DNSSEC
Motivation
DNSSEC aims at closing security holes in the Internet such as cache poisoning and DNS spoofing.
For validating DNSSEC a chain of trust must be established. To meet this requirement, the DNSSEC protocol requires that a reference to the key(s) of the delegated zone is entered into the delegating zone. Thus, the chain of trust follows the delegation path. The relevant key is the Key Signing Key of the delegated zone, which is usually flagged as Secure Entry Point (SEP). This information is available in a DNSKEY-RR in the delegated zone and is signed there (at least) by this very DNSKEY. It is not repeated in exactly the same way in the delegating zone for reasons of space. Instead of the actual key, a corresponding fingerprint is stored there in a DS-RR (Delegation Signer).
The corresponding DS records are generated together with the zone (currently precisely one DS-RR per communicated Trust Anchor), signed and distributed with the zone.
Dnskey
DNSKEY Resource Records serve for propagating public keys throughout the DNS and represent a new technical attribute of a domain (comparable to “Nserver” or “Nsentry” attributes).
Structure of the DNSkeys in K/V and XML requests
The following four fields are required as values of the keyword "Dnskey:" (cf. presentation format in RFC 4034):
- Flags: 256 or 257,
- Protocol: currently always 3,
- Numerical encoding of the used algorithm:
- The values in the “Algorithm” field must be taken from the IANA-Registry, marked as usable and not reserved for private purposes. Only RSA, DSA, ECDSA and GOST with different hash procedures are defined as cryptographic algorithms:
3 (DSA/SHA1) 5 (RSA/SHA-1) 6 (DSA-NSEC3-SHA1) 7 (RSASHA1-NSEC3-SHA1) 8 (RSA/SHA-256) 10 (RSA/SHA-512) 12 (GOST) 13 ECDSAP256SHA256) 14 (ECDSAP384SHA384)
- The values in the “Algorithm” field must be taken from the IANA-Registry, marked as usable and not reserved for private purposes. Only RSA, DSA, ECDSA and GOST with different hash procedures are defined as cryptographic algorithms:
- Public-Key, base64-kodiert.
The value of the “Dnskey” keyword must be entered on one line and must not be separated by line breaks.
Domain CREATE request example with specification of a Dnskey in K/V format
|
Domain CREATE order example with specification of a DNS key in XML format
|
Special Features
- CREATE If a domain is registered successfully but the connection fails (the domain is registered with the status “failed”), the DS records calculated from the Dnskey records are not taken into account when generating the zone.
- UPDATE / CHHOLDER If there are no DNSKEY records for a domain, these can be entered using an UPDATE or CHHOLDER.
If one or more Dnskey entries already exist for a domain and the keyword “Dnskey:” is not present or is empty in a domain UPDATE or domain CHHOLDER order, the order will be executed and the original value of “Dnskey:” will be deleted. - CHPROV, See the “Change of operator” documentation
- TRANSIT Any DNSkey entries are deleted for TRANSIT requests (regardless of whether the value of “Disconnect:” is “true” or “false”).
- DELETE For DELETE requests, the DS records generated from the Dnskey entries are also removed from the.de zone.
Nameserver Predelegation Check
For more information, see DENIC-23p and https://nast.denic.de.