SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Driving the Future
                                          Business case for IPV6 & DNSSEC

                                                                 - shailesh.gupta@tatacommunications.com




© Copyright 2012 Tata Communications Ltd. All rights reserved.
Criteria for successful Business Case

There are different views about what makes a successful business. Typically success
should be judged by the ability to meet objectives. Using this definition, success criteria
would include :
                       ü  High levels of Sales
                       ü  High levels of Profits
                       ü  High levels of Consumer Satisfaction
                       ü  Production of high quality products
                       ü  Strong reputation
                       ü  Sustained growth




Businesses are able to establish targets in relation to each of the aspects of the bottom
line e.g. increasing profit by x %, gaining employee satisfaction of y%, and minimizing
their environmental impact. The success of businesses can then be judged in terms of
their ability to meet important targets and creating a cycle of stakeholder satisfaction.
Successful businesses take a long term rather than a short term view of success.
Attaining success involves meeting objectives for a range of desirable outcomes, which
create a cycle of stakeholder satisfaction.
  © Copyright 2012 Tata Communications Ltd. All rights reserved.
IPv4 Address Report (Generated at 07-Oct-2012 08:00 UTC)
IANA Unallocated Address Pool Exhaustion: 03-Feb-2011

Projected RIR Address Pool Exhaustion Dates:
RIR Projected Exhaustion Date Remaining Addresses in RIR Pool (/8s)
         Ø  APNIC: 19-Apr-2011 (actual) 0.9091
         Ø  RIPE NCC: 14-Sep-2012 (actual) 0.9847
         Ø  ARIN: 21-Aug-2013 3.1782
         Ø  LACNIC: 31-May-2015 3.1733
         Ø  AFRINIC: 05-Nov-2019 4.1093




 © Copyright 2012 Tata Communications Ltd. All rights reserved.
APNIC Survey in 2009 wrt IPV6 adoption




* Source – APNIC Survey report

 © Copyright 2012 Tata Communications Ltd. All rights reserved.
Policy decisions taken by Governments

ü    2008 US federal agencies IPv6 compliant
ü    2010 25% of EU traffic to be over IPv6
ü    2011 JP Govt target to have all JP ISPs over IPv6
ü    2012 AU Govt networks over IPv6

“National IPv6 Deployment Roadmap” was released by the Government of India in July
2010 :

ü  All major Service providers (having at least 10,000 internet customers or STM-1
    bandwidth) will target to handle IPv6 traffic and offer IPv6 services by December-2011

ü  All central and State government ministries and departments, including its PSUs,
    shall start using IPv6 services by March-2012

ü  Formation of the IPv6 Task Force with one Oversight Committee, one Steering
    Committee and 10 working groups.




  © Copyright 2012 Tata Communications Ltd. All rights reserved.
IPV6 - Indian context


Only 18.5 million IPv4 addresses for a population of 1.2 billion in India.

• But the requirement for IP addresses will keep increasing with new services, new
networks, new applications.

• Telecommunications will be largest consumer of IP addresses in coming years
(Broadband, 3G, NGN, 4G, LTE etc.).

• IPv4 is a diminishing resource and is very costly @ USD 10 per IPV4 compared to
IPv6 (almost free) right now and will be more costlier with passage of time.


Its not only about benefits from IPV6 but loosing the opportunities by not adopting it.

IPv6 is the only solution !




 © Copyright 2012 Tata Communications Ltd. All rights reserved.
Data flow through the DNS Where are the vulnerable points?	

                        DNS Known Threats (RFC 3833)     	

                        ü  Packet Interception - man-in-the-middle attacks
                        ü  ID Guessing and Query Prediction
                        ü  Name Chaining - Cache Poisoning
                        ü  Betrayal By Trusted Server
                        ü  Denial of Service
                        ü  Wildcards                Server vulnarability
Registrars	

& Registrants	



                                                                                Secondary	

                                                          Man in the Middle        DNS	

                         	

                         	

                                                                   primary	

                                                                     DNS	



                                                                                         	

                                                                                         	

                       Registry	

                                                                 spoofing
                                                                                                        &
                                                                                 Secondary	

   Man in the Middle
                                                                                    DNS	



  © Copyright 2012 Tata Communications Ltd. All rights reserved.
DNS Hierarchy
                                                                    Root “.”



