-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathDNSSEC.java
2296 lines (1530 loc) · 90.9 KB
/
DNSSEC.java
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
Root DNSSEC Design Team T. Okubo
VeriSign
F. Ljunggren
Kirei
R. Lamb
ICANN
J. Schlyter
Kirei
May 28, 2010
DNSSEC Practice Statement for the Root Zone ZSK operator
Abstract
This document is the DNSSEC Practice Statement (DPS) for the Root
Zone Zone Signing Key (ZSK) operator. It states the practices and
provisions that are used to provide Root Zone Signing and Zone
distribution services. These include, but are not limited to:
issuing, managing, changing and distributing DNS keys in accordance
with the specific requirements of the U.S. Department of Commerce.
Copyright Notice
Copyright 2010 by VeriSign, Inc., and by Internet Corporation for
Assigned Names and Numbers. This work is based on the Certification
Practice Statement, Copyright 1996-2004 by VeriSign, Inc. Used by
Permission. All Rights Reserved.
Trademark Notices
VERISIGN is a registered trademark of VeriSign, Inc.
ICANN is a registered trademark of The Internet Corporation for
Assigned Names and Numbers.
Okubo, et al. [Page 1]
Root Zone ZSK DPS May 2010
Table of Contents
1. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.2. Document name and identification . . . . . . . . . . . . . 7
1.3. Community and Applicability . . . . . . . . . . . . . . . 7
1.3.1. IANA Functions Operator . . . . . . . . . . . . . . . 7
1.3.2. Root Zone Administrator . . . . . . . . . . . . . . . 7
1.3.3. Root Zone Maintainer . . . . . . . . . . . . . . . . . 7
1.3.4. Root Server Operators . . . . . . . . . . . . . . . . 8
1.3.5. Root Zone Key Signing Key Operator . . . . . . . . . . 8
1.3.6. Root Zone Zone Signing Key Operator . . . . . . . . . 8
1.3.7. Child zone manager . . . . . . . . . . . . . . . . . . 9
1.3.8. Relying Party . . . . . . . . . . . . . . . . . . . . 9
1.3.9. Applicability . . . . . . . . . . . . . . . . . . . . 9
1.4. Specification Administration . . . . . . . . . . . . . . . 10
1.4.1. Specification administration organization . . . . . . 10
1.4.2. Contact Information . . . . . . . . . . . . . . . . . 10
1.4.3. Specification change procedures . . . . . . . . . . . 10
2. PUBLICATION AND REPOSITORIES . . . . . . . . . . . . . . . . . 11
2.1. Repositories . . . . . . . . . . . . . . . . . . . . . . . 11
2.2. Publication of key signing keys . . . . . . . . . . . . . 11
2.3. Access controls on repositories . . . . . . . . . . . . . 11
3. OPERATIONAL REQUIREMENTS . . . . . . . . . . . . . . . . . . . 11
3.1. Meaning of domain names . . . . . . . . . . . . . . . . . 11
3.2. Activation of DNSSEC for child zone . . . . . . . . . . . 12
3.3. Identification and authentication of child zone manager . 12
3.4. Registration of delegation signer (DS) records . . . . . . 12
3.5. Method to prove possession of private key . . . . . . . . 12
3.6. Removal of DS resource records . . . . . . . . . . . . . . 12
3.6.1. Who can request removal . . . . . . . . . . . . . . . 12
3.6.2. Procedure for removal request . . . . . . . . . . . . 12
3.6.3. Emergency removal request . . . . . . . . . . . . . . 12
4. FACILITY, MANAGEMENT AND OPERATIONAL CONTROLS . . . . . . . . 12
4.1. Physical Controls . . . . . . . . . . . . . . . . . . . . 12
4.1.1. Site location and construction . . . . . . . . . . . . 13
4.1.2. Physical access . . . . . . . . . . . . . . . . . . . 13
4.1.3. Power and air conditioning . . . . . . . . . . . . . . 13
4.1.4. Water exposures . . . . . . . . . . . . . . . . . . . 14
4.1.5. Fire prevention and protection . . . . . . . . . . . . 14
4.1.6. Media storage . . . . . . . . . . . . . . . . . . . . 14
4.1.7. Waste disposal . . . . . . . . . . . . . . . . . . . . 14
4.1.8. Off-site backup . . . . . . . . . . . . . . . . . . . 14
4.2. Procedural Controls . . . . . . . . . . . . . . . . . . . 14
4.2.1. Trusted roles . . . . . . . . . . . . . . . . . . . . 14
4.2.2. Number of persons required per task . . . . . . . . . 15
