SlideShare ist ein Scribd-Unternehmen logo
1 von 83
Downloaden Sie, um offline zu lesen
Signing the Root
                                    LACNOG
                                    Sao Paolo
                                   October 2010

                                   Mehmet Akcin




Thursday, September 23, 2010
AS SEEN IN ROOT

                   . IN DS 19036 8 2
                  49AAC11D7B6F6446702E54A
                  1607371607A1A41855200FD
                  2CE1CDDE32F24E8FB5

                               Since July 15, 2010
Thursday, September 23, 2010
How did we get here?



Thursday, September 23, 2010
Little bit of
                               DNSSEC History


Thursday, September 23, 2010
1997


                       RFC 2065 Domain Name System Security
                       Extensions




Thursday, September 23, 2010
1999
                •      RFC 2535 Domain Name System Security
                       Extensions
                •      Obsoletes RFC 2065
                •      DNSSEC appears to be complete
                •      BIND9 is being developed to implement
                       DNSSEC



Thursday, September 23, 2010
2000


                •      BIND 9.0.0 is released
                          ‣    First implementation of DNSSEC




Thursday, September 23, 2010
2001
                    • Key handling in RFC 2535 is causing
                           operational problems that will make
                           deployment impossible.
                    • The Delegation Signer resource record is
                           proposed to solve the problems. It only exists
                           in the parent zone, so introduces protocol
                           difficulty of it’s own.
                    • BIND9 doesn’t understand the new DS RR.
                    • It’s decided to rewrite RFC 2535 in 3 new
                           drafts.

Thursday, September 23, 2010
2003

                    • BIND9 snapshots appear that support what is
                           now known as DNSSEC-bis
                    • NLnet Labs SECREG shows that DNSSEC-bis
                           is ready for deployment




Thursday, September 23, 2010
2004


                    • BIND 9.3 and NSD 2 have support for
                           DNSSEC-bis




Thursday, September 23, 2010
2005
                    • The DNSSEC-bis RFCs are published
                          ‣ RFC 4033: DNS Security Introduction and Requirements
                          ‣ RFC 4034: Resource Records for the DNS Security
                               Extensions
                          ‣ RFC 4035: Protocol Modifications for the DNS Security

                    • .SE (Sweden) is the first signed ccTLD
                    • RIPE NCC begin signing their portion of the in-
                           addr.arpa tree


Thursday, September 23, 2010
2006


                    • ISC launches their Domain Lookaside Validation
                           Registry: dlv.isc.org
                    • .PR (Puerto Rico) is signed (I was there..)


Thursday, September 23, 2010
2007


                    • .BR (Brazil) is signed
                    • .BG (Bulgaria) is signed



Thursday, September 23, 2010
2008
                    • .CZ (Czech Republic) is signed
                    • RFC 5155: DNS SecurityExistence Hashed
                      Authenticated Denial of
                                               (DNSSEC)

                          ‣ New RR type: NSEC3
                          ‣ Solves zone enumeration
                          ‣ Opt-in allows incremental growth in delegation-
                               centric zones
                    • Dan Kaminsky discovers a new cache poisoning
                      vulnerability
                    • The US “Enhancing the Security and Stability of
                      entitled
                               DoC NTIA publish a Notice of Inquiry
                           the Internet’s Domain Name and Addressing
                           System”
Thursday, September 23, 2010
2009
                    • IANA launches the ITAR
                    • .GOV is signed
                          ‣ First major use of NSEC3
                    • .ORG is signed
                          ‣ The first gTLD to be signed
                    • ICANN and VeriSign announce a joint project
                           to sign the root


Thursday, September 23, 2010
Signing the Root



Thursday, September 23, 2010
The Project

                           A cooperation between ICANN & VeriSign
                             with support from the U.S. DoC NTIA




Thursday, September 23, 2010
Roles and
                               Responsibilities


Thursday, September 23, 2010
ICANN
                                    IANA Functions Operator


                    • Manages the Key Signing Key (KSK)
                    • Accepts DS records from TLD operators
                    • Verifies and processes request
                    • Sends update requests to DoC for
                           authorization and to VeriSign for
                           implementation



Thursday, September 23, 2010
DoC NTIA
                                   U.S. Department of Commerce
                    National Telecommunications and Information Administration


                    • Authorizes changes to the root zone
                          ‣ DS records
                          ‣ Key Signing Keys
                          ‣ DNSSEC update requests follow the same
                               process as other changes