                 .gov                               .com
                                                                         .org        .in              TLDs (250)
                                                                                             .net

 nist.gov                dhs.gov                             abc.com xyz.org                           Enterprise
                                                                                test.in    myname.net Level Domain

There are 13 name servers associated with the root level; they are called root servers.
Two of the root servers are currently run by the U.S private-sector corporation VeriSign;
the rest are operated by other organizations around the world as a service to the Internet
community. The organizations that run name servers associated with a TLD are called
registries. Generally, ccTLDs are run by designated registries in the respective countries,
and gTLDs are run by global registries. For example, VeriSign currently manages the
name servers for the .com and .net TLDs, a nonprofit entity called Public Internet Registry
(PIR) manages the name servers for the .org TLD, and another nonprofit organization
called EDUCAUSE manages the name servers for the .edu TLD.



  © Copyright 2012 Tata Communications Ltd. All rights reserved.                                                    8
Securing DNS

Before security objectives can be determined, the building blocks of the DNS need to be
specified. DNS includes the following entities:
         ü  DNS hosting environment
                  Host platform (O/S, file system, communication stack)
                  DNS software (name server, resolver)
                  DNS data (zone file, configuration file)
         ü  DNS transactions
                  DNS query/response
                  Zone transfers
                  Dynamic updates
                  DNS NOTIFY
         ü  Security administration
                  Choice of algorithms and key sizes (TSIG and DNSSEC)
                  Key management (generation, storage, and usage)
                  Public key publishing and setting up trust anchors
                  Key rollovers (scheduled and emergency)

ü    Install a DNSSEC capable name server implementation.
ü    Check zone file(s) for any possible integrity errors.
ü    Generate asymmetric key pair for each zone and include them in the zone file.
ü    Sign the zone. Load the signed zone onto the server
ü    Configure name server to turn on DNSSEC processing.
      © Copyright 2012 Tata Communications Ltd. All rights reserved.                  9
DNSSEC

DNSSEC provides message authentication and integrity verification through
cryptographic signatures. Before a DNSSEC signed zone can be deployed, a name
server must be configured to enable DNSSEC processing. In BIND, it is done by adding
the following line to the options statement in the named configuration file (named.conf).
                                                                                                                                              DNSSEC features
options {                                                                                                                                        * End-to-end data integrity check.
dnssec-enable yes;                                                                                                                               * DNS data origin authentication.
};                                                                                                                                               * Authenticated denial of existence.
After restart, the name server will now
perform DNSSEC processing for DNS Query/response transactions.
                                                                                 Digital	
  Signature	
  Algorithms,	
  Min.	
  Key	
  Sizes,	
  and	
  Crypto	
  Periods	
  
                        Key	
  Type	
  	
                                   Digital	
  Signature	
  Algorithm	
  Suite	
  	
                         Key	
  Size	
  	
   Crypto	
  Period	
  (Rollover	
  Period)	
  	
  
                        Key-­‐Signing	
  Key	
  (KSK)	
  	
                 RSA-­‐SHA1	
  (RSA-­‐SHA-­‐256)	
  unGl	
  2015	
  	
                    2048	
  bits	
  	
   12-­‐24	
  months	
  (1-­‐2	
  years)	
  	
  
                        Zone-­‐Signing	
  Key	
  (ZSK)	
  	
                RSA-­‐SHA1	
  (RSA-­‐SHA-­‐256)	
  unGl	
  2015	
  	
                    1024	
  bits	
  	
   1-­‐3	
  months	
  (30-­‐90	
  days)	
  

