authenticatezhonguancun

zhonguancun  时间:2021-04-02  阅读:()
CNNICDNSSECPolicyandPracticeStatementforICANNEmergencyBack-EndRegistryOperatorChinaInternetNetworkInformationCenter(CNNIC)Submittedon2018-09-011DocumentControlSECURITYCALSSIFICATIONFileNamePublicDNSSECPolicyandPracticeStatementforICANNEmergencyBack-EndRegistryOperatorAuditsDateVersionUpdateDescription2013-07-18Version-1.
0CNNICEBEROTeamFirstVersion2014-10-15Version-1.
2CNNICEBEROTeamAdjustthestructureofthedocument2017-08-07Version-1.
3CNNICEBEROTeamUpdateManagement,OperationalandPhysicalControl2017-08-28Version-1.
4CNNICEBEROTeamAdjustthestructureofthedocument2017-10-23Version-1.
5GuangTaiXieQuartlyReview2017-12-1Version-1.
5GuangTaiXieQuartlyReview2018-01-16Version-1.
6GuangTaiXieQuartlyReview,FixsomeURLandstatement.
2018-05-08Version-1.
6GuangTaiXieQuartlyReview.
2019-09-03Version-1.
7CNNICEBEROTeamQuartlyReview.
Contents1Introduction31.
1Overview31.
2DocumentNameandIdentification.
31.
3CommunityandApplicability.
41.
4SpecificationAdministration.
52PublicationandRepositories.
52.
1Repositories.
52.
2PublicationofKeySigningKeys(KSK)62.
3AccessControlsonRepositories63OperationalRequirements.
63.
1MeaningofDomainNames.
63.
2ActivationofDNSSECforChildZone.
63.
3IdentificationandAuthenticationofChildZoneManager63.
4RegistrationofDelegationSigner(DS)ResourceRecords63.
5MethodtoProvePossessionofPrivateKey.
73.
6RemovalofDSResourceRecords.
74Facility,Management,andOperationalControl.
74.
1PhysicalControls74.
2ProceduralControls.
94.
3PersonnelControls.
104.
4AuditLoggingProcedures114.
5CompromiseandDisasterRecovery134.
6EntityTermination155TechnicalSecurityControls.
155.
1KeyPairGenerationandInstallation155.
2PrivateKeyProtectionandCryptographicModuleEngineeringControls.
.
.
.
.
.
165.
3OtherAspectsofKeyPairManagement.
185.
4ActivationData.
185.
5ComputerSecurityControls.
195.
6NetworkSecurityControls195.
7Timestamping.
195.
8LifeCycleTechnicalControls.
196ZoneSigning.
206.
1KeyLengths,KeyTypesandAlgorithms.
206.
2AuthenticatedDenialofExistence.
206.
3SignatureFormat.
206.
4ZoneSigningKeyRoll-over.
206.
5KeySigningKeyRoll-over.
216.
6SignatureLife-timeandRe-signingFrequency.
216.
7VerificationofZoneSigningKeySet.
226.
8VerificationofResourceRecords.
226.
9ResourceRecordsTime-to-Live.
227ComplianceAudit.
237.
1FrequencyofEntityComplianceAudit.
237.
2Identity/QualificationsofAuditor.
237.
3Auditor'sRelationshiptoAuditedParty.
237.
4TopicsCoveredbyAudit.
237.
5ActionsTakenasaresultofDeficiency.
237.
6CommunicationofResults248LegalMatters248.
1Fees248.
2FinancialResponsibility.
248.
3ConfidentialityofBusinessInformation.
248.
4PrivacyofPersonalInformation.
258.
5LimitationsofLiability268.
6TermandTermination261Introduction1.
1OverviewDomainNameSystemSecurityExtensions(DNSSEC)areasetofspecificationsfromIETFtoaddsecuritytotheDNS.
DNSSECprovidesamechanismtovalidateDNSdatatoprovethatithasnotbeenmodifiedduringtransitovertheInternet.
ThisisachievedbyincorporatingpublickeycryptographyintotheDNShierarchy,formingachainoftrustoriginatingfromtherootzone.
DNSwasnotoriginallydesignedwithstrongsecuritymechanismstoprovideintegrityandauthenticityofDNSdata.
Overtheyears,anumberofvulnerabilitieshavebeendiscoveredthatthreatenthereliabilityandtrustworthinessofthesystem.
DNSSECaddressesthesevulnerabilitiesbyaddingdataoriginauthentication,dataintegrityverificationandauthenticateddenialofexistencecapabilitiestotheDNS.
Thisdocumentwillprovidethegoverningpoliciesandprovisionsrelatedtothemanagement,securityandtechnicalspecificationsofthe".
TLD"(EBEROeventTLD)KeySigningKey(KSK)andZoneSigningKey(ZSK).
ThisdocumentwillbeunderthecontrolandmanagementofCNNIC.
Informationinthisdocumentandsubsequentdocumentswillbemadepublicasrequired.
1.
2DocumentNameandIdentificationDNSSECPolicyandPracticeStatement.
1.
3CommunityandApplicabilityInthissection,associatedentitiesandtheirrolesaredescribed.
1.
3.
1RegistryWheninanEBEROevent,CNNICwillbetheRegistryfortheTLDtop-leveldomain.
TheRegistryadministratesregistrationsoftheTLDdomainnamesandoperatesDNSserversfortheTLDzone,etc.
AsforDNSSECService,theRegistrygeneratessigningkeys(KSKandZSK)oftheTLDzoneandcompleteszonesigningfortheTLDzone.
Further,throughregisteringdelegationsigner(DS)recordsoftheRegistryintotherootzone,theRegistryenablesoriginauthenticationanddataintegrityverificationofrecordsintheTLDzonebyusingKSKoftherootzoneasatrustanchor.
1.
3.
2RegistrarTheRegistraroftheEBEROeventTLDisanentitywhohasconcludedanagreementwiththeRegistryforagencyoperationsontop-leveldomainnameregistrations.
TheRegistrarisresponsiblefortheadministrationandmanagementofdomainnamesonbehalfoftheRegistrant.
