depends on type)               |

   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   |                (SHA-1 digest is 20 bytes)                     |

   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   |                                                               |

   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|

   |                                                               |

   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|

   |                                                               |

   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   The key tag is calculated as specified in RFC 2535.  Algorithm MUST

   be allowed to sign DNS data.  The digest type is an identifier for

   the digest algorithm used.  The digest is calculated over the

   canonical name of the delegated domain name followed by the whole

   RDATA of the KEY record (all four fields).
      digest = hash( canonical FQDN on KEY RR | KEY_RR_rdata)
      KEY_RR_rdata = Flags | Protocol | Algorithm | Public Key
   Digest type value 0 is reserved, value 1 is SHA-1, and reserving

   other types requires IETF standards action.  For interoperability

   reasons, keeping number of digest algorithms low is strongly

   RECOMMENDED.  The only reason to reserve additional digest types is

   to increase security.
   DS records MUST point to zone KEY records that are allowed to

   authenticate DNS data.  The indicated KEY records protocol field MUST

   be set to 3; flag field bit 7 MUST be set to 1.  The value of other

   flag bits is not significant for the purposes of this document.
   The size of the DS RDATA for type 1 (SHA-1) is 24 bytes, regardless

   of key size.  New digest types probably will have larger digests.







Gudmundsson                 Standards Track                    [Page 11]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

2.4.1.  Justifications for Fields
   The algorithm and key tag fields are present to allow resolvers to

   quickly identify the candidate KEY records to examine.  SHA-1 is a

   strong cryptographic checksum: it is computationally infeasible for

   an attacker to generate a KEY record that has the same SHA-1 digest.

   Combining the name of the key and the key rdata as input to the

   digest provides stronger assurance of the binding.  Having the key

   tag in the DS record adds greater assurance than the SHA-1 digest

   alone, as there are now two different mapping functions.
   This format allows concise representation of the keys that the child

   will use, thus keeping down the size of the answer for the

   delegation, reducing the probability of DNS message overflow.  The

   SHA-1 hash is strong enough to uniquely identify the key and is

   similar to the PGP key footprint.  The digest type field is present

   for possible future expansion.
   The DS record is well suited to listing trusted keys for islands of

   security in configuration files.
2.5.  Presentation Format of the DS Record
   The presentation format of the DS record consists of three numbers

   (key tag, algorithm, and digest type) followed by the digest itself

   presented in hex:
      example.   DS  12345 3 1 123456789abcdef67890123456789abcdef67890
2.6.  Transition Issues for Installed Base
   No backwards compatibility with RFC 2535 is provided.
   RFC 2535-compliant resolvers will assume that all DS-secured

   delegations are locally secure.  This is bad, but the DNSEXT Working

   Group has determined that rather than dealing with both RFC 2535-

   secured zones and DS-secured zones, a rapid adoption of DS is

   preferable.  Thus, the only option for early adopters is to upgrade

   to DS as soon as possible.
2.6.1.  Backwards compatibility with RFC 2535 and RFC 1035
   This section documents how a resolver determines the type of

   delegation.











Gudmundsson                 Standards Track                    [Page 12]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

   RFC 1035 delegation (in parent) has:
   RFC 1035           NS
   RFC 2535 adds the following two cases:
   Secure RFC 2535:   NS + NXT + SIG(NXT)

                      NXT bit map contains: NS SIG NXT

   Unsecure RFC 2535: NS + KEY + SIG(KEY) + NXT + SIG(NXT)

                      NXT bit map contains: NS SIG KEY NXT

                      KEY must be a NULL key.
   DNSSEC with DS has the following two states:
   Secure DS:         NS + DS + SIG(DS)

                      NXT bit map contains: NS SIG NXT DS

   Unsecure DS:       NS + NXT + SIG(NXT)

                      NXT bit map contains: NS SIG NXT
   It is difficult for a resolver to determine if a delegation is secure

   RFC 2535 or unsecure DS.  This could be overcome by adding a flag to

   the NXT bit map, but only upgraded resolvers would understand this

   flag, anyway.  Having both parent and child signatures for a KEY

   RRset might allow old resolvers to accept a zone as secure, but the

   cost of doing this for a long time is much higher than just

   prohibiting RFC 2535-style signatures at child zone apexes and

   forcing rapid deployment of DS-enabled nameservers and resolvers.
   RFC 2535 and DS can, in theory, be deployed in parallel, but this

   would require resolvers to deal with RFC 2535 configurations forever.

