Network Working GroupIndependent Submission R. GiebenInternet-DraftRequest for Comments: 7129 GoogleIntended status:Category: Informational W. MekkingExpires: May 29, 2014ISSN: 2070-1721 NLnet LabsNovember 25, 2013February 2014 Authenticated Denial of Existence in the DNSdraft-gieben-auth-denial-of-existence-dns-05Abstract Authenticated denial of existence allows a resolver to validate that a certain domain name does not exist. It is also used to signal that a domain nameexists,exists but does not have the specificRRresource record (RR) type you were asking for. When returning a negativeDNSSECDNS Security Extensions (DNSSEC) response, a name server usually includes up to two NSEC records. WithNSEC3NSEC version 3 (NSEC3), this amount is three. This document provides additional background commentary and some context for the NSEC and NSEC3 mechanisms used by DNSSEC to provide authenticateddenial of existence responsesdenial-of-existence responses. Status of This Memo ThisInternet-Draftdocument issubmitted in full conformance withnot an Internet Standards Track specification; it is published for informational purposes. This is a contribution to theprovisionsRFC Series, independently ofBCP 78any other RFC stream. The RFC Editor has chosen to publish this document at its discretion andBCP 79. Internet-Draftsmakes no statement about its value for implementation or deployment. Documents approved for publication by the RFC Editor areworking documentsnot a candidate for any level oftheInternetEngineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The listStandard; see Section 2 of RFC 5741. Information about the currentInternet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximumstatus ofsix monthsthis document, any errata, and how to provide feedback on it may beupdated, replaced, or obsoleted by other documentsobtained atany time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on May 29, 2014.http://www.rfc-editor.org/info/rfc7129. Copyright Notice Copyright (c)20132014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . .. 42 2. Denial of Existence . . . . . . . . . . . . . . . . . . . . .53 2.1. NXDOMAIN Responses . . . . . . . . . . . . . . . . . . .. 54 2.2. NODATA Responses . . . . . . . . . . . . . . . . . . . .. 65 3. Secure Denial of Existence . . . . . . . . . . . . . . . . .. 65 3.1. NXT . . . . . . . . . . . . . . . . . . . . . . . . . . .86 3.2. NSEC . . . . . . . . . . . . . . . . . . . . . . . . . .. 87 3.3. NODATA Responses . . . . . . . . . . . . . . . . . . . .. 109 3.4. Drawbacks of NSEC . . . . . . . . . . . . . . . . . . . .119 4. Experimental and Deprecated Mechanisms: NO,NSEC2NSEC2, and DNSNR. 1110 5. NSEC3 . . . . . . . . . . . . . . . . . . . . . . . . . . . .1311 5.1. Opt-Out . . . . . . . . . . . . . . . . . . . . . . . . .1413 5.2. Loading an NSEC3 Zone . . . . . . . . . . . . . . . . . .1514 5.3. Wildcards in the DNS . . . . . . . . . . . . . . . . . .. 1614 5.4. CNAME Records . . . . . . . . . . . . . . . . . . . . . .18 5.5. The Closest Encloser NSEC3 Record . . . . . . . . . . . . 19 5.6. Three To Tango . . . . . . . . . . . . . . . . . . . . . . 23 6. Security Considerations . . . . . . . . . . . . . . . . . . . 24 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 25 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 25 9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 25 9.1. Normative References . . . . . . . . . . . . . . . . . . . 25 9.2. Informative References . . . . . . . . . . . . . . . . . . 26 Appendix A. On-line Signing: Minimally Covering NSEC Records . . 27 Appendix B. On-line Signing: NSEC3 White Lies . . . . . . . . . . 29 Appendix C. List of Hashed Owner Names . . . . . . . . . . . . . 29 Appendix D. Changelog . . . . . . . . . . . . . . . . . . . . . . 30 D.1. -00 . .16 5.5. The Closest Encloser NSEC3 Record . . . . . . . . . . . . 18 5.6. Three to Tango . . . . . . . . . . . . .30 D.2. -01. . . . . . . . 22 6. Security Considerations . . . . . . . . . . . . . . . . . . .30 D.3. -0223 7. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 23 8. References . . . .30 D.4. -03. . . . . . . . . . . . . . . . . . . . . 24 8.1. Normative References . . . . . .31 D.5. -04. . . . . . . . . . . . 24 8.2. Informative References . . . . . . . . . . . . . . .31 D.6. -05. . 24 Appendix A. Online Signing: Minimally Covering NSEC Records . . 26 Appendix B. Online Signing: NSEC3 White Lies . . . . . . . . . . 27 Appendix C. List of Hashed Owner Names . . . . . . . . . . . . .3127 1. Introduction DNSSEC can be somewhat of a complicated matter, and there are certain areas of the specification that are more difficult to comprehend than others. One such area is "authenticated denial of existence". Denial of existence is a mechanism that informs a resolver that a certain domain name does not exist. It is also used to signal that a domain nameexists,exists but does not have the specific RR type you were asking for. The first is referred to asan NXDOMAIN (non-existent domain) ([RFC2308]a nonexistent domain (NXDOMAIN) ([RFC2308], Section 2.1) and the latter as a NODATA([RFC2308]([RFC2308], Section 2.2) response. Both are also known as negative responses. Authenticated denial of existence uses cryptography to sign the negative response. However, if there is no answer, what is it that needs to be signed? To further complicate this matter, there is the desire to pre-generate negative responses that are applicable for all queries fornon-existentnonexistent names in the signed zone. See Section 3 for the details. In this document, we will explain how authenticated denial of existence works. We begin by explaining the current technique in the DNS and work our way up to DNSSEC. We explain the first steps taken in DNSSEC and describe how NSEC and NSEC3 work. The NXT, NO,NSEC2NSEC2, and DNSNR records also briefly make their appearance, as they have paved the way for NSEC and NSEC3. To complete the picture, we also need to explain DNS wildcards as these complicate matters, especially when combined with CNAME records. Note: In this document, domain names in zone file examples will have a trailing dot, but in the running text they will not. This text is written for people who have a fair understanding of DNSSEC. The following RFCs are not required reading, but they help in understanding the problem space. oRFC 5155[RFC5155]--- DNS Security (DNSSEC) Hashed Authenticated Denial of Existence; oRFC 4592[RFC4592]--- The Role of Wildcards in theDNS. AndDomain Name System. And, these provide some general DNSSEC information. oRFC 4033, RFC 4034, RFC 4035[RFC4033], [RFC4034], and [RFC4035]--- DNSSECSpecification;specifications; oRFC 4956[RFC4956]--- DNS Security (DNSSEC) Opt-In. This RFC hasexperimental status,an Experimental status but is a good read. These threedraftsdocuments give some background information on the NSEC3 development. o The NO record[I-D.ietf-dnsext-not-existing-rr];[DNSEXT]; o The NSEC2 record[I-D.laurie-dnsext-nsec2v2];[DNSEXT-NSEC2]; o The DNSNR record[I-D.arends-dnsnr].[DNSNR-RR]. 