4.2.3. Identification and authentication for each role . . . 16
4.2.4. Tasks requiring separation of duties . . . . . . . . . 16
Okubo, et al. [Page 2]
Root Zone ZSK DPS May 2010
4.3. Personnel Controls . . . . . . . . . . . . . . . . . . . . 16
4.3.1. Qualifications, experience, and clearance
requirements . . . . . . . . . . . . . . . . . . . . . 16
4.3.2. Background check procedures . . . . . . . . . . . . . 16
4.3.3. Training requirements . . . . . . . . . . . . . . . . 17
4.3.4. Retraining frequency and requirements . . . . . . . . 18
4.3.5. Job rotation frequency and sequence . . . . . . . . . 18
4.3.6. Sanctions for unauthorized actions . . . . . . . . . . 18
4.3.7. Contracting personnel requirements . . . . . . . . . . 18
4.3.8. Documentation supplied to personnel . . . . . . . . . 18
4.4. Audit Logging Procedures . . . . . . . . . . . . . . . . . 18
4.4.1. Types of events recorded . . . . . . . . . . . . . . . 19
4.4.2. Frequency of processing log . . . . . . . . . . . . . 19
4.4.3. Retention period for audit log . . . . . . . . . . . . 20
4.4.4. Protection of audit log . . . . . . . . . . . . . . . 20
4.4.5. Audit log backup procedures . . . . . . . . . . . . . 20
4.4.6. Audit collection system . . . . . . . . . . . . . . . 20
4.4.7. Notification to event-causing subject . . . . . . . . 21
4.4.8. Vulnerability assessments . . . . . . . . . . . . . . 21
4.5. Compromise and Disaster Recovery . . . . . . . . . . . . . 21
4.5.1. Incident and compromise handling procedures . . . . . 21
4.5.2. Corrupted computing resources, software, and/or
data . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.5.3. Entity private key compromise procedures . . . . . . . 21
4.5.4. Business Continuity and IT Disaster Recovery
Capabilities . . . . . . . . . . . . . . . . . . . . . 22
4.6. Entity termination . . . . . . . . . . . . . . . . . . . . 23
5. TECHNICAL SECURITY CONTROLS . . . . . . . . . . . . . . . . . 23
5.1. Key Pair Generation and Installation . . . . . . . . . . . 23
5.1.1. Key pair generation . . . . . . . . . . . . . . . . . 23
5.1.2. Public key delivery . . . . . . . . . . . . . . . . . 24
5.1.3. Public key parameters generation and quality
checking . . . . . . . . . . . . . . . . . . . . . . . 24
5.1.4. Key usage purposes . . . . . . . . . . . . . . . . . . 24
5.2. Private key protection and Cryptographic Module
Engineering Controls . . . . . . . . . . . . . . . . . . . 24
5.2.1. Cryptographic module standards and controls . . . . . 24
5.2.2. Private key (m-of-n) multi-person control . . . . . . 24
5.2.3. Private key escrow . . . . . . . . . . . . . . . . . . 25
5.2.4. Private key backup . . . . . . . . . . . . . . . . . . 25
5.2.5. Private key storage on cryptographic module . . . . . 25
5.2.6. Private key archival . . . . . . . . . . . . . . . . . 25
5.2.7. Private key transfer into or from a cryptographic
module . . . . . . . . . . . . . . . . . . . . . . . . 25
5.2.8. Method of activating private key . . . . . . . . . . . 25
5.2.9. Method of deactivating private key . . . . . . . . . . 26
5.2.10. Method of destroying private key . . . . . . . . . . . 26
5.3. Other Aspects of Key Pair Management . . . . . . . . . . . 26
Okubo, et al. [Page 3]
Root Zone ZSK DPS May 2010
5.3.1. Public key archival . . . . . . . . . . . . . . . . . 26
5.3.2. Key usage periods . . . . . . . . . . . . . . . . . . 26
5.4. Activation data . . . . . . . . . . . . . . . . . . . . . 26
5.4.1. Activation data generation and installation . . . . . 26
5.4.2. Activation data protection . . . . . . . . . . . . . . 26
5.4.3. Other aspects of activation data . . . . . . . . . . . 27
5.5. Computer Security Controls . . . . . . . . . . . . . . . . 27
5.6. Network Security Controls . . . . . . . . . . . . . . . . 27
5.7. Timestamping . . . . . . . . . . . . . . . . . . . . . . . 27
5.8. Life Cycle Technical Controls . . . . . . . . . . . . . . 27
5.8.1. System development controls . . . . . . . . . . . . . 27
5.8.2. Security management controls . . . . . . . . . . . . . 28
