841 lines
31 KiB
Plaintext
841 lines
31 KiB
Plaintext
|
|
|||
|
|
|||
|
|
|||
|
Network Working Group S. Josefsson
|
|||
|
Internet-Draft August 30, 2005
|
|||
|
Expires: March 3, 2006
|
|||
|
|
|||
|
|
|||
|
Storing Certificates in the Domain Name System (DNS)
|
|||
|
draft-ietf-dnsext-rfc2538bis-04
|
|||
|
|
|||
|
Status of this Memo
|
|||
|
|
|||
|
By submitting this Internet-Draft, each author represents that any
|
|||
|
applicable patent or other IPR claims of which he or she is aware
|
|||
|
have been or will be disclosed, and any of which he or she becomes
|
|||
|
aware will be disclosed, in accordance with Section 6 of BCP 79.
|
|||
|
|
|||
|
Internet-Drafts are working documents of the Internet Engineering
|
|||
|
Task Force (IETF), its areas, and its working groups. Note that
|
|||
|
other groups may also distribute working documents as Internet-
|
|||
|
Drafts.
|
|||
|
|
|||
|
Internet-Drafts are draft documents valid for a maximum of six months
|
|||
|
and may be updated, replaced, or obsoleted by other documents at any
|
|||
|
time. It is inappropriate to use Internet-Drafts as reference
|
|||
|
material or to cite them other than as "work in progress."
|
|||
|
|
|||
|
The list of current Internet-Drafts can be accessed at
|
|||
|
http://www.ietf.org/ietf/1id-abstracts.txt.
|
|||
|
|
|||
|
The list of Internet-Draft Shadow Directories can be accessed at
|
|||
|
http://www.ietf.org/shadow.html.
|
|||
|
|
|||
|
This Internet-Draft will expire on March 3, 2006.
|
|||
|
|
|||
|
Copyright Notice
|
|||
|
|
|||
|
Copyright (C) The Internet Society (2005).
|
|||
|
|
|||
|
Abstract
|
|||
|
|
|||
|
Cryptographic public keys are frequently published and their
|
|||
|
authenticity demonstrated by certificates. A CERT resource record
|
|||
|
(RR) is defined so that such certificates and related certificate
|
|||
|
revocation lists can be stored in the Domain Name System (DNS).
|
|||
|
|
|||
|
This document obsoletes RFC 2538.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Josefsson Expires March 3, 2006 [Page 1]
|
|||
|
|
|||
|
Internet-Draft Storing Certificates in the DNS August 2005
|
|||
|
|
|||
|
|
|||
|
Table of Contents
|
|||
|
|
|||
|
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
|
|||
|
2. The CERT Resource Record . . . . . . . . . . . . . . . . . . . 3
|
|||
|
2.1. Certificate Type Values . . . . . . . . . . . . . . . . . 4
|
|||
|
2.2. Text Representation of CERT RRs . . . . . . . . . . . . . 5
|
|||
|
2.3. X.509 OIDs . . . . . . . . . . . . . . . . . . . . . . . . 6
|
|||
|
3. Appropriate Owner Names for CERT RRs . . . . . . . . . . . . . 6
|
|||
|
3.1. Content-based X.509 CERT RR Names . . . . . . . . . . . . 7
|
|||
|
3.2. Purpose-based X.509 CERT RR Names . . . . . . . . . . . . 8
|
|||
|
3.3. Content-based OpenPGP CERT RR Names . . . . . . . . . . . 9
|
|||
|
3.4. Purpose-based OpenPGP CERT RR Names . . . . . . . . . . . 9
|
|||
|
3.5. Owner names for IPKIX, ISPKI, and IPGP . . . . . . . . . . 9
|
|||
|
4. Performance Considerations . . . . . . . . . . . . . . . . . . 10
|
|||
|
5. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 10
|
|||
|
6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 10
|
|||
|
7. Security Considerations . . . . . . . . . . . . . . . . . . . 10
|
|||
|
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11
|
|||
|
9. Changes since RFC 2538 . . . . . . . . . . . . . . . . . . . . 11
|
|||
|
Appendix A. Copying conditions . . . . . . . . . . . . . . . . . 12
|
|||
|
10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 12
|
|||
|
10.1. Normative References . . . . . . . . . . . . . . . . . . . 12
|
|||
|
10.2. Informative References . . . . . . . . . . . . . . . . . . 13
|
|||
|
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 14
|
|||
|
Intellectual Property and Copyright Statements . . . . . . . . . . 15
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Josefsson Expires March 3, 2006 [Page 2]
|
|||
|
|
|||
|
Internet-Draft Storing Certificates in the DNS August 2005
|
|||
|
|
|||
|
|
|||
|
1. Introduction
|
|||
|
|
|||
|
Public keys are frequently published in the form of a certificate and
|
|||
|
their authenticity is commonly demonstrated by certificates and
|
|||
|
related certificate revocation lists (CRLs). A certificate is a
|
|||
|
binding, through a cryptographic digital signature, of a public key,
|
|||
|
a validity interval and/or conditions, and identity, authorization,
|
|||
|
or other information. A certificate revocation list is a list of
|
|||
|
certificates that are revoked, and incidental information, all signed
|
|||
|
by the signer (issuer) of the revoked certificates. Examples are
|
|||
|
X.509 certificates/CRLs in the X.500 directory system or OpenPGP
|
|||
|
certificates/revocations used by OpenPGP software.