2. Denial of Existence We start with the basics and take a look at NXDOMAIN handling in the DNS. To make it morevisiblevisible, we are going to use a small DNSzone,zone with3three names ("example.org","a.example.org""a.example.org", and "d.example.org") and3four types (SOA,ANS, A, and TXT). For brevity, the class is not shown (defaults to IN) and the SOA record is shortened, resulting in the following zone file: example.org. SOA ( ... ) example.org. NS a.example.org. a.example.org. A 192.0.2.1 TXT "a record" d.example.org. A 192.0.2.1 TXT "d record" Figure 1: TheunsignedUnsigned "example.org"zone.Zone 2.1. NXDOMAIN Responses If a resolver asks the name server serving this zone for the TXT type belonging to"a.example.org" to the name server serving this zone,"a.example.org", it sends the following question: "a.example.orgTXT"TXT". The name server looks in its zone data and generates an answer. In thiscasecase, a positive one:"Yes"Yes, it exists and this is the data", resulting in this reply: ;; status: NOERROR, id: 28203 ;; ANSWER SECTION: a.example.org. TXT "a record" ;; AUTHORITY SECTION: example.org. NS a.example.org. The "status: NOERROR" signals that everything is OK, and the "id" is an integer used to match questions and answers. In the ANSWER section, we find our answer. The AUTHORITY section holds the names of the name servers that have information concerning the "example.org" zone. Note that including this information is optional. If a resolver asks for "b.example.orgTXT"TXT", it gets an answer that this name does not exist: ;; status: NXDOMAIN, id: 7042 ;; AUTHORITY SECTION: example.org. SOA ( ... ) In this case, we do not get an ANSWERsectionsection, and the status is set to NXDOMAIN. Fromthisthis, the resolver concludes that "b.example.org" does not exist. The AUTHORITY section holds the SOA record of "example.org" that the resolver can use to cache the negative response. 2.2. NODATA Responses It is important to realize that NXDOMAIN is not the only type ofdoes-not-exist.does-not-exist response. A name may exist, but the type you are asking for may not. This occurrence ofnon-existencenonexistence is called a NODATA response. Let us ask our name server for "a.example.orgAAAA",AAAA" and look at the answer: ;; status: NOERROR, id: 7944 ;; AUTHORITY SECTION: example.org. SOA ( ... ) The status NOERROR shows that the "a.example.org" name exists, but the reply does not contain an ANSWER section. This differentiates a NODATA response from an NXDOMAINresponse,response; the rest of the packet is very similar. The resolver has to put these pieces of information together and conclude that "a.example.org" exists, but it does not haveana "AAAA" record. 3. Secure Denial of Existence The above has to be translated to thesecurity awaresecurity-aware world of DNSSEC.ButBut, there are a few principles DNSSEC brings to the table: 1. A name server is free to compute the answer and signature(s)on- the-fly,on the fly, but the protocol is written with a "first sign, then load" attitude in mind. It is rather asymmetrical, but a lot of the design in DNSSEC stems from fact that you need to accommodate authenticated denial of existence. If the DNS did not have NXDOMAIN, DNSSEC would be a lot simpler, but a lot less useful! 2. The DNS packet header is not signed. This means that a "status: NXDOMAIN"can notcannot be trusted. Infactfact, the entire header may be forged, including the AD bit (AD stands for AuthenticData,Data; seeRFC 3655[RFC3655]), which may give some food for thought; 3. DNS wildcards and CNAME records complicate matters significantly.MoreSee more about thisinlatersections (Sectionin Sections 5.3 andSection 5.4).5.4. The first principle implies that alldenial of existencedenial-of-existence answers need to bepre-computed,precomputed, but it is impossible topre-computeprecompute (all conceivable)non-existencenonexistence answers. A generic denial recordwhichthat can be used in alldenial of existencedenial-of-existence proofs is not an option: such a record is susceptible to replay attacks. When you are querying a name server for any record that actually exists, aman-in-the-middleman in the middle could replay that generic denial record that is unlimited in itsscopescope, and it would be impossible to tell whether the response was genuine or spoofed. In other words, the generic record can be replayed to falsely deny _all_ possible responses. We could also use the QNAME in the answer and signthat;that, essentially signing an NXDOMAIN response. While this approach could have worked technically, it is incompatible withoff-lineoffline signing. The way this has been solved is by introducing a record that defines an interval between two existing names.OrOr, to put it anotherway:way, it defines the holes(non-existing(nonexisting names) in the zone. This record can be signed beforehand and given to the resolver.AppendixAppendices A andAppendixB describeon-lineonline signing techniques that are compatible with this scheme. Given all these troubles, why didn't the designers of DNSSEC go for the(easy)easy route andallowedallow foron-lineonline signing? Well, at that time (pre 2000),on-lineonline signing was not feasible with thethenthen- current hardware. Keep in mind that the larger servers get between 2000 and 6000 queries per second (qps), with peaks up to 20,000 qps or more. Scaling signature generation to these kind of levels is always a challenge. Another issue was (and is) keymanagement, for on-linemanagement. For online signing toworkwork, _each_ authoritative name server needs access to the private key(s). This is considered a security risk. Hence, the protocol is required not to rely onon- lineon-line signing. The road to the current solution (NSEC/NSEC3) was long. It started with the NXT (next) record. The NO (not existing) record was introduced, but it never made ittointo an RFC. Later on, NXT was superseded by the NSEC (next secure) record. Fromtherethere, it went throughNSEC2/ DNSNRNSEC2/DNSNR to finally reach NSEC3(next secure,(Next SECure version 3) in RFC 5155. 3.1. NXT The first attempt to specify authenticated denial of existence was NXT(RFC 2535 [RFC2535]).([RFC2535]). Section 5.1 ofthatRFC 2535 introduces the record:"TheThe NXT resource record is used to securely indicate that RRs with an owner name in a certain name interval do not exist in a zone and to indicate what RR types are present for an existingname."name. By specifying what you do have, you implicitly tell what you don't have. NXT is superseded by NSEC. In the nextsectionsection, we explain how NSEC (and thus NXT) works. 3.2. NSEC InRFC 3755 [RFC3755][RFC3755], all the DNSSEC types were given newnames,names: SIG was renamed RRSIG, KEY becameDNSKEYDNSKEY, and NXT was renamedto NSECNSEC, and a minor issue was fixed in the process, namely the type bitmap was redefined to allow more than 127 types to be listed ([RFC2535], Section 5.2). Just as NXT, NSEC is used to describe an interval between names: it indirectly tells a resolver which names do not exist in a zone. For this to work, we need our "example.org" zone to be sorted in canonical order ([RFC4034], Section 6.1), and then create the NSECs. We add three NSEC records, one for each name, and each one covers a certain interval. The last NSEC record points back to the first as required bythe RFC,RFC 4034 and depicted in Figure 2. 