DNSSEC 101 IGF 2012, Baku, Azerbaijan 6 November 2012

Slides:



Advertisements
Similar presentations
Technical Services Develop Integrate Operate APNIC technical infrastructure.
Advertisements

The Business Case for DNSSEC Tunis Tunisia April 2013
Web Hosting. The purpose of this Startup Guide is to familiarize you with Own Web Now's Web Hosting. Own Web Now offers two web hosting platforms, one.
Web Services Security Requirements Stephen T. Whitlock Security Architect Boeing.
RPKI and Routing Security ICANN 44 June Today’s Routing Environment is Insecure Routing is built on mutual trust models Routing auditing requires.
DNSSEC Sample Implementation Module 1 LACNIC October 2012, Montevideo
S&I Framework Provider Directories Initiative esMD Work Group October 19, 2011.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
Lecture 23 Internet Authentication Applications
Lecture 18 Page 1 CS 236 Online DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
DNSSEC Deployment: Where We Are (and where we need to be) MENOG 10, Dubai 30 April 2012
DNSSEC: Where We Are (and how we get to where we want to be) APNIC 34, Phnom Penh, Cambodia August 2012
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
Password?. Project CLASP: Common Login and Access rights across Services Plan
DESIGNING A PUBLIC KEY INFRASTRUCTURE
A Third Party Service for Providing Trust on the Internet Work done in 2001 at HP Labs by Michael VanHilst and Ski Ilnicki.
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Use of Kerberos-Issued Certificates at Fermilab Kerberos  PKI Translation Matt Crawford & Dane Skow Fermilab.
PKI To The Masses IPCCC 2004 Dan Massey USC/ISI. 1 March PKI Is Necessary l My PKI related actions since arriving at IPCCC n Used an.
1 USHER Update Fed/ED December 2007 Jim Jokl University of Virginia.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
ICANN’s multi-stakeholder approach OAS-CICTE REMJA/OAS + WEF Cyber Crime Workshop, Montevideo, Uruguay 10 July 2012
Fast, Friendly, Secure Authentication. Hackers favor authentication-based attacks, report shows. Summary: A suitable password replacement could disrupt.
Data You Can Trust: The Key to Information Security Dr. Burt Kaliski, Jr. Senior Vice President and CTO, Verisign 25 th HP Information Security Colloquium.
The Business Case for DNSSEC InterOp/ION Mumbai October 2012
Internet Trust Defined. Delivered. Electronic Business the Way It Was Meant to Be.
DNSSEC: Where We Are (and how we get to where we want to be)
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
DNSSEC AsiaPKI - Bangkok, Thailand June 2013
Security for the Internet’s Domain Name System DNSSEC Current State of Deployment Prepared for Internet2 BoF Amy Friedlander, Shinkuro, Inc. Based on a.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
What DNS is Not 0 Kylie Brown, Jordan Eberst, Danielle Franz Drew Hanson, Dennis Kilgore, Charles Newton, Lindsay Romano, Lisa Soros 0 Paul Vixie
DNSSEC: A Game Changer ICCS 2012 January 9, 2012 New York, NY
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Deploying DNSSEC: From Content to End-customer InterOp Mumbai October 2012
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Module 9: Fundamentals of Securing Network Communication.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Lecture 18 Page 1 CS 236, Spring 2008 DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
DNSSEC Update SANOG 27 Kathmandu, Nepal January 2016
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Securing Access to Data Using IPsec Josh Jones Cosc352.
1 US Higher Education Root CA (USHER) Update Fed/Ed Meeting December 14, 2005 Jim Jokl University of Virginia.
Maximize Your Hosting Business: Covering all your SSL requirements Tim Callan May 31, 2006 VeriSign / thawte Confidential.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
Security Issues with Domain Name Systems
SaudiNIC Riyadh, Saudi Arabia May 2017
DNS Security Advanced Network Security Peter Reiher August, 2014
KSK Rollover Update David Conrad, CTO ICANN 59 – GAC 29 June 2017.
State of DNSSEC deployment ISOC Advisory Council
Living on the Edge: (Re)focus DNS Efforts on the End-Points
Keyhub Identity and Access Management App is Powered by Azure and Offers Customers Easy Authentication, Authorization for Mobile Devices MICROSOFT AZURE.
A10 Networks vThunder Leverages the Powerful Microsoft Azure Cloud Platform to Offer Advanced Layer 4-7 Networking, Security on a Global Scale MICROSOFT.
Tallinn, Estonia Sep 2017 Why DNSSEC Tallinn, Estonia Sep 2017
DANE: The Future of Transport Layer Security (TLS)
TRA, UAE May 2017 DNSSEC Introduction TRA, UAE May 2017
Fed/ED December 2007 Jim Jokl University of Virginia
The Business Case for DNSSEC
Presentation transcript:

DNSSEC 101 IGF 2012, Baku, Azerbaijan 6 November 2012

The Business Case for DNSSEC Cyber security is becoming a greater concern to government, enterprises and end users. DNSSEC is a key tool and differentiator. DNSSEC is the biggest security upgrade to Internet infrastructure in over 20 years. DNSSEC is a critical tool in combating the global nature of cyber crime providing a cross-organizational and trans-national platform for innovative security solutions and authentication. DNSSEC infrastructure deployment has been brisk but requires expertise. Getting ahead of the curve is a competitive advantage.

Where DNSSEC fits in DNS converts names ( to numbers ( )..to identify services such as www and ..that identify and link customers to business and visa versa

Where DNSSEC fits in..but CPU and bandwidth advances make legacy DNS vulnerable to MITM attacks DNS Security Extensions (DNSSEC) introduces digital signatures into DNS to cryptographically protect contents from modification With DNSSEC fully deployed a entities can be sure the customer gets un-modified data (and visa versa)

The Original Problem: DNS Cache Poisoning Attack DNS Resolver = DNS Server Get page Attacker webserver Username / Password Error Attacker = Login page Password database ISP / ENTERPRISE / END NODE ENTERPRISE Animated slide in.ppt detailed description at:

DNS Resolver = DNS Server Get page Attacker webserver Username / Password Error Login page Password database Argghh! Now all ISP customers get sent to attacker. Animated slide in.ppt

The Bad: DNSChanger - ‘Biggest Cybercriminal Takedown in History’ – 4M machines, 100 countries, $14M Nov End-2-end DNSSEC validation would have avoided the problems

The Bad: Other DNS hijacks* 25 Dec Russian e-Payment Giant ChronoPay Hacked 18 Dec 2009 – Twitter – “Iranian cyber army” 13 Aug Chinese gmail phishing attack 25 Dec 2010 Tunisia DNS Hijack google.* – April Google Puerto Rico sites redirected in DNS attack – May Morocco temporarily seize Google domain name 9 Sep Diginotar certificate compromise for Iranian users SSL / TLS doesn't tell you if you've been sent to the correct site, it only tells you if the DNS matches the name in the certificate. Unfortunately, majority of Web site certificates rely on DNS to validate identity. DNS is relied on for unexpected things though insecure. *A Brief History of DNS Hijacking - Google

The Good: Securing DNS with DNSSEC DNS Resolver with DNSSEC = DNS Server with DNSSEC Get page webserver Username / Password Account Data Login page Attacker = Attacker’s record does not validate – drop it Animated slide in.ppt

The Good: Resolver only caches validated records DNS Resolver with DNSSEC = DNS Server with DNSSEC Get page webserver Username / Password Account Data Login page ENTERPRISEISP / ENTERPRISE / END NODE Animated slide in.ppt

DNSSEC interest from governments Sweden, Brazil, Czech Republic and others encourage DNSSEC deployment to varying degrees Mar AT&T, CenturyLink (Qwest), Comcast, Cox, Sprint, TimeWarner Cable, and Verizon have pledged to comply and abide by US FCC [1] recommendations that include DNSSEC.. “A report by Gartner found 3.6 million Americans getting redirected to bogus websites in a single year, costing them $3.2 billion.,” [2] US.gov mandate. ~70% operational. [3] [1] FCC=Federal Communications Commission=US communications Ministry [2] [3]

