[Opendnssec-develop] Review requirements
Jakob Schlyter
jakob at kirei.se
Tue May 12 21:11:07 UTC 2009
On 12 maj 2009, at 14.12, Antoin Verschuren wrote:
> 1. In 3.2.3 it says: "2. The signer MAY inspect input DNSSEC RRs
> associated with a zone and, if valid, output them instead of
> generating new ones.
> Note: this behaviour SHOULD be a configurable option."
> Can somebody explain why this should be a configurable option ? Or
> in other words, in what situations would you want to be able to mess
> with this ?
if you feed the opendnssec system an already signed zone, you may want
to strip all dnssec information at ingress.
> 2. I see in 2.4.3: "It MUST be possible to manually roll the KSK for
> a zone."
> I don't know how far this goes, but does that mean that there should
> be a simple command or button to do an emergency key rollover ?
yes.
> I think in case of a key compromise, I would like to have a simple
> button like that, so all other integrity checks are done
> automatically. Not only that I can manually generate a key, but all
> other keys and timers should be recalculated so that operation goes
> back to normal. An emergency key rollover without thinking what else
> needs to be done.
yes.
> 3. 2.4.3: "6. The production of a new KSK for a zone MAY be notified
> to the operator if such notifications are enabled."
> I would like to have a configurable notification option as well
> where I am warned in advance that a KSK rollover will be necessary
> in a specific timeframe.
seems like resonable thing that one would like to ask the KASP enforcer.
> So f.e a notification that I need to generate new keys in the coming
> month. In cases of some higher security, f.e. when manual
> intervention for KSK generation is needed (offline signing).
> Do we still find that applicable ? Is there still an opinion that
> ZSK rollovers are handled by the HSM/signer, but KSK rollovers can/
> should be done offline ?
currently, all key handling is done online. we've had discussion
regarding operations that involves carbon life forms as well, but
nothing is currently implemented as far as I know.
> 4. Don't know if this is a nice to have or a requirement: I would
> like to have some state reporting to see how my signing is
> progressing.
> A sort of oversight of all the zones with the versions of KSK and
> ZSK's used or ready to be used to monitor the signing process.
yes that would be nice. please send code :-) (sorry, I had to say that)
> 5. Parent interaction
> How configurable will the KSK notifications be ? I'm thinking of
> parsing notifications directly to my parent. You'll have questions
> like do I need the DNSKEy, should I calculate the DS, can I follow
> the update process at the parent, in other words, what information
> and format do I need for KSK notification ?
as far as I know, we have not discussed parent-child interaction yet.
> 6. There is a requirement for multiple HSM's to facilitate migration
> to new HSM's. I think another use case is that there are more zones/
> keys than fit in a single HSM, so you'll need extra HSM's to expand
> capacity. That use case should be provided too. I think it says that
> correctly in the requirements, but I want to make sure.
we have a capacity value for each HSM so that should be possible.
> 7. Integrity checking
> We are used to do integrity checking before a zone is published.
> However, we can do a lot of integrity checking because we generate a
> complete new build of a zone. So we can compare the old zone with
> the new one and see if there is not a major change. I have 2
> questions: Will integrity checking be done only on the DNSSEC data,
> or also on other parameters (What happens f.e. if the outputted zone
> is DNSSEC correct but has 90% less data). Or in other words do I
> still need integrity checking of the zone before and after I submit
> it to the signer.
IMHO, the KASP auditor should only audit what the KASP states - so
garbage in, garbage out.
> And the second question is how configurable will this be ? I can
> imagine there are zone specific checks you want performed (this
> record should be in there). Or is this out of scope ?
I think this is out of scope.
> 8. Performance
> I think this does indeed need more specification, and I think the
> current requirement is quite low.
> I don't know how this will impact the one large zone versus lot's of
> small zones, or how that performance changes when increments are
> signed later, or do we think about that in a next stage ?
parts of the performance is depending on what HSM is used, but also
how scheduling is done. I think we need to revisit this after the
first version is released.
> Shouldn't we have similar performance figures for integrity
> checking ? (The more you check, the longer it takes).
yes, probably.
jakob
--
Jakob Schlyter
Kirei AB - www.kirei.se
More information about the Opendnssec-develop
mailing list