ãããã¯ã¼ã¯ã¯ã¼ãã³ã°ã°ã«ã¼ã R. Arends Request for Comments: 4033 Telematica Instituut 廿¢(Obsoletes): 2535, 3008, 3090, 3445, 3655, 3658, R. Austein 3755, 3757, 3845 ISC æ´æ°(Updates): 1034, 1035, 2136, 2181, 2308, 3225, M. Larson 3007, 3597, 3226 VeriSign åé¡: æ¨æºåéç¨(Standards Track) D. Massey Colorado State University S. Rose NIST 2005å¹´3æ DNSã»ãã¥ãªãã£æ¡å¼µ(DNSSEC)ã®ç´¹ä»ã¨ãã®è¦ä»¶ æ¬ææ¸ã®ä½ç½®ã¥ã æ¬ææ¸ã¯ã¤ã³ã¿ã¼ãããã³ãã¥ããã£ã®ããã«ã¤ã³ã¿ã¼ãããæ¨æºåéç¨ã« ãããããã³ã«ãè¦å®ããæ¹åã«åããè°è«ã¨ææ¡ãæ±ãããã®ã§ããã ãã®ãããã³ã«ã®æ¨æºåã®ç¶æ³ã«ã¤ãã¦ã¯"Internet Official Protocol Standards"(STD 1)ã®ææ°çãåç §ã®ãã¨ãæ¬ææ¸ã®é å¸ã¯å¶éãããªãã è使¨©è¡¨ç¤º Copyright (C) The Internet Society (2005). è¦æ¨ DNSã»ãã¥ãªãã£æ¡å¼µ(DNSSEC)ã¯ããã¼ã¿ã®åºèªã®èªè¨¼æ©è½ã¨ãã¼ã¿ã®å®å ¨æ§ ä¿è·æ©è½ãDNSã«è¿½å ãããã®ã§ãããæ¬ææ¸ã¯ãããã®æ¡å¼µã«ã¤ãã¦ç´¹ä»ãã ãã®æ©è½ã¨å¶éã«ã¤ãã¦è¨è¿°ãããæ¬ææ¸ã¯ã¾ããDNSSECãã©ã®ãã㪠ãµã¼ãã¹ãæä¾ããã©ã®ãããªãµã¼ãã¹ã¯æä¾ããªãã®ãã«ã¤ãã¦ã è«ãããæå¾ã«DNSSECã«ã¤ãã¦è¨è¿°ãã¦ããæ§ã ãªææ¸ã®é¢ä¿ã説æããã Arends, et al. Standards Track [Page 1] RFC 4033 DNS Security Introduction and Requirements March 2005 ç®æ¬¡ 1. ã¯ããã« . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2. éè¦ãªDNSSECç¨èªã®å®ç¾© . . . . . . . . . . . . . . . . . . . 3 3. DNSSECãæä¾ãããµã¼ãã¹ . . . . . . . . . . . . . . . . . . 7 3.1. ãã¼ã¿çæå ã®èªè¨¼ã¨ãã¼ã¿ã®å®å ¨æ§ä¿è· . . . . . . . . 7 3.2. ååããã³ã¿ã¤ãã®ä¸å¨è¨¼æ . . . . . . . . . . . . . . 9 4. DNSSECãæä¾ããªããµã¼ãã¹ . . . . . . . . . . . . . . . . . 9 5. DNSSECææ¸ç¾¤ã®å¯¾è±¡ç¯å²ã¨ã©ã¹ããããåé¡(Last Hop Issues). . 9 6. ãªã¾ã«ãã«é¢ããèæ ®ç¹ . . . . . . . . . . . . . . . . . . . 10 7. ã¹ã¿ããªã¾ã«ãã«é¢ããèæ ®ç¹ . . . . . . . . . . . . . . . . 11 8. ã¾ã¼ã³ã«é¢ããèæ ®ç¹ . . . . . . . . . . . . . . . . . . . . 12 8.1. TTLå¤ã¨RRSIGã®æå¹æéã¨ã®é¢ä¿ . . . . . . . . . . . . 13 8.2. ã¾ã¼ã³ã§æ°ãã«çºçããæéä¾åã®åé¡ . . . . . . . . . 13 9. ãã¼ã ãµã¼ãã«é¢ããèæ ®ç¹ . . . . . . . . . . . . . . . . . 13 10. DNSSECã®é¢é£ææ¸ . . . . . . . . . . . . . . . . . . . . . . 14 11. IANAã«é¢ããèæ ®ç¹ . . . . . . . . . . . . . . . . . . . . . 15 12. ã»ãã¥ãªãã£ã«é¢ããèæ ®ç¹ . . . . . . . . . . . . . . . . . 15 13. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 17 14. References . . . . . . . . . . . . . . . . . . . . . . . . . 17 14.1. Normative References . . . . . . . . . . . . . . . . . 17 14.2. Informative References . . . . . . . . . . . . . . . . 18 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 20 Full Copyright Statement . . . . . . . . . . . . . . . . . . . . 21 1. ã¯ããã« æ¬ææ¸ã¯DNSã»ãã¥ãªãã£æ¡å¼µ(DNSSEC)ãç´¹ä»ãããæ¬ææ¸ã¨2ã¤ã®é¢é£ææ¸ ([RFC4034]ã¨[RFC4035])ã¯ãRFC 2535[RFC2535]ã¨ããã«å è¡ããåãçµã¿ã§ å®ç¾©ãããã»ãã¥ãªãã£æ¡å¼µãæ´æ°ããæç¢ºã«ããã¨åæã«ããæ´ç·´ãããã® ã§ãããDNSSECã¯ãå¹¾ã¤ãã®æ°ãããªã½ã¼ã¹ã¬ã³ã¼ãã¿ã¤ãã¨æ¢åã® DNSãããã³ã«([RFC1035])ã®ä¿®æ£ã¨ã§æ§æããããæ¬ææ¸ã¯æ°ãã ã¬ã³ã¼ãã¨ãããã³ã«ã®ä¿®æ£ç¹ãå ¨ã¦èª¬æãããã®ã§ã¯ãªããããã㯠ã»ã¯ã·ã§ã³10ã§æ¦èª¬ããé¢é£ææ¸ã§èª¬æããããã»ã¯ã·ã§ã³3, 4ã§ã¯ ã»ãã¥ãªãã£æ¡å¼µã®æ©è½ã¨å¶éã«ã¤ãã¦è©³ç´°ã«è¨è¿°ãããã»ã¯ã·ã§ã³5ã§ã¯ æ¬ææ¸ã¨é¢é£ææ¸ã§æ§æããä¸é£ã®ææ¸ç¾¤ã®å¯¾è±¡ç¯å²ã«ã¤ãã¦èª¬æããã ã»ã¯ã·ã§ã³6, 7, 8, 9ã§ã¯ããªã¾ã«ããã¹ã¿ããªã¾ã«ããã¾ã¼ã³ã ãã¼ã ãµã¼ãã«å¯¾ãã¦ãã®ã»ãã¥ãªãã£æ¡å¼µãä¸ããå½±é¿ã«ã¤ãã¦è«ããã æ¬ææ¸ã¨2ã¤ã®é¢é£ææ¸ã¯ [RFC2535], [RFC3008], [RFC3090], [RFC3445], [RFC3655], [RFC3658], [RFC3755], [RFC3757], [RFC3845]ã廿¢ããã ã¾ã[RFC1034], [RFC1035], [RFC2136], [RFC2181], [RFC2308], [RFC3225], [RFC3007], [RFC3597], [RFC3226]ã®DNSSECã«é¢ããè¨è¿°ãæ´æ°ããã 廿¢ã¯ããªãã Arends, et al. Standards Track [Page 2] RFC 4033 DNS Security Introduction and Requirements March 2005 DNSSECã¯ãDNSãã¼ã¿ã®åºèªã®èªè¨¼æ©è½ã¨ãã¼ã¿ã®å®å ¨æ§ä¿è·æ©è½ãæä¾ ããã ãã§ã¯ãªããå ¬ééµé å¸ã®ææ®µã¨ãã¦ãæ©è½ããããã ãã ãã¼ã¿ã®ç§å¿æ§ã¯æä¾ããªãã 2. éè¦ãªDNSSECç¨èªã®å®ç¾© æ¬ã»ã¯ã·ã§ã³ã¯ãDNSSECã«é¢ããä¸é£ã®ææ¸ç¾¤ã§ä½¿ç¨ãã夿°ã®ç¨èªãå®ç¾© ãããä¸é£ã®ææ¸ç¾¤ãèªã¿é²ããéã«ã便å©ãªåç §å ã¨ãªãããã«æå³ãã ã»ã¯ã·ã§ã³ã§ãããããåãã¦æ¬ææ¸ã«æ¥ããèªè ã¯ãæ¬ã»ã¯ã·ã§ã³ã æµãèªã¿ãã¦ãããæ®ãã®ææ¸ãèªãéã«å¿ è¦ã«å¿ãã¦æ¬ã»ã¯ã·ã§ã³ã« æ»ã£ã¦ãã¦ãæ§ããªãã èªè¨¼ã®é£é(Authentication Chain): DNSKEY(DNSå ¬ééµ) RRsetã¨DS (Delegation Signer) RRsetã交äºã«ç¹°ãè¿ãã¦æ§æãããç½²åä»ãã¼ã¿ã®é£éã ãã®é£éå ã®ãªã³ã¯ã¯ããããæ¬¡ã®ãªã³ã¯ãä¿è¨¼ããã å ·ä½çã«ãDNSKEY RRã使ç¨ãã¦DS RRã®ç½²åæ¤è¨¼ãè¡ããã¨ã«ããããã® DS RRãèªè¨¼(ä¿¡é ¼ã§ãããã®ã§ããã¨è¨¼æ)ããã(DNSKEYããDS RRã¸ã® ãªã³ã¯)ããã®DS RRã¯DNSKEY RRã®ããã·ã¥ãå«ãã®ã§ããã®ããã·ã¥å¤ã¨ ä¸è´ããæ°ããDNSKEY RRãæ¬¡ã«èªè¨¼ããã(DS RRããDNSKEYã¸ã®ãªã³ã¯)ã ãã®æ°ãã«èªè¨¼ãããDNSKEY RRã使ç¨ãã¦ä»ã®DNSKEY RRsetãèªè¨¼ãã ãã®RRsetãå«ãå¹¾ã¤ãã®DNSKEY RRã使ç¨ãã¦å¥ã®DS RRãèªè¨¼ããã ãããç¹°ãè¿ãã¦ãããèªè¨¼ãããDNSãã¼ã¿ã«ç½²åããç§å¯éµã¨å¯¾ã® DNSKEY RR(å ¬ééµ)ã«å°éããæç¹ã§èªè¨¼ã®é£éãçµäºããã ä¾ãã°ãã«ã¼ãã®DNSKEY RRsetã使ç¨ãã¦"example."