                                                                                            DNS	
  TransacGon	
  Threats	
  and	
  Security	
  ObjecGves	
  
DNS	
  Transac+on	
  	
                       Threats	
  	
                                                                    Security	
  Objec+ves	
  	
                                         IETF	
  Security	
  	
  
                                              (a)	
  Forged	
  or	
  bogus	
  response	
  	
                                   (a)	
  Data	
  origin	
  authen+ca+on	
  	
  
DNS	
  Query/Response	
  	
                   (b)	
  Removal	
  of	
  records	
  (RRs)	
  in	
  responses	
  	
                (b)	
  Data	
  integrity	
  verifica+on	
  	
                        DNSSEC	
  	
  
                                              (c)	
  Incorrect	
  applica+on	
  of	
  wildcard	
  expansion	
  rules	
  	
  
Zone	
  Transfer	
  	
                        (a)	
  Denial	
  of	
  service	
  	
                                             (a)	
  Mutual	
  authen+ca+on	
  	
                                 TSIG	
  	
  
                                              (b)	
  Tampering	
  of	
  messages	
  	
                                         (b)	
  Data	
  integrity	
  verifica+on	
  	
  
                                              (a)	
  Unauthorized	
  Updates	
  	
                                             (a)	
  Mutual	
  authen+ca+on	
  	
  
Dynamic	
  Update	
  	
                       (b)	
  Tampering	
  of	
  messages	
  	
                                         (b)	
  Data	
  integrity	
  verifica+on	
  	
                        TSIG,	
  GSS-­‐TSIG	
  or	
  SIG(0)	
  	
  
                                              (c)	
  Replay	
  aNack	
  	
                                                     (c)	
  Signed	
  +mestamps	
  	
  
                                              (a)	
  Spurious	
  no+fica+ons	
  	
                                              (a)	
  To	
  prevent	
  denial	
  of	
  service	
  through	
        Specify	
  hosts	
  from	
  which	
  this	
  	
  
DNS	
  NOTIFY	
  	
  
                                                                                                                               	
  increase	
  in	
  workload	
  	
                                message	
  can	
  be	
  received	
  TSIG	
  or	
  SIG(0)	
  	
  


    © Copyright 2012 Tata Communications Ltd. All rights reserved.                                                                                                                                                                                            10
Business case for DNSSEC

Making a business case for DNSSEC is not easy in comparison to IPV6.
DNSSEC is important - securing the DNS is a good thing - Is this enough ?

Reducing the effort…

• This means bring down the cost of implementing DNSSEC
         – Research & Share
         – Simplify
         – Automate
         – Reduce risk

Examples :

• Registrars – Toolkits
• Registrants – One click DNSSEC
• ISPs – Simple DNSSEC resolvers
• End Users – Build it into software and turn on by default




  © Copyright 2012 Tata Communications Ltd. All rights reserved.            11
Business case for DNSSEC


Make DNSSEC a requirement :

      – Contractual obligation
      – Government mandate like IPV6
      – ICANN

Potential reason for deploying DNSSEC :

      - Increased Security
      – Really will only work if visible to end users
      – Think green-bar in a browser
      – Requires education

Secure DNS as an enabler

      -DNS is now 100% trust worthy, what can we do with that?
      -If what I can do is worthy, I will NEED DNSSEC



 © Copyright 2012 Tata Communications Ltd. All rights reserved.   12
Business Benefits & Motivation for DNSSEC roles
Early adopters lead the pack
Cost drivers
    Ø  Infrastructure cost
    Ø  Strategic positioning

Registry (Responsible for tech operation of TLDs, manage registration within TLD)
ü     Become a reliable Trust Anchor
ü     Lead by example and stimulate parties further down in the chain to adopt DNSSEC
ü     Earn recognition in the DNS community

Zone operator (Responsible for tech operation of DNS zones & domain names)
ü  Provide assurance to clients that domain name services are reliable and trustworthy
ü     Look forward to increasing adoption rate when revenue is an important driver.
ü     Deploying DNSSEC can be profitable

Registrar (Accredited by ICANN to manage the reservation of domains as per policy)
ü     Differentiator and competitive advantage versus others

Recursive Resolver Operator (ISPs)
ü  Assure end-users on DNS reliability and trustworthiness
ü     Offering differentiator and competitive advantage
  © Copyright 2012 Tata Communications Ltd. All rights reserved.                       13
Thank You




© Copyright 2012 Tata Communications Ltd. All rights reserved.               14
                                                                             14

Weitere ähnliche Inhalte

Was ist angesagt?