1. The first NSEC covers the interval between "example.org" and "a.example.org"; 2. The second NSEC covers "a.example.org" to "d.example.org"; 3. The third NSEC points back to"example.org","example.org" and covers "d.example.org" to "example.org"(i.e.(i.e., the end of the zone). As we have defined the intervals and put those in resource records, we now have something that can be signed. example.org ** +-- ** <--+ (1) / . . \ (3) / . . \ | . . | v . . | ** (2) ** a.example.org ** ---------> ** d.example.org Figure 2: The NSEC records of "example.org". The arrows represent NSEC records, starting from the apex. This signed zone is loaded into the name server. It looks like this: example.org. SOA ( ... ) DNSKEY ( ... ) NS a.example.org. NSEC a.example.org. NS SOA RRSIG NSEC DNSKEY RRSIG(NS) ( ... ) RRSIG(SOA) ( ... ) RRSIG(NSEC) ( ... ) RRSIG(DNSKEY) ( ... ) a.example.org. A 192.0.2.1 TXT "a record" NSEC d.example.org. A TXT RRSIG NSEC RRSIG(A) ( ... ) RRSIG(TXT) ( ... ) RRSIG(NSEC) ( ... ) d.example.org. A 192.0.2.1 TXT "d record" NSEC example.org. A TXT RRSIG NSEC RRSIG(A) ( ... ) RRSIG(TXT) ( ... ) RRSIG(NSEC) ( ... ) Figure 3: The signed and sorted "example.org" zone with the added NSEC records (and signatures). For brevity, the class is not shown (defaults to IN) and the SOA,DNSKEYDNSKEY, and RRSIG records are shortened. If aDNSSEC awareDNSSEC-aware resolver asks for "b.example.org", it gets back a "status: NXDOMAIN" packet, which by itself is meaningless (remember that the DNS packet header is not signed and thus can be forged). To be able to securely detect that "b" does not exist, there must also be a signed NSEC recordwhichthat covers the name space where "b" lives. The record: a.example.org. NSEC d.example.org. A TXT RRSIG NSEC does precisely that: "b" should come after "a", but the next owner name is "d.example.org", so "b" does not exist. Only by making thatcalculation,calculation is a resolver able to conclude that the name "b" does not exist. If the signature of the NSEC record is valid, "b" is proven not to exist. We have authenticated denial of existence. A similar NSEC record needs to be included to deny wildcard expansion, see Section 5.3. Note that aman-in-the-middleman in the middle may still replay this NXDOMAIN response when you're querying for, say, "c.example.org".ButBut, it would not do any harm since it isprovably the proper response to the query. In the future, there may be data published for "c.example.org". Therefore, the RRSIG's RDATA include a validity period (not visible in the zone above), soprovable thatan attacker cannot replaythisNXDOMAINis the proper responsefor "c.example.org" forever.to the query. 3.3. NODATA Responses NSEC records are also used in NODATA responses. In thatcasecase, we need to look more closely at the type bitmap. The type bitmap in an NSEC record tells which types are defined for a name. If we look at the NSEC record of "a.example.org", we see the following types in the bitmap: A, TXT,NSECNSEC, and RRSIG.SoSo, for the name"a""a", this indicates we must have an A, TXT,NSECNSEC, and RRSIG record in the zone. With the type bitmap of the NSEC record, a resolver can establish that a name is there, but the type is not. For example, if a resolver asks for "a.example.org AAAA", the reply that comes back is: ;; status: NOERROR, id: 44638 ;; AUTHORITY SECTION: example.org. SOA ( ... ) example.org. RRSIG(SOA) ( ... ) a.example.org. NSEC d.example.org. A TXT RRSIG NSEC a.example.org. RRSIG(NSEC) ( ... ) The resolver should check the AUTHORITY section and conclude that: (1) "a.example.org" exists (because of the NSEC with that ownername) and;name); and (2) the type (AAAA) does not exist as it is not listed in the type bitmap. The techniques used by NSEC form the basics of authenticated denial of existence in DNSSEC. 3.4. Drawbacks of NSEC There were two issues with NSEC (and NXT). The first is that it allows for zone walking. NSEC records point from one name toanother,another; in our example:"example.org","example.org" points to"a.example.org""a.example.org", which points to"d.example.org""d.example.org", which points back to "example.org".SoSo, we can reconstruct the entire "example.org" zone, thus defeating attempts to administratively block zone transfers([RFC2065]([RFC2065], Section 5.5). The second issue is that when a large, delegation-centric ([RFC5155], Section1.1),1.1) zone deploys DNSSEC, every name in the zone gets an NSEC plus RRSIG.SoSo, this leads to a huge increase in the zone size (when signed). This would in turn mean that operators of such zones who are deployingDNSSEC,DNSSEC faceup frontup-front costs. This could hinder DNSSEC adoption. These two issues eventually lead toNSEC3NSEC3, which: o Adds a way to garble the ownernames,names thus thwarting zone walking; o Makes it possible to skip names for the next owner name. This feature is called Opt-Out(See(see Section 5.1). It means not all names in your zone get an NSEC3 plus ditto signature, making it possible to "grow into" your DNSSEC deployment. Note that there are other ways to mitigateagainstzone walking. RFC 4470[(#RFC4470)[RFC4470] prevents zone walking by introducing minimally covering NSEC records. This technique is described in Appendix A. Before we delve into NSEC3, let us first take a look at its predecessors: NO, NSEC2, and DNSNR. 4. Experimental and Deprecated Mechanisms: NO,NSEC2NSEC2, and DNSNR Long before NSEC was defined, the NO record was introduced. It was the first record to use the idea of hashed ownernames,names to fix the issue of zone walking that was present with the NXT record. It also fixed the type bitmap issue of the NXT record, but not in aspacespace- efficient way. At that time (around2000)2000), zone walking was not considered important enough to warrant the new record. People were also worried that DNSSEC deployment would be hindered by developing an alternate means of denial of existence.ThusThus, the effort was shelved and NXT remained. When the new DNSSEC specification [RFC4034] was written, people were still not convinced that zone walking was a problem that should be solved.SoSo, NSEC saw the light and inherited the two issues from NXT. Several years after, NSEC2 was introduced as a way to solve the two issues of NSEC. The NSEC2draftdocument [DNSEXT-NSEC2] contains the following paragraph:"ThisThis document proposes an alternate scheme which hides owner names while permitting authenticated denial of existence ofnon- existentnon-existent names. The scheme uses two new RR types: NSEC2 andEXIST."EXIST. When an authenticateddenial of existencedenial-of-existence scheme starts to talk about EXIST records, it is worth paying extra attention. The EXIST record was defined as a record without RDATA that would be used to signal the presence of a domain name. Fromthe draft: "In[DNSEXT-NSEC2]: In order to prove the nonexistence of a record that might be covered by a wildcard, it is necessary to prove the existence of its closest encloser. This record does that. Its owner is the closest encloser. It has no RDATA. If there is another RR that proves the existence of the closest encloser, this SHOULD be used