ãã¡ã¤ã³ã®DS RRsetã èªè¨¼ãããã¨ãã§ããã"example."ãã¡ã¤ã³ã®DS RRsetã¯ããã·ã¥å¤ãæã¡ã "example."ãã¡ã¤ã³ã®DNSKEYã®ã©ããã¨ããã·ã¥å¤ãä¸è´ãããããã·ã¥å¤ã ä¸è´ããDNSKEYã«å¯¾å¿ããç§å¯éµã§"example."ãã¡ã¤ã³ã®DNSKEY RRsetã« ç½²åããããã®DNSKEY RRsetã®ç§å¯éµã§"www.example."ã®ãããªãã¼ã¿ ã¬ã³ã¼ããã"subzone.example."ã®ãããªå§ä»»ã«é¢ããDS RRã«ç½²åããã èªè¨¼éµ(Authentication Key): DNSSEC対å¿ãªã¾ã«ããç½²åæ¤è¨¼ãæ¸ã¾ãã¦ãã ãã¼ã¿èªè¨¼ã«ä½¿ç¨ã§ããå ¬ééµãDNSSEC対å¿ãªã¾ã«ããèªè¨¼éµãå ¥æãã æ¹æ³ã¯3ã¤ããã 第1ã«ããªã¾ã«ãã¯ä¸è¬ã«è¨å®ã«ããå°ãªãã¨ã1ã¤ã¯å ¬ééµãç¥ã£ã¦ããã ãã®è¨å®ãã¼ã¿ã¯å ¬ééµãã®ãã®ããDS RRã«è¦ããããããªå ¬ééµã® ããã·ã¥å¤("ãã©ã¹ãã¢ã³ã«"ã®é åç §)ã®ã©ã¡ããã§ããã 第2ã«ããªã¾ã«ãã¯èªè¨¼æ¸ã¿ã®å ¬ééµã使ç¨ãã¦ãDS RRã¨DS RRãåç §ãã DNSKEY RRã®ç½²åæ¤è¨¼ãè¡ãå ´åãããã 第3ã«ãããæ°ããå ¬ééµãç½²åæ¤è¨¼æ¸ã¿ã®ä»ã®å ¬ééµã¨å¯¾ã®ç§å¯éµã§ ç½²åãããã¨å¤æã§ããå ´åãããã ãªã¾ã«ããæ°ããå ¬ééµãèªè¨¼ãã¹ãã夿ããéã«ã¯ã常ã«ãã¼ã«ã« ããªã·ã¼ã®æéã«ãããããªããã°ãªããªããã¨ã«æ³¨æãã¦ãããããã ãã¼ã«ã«ããªã·ã¼ãã"ãªã¾ã«ããç½²åãæ¤è¨¼ã§ããæ°ããå ¬ééµã¯ å ¨ã¦èªè¨¼ãã"ã¨ããåç´ãªãã®ã§ãã£ãã¨ãã¦ãããã®æéã«ã¯ ãããããªããã°ãªããªãã Arends, et al. Standards Track [Page 3] RFC 4033 DNS Security Introduction and Requirements March 2005 権å¨ãæã¤RRset(Authoritative RRset): ã¾ã¼ã³å é¨ã«ããã¦ãRRsetã® ææè å(owner name)ãã¾ã¼ã³é ç¹(zone apex)ã¾ãã¯ã¾ã¼ã³é ç¹ããä¸ä½ã® åå空éã®ãµãã»ããã®ç¯å²å ã«ããããã¤åã¾ã¼ã³ãåå²ããåå²å ´æ ã¾ãã¯åå²å ´æãããä¸ã«ããåå空éã®ãµãã»ããã®ç¯å²å ã«ããå ´åã« éãããã®RRsetã¯"権å¨ãæã¤"ã¨ããã ã¾ã¼ã³é ç¹ã«ããRRsetã¯å ¨ã¦æ¨©å¨ãæã¤ãããã®ã¾ã¼ã³ã®è¦ªã«å±ããªãã åæã«ãã®ãã¡ã¤ã³ã«ãåå¨ããRRsetã¯ä¾å¤ã§æ¨©å¨ãæããªãã ãã®ä¾å¤çãªRRsetã«ã¯ãDS RRsetãDS RRsetãåç §ããNSEC RRset ("親ã¾ã¼ã³å´ã®NSEC")ããããã®RRsetã«ç½²åããRRSIG RRãªã©ã å«ã¾ããããããã®RRsetã¯å ¨ã¦è¦ªã¾ã¼ã³ã§æ¨©å¨ãæã¤ã åæ§ã«ããã®ã¾ã¼ã³ãå§ä»»ç¹(delegation point)ãæã¤å ´åã親ã¾ã¼ã³å´ã« åå¨ããNSEC RRsetãDS RRsetããããã®RRsetã«é¢é£ããRRSIG RRã ãã ãã®ã¾ã¼ã³(親ã¾ã¼ã³)ã§æ¨©å¨ãæã¡ãåã¾ã¼ã³å´ã§ã¯æ¨©å¨ãæããªãã å§ä»»ç¹(Delegation Point): ã¾ã¼ã³ã«ããã®è¦ªå´ãæãç¨èªãä¾ãã°ã "foo.example"ã®å§ä»»ç¹ã¯"example"ã¾ã¼ã³ã® foo.example ãã¼ã ã¨ãªãã("foo.example"ã¾ã¼ã³ã®ã¾ã¼ã³é ç¹ã®å¯¾èªã¨ãã¦ä½¿ç¨ããã)ã ã¾ã¼ã³é ç¹ã®é ãåç §ã®ãã¨ã ã»ãã¥ãªãã£ã®å³¶(Island of Security): å§ä»»ãããã¾ã¼ã³ãç½²åã¾ã¼ã³ã§ ããããå§ä»»ãã親å´ããã®èªè¨¼ã®é£éã¯æããªãç¶æ ãæãç¨èªã å ·ä½çã«ãå³¶ã«ç¸å½ããã¾ã¼ã³å ã®DNSKEY RRã®ããã·ã¥ãæã¤DS RRã å§ä»»ãã親ã¾ã¼ã³å´ã«åå¨ããªãç¶æ ãæå³ãã([RFC4034]åç §)ã ã»ãã¥ãªãã£ã®å³¶ã¯DNSSEC対å¿ãã¼ã ãµã¼ãã«ãã£ã¦ç®¡çããã ã»ãã¥ãªãã£ã®å³¶ããå§ä»»ããä»»æã®åã¾ã¼ã³ã«å¯¾ãã¦èªè¨¼ã®é£éã æä¾ãããã¨ãã§ãããã»ãã¥ãªãã£ã®å³¶ã¾ãã¯ãã®ä¸ä½ã¾ã¼ã³ããã® å¿çã¯ããããã®ã¾ã¼ã³ã®èªè¨¼éµãDNSãããã³ã«ä»¥å¤ã®ä¿¡é ¼ã§ããææ®µã§ èªè¨¼å¯è½ãªå ´åã«ã ãèªè¨¼ã§ããã KSK(éµç½²åéµ: Key Signing Key): ã¾ã¼ã³ãæã¤1ã¤ä»¥ä¸ã®èªè¨¼éµã«ç½²åãã ç§å¯éµã¨å¯¾ã®èªè¨¼éµ(å ¬ééµ)ãé常ãKSKã¨å¯¾ã®ç§å¯éµã§ã¾ã¼ã³ç½²åéµ (å ¬ééµ)ã«ç½²åããã¾ã¼ã³ç½²åéµã¨å¯¾ã®ç§å¯éµã§ä»ã®ã¾ã¼ã³ãã¼ã¿ã«ç½²åãã ã¨ããæé ã«ãªãããã®ããã«ãããã¨ã§ããã¼ã«ã«ããªã·ã¼ã ã¾ã¼ã³ç½²åéµãé »ç¹ã«å¤æ´ããããè¦æ±ããå ´åã§ãã£ã¦ããKSK㯠ããå®å®ããã»ãã¥ã¢ã¨ã³ããªã¼ãã¤ã³ã(SEP)ãã¾ã¼ã³ã«æä¾ããããã«ã ããé·ãæå¹æéãæã¤ãã¨ãã§ããã ããèªè¨¼éµãKSKã ã¨æç¤ºãããã©ããã¯ç´ç²ã«éç¨ä¸ã®åé¡ã§ããã DNSSECã®ãã¼ã¿æ¤è¨¼(validation)ã¯KSKã¨DNSSECèªè¨¼éµãåºå¥ããªããã 1ã¤ã®éµãKSKã¨ã¾ã¼ã³ç½²åéµã®ä¸¡æ¹ã«ä½¿ç¨ãããã¨ãã§ãããKSKã«ã¤ãã¦ã¯ [RFC3757]ã«è©³ããè¨è¿°ããããã¾ã¼ã³ç½²åéµã®é ãåç §ã®ãã¨ã Arends, et al. Standards Track [Page 4] RFC 4033 DNS Security Introduction and Requirements March 2005 ç½²åãæ¤è¨¼ããªãDNSSEC対å¿ã¹ã¿ããªã¾ã«ã(Non-Validating Security-Aware Stub Resolver): DNSSEC対å¿ã¹ã¿ããªã¾ã«ãã®ä¸ã§ãæ¬ææ¸ã¨é¢é£ææ¸ã è¨è¿°ããå¦çã«é¢ãã¦ããã®å¤§åãå®è¡ããããã«1ã¤ä»¥ä¸ã®DNSSECå¯¾å¿ å帰ãã¼ã ãµã¼ããä¿¡é ¼ãããã®ãç¹ã«ãç½²åãæ¤è¨¼ããªãDNSSECå¯¾å¿ ã¹ã¿ããªã¾ã«ãã¯ãDNSååãããéä¿¡ããDNSå¿çãåä¿¡ããèªèº«ã«ä»£ãã£ã¦ ãµã¼ãã¹ãæä¾ããDNSSEC対å¿å帰ãã¼ã ãµã¼ãã¨å®å ¨ãªãã£ãã«ãç¢ºç« ã§ãããã®ãæããDNSSEC対å¿ã¹ã¿ããªã¾ã«ãã®é ããã³ç½²åãæ¤è¨¼ãã DNSSEC対å¿ã¹ã¿ããªã¾ã«ãã®é ãåç §ã®ãã¨ã ç½²åãæ¤è¨¼ããªãã¹ã¿ããªã¾ã«ã(Non-Validating Stub Resolver): ç½²åãæ¤è¨¼ããªãDNSSEC対å¿ã¹ã¿ããªã¾ã«ããè¥å¹²ç°¡ç¥åããå¼ç§°ã DNSSEC対å¿ãã¼ã ãµã¼ã(Security-Aware Name Server): ([RFC1034]ã® ã»ã¯ã·ã§ã³2.4ã§å®ç¾©ãã)ãã¼ã ãµã¼ãã®å½¹å²ãæãããã®ã§ãã¤ã æ¬ææ¸ã¨é¢é£ææ¸ãå®ç¾©ããDNSSECãçè§£ãããã®ã å ·ä½çã«ãDNSSEC対å¿ãã¼ã ãµã¼ãã¨ã¯ãDNSååãããåä¿¡ããDNSå¿çã éä¿¡ããEDNS0ã¡ãã»ã¼ã¸ãµã¤ãºæ¡å¼µ([RFC2671])ã¨DOããã([RFC3225])ã ãµãã¼ãããæ¬ææ¸ã¨é¢é£ææ¸ã§å®ç¾©ããRRã¿ã¤ãã¨ã¡ãã»ã¼ã¸ããã ãããããµãã¼ããããã®ã§ããã DNSSEC対å¿å帰ãã¼ã ãµã¼ã(Security-Aware Recursive Name Server): DNSSEC対å¿ãã¼ã ãµã¼ãã¨DNSSEC対å¿ãªã¾ã«ãã®å½¹å²ãä¸¡æ¹æä¾ãããã®ã åãæå³ã ãããé·ããããè¨ãåãã¨ãã¦ã¯ "å帰çãµã¼ãã¹ãæä¾ãã DNSSEC対å¿ãã¼ã ãµã¼ã"ãæããããã DNSSEC対å¿ãªã¾ã«ã(Security-Aware Resolver): ([RFC1034]ã®ã»ã¯ã·ã§ã³2.4ã§ å®ç¾©ãã)ãªã¾ã«ãã®å½¹å²ãæãããã®ã§ãã¤ãæ¬ææ¸ã¨é¢é£ææ¸ãå®ç¾©ãã DNSSECãçè§£ãããã®ãå ·ä½çã«ãDNSSEC対å¿ãªã¾ã«ãã¨ã¯ã DNSååãããéä¿¡ããDNSå¿çãåä¿¡ããEDNS0ã¡ãã»ã¼ã¸ãµã¤ãºæ¡å¼µ ([RFC2671])ã¨DOããã([RFC3225])ããµãã¼ãããDNSSECãµã¼ãã¹ã