                    • Checks that ICANN has followed their
                           agreed upon verification/processing policies
                           and procedures
Thursday, September 23, 2010
VeriSign
                                       Root Zone Maintainer



                    • Manages the Zone Signing Key (ZSK)
                    • Incorporates NTIA-authorized changes
                    • Signs the root zone with the ZSK
                    • Distributes the signed zone to the root server
                           operators



Thursday, September 23, 2010
Design



Thursday, September 23, 2010
The guiding principle
                 behind the design is that
                   the result must be
                       trustworthy

Thursday, September 23, 2010
Transparency
                                  Processes and procedures should
                               be as open as possible for the Internet
                                community to trust the signed root




Thursday, September 23, 2010
Audited
                                 Processes and procedures should
                               be audited against industry standards,
                                     e.g. ISO/IEC 27002:2005




Thursday, September 23, 2010
High Security
                       Root system should meet all NIST
                SP 800-53 technical security controls required by
                           a HIGH IMPACT system




Thursday, September 23, 2010
Community Involvement
                 Trusted representatives from the community are
                      invited to take an active role in the key
                                management process




Thursday, September 23, 2010
Approach to Protecting
                         the KSK


Thursday, September 23, 2010
Physical Security




Thursday, September 23, 2010
Physical Security




Thursday, September 23, 2010
Physical Security




                                   More photos on http://dns.icann.org

Thursday, September 23, 2010
Physical Security
                       Enforced Dual Occupancy
                          Separation of Duties
                          External Monitoring
                           Video Surveillance
                      Motion, Seismic other Sensors
                               ..and more


                                                      32

Thursday, September 23, 2010
ICANN Staff Roles
   Roles related KSK Ceremonies can be summarized as ;
Ceremony Administrator (CA) is the staff member who runs
                        the ceremony.
  Internal Witness (IW) is the ICANN staff witnessing and
        recording the ceremony and exceptions if any.
    System Administrator (SA) is technical staff members
                    responsible IT needs.
 Safe Security Controllers (SSC) are the ICANN staff who
                      operates the safe.


Thursday, September 23, 2010
Thursday, September 23, 2010
DPS
                                 DNSSEC Practice Statement

                    • States the practices and provisions that are
                           employed in root zone signing and zone
                           distribution services
                          ‣ Issuing, managing, changing and distributing DNS
                               keys in accordance with the specific requirements
                               of the U.S. DoC NTIA

                    • Comparable to a certification practice
                           statement (CPS) from an X.509 certification
                           authority (CA)
Thursday, September 23, 2010
Auditing & Transparency

                    • Third-party auditors check that ICANN
                           operates as described in the DPS
                    • Other external witness may also attend the
                           key ceremonies
                    • Working toward having a Systrust audit
                           performed later this year



Thursday, September 23, 2010
Trusted Community
                   Representatives (TCRs)
                    • Have an active roll in the management of the
                           KSK
                          ‣ as Crypto Officers needed to activate the KSK
                          ‣ as Recovery Key Share Holders protecting shares
                               of the symmetric key that encrypts the backup
                               copy of the KSK




Thursday, September 23, 2010
Crypto Officer (CO)

       • Have physical keys to safe deposit boxes holding
         smartcards that activate the HSM
       • ICANN cannot generate new key or sign ZSK without
         3-of-7 COs
       • Able to travel up to 4 times a year to US.




                                                             16

Thursday, September 23, 2010
Recovery Key Shareholder (RKSH)
       • Have smartcards holding pieces (M-of-N) of the key
         used to encrypt the KSK inside the HSM

       • If both key management facilities fall into the ocean, 5-
         of-7 RKSH smartcards and an encrypted KSK smartcard
         can reconstituted KSK in a new HSM

       • Backup KSK encrypted on smartcard held by ICANN

       • Able to travel on relatively short notice to US. Hopefully
         never. Annual inventory.                                 17

Thursday, September 23, 2010
CO              CO Backup                      RKSH
       Alain Aina, BJ              Christopher Griffiths, US   Bevil Wooding, TT
       Anne-Marie                  Fabian Arbogast, TZ        Dan Kaminsky, US
       	