5.8.3. Life cycle security controls . . . . . . . . . . . . . 28
6. ZONE SIGNING . . . . . . . . . . . . . . . . . . . . . . . . . 28
6.1. Key lengths and algorithms . . . . . . . . . . . . . . . . 28
6.2. Authenticated denial of existence . . . . . . . . . . . . 29
6.3. Signature format . . . . . . . . . . . . . . . . . . . . . 29
6.4. Zone signing key roll-over . . . . . . . . . . . . . . . . 29
6.5. Key signing key roll-over . . . . . . . . . . . . . . . . 29
6.6. Signature life-time and re-signing frequency . . . . . . . 29
6.7. Verification of zone signing key set . . . . . . . . . . . 31
6.8. Verification of resource records . . . . . . . . . . . . . 31
6.9. Resource records time-to-live . . . . . . . . . . . . . . 32
7. COMPLIANCE AUDIT . . . . . . . . . . . . . . . . . . . . . . . 32
7.1. Frequency of entity compliance audit . . . . . . . . . . . 32
7.2. Identity/qualifications of auditor . . . . . . . . . . . . 32
7.3. Auditor's relationship to audited party . . . . . . . . . 32
7.4. Topics covered by audit . . . . . . . . . . . . . . . . . 32
7.5. Actions taken as a result of deficiency . . . . . . . . . 33
7.6. Communication of results . . . . . . . . . . . . . . . . . 33
8. LEGAL MATTERS . . . . . . . . . . . . . . . . . . . . . . . . 33
8.1. Fees . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
8.2. Financial responsibility . . . . . . . . . . . . . . . . . 33
8.3. Confidentiality of business information . . . . . . . . . 33
8.3.1. Scope of confidential information . . . . . . . . . . 33
8.3.2. Information not within the scope of confidential
information . . . . . . . . . . . . . . . . . . . . . 34
8.3.3. Responsibility to protect confidential information . . 34
8.4. Privacy of personal information . . . . . . . . . . . . . 34
8.4.1. Information treated as private . . . . . . . . . . . . 34
8.4.2. Information not deemed private . . . . . . . . . . . . 34
8.4.3. Responsibility to protect private information . . . . 34
8.4.4. Disclosure Pursuant to Judicial or Administrative
Process . . . . . . . . . . . . . . . . . . . . . . . 34
8.5. Limitations of liability . . . . . . . . . . . . . . . . . 34
8.6. Term and termination . . . . . . . . . . . . . . . . . . . 35
8.6.1. Term . . . . . . . . . . . . . . . . . . . . . . . . . 35
8.6.2. Termination . . . . . . . . . . . . . . . . . . . . . 35
Okubo, et al. [Page 4]
Root Zone ZSK DPS May 2010
8.6.3. Dispute resolution provisions . . . . . . . . . . . . 35
8.6.4. Governing law . . . . . . . . . . . . . . . . . . . . 35
9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 35
9.1. Normative References . . . . . . . . . . . . . . . . . . . 35
9.2. Informative References . . . . . . . . . . . . . . . . . . 36
Appendix A. Table of acronyms and definitions . . . . . . . . . . 36
A.1. Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . 36
A.2. Definitions . . . . . . . . . . . . . . . . . . . . . . . 38
Appendix B. History of changes . . . . . . . . . . . . . . . . . 41
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 41
Okubo, et al. [Page 5]
Root Zone ZSK DPS May 2010
1. INTRODUCTION
This document is the VeriSign DNSSEC Practice Statement (DPS) as the
Root Zone (RZ) Zone Signing Key (ZSK) Operator. It states the
practices and provisions that VeriSign on behalf of the U.S.
Department of Commerce (DoC), employ in providing Root Zone Signing
and Zone distribution services that include, but are not limited to,
issuing, managing, changing and distributing DNS keys in accordance
with the specific requirements of the DoC.
1.1. Overview
The Domain Name System Security Extensions (DNSSEC) is a set of IETF
specifications for adding origin authentication and data integrity to
the Domain Name System. DNSSEC provides a way for software to
validate that Domain Name System (DNS) data have not been modified
during Internet transit. This is done by incorporating public key
cryptography into the DNS hierarchy to form a chain of trust
originating at the root zone.