æä¾ããããã«æ¬ææ¸ã¨é¢é£ææ¸ãå®ç¾©ããRRã¿ã¤ãã¨ã¡ãã»ã¼ã¸ããã ãããã使ç¨ã§ãããã®ã§ããã DNSSEC対å¿ã¹ã¿ããªã¾ã«ã(Security-Aware Stub Resolver): ([RFC1034]ã® ã»ã¯ã·ã§ã³5.3.1ã§å®ç¾©ãã)ã¹ã¿ããªã¾ã«ãã®å½¹å²ãæãããã®ã§ãã¤ã æ¬ææ¸ã¨é¢é£ææ¸ãå®ç¾©ããDNSSECãå åçè§£ãããã®ã ããã«ãããDNSSECé対å¿ã¹ã¿ããªã¾ã«ãã§ã¯å©ç¨ã§ããªãä»å ç ãµã¼ãã¹ãæä¾ãããDNSSEC対å¿ã¹ã¿ããªã¾ã«ãã¯"ç½²åãæ¤è¨¼ãã"ã "ç½²åãæ¤è¨¼ããªã"ãã®ã©ã¡ããã§ãããåè ã¯èªåèªèº«ã§DNSSECç½²åã® æ¤è¨¼ã試ã¿ãããå¾è ã¯ãã®å¦çãèªåã§è¡ã代ããã«ã使ç¨ãã DNSSEC対å¿ãã¼ã ãµã¼ãã®æ¤è¨¼çµæãä¿¡é ¼ããã ç½²åãæ¤è¨¼ããã¹ã¿ããªã¾ã«ãã®é ã¨ç½²åãæ¤è¨¼ããªãã¹ã¿ããªã¾ã«ãã® é ãåç §ã®ãã¨ã Arends, et al. Standards Track [Page 5] RFC 4033 DNS Security Introduction and Requirements March 2005 DNSSECé対å¿(Security-Oblivious) <ä½ã>: DNSSEC対å¿ã§ã¯ãªã<ä½ã>ã ç½²åã¾ã¼ã³(Signed Zone): ã¾ã¼ã³ã®RRsetãç½²åããã¦ãããããªãã¡ã¾ã¼ã³ã DNSKEYãRRSIG(Resource Record Signature)ãNSEC(Next Secure)ã (ä»»æã§)DSã¬ã³ã¼ãã§é©åã«æ§æããã¦ãããã®ã ãã©ã¹ãã¢ã³ã«ã¼(Trust Anchor): ãããããè¨å®ã¨ãã¦æã£ã¦ããDNSKEY RR ã¾ãã¯DNSKEY RRã®ããã·ã¥ãæã¤DS RRã ç½²åãæ¤è¨¼ããDNSSEC対å¿ãªã¾ã«ãã¯ãç½²åä»ãDNSå¿çã«è³ãã¾ã§ã® èªè¨¼ã®é£éãæ§ç¯ããéã«ããã®å ¬ééµã¾ãã¯ããã·ã¥å¤ãèµ·ç¹ã¨ã㦠使ç¨ãããä¸è¬ã«ãç½²åãæ¤è¨¼ãããªã¾ã«ãã¯ãDNSãããã³ã«ä»¥å¤ã® å®å ¨ãã¤ä¿¡é ¼ã§ããææ®µã§ãã©ã¹ãã¢ã³ã«ã¼ã®åæå¤ãå ¥æããªããã° ãªããªããã¾ãããã©ã¹ãã¢ã³ã«ã¼ãåå¨ããã¨ãããã¨ã¯ããªã¾ã«ã㯠ãã©ã¹ãã¢ã³ã«ã¼ããã¤ã³ãããã¾ã¼ã³ãç½²åä»ãã®ãã®ã¨ãã¦æ±ãã¹ã ã§ãããã¨ãæå³ããã æªç½²åã¾ã¼ã³(Unsigned Zone): ç½²åããã¦ããªãã¾ã¼ã³ã ç½²åãæ¤è¨¼ããDNSSEC対å¿ã¹ã¿ããªã¾ã«ã(Validating Security-Aware Stub Resolver): DNSSEC対å¿ãªã¾ã«ãã§ãããã¤ãååãããå帰æ¤ç´¢ ã¢ã¼ãã§éä¿¡ããããç½²åã®æ¤è¨¼ã«ã¤ãã¦ã¯ä½¿ç¨ããDNSSEC対å¿å帰 ãã¼ã ãµã¼ããç²ç®çã«ä¿¡é ¼ãããèªåèªèº«ã§æ¤è¨¼ãè¡ããã®ã DNSSEC対å¿ã¹ã¿ããªã¾ã«ãã®é ããã³ç½²åãæ¤è¨¼ããªãDNSSECå¯¾å¿ ã¹ã¿ããªã¾ã«ãã®é ãåç §ã®ãã¨ã ç½²åãæ¤è¨¼ããã¹ã¿ããªã¾ã«ã(Validating Stub Resolver): ç½²åãæ¤è¨¼ããDNSSEC対å¿ã¹ã¿ããªã¾ã«ããè¥å¹²ç°¡ç¥åããå¼ç§°ã ã¾ã¼ã³é ç¹(Zone Apex): ã¾ã¼ã³ã«ããã®åå´ãæãç¨èªãå§ä»»ç¹ã®é ãåç § ã®ãã¨ã ZSK(ã¾ã¼ã³ç½²åéµ: Zone Signing Key):ã¾ã¼ã³ç½²åã«ä½¿ç¨ããç§å¯éµã¨å¯¾ã® èªè¨¼éµ(å ¬ééµ)ãé常ãZSKã¯DNSKEY RRsetã«ç½²åããç§å¯éµã¨å¯¾ã®KSKã¨ åæ§ã«ãDNSKEY RRsetã®ä¸é¨ã§ããããããZSKã¯KSKã¨ã¯è¥å¹²ç°ãªãç®ç㧠使ç¨ãããæå¹æéãªã©å¹¾ã¤ãç°ãªãç¹ãããã ããèªè¨¼éµãZSKã ã¨æç¤ºãããã©ããã¯ç´ç²ã«éç¨ä¸ã®åé¡ã§ããã DNSSECã®ãã¼ã¿æ¤è¨¼(validation)ã¯KSKã¨DNSSECèªè¨¼éµãåºå¥ããªããã 1ã¤ã®éµãKSKã¨ã¾ã¼ã³ç½²åéµã®ä¸¡æ¹ã«ä½¿ç¨ãããã¨ãã§ããã KSKã®é ãåç §ã®ãã¨ã Arends, et al. Standards Track [Page 6] RFC 4033 DNS Security Introduction and Requirements March 2005 3. DNSSECãæä¾ãããµã¼ãã¹ DNSSECã¯ãDNSãã¼ã¿ã®åºèªã®èªè¨¼ãµã¼ãã¹ã¨ããã¼ã¿ã®å®å ¨æ§(æ¹ãããã㦠ããªããã¨)ãä¿è·ãããµã¼ãã¹ã«å ãã¦ãDNSãã¼ã¿ã®ä¸å¨ã証æããä»çµã¿ã æä¾ããããããã®ä»çµã¿ã«ã¤ãã¦ä»¥ä¸ã«è¨è¿°ããã ãããã®ä»çµã¿ãå®ç¾ããããã«ã¯ãDNSãããã³ã«ã®å¤æ´ãå¿ è¦ã§ããã DNSSECã¯4ã¤ã®ãªã½ã¼ã¹ã¬ã³ã¼ããããªãã¡RRSIG(Resource Record Signature), DNSKEY(DNS Public Key), DS(Delegation Signer), NSEC(Next Secure)ã 追å ãããã¾ã2ã¤ã®ã¡ãã»ã¼ã¸ãããããããããªãã¡CD(Checking Disabled) ã¨AD(Authenticated Data)ã追å ããã DNSSECã«é¢é£ããRRã追å ããã¨ã¡ãã»ã¼ã¸ãµã¤ãºã¯ãã大ãããªãããã DNSSECã«ã¯EDNS0([RFC2671])ã®ãµãã¼ããå¿ è¦ã¨ããã æå¾ã«ãDNSSEC対å¿ãªã¾ã«ãããååããã®éã«å¿çã¡ãã»ã¼ã¸ã§ DNSSEC RRãåä¿¡ãããã¨ããè¦æãæç¤ºã§ããããã«ãããããDNSSEC㯠EDNSãããå ã®DNSSEC OK(DO)ããã([RFC3225])ã®ãµãã¼ããå¿ è¦ã¨ããã ãããã®ãµã¼ãã¹ã¯ã[RFC3833]ã«è¨è¼ã®ããDNSã¸ã®è å¨ã®å¤§é¨åãé²å¾¡ããã ãã®æ¡å¼µã®å¶éã«é¢ããè°è«ã«ã¤ãã¦ã¯ã»ã¯ã·ã§ã³12ãåç §ã®ãã¨ã 3.1. ãã¼ã¿çæå ã®èªè¨¼ã¨ãã¼ã¿ã®å®å ¨æ§ä¿è· DNSSECã¯ãDNSSEC RRsetã«æå·æè¡ã使ç¨ãã¦çæãããé»åç½²åãçµã³ã¤ãã ãã¨ã§èªè¨¼æ©è½ãæä¾ãããé»åç½²åã¯æ°ãããªã½ã¼ã¹ã¬ã³ã¼ãã§ããRRSIG ã¬ã³ã¼ãã«ä¿åããããä¸è¬ã«ã¾ã¼ã³ãã¼ã¿ã«ç½²åããã®ã¯åä¸ã®ç§å¯éµã ãã è¤æ°ã®éµã使ç¨ãããã¨ãã§ãããä¾ãã°ãããããç°ãªãé»åç½²å ã¢ã«ã´ãªãºã ã®éµãè¤æ°ä½¿ç¨ãã¦ããããDNSSEC対å¿ãªã¾ã«ããã¾ã¼ã³ã® å ¬ééµãä¿¡é ¼ã§ããææ®µã§å¦ç¿ããã¨ããã®ãªã¾ã«ãã¯ã¾ã¼ã³ã®ç½²åä»ã ãã¼ã¿ãèªè¨¼ãããã¨ãã§ããããã«ãªãã DNSSECã«ãããéè¦ãªèãæ¹ã¨ãã¦ãã¾ã¼ã³ãã¼ã¿ã«ç½²åããéµã¯ã¾ã¼ã³èªèº«ã« é¢é£ä»ãããããã®ã§ãããã¾ã¼ã³ã®æ¨©å¨ãã¼ã ãµã¼ãã«ã¯é¢é£ä»ãããã ãã®ã§ã¯ãªãã([RFC2931]ã«è¨è¿°ãããããã«ãDNSãã©ã³ã¶ã¯ã·ã§ã³ã®èªè¨¼ã« 使ç¨ããå ¬ééµãã¾ã¼ã³å ã«åå¨ããå ´åãããããããDNSSECèªèº«ã¯ ãªãã¸ã§ã¯ãã»ãã¥ãªãã£(訳注: ãã¼ã¿å´ã§å®å ¨ã確ä¿ããã¢ããã¼ã)ã« é¢ããæè¡ã§ãããDNSãã©ã³ã¶ã¯ã·ã§ã³ã®ãã£ãã«ã»ãã¥ãªã㣠(訳注: ãã¼ã¿ã転éããçµè·¯ã§å®å ¨ã確ä¿ããã¢ããã¼ã)ã«é¢é£ããæè¡ã§ã¯ ãªãããã©ã³ã¶ã¯ã·ã§ã³ã»ãã¥ãªãã£ã«é¢é£ããéµã¯å¥ã®RRã¿ã¤ãã«ä¿åãããã 詳細ã¯[RFC3755]ãåç §ã®ãã¨)ã Arends, et al. Standards Track [Page 7] RFC 4033 DNS Security Introduction and Requirements March 2005 DNSSEC対å¿ãªã¾ã«ãã¯ããã©ã¹ãã¢ã³ã«ã¼ãè¨å®ã§ä¿æããããé常㮠DNSåå解決å¦çãè¡ããã®ã©ã¡ããã«ãããã¾ã¼ã³ã®å ¬ééµãå¦ç¿ãããã¨ã ã§ãããå¾è ã®ææ®µãå¯è½ã«ãããããå ¬ééµãæ°ãããªã½ã¼ã¹ã¬ã³ã¼ãã§ãã DNSKEY RRã«ä¿åãããã¾ã¼ã³ãã¼ã¿ã«ç½²åããç§å¯éµã¯å®å ¨ã«ä¿æãããªããã° ãªããªãããããããããã¨ãå®éçã§ãããªãã°ãªãã©ã¤ã³ã§ä¿åãã¹ãã§ ãããã¨ã«æ³¨æãã¦ããããããDNSã®åå解決ãéãã¦ä¿¡é ¼ã§ããææ®µã§ å ¬ééµãçºè¦ããããã«ãæ¢ç´¢å¯¾è±¡ã®éµèªèº«ã¯äºåã«è¨å®ãããèªè¨¼éµãã ãããããèªè¨¼æ¸ã¿ã®å¥ã®éµã«ãã£ã¦ç½²åããã¦ããªããã°ãªããªãã DNSSEC対å¿ãªã¾ã«ãã¯ãæ°ããå¦ç¿ããèªè¨¼éµ(å ¬ééµ)ããäºåã«å¦ç¿æ¸ã¿ã® èªè¨¼éµ(å ¬ééµ)ã¸ã¨é£ãªãèªè¨¼ã®é£éãå½¢æããã¾ã¼ã³ãã¼ã¿ãèªè¨¼ããã "äºåã«å¦ç¿æ¸ã¿ã®èªè¨¼éµ"ã¨ã¯ããªã¾ã«ããè¨å®ã¨ãã¦ä¿æãããã®ãã äºåã«å¦ç¿ãæ¤è¨¼æ¸ã¿ã®ãã®ãã®ã©ã¡ããã§ããã ãããã£ã¦ãDNSSEC対å¿ãªã¾ã«ãã¯ãå°ãªãã¨ã1ã¤ã¯ãã©ã¹ãã¢ã³ã«ã¼ã è¨å®ã¨ãã¦æããªããã°ãªããªãã è¨å®ããããã©ã¹ãã¢ã³ã«ã¼ãZSKã®å ´åãããã使ç¨ãã¦é¢é£ããã¾ã¼ã³ã èªè¨¼ããKSKã®å ´åãããã使ç¨ãã¦ZSKãèªè¨¼ããã è¨å®ããããã©ã¹ãã¢ã³ã«ã¼ãéµãã®ãã®ã§ã¯ãªãéµã®ããã·ã¥å¤ã§ããå ´åã ãªã¾ã«ãã¯DNSååãããéãã¦éµãå ¥æããªããã°ãªããªããDNSSECå¯¾å¿ ãªã¾ã«ããèªè¨¼ã®é£éãæ§ç¯ããã®ãå©ãããããDNSSEC対å¿ãã¼ã ãµã¼ãã¯ã DNSå¿çã¡ãã»ã¼ã¸ã®ãµã¤ãºã«ä½è£ãããã°ãã¾ã¼ã³ã®å ¬ééµã«å ã㦠ã¾ã¼ã³å ¬ééµãèªè¨¼ããããã«å¿ è¦ãªç½²åãå ±ã«éä¿¡ãããã¨è©¦ã¿ãã DS(Delegation Signer) RRã¿ã¤ãã¯ãçµç¹ã®å¢çãã¾ããå§ä»»ã¸ã®ç½²åã« å¿ è¦ãªç®¡ç使¥ãç°¡ç¥åãããDS RRsetã¯è¦ªã¾ã¼ã³å´ã®å§ä»»ç¹ã«ä½ç½®ãã å§ä»»ãããåå´ã®ã¾ã¼ã³é ç¹ã«ä½ç½®ããDNSKEY RRsetã®èªå·±ç½²åã«ä½¿ç¨ãã ç§å¯éµã¨å¯¾ã®å ¬ééµãæç¤ºãããæ¬¡ã«åã¾ã¼ã³ã®ç®¡çè ã¯èªå·±ç½²åããã DNSKEY RRsetã«å«ã¾ãã1ã¤ä»¥ä¸ã®å ¬ééµã¨å¯¾ã®ç§å¯éµã使ç¨ã㦠åã¾ã¼ã³ã®ãã¼ã¿ã«ç½²åããããããã£ã¦ãä¸è¬çãªèªè¨¼ã®é£é㯠DNSKEY->[DS->DNSKEY]*->RRsetã«ãªããããã§"*"ã¯0å以ä¸ã®DS->DNSKEYã® é¨åçé£éãæå³ãããDNSSECã¯ãä¾ãã°ã¾ã¼ã³å ã«ããã¦ããDNSKEY RR㨠対ã®ç§å¯éµãå¥ã®DNSKEY RRã«ç½²åãããã¤ã¾ãDNSKEY->DNSKEYã¨ãªããããª ä¸æ®µéèªè¨¼ã®é層ã追å ããå½¢æ ã®ããè¤éãªèªè¨¼ã®é£éã許容ããã DNSSEC対å¿ãªã¾ã«ãã¯ãé常äºåã«è¨å®ãããDNSã®ã«ã¼ãã®å ¬ééµã使ç¨ãã¦ã èªè¨¼ã®é£éãã«ã¼ãããä¸ä½ã®ã¾ã¼ã³(leaf zone)ã«åãã¦æ§ç¯ãã¦ããã ãããããã¼ã«ã«ããªã·ã¼ã«ãããDNSSEC対å¿ãªã¾ã«ãã¯ã«ã¼ãã®å ¬ééµã§ã¯ ãªããè¨å®ããã1ã¤ä»¥ä¸ã®å ¬ééµ(ãã¾ãã¯å ¬ééµã®ããã·ã¥å¤)ã使ç¨ã§ãã ãããããªãããã¾ãã«ã¼ãã®å ¬ééµãè¨å®ãããªãå ´åããããæ´ã«ã ãªãããã®çç±ã«ããããã¨ãå ¬ééµã®ç½²åãé©åã«æ¤è¨¼å¯è½ã§ãã£ã¦ãã ãã®å ¬ééµã®ä½¿ç¨ãæå¶ããå ´åãããã DNSSECã¯ãDNSSEC対å¿ãªã¾ã«ããRRsetã®ç½²åãDNSSECã®æ å ã§"æå¹"ã§ããã 夿ã§ããä»çµã¿ãæä¾ãããããããDNSã®èªè¨¼éµããã¼ã¿ãèªè¨¼ããã ã©ããã¯æçµçã«ã¯ãã¼ã«ã«ããªã·ã¼ã®åé¡ã§ããããã¼ã«ã«ããªã·ã¼ã¯ æ¬ææ¸ã¨é¢é£ææ¸ãå®ç¾©ããDNSSECã®å¹æãæ´ã«æ¡å¤§ããå ´åãããã ç¡å¹ã«ããå ´åãããããã詳細ãªè°è«ã«ã¤ãã¦ã¯ã»ã¯ã·ã§ã³5ãåç §ã®ãã¨ã Arends, et al. Standards Track [Page 8] RFC 4033 DNS Security Introduction and Requirements March 2005 3.2. ååããã³ã¿ã¤ãã®ä¸å¨è¨¼æ ã»ã¯ã·ã§ã³3.1ã«è¨è¿°ããDNSSECã®ä»çµã¿ã¯ãã¾ã¼ã³ã«åå¨ããRRsetã«ç½²åãã æ¹æ³ãæä¾ããã ãã§ãããåãã¬ãã«ã®èªè¨¼ã¨å®å ¨æ§ãæã¤ä¸å¨å¿çã æä¾ããã¨ããåé¡ã解決ããããã«ã¯ãæ°ãããªã½ã¼ã¹ã¬ã³ã¼ãã¿ã¤ãã§ãã NSECã¬ã³ã¼ãã使ç¨ããå¿ è¦ããããNSECã¬ã³ã¼ãã«ãããDNSSECå¯¾å¿ ãªã¾ã«ãã¯ãååã¾ãã¯ã¿ã¤ãã®ä¸å¨ã示ãä¸å¨å¿çãä»ã®DNSå¿çãèªè¨¼ ããã®ã¨åãä»çµã¿ã§èªè¨¼ã§ããããã«ãªããNSECã¬ã³ã¼ãã使ç¨ããã«ã¯ã ã¾ã¼ã³å ã®ãã¡ã¤ã³åãæ£è¦ã«è¡¨ç¾ããããã¤é åºã¥ããããã¦ãã å¿ è¦ããããNSECã¬ã³ã¼ãã®é£éã¯ã¾ã¼ã³å ã«åå¨ãããã¡ã¤ã³åéã®ããé ã¾ãã¯"空ã空é"ãæç¤ºçã«ç¤ºããã¾ãæ¢åã®ååãæã¤RRsetã®ã¿ã¤ãã åæãããåNSECã¬ã³ã¼ãã¯ãã»ã¯ã·ã§ã³3.1ã«è¨è¿°ããä»çµã¿ã§ç½²åãã èªè¨¼ãããã 4. DNSSECãæä¾ããªããµã¼ãã¹ å æ¥ãDNSã¯èª°ãååãããçºè¡ãããã«ããããããä»»æã®ååããã«å¯¾ã㦠åãå¿çãè¿ããã¤ã¾ãDNSå ã«åå¨ããå ¨ã¦ã®ãã¼ã¿ã¯é²è¦§å¯è½(visible)ã§ãã ã¨ããåæã§è¨è¨ãããããããã£ã¦ãDNSSECã¯ç§å¿æ§ãã¢ã¯ã»ã¹å¶éãå®ç¾ãã ææ®µããååããçºè¡è ã«å¿ãã¦å¿çãå·®å¥åããä»ã®ææ®µãæä¾ããããã«ã¯ è¨è¨ããã¦ããªãã DNSSECã¯ãµã¼ãã¹ä¸è½æ»æ(denial of service attacks)ã¸ã®é²å¾¡æ©è½ã ä½ãæä¾ããªããDNSSEC対å¿ãªã¾ã«ãã¨DNSSEC対å¿ãã¼ã ãµã¼ãã¯ã ã©ã¡ããæå·å¦çãå©ç¨ãããæ°ããªãµã¼ãã¹ä¸è½æ»æã«å¯¾ã㦠èå¼±ã§ããã詳細ã«ã¤ãã¦ã¯ã»ã¯ã·ã§ã³12ãåç §ã®ãã¨ã DNSSECã¯ãDNSãã¼ã¿ã¨DNSãã¼ã¿ã®åºèªã®èªè¨¼æ©è½ãæä¾ããã ããã¾ã§ã«æ¦ç¥ã説æãããã®ä»çµã¿ã¯ãã¾ã¼ã³è»¢éããã¤ãããã¯ã¢ãããã¼ã ([RFC2136], [RFC3007])çã®å¦çãä¿è·ããããã«ã¯è¨è¨ããã¦ããªãã ãããã®ãã©ã³ã¶ã¯ã·ã§ã³ã®å®å ¨ãªéç¨ã«ã¯ã[RFC2845]ã¨[RFC2931]ã« è¨è¼ã®ããã¡ãã»ã¼ã¸èªè¨¼ã®ä»çµã¿ãç¨ããããã 5. DNSSECææ¸ç¾¤ã®å¯¾è±¡ç¯å²ã¨ã©ã¹ããããåé¡(Last Hop Issues) æ¬ææ¸ã¨é¢é£ææ¸ã¯ããã¼ã¿æ¤è¨¼è ãæç¢ºã«ãã¼ã¿ã®ç¶æ ãå¤å®ã§ããããã« ã¾ã¼ã³ç½²åè ã»DNSSEC対å¿ãã¼ã ãµã¼ãããã³DNSSEC対å¿ãªã¾ã«ãã®æ¯ãèãã å®ç¾©ãã¦ããã ãã¼ã¿ã®ç½²åãæ¤è¨¼ãããªã¾ã«ãã¯ã以ä¸ã®4ã¤ã®ç¶æ ãå¤å®ã§ããã Secure(æ¤è¨¼æåï¼ä¿¡é ¼åº¦é«) ç½²åãæ¤è¨¼ãããªã¾ã«ãããã©ã¹ãã¢ã³ã«ã¼ãæã¡ãä¿¡é ¼ã®é£éã æ§ç¯ãã¦ãããå¿çã«å«ã¾ããç½²åãå ¨ã¦æ¤è¨¼å¯è½ã ã£ãç¶æ ã Arends, et al. Standards Track [Page 9] RFC 4033 DNS Security Introduction and Requirements March 2005 Insecure(æªç½²åç¶æ³æ¤åºï¼ä¿¡é ¼åº¦ä½) ç½²åãæ¤è¨¼ãããªã¾ã«ãããã©ã¹ãã¢ã³ã«ã¼ãæã¡ãä¿¡é ¼ã®é£éãæ§ç¯ ãã¦ããããå¹¾ã¤ãã®å§ä»»ç¹ã§DSã¬ã³ã¼ããç½²åä»ãã§ä¸å¨ã§ãã㨠示ããã¦ããç¶æ ãããã¯ãDNSæ¨æ§é ã«ããã¦DSã¬ã³ã¼ãã åå¨ããªãã¨ããã£ã¦ããä¸ä½ã®ç©ºéã¯ãããããå®å ¨ã§ã¯ãªããã¨ã æå³ãããç½²åãæ¤è¨¼ãããªã¾ã«ãã¯ããã¡ã¤ã³ç©ºéã®ä¸é¨ãå®å ¨ã§ãªã ãã®ã¨ãã¦ãã¼ã¯ãããã¼ã«ã«ããªã·ã¼ãè¨å®ãã¦ãããã Bogus(æ¤è¨¼å¤±æï¼ä¿¡é ¼ç¦æ¢) ç½²åãæ¤è¨¼ãããªã¾ã«ãããã©ã¹ãã¢ã³ã«ã¼ãæã¡ãåå´ã®ãã¼ã¿ã ç½²åä»ãã®å®å ¨ãªå§ä»»ããªããã¦ãããã¨ã¾ã§ã確èªãã¦ãããã å¿çã®ç½²åæ¤è¨¼ã«ã¯å¤±æããç¶æ ã ç½²åã®æ¤è¨¼ã«å¤±æããçç±ã¯å¹¾ã¤ãèããããä¾ãã°ç½²åã®æ¶å¤±ã ç½²åã®æéåããç½²åã§ä½¿ããã¦ããã¢ã«ã´ãªãºã