A Gentle Introduction to OpenSplice DDS
A Gentle Introduction to OpenSplice DDSA Gentle Introduction to OpenSplice DDS
A Gentle Introduction to OpenSplice DDSAngelo Corsaro
 
Root zone update for TLD Managers
Root zone update for TLD ManagersRoot zone update for TLD Managers
Root zone update for TLD Managerskimdavies
 
Advanced OpenSplice Programming - Part II
Advanced OpenSplice Programming - Part IIAdvanced OpenSplice Programming - Part II
Advanced OpenSplice Programming - Part IIAngelo Corsaro
 
Tweeting with OpenSplice DDS
Tweeting with OpenSplice DDSTweeting with OpenSplice DDS
Tweeting with OpenSplice DDSAngelo Corsaro
 
Getting Started in DDS with C++ and Java
Getting Started in DDS with C++ and JavaGetting Started in DDS with C++ and Java
Getting Started in DDS with C++ and JavaAngelo Corsaro
 
Name Collision Mitigation Update from ICANN 49
Name Collision Mitigation Update from ICANN 49Name Collision Mitigation Update from ICANN 49
Name Collision Mitigation Update from ICANN 49ICANN
 
Tuning and Troubleshooting OpenSplice DDS Applications
Tuning and Troubleshooting OpenSplice DDS ApplicationsTuning and Troubleshooting OpenSplice DDS Applications
Tuning and Troubleshooting OpenSplice DDS ApplicationsAngelo Corsaro
 
Building Linux IPv6 DNS Server (Draft Copy)
Building Linux IPv6 DNS Server (Draft Copy)Building Linux IPv6 DNS Server (Draft Copy)
Building Linux IPv6 DNS Server (Draft Copy)Hari
 
The DDS Tutorial - Part I
The DDS Tutorial - Part IThe DDS Tutorial - Part I
The DDS Tutorial - Part IAngelo Corsaro
 
Hadoop Distributed File System Reliability and Durability at Facebook
Hadoop Distributed File System Reliability and Durability at FacebookHadoop Distributed File System Reliability and Durability at Facebook
Hadoop Distributed File System Reliability and Durability at FacebookDataWorks Summit
 
Caspa Preservabl Infrastructure Luigi Briguglio
Caspa  Preservabl  Infrastructure Luigi BriguglioCaspa  Preservabl  Infrastructure Luigi Briguglio
Caspa Preservabl Infrastructure Luigi BriguglioDigitalPreservationEurope
 

Was ist angesagt? (16)

A Gentle Introduction to OpenSplice DDS
A Gentle Introduction to OpenSplice DDSA Gentle Introduction to OpenSplice DDS
A Gentle Introduction to OpenSplice DDS
 
Root zone update for TLD Managers
Root zone update for TLD ManagersRoot zone update for TLD Managers
Root zone update for TLD Managers
 
Advanced OpenSplice Programming - Part II
Advanced OpenSplice Programming - Part IIAdvanced OpenSplice Programming - Part II
Advanced OpenSplice Programming - Part II
 
UML Profile for DDS
UML Profile for DDSUML Profile for DDS
UML Profile for DDS
 
Tweeting with OpenSplice DDS
Tweeting with OpenSplice DDSTweeting with OpenSplice DDS
Tweeting with OpenSplice DDS
 
Getting Started in DDS with C++ and Java
Getting Started in DDS with C++ and JavaGetting Started in DDS with C++ and Java
Getting Started in DDS with C++ and Java
 
Name Collision Mitigation Update from ICANN 49
Name Collision Mitigation Update from ICANN 49Name Collision Mitigation Update from ICANN 49
Name Collision Mitigation Update from ICANN 49
 
Tuning and Troubleshooting OpenSplice DDS Applications
Tuning and Troubleshooting OpenSplice DDS ApplicationsTuning and Troubleshooting OpenSplice DDS Applications
Tuning and Troubleshooting OpenSplice DDS Applications
 
