Rev 1.012010-06-03. Mats Dufberg TeliaSonera, Sweden Resolving DNSsec.

Slides:



Advertisements
Similar presentations
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License DNSSEC ROLLING.
Advertisements

State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
IPv4 Run Out and Transitioning to IPv6 Marco Hogewoning Trainer, RIPE NCC.
Deploying DNSSEC in Windows Server 2012 David Cates Platform Services Group Microsoft Corporation.
Sweeping lame DNS reverse delegations APNIC16 – DNS Operations SIG Seoul, Korea, 20 August 2003.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
1.ORG DNSSEC Testbed Deployment Edmon Chung Creative Director Afilias Perth, AU 2 March, 2006.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
© Afilias Limitedwww.afilias.info SM Challenges of Deploying DNSSEC: Prepare your ccTLD with Secondary DNS services LACNIC Meeting May 2010 Presented by:
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
DNS Security Extensions (DNSSEC) Ryan Dearing. Topics History What is DNS? DNS Stats Security DNSSEC DNSSEC Validation Deployment.
Measuring DANE TLSA Deployment Liang Zhu 1, Duane Wessels 2, Allison Mankin 2, John Heidemann 1 1. USC ISI 2. Verisign Labs 1.
Deploying DNSSEC in Windows Server 2012 Rob Kuehfus Program Manager Microsoft Corporation WSV325.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Identity Management and DNS Services Tianyi XING.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
1 DNSSEC at ESnet ESCC/Internet2 Joint Techs Workshop July 19, 2006 R. Kevin Oberman Network Engineer Lawrence Berkeley National Laboratory.
Name Resolution Domain Name System.
Chapter 16 – DNS. DNS Domain Name Service This service allows client machines to resolve computer names (domain names) to IP addresses DNS works at the.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
IIT Indore © Neminath Hubballi
Test cases for domain checks – a step towards a best practice Mats Dufberg,.SE Sandoche Balakrichenan, AFNIC.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
1 San Diego, California 25 February Securing Routing: RPKI Overview Mark Kosters Chief Technology Officer.
Chapter 17 Domain Name System
Tyre Kicking the DNS Testing Transport Considerations of Rolling Roots Geoff Huston APNIC.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
© 2015 ISC November 2013 Sunset for the DLV?. © 2015 ISC Background (c) Interested
APNIC Update The state of IP address distribution and IPv6 deployment status Miwa Fujii Senior IPv6 Program Specialist APNIC.
Internet Corporation for Assigned Names & Numbers Update on ITAR Elise Gerich Vice President, IANA.
Packet Filtering & Firewalls. Stateless Packet Filtering Assume We can classify a “good” packet and/or a “bad packet” Each rule can examine that single.
Status report on Lame Delegations (work in progress) George Michaelson DB SIG APNIC17/APRICOT 2004 Feb KL, Malaysia.
TODAY & TOMORROW DAY 2 - GROUP 5 PRESENTED BY: JAMES SPEIRS CHARLES HIGBY BRADY REDFEARN Domain Name System (DNS)
Rolling the Keys of the DNS Root Zone Geoff Huston APNIC Labs.
Phil Regnauld Hervey Allen 15 June 2009 Papeete, French Polynesia DNSSEC Tutorial: Bibliography.
1 Kyung Hee University Chapter 18 Domain Name System.
FCC CSRIC III Working Group 5 DNSSEC Implementation Practices Steve Crocker CEO, Shinkuro, Inc. March 6, 2013 Working Group 5: DNSSEC.
DNSSEC-Deployment.org Secure Naming Infrastructure Pilot (SNIP) A.gov Community Pilot for DNSSEC Deployment JointTechs Workshop July 18, 2007 Scott Rose.
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
1 Madison, Wisconsin 9 September14. 2 Security Overlays on Core Internet Protocols – DNSSEC and RPKI Mark Kosters ARIN Engineering.
© 2015 ISC November 2013 Sunset for the DLV?. © 2015 ISC Background (c) Interested
OARC TAR Panel. La Brea Tar Pit What was originally intended to expedite the roll-out of DNSSEC seems to be bogging it down instead People who read press.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
CS223: Software Engineering Lecture 2: Introduction to Software Engineering.
What if Everyone Did It? Geoff Huston APNIC Labs.
Role Of Network IDS in Network Perimeter Defense.
Root Zone KSK Maintenance Jaap Akkerhuis | ENOG -10 | October 2015.
APNIC DNSSEC deployment considerations APNIC 23, Bali George Michaelson R&D Officer APNIC.
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Ch. 31 Q and A IS 333 Spring 2016 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
IPv6 Adoption Status and Scheduling for Sustainable Development 24 July 2012 Nate Davis Chief Operating Officer, ARIN.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
System Administration(SAD622S) Name of Presenter: Shadreck Chitauro Lecturer 18 July 2016 Faculty of Computing and Informatics.
Deploying DNSSEC. Pulling yourself up by your bootstraps João Damas ISC.
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
KSK Rollover Update David Conrad, CTO ICANN 59 – GAC 29 June 2017.
Practical Censorship Evasion Leveraging Content Delivery Networks
Living on the Edge: (Re)focus DNS Efforts on the End-Points
Geoff Huston APNIC Labs September 2017
DNS security.
Root KSK Roll Update DNS-OARC 27 Matt Larson, VP of Research
Measuring KSK Roll Readiness
Geoff Huston APNIC Labs
Measuring KSK Roll Readiness
The Curious Case of the Crippling DS record
Presentation transcript:

Rev

Mats Dufberg TeliaSonera, Sweden Resolving DNSsec

Rev What is TeliaSonera? TeliaSonera is one of the major ISP:s in Scandinavia and in the Baltic states. TeliaSonera has one of the largest peering network in Europe, North America and in Asia. TeliaSonera is the largest ISP in Sweden.

Rev DNS resolving for the customers TeliaSonera Sweden has one dedicated, redundant and distributed DNS resolving system for all customers:  Dial-up  Broadband  Fiber to the home  Corporate backbone circuits  Mobile broadband  3G/GPRS In total million users depend on our DNS resolving system. Most clients get the DNS resolvers automatically, e.g. DHCP or PPP. Some corporate users have their own DNS resolvers, and some of those do forwarding to ours.

Rev DNS resolving system We have multiple Intel based servers with Linux OS.  Server program is ISC Bind 9 – currently ver. 9.4 and 9.6 built with full DNSsec support. The servers sit in four sites behind load balansers.

Rev DNSsec supported DNSsec for resolvning services has been in production since June 2007 for all customers (in Sweden). DNSsec for hosting is planned for start of 2011.

Rev Levels of DNSsec resolving 1.Dedicated DNSsec resolver does the job, the client is not aware of DNSsec. 2.Dedicated DNSsec resolver does the job, but the client request DNSsec answer. 3.The client does the validation itself.

Rev The effect of the user of the DNSsec resolving DNSsec resolving is backward compatible with DNS resolving.  We assume ”level 1”.  The user will not discover that the resolvers are DNSsec enabled, unless they request with DNSsec turned on.  Plain DNS queries will get plain DNS answers even if DNSsec validation has been done. We do not expect the users to discover any new behavior of DNS. This is good news!

Rev What is required for DNSsec resolving? DNSsec compatible server program, e.g. ISC Bind 9.4 or higher.  There are other alternatives such as  Nominum CNS  NLnet Labs Unbound DNSsec validation must be enabled (in Bind). Select what zone (domain) or zones (domains) to trust,.SE in our case.  For each zone, add a trust anchor.  Trust anchor is equal to the public KSK of the zone. Every KSK in the zone can be added as trust anchor.  If you trust a zone, you will automatically trust sub-zones with correct DNSsec delegation (DS record included).

Rev Trust anchors are needed No validation is done for a zone if there is no trust anchor for that zone or its ancestor. The root zone will soon be the natural choice.

Rev DNSsec traffic How much traffic is effected by the DNSsec update? – Bind does not provide us with any measures, so we can only guess.  We could dump the traffic, but we have not.  Our focus has been on stability etc rather than measuring DNSsec traffic..SE is the major TLD for the Swedish user community. Even though there are still few DNSsec delegations, the.SE zone itself is signed.  Every query for a new domain will start the validation process. The validation process does not require that the query ask for validation. Validation is based the existence of trust anchor and DS record in delegation.

Rev Instability, bugs... Problems with DNS resolving are know. What can we expect from DNSsec resolving?  Everything that can happen with DNS resolving can happen with DNSsec resolving. Plus more. Areas that we should look at are:  Stability  Network requirements  Performance  Resource requirement  Support calls from users (customers)  Troubleshooting  Key management (trust anchors)

Rev Stability DNSsec resolving uses code in Bind not else used.  Fewer can discover and report the bugs.  We saw bugs in bind, especially in DNSsec validation adds a complex step to the resolver process – more things that can go wrong. We should expect DNSsec resolving to be less stable than plain DNS resolving.

