Internet Infrastructure Protection May 23, 2006 Steve Crocker, ICANN Security and Stability Committee Shinkuro, Inc.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Review iClickers. Ch 1: The Importance of DNS Security.
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Understanding Active Directory
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Olaf M. Kolkman. Apricot 2003, February 2003, Amsterdam. /disi Steps towards a secured DNS Olaf M. Kolkman, Henk Uijterwaal, Daniel.
1 DNSSEC at ESnet ESCC/Internet2 Joint Techs Workshop July 19, 2006 R. Kevin Oberman Network Engineer Lawrence Berkeley National Laboratory.
Name Resolution Domain Name System.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
IIT Indore © Neminath Hubballi
Security for the Internet’s Domain Name System DNSSEC Current State of Deployment Prepared for Internet2 BoF Amy Friedlander, Shinkuro, Inc. Based on a.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Olaf M. Kolkman. Domain Pulse, February 2005, Vienna. DNSSEC Basics, Risks and Benefits Olaf M. Kolkman
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Olaf M. Kolkman. Apricot 2005, February 2005, Kyoto. DNSSEC An Update Olaf M. Kolkman
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
1 Windows 2008 Configuring Server Roles and Services.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
FCC CSRIC III Working Group 5 DNSSEC Implementation Practices Steve Crocker CEO, Shinkuro, Inc. March 6, 2013 Working Group 5: DNSSEC.
DNSSEC-Deployment.org Secure Naming Infrastructure Pilot (SNIP) A.gov Community Pilot for DNSSEC Deployment JointTechs Workshop July 18, 2007 Scott Rose.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
March 2004 At A Glance NASA’s GSFC GMSEC architecture provides a scalable, extensible ground and flight system approach for future missions. Benefits Simplifies.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
Implementing Microsoft Exchange Online with Microsoft Office 365
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
Role Of Network IDS in Network Perimeter Defense.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
Security Issues with Domain Name Systems
DNSSEC Basics, Risks and Benefits
Goals Introduce the Windows Server 2003 family of operating systems
A New Approach to DNS Security (DNSSEC)
Presentation transcript:

Internet Infrastructure Protection May 23, 2006 Steve Crocker, ICANN Security and Stability Committee Shinkuro, Inc.

2 My Primary Message Build security into the infrastructure Good architecture is cheaper and better than chasing the bad guys It’s less sexy but more effective CERTs, Firewalls, Honeynets, etc. are all good Networking the security community is good Do all of this, but also invest in the architecture

3 Latin America has unique opportunity Plenty of technical talent Networks are still in a growth stage Not as much legacy as North America, Europe Good communication, cooperation Opportunity to leap ahead

4 Incidents Reported to CERT/CC

5 Vulnerabilities Reported to CERT/CC

6 Attack Sophistication vs. Intruder Knowledge propagation of malicious code “stealth”/advanced scanning techniques widespread attacks using NNTP to distribute attack widespread attacks on DNS infrastructure executable code attacks (against browsers) automated widespread attacks GUI intruder tools hijacking sessions Internet social engineering attacks packet spoofing automated probes/scans widespread denial-of-service attacks techniques to analyze code for vulnerabilities without source code DDoS attacks increase in worms sophisticated command & control anti-forensic techniques home users targeted distributed attack tools increase in wide-scale Trojan horse distribution Windows-based remote controllable Trojans (Back Orifice) Intruder Knowledge Attack Sophistication

7 Internet Infrastructure Threats 1. Physical disruption of major lines and switching centers 2. Loss of DNS service continuity and/or fidelity 3. Loss of routing infrastructure continuity and/or fidelity 4. Flooding of network or specific sites, i.e. denial of service attack

8 Internet Infrastructure Protection DNSSEC Address Security DDoS suppression

DNSSEC Deployment

Segments Demo DNS & DNSSEC basics Deployment Issues Opportunity!

Hijack Demo Connect to BADNET network We will intercept your queries…

DNSSEC Basics Slides from RIPE NCC

13 Why DNSSEC? DNS is not secure Known vulnerabilities People depend more and more on DNS DNSSEC protects against data spoofing and corruption

14 DNS: Known Concepts Known DNS concepts: Delegation, Referral, Zone, RRs, label, RDATA, authoritative server, caching forwarder, stub and full resolver, SOA parameters, etc

Reminder: DNS Resolving Resolver Question: A A ? Caching forwarder (recursive) root-server A ? “go ask net X.gtld-servers.net” (+ glue) gtld-server A ? “go ask ripe ns.ripe.net” (+ glue) ripe-server A ? “ ” Add to cache TTL

DNS: Data Flow master Caching forwarder resolver Zone administrator Zone file Dynamic updates 12 slaves 345

DNS Vulnerabilities master Caching forwarder resolver Zone administrator Zone file Dynamic updates 12 slaves 3 Server protection 45 Corrupting data Impersonating master Unauthorized updates Cache impersonation Cache pollution by Data spoofing Data protection Altered zone data

18 DNSSEC protects.. DNSSEC protects against data spoofing and corruption DNSKEY/RRSIG/NSEC: provides mechanisms to establish authenticity and integrity of data DS: provides a mechanism to delegate trust to public keys of third parties A secure DNS will be used as an infrastructure with public keys However it is NOT a PKI

19 DNSSEC Current State RFC 4033 DNS Security Introduction and Requirements RFC 4034 Resource Records for the DNS Security Extensions RFC 4035 Protocol Modifications for the DNS Security Extensions March 2005 Obsoletes RFC 2535

20 DNSSEC hypersummary Data authenticity and integrity by signing the Resource Records Sets Public DNSKEYs used to verify the RRSIGs Children sign their zones with their private key Authenticity of that key established by signature/checksum by the parent (DS) Ideal case: one public DNSKEY distributed

Deployment Issues Getting the Root Signed Getting TLDs Signed  Getting Enterprises Signed Resolvers Applications

Key Generation Key Distribution Root Signing Serving Signed Root TLD Key Acquisition Serving Signed Root with TLD Keys AB C FE D Root Signing Road Map

Getting TLDs Signed -- Issues Current Status Zone Walking Zone Size

TLD Zone Status.SE (Sweden) is signed and operational RIPE’s portion of in-addr.arpa is signed.ORG,.COM and.NET have test beds More coming

Zone Walking NSEC (“Next Secure”) makes it possible to “walk the zone” to find all entries Some (many?) TLD operators object NSEC3, using hashes, solves this problem NSEC3 design is done(?) Shakedown workshop at DENIC in early May Good progress. Further testing and documentation needed

Zone Size Memory requirements expand three to five times for a fully signed zone Significant impact on large zones -- COM, NET, ORG, DE, UK, … Current design requires one NSEC record for every delegation, even if it’s not signed “Opt-in” requires NSEC (or NSEC3) record only for signed zones (Some call this “opt-out”. Same thing.) Slightly different but equivalent security Much lower initial impact Opt-in is coming with NSEC3

Getting Enterprises Signed In house operation Outsourced operation

In House Operation Software Possible hardware Operations Policies Key lifetimes, management chain Procedures, Training Become a founding operator…

Outsourced Operation Many enterprises outsource DNS service Registrars, hosting services Managed DNS Service Providers UltraDNS, VeriSign, Akamai, Netriplex, Infoblox, EasyDNS, DNS Made Easy DNS Service Providers can add DNSSEC with zero imposition on domain name holder Except perhaps for a charge  DNS Service Providers will be the source of many signed zones

Opportunity! Meanwhile, in the short run, it’s up to us. Be a DNSSEC founding operator Sign your zone Be the primary for others Be a secondary Tuesday we will announce a small directory of primary and secondary signer/operators Sign up. Talk to us today. Send .

31 DNSSEC Deployment is… … the transition from specs to operation … a multinational effort … a complex process … a project that needs your help

32 Organizational Matters Pockets of expertise Sweden, Netherlands, U.S., Japan Active test bed and deployment in a few places Deployment Working Group active

33 What’s Needed Local efforts in each country Regional cooperation for training, etc. Awareness campaigns Testing Application development

34 Government Role(s) Awareness, motivation Prioritization – protect critical infrastructure Funding of key local activities Participation in global forum Adoption and leadership internally

Contacts & Resources steve.shinkuro.com Slides and other DNSSEC material at: ===================================== Support provided by U.S. Dept. of Homeland Security, Science and Technology Directorate Cooperative work with Sparta, NIST, MIT Lincoln Laboratory

36 Acknowledgements Olaf Kolkman, RIPE Edward Lewis, NeuLevel The Whole DNSSEC Deployment Working Group

Address Validation

38 Address Validation is Essential Address spoofing is a key component of multiple attacks Must check at ingress Every ISP must do this

39 What is Address Validation? Does the source address belong to this customer? Requires knowing authorized source addresses Same as destination addresses Requires checking Adds cost, hardware Do it anyway Insist your peers do it too