instead of an EXISTrecord."record. The introduction of this record led to questionsonabout what wildcards actually mean (especially in the context of DNSSEC). It is probably not a coincidence that "The Role of Wildcards in the Domain Name System"([RFC4592])[RFC4592] was standardized before NSEC3 was. NSEC2 solved thezone walkingzone-walking issue by hashing (with SHA1 and a salt) the "next owner name" in the record, thereby making it useless for zone walking.ButBut, it did not have Opt-Out. The DNSNR record was another attempt that used hashed names to foil zonewalkingwalking, and it also introduced the concept of opting out (called "Authoritative OnlyFlag")Flag"), which limited the use of DNSNR in delegation-centric zones. All of these proposals didn't make it, but they did provide valuable insights. To summarize: o The NO record introduced hashing, but this idea lingered in the background for a long time; o The NSEC2 record made it clear that wildcards were not completely understood; o The DNSNR record used a new flag field in the RDATA to signal Opt-Out;Out. 5. NSEC3 From the experience gained with NSEC2 and DNSNR, NSEC3 was forged. It incorporates both Opt-Out and the hashing of names. NSEC3 solves any issues people might have with NSEC, but it introduces some additional complexity. NSEC3 did not supersedeNSEC,NSEC; they are both defined for DNSSEC.SoSo, DNSSEC is blessed with two different means to perform authenticated denial of existence: NSEC and NSEC3. InNSEC3NSEC3, every name is hashed, including the owner name. This means that the NSEC3 chain is sorted in hash order, instead of canonical order. Because the owner names are hashed, the next owner name for "example.org" is unlikely to be "a.example.org". Because the next owner name is hashed, zone walking becomes more difficult. To make it even more difficult to retrieve the original names, the hashing can be repeated severaltimestimes, each time taking the previous hash as input. To prevent the reuse of pre-generated hash values betweenzoneszones, a(per zone)(per-zone) salt can also be added. In the NSEC3 for"example.org""example.org", we have hashed the names thrice ([RFC5155], Section 5) anduseused the salt "DEAD".LetsLet's look at a typical NSEC3 record: 15bg9l6359f5ch23e34ddua6n1rihl9h.example.org. ( NSEC3 1 0 2 DEAD A6EDKB6V8VL5OL8JNQQLT74QMJ7HEB84 NS SOA RRSIG DNSKEY NSEC3PARAM ) On the firstlineline, we see the hashed owner name:"15bg9l6359f5ch23e34ddua6n1rihl9h.example.org","15bg9l6359f5ch23e34ddua6n1rihl9h.example.org"; this is the hashed name of the fully qualified domain name (FQDN) "example.org" encoded as Base32([RFC4648]).[RFC4648]. Note that even though we hashed "example.org", the zone's name is added to make it look like a domain name again. In our zone, the basic format is "Base32(SHA1(FQDN)).example.org". The next hashed owner name "A6EDKB6V8VL5OL8JNQQLT74QMJ7HEB84" (line 2) is the hashed version of "d.example.org", represented as Base32. Note that "d.example.org" is usedareas the next ownername,name because in the hash ordering, its hash comes after the hash of the zone's apex.AlsoAlso, note that ".example.org" is not added to the next hashed owner name, as this name always falls in the current zone. The "1 0 2 DEAD"sectionsegment of the NSEC3 states: o Hash Algorithm = 1(SHA1, this(SHA1 is thedefault,default; no other hash algorithms are currently defined for use inNSEC3);NSEC3; see Section 3.1.1 of [RFC5155]); o Opt-Out = 0(disabled);(disabled; see Section 6 of [RFC5155]); o Hash Iterations =2, this2 (this yields three iterations, as a zero value is already one iteration; see Section 3.1.3 of [RFC5155]); o Salt ="DEAD"."DEAD" (see Section 3.1.5 of [RFC5155]. At theendend, we see the type bitmap, which is identical to NSEC's bitmap, that lists the types present at the original owner name. Note that the type NSEC3 is absent from the list in the example above. This is due to the fact that the original owner name ("example.org") does not have the NSEC3 type. It only exists for the hashed name. Names like "1.h.example.org" hash to one label inNSEC3,NSEC3 and "1.h.example.org" becomes: "117gercprcjgg8j04ev1ndrk8d1jt14k.example.org" when used as an owner name. This is an important observation. By hashing thenamesnames, you lose the depth of a zone--- hashing introduces a flat space of names, as opposed to NSEC. The name used above ("1.h.example.org") creates an empty non- terminal. Empty non-terminals are domain names that have no RRs associated withthem,them and exist only because they have one or moresub-domainssubdomains that do ([RFC5155], Section 1.3). The record: 1.h.example.org. TXT "1.h record" creates two names: 1. "1.h.example.org" that has the type: TXT; 2."h.example.org""h.example.org", which has no types. This is the empty non- terminal. An empty non-terminal will get an NSEC3record,record but not an NSEC record. In Section5.5 is shown5.5, how the resolver uses these NSEC3 records to validate thedenial of existence proofs.denial-of-existence proofs is shown. Note that NSEC3 might not always be useful. For example, highlystructuresstructured zones, like the reverse zones ip6.arpa and in-addr.arpa, can be walked even with NSEC3 due to their structure.AlsoAlso, the names in small, trivial zones can be easily guessed. In these cases, it does not help to defend against zone walking, but it does add the computational load on authoritative servers and validators. 5.1. Opt-Out Hashing mitigates thezone walkingzone-walking issue of NSEC. The other issue, the high costs of securing a delegation to an insecure zone, is tackled with Opt-Out. When using Opt-Out, names that are an insecure delegation (and empty non-terminals that are only derived from insecure delegations) don't require an NSEC3 record. For each insecure delegation, the zone size can be decreased (compared with a fully signed zone without using Opt-Out) with at least two records: one NSEC3 record and one corresponding RRSIG record. If the insecure delegation would introduce empty non-terminals, even more records can be omitted from the zone. Opt-Out NSEC3 records are not able to prove or deny the existence of the insecure delegations. In other words, thosedelegationdelegations do not benefit from the cryptographic security that DNSSEC provides. A recently discovered corner case([RFC5155-errata3441])(see RFC Errata ID 3441 [Err3441]) shows that not only those delegations remaininsecure,insecure but also the emptynon- terminalnon-terminal space that is derived from thosedelegations are insecure.delegations. Because the names in this empty non-terminal space do exist according to the definition in [RFC4592], the server should respond to queries for these names with a NODATA response. However, the validator requires an NSEC3 record proving the NODATA response ([RFC5155], Section 8.5):"TheThe validator MUST verify that an NSEC3 RR that matches QNAME is present and that both the QTYPE and the CNAME type are not set in its Type Bit Mapsfield."field. A way to resolve this contradiction in the specification is to always provide empty non-terminals with an NSEC3 record, even if it is only derived from an insecure delegation. 