Check your resolvers: KSK-2010 trust anchor phased out

Following the successful rollover of the root KSK pair last year, all that remains is to phase out the old trust anchor. ICANN, the administrator of the root zone, is currently making the final preparations for deletion of the old key pair. Validating resolver operators should therefore verify that the old trust anchor has in fact been deleted from their systems.

Rollover

The actual rollover of the KSK pair for the root zone took place last autumn. Since 11 October 2018, the old digital signature (KSK-2010) has not been used to validate the DNSSEC chain, and the new signature (KSK-2017) has been used instead.

The switch to the new signature was the most critical point in the entire process, because validating resolvers needed to have a (guaranteed identical) copy of the new signature installed as a trust anchor in order to continue validating the signatures linked to DNS records after 11 October. It was due to fears that not all resolvers might be ready that the switch was postponed for a year. And it was with good reason that, during the actual rollover, SIDN Labs monitored the performance of DNSSEC on a minute-by-minute basis through the Root Canary project. The initial evaluation by ICANN, the administrator of the zone, was published earlier this month.

RootCanary-Seen_KSK_RRSIDs_from_RIPE_Atlas_Resolvers

Phase-out

Following the successful rollover, what remains is the phase-out of the old KSK-2010 trust anchor. The old key was officially revoked on 11 January 2019. Validating resolvers that support RFC 5011 should by now have automatically deleted the revoked trust anchor. On 22 March 2019, KSK-2010 will be completely removed from the root zone. That is unlikely to cause any problems, since the key pair has not been used to sign DNS records since 11 October last year. In the months since, the KSK-2010 will have been completely removed from ICANN's HSMs, enabling completion of the entire rollover process after three years.

For validating resolver operators, it is therefore important to verify that the old trust anchor has indeed been deleted from their systems. Although the KSK-2010 private key has never left the HSMs and has not been compromised (as far as anyone can tell), the presence of old key material is inevitably liable to be a source of future insecurity and confusion.

Deleted?

For advice on checking the trust anchors currently in use, tailored to the various DNS resolvers, refer to the article that we published in the weeks prior to the actual rollover. If the old KSK-2010 (key ID 19036) is still present and active as a trust anchor, it will need to be deleted manually. For guidance on how to do that, refer to our article on installation of the new trust anchor.

Comments

  • Tuesday 23 July 2019

    About SIDN

    Parenting by Barbie?

    Thumb-Barbie-doll-portrait

    AI AI Barbie explores the relationship between parents, children and smart toys

    Read more
  • Tuesday 11 December 2018

    .nl domain name

    Get the best domain name for your business: use the SIDN checklist!

    zzpthumbnail

    Need a domain name that'll win you customers. Use our checklist!

    Read more
  • Monday 26 March 2018

    Internet security

    Everyone should have access to a secure connection

    Thumb-free-wifi

    Let’s Connect! is an open-source VPN solution

    Read more

Sorry

Your browser is too old to optimally experience this website. Upgrade your browser to improve your experience.