From the Beginning: Key Transitions in the First 15 Years of DNSSEC
Research output: Contribution to journal › Research article › Contributed › peer-review
Contributors
Abstract
When the global rollout of the DNS Security Extensions (DNSSEC) began in 2005, a first-of-its-kind trial started: The complexity of a core Internet protocol was magnified in favor of better security for the overall Internet. Thereby, the scale of the loosely-federated delegation in DNS became an unprecedented cryptographic key management challenge. Though fundamental for current and future operational success, our community lacks a clear notion of how to empirically evaluate the process of securely transitioning keys. In this paper, we propose two building blocks to formally characterize and assess key transitions. First, the anatomy of key transitions, i.e., measurable and well-defined properties of key changes; and second, a novel classification model based on this anatomy for describing key transition practices in abstract terms. This abstraction allows for classifying operational behavior. We apply our proposed transition anatomy and transition classes to describe the global DNSSEC deployment. Specifically, we use measurements from the first 15 years of the DNSSEC rollout to detect and understand which key transitions have been used to what degree and which rates of errors and warnings occurred. In contrast to prior work, we consider all possible transitions and not only 1:1 key rollovers. Our results show measurable gaps between prescribed key management processes and key transitions in the wild. We also find evidence that such noncompliant transitions are needed in operations.
Details
Original language | English |
---|---|
Pages (from-to) | 5265-5283 |
Number of pages | 19 |
Journal | IEEE Transactions on Network and Service Management |
Volume | 19 |
Issue number | 4 |
Publication status | Published - 1 Dec 2022 |
Peer-reviewed | Yes |
External IDs
Scopus | 85135756961 |
---|---|
ORCID | /0000-0002-3825-2807/work/142241897 |