5.2. Loading an NSEC3 Zone Whenever an authoritative server receives a query for a non-existing record, it has to hash the incoming query name to determine into which interval between two existing hashes it falls. To dothatthat, it needs to know the zone's specific NSEC3 parameters (hash iterations and salt). One way to learn them is to scan the zone during loading for NSEC3 records and glean the NSEC3 parameters from them. However, it would need to make sure that there is at least one complete set of NSEC3 records for the zone using the same parameters. Therefore, it would need to inspect all NSEC3 records. A more graceful solution was designed. The solution was to create a new record, NSEC3PARAM, which must be placed at the apex of the zone. Its role is to provide a fixed place where an authoritative name server can directly see the NSEC3 parameters used, and by putting it in thezonezone, it allows for easy transfer to the secondaries.If NSEC3 were designed in the early days of DNS (+/- 1984) this information would probably have been put in the SOA record.5.3. Wildcards in the DNS So far, we have only talked about denial of existence in negative responses. However, denial of existence may also occur in positive responses, i.e., where the ANSWER section of the response is not empty. This can happen because of wildcards. Wildcards have been part of the DNS since the first DNS RFCs. They allow to define all names for a certain type in one go. In our "example.org"zonezone, wecouldcould, forinstanceinstance, add a wildcard record: *.example.org. TXT "wildcard record" For completeness, our (unsigned) zone now looks like this: example.org. SOA ( ... ) example.org. NS a.example.org. *.example.org. TXT "wildcard record" a.example.org. A 192.0.2.1 TXT "a record" d.example.org. A 192.0.2.1 TXT "d record" Figure 4: The example.orgzoneZone with awildcard record.Wildcard Record If a resolver asks for "z.example.org TXT", the name server will respond with an expandedwildcard,wildcard instead of an NXDOMAIN: ;; status: NOERROR, id: 13658 ;; ANSWER SECTION: z.example.org. TXT "wildcard record"Note howeverNote, however, that the resolvercan notcannot detect that this answer came from a wildcard. It just sees the answeras-is.as is. How will this answer look with DNSSEC? ;; status: NOERROR, id: 51790 ;; ANSWER SECTION: z.example.org. TXT "wildcard record" z.example.org. RRSIG(TXT) ( ... ) ;; AUTHORITY SECTION: d.example.org. NSEC example.org. A TXT RRSIG NSEC d.example.org. RRSIG(NSEC) ( ... ) Figure 5: AresponseResponse with anexpanded wildcardExpanded Wildcard andwith DNSSEC.DNSSEC The RRSIG of the "z.example.org" TXT record indicates there is a wildcard configured. The RDATA of the signature lists a labelcountcount, [RFC4034], Section 3.1.3., of two (not visible in theanswerfigure above), but the owner name of the signature has three labels. This mismatch indicates there is a wildcard "*.example.org" configured. An astute reader may notice that it appears as if a "z.example.org" RRSIG(TXT) is created out of thin air. This is not the case. The signature for "z.example.org" does not exist. The signature you are seeing is the one for"*.example.org""*.example.org", which doesexist,exist; only the owner name is switched to "z.example.org".SoSo, even with wildcards, no signatures have to be created on the fly. The DNSSEC standard mandates that an NSEC (or NSEC3) is included in such responses. If it wasn't, an attacker could mount a replay attack and poison the cache with falsedata:data. Suppose that the resolver has asked for "a.example.org TXT". An attacker could modify the packet in such way that it looks like the response was generated through wildcard expansion, even thoughthere existsa record exists for "a.example.org TXT". The tweaking simply consists of adjusting the ANSWER section to: ;; status: NOERROR, id: 31827 ;; ANSWER SECTION: a.example.org. TXT "wildcard record" a.example.org. RRSIG(TXT) ( ... ) Figure 6: Aforged responseForged Response without theexpanded wildcard.Expanded Wildcard Note the subtle difference from Figure 5 in the owner name. In thisresponseresponse, we see a "a.example.org TXT"record,record for which a record with different RDATA(See(see Figure 4)existexists in the zone.WhichThat would be a perfectly valid answer if we would not require the inclusion of an NSEC or NSEC3 record in the wildcard answer response. The resolver believes that "a.example.org TXT" is a wildcard record, and the real record is obscured. This is bad and defeats all the security DNSSEC can deliver. Because of this, the NSEC or NSEC3 must be present. Another way of putting this is that DNSSEC is there to ensure the name server has followed the steps as outlined in [RFC1034], Section 4.3.2 for looking up names in the zone. It explicitly lists wildcardlook uplookup as one of these steps (3c), so with DNSSEC this must be communicated to the resolver:hencehence, theNSEC(3)NSEC or NSEC3 record. 5.4. CNAME Records So far, the maximum number of NSEC records a response will have is two: one for the denial of existence and another for the wildcard. We saymaximum,maximum because sometimes a single NSEC can prove both. With NSEC3, this is three (as to why, we will explain in the next section). When we take CNAME wildcard records into account, we can have moreNSEC(3)NSEC or NSEC3 records. For every wildcard expansion, we need to prove that the expansion was allowed.LetsLet's add some CNAME wildcard records to our zone: example.org. SOA ( ... ) example.org. NS a.example.org. *.example.org. TXT "wildcard record" a.example.org. A 192.0.2.1 TXT "a record" *.a.example.org. CNAME w.b *.b.example.org. CNAME w.c *.c.example.org. A 192.0.2.1 d.example.org. A 192.0.2.1 TXT "d record" w.example.org. CNAME w.a Figure 7: AwildcardWildcard CNAMEchain addedChain Added to the "example.org"zone.Zone A query for "w.example.org A" will result in the following response: ;; status: NOERROR, id: 4307 ;; ANSWER SECTION: w.example.org. CNAME w.a.example.org. w.example.org. RRSIG(CNAME) ( ... ) w.a.example.org. CNAME w.b.example.org. w.a.example.org. RRSIG(CNAME) ( ... ) w.b.example.org. CNAME w.c.example.org. w.b.example.org. RRSIG(CNAME) ( ... ) w.c.example.org. A 192.0.2.1 w.c.example.org. RRSIG(A) ( ... ) ;; AUTHORITY SECTION: *.a.example.org. NSEC *.b.example.org. CNAME RRSIG NSEC *.a.example.org. RRSIG(NSEC) ( ... ) *.b.example.org. NSEC *.c.example.org. CNAME RRSIG NSEC *.b.example.org. RRSIG(NSEC) ( ... ) *.c.example.org. NSEC d.example.org. A RRSIG NSEC *.c.example.org. RRSIG(NSEC) ( ... ) The NSEC record "*.a.example.org" proves that wildcard expansion to "w.a.example.org" was appropriate: "w.a." falls in the gap "*.a" to "*.b".Similar,Similarly, the NSEC record "*.b.example.org" proves that there was no direct match for "w.b.example.org" and "*.c.example.org" denies the direct match for "w.c.example.org". DNAME records and wildcard names should not be used as reiterated in[RFC6672][RFC6672], Section 3.3. 