Presentation is loading. Please wait.

Presentation is loading. Please wait.

DNSSec.TLD is signed! What next? V.Dolmatov November 2011.

Similar presentations


Presentation on theme: "DNSSec.TLD is signed! What next? V.Dolmatov November 2011."— Presentation transcript:

1 DNSSec.TLD is signed! What next? V.Dolmatov November 2011

2 Topics DNSSec now (Nov.2011) Cryptography in DNSSec DNSSec caveats and pitfalls

3 DNSSec at glance (managerial view) 15 years of development (!) Finally, root zone is signed and deployed Some (84 of 310 ) TLDs are signed Some (78 of 84) of signed TLDs are linked with the root by DS-records Some (few!) registrars are DNSSEC- aware, more to come

4 DNS at glance (Technical view) NS A, MX, etc. Root -..tld.domain.tld.TLD Registry Root operator.TLD Registrar DNS administrator Domain administrator User DNS caching resolver named.r oot

5 DNSSec at glance (Technical view) DNSKEY RRSIG DS DNSKEY RRSIG DS DNSKEY RRSIG Root -..tld.domain.tld.TLD Registry Root operator.TLD Registrar DNS administrator Domain administrator User DNS caching resolver Trust anchor

6 Cryptic cryptos Cryptography is a sensitive field Cryptography has a lot of specifics Cryptography is monitored and controlled by governments There are different specific laws and rules in different countries which should be followed simultaneously

7 GOST cryptography ГОСТ 28147-89, ГОСТ Р 34.10-2001, ГОСТ Р 34.11-94 (open and proved to be reliable and stable) RFCs 5830, 5831, 5832 Open and not limited usage in the world Certified implementations should be used for public services and/or personal data handling in Russia

8 GOST in DNSSEC RFC 5933 – Standard Track RRSIG algorithm code – 12 DS algorithm code – 3 Fully featured DNSSEC set of GOST algorithms

9 GOST implementation OpenSSL 1.0.0a and later (implemented by Cryptocom) Unbound 1.4.6 – included by default Bind 9.8.0 – included by default

10 DNSSEC with GOST in the wild. (root is RSA signed) TLD.org (is RSA signed) dnssec-with-gost.org (is GOST signed) gost.dnssec-with-gost.org (is GOST signed) rsa.dnssec-with-gost.org (is RSA signed)

11 RSA-GOST chain – OK!

12 RSA-GOST-RSA chain – OK!

13 How to switch it on? Unbound 1.4.6 + ldns – ready now! bind 9.8.0 - ready now! Cryptography Open version – OpenSSL 1.0.0a Certified version – “MagPro DNS” by Cryptocom OpenDNSSEC (support moved to 2.x version)

14 DNSSEC in Russia All main DNSSEC services are GOST- capable Certified GOST DNSSEC is also available Waiting for DNSSEC GOST-capable support in.RU,.SU and.РФ TLDs Usage in other TLDs is not restricted

15 DNSSec Caveats and pitfalls Wrong feeling of «security» («using cryptography makes everything secure») Generating keys and switching DNSSec «on» in given zone does NOT mean automatic increase in the security of this zone Signing TLD zone and linking it to the root does NOT mean «DNSSec implementation» in this zone DNSSec demands a LOT of changes in DNS operations and procedures in TLD

16 DNSSec at glance (Operational view) DNSKEY RRSIG DS DNSKEY RRSIG DS DNSKEY RRSIG Root -..tld.domain.tld.TLD Registry Root operator.TLD Registrar DNS administrator Domain administrator User DNS caching resolver Trust anchor

17 DNSSec Caveats and pitfalls (Cont.) Wrong feeling of «authenticity» («using DNSSec makes everything authentic») DNSSec was designed to solve particular DNS operation problems Signed DNS-record does NOT add any trust to the resource it points to (Hello, JANE, EFF and other «initiatives» ) Huge problems with random data sources

18 Questions? v.dolmatov@hostcomm.ru


Download ppt "DNSSec.TLD is signed! What next? V.Dolmatov November 2011."

Similar presentations


Ads by Google