Rev Network requirements DNSsec increases the chance that the answers are larger than can be put into one UDP packet.  Make sure that IP fragements can be handled in incoming answers (from servers on Internet) or set the maximum accepted UDP packet size down.  Make sure that IP fragments can be handled in outgoing answers (to clients) or limit size. There are known issues with home routers and DNSsec. It only affects users that has turned DNSsec on.

Rev Performance and resource requirements We did not see any effect on performance. We have not yet seen any increase in CPU or memory usage. We do not know what resource requirements to expect in the future.  We expect future DNSsec resolving to require faster CPU’s and more memory than plain DNS resolving. By adopting early, we can increase capacity to meet increased load of DNS and increased use of DNSsec at the same time.

Rev Support calls from users and troubleshooting We have seen support calls from customers that can be related to DNSsec as such.  Most known error so far are.SE domains that are not signed but the delegation includes a DS record.  Our resolvers will refuse to resolv the domain (SERVFAIL), non- DNSsec aware resolvers accept the domain.  Customers complain that our resolvers are broken. Bad news is that troubleshooting is much more complex....SE has created a web based tool, DNScheck that checks for various errors including DNSsec errors.  The code is available as open source.

Rev Key management – managing trust anchors DNSsec resolving requires one or more trust anchors.  The trust anchor in the resolver is the public KSK of the zone (domain) to trust. Until the root zone is signed we only trust.SE.

Rev Renewing the trust anchor DNS resolving can be left running by itself. DNSsec resolving requires that the trust anchor or trust anchors are updated.  The trust anchor in the resolver is the public KSK of the domain (zone) to trust.  Contrary to SSL certificates there is no built in last date of validity.  It is an administrative decision of the domain owner when to do a key roll-over.  We depend on announced roll-over dates.  When the KSK has been rolled over, the trust anchor must be updated.

Rev Missing to renew a trust anchor If the trust anchors do not match the KSK’s of the zone, the DNSsec resolver will refuse to return any data for that domain. Missed update will make that domain, and all its subdomains, unavailable!  We know, because we have been there! Make sure to have a process for renewals. Make sure to have tools for renewals.

Rev Fetching Trust Anchor for a TLD Each TLD will have their own site where the KSK is published.  We must trust that the TLD will have systematic procedures before we include the KSK as Trust Anchor. But hopefully we will have a signed root zone in July.

Rev IANA ITAR TAR = Trust Anchor Repository IANA has a TAR for TLDs, ITAR, Interemistic TAR. KSK records will be available for signed TLDs. TLDs must enter their KSK, or else it will not be included. This TAR might be a good source for Trust Anchors.  We can judge the policy it will run under.  We have to trust that the TLDs will update, or we cannot trust the TAR. We should be sceptical to TARs run as private initiatives!  It is better not to have any trust anchor for a domain than to trust some private, third party.

Rev DLV DLV = DNSsec Lookaside Validation It is not a standard, it is just a technique available in Bind DLV lets the resolver fetch the trust anchors via DNS from some zone in DNS.  DLV can be used when the parent zone is not signed.  The resolver will depend on the DLV zone. If not available, all validations will fail! DLV is a dead-end solution (my opinion ) E.g. ISC (creator of Bind) runs a DLV.

Rev RFC 5011 – automatic renewal of trust anchors RFC 5011: ”Automated Updates of DNS Security (DNSSEC) Trust Anchors” Set by the IETF (proposed standard). Defines how to make trust anchor renewal automatic in a DNSsec resolver – if the TLD is compliant in its KSK roll-over.  Does not help how to insert initial trust anchor. It has not yet been implemented by any TLD (as far as I know). Bind 9.7 will support RFC 5011  Support both as authorititative and resolver.

Rev Emergency KSK key roll-over Do not expect unplanned renewal of trust anchors due to emergency roll-over of KSK to be handle automatically. With many trust anchors the risk is higher that a needed emergency renewal is missed. This is an area that requires some additional planning and thoughts. If different TLD’s have similar procedure and cooperate we will probably see fewer missed emergency roll-over.

Rev Signed root zone The DNSsec model assumes that the root zone is signed. When the root zone is signed we could concentrate on other issues instead of trying to find work arounds. The schedule is that the root zone will be signed in July. A signed root zone will make life much easier for all DNSsec resolver operators.  We could be able to validate the entire, contiguous DNSsec space with one trust anchor. A signed root will replace other trust anchors. If the signing of the root is delayed considerably or postponed, then we have to go back to IANA ITAR and fetch trust anchors there.

…thanks

Rev