5.5. The Closest Encloser NSEC3 Record We can have one or more NSEC3 records that deny the existence of the requested name and one NSEC3 record thatdenydenies wildcard synthesis. What do we miss? The short answer isthat,that due to the hashing inNSEC3NSEC3, youlooselose the depth of yourzone: Everythingzone and everything is hashed into a flat plane. To make up for this loss ofinformationinformation, you need an extra record. To understand NSEC3, we will need two definitions: Closest encloser: Introduced in[RFC4592], "The[RFC4592] as: The closest encloser is the node in the zone's tree of existing domain names that has the most labels matching the query name (consecutively, counting from the root labeldownward)."downward). In our example, if the query name is"x.2.example.org""x.2.example.org", then "example.org" is the "closest encloser"; Next closer name: Introduced inthe NSEC3 RFC,[RFC5155], this is the closest encloser with one more label added to the left.SoSo, if "example.org" is the closest encloser for the query name "x.2.example.org", "2.example.org" is the "next closer name". An NSEC3 "closest encloser proof" consists of: 1. An NSEC3 record that *matches* the "closest encloser". This means the unhashed owner name of the record is the closest encloser. This bit of information tells a resolver: "The name you are asking for does notexist,exist; the closest I have is this". 2. An NSEC3 record that *covers* the "next closer name". This means it defines an interval in which the "next closer name" falls. This tells the resolver: "The next closer name falls in this interval, and therefore the name in your question does not exist. In fact, the closest encloser is indeed the closest I have". These two records already deny the existence of the requested name, so we do not need an NSEC3 record that covers the actual queriedname:name. By denying the existence of the next closer name, you also deny the existence of the queried name. Note that with NSEC, the existence of all empty non-terminals between the two names are denied, hence it implicitly contains the closest encloser. For a given query name, there is one (and only one) place where wildcard expansion is possible. This is the "source ofsynthesis",synthesis" and is defined ([RFC4592],SectionSections 2.1.1 andSection3.3.1) as: <asterisk label>.<closest encloser> In other words, to deny wildcard synthesis, the resolver needs to know the hash of the source of synthesis. Since it does not know beforehand what the closest encloser of the query name is, it must be provided in the answer. Take the following example. Wetake our zone, and puthave a zone with two TXT records to it. The records added are "1.h.example.org" and "3.3.example.org". It is signed with NSEC3, resulting in the following unsignedzone.zone: example.org. SOA ( ... ) example.org. NS a.example.org. 1.h.example.org. TXT "1.h record" 3.3.example.org. TXT "3.3 record" Figure 8: TheaddedTXT records in example.org. These records create two empty non-terminals: h.example.org and 3.example.org. The resolver asks the following: "x.2.example.org TXT". This leads to an NXDOMAIN response from the server, which contains three NSEC3 records. A list of hashed owner names can be found in Appendix C.AlsoAlso, see Figure99; the numbers in that figure correspond with the following NSEC3 records: 15bg9l6359f5ch23e34ddua6n1rihl9h.example.org. ( NSEC3 1 0 2 DEAD 1AVVQN74SG75UKFVF25DGCETHGQ638EK NS SOA RRSIG DNSKEY NSEC3PARAM ) 1avvqn74sg75ukfvf25dgcethgq638ek.example.org. ( NSEC3 1 0 2 DEAD 75B9ID679QQOV6LDFHD8OCSHSSSB6JVQ ) 75b9id679qqov6ldfhd8ocshsssb6jvq.example.org. ( NSEC3 1 0 2 DEAD 8555T7QEGAU7PJTKSNBCHG4TD2M0JNPJ TXT RRSIG ) If we would follow the NSEC approach, the resolver is only interested in one thing. Does the hash of "x.2.example.org" fall in any of the intervals of the NSEC3 records it got? example.org ** +-- ** . . . . . . . . . . . (1) / . ^ . . / . | . . | . | . . v . | . . ** | (2) ** ++ h.example.org ** ----+----> ** 3.example.org ++ 2.example.org . / . | . . / (5) . | (3) . . / . | . . / . v . 1.h.example.org ** ** ++ ** <--------- ** 3.3.example.org ++ x.2.example.org (4) Figure 9:x.2.example.org"x.2.example.org" does not exist. The five arrows represent the NSEC3records,records; the ones numbered (1),(2)(2), and (3) are the NSEC3s returned in our answer.2.example.org"2.example.org" is covered by (3) andx.2.example.org"x.2.example.org" is covered by (4). The hash of "x.2.example.org" is "ndtu6dste50pr4a1f2qvr1v31g00i2i1". Checking this hash on the first NSEC3 yields that it does not fall in between the interval: "15bg9l6359f5ch23e34ddua6n1rihl9h"andto "1avvqn74sg75ukfvf25dgcethgq638ek". For the secondNSEC3NSEC3, the answer is also negative: the hash sorts outside the interval described by "1avvqn74sg75ukfvf25dgcethgq638ek" and "75b9id679qqov6ldfhd8ocshsssb6jvq".AndAnd, the third NSEC3, with interval "75b9id679qqov6ldfhd8ocshsssb6jvq" to "8555t7qegau7pjtksnbchg4td2m0jnpj" also isn't of any help. What is a resolver to do? It has been given the maximum amount of NSEC3s and they all seem useless.SoSo, this is where the closest encloser proof comes into play.AndAnd, for the proof to work, the resolver needs to know what the closest encloser is. There must be an existing ancestor in the zone: a name must exist that is shorter than the query name. The resolver keeps hashing increasingly shorter names from the query name until an owner name of an NSEC3 matches. This owner name is the closest encloser. When the resolver has found the closest encloser, the next step is to construct the next closer name. This is the closest encloser with the last chopped label from the query namepre-pendedprepended to it: "<last chopped label>.<closest encloser>". The hash of this name should be covered by the interval set in any of the NSEC3 records.ThenThen, the resolver needs to check the presence of a wildcard. It creates the wildcard name bypre-pendingprepending the asterisk label to the closestencloser:encloser, "*.<closest encloser>", and uses the hash of that. Going back to our example, the resolver must first detect the NSEC3 that matches the closest encloser. It does this by chopping up the query name, hashing each instance (with the same number of iterations and hash as the zone it isquerying)querying), and comparing that to the answers given.SoSo, it has the following hashes to work with: x.2.example.org: "ndtu6dste50pr4a1f2qvr1v31g00i2i1", last chopped label: "<empty>"; 2.example.org: "7t70drg4ekc28v93q7gnbleopa7vlp6q", last chopped label: "x"; example.org: "15bg9l6359f5ch23e34ddua6n1rihl9h", last chopped label:"2";"2". Of thesehasheshashes, only one matches the owner name of one of the NSEC3 records: "15bg9l6359f5ch23e34ddua6n1rihl9h". This must be the closest encloser (unhashed: "example.org"). That's the main purpose of that NSEC3 record: tell the resolver what the closest encloser is. When using Opt-Out, it is possible that the actual closest encloser to the QNAME does not have an NSEC3 record. If so, we will have to do with the closest provable encloser, which is the closest enclosing authoritative name that does haveaan NSEC3 record. In the worst case, this is the NSEC3 record corresponding to theapex,apex; this name must always have an NSEC3 record. With the closest (provable) encloser, the resolver constructs the next closer, which in this case is: "2.example.org"; "2" is the last labelchopped,chopped