Introduction to DNSSEC AROC Bamako, Mali, 2010. What is DNSSEC?

Slides:



Advertisements
Similar presentations
DNSSEC in Windows Server. DNS Server changes Provide DNSSEC support in the DNS server – Changes should allow federal agencies to comply with SC-20 and.
Advertisements

Practical Considerations for DNSSEC Automation Joe Gersch OARC Presentation September 24, 2008.
Review iClickers. Ch 1: The Importance of DNS Security.
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License DNSSEC ROLLING.
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
DNS Transfers in DNSSEC world Olafur Gudmundsson Steve Crocker Shinkuro, Inc.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Deploying DNSSEC in Windows Server 2012 David Cates Platform Services Group Microsoft Corporation.
Measuring DNSSEC validation i.e. how to do it Ólafur Guðmundsson Steve Crocker ogud, steve at shinkuro.com.
DNSSEC Brought to you by ISC-BIND, SUNYCT, and: Nick Merante – SUNYIT Comp Sci SysAdmin Nick Gasparovich – SUNYIT Campus SysAdmin Paul Brennan – SUNYIT.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
High-Level Awareness of DNSSEC KENIC/NSRC Workshop, Nairobi, May 2011 Phil Regnauld Joe Abley
1 DNSSEC From a protocol bug to a security advantage Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
DNS Security A.Lioy, F.Maino, M. Marian, D.Mazzocchi Computer and Network Security Group Politecnico di Torino (Italy) presented by: Marius Marian.
1 SecSpider: Distributed DNSSEC Monitoring Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
1 Observations from the DNSSEC Deployment Dan Massey Colorado State University Joint work with Eric Osterweil and Lixia Zhang UCLA.
© Afilias Limitedwww.afilias.info SM Challenges of Deploying DNSSEC: Prepare your ccTLD with Secondary DNS services LACNIC Meeting May 2010 Presented by:
1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Deploying DNSSEC in Windows Server 2012 Rob Kuehfus Program Manager Microsoft Corporation WSV325.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
DNS operator/registrar changes toolkit of actions Steve Crocker Ólafur Guðmundsson Shinkuro 2011/03/26.
Data You Can Trust: The Key to Information Security Dr. Burt Kaliski, Jr. Senior Vice President and CTO, Verisign 25 th HP Information Security Colloquium.
Tony Kombol ITIS Who knows this? Who controls this? DNS!
Identity Management and DNS Services Tianyi XING.
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
IIT Indore © Neminath Hubballi
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Troubleshooting.
Tyre Kicking the DNS Testing Transport Considerations of Rolling Roots Geoff Huston APNIC.
DNSSEC an introduction ccTLD workshop November 26-29th, 2007 Amman, Jordan Based on slides from RIPE NCC.
Andreas Steffen, , 12-DNSSEC.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
© 2015 ISC November 2013 Sunset for the DLV?. © 2015 ISC Background (c) Interested
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License The details.
Tony Kombol ITIS DNS! overview history features architecture records name server resolver dnssec.
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
© 2015 ISC November 2013 Sunset for the DLV?. © 2015 ISC Background (c) Interested
How to use DNS during the evolution of ICN? Zhiwei Yan.
DNS Session 5 Additional Topics Joe Abley AfNOG 2006, Nairobi, Kenya.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
OpenDNSSEC Deployment Tianyi Xing. Roadmap By mid-term – Establish a DNSSEC server within the mobicloud system (Hopfully be done by next week) Successfully.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
Presented by Mark Minasi 1 SESSION CODE: WSV333.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Building Trust with Anchors Eric Osterweil Dan Massey Lixia Zhang 1.
Olaf M. Kolkman. IETF58, Minneapolis, November DNSSEC Operational Practices draft-ietf-dnsop-dnssec-operational-practices-00.txt.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
K. Salah1 Security Protocols in the Internet IPSec.
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Internet infrastructure 1. Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
Increasing the Zone Signing Key Size for the Root Zone
Security Issues with Domain Name Systems
Lecture 20 DNS Sec Slides adapted from Olag Kampman
In collaboration with HKCERT and HKIRC July 2016
State of DNSSEC deployment ISOC Advisory Council
Geoff Huston APNIC Labs September 2017
DNS security.
R. Kevin Oberman ESnet February 5, 2009
What DNSSEC Provides Cryptographic signatures in the DNS
DNSSEC Status Update in UA
The Curious Case of the Crippling DS record
Presentation transcript:

Introduction to DNSSEC AROC Bamako, Mali, 2010

What is DNSSEC?

DNS Problems Cache-poisoning DNS interception Confidentiality Reliability Reflection attacks Which of these does DNSSEC address?