|
|||
|
|
|||
|
Section 2 below specifies a CERT resource record (RR) for the storage
|
|||
|
of certificates in the Domain Name System [1] [2].
|
|||
|
|
|||
|
Section 3 discusses appropriate owner names for CERT RRs.
|
|||
|
|
|||
|
Sections 4, 5, and 6 below cover performance, IANA, and security
|
|||
|
considerations, respectively.
|
|||
|
|
|||
|
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
|||
|
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
|||
|
document are to be interpreted as described in [3].
|
|||
|
|
|||
|
|
|||
|
2. The CERT Resource Record
|
|||
|
|
|||
|
The CERT resource record (RR) has the structure given below. Its RR
|
|||
|
type code is 37.
|
|||
|
|
|||
|
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
|
|||
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|||
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|||
|
| type | key tag |
|
|||
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|||
|
| algorithm | /
|
|||
|
+---------------+ certificate or CRL /
|
|||
|
/ /
|
|||
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|
|
|||
|
|
|||
|
The type field is the certificate type as defined in section 2.1
|
|||
|
below.
|
|||
|
|
|||
|
The key tag field is the 16 bit value computed for the key embedded
|
|||
|
in the certificate, using the RRSIG Key Tag algorithm described in
|
|||
|
Appendix B of [10]. This field is used as an efficiency measure to
|
|||
|
pick which CERT RRs may be applicable to a particular key. The key
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Josefsson Expires March 3, 2006 [Page 3]
|
|||
|
|
|||
|
Internet-Draft Storing Certificates in the DNS August 2005
|
|||
|
|
|||
|
|
|||
|
tag can be calculated for the key in question and then only CERT RRs
|
|||
|
with the same key tag need be examined. However, the key must always
|
|||
|
be transformed to the format it would have as the public key portion
|
|||
|
of a DNSKEY RR before the key tag is computed. This is only possible
|
|||
|
if the key is applicable to an algorithm (and limits such as key size
|
|||
|
limits) defined for DNS security. If it is not, the algorithm field
|
|||
|
MUST BE zero and the tag field is meaningless and SHOULD BE zero.
|
|||
|
|
|||
|
The algorithm field has the same meaning as the algorithm field in
|
|||
|
DNSKEY and RRSIG RRs [10], except that a zero algorithm field
|
|||
|
indicates the algorithm is unknown to a secure DNS, which may simply
|
|||
|
be the result of the algorithm not having been standardized for
|
|||
|
DNSSEC.
|
|||
|
|
|||
|
2.1. Certificate Type Values
|
|||
|
|
|||
|
The following values are defined or reserved:
|
|||
|
|
|||
|
Value Mnemonic Certificate Type
|
|||
|
----- -------- ----------------
|
|||
|
0 reserved
|
|||
|
1 PKIX X.509 as per PKIX
|
|||
|
2 SPKI SPKI certificate
|
|||
|
3 PGP OpenPGP packet
|
|||
|
4 IPKIX The URL of an X.509 data object
|
|||
|
5 ISPKI The URL of an SPKI certificate
|
|||
|
6 IPGP The URL of an OpenPGP packet
|
|||
|
7-252 available for IANA assignment
|
|||
|
253 URI URI private
|
|||
|
254 OID OID private
|
|||
|
255-65534 available for IANA assignment
|
|||
|
65535 reserved
|
|||
|
|
|||
|
The PKIX type is reserved to indicate an X.509 certificate conforming
|
|||
|
to the profile being defined by the IETF PKIX working group. The
|
|||
|
certificate section will start with a one-byte unsigned OID length
|
|||
|
and then an X.500 OID indicating the nature of the remainder of the
|
|||
|
certificate section (see 2.3 below). (NOTE: X.509 certificates do
|
|||
|
not include their X.500 directory type designating OID as a prefix.)
|
|||
|
|
|||
|
The SPKI type is reserved to indicate the SPKI certificate format
|
|||
|
[13], for use when the SPKI documents are moved from experimental
|
|||
|
status.