when "example.org" is the closest encloser. The hash of this name should be covered in any of the other NSEC3s.AndAnd, itis,is -- "7t70drg4ekc28v93q7gnbleopa7vlp6q" falls in the interval setby:by "75b9id679qqov6ldfhd8ocshsssb6jvq" and "8555t7qegau7pjtksnbchg4td2m0jnpj" (this is our second NSEC3).SoSo, what does the resolver learn from this? o "example.org" exists; o "2.example.org" does not exist.AndAnd, if "2.example.org" does not exist, there is also no direct match for "x.2.example.org". The last step is to deny the existence of the source ofsynthesis,synthesis to prove that no wildcard expansion was possible. The resolver hashes "*.example.org" to "22670trplhsr72pqqmedltg1kdqeolb7" and checks that it iscovered: incovered. In thiscasecase, by the last NSEC3 (see Figure 9), the hash falls in the interval set by "1avvqn74sg75ukfvf25dgcethgq638ek" and "75b9id679qqov6ldfhd8ocshsssb6jvq". This means there is no wildcard record directly below the closestencloserencloser, and "x.2.example.org" definitely does not exist. When we have validated the signatures, we have reached our goal: authenticated denial of existence. 5.6. ThreeToto Tango One extra NSEC3 record plus an additional signature may seem like a lot just to deny the existence of the wildcard record, but we cannot leave it out. If the standard would not mandate the closest encloser NSEC3record,record but instead required two NSEC3records:records -- one to deny the query name and one to deny the wildcardrecord. Anrecord -- an attacker could fool the resolver that the source of synthesis does not exist, while it in fact does. Suppose the wildcard record does exist, so our unsigned zone looks like this: example.org. SOA ( ... ) example.org. NS a.example.org. *.example.org. TXT "wildcard record" 1.h.example.org. TXT "1.h record" 3.3.example.org. TXT "3.3 record" The query "x.2.example.org TXT" should now be answered with: x.2.example.org. TXT "wildcard record" An attacker can deny this wildcard expansion by calculating the hash for the wildcard name "*.2.example.org" and searching for an NSEC3 record that covers that hash. The hash of "*.2.example.org" is "fbq73bfkjlrkdoqs27k5qf81aqqd7hho". Looking through the NSEC3 records in ourzonezone, we see that the NSEC3 record of "3.3" covers this hash: 8555t7qegau7pjtksnbchg4td2m0jnpj.example.org. ( NSEC3 1 0 2 DEAD 15BG9L6359F5CH23E34DDUA6N1RIHL9H TXT RRSIG ) This record also covers the query name "x.2.example.org" ("ndtu6dste50pr4a1f2qvr1v31g00i2i1"). Now an attacker adds this NSEC3 record to the AUTHORITY section of the reply to deny both "x.2.example.org" and any wildcard expansion. The net result is that the resolver determines that "x.2.example.org" does not exist, while in fact it should have been synthesized via wildcard expansion. With the NSEC3 matching the closest encloser "example.org", the resolver can be sure that the wildcard expansion should occur at "*.example.org" and nowhere else. Coming back to the original question:whyWhy do we need up to three NSEC3 records to deny a requested name? The resolver needs to be explicitly told what the "closest encloser"isis, and this takes up a full NSEC3 record. Then, the next closer name needs to be covered in an NSEC3record, and finallyrecord. Finally, an NSEC3 must say something about whether wildcard expansion was possible. That makes three to tango. 6. Security Considerations DNSSEC does not protect againstdenial of servicedenial-of-service attacks, nor does it provide confidentiality. For more general security considerations related to DNSSEC, please seeRFC 4033, RFC 4034, RFC 4035 and RFC 5155 ([RFC4033],[RFC4033], [RFC4034],[RFC4035][RFC4035], and[RFC5155]).[RFC5155]. These RFCs are concise about why certain design choices have been made in the area of authenticated denial of existence. Implementations that do not correctly handle this aspect ofDNSSEC,DNSSEC create a severe hole in the security DNSSEC adds. This is specifically troublesome for securedelegations:delegations. If an attacker is able to deny the existence of aDSDelegation Signer (DS) record, the resolver cannot establish a chain of trust, and the resolver has to fall back to insecure DNS for the remainder of the query resolution. This document aims to fill this "documentation gap" and provide would-be implementors and other interested parties with enough background knowledge to better understand authenticated denial of existence. 7.IANA Considerations This document has no actions for IANA. 8.Acknowledgments This document would not be possible without the help of Ed Lewis, Roy Arends, Wouter Wijngaards, Olaf Kolkman, Carsten Strotmann, Jan-Piet Mens, Peter van Dijk, Marco Davids, Esther Makaay, Antoin Verschuren, Lukas Wunner, Joe Abley, Ralf Weber, Geoff Huston, Dave Lawrence, TonyFinchFinch, and Mark Andrews. Also valuable was the source code ofUnbound.Unbound ("validator/val_nsec3.c") [Unbound]. Extensive feedback for early versions of this document was received from Karst Koymans.9.8. References9.1.8.1. Normative References [RFC1034] Mockapetris, P., "Domain names - concepts and facilities", STD 13, RFC 1034, November 1987. [RFC2065] Eastlake, D. and C. Kaufman, "Domain Name System Security Extensions", RFC 2065, January 1997. [RFC2308] Andrews, M., "Negative Caching of DNS Queries (DNS NCACHE)", RFC 2308, March 1998. [RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, "DNS Security Introduction and Requirements", RFC 4033, March 2005. [RFC4034] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, "Resource Records for the DNS Security Extensions", RFC 4034, March 2005. [RFC4035] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, "Protocol Modifications for the DNS Security Extensions", RFC 4035, March 2005. [RFC4592] Lewis, E., "The Role of Wildcards in the Domain Name System", RFC 4592, July 2006. [RFC4648] Josefsson, S., "The Base16, Base32, and Base64 Data Encodings", RFC 4648, October 2006. [RFC5155] Laurie, B., Sisson, G., Arends, R., and D. Blacka, "DNS Security (DNSSEC) Hashed Authenticated Denial of Existence", RFC 5155, March 2008. [RFC6672] Rose, S. and W. Wijngaards, "DNAME Redirection in the DNS", RFC 6672, June 2012.9.2.8.2. Informative References[I-D.arends-dnsnr] Arends, R.,[DNSEXT-NSEC2] Laurie, B., "DNSSECNon- Repudiation Resource Record", draft-arends-dnsnr-00 (workNSEC2 Owner and RDATA Format", Work inprogress), JulyProgress, October 2004.[I-D.ietf-dnsext-not-existing-rr][DNSEXT] Josefsson, S., "Authenticating denial of existence in DNS with minimum disclosure",draft-ietf- dnsext-not-existing-rr-01 (workWork inprogress),Progress, November 2000.[I-D.laurie-dnsext-nsec2v2] Laurie, B.,[DNSNR-RR] Arends, R., "DNSSECNSEC2 Owner and RDATA Format", draft-laurie-dnsext-nsec2v2-00 (workNon-Repudiation Resource Record", Work inprogress), DecemberProgress, June 2004. [Err3441] RFC Errata, "Errata ID 3441", RFC 5155, <http://www.rfc-editor.org>. [RFC2535] Eastlake, D., "Domain Name System Security Extensions", RFC 2535, March 1999. [RFC3655] Wellington, B. and O. Gudmundsson, "Redefinition of DNS Authenticated Data (AD) bit", RFC 3655, November 2003. [RFC3755] Weiler, S., "Legacy Resolver Compatibility for Delegation Signer (DS)", RFC 3755, May 2004. [RFC4470] Weiler, S. and J. Ihren, "Minimally Covering NSEC Records and DNSSEC On-line Signing", RFC 4470, April 2006. [RFC4956] Arends, R., Kosters, M., and D. Blacka, "DNS Security (DNSSEC) Opt-In", RFC 4956, July 2007.