 Eklund Löwinder, SE     John Curran, US            Jiankang Yao, CN
       Frederico Neves, BR         Nicolas Antoniello, UY     Moussa Guebre, BF
       Gaurab Upadhaya, NP         Rudolph Daniel, UK         Norm Ritchie, CA
       Olaf Kolkman, NL            Sarmad Hussain, PK         Ondřej Surý, CZ
       Robert Seastrom, US         Ólafur Guðmundsson, IS     Paul Kane, UK
       Vinton Cerf, US
       Andy Linton, NZ                                               BCK
       Carlos Martinez, UY                                    David Lawrence, US
       Dmitry Burkov, RU                                      Dileepa Lathsara, LK
       Edward Lewis, US                                       Jorge Etges, BR
       João Luis Silva Damas, PT                              Kristian Ørmen, DK
       Masato Minda, JP                                       Ralf Weber, DE
       Subramanian Moonesamy, MU                              Warren Kumari, US


                                                                                     18

Thursday, September 23, 2010
DNSSEC
                           Protocol Parameters


Thursday, September 23, 2010
Split keys
                    • The Zone Signing Key (ZSK) is used to sign
                           the zone
                    • The Key Signing Key (KSK) is used to sign the
                           ZSK
                    • This split is not required by the protocol, but
                           it enhances security by reducing access to
                           the key which forms the trust anchor while
                           reducing the importance of the key which
                           must be exercised often to sign the zone.

Thursday, September 23, 2010
Key Signing Key

                    • KSK is 2048-bit RSA
                          ‣ Rolled as required
                          ‣ RFC 5011 for automatic key rollovers
                    • Signatures made using SHA-256

Thursday, September 23, 2010
Zone Signing Key

                    • ZSK is 1024-bit RSA
                          ‣ Rolled once a quarter (four times per year)
                    • Zone signed with NSEC
                    • Signatures made using SHA-256

Thursday, September 23, 2010
Signature Validity

                • DNSKEY-covering RRSIG (by KSK) validity 15
                       days
                          ‣ new signatures published every 10 days
                • Other RRSIG (by ZSK) validity 7 days
                          ‣ zone generated and resigned twice per day



Thursday, September 23, 2010
Key Ceremonies

                    • Key Generation
                          ‣ Generation of new KSK
                    • Processing of ZSK Signing Request (KSR)
                          ‣ Signing ZSK for the next upcoming quarter
                          ‣ Every quarter



Thursday, September 23, 2010
Root Trust Anchor
                    • Published on a web site by ICANN as
                          ‣ XML-wrapped and plain DS record
                               • to facilitate automatic processing
                          ‣ PKCS #10 certificate signing request (CSR)
                               • as self-signed public key
                               • Allows third-party CAs to sign the KSK
                               • ICANN will sign the CSR producing a CERT
Thursday, September 23, 2010
Deployment



Thursday, September 23, 2010
Goals

                    • Deploy a signed root zone
                          ‣ Transparent processes
                          ‣ Audited procedures
                          ‣ Community involvement




Thursday, September 23, 2010
Staged Deployment



Thursday, September 23, 2010
Deploy Incrementally

                    • The goal was to leave the client population
                           with some root servers not offering large
                           responses until the impact of those large
                           responses is better understood
                    • Relies upon resolvers not always choosing a
                           single server



Thursday, September 23, 2010
DURZ
                    • Deploy conservatively
                          ‣ It is the root zone, after all
                    • Prevent a community of validators from
                           forming
                          ‣ This allows us to un-sign the root zone during the
                               deployment phase (if we have to) without
                               collateral damage



Thursday, September 23, 2010
DURZ
                    • “Deliberately Unvalidatable Root Zone”
                    • Sign RRSets with keys that are not published in
                           the zone (but with matching keytag…)
                    • Publish keys in the zone which are not used, and
                           which additionally contain advice for operators
                           (see next slide)
                    • Swap in actual signing keys (which enables
                           validation) at the end of the deployment process


Thursday, September 23, 2010
DURZ
                .       3600    IN     DNSKEY  257  3  5 (
                                       AwEAAa++++++++++++++++++++++++++++++
                                       ++THIS/KEY/AN/INVALID/KEY/AND/SHOULD
                                       /NOT/BE/USED/CONTACT/ROOTSIGN/AT/ICA
                                       NN/DOT/ORG/FOR/MORE/INFORMATION+++++
                                       ++++++++++++++++++++++++++++++++++++
                                       ++++++++++++++++++++++++++++++++++++
                                       ++++++++++++++++++++++++++++++++++++
                                       ++++++++++++++++++++++++++++++++++++
                                       ++++++++++++++++++++++++++++++++++++
                                       ++++++++++++++++++++++/=
                                       ) ; Key ID = 6477