TheRegistrarhandlestheregistration,maintenanceandmanagementofaRegistrant'sdomainnameandisanaccreditedEBEROeventTLD'spartner.
TheRegistrarisresponsibleforsecurelyauthenticationoftheRegistrantofadomain.
TheRegistrarisresponsibleforadding,removingorupdatingspecifiedDSrecordsforeachdomainattherequestoftheRegistrant.
1.
3.
3RegistrantARegistrantisanentitythatcontrolsadomainname.
Registrantsareresponsibleforgeneratingandprotectingtheirownkeys,andregisteringandmaintainingtheDSrecordsthroughtheRegistrar.
TheRegistrantisresponsibleforissuinganemergencykeyrolloverifkeysaresuspectedofbeingcompromisedorhavebeenlost.
TheRegistrantmaydoalltheabovethingsitself.
Butinsomecases,Registrantrequests"DNSProvider"(maybeRegistrarorotherentity),whoprovidesoperationservicesforauthoritativeDNSservers,togeneratesigningkeys,composedigitalsignaturesonRegistrantZoneandgenerateDSrecord(s).
1.
3.
4RelyingPartyRelyingpartyisalltheentityrelatedtotheTLDDNSSECService,includingDNSProviders,cachingDNSserveroperatorsanduserswhoutilizetheirservices.
HerewerefertotheDNSProviderwhomanagesRegistrantZoneas"RegistrantZoneManager".
Insomecases,Registranthim/her-selfmaybeRegistrantZoneManager.
1.
4SpecificationAdministrationThisDPSwillbeperiodicallyreviewedandupdated,asappropriatebytheCNNICEBEROTeam.
CNNICEBEROTeamisresponsibleformanagingtheDPSandshouldbeconsideredthepointofcontactforallmattersrelatedtotheDPS.
1.
4.
1SpecificationAdministrationOrganizationChinaInternetNetworkInformationCenter(CNNIC)4South4thstreet,zhonguancunHaidianqu,BeijingP.
R.
China1.
4.
2ContactInformationCNNICEBEROTeam:ChinaInternetNetworkInformationCenter.
(CNNIC)4South4thstreet,zhonguancunHaidianqu,BeijingP.
R.
ChinaTelephone:+86-10-58813200Fax:+86-10-58812666-123Email:ebero@cnnic.
cnhttps://www.
cnnic.
cn2PublicationandRepositories2.
1RepositoriesCNNICpublishestheDPSinthedocssectionofCNNIC'swebsite,at:http://www.
cnnic.
cn/jscx/dnssec/dnssecdps/2.
2PublicationofKeySigningKeys(KSK)OnceanewgenerationtopleveldomainnamehavingbeenoperatedbyEBERO,thepublickeyoftheKSK(DSrecord)willbepublishedintherootzone2.
3AccessControlsonRepositoriesInformationpublishedinthedocsportionoftheCNNICwebsiteispubliclyaccessibleinformation.
Read-onlyaccesstosuchinformationisunrestricted.
CNNIChasimplementedlogicalandphysicalsecuritymeasurestopreventunauthorizedpersonsfromadding,deleting,ormodifyingrepositoryentries.
3OperationalRequirements3.
1MeaningofDomainNamesTheDNSSECdeploymentpolicyofEBEROeventTLDprovidesDNSSECsupportfordomainnamesofandbelowthesecondlevelthatareendedwith".
TLD".
Butthisrequiresthatallapplicantsandregistrarsfordomainnamesendedwith".
TLD"shouldsubmittoCNNICbothlegaldomainnameswhichconformtotherulesfordomainnamenomenclatureandlegallyauthoritativeresourcerecords.
3.
2ActivationofDNSSECforChildZoneBasedonthefactthatachildzonehasbeendulydelegatedbyCNNIC,theEBEROeventTLDcanprovideDNSSECsupportforthechildzoneafterreceivingitsdelegationsinger(DS).
CNNICwillwritetheDSsubmittedbythechildzoneintothezonefileof".
TLD".
Userscanquerytherecordviatherecursiveserver.
3.
3IdentificationandAuthenticationofChildZoneManagerItistheresponsibilityoftheRegistrartosecurelyidentifyandauthenticatetheRegistrantthroughasuitablemechanism,andincompliancewiththestipulationsinthecontractbetweenCNNICandtheRegistrar.
3.
4RegistrationofDelegationSigner(DS)ResourceRecordsTheEBEROeventTLDregistrydoesnotrequiresecondaryorlowerdomainnamesof".
TLD"tosupportDNSSEC.
Whetheritshouldbesupportedbythesedomainnamestotallydependsontheregistrant.
TofacilitatethesubmissionofDSof".
TLD"childzonesandrealizethebindingofDSrecordswithdomainnameinformation,CNNICneedstoopenDSregistrationchannelstodomainnameregistrars.
CNNICprovidesthefollowingmethodfordomainnameregistrars:1)TheycansubmitDSrecordsviaEPP(RFC5910).
3.
5MethodtoProvePossessionofPrivateKeyTheRegistrydoesnotconductanycontrolswiththeaimofvalidatingtheRegistrantasthemanagerofaprivatekey.
TheRegistrarisresponsibleforconductingthecontrolsthatarerequiredandthosedeemednecessary.
3.
6RemovalofDSResourceRecordsTokeepzonefilesclean,preventuselessDSstoragefromcausingexpansionofzonefilesandpreventzonefilesigningfromtakingtoomuchtime,theadministratorof".
TLD"zonefilesmayremoveaDSresourcerecordinthefollowingtwocases:1)Whena".
TLD"childzoneasksforDSupdating,theoldDSrecordisremoved;2)Whena".
TLD"childzonecancelsitsDNSSECdeploymentandgoesintothenon-DNSSEC-servicestate.
TheoldDSrecordisremoved10dayslaterinsteadofbeingremovedimmediately.
4Facility,Management,andOperationalControl4.
1PhysicalControls4.
1.
1SiteLocationandConstructionToavoidunauthorizedoperationsandleakageofsensitiveinformation,DNSSECoperationandmaintenanceofthe".
TLD"iscarriedoutinastrictlyprotectedphysicalenvironment.