|
|||
|
|
|||
|
The PGP type indicates an OpenPGP packet as described in [6] and its
|
|||
|
extensions and successors. Two uses are to transfer public key
|
|||
|
material and revocation signatures. The data is binary, and MUST NOT
|
|||
|
be encoded into an ASCII armor. An implementation SHOULD process
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Josefsson Expires March 3, 2006 [Page 4]
|
|||
|
|
|||
|
Internet-Draft Storing Certificates in the DNS August 2005
|
|||
|
|
|||
|
|
|||
|
transferable public keys as described in section 10.1 of [6], but it
|
|||
|
MAY handle additional OpenPGP packets.
|
|||
|
|
|||
|
The IPKIX, ISPKI and IPGP types indicate a URL which will serve the
|
|||
|
content that would have been in the "certificate, CRL or URL" field
|
|||
|
of the corresponding (PKIX, SPKI or PGP) packet types. These types
|
|||
|
are known as "indirect". These packet types MUST be used when the
|
|||
|
content is too large to fit in the CERT RR, and MAY be used at the
|
|||
|
implementer's discretion. They SHOULD NOT be used where the entire
|
|||
|
UDP packet would have fit in 512 bytes.
|
|||
|
|
|||
|
The URI private type indicates a certificate format defined by an
|
|||
|
absolute URI. The certificate portion of the CERT RR MUST begin with
|
|||
|
a null terminated URI [5] and the data after the null is the private
|
|||
|
format certificate itself. The URI SHOULD be such that a retrieval
|
|||
|
from it will lead to documentation on the format of the certificate.
|
|||
|
Recognition of private certificate types need not be based on URI
|
|||
|
equality but can use various forms of pattern matching so that, for
|
|||
|
example, subtype or version information can also be encoded into the
|
|||
|
URI.
|
|||
|
|
|||
|
The OID private type indicates a private format certificate specified
|
|||
|
by an ISO OID prefix. The certificate section will start with a one-
|
|||
|
byte unsigned OID length and then a BER encoded OID indicating the
|
|||
|
nature of the remainder of the certificate section. This can be an
|
|||
|
X.509 certificate format or some other format. X.509 certificates
|
|||
|
that conform to the IETF PKIX profile SHOULD be indicated by the PKIX
|
|||
|
type, not the OID private type. Recognition of private certificate
|
|||
|
types need not be based on OID equality but can use various forms of
|
|||
|
pattern matching such as OID prefix.
|
|||
|
|
|||
|
2.2. Text Representation of CERT RRs
|
|||
|
|
|||
|
The RDATA portion of a CERT RR has the type field as an unsigned
|
|||
|
decimal integer or as a mnemonic symbol as listed in section 2.1
|
|||
|
above.
|
|||
|
|
|||
|
The key tag field is represented as an unsigned decimal integer.
|
|||
|
|
|||
|
The algorithm field is represented as an unsigned decimal integer or
|
|||
|
a mnemonic symbol as listed in [10].
|
|||
|
|
|||
|
The certificate / CRL portion is represented in base 64 [14] and may
|
|||
|
be divided up into any number of white space separated substrings,
|
|||
|
down to single base 64 digits, which are concatenated to obtain the
|
|||
|
full signature. These substrings can span lines using the standard
|
|||
|
parenthesis.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Josefsson Expires March 3, 2006 [Page 5]
|
|||
|
|
|||
|
Internet-Draft Storing Certificates in the DNS August 2005
|
|||
|
|
|||
|
|
|||
|
Note that the certificate / CRL portion may have internal sub-fields,
|
|||
|
but these do not appear in the master file representation. For
|
|||
|
example, with type 254, there will be an OID size, an OID, and then
|
|||
|
the certificate / CRL proper. But only a single logical base 64
|
|||
|
string will appear in the text representation.
|
|||
|
|
|||
|
2.3. X.509 OIDs
|
|||
|
|
|||
|
OIDs have been defined in connection with the X.500 directory for
|
|||
|
user certificates, certification authority certificates, revocations
|
|||
|
of certification authority, and revocations of user certificates.
|
|||
|
The following table lists the OIDs, their BER encoding, and their
|
|||
|
length-prefixed hex format for use in CERT RRs:
|
|||
|
|
|||
|
id-at-userCertificate
|
|||
|
= { joint-iso-ccitt(2) ds(5) at(4) 36 }
|
|||
|
== 0x 03 55 04 24
|
|||
|
id-at-cACertificate
|
|||
|
= { joint-iso-ccitt(2) ds(5) at(4) 37 }
|
|||
|
== 0x 03 55 04 25
|
|||
|
id-at-authorityRevocationList
|
|||
|
= { joint-iso-ccitt(2) ds(5) at(4) 38 }
|
|||
|
== 0x 03 55 04 26
|
|||
|
id-at-certificateRevocationList
|
|||
|
= { joint-iso-ccitt(2) ds(5) at(4) 39 }
|
|||
|
== 0x 03 55 04 27
|
|||
|
|
|||
|
|
|||
|
3. Appropriate Owner Names for CERT RRs
|
|||
|
|
|||
|
It is recommended that certificate CERT RRs be stored under a domain
|
|||
|
name related to their subject, i.e., the name of the entity intended
|
|||
|
to control the private key corresponding to the public key being
|
|||
|
certified. It is recommended that certificate revocation list CERT
|
|||
|
RRs be stored under a domain name related to their issuer.