Reflection Attacks DNS servers can act as very efficient packet amplifiers Use of UDP, small queries, large responses DNSSEC makes DNS servers better packet amplifiers Still lots of UDP, larger responses

Reliability In the grand scheme of things, DNSSEC does not help make your DNS more reliable in fact it makes the DNS more brittle, and makes it harder to maintain reliable service

Confidentiality DNSSEC does not address confidentiality of queries or responses anybody who can intercept a secure response can still see the details there is no encryption here

Integrity, Authenticity DNSSEC provides a mechanism for data published in the DNS to carry cryptographic signatures secure responses include signatures clients receiving a secure response can tell whether it is authentic

Three Slides about Cryptography

Cryptography Public Key Cryptography X.509, PGP, ssh, DNSSEC (Public, Private) Key Pairs use the private key to sign data use the public key to verify signature

Private Key The private key needs to be kept private and secure the degree of security depends on what the key is used for a compromised key means you can no longer expect people to trust signatures a signature from a compromised key is more dangerous than no signature at all

Public Key The public key needs to be widely- distributed it also needs to be accurate

DNSSEC Protocol

DNS Considerations When using the DNS to distribute keys, we need to remember a few things the DNS is widely-distributed information does not update instantaneously we need to think hard about TTLs and caches

Public Keys in the DNS In DNSSEC, we distribute public keys in the DNS itself use the DNSKEY RRSet supports different key sizes, cryptographic algorithms

DNSKEY in the Wild [octopus:~]% dig isoc.org DNSKEY +noall +answer ; > DiG APPLE-P2 > isoc.org DNSKEY +noall +answer ;; global options: +cmd isoc.org.14387INDNSKEY AwEAAcE/XrxyyTSkw3ly60jsF4gz5kvn4QM6E0plIjnnjENmeWNPZxNf BYIKZnJxf3GaoI+qFeqbSc085jOXZiBMSRMQFkfsJNZgCsyVhas3lMoM HXEcEewNCPWv2D6TCYGHiVJaTJ0+6we19hIZZlrgJxfPxOXx9CUAzltQ CCvGD055P+yexHdMNWNvcxqt+1qtVt03heIWhf6QH5lhWaIHQWMXJlky KrgVwXHZHcvUebXqhhJfGZhGGU64x7HpNP3llCRqsut7iWsMLo8yBl3m R7eo/pUc6HF3M9E7hl53fg722xMxVA60kkDZqTp1FUzOCK5AagY+ISNz mKtOLgPcxCs= isoc.org.14387INDNSKEY AwEAAZj8B7CEDfD4C1iJRJkZCxi6dz+dbVhqUUenXLRBDDtgm1BoF3jq v1Yj+DW+UT29Mzcg1aTR3lXMV1DZcmvHytvtl1N+y02CFSgYVQ+GOxv0 HSRRJhpWTD9sv5/Pr42bJ8eyNZ8cauyIwsHnd+kpVY60Q36VhdK8ZnhZ x69wpwzF [octopus:~]%

RR Signing in DNSSEC Each Resource Record Set (RRSet) can carry zero or more signatures signatures appear in an RRSIG RRSet with the same owner name signatures have an inception and expiry time we need to re-sign regularly

RRSIG in the Wild [octopus:~]% dig A +dnssec +noall +answerwww.isoc.org ; > DiG APPLE-P2 > A +dnssec +noall +answerwww.isoc.org ;; global options: +cmd isoc.org. YhsanPDyYO9tilrwZEHituzhzG8OwF1Peq1MMmY3/q6bE82mSiDxxi/Q hH4GeoYO5EKrcfpuRWLcPNJ3f/3HEc/SCYvF4gPyezJ6XFcbFvUAG4y5 ZR+dt9KawvrDYlOxtk31xgLeWRm3ryOqJgH+8OGLAg2W77xapEdofkfd ENo= [octopus:~]%

Chain of Trust If we can trust the public key which corresponds to the private key that made a signature, we can trust a signature If we can trust a signature, we can trust the data that is signed How do we trust the public key?

Delegation Signer DS is the Delegation Signer Resource Record it carries a hash of a public key it is signed this is how we extend trust across delegations

Chain of Trust RRSet RRSIG(RRSet) DNSKEY DS RRSIG(DS) DNSKEY Parent Zone Child Zone

Chain of Trust RootORGISOC.ORG

Root Anchor At some point a validator needs to install a trust anchor into its software root zone trust anchor

Two DNSKEY RRSets Common practice in 2010 is to use two different DNSKEY RRSets per zone ZSK – Zone Signing Key used to sign the data in the zone KSK – Key Signing Key used to sign the DNSKEY RRSet

ZSK Since we need to re-sign the zone regularly, the ZSK needs to be on-line The ZSK is the key that is used most often by validators, so we can make it smaller and save some CPU We can change the ZSK we are using regularly without involving others

KSK The KSK is the key that corresponds to the DS record in our parent zone We need to use the KSK to sign the ZSK, and then we can put it away in a safe place no need to keep the KSK on-line changing the KSK involves talking to our parent (update DS record)

