Internet-Draft | EFAS | February 2025 |
Pan | Expires 27 August 2025 | [Page] |
This document describes about a compact DNSSEC scheme for resource-limited second-level domain (SLD), which is focused on NS RR.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 27 August 2025.¶
Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
DNSSEC has low adoption rate on SLD [SadDNSSEC].¶
The operation burden of fullzone DNSSEC deployment is heavy.¶
DNS random subdomain attacks and amplification attacks are commonly used distributed denial-of-service (DDoS) attacks. The DDoS amplification power of the authoritative server of SLD will be larger after deploying DNSSEC [AmpDNSSEC].¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].¶
Basic terms used in this specification are defined in the documents [RFC1034], [RFC1035], [RFC8499].¶
To encourge the DNSSEC deployment on resource-limited SLD, it is resonable to give it a compact DNSSEC deployment scheme.¶
Resource-limited SLD should publish these DNSSEC records:¶
the delegation signer (DS) record on TLD.¶
the DNSKEY records.¶
the RRSIGs for NS/A/AAAA/CNAME/TLSA records associated with NS.¶
Resource-limited SLD doesn't publish other DNSSEC records on other subdomains.¶
Resource-limited SLD doesn't deploy NSEC/NSEC3.¶
For example:¶
example.com. 345600 IN NS ns1.example.com. example.com. 345600 IN NS ns2.example.com. ns1.example.com. 345600 IN A 11.22.33.44 ns1.example.com. 345600 IN AAAA ::11.22.33.44 ns2.example.com. 345600 IN A 55.66.77.88 ns2.example.com. 345600 IN AAAA ::55.66.77.88 _853._tcp.ns1.example.com. 3600 IN TLSA ( 3 1 1 63cbfcafa3284cc46b1676a99dbc09d8acadf9050cf876de79ac1e5776bbd364 ) _853._udp.ns1.example.com. 3600 IN TLSA ( 3 1 1 63cbfcafa3284cc46b1676a99dbc09d8acadf9050cf876de79ac1e5776bbd364 ) _853._tcp.ns2.example.com. 3600 IN TLSA ( 3 1 1 63cbfcafa3284cc46b1676a99dbc09d8acadf9050cf876de79ac1e5776bbd364 ) _853._udp.ns2.example.com. 3600 IN TLSA ( 3 1 1 63cbfcafa3284cc46b1676a99dbc09d8acadf9050cf876de79ac1e5776bbd364 )¶
Therefore, the zone file size of the compact DNSSEC scheme is approximate with plain-text DNS, with few RRSIGs.¶
The recursive resolver validates the DNSSEC trust chain (Root -> TLD -> SLD), and gains the trustworthy A/AAAA records of the NS records of the SLD.¶
The trustworthy A/AAAA records are the IP addresses of the authoritative server of the resource-limited SLD.¶
The compact DNSSEC scheme does not cover the entire zone and does not deploy NSEC/NSEC3.¶