|
|||
|
|
|||
|
Following some of the guidelines below may result in the use in DNS
|
|||
|
names of characters that require DNS quoting which is to use a
|
|||
|
backslash followed by the octal representation of the ASCII code for
|
|||
|
the character (e.g., \000 for NULL).
|
|||
|
|
|||
|
The choice of name under which CERT RRs are stored is important to
|
|||
|
clients that perform CERT queries. In some situations, the clients
|
|||
|
may not know all information about the CERT RR object it wishes to
|
|||
|
retrieve. For example, a client may not know the subject name of an
|
|||
|
X.509 certificate, or the e-mail address of the owner of an OpenPGP
|
|||
|
key. Further, the client might only know the hostname of a service
|
|||
|
that uses X.509 certificates or the Key ID of an OpenPGP key.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Josefsson Expires March 3, 2006 [Page 6]
|
|||
|
|
|||
|
Internet-Draft Storing Certificates in the DNS August 2005
|
|||
|
|
|||
|
|
|||
|
Therefore, two owner name guidelines are defined: content-based owner
|
|||
|
names and purpose-based owner names. A content-based owner name is
|
|||
|
derived from the content of the CERT RR data; for example, the
|
|||
|
Subject field in an X.509 certificate or the User ID field in OpenPGP
|
|||
|
keys. A purpose-based owner name is a name that a client retrieving
|
|||
|
CERT RRs MUST already know; for example, the host name of an X.509
|
|||
|
protected service or the Key ID of an OpenPGP key. The content-based
|
|||
|
and purpose-based owner name MAY be the same; for example, when a
|
|||
|
client looks up a key based on the From: address of an incoming
|
|||
|
e-mail.
|
|||
|
|
|||
|
Implementations SHOULD use the purpose-based owner name guidelines
|
|||
|
described in this document, and MAY use CNAMEs of content-based owner
|
|||
|
names (or other names), pointing to the purpose-based owner name.
|
|||
|
|
|||
|
3.1. Content-based X.509 CERT RR Names
|
|||
|
|
|||
|
Some X.509 versions permit multiple names to be associated with
|
|||
|
subjects and issuers under "Subject Alternate Name" and "Issuer
|
|||
|
Alternate Name". For example, X.509v3 has such Alternate Names with
|
|||
|
an ASN.1 specification as follows:
|
|||
|
|
|||
|
GeneralName ::= CHOICE {
|
|||
|
otherName [0] INSTANCE OF OTHER-NAME,
|
|||
|
rfc822Name [1] IA5String,
|
|||
|
dNSName [2] IA5String,
|
|||
|
x400Address [3] EXPLICIT OR-ADDRESS.&Type,
|
|||
|
directoryName [4] EXPLICIT Name,
|
|||
|
ediPartyName [5] EDIPartyName,
|
|||
|
uniformResourceIdentifier [6] IA5String,
|
|||
|
iPAddress [7] OCTET STRING,
|
|||
|
registeredID [8] OBJECT IDENTIFIER
|
|||
|
}
|
|||
|
|
|||
|
The recommended locations of CERT storage are as follows, in priority
|
|||
|
order:
|
|||
|
1. If a domain name is included in the identification in the
|
|||
|
certificate or CRL, that should be used.
|
|||
|
2. If a domain name is not included but an IP address is included,
|
|||
|
then the translation of that IP address into the appropriate
|
|||
|
inverse domain name should be used.
|
|||
|
3. If neither of the above is used, but a URI containing a domain
|
|||
|
name is present, that domain name should be used.
|
|||
|
4. If none of the above is included but a character string name is
|
|||
|
included, then it should be treated as described for OpenPGP
|
|||
|
names below.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Josefsson Expires March 3, 2006 [Page 7]
|
|||
|
|
|||
|
Internet-Draft Storing Certificates in the DNS August 2005
|
|||
|
|
|||
|
|
|||
|
5. If none of the above apply, then the distinguished name (DN)
|
|||
|
should be mapped into a domain name as specified in [4].