   This document obsoletes the NULL KEY in parent zones, which is a

   difficult enough change that to cause a flag day.
2.7.  KEY and corresponding DS record example
   This is an example of a KEY record and the corresponding DS record.
   dskey.example. KEY  256 3 1 (

                  AQPwHb4UL1U9RHaU8qP+Ts5bVOU1s7fYbj2b3CCbzNdj

                  4+/ECd18yKiyUQqKqQFWW5T3iVc8SJOKnueJHt/Jb/wt

                  ) ; key id = 28668

             DS   28668 1  1  49FD46E6C4B45C55D4AC69CBD3CD34AC1AFE51DE















Gudmundsson                 Standards Track                    [Page 13]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

3.  Resolver
3.1.  DS Example
   To create a chain of trust, a resolver goes from trusted KEY to DS to

   KEY.
      Assume the key for domain "example." is trusted.  Zone "example."

      contains at least the following records:

      example.          SOA     <soa stuff>

      example.          NS       ns.example.

      example.          KEY     <stuff>

      example.          NXT      secure.example. NS SOA KEY SIG NXT

      example.          SIG(SOA)

      example.          SIG(NS)

      example.          SIG(NXT)

      example.          SIG(KEY)

      secure.example.   NS      ns1.secure.example.

      secure.example.   DS      tag=12345 alg=3 digest_type=1 <foofoo>

      secure.example.   NXT     unsecure.example. NS SIG NXT DS

      secure.example.   SIG(NXT)

      secure.example.   SIG(DS)

      unsecure.example  NS      ns1.unsecure.example.

      unsecure.example. NXT     example. NS SIG NXT

      unsecure.example. SIG(NXT)
      In zone "secure.example." following records exist:

      secure.example.   SOA      <soa stuff>

      secure.example.   NS       ns1.secure.example.

      secure.example.   KEY      <tag=12345 alg=3>

      secure.example.   KEY      <tag=54321 alg=5>

      secure.example.   NXT      <nxt stuff>

      secure.example.   SIG(KEY) <key-tag=12345 alg=3>

      secure.example.   SIG(SOA) <key-tag=54321 alg=5>

      secure.example.   SIG(NS)  <key-tag=54321 alg=5>

      secure.example.   SIG(NXT) <key-tag=54321 alg=5>
   In this example, the private key for "example." signs the DS record

   for "secure.example.", making that a secure delegation.  The DS

   record states which key is expected to sign the KEY RRset at

   "secure.example.".  Here "secure.example." signs its KEY RRset with

   the KEY identified in the DS RRset, thus the KEY RRset is validated

   and trusted.
   This example has only one DS record for the child, but parents MUST

   allow multiple DS records to facilitate key roll-over and multiple

   KEY algorithms.





Gudmundsson                 Standards Track                    [Page 14]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

   The resolver determines the security status of "unsecure.example." by

   examining the parent zone's NXT record for this name.  The absence of

   the DS bit indicates an unsecure delegation.  Note the NXT record

   SHOULD only be examined after verifying the corresponding signature.
3.2.  Resolver Cost Estimates for DS Records
   From a RFC 2535 recursive resolver point of view, for each delegation

   followed to chase down an answer, one KEY RRset has to be verified.

   Additional RRsets might also need to be verified based on local

   policy (e.g., the contents of the NS RRset).  Once the resolver gets

   to the appropriate delegation, validating the answer might require

   verifying one or more signatures.  A simple A record lookup requires

   at least N delegations to be verified and one RRset.  For a DS-

   enabled recursive resolver, the cost is 2N+1.  For an MX record,

   where the target of the MX record is in the same zone as the MX

   record, the costs are N+2 and 2N+2, for RFC 2535 and DS,

   respectively.  In the case of a negative answer, the same ratios hold

   true.
   The recursive resolver has to do an extra query to get the DS record,

   which will increase the overall cost of resolving this question, but

   it will never be worse than chasing down NULL KEY records from the

   parent in RFC 2535 DNSSEC.
   DS adds processing overhead on resolvers and increases the size of

   delegation answers, but much less than storing signatures in the

   parent zone.
4.  Security Considerations
   This document proposes a change to the validation chain of KEY

   records in DNSSEC.  The change is not believed to reduce security in

   the overall system.  In RFC 2535 DNSSEC, the child zone has to

   communicate keys to its parent and prudent parents will require some

   authentication with that transaction.  The modified protocol will

   require the same authentication, but allows the child to exert more

   local control over its own KEY RRset.
   There is a remote possibility that an attacker could generate a valid

   KEY that matches all the DS fields, of a specific DS set, and thus

   forge data from the child.  This possibility is considered

   impractical, as on average more than
      2 ^ (160 - <Number of keys in DS set>)
   keys would have to be generated before a match would be found.