CNNIChasestablishedasoundbackupsystemforallDNSSEC-relatedservicesintheIDCofeachsecondaryoperationcenter,wherethelevelofphysicalprotectionisthesameasthatoftheprimaryoperationcenter.
4.
1.
2PhysicalAccessImportantequipmenthardwaresecuritymodules(HSM)usedfor".
TLD"DNSSECdeploymentmustbeplacedinalockedelectro-magneticshieldingcabinettopreventoutsideelectromagneticsignalsfrominterferingwiththegenerationofkeys.
4.
1.
3PowerandAirConditioningCNNICfacilitiesareequippedwithtwoseparatepowersupplysystems(oneworkingandtheotherstandby)andheating/ventilation/airconditioningsystemtocontroltemperatureandrelativehumiditysothatuninterruptedoperationcanbeensured.
4.
1.
4WaterExposuresCNNIChastakenreasonablemeasurestopreventtheEBEROeventTLDservicesystemfrombeingexposedtowater.
4.
1.
5FirePreventionandProtectionCNNIChastakenreasonablefirepreventionandprotectionmeasures.
Incaseoffire,smokeandflamescansoonbebroughtundercontrol.
Allthesemeasuresmeettherequirementsoflocallawsandregulationsforfirecontrolandprevention.
4.
1.
6MediaStorageAllsoftware,data-containingmedia,auditinginformation,archivesandthecorrespondingbackupinformationarestoredinasecurelocalorremotedeviceforappropriatephysicalandlogicalaccesstopreventthemfromaccidentaldamage(water,fire,electromagneticfields,etc.
)orfrombeingexposedtounauthorizedpersonnel.
4.
1.
7WasteDisposalBeforebeingdiscardedordumped,sensitivepaperdocumentsandmaterialsshallbeshreddedinapapershredder;CD-ROMs,magneticdisks,etc.
,shallbedemagnetizedinademagnetizer;HSMsandotherequipmentshallbephysicallydestroyedorzeroedasperthemanufacturer'sinstruction.
OtheruselessarticlesorgoodsshallbedisposedofinaccordancewiththegeneralproceduresofCNNIC.
4.
1.
8Off-siteBackupKeysystemdata,auditinglogdataandotherimportantinformationrelatedto".
TLD"DNSSECservicewillbestoredintheoff-sitebackupmediaoftheprimaryoperationcenterandthesecondaryoperationcentersinaphysicallyisolatedmanner.
4.
2ProceduralControlsCNNICwillformulatestrictprocedurestocontroltheconstructionanddeploymentofhardwarefacilities.
CNNICwillalsoworkoutrelevantspecificationsandprocedurestocontrolthedeploymentofsoftwareandtostandardizealloperations.
4.
2.
1TrustedRolesTrustedrolesrefertothepersonswho,duringEBEROeventTLDDNSSECoperation,arepermittedtooperateHSMs,generatekeysandparticipateingeneratingandsigningzonefiles.
Tobespecific,theserolesincludethefollowingtwotypes:1)Systemadministrators;2)Systemoperators.
Eachtypeoftheaboverolesisnotauthorizedtodothejoboftheother.
CNNICwillselectandtrainthetrustedrolesinbasicDNSSECskillssothattheywillbecompetentfortheirlaterwork.
Excellentpersonnelfromthesetrustedroleswillbeselectedtobethekeyadministrators(definedin5.
1.
1).
4.
2.
2NumberofPersonsRequiredPerTaskInactualoperation,thenumberofpersonstoplayeachofthetrustedrolesdescribedinSection4.
2.
1isasfollows:1)DuringconstructionofDNSSEChardwareequipmentandenvironment,atleastonepersonperroleshallbepresentatthesite,andoneofthemshallbeinvolvedintheentireprocessofconstructionanddeployment.
2)DuringDNSSECsoftwareserviceanddeployment,atleastonepersonperroleshallbepresentatthesite,andonesystemadministratorshallbeinvolvedintheentireprocessofsoftwaredeployment.
TheSystemoperator(s)shallcheckthecorrectnessofsoftwaredeployment.
3)Eachtimekeysaregeneratedorbackedup,atleastthreepersonsshallbepresentatthesite(theyareallthecurrentkeyadministrators,pleasesee5.
1.
1).
Atleast,twoofthemshallbesystemadministratorsandoneshallbeSystemoperator.
4.
2.
3IdentificationandAuthenticationforEachRoleCNNICwillselecttrustedpersonsfortheimplementationofEBEROeventTLDDNSSECdeploymentaccordingtotheirworkexperience,qualificationsandjobduties.
TheselectedpersonsshallsignaconfidentialityagreementwithCNNICtoundertakeallthemanagementdutiesauthorizedbytheagreement.
TheyshallpromisetokeepconfidentialtheinformationrelatedtoEBEROeventTLDDNSSECdeploymentstrategies.
Theyshallundertakenottodisclosetheinformationtoanythirdparty,orelsetheyshallassumecorrespondinglegalliabilities.
4.
2.
4TasksRequiringSeparationofDuties1)ConstructionofDNSSEChardwareequipmentandenvironment2)DeploymentofDNSSECsoftwareservice3)operationofkeys4.
3PersonnelControls4.
3.
1Qualifications,Experience,andClearanceRequirementsCNNICwillselectanumberoftrustedrolesfortheimplementationofEBEROeventTLDDNSSECdeploymentaccordingtotheirworkexperience,qualificationsandjobduties.
ThesepersonsshallpromisetokeepconfidentialthedetailsrelatedtoEBEROeventTLDDNSSECdeploymentandnottodisclosetheinformationtoanythirdparty.
4.
3.
2BackgroundCheckProceduresAllcandidatesfor".
TLD"trustedrolesshallbesubjecttoaninvestigationintoandassessmentoftheirbackgroundsofatleastthemostrecentthreeyears.
Beforebeingappointedasatrustedrole,acandidateshallbesubjecttoanassessmentofthefollowing:1)Certificationofpriorworkexperience2)Certificationofhighesteducationallevel3)Investigationofanycriminalrecord4)Investigationofpersonalcredit4.
3.
3TrainingRequirementsToimproveemployees'competenceforandsatisfactionwiththeirwork,CNNICwillprovidebasictechnicaltrainingforthemandadjustorupdatethetrainingcourseswhennecessary.
