Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3391))

Included in the following conference series:

Abstract

The Domain Name System Security Extensions (DNSSEC) architecture is based on public-key cryptography. A secure DNS zone has one or more keys and signs its resource records with these keys in order to provide two security services: data integrity and authentication. These services allow to protect DNS transactions and permit the detection of attempted attacks on DNS.

The DNSSEC validation process is based on the establishment of a chain of trust between zones. This chain needs a secure entry point: a DNS zone whose at least one key is trusted. In this paper we study a critical problem associated to the key rollover in DNSSEC: the trusted keys rollover problem. We propose an algorithm that allows a resolver to update its trusted keys automatically and in a secure way without any delay or any break of the DNS service.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Eastlake, D.: Domain Name System Security Extensions. RFC 2535 (1999)

    Google Scholar 

  2. Arends, R., Larson, M., Massey, D., Rose, S.: DNS Security Introduction and Requirements. Draft IETF, work in progress (2004)

    Google Scholar 

  3. Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: Protocol Modifications for the DNS Security Extensions. Draft IETF, work in progress (2004)

    Google Scholar 

  4. Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: Resource Records for the DNS Security Extensions. Draft IETF, work in progress (2004)

    Google Scholar 

  5. Gieben, R.: Chain of Trust. Master’s Thesis, NLnet Labs (2001)

    Google Scholar 

  6. Kolkman, O., Schlyter, J., Lewis, E.: Domain Name System KEY (DNSKEY) Resource Record (RR) Secure Entry Point (SEP) Flag. RFC 3757 (2004)

    Google Scholar 

  7. Guette, G., Courtay, O.: KRO: A Key RollOver Algorithm for DNSSEC. In: International Conference on Information and Communication (ICICT 2003) (2003)

    Google Scholar 

  8. Mockapetris, P.: Domain Names - Concept and Facilities. RFC 1034 (1987)

    Google Scholar 

  9. Albitz, P., Liu, C.: DNS and BIND, 4th edn. O’Reilly & Associates, Inc., Sebastopol (2002)

    Google Scholar 

  10. Gundmundsson, O.: Delegation Signer Resource Record. RFC 3658 (2003)

    Google Scholar 

  11. Eastlake, D.: Secret Key Establishment for DNS (TKEY RR). RFC 2930 (2000)

    Google Scholar 

  12. Massey, D., Rose, S.: Limiting the Scope of the KEY Resource Record (RR). RFC 3445 (2002)

    Google Scholar 

  13. Kolkman, O., Gieben, R.: DNSSEC operational practices. Draft IETF, work in progress (2004)

    Google Scholar 

  14. St. Johns, M.: Automated Updates of DNSSEC Trust Anchors. Draft IETF, work in progress (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Guette, G., Cousin, B., Fort, D. (2005). Algorithm for DNSSEC Trusted Key Rollover. In: Kim, C. (eds) Information Networking. Convergence in Broadband and Mobile Networking. ICOIN 2005. Lecture Notes in Computer Science, vol 3391. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30582-8_71

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30582-8_71

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24467-7

  • Online ISBN: 978-3-540-30582-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics