© 2006-2012 NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License DNSSEC ROLLING.

Slides:



Advertisements
Similar presentations
Practical Considerations for DNSSEC Automation Joe Gersch OARC Presentation September 24, 2008.
Advertisements

Olaf M. Kolkman. APNIC, 6 February 2014, Bangkok. DNSSEC and in-addr an update Olaf M. Kolkman
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Introduction.
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
DNS Transfers in DNSSEC world Olafur Gudmundsson Steve Crocker Shinkuro, Inc.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Deploying DNSSEC in Windows Server 2012 David Cates Platform Services Group Microsoft Corporation.
Measuring DNSSEC validation i.e. how to do it Ólafur Guðmundsson Steve Crocker ogud, steve at shinkuro.com.
DNSSEC Brought to you by ISC-BIND, SUNYCT, and: Nick Merante – SUNYIT Comp Sci SysAdmin Nick Gasparovich – SUNYIT Campus SysAdmin Paul Brennan – SUNYIT.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
1 SecSpider: Distributed DNSSEC Monitoring Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Deploying DNSSEC in Windows Server 2012 Rob Kuehfus Program Manager Microsoft Corporation WSV325.
Status Update for Algorithm Transition for the RPKI (draft-ietf-sidr-algorithm-agility) Steve Kent Roque Gagliano Sean Turner.
Olaf M. Kolkman. Apricot 2003, February 2003, Amsterdam. /disi Steps towards a secured DNS Olaf M. Kolkman, Henk Uijterwaal, Daniel.
DNS operator/registrar changes toolkit of actions Steve Crocker Ólafur Guðmundsson Shinkuro 2011/03/26.
Data You Can Trust: The Key to Information Security Dr. Burt Kaliski, Jr. Senior Vice President and CTO, Verisign 25 th HP Information Security Colloquium.
IIT Indore © Neminath Hubballi
Geoff Huston APNIC Labs
Test cases for domain checks – a step towards a best practice Mats Dufberg,.SE Sandoche Balakrichenan, AFNIC.
DNSEXT-63 Next steps in Trust Anchor Management for DNSSEC Ólafur Guðmundsson
Olaf M. Kolkman. Domain Pulse, February 2005, Vienna. DNSSEC Basics, Risks and Benefits Olaf M. Kolkman
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Troubleshooting.
Introduction to DNSSEC AROC Bamako, Mali, What is DNSSEC?
Tyre Kicking the DNS Testing Transport Considerations of Rolling Roots Geoff Huston APNIC.
DNSSEC an introduction ccTLD workshop November 26-29th, 2007 Amman, Jordan Based on slides from RIPE NCC.
© 2015 ISC November 2013 Sunset for the DLV?. © 2015 ISC Background (c) Interested
Secured Dynamic Updates. Caution Portions of this slide set present features that do not appear in BIND until BIND 9.3 –Snapshot code is available for.
© Afilias Limitedwww.afilias.info SM Deploying DNSSEC Ram Mohan.
Krit Witwiyaruj Thai Name Server Co., Ltd.th DNSSEC Implementation.
Olaf M. Kolkman. Apricot 2005, February 2005, Kyoto. DNSSEC An Update Olaf M. Kolkman
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License The details.
Root Zone KSK: The Road Ahead Edward Lewis | DNS-OARC & RIPE DNSWG | May 2015
ISOC.NL SIP © 15 March 2007 Stichting NLnet Labs DNSSEC and ENUM Olaf M. Kolkman
DNSSEC deployment in NZ Andy Linton
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Practicalities.
1 DNSSEC Deployment: Big Steps Forward; Several Steps to Go NANOG 32 Deployment D N S S E C Rob Austein Steve Crocker
DNSSEC-Deployment.org Secure Naming Infrastructure Pilot (SNIP) A.gov Community Pilot for DNSSEC Deployment JointTechs Workshop July 18, 2007 Scott Rose.
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
BGPSEC Router Key Roll-over draft-rogaglia-sidr-bgpsec-rollover-00 Roque Gagliano Keyur Patel Brian Weis.
AU, March 2, DNSSEC, APNIC, & how EPP might play a Role Ed Lewis DNS SIG APNIC 21.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)
OARC TAR Panel. La Brea Tar Pit What was originally intended to expedite the roll-out of DNSSEC seems to be bogging it down instead People who read press.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
What if Everyone Did It? Geoff Huston APNIC Labs.
Building Trust with Anchors Eric Osterweil Dan Massey Lixia Zhang 1.
Olaf M. Kolkman. IETF58, Minneapolis, November DNSSEC Operational Practices draft-ietf-dnsop-dnssec-operational-practices-00.txt.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Developing a DNSSEC Policy The Compulsory Zone Distribution Which DNSSEC Protocol Keys – and Managing them Managing the Children Using DNSSEC Mark Elkins.
DRAFT STEP-BY-STEP DNS SECURITY ILLUSTRATIVE GUIDE Version 0.2 Sparta, Inc Samuel Morse Dr. Columbia MD Ph:
What's so hard about DNSSEC? Paul Ebersman – May 2016 RIPE72 – Copenhagen 1.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
Key Rollover for the RPKI Steve Kent (Channeling Geoff Huston )
Increasing the Zone Signing Key Size for the Root Zone
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
Agenda DNSSEC automation overview How to implement it in FRED
Lecture 20 DNS Sec Slides adapted from Olag Kampman
Geoff Huston APNIC Labs September 2017
A Longitudinal, End-to-End View of the DNSSEC Ecosystem
R. Kevin Oberman ESnet February 5, 2009
DNSSEC Basics, Risks and Benefits
Geoff Huston APNIC Labs
DNS operator transfers with DNSSEC
DNSSEC & KSK Rollover Patrick Jones Middle East DNS Forum & APTLD 75
The Curious Case of the Crippling DS record
Presentation transcript:

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License DNSSEC ROLLING KEYS Presented by Olaf Kolkman (NLnet Labs)

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License DNSKEY in flavours Zone Signin Key (ZSK) Key Signing Key (KSK) Functions as secure entry point into the zone Trust-anchor configuration Parental DS points to it Interaction with 3rd party DNSKEYs are treated all the same in the protocol Operators can make a distinction Look at the flag field: ODD (257 in practice) means SEP

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Benefits of using separate keys Rolling KSK needs interaction, rolling ZSKs can be done almost instantaneously Remember KSK replacement may result in Trust-anchor updates Change of DS record at parent Allows different responsibilities ZSKs may be touched day to day by junior staff KSKs may only be touched by senior staff

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Rolling keys instantaneously? Remember that in the DNS caches are at play. It takes a bit of time to have new information propagate When you happen to get new DNSKEYs you would like to be able to use DNSSIGs from the cache When you happen to get old DNSKEYs from the cache you would like to use new DNSSIGs Try to make sure both old and new keys are available Or, try to make sure both old and new sigs are available

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Timing Properties time Authoritative MasterAuthoritative SlaveCaching Nameserver Foo TXT Old Foo TXT New Publication of new data Query to slave followed by Caching Foo TXT Old Zone transfer Foo TXT New Expiration From Cache 0 t1t1 t2t2 t3t3 Zone synchronization TTL Poof

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License PRE-publish ZSK rollover Introduce the new DNSKEY before you start using it to sign the data. ‘published and active’ key The published key is just published, the active key is used for signing You could also create two signatures after introducing the key, but that would cause your zone file to grow

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Generated The key has been created, but has not yet been used for anything. Published The DNSKEY record - or information associated with it - is published in the zone, but predecessors of the key (or associated information) may be held in caches. The idea of "associated information" is used in rollover methods where RRSIG or DS records are published first and the DNSKEY is changed in an atomic operation. It allows the rollover still to be thought of as moving through a set of states. In the rest of this section, the term "key data" should be taken to mean "key or associated information". Ready The new key data has been published for long enough to guarantee that any previous versions of it have expired from caches. Active The key has started to be used to sign RRsets. Note that when this state is entered, it may not be possible for validating resolvers to use the key for validation in all cases: the zone signing may not have finished, or the data might not have reached the resolver because of propagation delays and/or caching issues. If this is the case, the resolver will have to rely on the key's predecessor instead. Retired The key is in the zone but a successor key has become active. As there may still be information in caches that that require use of the key, it is being retained until this information expires. Dead The key is published in the zone but there is no longer information anywhere that requires its presence. Hence the key can be removed from the zone at any time. Removed The key has been removed from the zone. Generated The key has been created, but has not yet been used for anything. Published The DNSKEY record - or information associated with it - is published in the zone, but predecessors of the key (or associated information) may be held in caches. The idea of "associated information" is used in rollover methods where RRSIG or DS records are published first and the DNSKEY is changed in an atomic operation. It allows the rollover still to be thought of as moving through a set of states. In the rest of this section, the term "key data" should be taken to mean "key or associated information". Ready The new key data has been published for long enough to guarantee that any previous versions of it have expired from caches. Active The key has started to be used to sign RRsets. Note that when this state is entered, it may not be possible for validating resolvers to use the key for validation in all cases: the zone signing may not have finished, or the data might not have reached the resolver because of propagation delays and/or caching issues. If this is the case, the resolver will have to rely on the key's predecessor instead. Retired The key is in the zone but a successor key has become active. As there may still be information in caches that that require use of the key, it is being retained until this information expires. Dead The key is published in the zone but there is no longer information anywhere that requires its presence. Hence the key can be removed from the zone at any time. Removed The key has been removed from the zone. For those that write scripts/programs draft-ietf-dnsop- dnssec-key-timing provides a definition of the various states and transitions you need to take into account

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Zone data Sig zsk2 ZSK rollover ksk zsk1 Zone data zsk2 Sig ksk Sig zsk1 dnssec-signzone -k ksk example.com zsk1 ksk zsk1 Sig ksk Sig zsk1 Create published zsk2 time Zone data Sig zsk1 zsk2 ksk Sig ksk Sig zsk2 Zone data Sig zsk2 At least TTL of DNSKEY RRs dnssec-signzone -k ksk example.com zsk2 ksk zsk1 Sig ksk Sig zsk2 zsk2 At least MAX TTL over all RRs

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License KSK rollover You are dependent on your parent. You cannot control when the parent changes the DS rr Use the old KSK until the old DNS had time to propagate from caches

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License KSK rollover ksk1 zsk Zone data ksk2 Sig ksk Sig zsk dnssec-signzone -k ksk1 example.com zsk ksk1 zsk Sig ksk1 Sig zsk Create ksk2 and send to parent time Zone data Sig zsk Zone data Sig zsk At least TTL DS RRs dnssec-signzone -k ksk1 -k ksk2 example.com zsk Sig ksk2 dnssec-signzone -k ksk2 example.com zsk ksk2 ksk1 zsk Sig ksk1 Sig zsk Zone data Sig zsk Sig ksk2 Remove ksk1 DS1DS2 Parent rolls zsk ksk2

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Erratum initial new DNSKEY new RRSIGs DNSKEY removal SOA0 SOA1 SOA2 SOA3 RRSIG10(SOA0) RRSIG10(SOA1) RRSIG11(SOA2) RRSIG11(SOA3) DNSKEY1 DNSKEY1 DNSKEY1 DNSKEY1 DNSKEY10 DNSKEY10 DNSKEY10 DNSKEY11 RRSIG1 (DNSKEY) RRSIG1 (DNSKEY) RRSIG1(DNSKEY) RRSIG1 (DNSKEY) RRSIG10(DNSKEY) RRSIG10(DNSKEY) RRSIG11(DNSKEY) RRSIG11(DNSKEY) Pre-Publish Key Rollover DNSKEY11

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Erratum II initial new DNSKEY DNSKEY removal SOA0 SOA1 SOA2 RRSIG10(SOA0) RRSIG10(SOA1) RRSIG11(SOA2) DNSKEY1 DNSKEY1 DNSKEY1 DNSKEY10 DNSKEY10 DNSKEY11 RRSIG1(DNSKEY) RRSIG1(DNSKEY) RRSIG1(DNSKEY) RRSIG10(DNSKEY) RRSIG10(DNSKEY) RRSIG11(DNSKEY) Double Signature Zone Signing Key Rollover initial new DNSKEY DNSKEY removal SOA0 SOA1 SOA2 RRSIG10(SOA0) RRSIG10(SOA1) RRSIG11(SOA2) DNSKEY1 DNSKEY1 DNSKEY1 DNSKEY10 DNSKEY10 DNSKEY11 RRSIG1(DNSKEY) RRSIG1(DNSKEY) RRSIG1(DNSKEY) RRSIG10(DNSKEY) RRSIG10(DNSKEY) RRSIG11(DNSKEY) Double Signature Zone Signing Key Rollover RRSIG11(SOA1) DNSKEY11 RRSIG11(DNSKEY)

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Key Management There are many keys to maintain Keys are used on a per zone basis Key Signing Keys and Zone Signing Keys During key rollovers there are multiple keys In order to maintain consistency with cached DNS data [RFC4641] Private keys need shielding

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License KSK and trust-anchors If your KSK is used as a trust anchor (do you know?) you should deploy mechanisms to allow automated rollover RFC 5011

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License RFC 5011 Concepts Trust anchor maintenance based on existing trust relation New keys only accepted after its been seen for more than 30 days (Hold Down) Signaling retirement of the key by setting a ‘revoke’ flag

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Resolver sees new key revoke A B A B Zone Owner Trust Anchor state active refresh Hold Down Timer B is trusted too A is removed

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License By Hand? You can do this using tools manually Error prone and complex Easy to forget Use tools

page © NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Key managment Not only a matter of changing a key You have to keep the DNS timing properties into account Manual, yes for only a few zones Error prone!!!