CustomizedtomeettherealneedsofCNNICemployees,thetrainingcoursescoverthefollowingcontents:1)BasicconceptsofDNS/DNSSEC;2)Anintroductionofjobduties;3)Useandmaintenanceofsoftwareandhardwarethathavebeendeployed;4)Proceduresfordisasterrecoveryandbusinesscontinuitymanagement.
4.
3.
4RetrainingFrequencyandRequirementsEverytwoyearsorwhenmajoradjustmentsaremadetothesystemframeworkCNNICwillprovideadditionaltrainingortestingforitsemployeestoimprovetheircompetenceforandsatisfactionwiththework.
4.
3.
5JobRotationFrequencyandSequenceCNNICemployeeswillmutuallyexchangetheirfunctionalrolesonarotatingbasiswhennecessary.
4.
3.
6SanctionsforUnauthorizedActionsSanctionswillbemetedoutforunauthorizedactionsinaccordancewiththeemploymentagreement.
Seriousnegligencemayleadtoterminationoftheemployment.
4.
3.
7ContractingPersonnelRequirementsInsomecasestemporaryemployeesareneededfortheDNSSECoperationandmaintenanceofEBEROeventTLD.
Tobeselectedastrustedroles,theseemployeesmustbesubjecttobackgroundinvestigationandthensignaconfidentialityagreementwhichisthesameaspermanentemployeessign.
Theirworkmustbeundertheguidanceandsupervisionofothertrustedroles.
4.
3.
8DocumentationSuppliedtoPersonnelCNNICprovidesnecessarytraininganddocumentsforitsemployeestoenhancetheircompetenceforandsatisfactionwiththework.
4.
4AuditLoggingProcedures4.
4.
1TypesofEventsRecordedAuditingisperformedmanuallyorautomatically.
CNNICwillrecordthefollowingmajorevents:1)Eventsrelatedto".
TLD"KSK&ZSKlifecyclemanagement,including:Generation,backup,storage,archivedanddeletionofkeys;Exportingofthepublickeys;EventsrelatedtoHSMlifecyclemanagement;2)EventsrelatedtomanagementofKSK&ZSKsigning,including:Activationofkeys;Acceptanceandconfirmationofpublickeysigninginformation;Successorfailureofthesigningprocess;Eventsofkeyrotation;3)Security-relatedevents,including:Successfulorunsuccessfulsystemaccessattempts;Alloperationsperformedbytrustedroles;Writing,readinganddeletingsecurity-sensitivefiles;Systembreakdownsandemergentfailures;IDCentries;Systemchangesorupdates;Handlingoffailures.
Theserecordsshouldincludethedateandtimewhentherecordismade,thetypeandnumberoftherecord,etc.
CNNICwillperiodicallyaudittheserecordsforsecuritysakeandrecordandsolveanyproblemfoundintheauditingprocess.
4.
4.
2FrequencyofProcessingLogCNNICanalyzessomeoftheaboverecordsinareal-timemannerthroughaloganalysissystem.
WhereverthereisanyproblemconcerningDNSSECservice,CNNICwillimmediatelycheckthecorrespondingrecords.
4.
4.
3RetentionPeriodforAuditLogAuditlogsareelectronicallystoredinthelogsystemforatleastonemonth.
Afterthat,thelogswillbearchivedandkeptinthetapelibraryforatleast10years.
4.
4.
4ProtectionofAuditLogThelogsystemandtapelibrarywillrejectunauthorizedaccess,modificationanddeletion.
4.
4.
5AuditLogBackupProceduresLogskeptinthetapelibrarywillbesenttothesecondaryoperationcentersonamonthlybasisforbackup.
4.
4.
6AuditCollectionSystemAuditinformationwillbeautomaticallygeneratedandrecordedattheapplication,networkandoperationsystemlevels.
AuditdatawillbemanuallygeneratedandrecordedbyCNNICemployees.
Electronicinformationwillbeincrementallybackedupintheoperationcenter;paperrecordswillbearchivedbytypeandentryandproperlykept.
4.
4.
7NotificationtoEvent-causingSubjectWhentheauditcollectionsystemrecordsacertainevent,itisunnecessarytonotifytheindividual,organization,equipmentorapplicationprogramthatcausestheevent.
4.
4.
8VulnerabilityAssessmentsRecordsoftheaboveeventmayserveasthenecessarymaterialandbasisforassessingthevulnerabilityofEBEROeventTLDDNSSECserviceoperation.
4.
5CompromiseandDisasterRecovery4.
5.
1IncidentandCompromiseHandlingProceduresDatabasedataisbackedupinthesecondaryoperationcenterssothatoriginalzonefilescanbedirectlygeneratedincaseofanycompromiseordisaster.
KeysarealsobackedupintheHSMofthesecondaryoperationcenterssothattheyareavailablewhenadisasteroccurstotheprimaryoperationcenter.
SeeSection5.
2.
4formoredetail.
4.
5.
2CorruptedComputingResources,Software,and/orDataIncaseofcorruptedcomputingresources,softwareand/ordata,CNNICwillhandletheprobleminaccordancewiththeproceduresspecifiedinthe".
TLD"RegistryEmergencyResponseProgram.
Ifservicecannotberesumedorfailurecannotberemovedinashorttime,CNNICwillconsiderswitchingservicestothesecondaryoperationcenterbyadoptingthedisasterrecoverymechanism.
4.
5.
3EntityPrivateKeyCompromiseProcedures4.
5.
3.
1ZSKCompromiseIncasetheZSKiscrackedorleakedoutanewZSKshallbegeneratedandsigningshallbeperformedusingthenewkey.
TheoldZSKwillbekeptfor10daysandthendeleted.
4.
5.
3.
2KSKCompromiseIncasetheKSKiscrackedorleakedout,itmustbeupdatedimmediately.
Insuchacase,CNNICwillgenerateandannounceanewKSKasquicklyaspossibleandsubmittotherootzoneforaDSrecordcorrespondingtothenewly-generatedKSK.
TherootzonewillsendthenewDSrecordtoallauthoritativeserversanddeletetheoldDSrecord.