The DNS was not originally designed with strong security mechanisms
to provide integrity and authenticity of DNS data. Over the years, a
number of vulnerabilities have been discovered that threaten the
reliability and trustworthiness of the system. DNSSEC addresses
these vulnerabilities by adding data origin authentication, data
integrity verification and authenticated denial of existence
capabilities to the DNS.
This DPS is specifically applicable to The Root Zone Maintainer and
Root Zone Zone Signing Key Operator. More generally, this document
will provide the governing policies and provisions as it relates to
the management, security and technical specifications of DNSSEC
operation at the Root. This document will be under the control and
management of VeriSign with guidance and direction from the DoC.
Information in this document and subsequent documents will be made
public as required.
The DPS is only one of a set of documents relevant to VeriSign's
management of the Root Zone's ZSK. Other documents include:
ancillary confidential security and operational documents that
supplement the DPS by providing more detailed requirements, such as:
The VeriSign Physical Security Policy, which sets forth security
principles governing the DPS infrastructure, The VeriSign Information
and Physical Security Policies and VeriSign Security and Audit
Requirements which describes detailed requirements for VeriSign
concerning personnel, physical, telecommunications, logical, and
cryptographic key management security, and Key Ceremony Reference
Guide, which presents detailed key management operational
Okubo, et al. [Page 6]
Root Zone ZSK DPS May 2010
requirements. In many instances, the DPS refers to these ancillary
documents for specific, detailed practices implementing VeriSign
proprietary standards where including the specifics in the DPS could
compromise the security of the RZ ZSK's operation.
1.2. Document name and identification
Document title:
DNSSEC Practice Statement for the DNS Root Zone Maintainer
Version:
00 ($Revision: 1400 $)
Date:
$Date: 2010-06-07 17:31:31 -0400 (Mon, 07 Jun 2010) $
1.3. Community and Applicability
1.3.1. IANA Functions Operator
The Internet Corporation for Assigned Names and Numbers (ICANN) acts
as the Internet Assigned Numbers Authority (IANA) Functions Operator
under contract to the U.S. Department of Commerce, National
Telecommunications and Information Administration (DoC/NTIA). The
IANA Functions Operator accepts change requests to the contents of
the Root Zone from the Top Level Domain (TLD) Operators and validates
those requests. After validation occurs, the IANA Functions Operator
submits the requests to the DoC/NTIA for authorization and sends a
copy to the Root Zone Maintainer for implementation once
authorization is received.
1.3.2. Root Zone Administrator
The Root Zone Administrator is the National Telecommunications and
Information Administration, which is an agency in the U.S. Department
of Commerce that performs the authorization for changes to the Root
Zone. This role differs from the third party auditors who conduct
the compliance audit and generates the audit report.
1.3.3. Root Zone Maintainer
VeriSign, per the Cooperative Agreement with the U.S. Department of
Commerce, is acting as the Root Zone Maintainer. The Root Zone
Maintainer is performing the function of receiving change requests to
the Root Zone from the IANA Functions Operator, receiving
authorization to make changes to the Root Zone from the Root Zone
Administrator, implementing the changes, generating a new Root Zone
File and distributing it to the Root Server Operators.
Okubo, et al. [Page 7]
Root Zone ZSK DPS May 2010
1.3.4. Root Server Operators
The Root Server Operators consists of 12 different professional
engineering entities responsible for providing the root zone to the
public via the 13 Root Zone Authoritative Name Servers. The Root
Server Operators are not involved in the making of any policies or
modification of data.
1.3.5. Root Zone Key Signing Key Operator
ICANN is the Root Zone Key Signing Key Operator (as the IANA
Functions Operator) performing the function of generating the Root
Zone's Key Signing Key (KSK) and signing the Root Keyset, including
the Root Zone Zone Signing Key (RZ ZSK), using the KSK. The Root
Zone KSK Operator is also responsible for securely generating and
storing the private keys and distributing the public portion of the
KSK as the Trust Anchor to the relying parties.
The Root Zone KSK (RZ KSK) operator is responsible for:
(1) Generating and protecting the private component of the RZ KSK.
(2) Securely importing public key components from the RZ ZSK
Operator.
(3) Authenticating and validating the public RZ ZSK keyset.
(4) Securely signing the RZ ZSK keyset.