Ps Data Center Dal
Ps Data Center DalPs Data Center Dal
Ps Data Center Dal
 
Building Linux IPv6 DNS Server (Draft Copy)
Building Linux IPv6 DNS Server (Draft Copy)Building Linux IPv6 DNS Server (Draft Copy)
Building Linux IPv6 DNS Server (Draft Copy)
 
Tandberg Data - Data Protection Solutions Guide
Tandberg Data  - Data Protection Solutions GuideTandberg Data  - Data Protection Solutions Guide
Tandberg Data - Data Protection Solutions Guide
 
Ps Data Center Wdc
Ps Data Center WdcPs Data Center Wdc
Ps Data Center Wdc
 
The DDS Tutorial - Part I
The DDS Tutorial - Part IThe DDS Tutorial - Part I
The DDS Tutorial - Part I
 
Hadoop Distributed File System Reliability and Durability at Facebook
Hadoop Distributed File System Reliability and Durability at FacebookHadoop Distributed File System Reliability and Durability at Facebook
Hadoop Distributed File System Reliability and Durability at Facebook
 
Hadoop Inside
Hadoop InsideHadoop Inside
Hadoop Inside
 
Caspa Preservabl Infrastructure Luigi Briguglio
Caspa  Preservabl  Infrastructure Luigi BriguglioCaspa  Preservabl  Infrastructure Luigi Briguglio
Caspa Preservabl Infrastructure Luigi Briguglio
 

Ähnlich wie ION Mumbai - Shailesh Gupta: Business Case for IPv6 and DNSSEC

DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksDNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksFindWhitePapers
 
DNSSEC: What a Registrar Needs to Know
DNSSEC:  What a Registrar Needs to KnowDNSSEC:  What a Registrar Needs to Know
DNSSEC: What a Registrar Needs to Knowlaurenrprice
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name SystemWhoisXML API
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]APNIC
 
What Is DNS ?
What Is DNS ?What Is DNS ?
What Is DNS ?GTCSYS
 
DNS Made Easy Sales Brochure
DNS Made Easy Sales BrochureDNS Made Easy Sales Brochure
DNS Made Easy Sales BrochureDNS Made Easy
 
FOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedFOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedNeustar, Inc.
 
F5's Dynamic DNS Services
F5's Dynamic DNS ServicesF5's Dynamic DNS Services
F5's Dynamic DNS ServicesF5 Networks
 
Windows most important server questions for l1 level
Windows  most important server questions for l1 levelWindows  most important server questions for l1 level
Windows most important server questions for l1 levelIICT Chromepet
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS ScalePeter Silva
 

Ähnlich wie ION Mumbai - Shailesh Gupta: Business Case for IPv6 and DNSSEC (20)

DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksDNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
 
DNSSEC: What a Registrar Needs to Know
DNSSEC:  What a Registrar Needs to KnowDNSSEC:  What a Registrar Needs to Know
DNSSEC: What a Registrar Needs to Know
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
 
DNS Security
DNS SecurityDNS Security
DNS Security
 
Is DNS a Part of Your Cyber Security Strategy?
Is DNS a Part of Your Cyber Security Strategy? Is DNS a Part of Your Cyber Security Strategy?
Is DNS a Part of Your Cyber Security Strategy?
 
ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?
 
Domain Name System (DNS)
Domain Name System (DNS)Domain Name System (DNS)
Domain Name System (DNS)
 
DNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & AfiliasDNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & Afilias
 
What Is DNS ?
What Is DNS ?What Is DNS ?
What Is DNS ?
 
DNS Made Easy Sales Brochure
DNS Made Easy Sales BrochureDNS Made Easy Sales Brochure
DNS Made Easy Sales Brochure
 
8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 
PACE-IT: Intro to the DNS Service - N10 006
PACE-IT: Intro to the DNS Service - N10 006 PACE-IT: Intro to the DNS Service - N10 006
PACE-IT: Intro to the DNS Service - N10 006
 
ION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSECION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSEC
 
FOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedFOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons Learned
 
F5's Dynamic DNS Services
F5's Dynamic DNS ServicesF5's Dynamic DNS Services
F5's Dynamic DNS Services
 
Windows most important server questions for l1 level
Windows  most important server questions for l1 levelWindows  most important server questions for l1 level
Windows most important server questions for l1 level
 
ION Toronto - Why Implement DNSSEC?
ION Toronto - Why Implement DNSSEC? ION Toronto - Why Implement DNSSEC?
ION Toronto - Why Implement DNSSEC?
 