Finally,CNNICwilldeletetheoldKSKandusethenewoneforZSKre-signing.
TheinformationofemergentKSKupdatewillbeannouncedthroughCNNICofficialwebsitehttp://www.
cnnic.
cn/gywm/xwzx/xwzxtzgg/andtheCNNICDNSSECmaillist.
InformationoftheleakedKSKanditssignaturewillbekeptbyCNNICfor30daysandthendeleted.
4.
5.
4BusinessContinuityandITDisasterRecoveryCapabilitiesCNNIChasformulateda".
TLD"registrybusinesscontinuityplaninaccordancewiththeContinuityManagementProcedures,asecond-leveldocumentofCNNICinformationsecuritymanagementsystem(ISMS).
FormulatedwithreferencetotherequirementsofISO27001oncontinuity,theContinuityManagementProceduresclarifiesthattheaimofcontinuitymanagementistocombinepreventionwithresumptionofcontrol;proactivelyguardagainstanddealwithIT-relatedemergentevents;avoidinterruptionofoperationalactivities;confinetheimpactofIT-relatedemergenteventsonCNNICtowithinabearablelimit;andensurethecontinuityofcoreservices,byestablishingacontinuitymanagementsystemfeaturedby"soundmechanism,centralizedleadership,clearaccountability,proactiveprevention,quickresponseandefficientdisposal".
TheOperationContinuityManagementProceduresalsoclarifiesthemethodsforandcontentsoftheimplementationoftheregistrycontinuityplan.
The".
TLD"RegistryEmergencyResponseProgramhasdesignedspecificproceduresforvariouspre-setscenariosandclarifiedtheoperationsofpersonnelondifferentworkpostsinhandlingemergentevents.
Thepre-setscenariosaredesignedbasedonthethreatsidentifiedthroughriskanalysesandCNNIC'sexperienceinoperatingthe".
TLD"domainnamesystem.
Thesescenariosmainlyincludethosewheresecurityeventsareverylikelytooccurorwhereeventsthatonceoccurredmayleadto"significant"ormoreserioussecurityevents.
Theyalsoincludethescenarioswheresecurityeventsarenotlikelytooccurbutoncetheyoccur,theywillconstituteanextremelygreatsecuritythreat.
Meanwhile,pre-setemergentscenarioswillbeenrichedaccordingtorealsituationssothattheEmergencyResponseProgramcanbecontinuouslyimproved.
4.
6EntityTerminationIfCNNICdecidestoterminatetheEBERPeventTLDregistryservice,itshallnotifyICANNofitsdecisioninadvanceandthetransitionprocesscanbestartedafterICANNhasselectedanewRegistry.
Toensuretheavailabilityandcontinuityofregistryserviceduringthetransitionprocess,CNNICshallhaveconsultationswiththenewRegistryaboutkeyrotation.
5TechnicalSecurityControls5.
1KeyPairGenerationandInstallation5.
1.
1KeyPairGenerationAllpairsofkeys(ZSKandKSK)inusearegeneratedintheHSMinasecureway.
ThecryptographicmodulemeetsthestandardofChineseauthoritiesandrelevantinternationalstandards.
FivekeyadministratorsaccountaregeneratedduringtheHSMinitializationprocess,andonlymorethanhalfofthemhavepassedidentityauthenticationcantheHSMbeaccessed.
Generationofkeysisperformedbywell-trainedkeyadministrators.
Atleastthreekeyadministrators(AppointingatleasttwosystemadministratorsandatleastoneSystemoperatorisallowedinanemergencysituation)willbeinvolvedintheentireprocessofkeygenerationanddesignatedauditingpersonnelwillbepresenttosuperviseandrecordtheprocess.
5.
1.
2PublicKeyDeliveryEachpublickeyofKSKgeneratedwillbeexportedfromtheHSManditsvaliditywillbeverifiedbySystemoperators.
ThenitwillbesenttoICANNandatthesametimetheinformationwillbepublishedontheofficialwebsiteofCNNIC.
5.
1.
3PublicKeyParametersGenerationandQualityCheckingBasicparametersforgenerationofkeysusedfortheDNSSECdeploymentofEBEROeventTLDareasfollows:1)KSKgenerationalgorithmandkeylength:RSA-SHA2562048bits2)ZSKgenerationalgorithmandkeylength:RSA-SHA2561024bitsInadditionCNNICwilladjusttheaboveparameterswhennecessaryaccordingtorealsituationstoensurethatthekeysaresufficientlysafeandprotectthemfrombeingcracked.
5.
1.
4KeyUsagePurposesAllkeysgeneratedwillbeusedonlyforthepurposeoftheEBEROeventTLDdeploymentratherthananyotherpurposes.
ZSKisusedforsigningeachDNSresourcerecordsset(RRset)oftheEBEROeventTLDzonefiles.
KSKisusedforsigningDNSKEYRRsetof".
TLD"zonefiles.
5.
2PrivateKeyProtectionandCryptographicModuleEngineeringControlsAfterbeinggenerated,keys(ZSKandKSK)aredirectlystoredintheHSM.
5.
2.
1CryptographicModuleStandardsandControlsThecryptographicmodulemeetsthestandardofChineseauthoritiesandrelevantinternationalstandards.
FivekeyadministratorsaccountaregeneratedduringtheHSMinitializationprocess,andonlymorethanhalfofthemhavepassedidentityauthenticationcantheHSMbeaccessed.
5.
2.
2PrivateKey(m-of-n)Multi-personControlTheHSMprovideskeybackupfunctions.
Itdividesanencryptedkeyinto5segmentsandstorestheminfivedifferentsmartcards,eachkeptbyankeyadministrator.
Inemergentcases,thekeyintheHSMcanberestoredusingany3ofthesegments.
5.
2.
3PrivateKeyEscrowCNNIC(theRegistry)doesnotescrowprivatekeys.
5.
2.
4PrivateKeyBackupAfterbeinggenerated,privatekeysarebackedupinanotherHSMwithidenticalconfigurationusingaspecialkey-backupcard.
