What's so hard about DNSSEC? Paul Ebersman – 23-27 May 2016 RIPE72 – Copenhagen 1.

Slides:



Advertisements
Similar presentations
DNSSEC in Windows Server. DNS Server changes Provide DNSSEC support in the DNS server – Changes should allow federal agencies to comply with SC-20 and.
Advertisements

Practical Considerations for DNSSEC Automation Joe Gersch OARC Presentation September 24, 2008.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License DNSSEC ROLLING.
DNS Transfers in DNSSEC world Olafur Gudmundsson Steve Crocker Shinkuro, Inc.
Deploying DNSSEC in Windows Server 2012 David Cates Platform Services Group Microsoft Corporation.
Securing the Government’s DNS Infrastructure with DNSSEC
DNSSEC Brought to you by ISC-BIND, SUNYCT, and: Nick Merante – SUNYIT Comp Sci SysAdmin Nick Gasparovich – SUNYIT Campus SysAdmin Paul Brennan – SUNYIT.
1.ORG DNSSEC Testbed Deployment Edmon Chung Creative Director Afilias Perth, AU 2 March, 2006.
DNS. DNS is a network service that enables clients to resolve names to IP address and vice-versa. Allows machines to be logically grouped by domain names.
Survey of DNSSEC Lutz Donnerhacke DNSSEC Meeting ( )
RNDC & TSIG. What is RNDC? Remote Name Daemon Controller Command-line control of named daemon Usually on same host, can be across hosts –Locally or remotely.
1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
Deploying DNSSEC in Windows Server 2012 Rob Kuehfus Program Manager Microsoft Corporation WSV325.
Peter Janssen, EURid.eu Ljubljana, RIPE 64, 2012 Peter Janssen, EURid.eu Ljubljana, RIPE 64, April
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Module 10 Advanced Topics. DNS and DHCP DHCP can be configured to auto- update (using DDNS) the forward and reverse map zones Can be secured using allow-update.
DNS operator/registrar changes toolkit of actions Steve Crocker Ólafur Guðmundsson Shinkuro 2011/03/26.
Tony Kombol ITIS Who knows this? Who controls this? DNS!
Advanced Module 3 Stealth Configurations.
1 DNSSEC at ESnet ESCC/Internet2 Joint Techs Workshop July 19, 2006 R. Kevin Oberman Network Engineer Lawrence Berkeley National Laboratory.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Troubleshooting.
Introduction to DNSSEC AROC Bamako, Mali, What is DNSSEC?
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
Tyre Kicking the DNS Testing Transport Considerations of Rolling Roots Geoff Huston APNIC.
© 2015 ISC November 2013 Sunset for the DLV?. © 2015 ISC Background (c) Interested
Secured Dynamic Updates. Caution Portions of this slide set present features that do not appear in BIND until BIND 9.3 –Snapshot code is available for.
BIND THE DNS SERVER TO USE !. DNS Domain Name Services Name to IP resolving /etc/hosts /etc/resolv.conf.
© Afilias Limitedwww.afilias.info SM Deploying DNSSEC Ram Mohan.
Krit Witwiyaruj Thai Name Server Co., Ltd.th DNSSEC Implementation.
Olaf M. Kolkman. Apricot 2005, February 2005, Kyoto. DNSSEC An Update Olaf M. Kolkman
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Practicalities.
Tony Kombol ITIS DNS! overview history features architecture records name server resolver dnssec.
DNSSEC-Deployment.org Secure Naming Infrastructure Pilot (SNIP) A.gov Community Pilot for DNSSEC Deployment JointTechs Workshop July 18, 2007 Scott Rose.
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
© 2015 ISC November 2013 Sunset for the DLV?. © 2015 ISC Background (c) Interested
AU, March 2, DNSSEC, APNIC, & how EPP might play a Role Ed Lewis DNS SIG APNIC 21.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
1 Internet2 Joint Techs DNSSEC BOF July 19, DNSSEC BOF Larry J. Blunk, Merit Network Internet2 Joint Techs Workshop Madison, WI July 19, 2006.
Rolling the Root Geoff Huston APNIC Labs. Use of DNSSEC in Today’s Internet.
OARC TAR Panel. La Brea Tar Pit What was originally intended to expedite the roll-out of DNSSEC seems to be bogging it down instead People who read press.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
Linux Operations and Administration
OPTION section It is the first section of the named.conf User can use only one option statement and many option-value pair under the section. Syntax is.
Olaf M. Kolkman. IETF58, Minneapolis, November DNSSEC Operational Practices draft-ietf-dnsop-dnssec-operational-practices-00.txt.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Developing a DNSSEC Policy The Compulsory Zone Distribution Which DNSSEC Protocol Keys – and Managing them Managing the Children Using DNSSEC Mark Elkins.
Root Zone KSK: After 5 years Elise Gerich | APNIC 40 | September 2015.
DRAFT STEP-BY-STEP DNS SECURITY ILLUSTRATIVE GUIDE Version 0.2 Sparta, Inc Samuel Morse Dr. Columbia MD Ph:
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
Deploying DNSSEC. Pulling yourself up by your bootstraps João Damas ISC.
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
Agenda DNSSEC automation overview How to implement it in FRED
In collaboration with HKCERT and HKIRC July 2016
KSK Rollover Update David Conrad, CTO ICANN 59 – GAC 29 June 2017.
Root Zone KSK Rollover: delay and next steps
Living on the Edge: (Re)focus DNS Efforts on the End-Points
Root Zone KSK Rollover Update
DNSSEC made simple. DNSSEC made simple ~]$ whoami Emil Natan, CTO, ISOC-IL.
CZ.NIC in a nutshell Domain, DNSSEC, Turris Project and others
A Longitudinal, End-to-End View of the DNSSEC Ecosystem
What DNSSEC Provides Cryptographic signatures in the DNS
DNSSEC Status Update in UA
The Curious Case of the Crippling DS record
Trust Anchor Signals from Custom Applications
.uk DNSSEC Status update
Presentation transcript:

What's so hard about DNSSEC? Paul Ebersman – May 2016 RIPE72 – Copenhagen 1

Why use DNSSEC

What does it solve? Helps against cache poisoning Identifies DNS “lying” Enables DANE and other PKIs 3

Naysayers’ story It’s “hard” It only breaks things It doesn’t solve anything We’re trusting ICANN/root servers 4

My experience Automate or it is hard It does help prevent cache poisoning We are using DANE already for We’re already trusting ICANN/root servers Customers starting to expect security of DNSSEC 5

How to start?

The two halves Validation Zone signing 7

Validation Easy to enable But you pay (a little) for others’ mistakes All major open sources packages support this. 8

Signing Automation is not an option Automation ease and quality varies widely Setting up isn’t trivial Beware of key rollovers 9

Validation issues

“But it’s an ISP support nightmare” Other folks screw up, you get the call “Why are you blocking site ‘X’?” It’s your resolver, you fix it! 11

Dunno… I sleep at night. Comcast & Google validate (20% of public resolvers) Comcast validates and signs 2 dozen failures a month is a bad month and this is improving (even.GOV…) NTAs (RFC 7646) single digits a month 12

What do we see? Expired signatures Incorrect removal of signing Inadvertent signing Bad key rollovers (KSK) 13

Signing issues

What do we see? Initial signing works but rollovers don’t Mis-matches of DS in parent and KSK in child Forget to put DS in parent 15

How do we deal with failures?

Education Training 1 st tier Teach customers as we explain outage dnsviz.net invaluable 17

Outreach Get.mil/.gov and other large NOC contacts in advance Get contacts at large hosting/registries serving auth zones Explain to your mgmt why this is important 18

Negative trust anchors Follow the RFC (7646) Try to get the zone owner to fix the problem Educate them in how to avoid this NTA should be last resort 19

Q & A

Thank you!

Appendix A: further reading /dnssec/ 22

Appendix B: example configs To enable DNSSEC validation in BIND // In named.conf, add: managed-keys { "." "AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjF FVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoX bfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaD X6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpz W5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relS Qageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulq QxA+Uk1ihz0="; }; // in options section, add: dnssec-enable yes; dnssec-validation yes; 23

Appendix B: example configs To enable DNSSEC signing of example.com in BIND # create dir with permissions for bind to rwx by group cd mkdir example.com chmod 2775 example.com chown bind:bind example.com cd example.com # create ksk dnssec-keygen -a NSEC3RSASHA1 -b f KSK example.com # create zsk dnssec-keygen -a NSEC3RSASHA1 -b 1024 example.com # create DS records grep key-s *.key dnssec-dsfromkey Kexample.com key > ds-records # add DNSKEY records to zone file # edit named.conf & reload zone rndc reload example.com # sign zone rndc sign example.com # set to NSEC3 (assuming you want that) rndc signing -nsec3param auto example.com rndc reload example.com # update registrar w/DS records or DNSKEY per your registrar instructions 24

Appendix B: example configs Sample zone statement in named.conf zone "example.com" { type master; file "dynamic/example.com"; key-directory "keys/example.com"; auto-dnssec maintain; allow-query { any; }; allow-transfer { key example-slave-key; ; }; }; 25

Appendix B: example configs To enable DNSSEC validation in Knot resolver: - To enable DNSSEC validation in Unbound: - 26

Appendix B: example configs To DNSSEC sign zones in Knot: - dnssec-signinghttps:// dnssec-signing To DNSSEC sign zones in Unbound: -(manually) -(automated) 27