ããµãã¼ããã¦ããªãã NSEC RRã¯åå¨ããã¨ä¸»å¼µãã¦ãããã¼ã¿ãå®éã«ã¯ç¡ãçãæããããã Indeterminate(æ¤è¨¼å¯¾è±¡å¤ï¼ä¿¡é ¼åº¦ä½) DNSæ¨æ§é ã®ä¸é¨ãå®å ¨ã§ãããã¨ã示ããã©ã¹ãã¢ã³ã«ã¼ã å ¨ãåå¨ããªãç¶æ ããããããã©ã«ãã®éç¨ã¢ã¼ãã§ããã æ¬ä»æ§ã§ã¯ãDNSSEC対å¿ãã¼ã ãµã¼ããç½²åãæ¤è¨¼ããªãDNSSEC対å¿ã¹ã¿ã ãªã¾ã«ãã«å¯¾ãããã¼ã¿ãBogusã¨å¤æãããã¨ãéç¥ããææ®µãå®ç¾©ãã ã ãã§ãã(RCODE=2, "Server Failure"ã使ç¨ã[RFC4035]åç §)ã DNSSEC対å¿ãã¼ã ãµã¼ããDNSSEC対å¿ã¹ã¿ããªã¾ã«ãã«å¯¾ãããã¼ã¿ã Secureã¨å¤æãããã¨ãéç¥ããä»çµã¿ã¯æ¢ã«åå¨ããã(ADãããã使ç¨ã [RFC4035]åç §)ã æ¬ä»æ§ã¯ãå¿çãBogusã¨å¤å®ãããããInsecureã¨ãã¼ã¯ããããããçç±ã éç¥ããéã«ä½¿ç¨ããæ¸å¼ãå®ç¾©ããªããã¤ã¾ããç¾å¨ã®éç¥ã®ä»çµã¿ã¯ã å¿çã®ç¶æ ãIndeterminateãInsecureããåºå¥ããªãã DNSSEC対å¿ã¹ã¿ããªã¾ã«ãã¨DNSSEC対å¿å帰ãã¼ã ãµã¼ãã®éã§é«åº¦ãª ã¨ã©ã¼ã³ã¼ããããªã·ãããã¨ãããææ³ã«ã¤ãã¦ã¯ãDNSSEC対å¿ãªã¾ã«ã㨠ãããå©ç¨ããã¢ããªã±ã¼ã·ã§ã³éã®ã¤ã³ã¿ã¼ãã§ã¼ã¹åæ§ã«ä»å¾ã®èª²é¡ã§ããã ããããæ¬ä»æ§ããã®ãããªéä¿¡ãè¦å®ããªããã¨ã§ãç½²åã¾ã¼ã³ã®å±éã æå¶ããããã®ã§ã¯ãªããã¾ãä¸é©æ£ãªãã¼ã¿ãã¢ããªã±ã¼ã·ã§ã³ã«éç¥ããªã DNSSEC対å¿å帰ãã¼ã ãµã¼ãã®å±éãæå¶ãããã®ã§ããªããã¨ã«æ³¨æ ãã¦ãããããã Arends, et al. Standards Track [Page 10] RFC 4033 DNS Security Introduction and Requirements March 2005 6. ãªã¾ã«ãã«é¢ããèæ ®ç¹ DNSSEC対å¿ãªã¾ã«ãã¯ãå°ãªãã¨ãå®è£ å¿ é ãªã¢ã«ã´ãªãºã ã®é»åç½²åã æ¤è¨¼ããããã«å¿ è¦ãªæå·æ©è½ãå®è¡ã§ããªããã°ãªããªãã ã¾ãDNSSEC対å¿ãªã¾ã«ãã¯ãå ã«è¨è¿°ããã¨ãããæ°ãã«å¦ç¿ããã¾ã¼ã³ãã èªè¨¼éµã«è³ãèªè¨¼ã®é£éãå½¢æã§ããªããã°ãªããªãããã®å¦çã¯ãå¿ è¦ãª DNSKEYãDSããã³RRSIGã¬ã³ã¼ããå¾ãããã«ãä¸éã®DNSã¾ã¼ã³ã«å¯¾ãã ååãããå¿ è¦ã¨ãããããããªãã èªè¨¼ã®é£éãæ§ç¯ããèµ·ç¹ã¨ãã¦ä½¿ç¨ãããããDNSSEC対å¿ãªã¾ã«ã㯠å°ãªãã¨ã1ã¤ã¯ãã©ã¹ãã¢ã³ã«ã¼ãè¨å®ã¨ãã¦æã¤ã¹ãã§ããã DNSSEC対å¿ãªã¾ã«ãã¨æ¨©å¨ãã¼ã ãµã¼ããå帰ãã¼ã ãµã¼ããDNSãããã·ã¨ã㦠åä½ããä¸éããã¤ã¹ã«ãã£ã¦åãé¢ããã¦ããç¶æ³ã§ãå帰ãã¼ã ãµã¼ã ã¾ãã¯ä¸éããã¤ã¹ãDNSSEC対å¿ã§ã¯ãªãå ´åã«ã¯ãDNSSEC対å¿ãªã¾ã«ã㯠å®å ¨ãªã¢ã¼ãã§ã¯åä½ã§ããªããããããªããä¾ãã°ãDNSSEC対å¿ãªã¾ã«ãã® ãã±ãããDNSSECé対å¿ã®DNSãããã·æ©è½ãæã¤NATããã¤ã¹ãéã㦠çµè·¯ä»ããããå ´åãDNSSEC対å¿ãªã¾ã«ãã¯ç½²åä»ãDNSãã¼ã¿ãå¾ãã æ¤è¨¼ãããããã®ã¯å°é£ã§ãããä¸å¯è½ã ã¨å¤æããã ããã ãã®ãããªç¶æ³ä¸ã§ã¯ãDNSSEC対å¿ãªã¾ã«ããDS RRãå¾ããã¨ã¯ç¹ã«å°é£ã« ãªããDS RRã¯ã¾ã¼ã³ã«ããã«ãããRRã®ææè ã«é¢ããä¸è¬çãªDNSã®ã«ã¼ã«ã« ãããããªãããã§ããã ãã®åé¡ã¯NATåºæã®ãã®ã§ã¯ãªããã¨ã«æ³¨æãã¦ããããããDNSSECå¯¾å¿ ãªã¾ã«ãã¨æ¨©å¨ãã¼ã ãµã¼ãéã«åå¨ããããããDNSSECé対å¿ã® DNSã½ããã¦ã§ã¢ã¯DNSSECã®å¦çã妨害ããã DNSSEC対å¿ãªã¾ã«ããæªç½²åã¾ã¼ã³ã¾ãã¯DNSSECé対å¿DNSãµã¼ãã«ä¾å ããªããã°ãªããªãå ´åãDNSSEC対å¿ãªã¾ã«ãã¯DNSå¿çã®ç½²åæ¤è¨¼ãã§ããªã ã®ã§ãæªæ¤è¨¼ã®å¿çãåçãããã©ããã«ã¤ãã¦ãã¼ã«ã«ããªã·ã¼ã®å¤æã å¿ è¦ã¨ããã ç½²åä»ããã¼ã¿ãç½²åã®æå¹æéãè¶ãã¦ãã£ãã·ã¥ããªãããã«ã DNSSEC対å¿ãªã¾ã«ãã¯ãã¼ã¿ã®TTLãå¤å®ããéã«ç½²åã®æå¹æéã èæ ®ãã¹ãã§ãããã¾ã䏿¹ã§ãDNSSEC対å¿ãªã¾ã«ãã®æè¨ã誤ã£ã¦ãã å¯è½æ§ã許容ãã¹ãã§ããã ãããã£ã¦ãDNSSEC対å¿å帰ãã¼ã ãµã¼ãå ã®DNSSEC対å¿ãªã¾ã«ãã¯ã DNSSEC CD(checking disabled)ããã([RFC4034])ã«ç´°å¿ã®æ³¨æã æããªããã°ãªããªããããã¯ããã®å帰ãã¼ã ãµã¼ãã®ã¯ã©ã¤ã¢ã³ãã« ãªã£ã¦ããä»ã®DNSSEC対å¿ãªã¾ã«ãã«æå¹ãªç½²åãä¼éããã®ã é»å®³ããªãããã§ããã DNSSEC対å¿å帰ãã¼ã ãµã¼ããCDããããè¨å®ãããååãããå¦çãã æ¹æ³ã«ã¤ãã¦ã¯[RFC4035]ãåç §ã®ãã¨ã Arends, et al. Standards Track [Page 11] RFC 4033 DNS Security Introduction and Requirements March 2005 7. ã¹ã¿ããªã¾ã«ãã«é¢ããèæ ®ç¹ ãããã³ã«ã§å³å¯ã«è¦æ±ããã¦ããããã§ã¯ãªãã®ã ããã»ã¨ãã©ã® DNSååããã¯ã¹ã¿ããªã¾ã«ãã§çæããããå®ç¾©ã«ããã°ã ã¹ã¿ããªã¾ã«ãã¨ã¯DNSåå解決å¦çã®å¤§åãå帰ãã¼ã ãµã¼ãã« å§è¨ããããã«å帰ååããã¢ã¼ãã使ç¨ãããæå°éã®DNSãªã¾ã«ãã§ããã ã¹ã¿ããªã¾ã«ãã¯åºç¯å²ã§ä½¿ç¨ããã¦ãããããDNSSECã¢ã¼ããã¯ãã£ã¯ ã¹ã¿ããªã¾ã«ããèæ ®ããªããã°ãªããªããããããã¹ã¿ããªã¾ã«ãã§ å¿ è¦ã¨ãããDNSSECæ©è½ã¯ãDNSSEC対å¿ã®å復æ¤ç´¢ãè¡ããªã¾ã«ã (ãã«ãªã¾ã«ã)ã§å¿ è¦ã¨ãããæ©è½ã¨å¹¾ã¤ãã®ç¹ã§ç°ãªãã ã¹ã¿ããªã¾ã«ããDNSSECé対å¿ã§ãã£ãã¨ãã¦ãããã®ã¹ã¿ããªã¾ã«ãã 使ç¨ããå帰ãã¼ã ãµã¼ããDNSSEC対å¿ã§ããã°ãDNSSECã®æ©æµãåãããã ãããããªãããããDNSSECãµã¼ãã¹ãå®éã«ãã¦ã«ããã®ã§ããã°ã ã¹ã¿ããªã¾ã«ãã¯ä½¿ç¨ããå帰ãã¼ã ãµã¼ãã¨ãã¼ã ãµã¼ãã¸ã®éä¿¡ãã£ãã«ã® 両æ¹ãä¿¡é ¼ããªããã°ãªããªãã å帰ãã¼ã ãµã¼ããä¿¡é ¼ããåé¡ã¯ãã¼ã«ã«ããªã·ã¼ã«é¢ãããã®ã§ããã DNSSECé対å¿ã¹ã¿ããªã¾ã«ãã¯èªåã§ã¯DNSSECã®ãã¼ã¿æ¤è¨¼ãè¡ããªãããã 使ç¨ããå帰ãã¼ã ãµã¼ããä¿¡ãã以å¤ã«é¸æè¢ã¯åå¨ããªãã éä¿¡ãã£ãã«ãä¿¡é ¼ããåé¡ã¯ãä½ããã®ãã£ãã«ã»ãã¥ãªãã£ã®ä»çµã¿ã å¿ è¦ã¨ãããSIG(0)([RFC2931])ãTSIG([RFC2845])ã®ãããªDNSãã©ã³ã¶ã¯ã·ã§ã³ èªè¨¼ã®ä»çµã¿ãé©åã«ä½¿ç¨ããããIPsecãé©åã«ä½¿ç¨ããã°å åã ããã ç¹å®ã®å®è£ ã§ã¯ãOSåºæã®ããã»ã¹ééä¿¡ã®ä»çµã¿ã®ãããªå¥ã®é¸æè¢ã å©ç¨å¯è½ãããããªãããã®ãã£ãã«ã«ç§å¿æ§ã¯å¿ è¦ãªããããã¼ã¿ã® å®å ¨æ§ä¿è·ã¨ã¡ãã»ã¼ã¸èªè¨¼ã¯å¿ è¦ã§ããã å帰ãã¼ã ãµã¼ãã¨éä¿¡ãã£ãã«ã®ä¸¡æ¹ãä¿¡é ¼ããDNSSEC対å¿ã¹ã¿ã ãªã¾ã«ãã¯ãåä¿¡ããå¿çã¡ãã»ã¼ã¸ã®ã¡ãã»ã¼ã¸ãããå ã«ãã AD(Authenticated Data)ããããè¨å®ããã¦ãããã調æ»ãã¦ãããã å帰ãã¼ã ãµã¼ããå¿çã®åçé¨(Answer section)ã¨æ¨©å¨é¨(Authority section)ã® ãã¼ã¿å ¨ã¦ã«ã¤ãã¦ç½²åãæ¤è¨¼ã§ããã®ãã夿ãããã³ãã¨ãã¦ã ã¹ã¿ããªã¾ã«ãã¯ãã®ãã©ã°ããããå©ç¨ãããã¨ãã§ããã ä½ããã®çç±ã«ãããDNSSEC対å¿ã¹ã¿ããªã¾ã«ãã¨ãã¹ã¿ããªã¾ã«ãã使ç¨ãã å帰ãã¼ã ãµã¼ãã¨ã®éã«ä¿¡é ¼é¢ä¿ãç¯ããªãå ´åãã¹ã¿ããªã¾ã«ãã鏿å¯è½ãª