InadditionCNNICwillsendatleastthreekeyadministrator(Appointingatleastonesystemadministratorsisallowedinanemergencysituation)carryingspecialkey-backupcardtothesecondaryoperationcentersonaregularbasistobackthemupintheHSMofthesecondaryoperationcenter.
5.
2.
5PrivateKeyStorageonCryptographicModuleItisforbiddentoaccessorreadprivatekeysinanyplaintextformbutitispermittedtobackuptheirinformationinspecialkey-backupcardinancryptographicmanner.
5.
2.
6PrivateKeyArchivalPrivatekeysareusedforbackuponlyandshallnotbeusedinanyotherform.
Meanwhile,informationofprivatekeybackupwillberecordedandacorrespondingarchivewillbecreatedforthispurpose.
5.
2.
7PrivateKeyTransferintoorfromaCryptographicModuleTheHSMthatgeneratesprivatekeyssupportszonesigning(encryption)functions.
Afteraprivatekeyisgenerated,theHSMwilldirectlyexportittothecryptographicmoduleforuseviaaninternalphysicalprocessunit.
5.
2.
8MethodofActivatingPrivateKeyPrivatekeysareautomaticallyactivatedbytheHSMbasedonpre-settimingparameterswithoutanyneedforhumanintervention.
5.
2.
9MethodofDeactivatingPrivateKeyPrivatekeysareautomaticallydeactivatedbytheHSMbasedonpre-settimingparameterswhentheyexpire,withoutanyneedforartificialintervention.
5.
2.
10MethodofDestroyingPrivateKeyPrivatekeysstoredintheHSMareautomaticallydestroyedwhentheyexpire,withoutanyneedforhumanintervention.
Privatekeysstoredinthekey-backupcardandbackupHSMaredeletedinastandardmannerasspecified,andsuchaprocessissupervisedandrecordedbydesignatedpersonnel.
5.
3OtherAspectsofKeyPairManagement5.
3.
1PublicKeyArchivalPublickeyswillbearchivedtogetherwithothertypesoftraceableinformationsuchaslogdata.
5.
3.
2KeyUsagePeriodsWhenkeysexpiretheywillbedeletedfromthesigningsystemandwillnotbeusedanymore.
TheusageperiodofZSKis3monthsandthatofKSKis12months.
Therecordofsigningisvalidfor30days.
5.
4ActivationDataTheactivationdataisthepersonalpassphraseforthecardofeachkeyadministratorthatisusedtoactivatetheHSM.
5.
4.
1ActivationDataGenerationandInstallationEachkeyisresponsibleforcreatingtheirownactivationdatapursuanttotheapplicablerequirementsofatleastninecharactersofvaryingnature.
5.
4.
2ActivationDataProtectionKeyadministratorsarerequiredtosafeguardtheircardandsignanagreementacknowledgingtheirresponsibilities.
EachKeyadministratorisresponsibleforprotectingtheiractivationdatainthebestpossibleway.
Onthesuspicionofcompromisedactivationdata,theKeyadministratormustimmediatelychangeit.
5.
5ComputerSecurityControlsInDNSSECdeploying".
TLD",specificservers(forzonefilegeneration)areallowedtoaccessHSM.
Theauthorityofaccesstosuchserversshouldberestrictedandcontrolledsothatonlytrustedrolescangetaccesstothem.
Accesscontrolpoliciesshouldalsobemadeforotherserversthatcommunicatewiththeaboveserverstoensuretheirsecurity.
5.
6NetworkSecurityControlsAllpairsofkeysaregeneratedinHSM.
Toensureitssecurityandpreventotherserversorequipmentinthenetworkfromaccessingit,aseparatesubnetwillbebuiltfordeployingthekeygenerationsystem.
Thesecurityofthesubnetwillbeensuredbyafirewallandothersecuritymeans.
5.
7TimestampingUTCisadoptedfortimingthevalidityofalllogs,signingrecords,etc.
,relatedtothesigningsystem.
5.
8LifeCycleTechnicalControls5.
8.
1SystemDevelopmentControlsAllsourcecodesarestoredincontrolsystemsofthesameversionandthesecodesarebackedupandarchivedperiodically.
5.
8.
2SecurityManagementControlsCNNICcreatesahashofallsoftwarepackagesinstalledonproductionsystems.
Thishashmaybeusedtoverifytheintegrityofsuchsoftware.
Themonitoringsystemwillalertwhencriticalsoftwarepackagesaremodified.
5.
8.
3LifeCycleSecurityControlsThesignersystemisdesignedtorequireaminimumofmaintenance.
Updatescriticaltothesecurityandoperationsofthesignersystemwillbeappliedafterformaltestingandapproval.
Theoriginofallsoftwareandfirmwarewillbesecurelyauthenticatedbyavailablemeans.
CriticalhardwarecomponentsoftheHSMwillbeprocureddirectlyfromthemanufacturerandtransportedintamper-evidentbagstotheirdestinationinthesecurefacility.
Anyhardwarewillbedecommissionedwellbeforethespecifiedlifetimeexpectancy.
6ZoneSigningThispartdealswithtechnicalparametersofkeys,authenticateddenialofexistence,thelifecycleofkeysandrotationpoliciesforDNSSECdeployment.
6.
1KeyLengths,KeyTypesandAlgorithmsFortheEBEROeventTLDDNSSECdeployment,thealgorithmsforkeygenerationandthecorrespondingkeylengthsareasfollows:1)KSKgenerationalgorithmandkeylength:RSA-SHA2562048bits2)ZSKgenerationalgorithmandkeylength:RSA-SHA2561024bits6.
2AuthenticatedDenialofExistenceTopreventunauthorizedpeoplefromviciouslyscanning".
TLD"zonefilesandprotect".
TLD"zonedata,NSEC3(RFC5155)isadoptedforDNSSECdeployment.
6.
3SignatureFormatThesignatureformatin".
TLD"zonefilesconformstothestandardformatdefinedinRFC4034.
6.
4ZoneSigningKeyRoll-overTopreventthekeysfrombeingcrackedorleakedout,ZSKshouldbereplacedandrotatedonaregularbasis.
TheZSKroll-overpolicyistoadoptapre-publishmechanism(RFC4641).
ThevalidityperiodofeachZSKgeneratedis100daysandtheroll-overcycleis90days.
