Internet-Draft EFAS February 2025
Pan Expires 27 August 2025 [Page]
Workgroup:
dnsop
Internet-Draft:
draft-pan-dnsop-compact-dnssec-00
Published:
Intended Status:
Informational
Expires:
Author:
L. Pan

Compact DNSSEC

Abstract

This document describes about a compact DNSSEC scheme for resource-limited second-level domain (SLD), which is focused on NS RR.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 27 August 2025.

Table of Contents

1. Background

DNSSEC has low adoption rate on SLD [SadDNSSEC].

The operation burden of fullzone DNSSEC deployment is heavy.

DNS random subdomain attacks and amplification attacks are commonly used distributed denial-of-service (DDoS) attacks. The DDoS amplification power of the authoritative server of SLD will be larger after deploying DNSSEC [AmpDNSSEC].

2. Terminology

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].

Basic terms used in this specification are defined in the documents [RFC1034], [RFC1035], [RFC8499].

3. Compact DNSSEC Scheme

To encourge the DNSSEC deployment on resource-limited SLD, it is resonable to give it a compact DNSSEC deployment scheme.

3.1. The Resource-limited SLD Publishes Compact DNSSEC Records

Resource-limited SLD should publish these DNSSEC records:

  • the delegation signer (DS) record on TLD.

  • the DNSKEY records.

  • the RRSIGs for NS/A/AAAA/CNAME/TLSA records associated with NS.

Resource-limited SLD doesn't publish other DNSSEC records on other subdomains.

Resource-limited SLD doesn't deploy NSEC/NSEC3.

For example:

    example.com. 345600 IN NS ns1.example.com.
    example.com. 345600 IN NS ns2.example.com.
    ns1.example.com. 345600 IN A 11.22.33.44
    ns1.example.com. 345600 IN AAAA ::11.22.33.44
    ns2.example.com. 345600 IN A 55.66.77.88
    ns2.example.com. 345600 IN AAAA ::55.66.77.88
    _853._tcp.ns1.example.com. 3600 IN TLSA ( 3 1 1
      63cbfcafa3284cc46b1676a99dbc09d8acadf9050cf876de79ac1e5776bbd364 )
    _853._udp.ns1.example.com. 3600 IN TLSA ( 3 1 1
      63cbfcafa3284cc46b1676a99dbc09d8acadf9050cf876de79ac1e5776bbd364 )
    _853._tcp.ns2.example.com. 3600 IN TLSA ( 3 1 1
      63cbfcafa3284cc46b1676a99dbc09d8acadf9050cf876de79ac1e5776bbd364 )
    _853._udp.ns2.example.com. 3600 IN TLSA ( 3 1 1
      63cbfcafa3284cc46b1676a99dbc09d8acadf9050cf876de79ac1e5776bbd364 )

Therefore, the zone file size of the compact DNSSEC scheme is approximate with plain-text DNS, with few RRSIGs.

4. The Authoritative Server of Resource-limited SLD Deploys Secure Service

[RFC7858] and [RFC9250] defined the encrypted DoT/DoQ service for client-to-recursive.

[RFC9539] discussed the extended deployment of encrypted recursive-to-authoritative DNS.

The authoritative server of resource-limited SLD deploys the DoQ/DoT service with self-signed PKI cerificate with TLS connection.

An alternative secure channel solution is [DNSCurve], embeded the raw public key into the NS records.

5. The Recursive Resolver Validates The Compact DNSSEC Records

The recursive resolver validates the DNSSEC trust chain (Root -> TLD -> SLD), and gains the trustworthy A/AAAA records of the NS records of the SLD.

The trustworthy A/AAAA records are the IP addresses of the authoritative server of the resource-limited SLD.

6. Setup Secure Channel for Recursive-to-Authoritative

The Recursive Resolver setup secure DoQ/DoT channel with the authoritative server of the resource-limited SLD:

7. Security Considerations

The compact DNSSEC scheme does not cover the entire zone and does not deploy NSEC/NSEC3.

8. References

8.1. Normative References

[RFC1034]
Mockapetris, P., "Domain names - concepts and facilities", STD 13, RFC 1034, DOI 10.17487/RFC1034, , <https://www.rfc-editor.org/info/rfc1034>.
[RFC1035]
Mockapetris, P., "Domain names - implementation and specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, , <https://www.rfc-editor.org/info/rfc1035>.
[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/info/rfc2119>.
[RFC7858]
Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., and P. Hoffman, "Specification for DNS over Transport Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, , <https://www.rfc-editor.org/info/rfc7858>.
[RFC8499]
Hoffman, P., Sullivan, A., and K. Fujiwara, "DNS Terminology", RFC 8499, DOI 10.17487/RFC8499, , <https://www.rfc-editor.org/info/rfc8499>.
[RFC9250]
Huitema, C., Dickinson, S., and A. Mankin, "DNS over Dedicated QUIC Connections", RFC 9250, DOI 10.17487/RFC9250, , <https://www.rfc-editor.org/info/rfc9250>.
[RFC9539]
Gillmor, D. K., Ed., Salazar, J., Ed., and P. Hoffman, Ed., "Unilateral Opportunistic Deployment of Encrypted Recursive-to-Authoritative DNS", RFC 9539, DOI 10.17487/RFC9539, , <https://www.rfc-editor.org/info/rfc9539>.

8.2. Informative References

[AmpDNSSEC]
Nexusguard, "DNSSEC fuels new wave of dns amplification.", n.d., <https://www.nexusguard.com/blog/dnssec-fuels-new-wave-of-dns-amplification>.
[DNSCurve]
J., B. D., "DNSCurve", n.d., <https://dnscurve.org/>.
[SadDNSSEC]
J., E. A. and M., "The Sad Story of DNSSEC", n.d., <https://alexkelliott.github.io/dnssec/TheSadStoryOfDNSSEC.pdf>.

Author's Address

Lanlan Pan
Guangdong
China