|
|||
|
|
|||
|
Example 1: An X.509v3 certificate is issued to /CN=John Doe /DC=Doe/
|
|||
|
DC=com/DC=xy/O=Doe Inc/C=XY/ with Subject Alternative Names of (a)
|
|||
|
string "John (the Man) Doe", (b) domain name john-doe.com, and (c)
|
|||
|
uri <https://www.secure.john-doe.com:8080/>. The storage locations
|
|||
|
recommended, in priority order, would be
|
|||
|
1. john-doe.com,
|
|||
|
2. www.secure.john-doe.com, and
|
|||
|
3. Doe.com.xy.
|
|||
|
|
|||
|
Example 2: An X.509v3 certificate is issued to /CN=James Hacker/
|
|||
|
L=Basingstoke/O=Widget Inc/C=GB/ with Subject Alternate names of (a)
|
|||
|
domain name widget.foo.example, (b) IPv4 address 10.251.13.201, and
|
|||
|
(c) string "James Hacker <hacker@mail.widget.foo.example>". The
|
|||
|
storage locations recommended, in priority order, would be
|
|||
|
1. widget.foo.example,
|
|||
|
2. 201.13.251.10.in-addr.arpa, and
|
|||
|
3. hacker.mail.widget.foo.example.
|
|||
|
|
|||
|
3.2. Purpose-based X.509 CERT RR Names
|
|||
|
|
|||
|
Due to the difficulty for clients that do not already possess a
|
|||
|
certificate to reconstruct the content-based owner name, purpose-
|
|||
|
based owner names are recommended in this section. Recommendations
|
|||
|
for purpose-based owner names vary per scenario. The following table
|
|||
|
summarizes the purpose-based X.509 CERT RR owner name guidelines for
|
|||
|
use with S/MIME [16], SSL/TLS [11], and IPSEC [12]:
|
|||
|
|
|||
|
Scenario Owner name
|
|||
|
------------------ ----------------------------------------------
|
|||
|
S/MIME Certificate Standard translation of an RFC 2822 email
|
|||
|
address. Example: An S/MIME certificate for
|
|||
|
"postmaster@example.org" will use a standard
|
|||
|
hostname translation of the owner name,
|
|||
|
"postmaster.example.org".
|
|||
|
|
|||
|
TLS Certificate Hostname of the TLS server.
|
|||
|
|
|||
|
IPSEC Certificate Hostname of the IPSEC machine and/or, for IPv4
|
|||
|
or IPv6 addresses, the fully qualified domain
|
|||
|
name in the appropriate reverse domain.
|
|||
|
|
|||
|
An alternate approach for IPSEC is to store raw public keys [15].
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Josefsson Expires March 3, 2006 [Page 8]
|
|||
|
|
|||
|
Internet-Draft Storing Certificates in the DNS August 2005
|
|||
|
|
|||
|
|
|||
|
3.3. Content-based OpenPGP CERT RR Names
|
|||
|
|
|||
|
OpenPGP signed keys (certificates) use a general character string
|
|||
|
User ID [6]. However, it is recommended by OpenPGP that such names
|
|||
|
include the RFC 2822 [8] email address of the party, as in "Leslie
|
|||
|
Example <Leslie@host.example>". If such a format is used, the CERT
|
|||
|
should be under the standard translation of the email address into a
|
|||
|
domain name, which would be leslie.host.example in this case. If no
|
|||
|
RFC 2822 name can be extracted from the string name, no specific
|
|||
|
domain name is recommended.
|
|||
|
|
|||
|
If a user has more than one email address, the CNAME type can be used
|
|||
|
to reduce the amount of data stored in the DNS. Example:
|
|||
|
|
|||
|
$ORIGIN example.org.
|
|||
|
smith IN CERT PGP 0 0 <OpenPGP binary>
|
|||
|
john.smith IN CNAME smith
|
|||
|
js IN CNAME smith
|
|||
|
|
|||
|
3.4. Purpose-based OpenPGP CERT RR Names
|
|||
|
|
|||
|
Applications that receive an OpenPGP packet containing encrypted or
|
|||
|
signed data but do not know the email address of the sender will have
|
|||
|
difficulties constructing the correct owner name and cannot use the
|
|||
|
content-based owner name guidelines. However, these clients commonly
|
|||
|
know the key fingerprint or the Key ID. The key ID is found in
|
|||
|
OpenPGP packets, and the key fingerprint is commonly found in
|
|||
|
auxilliary data that may be available. In this case, use of an owner
|
|||
|
name identical to the key fingerprint and the key ID expressed in
|
|||
|
hexadecimal [14] is recommended. Example:
|
|||
|
|
|||
|
$ORIGIN example.org.
|
|||
|
0424D4EE81A0E3D119C6F835EDA21E94B565716F IN CERT PGP ...
|
|||
|
F835EDA21E94B565716F IN CERT PGP ...
|
|||
|
B565716F IN CERT PGP ...