Figure1ZSKRoll-overCycle6.
5KeySigningKeyRoll-overAsthefoundationofthechainoftrustofDNSSEC,theKSKshouldalsoberotatedonaregularbasistopreventitfrombeingcrackedorleakedout.
TheKSKroll-overpolicyistoadoptadouble-signaturemechanism(RFC4641).
ThevalidityperiodofeachKSKgeneratedis13monthsandtheroll-overcycleis12months.
DuringtheKSKroll-overperiod,the".
TLD"zoneadministratorshallsubmittheDSrecordrelatedtothenewKSKtotherootzoneadministratorsoastomaintaintheintegrityofthechainoftrust.
Figure2KSKRoll-overCycle6.
6SignatureLife-timeandRe-signingFrequencyThesignaturevalidityperiod,withoutexception,is30daysforallresourcerecords(RRSIG,RFC4034)of".
TLD"zonesignatures,allofwhichshallbere-signedwhentheyexpire.
Sothere-signingfrequencyisonceevery30days.
Inaddition,re-signingisalsonecessaryeachtimeZSKorKSKisrotated.
ZonesigningwillbeexecutedintheHSM,forwhichthebasicproceduresareasfollows:1)ThehiddenprimarymasterobtainsresourcerecordsfromtheEBEROeventTLDregistrationdatabaseandgeneratestheoriginalzonefile;2)ThehiddenprimarymastersecurelysendstheoriginalzonefiletoHSM;3)HSMreadstheconfigurationfilesforzonesigningandgeneratesthekeysneeded,includingKSKandZSK;4)HSMexecuteszonesigningusingZSKandKSK;5)Whenzonesigningiscompleted,HSMsendsthefilesthathavebeensignedbacktothehiddenprimarymaster;6)Thezonefilesthathavebeensignedareloadedontothehiddenprimarymaster,whichwillthenupdatedatatothesecondarymasterservers.
Figure3".
TLD"ZoneFileSigning6.
7VerificationofZoneSigningKeySetToensuresignaturesandthevalidityperiodofkeys,securitycontrolsareconductedagainsttheDNSKEYpriortopublishingzoneinformationontheInternet.
ThisisdonebyverifyingthechainfromDSintherootzonetoKSK,ZSKandthesignatureoverthe".
TLD"SOA.
6.
8VerificationofResourceRecordsTheRegistryverifiesthatallresourcerecordsarevalidinaccordancewiththecurrentstandardspriortodistribution.
6.
9ResourceRecordsTime-to-LiveTheTTLofDNSSEC-relatedresourcerecordsin".
TLD"zonefilesissettobeoneday,whichisconsistentwiththeTTLofotherDNSresourcerecordsinthezonefiles.
7ComplianceAudit7.
1FrequencyofEntityComplianceAuditComplianceauditsareconductedatleastannuallyatthesoleexpenseoftheauditedentity.
7.
2Identity/QualificationsofAuditorCNNIC'scomplianceauditsareperformedbyapublicaccountingfirmthatdemonstratesproficiencyinDNSSECpublickeyinfrastructuretechnology,informationsecuritytoolsandtechniques,securityauditing,andthethird-partyattestationfunction,whichrequiresthepossessionofcertainskillsets,qualityassurancemeasuressuchaspeerreview,competencytesting,standardswithrespecttoproperassignmentofstafftoengagements,andrequirementsforcontinuingprofessionaleducation.
7.
3Auditor'sRelationshiptoAuditedPartyComplianceauditsofCNNIC'soperationsareperformedbyapublicaccountingfirmthatisindependentofCNNIC.
Thirdpartyauditorsdonotparticipateinthemulti-personcontrolforthe".
TLD"ZSKandKSK.
7.
4TopicsCoveredbyAuditThescopeofCNNIC'sannualcomplianceauditincludesallDNSSECoperationssuchaskeyenvironmentalcontrols,keymanagementoperations,infrastructure/administrativecontrols,KSKandZSKandsignaturelifecyclemanagementandpracticesdisclosure.
7.
5ActionsTakenasaresultofDeficiencyWithrespecttocomplianceauditsofCNNIC'soperations,significantexceptionsordeficienciesidentifiedduringthecomplianceauditwillresultinadeterminationofactionstobetaken.
ThisdeterminationismadebyCNNICmanagementwithinputfromtheauditor.
CNNICmanagementisresponsiblefordevelopingandimplementingacorrectiveactionplan.
IfCNNICdeterminesthatsuchexceptionsordeficienciesposeanimmediatethreattothesecurityorintegrityofthe".
TLD"KSKand/orZSK,acorrectiveactionplanwillbedevelopedwithin30daysandimplementedwithinacommerciallyreasonableperiodoftime.
Forlessseriousexceptionsordeficiencies,CNNICmanagementwillevaluatethesignificanceofsuchissuesanddeterminetheappropriatecourseofaction.
7.
6CommunicationofResultsTheauditingmanagershallsubmitawrittenreportoftheauditresultstoCNNICnotlaterthan30calendardaysaftertheaudit.
8LegalMatters8.
1FeesTheEBEROeventTLDRegsitrydoesnotchargeRegistrarsanyfeesforDNSSEC.
8.
2FinancialResponsibilityNotapplicable.
8.
3ConfidentialityofBusinessInformation8.
3.
1ScopeofConfidentialInformationThefollowingrecordsshallbekeptconfidentialandprivate(Confidential/PrivateInformation):1)PrivatekeysandinformationneededtorecoversuchPrivateKeys2)Transactionalrecords(bothfullrecordsandtheaudittrailoftransactions)3)AudittrailrecordscreatedorretainedbyCNNIC4)AuditreportscreatedbyCNNIC(totheextentsuchreportsaremaintained),andtheirrespectiveauditors(whetherinternalorpublic)5)Contingencyplanninganddisasterrecoveryplans6)SecuritymeasurescontrollingtheoperationsofCNNIChardwareandsoftwareandtheadministrationofDNSKeys8.
3.
2TypesofInformationnotConsideredConfidentialAllinformationpertainingtothedatabaseoftopleveldomainsispublicinformation.