(5) Securely transmitting the signed RZ ZSK key set to the RZ ZSK
Operator.
(6) Securely exporting the RZ KSK public key components.
(7) Issuing an emergency key roll-over within a reasonable time if
any private key component associated with the zone is lost or
suspected to be compromised.
1.3.6. Root Zone Zone Signing Key Operator
The Root Zone Zone Signing Key Operator is VeriSign performing the
function of generating the Root Zone's Zone Signing Key (ZSK) and
signing the Root Zone File using the ZSK.
The Root Zone Zone Signing Key (RZ ZSK) Operator is also responsible
for securely generating and storing the private keys and distributing
the public portion of the ZSK to the RZ KSK Operator for signing.
The Root Zone ZSK (RZ ZSK) operator is responsible for:
Okubo, et al. [Page 8]
Root Zone ZSK DPS May 2010
(1) Generating and protecting the private component of the RZ ZSK.
(2) Securely exporting and transmitting the public RZ ZSK component
to the RZ KSK Operator.
(3) Securely importing the signed RZ ZSK keyset from the RZ KSK
operator.
(4) Signing the Root Zone's resource records (optionally omitting
the DNSKEY resource record).
(5) Issue emergency key roll-over within a reasonable amount of time
if any private key associated with the zone is lost or suspected
to be compromised.
1.3.7. Child zone manager
The child zone (TLD) manager is a trustee for the delegated domain,
and as such responsible for providing registry services and operating
subordinate DNS servers. If a child zone is signed using DNSSEC, the
child zone manager is also responsible for:
(1) Generating the keys associated with its zone using a trustworthy
method.
(2) Registering and maintaining the shorthand representations of its
Key Signing Key (Delegation Signer Resource Record) in the
parent zone to establish the chain of trust.
(3) Taking reasonable precautions to prevent any loss, disclosure or
unauthorized use of the keys associated with its zone.
(4) Issuing emergency key roll-over within reasonable time if any
private key associated with its zone is lost or suspected to be
compromised.
1.3.8. Relying Party
A Relying Party is the entity relying on DNSSEC, such as security-
aware validating resolvers and other applications performing
validation of DNSSEC signatures.
The relying party must properly configure and update the Trust Anchor
as appropriate. The automated method described in RFC 5011 [RFC5011]
may be used.
Relying parties must also stay informed of any critical changes in
the Root Zone operation as notified by ICANN in accordance with Root
Zone Key Signing Key Operator's DPS section 2.1. [RZKSKDPS]
1.3.9. Applicability
This DPS is only applicable to the Root Zone, and more specifically
the RZ ZSK Operator. Each link in the chain of trust may have
entirely different requirements that can affect the end entity, and
Okubo, et al. [Page 9]
Root Zone ZSK DPS May 2010
is not governed by this DPS.
Entities must evaluate their own environments and its associated
threats and vulnerabilities to determine the level of risk they are
willing to accept.
1.4. Specification Administration
This DPS will be periodically reviewed and updated, as appropriate by
the RZ ZSK Operator Policy Management Authority (PMA). The PMA is
responsible for the management of the DPS and should be considered as
the point of contact for all matters related to the DPS. The PMA
notifies, and when appropriate, seeks the review and authorization
from DoC prior to taking action and/or modification of the DPS.
1.4.1. Specification administration organization
VeriSign Inc
21345 Ridgetop Circle
Dulles, VA 20166
USA
1.4.2. Contact Information
The DPS Practices Manager
VeriSign DNSSEC Policy Management Authority
c/o VeriSign, Inc
21345 Ridgetop Circle
Dulles, VA 20166
USA
+1 (703) 948-3200 (voice)
+1 (703) 421-4873 (fax)
1.4.3. Specification change procedures
Amendments to this DPS are made by the VeriSign DNSSEC Policy
Management Authority (PMA). Amendments will either be in the form of
a document containing an amended form of the DPS or an update.
Amended versions or updates will be linked to the Practices Updates
and Notices section of the VeriSign Repository located at:
https://www.verisign.com/repository/updates. (See section 2 for a
more detailed explanation of Repositories.) Updates supersede any
designated or conflicting provisions of the referenced version of the
DPS.
The PMA reserves the right to amend the DPS without notification for
amendments that are not material, including without limitation
Okubo, et al. [Page 10]
Root Zone ZSK DPS May 2010
corrections of typographical errors, changes to URLs, and changes to
contact information. The PMA's decision to designate amendments as
material or non-material is within the PMA's sole discretion.