|
|||
|
|
|||
|
If the same key material is stored for several owner names, the use
|
|||
|
of CNAME may be used to avoid data duplication. Note that CNAME is
|
|||
|
not always applicable, because it maps one owner name to the other
|
|||
|
for all purposes, which may be sub-optimal when two keys with the
|
|||
|
same Key ID are stored.
|
|||
|
|
|||
|
3.5. Owner names for IPKIX, ISPKI, and IPGP
|
|||
|
|
|||
|
These types are stored under the same owner names, both purpose- and
|
|||
|
content-based, as the PKIX, SPKI and PGP types.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Josefsson Expires March 3, 2006 [Page 9]
|
|||
|
|
|||
|
Internet-Draft Storing Certificates in the DNS August 2005
|
|||
|
|
|||
|
|
|||
|
4. Performance Considerations
|
|||
|
|
|||
|
Current Domain Name System (DNS) implementations are optimized for
|
|||
|
small transfers, typically not more than 512 bytes including
|
|||
|
overhead. While larger transfers will perform correctly and work is
|
|||
|
underway to make larger transfers more efficient, it is still
|
|||
|
advisable at this time to make every reasonable effort to minimize
|
|||
|
the size of certificates stored within the DNS. Steps that can be
|
|||
|
taken may include using the fewest possible optional or extension
|
|||
|
fields and using short field values for necessary variable length
|
|||
|
fields.
|
|||
|
|
|||
|
The RDATA field in the DNS protocol may only hold data of size 65535
|
|||
|
octets (64kb) or less. This means that each CERT RR MUST NOT contain
|
|||
|
more than 64kb of payload, even if the corresponding certificate or
|
|||
|
certificate revocation list is larger. This document addresses this
|
|||
|
by defining "indirect" data types for each normal type.
|
|||
|
|
|||
|
|
|||
|
5. Contributors
|
|||
|
|
|||
|
The majority of this document is copied verbatim from RFC 2538, by
|
|||
|
Donald Eastlake 3rd and Olafur Gudmundsson.
|
|||
|
|
|||
|
|
|||
|
6. Acknowledgements
|
|||
|
|
|||
|
Thanks to David Shaw and Michael Graff for their contributions to
|
|||
|
earlier works that motivated, and served as inspiration for, this
|
|||
|
document.
|
|||
|
|
|||
|
This document was improved by suggestions and comments from Olivier
|
|||
|
Dubuisson, Olaf M. Kolkman, Ben Laurie, Edward Lewis, Jason
|
|||
|
Sloderbeck, Samuel Weiler, and Florian Weimer. No doubt the list is
|
|||
|
incomplete. We apologize to anyone we left out.
|
|||
|
|
|||
|
|
|||
|
7. Security Considerations
|
|||
|
|
|||
|
By definition, certificates contain their own authenticating
|
|||
|
signature. Thus, it is reasonable to store certificates in non-
|
|||
|
secure DNS zones or to retrieve certificates from DNS with DNS
|
|||
|
security checking not implemented or deferred for efficiency. The
|
|||
|
results MAY be trusted if the certificate chain is verified back to a
|
|||
|
known trusted key and this conforms with the user's security policy.
|
|||
|
|
|||
|
Alternatively, if certificates are retrieved from a secure DNS zone
|
|||
|
with DNS security checking enabled and are verified by DNS security,
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Josefsson Expires March 3, 2006 [Page 10]
|
|||
|
|
|||
|
Internet-Draft Storing Certificates in the DNS August 2005
|
|||
|
|
|||
|
|
|||
|
the key within the retrieved certificate MAY be trusted without
|
|||
|
verifying the certificate chain if this conforms with the user's
|
|||
|
security policy.
|
|||
|
|
|||
|
If an organization chooses to issue certificates for it's employees,
|
|||
|
placing CERT RR's in the DNS by owner name, and if DNSSEC (with NSEC)
|
|||
|
is in use, it is possible for someone to enumerate all employees of
|
|||
|
the organization. This is usually not considered desirable, for the
|
|||
|
same reason enterprise phone listings are not often publicly
|
|||
|
published and are even mark confidential.
|
|||
|
|
|||
|
When the URI type is used, it should be understood that it introduces
|
|||
|
an additional indirection that may allow for a new attack vector.
|
|||
|
One method to secure that indirection is to include a hash of the
|
|||
|
certificate in the URI itself.
|
|||
|
|
|||
|
CERT RRs are not used by DNSSEC [9], so there are no security
|
|||
|
considerations related to CERT RRs and securing the DNS itself.
|
|||
|
|
|||
|
If DNSSEC is used, then the non-existence of a CERT RR and,
|
|||
|
consequently, certificates or revocation lists can be securely
|
|||
|
asserted. Without DNSSEC, this is not possible.