PublicKeys,KeyRevocation,andotherstatusinformation,aswellasCNNICpublicationandinformationcontainedwithinthemarenotconsideredConfidential/PrivateInformation.
8.
3.
3ResponsibilitytoProtectConfidentialInformationCNNICsecuresconfidentialinformationagainstcompromiseanddisclosuretothirdparties.
8.
4PrivacyofPersonalInformation8.
4.
1InformationTreatedasPrivateTotheextentCNNICreceivesorprocesses,onbehalfofacustomer,personallyidentifiableinformation(PII)inthecourseofproviding".
TLD"Zoneservices,suchPIIistreatedasprivateinaccordancewiththetermsofCNNIC'sagreementswithRegistrarsandCNNIC'sPrivacyPolicy.
8.
4.
2InformationnotDeemedPrivateSubjecttoapplicablelaws,allinformationrequiredtobepublishedaspartofawhoisdatabaseisnotdeemedprivate.
8.
4.
3ResponsibilitytoProtectPrivateInformationInproviding".
TLD"Zoneservices,CNNICactsasadatacontroller,andanyobligationsthatCNNICmayhavewithrespecttoanypersonallyidentifiableinformationisgoverned,subjecttoapplicablelaw,bythetermsofCNNIC'sagreementswithregistrarsandtotheextentnotgovernedbyanyapplicableRegistryRegistraragreement.
8.
4.
4DisclosurePursuanttoJudicialorAdministrativeProcessCNNICshallbeentitledtodiscloseConfidential/PrivateInformationif,ingoodfaith,CNNICbelievesthatsuchdisclosureisnecessaryinresponsetojudicial,administrative,orotherlegalprocessduringthediscoveryprocessinaciviloradministrativeaction,suchassubpoenas,interrogatories,requestsforadmission,andrequestsforproductionofdocuments.
8.
5LimitationsofLiabilityCNNICshallnotbeliableforanyfinanciallossorlossesarisingfromincidentaldamageorimpairmentresultingfromitsperformanceofitsobligationshereunderorthe".
TLD"ZoneManager'sorthe".
TLD"ZoneKSKandZSKOperator'sperformanceoftheirrespectiveobligationsunderDNSSECPracticeStatementforthe".
TLD"ZoneKSKandZSKOperator.
Nootherliability,implicitorexplicit,isaccepted.
8.
6TermandTermination8.
6.
1TermTheDPSbecomeseffectiveuponpublicationontheCNNICwebsite.
AmendmentstothisDPSbecomeeffectiveuponpublicationontheCNNICwebsite.
8.
6.
2TerminationThisDPSisamendedfromtimetotimeandwillremaininforceuntilitisreplacedbyanewversion.
8.
6.
3DisputeResolutionProvisionsDisputesamongDNSSECparticipantsshallberesolvedpursuanttoprovisionsintheapplicableagreementsamongtheparties.
DisputesinvolvingCNNICrequireaninitialnegotiationperiodofsixty(60)daysfollowedbylitigationintheBeijingHaidianDistrictintermediatepeople'scourt,PRC.
8.
6.
4GoverningLawThisDPSshallbegovernedbythelawsofthePeople'sRepublicofChina.

cyun29元/月,香港CN2 GIA云服务器低至起;香港多ip站群云服务器4核4G

cyun怎么样?cyun蓝米数据是一家(香港)藍米數據有限公司旗下品牌,蓝米云、蓝米主机等同属于该公司品牌。CYUN全系列云产品采用KVM架构,SSD磁盘阵列,优化线路,低延迟,高稳定。目前,cyun推出的香港云服务器性价比超高,香港cn2 gia云服务器,1核1G1M/系统盘+20G数据盘,低至29元/月起;香港多ip站群云服务器,16个ip/4核4G仅220元/月起,希望买香港站群服务器的站长...

DediPath($1.40),OpenVZ架构 1GB内存

DediPath 商家成立时间也不过三五年,商家提供的云服务器产品有包括KVM和OPENVZ架构的VPS主机。翻看前面的文章有几次提到这个商家其中机房还是比较多的。其实对于OPENVZ架构的VPS主机以前我们是遇到比较多,只不过这几年很多商家都陆续的全部用KVM和XEN架构替代。这次DediPath商家有基于OPENVZ架构提供低价的VPS主机。这次四折的促销活动不包括512MB内存方案。第一、D...

Friendhosting,美国迈阿密机房新上线,全场45折特价优惠,100Mbps带宽不限流量,美国/荷兰/波兰/乌兰克/瑞士等可选,7.18欧元/半年

近日Friendhosting发布了最新的消息,新上线了美国迈阿密的云产品,之前的夏季优惠活动还在进行中,全场一次性45折优惠,最高可购买半年,超过半年优惠力度就不高了,Friendhosting商家的优势就是100Mbps带宽不限流量,有需要的朋友可以尝试一下。Friendhosting怎么样?Friendhosting服务器好不好?Friendhosting服务器值不值得购买?Friendho...

zhonguancun为你推荐
微信回应封杀钉钉微信违规操作被封了,蓝色骨头手机蓝色骨头为什么还没上映www.hao360.cn每次打开电脑桌面都出现以下图标,打开后链接指向www.hao.360.cn。怎么彻底删除?原代码什么叫源代码,源代码有什么作用lunwenjiance论文检测,知网的是32.4%,改了以后,维普的是29.23%。如果再到知网查,会不会超过呢?psbc.com邮政银行卡6215995915000241921是哪个地区的网站检测请问,对网站进行监控检测的工具有哪些?haole16.com高手们帮我看看我的新网站WWW.16mngt.com怎么不被收录啊?51sese.comwww.51xuanh.com这是什么网站是骗人的吗?baqizi.cc徐悲鸿到其中一张很美的女人体画
Oray域名注册服务商 提供香港vps 域名服务dns的主要功能为 中国域名交易中心 服务器评测 美国仿牌空间 qq数据库 免费活动 免费私人服务器 免费mysql数据库 linode支付宝 百度云空间 免费个人主页 重庆服务器 97rb 卡巴斯基试用版下载 阿里云个人邮箱 汤博乐 shuangcheng 时间服务器 更多