æ¹æ³ããã1ã¤ãããååããã¡ãã»ã¼ã¸å ã®CD (Checking Disabled)ãããã è¨å®ãããã¨ã«ãããèªåèªèº«ã§ç½²åã®æ¤è¨¼ãè¡ããããã«ãããã¨ã§ããã ãã®ããã«ãããã¨ã§ãç½²åæ¤è¨¼ãè¡ãã¹ã¿ããªã¾ã«ãã¯ãDNSSECç½²åã®å¦çã éãã¦ã¾ã¼ã³ç®¡çè ã¨ä¿¡é ¼é¢ä¿ãç¯ããã¨ãã§ããããã«ãªãã 8. ã¾ã¼ã³ã«é¢ããèæ ®ç¹ ç½²åã¾ã¼ã³ã¨æªç½²åã¾ã¼ã³ã§ã¯å¹¾ã¤ãéãããããç½²åã¾ã¼ã³ã¯ã»ãã¥ãªãã£ã« é¢é£ããä»å çãªã¬ã³ã¼ã(RRSIGãDNSKEYãDSããã³NSECã¬ã³ã¼ã)ãæã¤ã RRSIGããã³NSECã¬ã³ã¼ãã¯ãã¾ã¼ã³æä¾åã«è¡ãããç½²åå¦çã®éã« çæããããã¾ã¼ã³ãã¼ã¿ã«ä»éããRRSIGã¬ã³ã¼ãã¯ãç½²åã¨ãã®ç½²å対象 ã¾ã¼ã³ãã¼ã¿ã®æå¹æéã®éå§æå»ã¨çµäºæå»ã®æ å ±ãä¿æããã Arends, et al. Standards Track [Page 12] RFC 4033 DNS Security Introduction and Requirements March 2005 8.1. TTLå¤ã¨RRSIGã®æå¹æéã¨ã®é¢ä¿ RRsetã®TTLå¤ã¨ãRRsetã®ç½²åãæã¤RRSIG RRãæå®ããç½²åã®æå¹æéã® åºå¥ã«æ³¨æãããã¨ã¯éè¦ã§ãããTTLå¤ã¯ãã£ãã·ã¥å ã®ãã¼ã¿ãã¼ã¹ã® ä¸è²«æ§ãæå³ãããã®ã ããDNSSECã¯ãã®æ©è½ã¾ãã¯å®ç¾©ã夿´ããªãã ãã£ãã·ã³ã°ãªã¾ã«ãã¯ãDNSSEC対å¿ã§ãããã©ããã«é¢ããããRRsetã® TTLãã£ã¼ã«ãã§æå®ãããæéãéããRRã»ããããã£ãã·ã¥ããæ¶å»ããã 䏿¹ã§ãRRSIG RR([RFC4034])å ã®æå¹æééå§(inception)ããã³ çµäº(expiration)ãã£ã¼ã«ãã¯ãç½²åãRRsetã®æ¤è¨¼ã«ä½¿ç¨ã§ããæéã æå®ãããç½²åã¾ã¼ã³ã®ãã¼ã¿ã®ç½²åã¯ã該å½ããRRSIG RRå ã®ãããã® ãã£ã¼ã«ãã§æå®ãããæéã ãæå¹ã§ããã ãªã¾ã«ãã®ãã£ãã·ã¥å ã«ããç½²åä»ãRRsetã®æå¹æéãTTLå¤ã§å»¶é·ããã ãã¨ã¯ã§ããªãããããç½²åä»ãRRsetã®ç½²åæå¹æéã¾ã§ã®æ®ãæéãã ãã£ãã·ã¥å ã«ãããã®RRsetã¨é¢é£ããRRSIG RRã¨ã®TTLã®ä¸éå¤ã¨ã㦠使ç¨ãããã¨ã¯ã§ããã 8.2. ã¾ã¼ã³ã§æ°ãã«çºçããæéä¾åã®åé¡ ç½²åã¾ã¼ã³ã«å«ã¾ããæ å ±ã«ã¯ããªãªã¸ãã«ã®DNSãããã³ã«ã«åå¨ããªãã£ã æéçãªä¾åé¢ä¿ãåå¨ãããç½²åã¾ã¼ã³ã«å«ã¾ããRRsetãæå¹æéå ã® RRSIG RRãæã¤ãã¨ãä¿è¨¼ãããããç½²åã¾ã¼ã³ã¯å®æçãªä¿å®ãå¿ è¦ã¨ããã RRSIG RRã®ç½²åæå¹æéã¯ãããç¹å®ã®ç½²åä»ãRRsetã®ç½²åãæå¹ã¨ã¿ãªããã æéã§ããããããã£ã¦åãã¾ã¼ã³å ã®å¥ã®RRsetã¯ç°ãªãæå»ã«æå¹æéã çµäºãããããããªããã¾ã¼ã³å ã®1ã¤ä»¥ä¸ã®RRsetã«åç½²åããã¨1ã¤ä»¥ä¸ã® RRSIG RRã夿´ããããããã¾ã¼ã³ã®SOAã·ãªã¢ã«çªå·ãã¤ã³ã¯ãªã¡ã³ãã㦠ã¾ã¼ã³æ´æ°ãæç¤ºããã¨ã¨ãã«SOA RRsetã®åç½²åãå¿ è¦ã¨ãªãã ã¤ã¾ããã¾ã¼ã³å ã®RRsetã«åç½²åããã¨ãDNS NOTIFYã¡ãã»ã¼ã¸ã¨ã¾ã¼ã³ 転éå¦çã®ããªã¬ã¼ã¨ãªãã 9. ãã¼ã ãµã¼ãã«é¢ããèæ ®ç¹ ãªã¾ã«ãããååããã¡ãã»ã¼ã¸ã«ããã¦ãã¡ãã»ã¼ã¸ãµã¤ãºå¶éãèæ ®ã㦠EDNS0ãããã使ç¨ããDOããããè¨å®ãã¦é©åãªDNSSECã¬ã³ã¼ã(RRSIGãDNSKEYã DSããã³NSEC)ã®åä¿¡ã叿ãããã¨ãéç¥ããå ´åãDNSSEC対å¿ãã¼ã ãµã¼ã㯠ãã®ååããã¸ã®å¿çã«DNSSECã¬ã³ã¼ããå«ãã¦è¿ãã¹ãã§ããã DNSSEC RRãã¡ãã»ã¼ã¸ã«å«ããã¨ã容æã«UDPã¡ãã»ã¼ã¸åãè©°ã(truncate)㨠TCPã¸ã®å¾éãçãããããDNSSEC対å¿ãã¼ã ãµã¼ãã¯EDNSã® "sender's UDP payload"ã®ä»çµã¿ããµãã¼ãããªããã°ãªããªãã Arends, et al. Standards Track [Page 13] RFC 4033 DNS Security Introduction and Requirements March 2005 DNSSECã®éµãã¢ã«ã¤ãã¦ãç§å¯éµã¯å¯è½ã§ããã°ãªãã©ã¤ã³ã§ä¿æãã¹ãã ãã DNSã®ãã¤ãããã¯ã¢ãããã¼ããæå¹ãªã¾ã¼ã³ã§ã¯ããã¯ä¸å¯è½ã§ããã ãã¤ãããã¯ã¢ãããã¼ããè¡ãå ´åãã¾ã¼ã³ã®ãã©ã¤ããªãã¹ã¿ãµã¼ã㯠ã¾ã¼ã³æ´æ°æã«åç½²åãè¡ããªããã°ãªããªããããZSKã¨å¯¾ã®ç§å¯éµã¯ ãªã³ã©ã¤ã³ã§ä¿æãããªããã°ãªããªãã ããã¯ã¾ã¼ã³ã®DNSKEY RRsetãZSKã¨KSKã«åãããã¨ãæçãªä¾ã§ããã ãã®ãããªç¶æ³ã§ããKSKã¨å¯¾ã®ç§å¯éµã¯ä¾ç¶ã¨ãã¦ãªãã©ã¤ã³ã§ä¿æãã ZSKãããé·ãå©ä¾¿æ§ã®ããæå¹æéãè¨å®ãããã¨ãã§ããã ã¾ã¼ã³è»¢éæã«ã¾ã¼ã³å ¨ä½ã®å®å ¨æ§ãä¿è·ããã«ã¯ãDNSSECã ãã§ã¯ä¸åå ã§ããããªããªãç½²åã¾ã¼ã³ã§ãã£ã¦ãåã¾ã¼ã³ãããã°ç½²åãç¡ã 権å¨ãæããªããã¼ã¿ãå«ãããã§ããããããã£ã¦ã¾ã¼ã³ä¿å®ä½æ¥ã«ã¯ ä»å çãªä»çµã¿(ããããã¯TSIGãSIG(0)ãããã¯IPsecã®ãããªãã£ãã« ã»ãã¥ãªãã£å½¢æ ã®ãã®)ãå¿ è¦ã¨ãªãã 10. DNSSECã®é¢é£ææ¸ DNSSECã®ææ¸ç¾¤ã¯ããã大ããªDNSåºæ¬ãããã³ã«ææ¸ç¾¤ã«å±ããå¹¾ã¤ã㮠主è¦ãªã°ã«ã¼ãã«åå²ã§ããã "DNSSECãããã³ã«ææ¸ç¾¤"ã¯ãDNSSECã®ä¸å¿é¨åãæã3ã¤ã®ææ¸ãæãã 1. DNSSECã®ç´¹ä»ã¨ãã®è¦ä»¶ (æ¬ææ¸) 2. DNSSECã§ä½¿ç¨ãããªã½ã¼ã¹ã¬ã³ã¼ã [RFC4034] 3. DNSSECã®ããã®ãããã³ã«å¤æ´ [RFC4035] æ´ã«ãDNSSECã®ä¸å¿é¨åã«è¿½å ã¾ãã¯å¤æ´ãè¡ãææ¸ããã®åé¡ã«å±ããã ä¾ãã°DNSSEC対å¿ã¹ã¿ããªã¾ã«ãã¨ä¸æµã®DNSSEC対å¿å帰ãã¼ã ãµã¼ãéã® éä¿¡ã«é¢ããä»å¾ã®åãçµã¿ãªã©ãèããããã "é»åç½²åã¢ã«ã´ãªãºã ã®å®è£ 仿§"ææ¸ç¾¤ã¯ãç¹å®ã®é»åç½²åã¢ã«ã´ãªãºã ã DNSSECãªã½ã¼ã¹ã¬ã³ã¼ããã©ã¼ãããã«é©åããããå®è£ ããææ³ãè¨è¿°ãã ææ¸ç¾¤ã§ãããææ¸ç¾¤ã«å±ããææ¸ãããããç¹å®ã®é»åç½²åã¢ã«ã´ãªãºã 1ã¤ãæ±ããDNSSECã®ä¸å¿é¨åãè¦å®ãããæ®µéã§å®ç¾©ãããã¢ã«ã´ãªãºã ã® ãªã¹ãã«ã¤ãã¦ã¯ã[RFC4034]ã®ä»é²"DNSSECã¢ã«ã´ãªãºã ã¨ãã¤ã¸ã§ã¹ã ã¿ã¤ã"ãåç §ã®ãã¨ã "ãã©ã³ã¶ã¯ã·ã§ã³èªè¨¼ãããã³ã«"ææ¸ç¾¤ã¯ãç§å¯éµã®ç¢ºç«ã¨æ¤è¨¼ãªã©ã å«ãã¦DNSã¡ãã»ã¼ã¸èªè¨¼ã«ã¤ãã¦æ±ãææ¸ç¾¤ã§ãããå³å¯ã«ã¯é¢é£ææ¸ã§å®ç¾© ããDNSSEC仿§ã®ä¸é¨ã§ã¯ãªãããDNSSECã¨ã®é¢ä¿ã示ãããã«ãã®ææ¸ç¾¤ã« ã¤ãã¦ãè¨è¿°ããã Arends, et al. Standards Track [Page 14] RFC 4033 DNS Security Introduction and Requirements March 2005 æå¾ã®ææ¸ç¾¤ã§ãã"æ°ããã»ãã¥ãªãã£ã®ä½¿ç¨æ³"ã¯ãææ¡ããDNSSECã å¥ã®ã»ãã¥ãªãã£é¢é£ã®ç®çã§ä½¿ç¨ããæ¹æ³ã模索ãããã®ã§ããã DNSSECã¯ãããæ°ããä½¿ç¨æ³ã«å¯¾ãã¦ç´æ¥çãªã»ãã¥ãªãã£ã¯æä¾ããªããã æ°ããä½¿ç¨æ³ã®æ¯æ´ã¯ã§ãããããããªããDNSã使ç¨ããè¨¼ææ¸ã®ä¿åã¨é å¸ ([RFC2538])ã®æ¹æ³ã«é¢ããææ¸ã¯ãã®ææ¸ç¾¤ã«å±ããã 11. IANAã«é¢ããèæ ®ç¹ ãã®æ¦ç¥ãè¨ããææ¸ã§ã¯ãIANAã«é¢ããæ°ããªèæ ®ãã¹ãäºé ã¯åå¨ããªãã DNSSECå°å ¥ã«éãã¦IANAã«é¢ãã¦èæ ®ãã¹ãäºé ã®å ¨å®¹ã«ã¤ãã¦ã¯[RFC4034]ã åç §ã®ãã¨ã 