Proposed amendments to the DPS will appear in the Practices Updates
and Notices section of the VeriSign Repository, which is located at:
https://www.verisign.com/repository/updates. The PMA solicits
proposed amendments to the DPS from the community. If the PMA
considers such an amendment desirable and proposes to implement the
amendment, the PMA will provide public notice of such amendment in
accordance with this section. Notwithstanding anything in the DPS,
to the contrary, if the PMA believes that material amendments to the
DPS are necessary immediately to stop or prevent a breach of the
security of any portion of it, the PMA is entitled to make such
amendments by publication in the VeriSign Repository. Such
amendments will be effective immediately upon publication.
2. PUBLICATION AND REPOSITORIES
2.1. Repositories
VeriSign, as the ZSK Operator, publishes the DPS in the VeriSign
repository section of VeriSign's web site at
https://www.verisign.com/repository/. Public access to this
repository will include the option of using an HTTPS-authenticated
channel.
2.2. Publication of key signing keys
Refer to the Root Zone Key Signing Key Operator's DPS for details
[RZKSKDPS].
2.3. Access controls on repositories
Information published in the repository portion of the VeriSign web
site is publicly-accessible information. Read only access to such
information is unrestricted. VeriSign has implemented logical and
physical security measures to prevent unauthorized persons from
adding, deleting, or modifying repository entries.
3. OPERATIONAL REQUIREMENTS
3.1. Meaning of domain names
Refer to the Root Zone Key Signing Key Operator's DPS for details
[RZKSKDPS].
Okubo, et al. [Page 11]
Root Zone ZSK DPS May 2010
3.2. Activation of DNSSEC for child zone
Refer to the Root Zone Key Signing Key Operator's DPS for details
[RZKSKDPS].
3.3. Identification and authentication of child zone manager
Refer to the Root Zone Key Signing Key Operator's DPS for details
[RZKSKDPS].
3.4. Registration of delegation signer (DS) records
VeriSign, as the Root Zone Maintainer, applies changes to the Root
Zone file based on requests from the IANA Functions Operator and
authorized by the Root Zone Administrator.
3.5. Method to prove possession of private key
Refer to the Root Zone Key Signing Key Operator's DPS for details
[RZKSKDPS].
3.6. Removal of DS resource records
3.6.1. Who can request removal
Refer to the Root Zone Key Signing Key Operator's DPS for details
[RZKSKDPS].
3.6.2. Procedure for removal request
Refer to the Root Zone Key Signing Key Operator's DPS for details
[RZKSKDPS].
3.6.3. Emergency removal request
Refer to the Root Zone Key Signing Key Operator's DPS for details
[RZKSKDPS].
4. FACILITY, MANAGEMENT AND OPERATIONAL CONTROLS
4.1. Physical Controls
As the RZ ZSK Operator, VeriSign has implemented the VeriSign
Physical Security Policy, which supports the security requirements of
this DPS. Compliance with these policies is included in VeriSign's
independent audit requirements described in section 7. VeriSign
Physical Security Policy contains sensitive security information and
Okubo, et al. [Page 12]
Root Zone ZSK DPS May 2010
is only available upon agreement with VeriSign. An overview of the
requirements is described below.
4.1.1. Site location and construction
VeriSign DNSSEC operations are conducted within a physically
protected environment that deters, prevents, and detects unauthorized
use of, access to, or disclosure of sensitive information and systems
whether covert or overt. VeriSign also maintains disaster recovery
facilities for its DNSSEC operations. VeriSign's disaster recovery
facilities are protected by multiple tiers of physical security
comparable to those of VeriSign's primary facility.
4.1.2. Physical access
VeriSign DNSSEC systems are protected by a minimum of four tiers of
physical security, with access to the lower tier required before
gaining access to the higher tier. Progressively restrictive
physical access privileges control access to each tier. Sensitive
DNSSEC operational activity, any activity related to the lifecycle of
the RZ ZSK, occur within very restrictive physical tiers. Access to
each tier requires the use of a proximity card employee badge.
Physical access is automatically logged and video recorded.
Additional tiers enforce individual access control through the use of
two factor authentication including biometrics. Unescorted
personnel, including visitors or employees without specific
authorization, are not allowed into such secured areas. The physical
security system includes additional tiers for key management security
which serves to protect both online and offline storage of Hardware
Security Modules (HSM) and keying material.