|
|||
|
|
|||
|
|
|||
|
8. IANA Considerations
|
|||
|
|
|||
|
Certificate types 0x0000 through 0x00FF and 0xFF00 through 0xFFFF can
|
|||
|
only be assigned by an IETF standards action [7]. This document
|
|||
|
assigns 0x0001 through 0x0006 and 0x00FD and 0x00FE. Certificate
|
|||
|
types 0x0100 through 0xFEFF are assigned through IETF Consensus [7]
|
|||
|
based on RFC documentation of the certificate type. The availability
|
|||
|
of private types under 0x00FD and 0x00FE should satisfy most
|
|||
|
requirements for proprietary or private types.
|
|||
|
|
|||
|
The CERT RR reuses the DNS Security Algorithm Numbers registry. In
|
|||
|
particular, the CERT RR requires that algorithm number 0 remain
|
|||
|
reserved, as described in Section 2. The IANA is directed to
|
|||
|
reference the CERT RR as a user of this registry and value 0, in
|
|||
|
particular.
|
|||
|
|
|||
|
|
|||
|
9. Changes since RFC 2538
|
|||
|
|
|||
|
1. Editorial changes to conform with new document requirements,
|
|||
|
including splitting reference section into two parts and
|
|||
|
updating the references to point at latest versions, and to add
|
|||
|
some additional references.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Josefsson Expires March 3, 2006 [Page 11]
|
|||
|
|
|||
|
Internet-Draft Storing Certificates in the DNS August 2005
|
|||
|
|
|||
|
|
|||
|
2. Improve terminology. For example replace "PGP" with "OpenPGP",
|
|||
|
to align with RFC 2440.
|
|||
|
3. In section 2.1, clarify that OpenPGP public key data are binary,
|
|||
|
not the ASCII armored format, and reference 10.1 in RFC 2440 on
|
|||
|
how to deal with OpenPGP keys, and acknowledge that
|
|||
|
implementations may handle additional packet types.
|
|||
|
4. Clarify that integers in the representation format are decimal.
|
|||
|
5. Replace KEY/SIG with DNSKEY/RRSIG etc, to align with DNSSECbis
|
|||
|
terminology. Improve reference for Key Tag Algorithm
|
|||
|
calculations.
|
|||
|
6. Add examples that suggest use of CNAME to reduce bandwidth.
|
|||
|
7. In section 3, appended the last paragraphs that discuss
|
|||
|
"content-based" vs "purpose-based" owner names. Add section 3.2
|
|||
|
for purpose-based X.509 CERT owner names, and section 3.4 for
|
|||
|
purpose-based OpenPGP CERT owner names.
|
|||
|
8. Added size considerations.
|
|||
|
9. The SPKI types has been reserved, until RFC 2692/2693 is moved
|
|||
|
from the experimental status.
|
|||
|
10. Added indirect types IPKIX, ISPKI, and IPGP.
|
|||
|
|
|||
|
|
|||
|
Appendix A. Copying conditions
|
|||
|
|
|||
|
Regarding the portion of this document that was written by Simon
|
|||
|
Josefsson ("the author", for the remainder of this section), the
|
|||
|
author makes no guarantees and is not responsible for any damage
|
|||
|
resulting from its use. The author grants irrevocable permission to
|
|||
|
anyone to use, modify, and distribute it in any way that does not
|
|||
|
diminish the rights of anyone else to use, modify, and distribute it,
|
|||
|
provided that redistributed derivative works do not contain
|
|||
|
misleading author or version information. Derivative works need not
|
|||
|
be licensed under similar terms.
|
|||
|
|
|||
|
|
|||
|
10. References
|
|||
|
|
|||
|
10.1. Normative References
|
|||
|
|
|||
|
[1] Mockapetris, P., "Domain names - concepts and facilities",
|
|||
|
STD 13, RFC 1034, November 1987.
|
|||
|
|
|||
|
[2] Mockapetris, P., "Domain names - implementation and
|
|||
|
specification", STD 13, RFC 1035, November 1987.
|
|||
|
|
|||
|
[3] Bradner, S., "Key words for use in RFCs to Indicate Requirement
|
|||
|
Levels", BCP 14, RFC 2119, March 1997.
|
|||
|
|
|||
|
[4] Kille, S., Wahl, M., Grimstad, A., Huber, R., and S. Sataluri,
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Josefsson Expires March 3, 2006 [Page 12]
|
|||
|
|
|||
|
Internet-Draft Storing Certificates in the DNS August 2005
|
|||
|
|
|||
|
|
|||
|
"Using Domains in LDAP/X.500 Distinguished Names", RFC 2247,
|
|||
|
January 1998.
|
|||
|
|
|||
|
[5] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
|
|||
|
Resource Identifiers (URI): Generic Syntax", RFC 2396,
|
|||
|
August 1998.