[RFC5155-errata3441] Lewis, E., "Technical Errata against RFC 5155 (not acknowledged)", January 2013.[Unbound] NLnet Labs, "Unbound: a validating, recursive, and caching DNS resolver", 2006, <http://unbound.net>. [phreebird] Kaminsky, D., "Phreebird: a DNSSEC proxy", January 2011,<http:// dankaminsky.com/phreebird/>.<http://dankaminsky.com/phreebird/>. Appendix A.On-lineOnline Signing: Minimally Covering NSEC Records An NSEC record lists the next existing name in azone,zone and thus makes it trivial to retrieve all the names from the zone. This can also be done with NSEC3, but an adversary will then retrieve all the hashed names. With DNSSECon-lineonline signing, zone walking can be prevented by faking the next owner name. To prevent retrieval of the next owner name with NSEC, a different, non-existing (according to the existence rules in[]#RFC4592,[RFC4592], Section 2.2) name is used. However, not just any name can be used because a validator may make assumptionsonabout the size of the span the NSEC record covers. The span must be large enough to cover theQNAME,QNAME but not too large that it covers existing names. [RFC4470] introduces a scheme for generating minimally covering NSEC records. These records use a next owner name that is lexically closer to the NSEC owner name than the actual next owner name, ensuring that no existing names are covered. The next owner name can be derived from the QNAME with the use of so-called epsilon functions. For example, to deny the existence of "b.example.org" in the zone from Section 3.2, the following NSEC record could have been generated: a.example.org. NSEC c.example.org. RRSIG NSEC This record also proves that "b.example.org" also does not exist, but an adversary _cannot_ use the next owner name in azone walkingzone-walking attack. Note the type bitmap only has the RRSIG and NSECset,set because [RFC4470] states: The generated NSEC record's type bitmap MUST have the RRSIG and NSEC bits set and SHOULD NOT have any other bits set. This is because the NSEC records may appear at names that did not exist before the zone was signed. In thiscasecase, however, "a.example.org" exists with other RRtypestypes, and we could have also set the A and TXT types in the bitmap. Because DNS ordering is very strict, the span should be shortened to a minimum. In order to do so, the last character in the leftmost label of the NSEC owner name needs to bedecrementeddecremented, and the label must be filled with octets of value 255 until the label length reaches the maximum of 63 octets. The next owner name is the QNAME with a leading label with a single null octet added. This gives the following minimally covering record for "b.example.org": a\255\255\255\255\255\255\255\255\255\255\255\255\255\255\255\255\255 \255\255\255\255\255\255\255\255\255\255\255\255\255\255\255\255\255 \255\255\255\255\255\255\255\255\255\255\255\255\255\255\255\255\255 \255\255\255\255\255\255\255\255\255\255\255.example.org. ( NSEC \000.b.example.org. RRSIG NSEC ) Appendix B.On-lineOnline Signing: NSEC3 White Lies The same principle of minimally covering spans can be applied to NSEC3 records. This mechanism has been dubbed "NSEC3 White Lies" when it was implemented in Phreebird [phreebird]. Here, the NSEC3 owner name is the hash of the QNAME minusoneone, and the next owner name is the hash of the QNAME plus one. The following NSEC3 white lie denies "b.example.org" (recall that this hashes to "iuu8l5lmt76jeltp0bir3tmg4u3uu8e7"): iuu8l5lmt76jeltp0bir3tmg4u3uu8e6.example.org. ( NSEC3 1 0 2 DEAD IUU815LMT76JELTP0BIR3TMG4U3UU8E8 ) The type bitmap is empty in this case. If the hash of "b.example.org" - 1 is a collision with an existing name, the bitmap should have been filled with the RR types that exist at that name. This record actually denies the existence of the next closer name (which is conveniently "b.example.org"). Ofcoursecourse, the NSEC3 records to match the closest encloser and the one to deny the wildcard are still required. These can be generated too: # Matching `example.org`: `15bg9l6359f5ch23e34ddua6n1rihl9h` 15bg9l6359f5ch23e34ddua6n1rihl9h.example.org. ( NSEC3 1 0 2 DEAD 15BG9L6359F5CH23E34DDUA6N1RIHL9I NS SOA RRSIG DNSKEY NSEC3PARAM ) # Covering `*.example.org`: `22670trplhsr72pqqmedltg1kdqeolb7` 22670trplhsr72pqqmedltg1kdqeolb6.example.org.( NSEC3 1 0 2 DEAD 22670TRPLHSR72PQQMEDLTG1KDQEOLB8 ) Appendix C. List of Hashed Owner Names The following owner names are used in this document. The origin for these names is "example.org".+---------------+------------------------------------++----------------+-------------------------------------+ | Original Name | Hashed Name |+---------------+------------------------------------++----------------+-------------------------------------+ | "a" | "04sknapca5al7qos3km2l9tl3p5okq4c" | | "1.h" | "117gercprcjgg8j04ev1ndrk8d1jt14k" | | "@" | "15bg9l6359f5ch23e34ddua6n1rihl9h" | | "h" | "1avvqn74sg75ukfvf25dgcethgq638ek" | | "*" | "22670trplhsr72pqqmedltg1kdqeolb7" | | "3" | "75b9id679qqov6ldfhd8ocshsssb6jvq" | | "2" | "7t70drg4ekc28v93q7gnbleopa7vlp6q" | | "3.3" | "8555t7qegau7pjtksnbchg4td2m0jnpj" | | "d" | "a6edkb6v8vl5ol8jnqqlt74qmj7heb84" | | "*.2" | "fbq73bfkjlrkdoqs27k5qf81aqqd7hho" | | "b" | "iuu8l5lmt76jeltp0bir3tmg4u3uu8e7" | | "x.2" | "ndtu6dste50pr4a1f2qvr1v31g00i2i1" |+---------------+------------------------------------++----------------+-------------------------------------+ Table 1: Hashedowner namesOwner Names for "example.org" inhash order. Appendix D. Changelog [This section should be removed by the RFC editor before publishing] D.1. -00 1. Initial document. D.2. -01 1. Style and language changes; 2. Figure captions; 3. Security considerations added; 4. Fix erroneous NSEC3 RR; 5. Section on CNAMEs added; 6. More detailed text on closest encloser proof. D.3. -02 1. Lowercase NSEC3 hashed ownernames and add reference to Base32; 2. Process the comments from Joe Abley and Geoff Huston. * Added section about Opt-Out; * Move experimental records in their own section; * Added DNAME reference with respect to wildcards; * Clarify the difference between the wildcard answers; * Add more context about the NO record; * Elaborate more about the EXIST records and its problems; * Added more text about the NSEC3PARAM records; * Apply assorted fixes throughout the document; * Moved table with hashed owner names to appendix. D.4. -03 1. Changed affiliation for R. Gieben; 2. Some minor updates. D.5. -04 1. Added NS record in all zone examples; 2. Some tweaks in the text regarding on-line signing; 3. Add more text on a non-working "generic non-existence records". 4. Add appendix on on-line signing; 5. Add text on usefulness of NSEC3. D.6. -05 1. Minor fixes and adjustments.Hash Order Authors' Addresses R. (Miek) Gieben GooglePhone:EMail: miek@google.comURI:W. (Matthijs) Mekking NLnet Labs Science Park 400Amsterdam,Amsterdam 1098 XH NLPhone:EMail: matthijs@nlnetlabs.nl URI: http://www.nlnetlabs.nl/