40 Suppression of Distributed Denial of Service (DDoS) Attacks

41 The Denial of Service Problem Denial of service attacks are increasing This will get worse – probably much worse Law enforcement is important but necessarily at the wrong end of the problem Technical changes in the Internet would help a lot

42 A modest(?) proposal for controlling DDoS Attacks Identify sources of traffic Identify “well managed” computers on “well managed” networks Traffic from well managed networks gets preference

43 “Well managed” “Well managed” computers aren’t zombies Details on the next slide Well managed networks quarantine computers which appear to be infected or misbehaving Well managed networks report misbehaviors and accept reports of misbehaviors

44 Weeding out Zombies Regular configuration checking Either within the enterprise Or by an outside service Tight configuration control (Eventually) certified appliances

45 Network Wide Cooperation Traffic among well managed networks gets preference Traffic from same sites is labeled with a “good” bit Eerily similar to Bellovin’s “evil” bit(!) When there is congestion, traffic from unmanaged hosts on unmanaged networks is dropped How is traffic labeled? Diffserv? IP header bit? MPLS? Other?

46 DDoS Policy Approaches Pressure on the vendor to supply machines that are safe out of the box Establishment of an ethic that machines should be safe, i.e. it’s the vendor’s problem, not the user’s. This all requires R&D, clarity of vision, and perseverance. Not an overnight process.

47 Arguments in Favor Similar to VPN over private lines, but potentially more efficient Adds incentive to improve security in hosts and networks Raises DDoS protection to a primary goal Incremental – works well with a small set of core ISPs and expands smoothly Robust – does not require 100% correct operation Failures can be detected; adjustments can be made

48 Critique Sharp shift in policy Requires strong cooperation among ISPs Who sets the rules? Enforcement issues Who determines when an ISP or a customer isn’t complying? What appeals process? Efficiency issue for large ISPs: Is it feasible to filter traffic at high speed?

Shinkuro Overview

50 Working Together? Why is so hard to work closely together over the net? and Instant Messaging… Is that all there is? Need flexible, easily configurable, user- controlled file-sharing, screen-sharing, etc. Need very low cost

51 Shinkuro Collaboration Peer-to-peer, ad hoc group formation and data sharing Secure Lightweight Operational across organizational boundaries Unimpeded by firewalls Implicit communication – less drag, focus on apps Contributions and interactions across… Network technology Collaboration technology Human-computer interactions Security models

52 Our Approach Replicate data between group members Each member specifies a shared folder Data replicates between all members Access control Messages secured during transport Supports intermittent connection of members Approach includes… Direct & relayed transport Presence & instant messaging Screen-sharing Generalized platform capabilities Other small features

53 Status Version 2 is being tested broadly Direct and relay transport Instant messaging & presence Screen-sharing Other platform capabilities Internal use of system; changing the way we work

54 Shinkuro Strengths Group formation protocol Secure, decentralized mechanism for group formation Independent of file sharing and replication Simplex replication model Overcomes human issues of file sharing Resolves difficulties in loosely coupled systems Transport Multiple transports and opportunities to add others Security Encrypted and signed communications without relying on SSL or TLS Opaque message transfer through relays Platform Extensible design for leveraging group formation mechanisms into new applications

55 Group Formation Protocol Peer group formation using cross certification of group members

56 Simplex Model Replication

57 Operational Concept Organization AOrganization B User Desktop Relay User Desktop User Desktop User Desktop User Desktop User Desktop User Desktop User Desktop Relay Organization C User Desktop User Desktop

58 Security Built into the system core Fundamental to group formation Designed to minimize reliance on secured channels (SSL, TLS) X509v3 certificate generated for each user Keys exchanged before other communications Each message is separately encrypted (no session keys)

59 Platform Components designed as separately functional “managers” Designed using a service model Some well known services exist (key ring, crypto, group management) Other services implemented around the core File replication Group chat Core code implemented as a library of services for the main application UI Can be used within other applications Services can be added into as loadable modules (coming soon)

60 Supervisor (extensibility manager) Communications Manager (transport) Direct/RelaySMTPPOP3MAPI Queue Manager (message handling) Group Manager (group formation) Directory Manager (file replication) Chat Manager (group conversation) Instant Messaging (one-to-one chat) Person Manager (keyring) Other Group Functions (extensions) Other Managers (extensions) Other User InterfaceCommand Server DyCER API APIImplementedExpansion Key Architecture Crypto Manager Alerts Manager Settings Manager Implemented Utilities Screen Sharing Manager Other UI/ApplicationsWeb-Based UI Direct File Transfer

61 Try it! Windows, Mac, Linux, FreeBSD Free! Tell us what you think