Gudmundsson                 Standards Track                    [Page 15]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

   An attacker that wants to match any DS record will have to generate

   on average at least 2^80 keys.
   The DS record represents a change to the DNSSEC protocol and there is

   an installed base of implementations, as well as textbooks on how to

   set up secure delegations.  Implementations that do not understand

   the DS record will not be able to follow the KEY to DS to KEY chain

   and will consider all zones secured that way as unsecure.
5.  IANA Considerations
   IANA has allocated an RR type code for DS from the standard RR type

   space (type 43).
   IANA has established a new registry for the DS RR type for digest

   algorithms.  Defined types are:
      0 is Reserved,

      1 is SHA-1.
   Adding new reservations requires IETF standards action.
6.  Intellectual Property Statement
   The IETF takes no position regarding the validity or scope of any

   intellectual property or other rights that might be claimed to

   pertain to the implementation or use of the technology described in

   this document or the extent to which any license under such rights

   might or might not be available; neither does it represent that it

   has made any effort to identify any such rights.  Information on the

   IETF's procedures with respect to rights in standards-track and

   standards-related documentation can be found in BCP-11.  Copies of

   claims of rights made available for publication and any assurances of

   licenses to be made available, or the result of an attempt made to

   obtain a general license or permission for the use of such

   proprietary rights by implementors or users of this specification can

   be obtained from the IETF Secretariat.
   The IETF invites any interested party to bring to its attention any

   copyrights, patents or patent applications, or other proprietary

   rights which may cover technology that may be required to practice

   this standard.  Please address the information to the IETF Executive

   Director.













Gudmundsson                 Standards Track                    [Page 16]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

7.  Acknowledgments
   Over the last few years a number of people have contributed ideas

   that are captured in this document.  The core idea of using one key

   to sign only the KEY RRset comes from discussions with Bill Manning

   and Perry Metzger on how to put in a single root key in all

   resolvers. Alexis Yushin, Brian Wellington, Sam Weiler, Paul Vixie,

   Jakob Schlyter, Scott Rose, Edward Lewis, Lars-Johan Liman, Matt

   Larson, Mark Kosters, Dan Massey, Olaf Kolman, Phillip Hallam-Baker,

   Miek Gieben, Havard Eidnes, Donald Eastlake 3rd., Randy Bush, David

   Blacka, Steve Bellovin, Rob Austein, Derek Atkins, Roy Arends, Mark

   Andrews, Harald Alvestrand, and others have provided useful comments.
8.  References
8.1.  Normative References
   [RFC1035]  Mockapetris, P., "Domain Names - Implementation and

              Specification", STD 13, RFC 1035, November 1987.
   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate

              Requirement Levels", BCP 14, RFC 2119, March 1997.
   [RFC2535]  Eastlake, D., "Domain Name System Security Extensions",

              RFC 2535, March 1999.
   [RFC3008]  Wellington, B., "Domain Name System Security (DNSSEC)

              Signing Authority", RFC 3008, November 2000.
   [RFC3090]  Lewis, E., "DNS Security Extension Clarification on Zone

              Status", RFC 3090, March 2001.
   [RFC3225]  Conrad, D., "Indicating Resolver Support of DNSSEC", RFC

              3225, December 2001.
   [RFC3445]  Massey, D. and S. Rose, "Limiting the scope of the KEY

              Resource Record (RR)", RFC 3445, December 2002.
8.2.  Informational References
   [RFC2181]  Elz, R. and R. Bush, "Clarifications to the DNS

              Specification", RFC 2181, July 1997.
   [RFC3226]  Gudmundsson, O., "DNSSEC and IPv6 A6 aware server/resolver

              message size requirements", RFC 3226, December 2001.









Gudmundsson                 Standards Track                    [Page 17]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

9.  Author's Address
   Olafur Gudmundsson

   3821 Village Park Drive

   Chevy Chase, MD,  20815
   EMail: ds-rfc@ogud.com





















































































Gudmundsson                 Standards Track                    [Page 18]


RFC 3658      Delegation Signer (DS) Resource Record (RR)  December 2003

10.  Full Copyright Statement
   Copyright (C) The Internet Society (2003).  All Rights Reserved.
   This document and translations of it may be copied and furnished to

   others, and derivative works that comment on or otherwise explain it

   or assist in its implementation may be prepared, copied, published

   and distributed, in whole or in part, without restriction of any

   kind, provided that the above copyright notice and this paragraph are

   included on all such copies and derivative works.  However, this

   document itself may not be modified in any way, such as by removing

   the copyright notice or references to the Internet Society or other

   Internet organizations, except as needed for the purpose of

   developing Internet standards in which case the procedures for

   copyrights defined in the Internet Standards process must be

   followed, or as required to translate it into languages other than

   English.
   The limited permissions granted above are perpetual and will not be

   revoked by the Internet Society or its successors or assignees.
   This document and the information contained herein is provided on an

   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING

   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING

   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION

   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF

   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Acknowledgement
   Funding for the RFC Editor function is currently provided by the

   Internet Society.



































Gudmundsson                 Standards Track                    [Page 19]