Areas used to create and store cryptographic material enforce dual
control, each through the use of two factor authentication including
biometrics. Online HSMs are protected through the use of locked
cabinets. Offline HSMs are protected through the use of tamper-
evident bags, locked safes, cabinets and containers. Access to HSMs
and keying material is restricted in accordance with VeriSign's
segregation of duties requirements. The opening and closing of
cabinets or containers in these tiers is logged for audit purposes.
4.1.3. Power and air conditioning
VeriSign's secure facilities are equipped with primary and backup:
-power systems to ensure continuous, uninterrupted access to electric
power and -heating/ventilation/air conditioning systems to control
temperature and relative humidity.
Okubo, et al. [Page 13]
Root Zone ZSK DPS May 2010
4.1.4. Water exposures
VeriSign has taken reasonable precautions to minimize the impact of
water exposure to VeriSign systems.
4.1.5. Fire prevention and protection
VeriSign has taken reasonable precautions to prevent and extinguish
fires or other damaging exposure to flame or smoke. VeriSign's fire
prevention and protection measures have been designed to comply with
local fire safety regulations.
4.1.6. Media storage
All media containing production software and data, audit, archive, or
backup information is stored within VeriSign facilities or in a
secure off-site storage facility with appropriate physical and
logical access controls designed to limit access to authorized
personnel and protect such media from accidental damage (e.g., water,
fire, and electromagnetic).
4.1.7. Waste disposal
Sensitive documents and materials are shredded before disposal.
Media used to collect or transmit sensitive information are rendered
unreadable before disposal. Cryptographic devices are physically
destroyed or zeroized in accordance with the manufacturers' guidance
prior to disposal. Other waste is disposed of in accordance with
VeriSign's normal waste disposal requirements.
4.1.8. Off-site backup
VeriSign performs routine backups of critical system data, audit log
data, and other sensitive information. Off-site backup media are
stored in a physically secure manner using a bonded third party
storage facility and VeriSign's East Coast disaster recovery
facility.
4.2. Procedural Controls
4.2.1. Trusted roles
VeriSign considers the categories of personnel identified in this
section as Trusted Persons having a Trusted Position. Persons
seeking to become Trusted Persons by obtaining a Trusted Position
must successfully complete the screening requirements set out in this
DPS.
Okubo, et al. [Page 14]
Root Zone ZSK DPS May 2010
Trusted Persons include all employees, contractors, and consultants
that have access to or control operations that may materially affect:
o Generation and protection of the private component of the Root
Zone Zone Signing Key;
o Secure export or import of any public components; and
o Generation and signing Zone File data.
Trusted roles include, but are not limited to:
o Naming resolution operations personnel;
o Cryptographic business operations personnel;
o Security personnel;
o System administration personnel;
o Designated engineering personnel; and
o Executives that are designated to manage infrastructural
trustworthiness.
4.2.2. Number of persons required per task
VeriSign has established, maintains, and enforces rigorous control
procedures to ensure the segregation of duties based on job
responsibility and to ensure that multiple Trusted Persons are
required to perform sensitive tasks. Policy and control procedures
are in place to ensure segregation of duties based on job
responsibilities.
The most sensitive tasks, such as access to and management of
cryptographic hardware (HSM) and associated key material require
multiple Trusted Persons. These internal control procedures are
designed to ensure that at a minimum, two trusted personnel are
required to have either physical or logical access to the device.
Access to cryptographic hardware is strictly enforced by multiple
Trusted Persons throughout its lifecycle, from incoming receipt and
inspection to final logical and/or physical destruction. Once a
module is activated with operational keys, further access controls
are invoked to maintain split control over physical access to the
device. Persons with physical access to modules do not hold "Secret
Shares" and vice versa.
Other manual operations such as the signing of Zone File Data,
require the participation of at least 2 Trusted Persons, or a
combination of at least one trusted person and an automated process.
Okubo, et al. [Page 15]
Root Zone ZSK DPS May 2010
4.2.3. Identification and authentication for each role
For all personnel seeking to become Trusted Persons, verification of
identity is performed through the personal (physical) presence of
such personnel before Trusted Persons performing VeriSign Human
Resources or security functions and a check of well-recognized forms
of identification (e.g., passports and driver's licenses). Identity
is further confirmed through the background checking procedures in
DPS section 4.3. VeriSign ensures that personnel have achieved
Trusted Status and departmental approval has been given before such
personnel are:
o issued access devices and granted access to the required
facilities,
o issued electronic credentials to access and perform specific
functions on VeriSign IT systems.
