ICANN ICANN Email List Archives

[comments-root-ksk-06aug15]


<<< Chronological Index >>>    <<< Thread Index >>>

APNIC Labs comments to the KSK rollover plan.

  • To: <comments-root-ksk-06aug15@xxxxxxxxx>
  • Subject: APNIC Labs comments to the KSK rollover plan.
  • From: George Michaelson <ggm@xxxxxxxxx>
  • Date: Tue, 1 Sep 2015 09:40:45 -0300

Firstly, APNIC Labs would like to commend all those involved in the
preparation of
this draft report for their careful consideration of this topic, and for
the clear and well informed presentation of material in the report. We also
appreciate the opportunity through this public comment process to review
this activity. In consideration of this document, we would like to make the
following comments:

1) Timing of the KSK roll.

   The report contains no substantial technical justification as to why a
   key roll must be performed at this point in time. Noting other concerns
   expressed below, principally the uncertainty surrounding RFC5011
   support, and also noting the lack of concrete measurement activities
   during the critical stages of key roll,and the lack of any feedback from
   measurement to inform whether to proceed with critical or irrevocable
   steps in the rollover (such as the switch from old to new signing key,
   and revocation of the old key) it is surprising that the only
   justification for performing a KSK roll at this point in time is
   essentially based on the observation that the Root Zone managers made a
   commitment in 2010 that they would do so.  The report clarifies that
   there is no evident loss of integrity in the current key pair, nor is
   this potential loss of key integrity anticipated to be an operational
   risk for some considerable time, according to the analysis in the
   report. This begs the question: “Why roll now?" The only justification
   provided in the report is a risk analysis table which notes a risk of
   loss of trust in process if a key roll is not performed. There are clear
   risks associated with performing the  key roll which are considered, but
   not quantified. If the key roll is delayed that there is the
   unquantified risk of loss of trust in key management process, but
   against that the delay allows additional time to mitigate the service
   disruption risks to some extent. It would be helpful if the report
   explored the consequences of deferring the key roll, including the
   issues of the potential for key compromise and the possibility of
   increased level of deployment of DNS resolver code that is aware of, and
   capable of following a key roll as signalled according to RFC 5011, as
   noted in the following comment.

2) RFC5011 Capability Signalling

   Although it is understood that no active signalling of RFC5011
   capability currently exists, it is possible that we could delay a
   planned KSK roll long enough to deploy DNS code changes that not only
   enable a greater proportion of resolvers to be able to track a key roll
   through RFC5011 signalling, but to signal their capability to do so.
   Measuring both the rate of deployment of this DNS signalling capability,
   and the proportion of clients using RFC5011 capable resolver services
   would materially inform this space. We would like to see the report
   consider such options as an alternative to an immediate action to roll
   the key.

3) Measurements and Reporting

   The report identifies two critical phases in the KSK rollover: The
   addition of new keys (increase in packet size), and the loss of the
   original key (potential loss of DNSSEC from failure to update the TA to
   the new keyset). However, the report carries only a weak reference to
   any measurements that may be conducted during these critical phases.
   This is insufficient in our view, and we would like to see the use of
   stronger language that requires the root zone management partners to
   facilitate various forms of active measurement through the  keyroll
   process, so that each stage can be understood for its actual damage
   consequences, to direct any reverse or delay decisions from the evidence
   gathered.

4) Algorithm Agility

   The report’s language around the potential for algorithm change is
   unclear. There appears to be a strong bias to retention of RSA as the
   KSK algorithm, despite evidence that ECDSA is both shorter and
   potentially faster to compute. Whilst the document argues for a reduced
   risk of large packets, it doesn’t clearly explain why larger RSA-based
   DNS response payloads would be preferable to smaller ECDSA DNS response
   payloads.

The report appears to assume certain immutable factors in the key roll
process, and we would like to understand why these are immutable. These
include:

5) Scheduling and Operational Tasks

   The report notes as a constraint that a key roll must be aligned with
   existing Quarter and 10-day periods used in existing processes. This has
   the potential consequence of scheduling the critical change in the root
   zone on a weekend, or on a major public holiday. For a transition as
   critical as the roll of the root zone KSK it would be reasonable to see
   the report canvas options that would ensure that the critical transition
   events happen when there is a high likelihood of operational support
   infrastructure in place for users. This rigid adherence to a calendar
   irrespective of operational support considerations appears to be an
   inappropriate prioritisation of environmental considerations.

6) KSK-signed sentinels

   The report considers a staged deployment of the KSK roll, and dismisses
   this approach as being ineffectual in terms of mitigation of risks to
   DNS service. However the report does not consider using the incoming KSK
   in other ways. For example it could be envisaged that the roll process
   could use the incoming KSK to sign some sentinel record in the root
   zone, or even in a lower point in the DNS name hierarchy during the
   initial publication process, thereby allowing measurement of the extent
   to which resolvers are able to use the KSK as a trust anchor to validate
   the sentinel record. It would be helpful to understand why such
   potentially measurable actions were not included in the proposed key
   roll process.

7) Serialized Key Rolls

   Why is the process serialised to the introduction of a single candidate
   new key value? What are the issues involved in staging multiple incoming
   keys? Was this considered by the design team?

8) Key Overlap

   The envisaged process performs a state flip from using the old key to
   sign the ZSK and the new key to using the new key to sign the ZSK and
   removing the old key completely. Why is there not a period of overlap
   where the ZSK is signed by both the new and old KSKs, as is the case in
   a more conventional model of a key roll. Combined with some form of
   sentinel or staged deployment this would allow the key roll to follow a
   more conventional process of prime resolvers with an announcement of a
   new key, then introduce use, test and measure in parallel with the old
   key, then commit to the change by removing the old key. The process
   described in the document appears to simply shift from the announcement
   to the commitment.


<<< Chronological Index >>>    <<< Thread Index >>>

Privacy Policy | Terms of Service | Cookies Policy