DNS Attacks
DNS AttacksDNS Attacks
DNS Attacks
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
 

Mehr von Deploy360 Programme (Internet Society)

Mehr von Deploy360 Programme (Internet Society) (20)

ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success StoriesION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
 
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter PresentationION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
 
ION Belgrade - IETF Update
ION Belgrade - IETF UpdateION Belgrade - IETF Update
ION Belgrade - IETF Update
 
ION Belgrade - Opening Slides
ION Belgrade - Opening SlidesION Belgrade - Opening Slides
ION Belgrade - Opening Slides
 
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
 
ION Belgrade - Closing Slides
ION Belgrade - Closing SlidesION Belgrade - Closing Slides
ION Belgrade - Closing Slides
 
AusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRSAusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRS
 
ION Malta - IETF Update
ION Malta - IETF UpdateION Malta - IETF Update
ION Malta - IETF Update
 
ION Malta - MANRS Introduction
ION Malta - MANRS IntroductionION Malta - MANRS Introduction
ION Malta - MANRS Introduction
 
ION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSECION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSEC
 
ION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLSION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLS
 
ION Malta - IANA Transition Roles & Accountability
ION Malta - IANA Transition Roles & AccountabilityION Malta - IANA Transition Roles & Accountability
ION Malta - IANA Transition Roles & Accountability
 
ION Malta - IPv6 Case Study: Finland
ION Malta - IPv6 Case Study: FinlandION Malta - IPv6 Case Study: Finland
ION Malta - IPv6 Case Study: Finland
 
ION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 TransitionION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 Transition
 
ION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for youION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for you
 
ION Malta - Opening Slides
ION Malta - Opening SlidesION Malta - Opening Slides
ION Malta - Opening Slides
 
ION Malta - Closing Slides
ION Malta - Closing SlidesION Malta - Closing Slides
ION Malta - Closing Slides
 
ION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internetION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internet
 
ION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng ChapterION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng Chapter
 
ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

ION Mumbai - Shailesh Gupta: Business Case for IPv6 and DNSSEC

  • 1. Driving the Future Business case for IPV6 & DNSSEC - shailesh.gupta@tatacommunications.com © Copyright 2012 Tata Communications Ltd. All rights reserved.
  • 2. Criteria for successful Business Case There are different views about what makes a successful business. Typically success should be judged by the ability to meet objectives. Using this definition, success criteria would include : ü  High levels of Sales ü  High levels of Profits ü  High levels of Consumer Satisfaction ü  Production of high quality products ü  Strong reputation ü  Sustained growth Businesses are able to establish targets in relation to each of the aspects of the bottom line e.g. increasing profit by x %, gaining employee satisfaction of y%, and minimizing their environmental impact. The success of businesses can then be judged in terms of their ability to meet important targets and creating a cycle of stakeholder satisfaction. Successful businesses take a long term rather than a short term view of success. Attaining success involves meeting objectives for a range of desirable outcomes, which create a cycle of stakeholder satisfaction. © Copyright 2012 Tata Communications Ltd. All rights reserved.
  • 3. IPv4 Address Report (Generated at 07-Oct-2012 08:00 UTC) IANA Unallocated Address Pool Exhaustion: 03-Feb-2011 Projected RIR Address Pool Exhaustion Dates: RIR Projected Exhaustion Date Remaining Addresses in RIR Pool (/8s) Ø  APNIC: 19-Apr-2011 (actual) 0.9091 Ø  RIPE NCC: 14-Sep-2012 (actual) 0.9847 Ø  ARIN: 21-Aug-2013 3.1782 Ø  LACNIC: 31-May-2015 3.1733 Ø  AFRINIC: 05-Nov-2019 4.1093 © Copyright 2012 Tata Communications Ltd. All rights reserved.
  • 4. APNIC Survey in 2009 wrt IPV6 adoption * Source – APNIC Survey report © Copyright 2012 Tata Communications Ltd. All rights reserved.
  • 5. Policy decisions taken by Governments ü  2008 US federal agencies IPv6 compliant ü  2010 25% of EU traffic to be over IPv6 ü  2011 JP Govt target to have all JP ISPs over IPv6 ü  2012 AU Govt networks over IPv6 “National IPv6 Deployment Roadmap” was released by the Government of India in July 2010 : ü  All major Service providers (having at least 10,000 internet customers or STM-1 bandwidth) will target to handle IPv6 traffic and offer IPv6 services by December-2011 ü  All central and State government ministries and departments, including its PSUs, shall start using IPv6 services by March-2012 ü  Formation of the IPv6 Task Force with one Oversight Committee, one Steering Committee and 10 working groups. © Copyright 2012 Tata Communications Ltd. All rights reserved.
  • 6. IPV6 - Indian context Only 18.5 million IPv4 addresses for a population of 1.2 billion in India. • But the requirement for IP addresses will keep increasing with new services, new networks, new applications. • Telecommunications will be largest consumer of IP addresses in coming years (Broadband, 3G, NGN, 4G, LTE etc.). • IPv4 is a diminishing resource and is very costly @ USD 10 per IPV4 compared to IPv6 (almost free) right now and will be more costlier with passage of time. Its not only about benefits from IPV6 but loosing the opportunities by not adopting it. IPv6 is the only solution ! © Copyright 2012 Tata Communications Ltd. All rights reserved.
  • 7. Data flow through the DNS Where are the vulnerable points? DNS Known Threats (RFC 3833) ü  Packet Interception - man-in-the-middle attacks ü  ID Guessing and Query Prediction ü  Name Chaining - Cache Poisoning ü  Betrayal By Trusted Server ü  Denial of Service ü  Wildcards Server vulnarability Registrars & Registrants Secondary Man in the Middle DNS primary DNS Registry spoofing & Secondary Man in the Middle DNS © Copyright 2012 Tata Communications Ltd. All rights reserved.
  • 8. DNS Hierarchy Root “.” .gov .com .org .in TLDs (250) .net nist.gov dhs.gov abc.com xyz.org Enterprise test.in myname.net Level Domain There are 13 name servers associated with the root level; they are called root servers. Two of the root servers are currently run by the U.S private-sector corporation VeriSign; the rest are operated by other organizations around the world as a service to the Internet community. The organizations that run name servers associated with a TLD are called registries. Generally, ccTLDs are run by designated registries in the respective countries, and gTLDs are run by global registries. For example, VeriSign currently manages the name servers for the .com and .net TLDs, a nonprofit entity called Public Internet Registry (PIR) manages the name servers for the .org TLD, and another nonprofit organization called EDUCAUSE manages the name servers for the .edu TLD. © Copyright 2012 Tata Communications Ltd. All rights reserved. 8