4.2.4. Tasks requiring separation of duties
Tasks requiring separation of duties include but are not limited to
the generation, implementation or destruction of Root Zone DNSSEC key
material.
Personnel holding a role in the multi-party access to the RZ KSK do
not hold a role in the multi-party access to the RZ ZSK, or vice
versa. Designated audit personnel may not participate in the multi-
person control for the RZ ZSK or KSK.
4.3. Personnel Controls
4.3.1. Qualifications, experience, and clearance requirements
VeriSign requires that personnel seeking to become Trusted Persons
present proof of the requisite background, qualifications, and
experience needed to perform their prospective job responsibilities
competently and satisfactorily, as well as proof of any government
clearances, if any, necessary to perform operations under government
contracts.
4.3.2. Background check procedures
All personnel with access to any cryptographic component used with
the Root Zone Signing process are required to pass a background check
extending back at least three years.
Prior to commencement of employment in a Trusted Role, VeriSign
conducts background checks which include the following:
Okubo, et al. [Page 16]
Root Zone ZSK DPS May 2010
o Confirmation of previous employment
o Check of professional references
o Confirmation of the highest or most relevant educational degree
obtained
o Check of credit/financial records to the extent allowed by
national laws for the individual's country of residence
o Search of criminal records (local, state or provincial, and
national)
o Search of drive's license records
o Search of Social Security Administration records
To the extent that any of the requirements imposed by this section
cannot be met due to a prohibition or limitation in local law or
other circumstances, VeriSign will utilize a substitute investigative
technique permitted by law that provides substantially similar
information, including but not limited to obtaining a background
check performed by the applicable governmental agency.
The factors revealed in a background check that may be considered
grounds for rejecting candidates for Trusted Positions or for taking
action against an existing Trusted Person generally include (but are
not limited to) the following:
o Misrepresentations made by the candidate or Trusted Person,
o Highly unfavorable or unreliable professional references,
o Indications of a lack of financial responsibility.
o Certain criminal convictions
Reports containing such information are evaluated by VeriSign human
resources and security personnel, who determine the appropriate
course of action in light of the type, magnitude, and frequency of
the behavior uncovered by the background check.
Such actions may include measures up to and including the
cancellation of offers of employment made to candidates for Trusted
Positions or the termination of existing Trusted Persons. The use of
information revealed in a background check to take such actions is
subject to the applicable federal, state, and local laws.
4.3.3. Training requirements
VeriSign provides its personnel with training upon hire as well as
the requisite on-the-job training needed for them to perform their
job responsibilities competently and satisfactorily. VeriSign
periodically reviews and enhances its training programs as necessary.
VeriSign's training programs are tailored to the individuals
responsibilities and include the following as relevant:
Okubo, et al. [Page 17]
Root Zone ZSK DPS May 2010
o Basic DNS/DNSSEC concepts
o Job responsibilities
o Use and operation of deployed hardware and software
o Security and operational policies and procedures
o Incident and compromise reporting and handling
o Disaster recovery and business continuity procedures
4.3.4. Retraining frequency and requirements
VeriSign provides refresher training and updates to their personnel
to the extent and frequency required to ensure that such personnel
maintain the required level of proficiency to perform their job
responsibilities competently and satisfactorily.
4.3.5. Job rotation frequency and sequence
Positions are rotated and replaced as needed.
4.3.6. Sanctions for unauthorized actions
Appropriate disciplinary actions are taken for unauthorized actions
with respect to this DPS and/or other violations of VeriSign policies
and procedures. Disciplinary actions may include measures up to and
including termination and are commensurate with the frequency and
severity of the unauthorized actions.
4.3.7. Contracting personnel requirements
In limited circumstances, independent contractors or consultants may
be used to fill Trusted Positions. Any such contractor or consultant
is held to the same functional and security criteria that apply to a
VeriSign employees in a comparable position. Independent contractors
and consultants who have not completed or passed the background check
procedures specified in DPS section 4.3 are permitted access to
VeriSign's secure facilities only to the extent they are escorted and
directly supervised by Trusted Persons at all times.
4.3.8. Documentation supplied to personnel
VeriSign provides its employees the requisite training and other
documentation needed to perform their job responsibilities
competently and satisfactorily.
4.4. Audit Logging Procedures