|
|||
|
|
|||
|
[6] Callas, J., Donnerhacke, L., Finney, H., and R. Thayer,
|
|||
|
"OpenPGP Message Format", RFC 2440, November 1998.
|
|||
|
|
|||
|
[7] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA
|
|||
|
Considerations Section in RFCs", BCP 26, RFC 2434,
|
|||
|
October 1998.
|
|||
|
|
|||
|
[8] Resnick, P., "Internet Message Format", RFC 2822, April 2001.
|
|||
|
|
|||
|
[9] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose,
|
|||
|
"DNS Security Introduction and Requirements", RFC 4033,
|
|||
|
March 2005.
|
|||
|
|
|||
|
[10] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose,
|
|||
|
"Resource Records for the DNS Security Extensions", RFC 4034,
|
|||
|
March 2005.
|
|||
|
|
|||
|
10.2. Informative References
|
|||
|
|
|||
|
[11] Dierks, T. and C. Allen, "The TLS Protocol Version 1.0",
|
|||
|
RFC 2246, January 1999.
|
|||
|
|
|||
|
[12] Kent, S. and R. Atkinson, "Security Architecture for the
|
|||
|
Internet Protocol", RFC 2401, November 1998.
|
|||
|
|
|||
|
[13] Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B.,
|
|||
|
and T. Ylonen, "SPKI Certificate Theory", RFC 2693,
|
|||
|
September 1999.
|
|||
|
|
|||
|
[14] Josefsson, S., "The Base16, Base32, and Base64 Data Encodings",
|
|||
|
RFC 3548, July 2003.
|
|||
|
|
|||
|
[15] Richardson, M., "A Method for Storing IPsec Keying Material in
|
|||
|
DNS", RFC 4025, March 2005.
|
|||
|
|
|||
|
[16] Ramsdell, B., "Secure/Multipurpose Internet Mail Extensions
|
|||
|
(S/MIME) Version 3.1 Message Specification", RFC 3851,
|
|||
|
July 2004.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Josefsson Expires March 3, 2006 [Page 13]
|
|||
|
|
|||
|
Internet-Draft Storing Certificates in the DNS August 2005
|
|||
|
|
|||
|
|
|||
|
Author's Address
|
|||
|
|
|||
|
Simon Josefsson
|
|||
|
|
|||
|
Email: simon@josefsson.org
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Josefsson Expires March 3, 2006 [Page 14]
|
|||
|
|
|||
|
Internet-Draft Storing Certificates in the DNS August 2005
|
|||
|
|
|||
|
|
|||
|
Intellectual Property Statement
|
|||
|
|
|||
|
The IETF takes no position regarding the validity or scope of any
|
|||
|
Intellectual Property Rights or other rights that might be claimed to
|
|||
|
pertain to the implementation or use of the technology described in
|
|||
|
this document or the extent to which any license under such rights
|
|||
|
might or might not be available; nor does it represent that it has
|
|||
|
made any independent effort to identify any such rights. Information
|
|||
|
on the procedures with respect to rights in RFC documents can be
|
|||
|
found in BCP 78 and BCP 79.
|
|||
|
|
|||
|
Copies of IPR disclosures made to the IETF Secretariat and any
|
|||
|
assurances of licenses to be made available, or the result of an
|
|||
|
attempt made to obtain a general license or permission for the use of
|
|||
|
such proprietary rights by implementers or users of this
|
|||
|
specification can be obtained from the IETF on-line IPR repository at
|
|||
|
http://www.ietf.org/ipr.
|
|||
|
|
|||
|
The IETF invites any interested party to bring to its attention any
|
|||
|
copyrights, patents or patent applications, or other proprietary
|
|||
|
rights that may cover technology that may be required to implement
|
|||
|
this standard. Please address the information to the IETF at
|
|||
|
ietf-ipr@ietf.org.
|
|||
|
|
|||
|
|
|||
|
Disclaimer of Validity
|
|||
|
|
|||
|
This document and the information contained herein are provided on an
|
|||
|
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
|||
|
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
|
|||
|
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
|
|||
|
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
|
|||
|
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
|||
|
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
|||
|
|
|||
|
|
|||
|
Copyright Statement
|
|||
|
|
|||
|
Copyright (C) The Internet Society (2005). This document is subject
|
|||
|
to the rights, licenses and restrictions contained in BCP 78, and
|
|||
|
except as set forth therein, the authors retain all their rights.
|
|||
|
|
|||
|
|
|||
|
Acknowledgment
|
|||
|
|
|||
|
Funding for the RFC Editor function is currently provided by the
|
|||
|
Internet Society.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Josefsson Expires March 3, 2006 [Page 15]
|
|||
|
|