KSK and ZSK Child Zone DNSKEY(KSK) DNSKEY(ZSK) RRSIG(DNSKEY) RRSIG(RRSet) RRSet Parent Zone DNSKEY(KSK) DNSKEY(ZSK) RRSIG(DNSKEY) RRSIG(DS) DS

[KZ]SK in the Wild [octopus:~]% dig isoc.org DNSKEY +noall +answer ; > DiG APPLE-P2 > isoc.org DNSKEY +noall +answer ;; global options: +cmd isoc.org.14387INDNSKEY AwEAAcE/XrxyyTSkw3ly60jsF4gz5kvn4QM6E0plIjnnjENmeWNPZxNf BYIKZnJxf3GaoI+qFeqbSc085jOXZiBMSRMQFkfsJNZgCsyVhas3lMoM HXEcEewNCPWv2D6TCYGHiVJaTJ0+6we19hIZZlrgJxfPxOXx9CUAzltQ CCvGD055P+yexHdMNWNvcxqt+1qtVt03heIWhf6QH5lhWaIHQWMXJlky KrgVwXHZHcvUebXqhhJfGZhGGU64x7HpNP3llCRqsut7iWsMLo8yBl3m R7eo/pUc6HF3M9E7hl53fg722xMxVA60kkDZqTp1FUzOCK5AagY+ISNz mKtOLgPcxCs= isoc.org.14387INDNSKEY AwEAAZj8B7CEDfD4C1iJRJkZCxi6dz+dbVhqUUenXLRBDDtgm1BoF3jq v1Yj+DW+UT29Mzcg1aTR3lXMV1DZcmvHytvtl1N+y02CFSgYVQ+GOxv0 HSRRJhpWTD9sv5/Pr42bJ8eyNZ8cauyIwsHnd+kpVY60Q36VhdK8ZnhZ x69wpwzF [octopus:~]%

DS in the Wild [octopus:~]% ISOC.ORG SOA +dnssec +noall +auth ; > DiG APPLE-P2 ISOC.ORG SOA +dnssec +noall +auth ; (1 server found) ;; global options: +cmd ISOC.ORG.86400INNS[...] ISOC.ORG.86400INDS AD5E47FFFFA05AE70D5166E01B7836E34AD D95DB9D1E9D7D 3AFB33D4 ISOC.ORG.86400INDS B71BF480AE2C1484BB1DBA7E0A42089D90298 ISOC.ORG.86400INRRSIGDS org. IMqcyadyAGU+DynuTCz7JgJga+jjEii7PAxQha+q0k8AoGLzhwaI1kWQ bDgt7fLKi8HiJPX5eOouGVvS2RIx82+wNabM9/1cGHO41xYk3t/ttP/L GkqjewoAsw+6X/2k92FnEUqkIotlWuXJSVvqzv4FDh0LRF+wjxc2IYMa CQI= [octopus:~]%

DNS Transport Plain old DNS was optimised to work over UDP with small packets (512 bytes) fall-back to TCP Modern DNS supports larger messages over UDP (EDNS0, RFC 2671) DNSSEC means larger DNS messages beware of faulty assumptions in firewalls!

The Rest How to provide benefits of DNSSEC to end-users? validation in resolvers (AD bit) validation in applications (e.g. browser plug-ins) early days

The Rest Verifiable deniability of existence you can’t sign something that’s not there use NSEC or NSEC3 records to cover the gaps sign the NSEC and NSEC3 records

DNSSEC for Registries

So What? What does this mean for a registry? need to implement secure key storage, management procedures need to sign your zones need to accept DS records from users (how?) need to publish DS records to parents (how?)

NSEC and NSEC3 You have to use one of these. Which one? Simple rule of thumb if you are happy for anybody in the world to obtain a copy of your zone, use NSEC if you normally don’t allow (e.g.) zone transfers to random people, use NSEC3

Key Management How do we keep the ZSK secure? How do we keep the KSK secure? important questions no simple answers here requires risk analysis, consultation, maybe audit

Communication Communicate with your customers explain benefits/risks of DNSSEC Communicate with end-users demonstrate how to validate responses explain operational changes (firewalls, TCP, response sizes)

And Also! Remember, DNSSEC makes you zones more brittle and fragile than they were before need to have excellent reliability in registry and DNS operations need to have emergency procedures to update DS RRSets in your zones

Open-Source Software BIND9 OpenDNSSEC

Resources dnssec-deployment mailing list dns-operations mailing list Ongoing protocol work IETF dnsop, dnsext working groups

State of DNS Deployment, September 2010

Deployment Root zone was signed in July 2010 Many TLDs are currently signed 48 out of 294 ARPA, BE, BG, BIZ, BR, CAT, CH, CL, CZ, DK, EDU, EU, FI, FR, GOV, INFO, KG, LI, LK, MUSEUM, NA, NL, NU, ORG, PM, PR, PT, RE, SE, TF, TH, TM, UK, US,...

Introduction to DNSSEC AROC Bamako, Mali, 2010