[dns-operations] Email is hard (was Re: Operational message: DNS root zone KSK rollover to occur on October 11, 2017 at 1600 UTC)

Matt Larson matt.larson at icann.org
Fri Sep 15 15:52:31 UTC 2017


Sorry for the duplicates: there were unanticipated interactions between ICANN's and DNS-OARC's mail servers. My troubleshooting process was not unlike this:

An mechanical engineer, physicist, and computer programmer are in a car driving down a steep mountain when the brakes fail. The car careens around bends picking up speed until they finally reach the bottom and the car rolls to a stop.
The engineer hops out of the car and begins inspecting the brakes for the source of the failure. The physicist grabs a pad of paper and starts calculating the maximum angular momentum and friction coefficients.
The computer programmer looks at the car, then at the mountain and says, "Let's push it up to the top and see if it happens again."

Matt


> On Sep 14, 2017, at 5:08 PM, Matt Larson <matt.larson at icann.org> wrote:
> 
> The root zone management partners, ICANN and Verisign, are working together to change the DNS root zone's key-signing key (KSK). This process is referred to as "rolling" the root zone KSK.
> 
> The root zone's apex DNSKEY RRset has been signed with the same KSK, known as KSK-2010, since the root zone was first signed in July, 2010. On October 11, 2017, at approximately 1600 UTC, the root zone will be published with the apex DNSKEY RRset signed for the first time with a new KSK, known as KSK-2017. The root zone apex DNSKEY RRset will be signed with only KSK-2017 going forward.
> 
> While the specific date of the KSK rollover, October 11, 2017, had been announced previously, the time of 1600 UTC on that day has not been announced until now, which is the primary purpose of this message.
> 
> The public portion of the root zone KSK is configured as a trust anchor in software performing DNSSEC validation. The configuration of any software performing DNSSEC validation will need to be updated to reference KSK-2017 on or before October 11, 2017, or all DNS responses received by that software will fail DNSSEC validation, resulting ultimately in error messages to end users. In many cases, software performing DNSSEC validation supports "Automated Updates of DNS Security", the protocol defined in RFC 5011 that can automatically update a DNSSEC validator's trust anchor configuration. If the software does not support this protocol, or it is incorrectly implemented or not configured correctly, the trust anchor will need to be updated manually.
> 
> Anyone operating software performing DNSSEC validation with the root zone KSK configured as a trust anchor must take action on or before October 11, 2017, to confirm that their software is configured with KSK-2017 as a trust anchor and, if not, take the necessary steps to update the configuration.
> 
> Further information about the root KSK rollover, including information about how to check and update the trust anchor configuration of popular recursive resolver implementations that support DNSSEC validation, is available at https://icann.org/kskroll.
> 
> For the root zone management partners,
> 
> Matt Larson
> VP of Research, ICANN
> 
> Duane Wessels
> Distinguished Engineer, Verisign
> 
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-operations mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: Message signed with OpenPGP
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20170915/7e30c22a/attachment.sig>


More information about the dns-operations mailing list