Deployed on 95/316 TLDs (.br,.cz,.co,.ua,.nl,.bg,.kg,.am,.lv,.ug,.mm,.mn,.de,.eu,.uk,.tt,.pl,.in,.lk,.com,.my مليسيا,.asia,.tw 台灣,.kr 한국,.jp,.fr,.post, …) Root signed** and audited New gTLDs require it >84% of domain names could have DNSSEC Growing ISP support* 3 rd party signing solutions: GoDaddy, Binero, VeriSign…*** Vendors support it: ISC/Bind, Microsoft, … New standards being developed on DNSSEC (e.g., IETF RFC6698 SSL Certificates) Growing interest from others major players… DNSSEC: Where we are *COMCAST Internet (18M), TeliaSonera SE, Sprint,Vodafone CZ,Telefonica CZ, T-mobile NL, SurfNet NL, SANYO Information Technology Solutions JP, others.. **21 TCRs from: TT, BF, RU, CN, US, SE, NL, UG, BR, Benin, PT, NP, Mauritius, CZ, CA, JP, UK, NZ *** Partial list of registrars:

The Bad: SSL Dilution of Trust The Good: DNSSEC = Global “free” PKI CA Certificate roots ~1482 Login security SSHFP RFC4255 DANE and other yet to be discovered security innovations, enhancements, and synergies Content security Commercial SSL Certificates for Web and Content security “Free SSL” certificates for Web and and “trust agility” Network security IPSECKEY RFC4025 Cross- organizational and trans-national identity and authentication security DKIM RFC4871 DNSSEC root - 1 Domain Names Securing VoIP

Opportunity: New Security Products Improved Web SSL and certificates for all* Secured (S/MIME) for all* Validated remote login SSH, IPSEC* Securing VoIP Cross organizational digital identity systems Secured content delivery (e.g. configurations, updates, keys) Securing Smart Grid efforts A global PKI Increasing trust in e-commerce A good ref *IETF standards complete or currently being developed RFC6698

VoIP mydomainname.com DNS is a part of all IT ecosystems US-NSTIC effort Smart Electrical Grid OECS ID effort

DNSSEC: Classic bottom-up, multi- stakeholder built Internet infrastructure upgrade to help address today’s needs and create tomorrow’s opportunity.

the root: A bottom- up, multi-stakeholder operation

Community driven Listened to calls from global community for deployment: – Internet community (e.g., RIPE, APNIC, ccNSO…) – Governments – Business (e.g., Kaminsky 2008, Press)

Deploying it Problem – Bureaucracy and Fear: Hard to change anything that has not changed since Many excuses not to. – root - An internationally agreed to single key – right – Trust me - I will manage the root key...uh huh.

Approach Eliminate excuses and lead by example – start at root Solution – Multi-stakeholder – get buy in up front – Bottom up – like the Internet itself – Transparency and Choice – Draw from existing secure practices and trusted models

DNSSEC at the root: result Deployed 15 July 2010 Completed in ~2years Biggest upgrade to the Internet’s core infrastructure in 20 years Set the stage for deployment in rest of hierarchy (e.g., top level domains, end user domains)

Cont… Got global buy in Direct stakeholder participation in key management – 21 Trusted Community Representatives made up of respected members of Internet community from 18 countries Currently: URUGUAY, BRAZIL, TRINIDAD AND TOBAGO, CANADA, BENIN, SWEDEN, NEPAL, NETHERLANDS, NEW ZEALAND, RUSSIAN FEDERATION, PORTUGAL, JAPAN, MAURITIUS, CHINA, BURKINA FASO,CZECH REPUBLIC, UNITED KINGDOM, USA

Cont…. Enabled DNSSEC deployment throughout hierarchy – need just one key to validate all Publish, broadcast everything. Pass 3 rd party annual SysTrust audit ICANN Secure Key Management Facilities in Culpepper, VA and El Segundo, CA. FIPS Level 4 crypto, GSA Class 5 safes, multiple tiers, biometrics, etc.

See root-dnssec at

Documentation - Root 91 Pages and tree of other documents! Root DPS

Summary DNSSEC multi stakeholder effort from start and at root is a concrete operational example of how successful the bottom-up multi-stakeholder approach can be.