12. ã»ãã¥ãªãã£ã«é¢ããèæ ®ç¹ æ¬ææ¸ã¯DNSSECãç´¹ä»ããæ°ããã»ãã¥ãªãã£ã¬ã³ã¼ãã¨DNSãããã³ã«ã® ä¿®æ£ã«é¢ããææ¸ç¾¤ã«ã¤ãã¦è¨è¿°ãã¦ãããDNSSECã¯ãRRsetã«é»åç½²åã ä»ä¸ãããã¨ã«ãããDNSãã¼ã¿ã®åºèªã®èªè¨¼æ©è½ã¨ãã¼ã¿ã®å®å ¨æ§ä¿è·æ©è½ã æä¾ãããæ¬ã»ã¯ã·ã§ã³ã§ã¯ãããã®æ¡å¼µæ©è½ã®å¶éã«ã¤ãã¦è¿°ã¹ãã æ¬ææ¸ã¨é¢é£ææ¸ã§å®ç¾©ãã¦ããããã«ãDNSSEC対å¿ãªã¾ã«ããDNSå¿çã® ç½²åæ¤è¨¼ãè¡ãããã«ã¯ãä¿¡é ¼ã§ããèµ·ç¹ããå¿çã«å«ã¾ããã¾ã¼ã³ã¾ã§ é£ãªãå ¨ã¾ã¼ã³ãç½²åã¾ã¼ã³ã§ãªããã°ãªããªããã¾ãåå解決å¦çã«é¢ãã å ¨ã¦ã®ãã¼ã ãµã¼ãã¨ãªã¾ã«ãã¯DNSSEC対å¿ã§ãªããã°ãªããªãã DNSSEC対å¿ãªã¾ã«ãã¯ãæªç½²åã¾ã¼ã³ã§çæãããå¿çãDNSSECé対å¿ã® ãã¼ã ãµã¼ããæä¾ããã¾ã¼ã³ã§çæãããå¿çã¯ç½²åæ¤è¨¼ã§ããªãã ã¾ãDNSSECé対å¿ã®å帰ãã¼ã ãµã¼ããçµç±ãã¦ããDNSãã¼ã¿ãåå¾ã§ããªã å ´åãããããå¾ãããããããDNSãã¼ã¿ã¯ç½²åæ¤è¨¼ã§ããªãã DNSSEC対å¿ãªã¾ã«ããå¿ è¦ãªèªè¨¼éµãå ¥æã§ããªãã£ãããå ¥æã§ãã¦ã ç½²åæ¤è¨¼ã§ããªãã¨ãã£ãå ´åã®ãããªãèªè¨¼ã®é£éã«æçµ¶ãçããå ´åã DNSSEC対å¿ãªã¾ã«ãã¯ãã®èªè¨¼ã®é£éãå¿ è¦ã¨ããDNSãã¼ã¿ãç½²åæ¤è¨¼ ã§ããªãã æ¬ææ¸ã§ã¯ãIPsecã§ä¿è·ããããã£ãã«ã®å©ç¨ãTSIG([RFC2845])ã¾ãã¯SIG(0) ([RFC2931])ã®ãããªDNSãã©ã³ã¶ã¯ã·ã§ã³èªè¨¼ã®ä»çµã¿ã¨ãã£ãã DNSååããã«ã»ãã¥ãªãã£ãä»å ããå¥ã®æ¹æ³ã«ã¤ãã¦ç°¡åã«è¨è¿°ãã¦ãããã ãã©ã³ã¶ã¯ã·ã§ã³ã»ãã¥ãªãã£ã¯DNSSECããèªä½ã®ä¸é¨ã§ã¯ãªãã ç½²åãæ¤è¨¼ããªãDNSSEC対å¿ã¹ã¿ããªã¾ã«ãã¯ãå®ç¾©ã«ããèªèº«ã§ã¯DNSSECã® ç½²åãæ¤è¨¼ããªãã®ã§ãç½²åæ¤è¨¼ã代çã§è¡ãDNSSEC対å¿å帰ãã¼ã ãµã¼ã ä¸ã®æ»æãDNSSEC対å¿å帰ãã¼ã ãµã¼ãããã®æ»æããªã¾ã«ãããDNSSECå¯¾å¿ å帰ãã¼ã ãµã¼ãã¾ã§ã®éä¿¡è·¯ã«ãããæ»æã«å¯¾ãã¦èå¼±ã§ããã æå¾ã«æããè å¨ãé²å¾¡ããããã«ãç½²åãæ¤è¨¼ããªãDNSSEC対å¿ã¹ã¿ã ãªã¾ã«ãã¯ä½ããã®ãã£ãã«ã»ãã¥ãªãã£ã使ç¨ãã¹ãã§ããã å§ãã«æããäºã¤ã®è å¨ã«å¯¾ããé²å¾¡æ³ã¨ãã¦å¯ä¸ç¥ããã¦ãããã®ã¯ã DNSSEC対å¿ã¹ã¿ããªã¾ã«ããèªåèªèº«ã§ç½²åæ¤è¨¼ãå®è¡ãããã¨ã§ããã ãããå®ç¾©ã«ããããã®æç¹ã§ãã®ãªã¾ã«ãã¯ç½²åãæ¤è¨¼ããªãDNSSECå¯¾å¿ ã¹ã¿ããªã¾ã«ãã§ã¯ãªããªãã Arends, et al. Standards Track [Page 15] RFC 4033 DNS Security Introduction and Requirements March 2005 DNSSECã¯ãµã¼ãã¹ä¸è½æ»æãé²å¾¡ããªããDNSSECãå°å ¥ãããã¨ã«ããã DNSSEC対å¿ãªã¾ã«ãã¨DNSSEC対å¿ãã¼ã ãµã¼ãã¯å ±ã«æå·å¦çãå©ç¨ãã ãµã¼ãã¹ä¸è½æ»æã«å¯¾ãã¦èå¼±ã«ãªããæ»æè ã¯DNSSECã®ä»çµã¿ãå©ç¨ãã¦ã ç®æ¨ã¨ãããã·ã³ã®ãªã½ã¼ã¹æ¶è²»ã試ã¿ãããããã§ããã æå·å¦çãå©ç¨ããæ»æã«ã¯å°ãªãã¨ã2ã¤ã®å½¢æ ãèãããããæ»æè ã¯ã å¿çã¡ãã»ã¼ã¸å ã®RRSIG RRãæ¹ããããããå¿ è¦ä»¥ä¸ã«è¤éãªèªè¨¼ã®é£éã æ§ç¯ãããã¨ã«ãããDNSSEC対å¿ãªã¾ã«ãã®ç½²åæ¤è¨¼ã³ã¼ãå®è¡æã«ãªã¾ã«ãã® ãªã½ã¼ã¹ãæ¶è²»ããããã¨ãã§ãããããããªããã¾ããDNSãã¤ããã㯠ã¢ãããã¼ãããµãã¼ãããDNSSEC対å¿ãã¼ã ãµã¼ãã«å¯¾ãã¦ãéå°ãªé »åº¦ã§ ã¾ã¼ã³å ã®RRsetã«åç½²åãå¼·å¶ãããããªãã¤ãããã¯ã¢ãããã¼ãã® ã¹ããªã¼ã ãéãã¤ãããã¨ã«ããããã¼ã ãµã¼ãã®ãªã½ã¼ã¹ãæ¶è²»ããã ãã¨ãã§ãããããããªãã è¨è¨æã«æå³çã«ãã®ããã«é¸æããã®ã§ãDNSSECã¯ç§å¿æ§ãæä¾ããªãã DNSSECãå°å ¥ããã¨ãæªæãæã£ãéå£ãNSECã®é£éããã©ã£ã¦ã¾ã¼ã³å ã® å ¨ã¦ã®ååãåæã§ããããã«ãªããNSEC RRã¯ãã¾ã¼ã³ã«åå¨ããå ¨ã¦ã®ååã æ£è¦é åºã¥ããããããé ã«ãªã³ã¯ãã¦ãããã¨ã«ãããã¾ã¼ã³å ã«åå¨ããªã ååãæç¤ºããããããã£ã¦ãæ»æè ã¯NSEC RRãé ã«åãåããããã¨ã§ã ã¾ã¼ã³å ã®å ¨ã¦ã®ååãåå¾ãããã¨ãã§ãããããã¯DNSãã®ãã®ã¸ã® æ»æã§ã¯ãªãããã¾ã¼ã³ã®å 容ãåæãããã¨ã«ãããæ»æè ã¯ãããã¯ã¼ã¯ ãã¹ããä»ã®ãªã½ã¼ã¹ãææ¡ã§ããå¯è½æ§ãããã DNSSECãå°å ¥ããã¨DNSãå¤§å¹ ã«è¤éã«ãªããããå®è£ ã®ãã°ãã¾ã¼ã³è¨å®ã® 誤ããçºçããæ©ä¼ãå¢å ãããç¹ã«ãªã¾ã«ãã§DNSSECç½²åæ¤è¨¼æ©è½ãæå¹ã« ããã¨ãDNSSECã®è¨å®èª¤ãããã°ã®ããã«æ£å½ãªã¾ã¼ã³å ¨ä½ãå°éä¸å¯è½ã«ãªã å¯è½æ§ãããã DNSSECã¯ç½²åãæããªãã¾ã¼ã³ãã¼ã¿ã®æ¹ãããé²å¾¡ããªããã¾ã¼ã³ã«ããã« ãããæ¨©å¨ãæããªããã¼ã¿(親ã¾ã¼ã³ã®ã°ã«ã¼ã¨NS RR)ã¯ç½²åãããªãã ããã«ããèªè¨¼ã®é£éã®æ¤è¨¼æã«åé¡ãçãããã¨ã¯ãªãããæ¨©å¨ãæããªã ãã¼ã¿ãã®ãã®ã¯ã¾ã¼ã³è»¢éä¸ã®æ¹ããã«å¯¾ãã¦èå¼±ã§ãããã¨ãæå³ããã DNSSECã¯RRsetã«å¯¾ãã¦ãã¼ã¿ã®åºèªã®èªè¨¼ã¨ãã¼ã¿ã®å®å ¨æ§ä¿è·ãæä¾ ã§ããããã¾ã¼ã³ã«å¯¾ãã¦ã¯æä¾ã§ããªãã®ã§ã(TSIGãSIG(0)ããã㯠IPsecã®ãããª)ä»ã®ä»çµã¿ã使ç¨ãã¦ã¾ã¼ã³è»¢éãä¿è·ããªããã°ãªããªãã Arends, et al. Standards Track [Page 16] RFC 4033 DNS Security Introduction and Requirements March 2005 ã»ãã¥ãªãã£ã«é¢ããèæ ®ç¹ã«ã¤ãã¦ä»ã«è¿½å ãã¹ãäºé ã«ã¤ãã¦ã¯ã [RFC4034]ã¨[RFC4035]ãåç §ã®ãã¨ã 13. Acknowledgements This document was created from the input and ideas of the members of the DNS Extensions Working Group. Although explicitly listing everyone who has contributed during the decade in which DNSSEC has been under development would be impossible, the editors would particularly like to thank the following people for their contributions to and comments on this document set: Jaap Akkerhuis, Mark Andrews, Derek Atkins, Roy Badami, Alan Barrett, Dan Bernstein, David Blacka, Len Budney, Randy Bush, Francis Dupont, Donald Eastlake, Robert Elz, Miek Gieben, Michael Graff, Olafur Gudmundsson, Gilles Guette, Andreas Gustafsson, Jun-ichiro Itojun Hagino, Phillip Hallam-Baker, Bob Halley, Ted Hardie, Walter Howard, Greg Hudson, Christian Huitema, Johan Ihren, Stephen Jacob, Jelte Jansen, Simon Josefsson, Andris Kalnozols, Peter Koch, Olaf Kolkman, Mark Kosters, Suresh Krishnaswamy, Ben Laurie, David Lawrence, Ted Lemon, Ed Lewis, Ted