An Singular Anecdote about the DNS Root Zone Signing Ceremony
August 22, 2024

By Carlos Martinez Cagnazzo, LACNIC CTO
I am honored to be among the global security experts participating in the now-famous ‘key signing ceremony,’ a critical operational event coordinated by the Internet Corporation for Assigned Names and Numbers (ICANN) that is fundamental to how we secure the Domain Name System (DNS). Each year, four ceremonies take place in El Segundo, California (USA) and Culpeper, Virginia (USA), where cryptographic keys —one public and one secret—are used in a coordinated effort to secure the DNS root zone. The primary purpose of these ceremonies is to provide a secure environment where the root zone Key Signing Key (KSK) can be used to sign zone keys. This process is applied to generate three months of cryptographic signatures to be used for the daily signing of the root zone.
A few weeks ago, I had the chance to participate once again in the West Coast ceremony in El Segundo, just minutes away from Los Angeles International Airport. This time, it was a different and particular experience. It’s worth noting that these ceremonies are not only unique but also quite a theatrical experience, as they involve a physical process to certify the health and security of the Internet environment.By ‘physical,’ I mean that the cryptographic process involves specific hardware, such as the hardware security module (HSM). An HSM is a physical computing device designed specifically for working with sensitive cryptographic material. The key generated within it never leaves the device.
This ceremony was exceptional in that it was much longer than usual. Why? Because the HSMs that are currently in production will no longer be guaranteed after 1st January 2025, as their manufacturer has decided to discontinue them. The new HSMs are produced by a different manufacturer, so in this ceremony four new HSMs —two pairs— were formatted (the reason being that each pair provides backup to the other).
(Free access, no subscription required)
The singular aspect of this process is that the initialization of HSMs is highly proprietary, which means that there are few standards, and those that do exist are applied inconsistently across the different devices.Specifically, when different manufacturers are involved, there is no adequate way to retrieve the private key from the old HSM and migrate it to the new one. Even if there was only one manufacturer involved, the key would have to be transferred between two identical HSMs, which is how the backup HSM is configured. In this situation, the key is retrieved using a proprietary mechanism (which adheres to certain security parameters) and copied to the backup HSM.
For this particular ceremony and due to this unique requirement, a new KSK was generated. How was this accomplished? Specifically, a backup of the new KSK that had already been generated during the East Coast ceremony at the end of March was imported, initialized as if it were new, and the other backup HSMs were also initialized.
I want to highlight that this exceptional process was quite lengthy: we were there for a total of eight hours. It’s also important to stress that the formatting of the new HSMs took place within the framework of a ceremony where everything is meticulously controlled, scripted, and audited, and where the roles of each participant and the steps they must follow are carefully defined. Various organizations that have an impact on Internet governance play central roles in the process: ICANN; the Internet Assigned Numbers Authority (IANA), which is responsible for the secure management of the DNS root zone on behalf of ICANN; Verisign, the company currently responsible for maintaining and operating the DNS root zone, and other actors who guarantee the transparency of the entire process, including the ceremony administrators, other crypto officers, internal witnesses, auditors, as well as credentials and hardware safe controllers.
The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.