  • 9. Securing DNS Before security objectives can be determined, the building blocks of the DNS need to be specified. DNS includes the following entities: ü  DNS hosting environment Host platform (O/S, file system, communication stack) DNS software (name server, resolver) DNS data (zone file, configuration file) ü  DNS transactions DNS query/response Zone transfers Dynamic updates DNS NOTIFY ü  Security administration Choice of algorithms and key sizes (TSIG and DNSSEC) Key management (generation, storage, and usage) Public key publishing and setting up trust anchors Key rollovers (scheduled and emergency) ü  Install a DNSSEC capable name server implementation. ü  Check zone file(s) for any possible integrity errors. ü  Generate asymmetric key pair for each zone and include them in the zone file. ü  Sign the zone. Load the signed zone onto the server ü  Configure name server to turn on DNSSEC processing. © Copyright 2012 Tata Communications Ltd. All rights reserved. 9
  • 10. DNSSEC DNSSEC provides message authentication and integrity verification through cryptographic signatures. Before a DNSSEC signed zone can be deployed, a name server must be configured to enable DNSSEC processing. In BIND, it is done by adding the following line to the options statement in the named configuration file (named.conf). DNSSEC features options { * End-to-end data integrity check. dnssec-enable yes; * DNS data origin authentication. }; * Authenticated denial of existence. After restart, the name server will now perform DNSSEC processing for DNS Query/response transactions. Digital  Signature  Algorithms,  Min.  Key  Sizes,  and  Crypto  Periods   Key  Type     Digital  Signature  Algorithm  Suite     Key  Size     Crypto  Period  (Rollover  Period)     Key-­‐Signing  Key  (KSK)     RSA-­‐SHA1  (RSA-­‐SHA-­‐256)  unGl  2015     2048  bits     12-­‐24  months  (1-­‐2  years)     Zone-­‐Signing  Key  (ZSK)     RSA-­‐SHA1  (RSA-­‐SHA-­‐256)  unGl  2015     1024  bits     1-­‐3  months  (30-­‐90  days)   DNS  TransacGon  Threats  and  Security  ObjecGves   DNS  Transac+on     Threats     Security  Objec+ves     IETF  Security     (a)  Forged  or  bogus  response     (a)  Data  origin  authen+ca+on     DNS  Query/Response     (b)  Removal  of  records  (RRs)  in  responses     (b)  Data  integrity  verifica+on     DNSSEC     (c)  Incorrect  applica+on  of  wildcard  expansion  rules     Zone  Transfer     (a)  Denial  of  service     (a)  Mutual  authen+ca+on     TSIG     (b)  Tampering  of  messages     (b)  Data  integrity  verifica+on     (a)  Unauthorized  Updates     (a)  Mutual  authen+ca+on     Dynamic  Update     (b)  Tampering  of  messages     (b)  Data  integrity  verifica+on     TSIG,  GSS-­‐TSIG  or  SIG(0)     (c)  Replay  aNack     (c)  Signed  +mestamps     (a)  Spurious  no+fica+ons     (a)  To  prevent  denial  of  service  through   Specify  hosts  from  which  this     DNS  NOTIFY      increase  in  workload     message  can  be  received  TSIG  or  SIG(0)     © Copyright 2012 Tata Communications Ltd. All rights reserved. 10
  • 11. Business case for DNSSEC Making a business case for DNSSEC is not easy in comparison to IPV6. DNSSEC is important - securing the DNS is a good thing - Is this enough ? Reducing the effort… • This means bring down the cost of implementing DNSSEC – Research & Share – Simplify – Automate – Reduce risk Examples : • Registrars – Toolkits • Registrants – One click DNSSEC • ISPs – Simple DNSSEC resolvers • End Users – Build it into software and turn on by default © Copyright 2012 Tata Communications Ltd. All rights reserved. 11
  • 12. Business case for DNSSEC Make DNSSEC a requirement : – Contractual obligation – Government mandate like IPV6 – ICANN Potential reason for deploying DNSSEC : - Increased Security – Really will only work if visible to end users – Think green-bar in a browser – Requires education Secure DNS as an enabler -DNS is now 100% trust worthy, what can we do with that? -If what I can do is worthy, I will NEED DNSSEC © Copyright 2012 Tata Communications Ltd. All rights reserved. 12
  • 13. Business Benefits & Motivation for DNSSEC roles Early adopters lead the pack Cost drivers Ø  Infrastructure cost Ø  Strategic positioning Registry (Responsible for tech operation of TLDs, manage registration within TLD) ü  Become a reliable Trust Anchor ü  Lead by example and stimulate parties further down in the chain to adopt DNSSEC ü  Earn recognition in the DNS community Zone operator (Responsible for tech operation of DNS zones & domain names) ü  Provide assurance to clients that domain name services are reliable and trustworthy ü  Look forward to increasing adoption rate when revenue is an important driver. ü  Deploying DNSSEC can be profitable Registrar (Accredited by ICANN to manage the reservation of domains as per policy) ü  Differentiator and competitive advantage versus others Recursive Resolver Operator (ISPs) ü  Assure end-users on DNS reliability and trustworthiness ü  Offering differentiator and competitive advantage © Copyright 2012 Tata Communications Ltd. All rights reserved. 13
  • 14. Thank You © Copyright 2012 Tata Communications Ltd. All rights reserved. 14 14