Lindgreen, Josh Littlefield, Rip Loomis, Bill Manning, Russ Mundy, Thomas Narten, Mans Nilsson, Masataka Ohta, Mike Patton, Rob Payne, Jim Reid, Michael Richardson, Erik Rozendaal, Marcos Sanz, Pekka Savola, Jakob Schlyter, Mike StJohns, Paul Vixie, Sam Weiler, Brian Wellington, and Suzanne Woolf. No doubt the above list is incomplete. We apologize to anyone we left out. 14. References 14.1. Normative References [RFC1034] Mockapetris, P., "Domain names - concepts and facilities", STD 13, RFC 1034, November 1987. [RFC1035] Mockapetris, P., "Domain names - implementation and specification", STD 13, RFC 1035, November 1987. [RFC2535] Eastlake 3rd, D., "Domain Name System Security Extensions", RFC 2535, March 1999. [RFC2671] Vixie, P., "Extension Mechanisms for DNS (EDNS0)", RFC 2671, August 1999. [RFC3225] Conrad, D., "Indicating Resolver Support of DNSSEC", RFC 3225, December 2001. Arends, et al. Standards Track [Page 17] RFC 4033 DNS Security Introduction and Requirements March 2005 [RFC3226] Gudmundsson, O., "DNSSEC and IPv6 A6 aware server/resolver message size requirements", RFC 3226, December 2001. [RFC3445] Massey, D. and S. Rose, "Limiting the Scope of the KEY Resource Record (RR)", RFC 3445, December 2002. [RFC4034] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, "Resource Records for DNS Security Extensions", RFC 4034, March 2005. [RFC4035] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, "Protocol Modifications for the DNS Security Extensions", RFC 4035, March 2005. 14.2. Informative References [RFC2136] Vixie, P., Thomson, S., Rekhter, Y., and J. Bound, "Dynamic Updates in the Domain Name System (DNS UPDATE)", RFC 2136, April 1997. [RFC2181] Elz, R. and R. Bush, "Clarifications to the DNS Specification", RFC 2181, July 1997. [RFC2308] Andrews, M., "Negative Caching of DNS Queries (DNS NCACHE)", RFC 2308, March 1998. [RFC2538] Eastlake 3rd, D. and O. Gudmundsson, "Storing Certificates in the Domain Name System (DNS)", RFC 2538, March 1999. [RFC2845] Vixie, P., Gudmundsson, O., Eastlake 3rd, D., and B. Wellington, "Secret Key Transaction Authentication for DNS (TSIG)", RFC 2845, May 2000. [RFC2931] Eastlake 3rd, D., "DNS Request and Transaction Signatures ( SIG(0)s )", RFC 2931, September 2000. [RFC3007] Wellington, B., "Secure Domain Name System (DNS) Dynamic Update", RFC 3007, November 2000. [RFC3008] Wellington, B., "Domain Name System Security (DNSSEC) Signing Authority", RFC 3008, November 2000. [RFC3090] Lewis, E., "DNS Security Extension Clarification on Zone Status", RFC 3090, March 2001. [RFC3597] Gustafsson, A., "Handling of Unknown DNS Resource Record (RR) Types", RFC 3597, September 2003. Arends, et al. Standards Track [Page 18] RFC 4033 DNS Security Introduction and Requirements March 2005 [RFC3655] Wellington, B. and O. Gudmundsson, "Redefinition of DNS Authenticated Data (AD) bit", RFC 3655, November 2003. [RFC3658] Gudmundsson, O., "Delegation Signer (DS) Resource Record (RR)", RFC 3658, December 2003. [RFC3755] Weiler, S., "Legacy Resolver Compatibility for Delegation Signer (DS)", RFC 3755, May 2004. [RFC3757] Kolkman, O., Schlyter, J., and E. Lewis, "Domain Name System KEY (DNSKEY) Resource Record (RR) Secure Entry Point (SEP) Flag", RFC 3757, April 2004. [RFC3833] Atkins, D. and R. Austein, "Threat Analysis of the Domain Name System (DNS)", RFC 3833, August 2004. [RFC3845] Schlyter, J., "DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format", RFC 3845, August 2004. Arends, et al. Standards Track [Page 19] RFC 4033 DNS Security Introduction and Requirements March 2005 Authors' Addresses Roy Arends Telematica Instituut Brouwerijstraat 1 7523 XC Enschede NL EMail: [email protected] Rob Austein Internet Systems Consortium 950 Charter Street Redwood City, CA 94063 USA EMail: [email protected] Matt Larson VeriSign, Inc. 21345 Ridgetop Circle Dulles, VA 20166-6503 USA EMail: [email protected] Dan Massey Colorado State University Department of Computer Science Fort Collins, CO 80523-1873 EMail: [email protected] Scott Rose National Institute for Standards and Technology 100 Bureau Drive Gaithersburg, MD 20899-8920 USA EMail: [email protected] Arends, et al. Standards Track [Page 20] RFC 4033 DNS Security Introduction and Requirements March 2005 Full Copyright Statement Copyright (C) The Internet Society (2005). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf- [email protected]. Acknowledgement Funding for the RFC Editor function is currently provided by the Internet Society. Arends, et al. Standards Track [Page 21]