Thursday, September 23, 2010
Testing

                    • A prerequisite for this plan was a captive test
                           of the deployment
                          ‣ Test widely-deployed resolvers, with validation
                               enabled and disabled, against the DURZ
                          ‣ Test with clients behind broken networks that
                               drop large responses




Thursday, September 23, 2010
Deploy Incrementally
                                 L         27 January
                                 A         10 February
                                M, I       March 3rd
                               D, K, E     March 22nd
                           B, H, C, G, F   April 12th
                                  J         May 5th




Thursday, September 23, 2010
Measurement

                    • Full packet captures and subsequent analysis
                           around signing events in addition to long
                           term collection of priming queries
                    • Dialogue with operator communities to
                           assess real-world impact of changes




Thursday, September 23, 2010
DURZ Data Analysis

                    • Looking at the data for indications of
                           problems
                          ‣ Query rates
                          ‣ TCP traffic
                          ‣ Message sizes
                          ‣ Priming queries


Thursday, September 23, 2010
Thursday, September 23, 2010
H	
  DURZ
                               C	
  DURZ




                               G	
  DURZ
                               B	
  DURZ

                               F	
  DURZ




Thursday, September 23, 2010
Thursday, September 23, 2010
Thursday, September 23, 2010
This	
  drop	
  is	
  
                                  due	
  to	
  
                                upgraded	
  
                                resolvers	
  
                                within	
  an	
  
                                ISP’s	
  /23.




Thursday, September 23, 2010
Thursday, September 23, 2010
Thursday, September 23, 2010
Summary


                    • No problems evident in the data
                    • No problems reported by users


Thursday, September 23, 2010
Communication



Thursday, September 23, 2010
Project Web Page

                    • http://www.root-dnssec.org
                          ‣ Status updates
                          ‣ Documents
                          ‣ Presentation Archive
                          ‣ Contact information



Thursday, September 23, 2010
Communication

                    • Reaching the technical audiences via mailing
                           lists and other means, such as showing up in
                           person to make presentations
                          ‣ IETF DNS lists (e.g. DNSOP)
                          ‣ non-IETF DNS lists (e.g. DNS-OARC)
                          ‣ General operator lists (e.g. NANOG)



Thursday, September 23, 2010
Milestones



Thursday, September 23, 2010
2009
                    • August
                          ‣ Project to sign the root formally announced
                    • October
                          ‣ The plan receives first public airing at RIPE 59
                    • December
                          ‣ http://www.root-dnssec.org site launched
                          ‣ First signed root zone created internally at
                               VeriSign



Thursday, September 23, 2010
2010
                    • January through May
                          ‣ Incremental roll-out of the DURZ to the root
                               servers

                    • June
                          ‣ First ceremony in Culpeper, Virginia
                               •   Created initial root zone KSK

                               •   Processed initial KSR for Q3/2010
                          ‣ First DS records added to the root zone


Thursday, September 23, 2010
Key	
  Ceremony	
  I




                                                      71

Thursday, September 23, 2010
2010
                    • July
                          ‣ Second ceremony in Los Angeles, California
                               •   Key material from the first ceremony replicated and
                                   stored

                               •   Q4/2010 KSR processed

                               •   Live streamed to the world.

                          ‣ The fully validatable signed root zone is
                               published to the root servers by VeriSign
                          ‣ The root zone trust anchor is published by

Thursday, September 23, 2010
Key	
  Ceremony
                           ParIcipants	
  and	
  ALendees




                                                            73

Thursday, September 23, 2010
Root DNSSEC Design Team
                                    Joe Abley
                                Mehmet Akcin
                                  David Blacka
                                 David Conrad
                                 Richard Lamb
                                  Matt Larson
                               Fredrik Ljunggren
                                  Dave Knight
                               Tomofumi Okubo
                                 Jakob Schlyter
                                Duane Wessels


Thursday, September 23, 2010
The root is signed!
                      DNSSEC is now part of standard operations




Thursday, September 23, 2010
ARPA
                •      ARPA is signed since March
                          ‣    Keys currently managed by Verisign, will
                               change to a joint model like the root
                •      E164.ARPA signed by RIPE NCC since 2007
                •      Other ARPA children, with the exception of IN-
                       ADDR.ARPA are signed by ICANN since April
                          ‣    Addition of DS records to ARPA in progress



Thursday, September 23, 2010
DS Submission

                •      TLD operators can submit DS records to the
                       IANA for inclusion in the root zone
                •      Instructions
                          ‣    http://www.iana.org/procedures/root-dnssec-
                               records.html




Thursday, September 23, 2010
Secured delegations
                           As of the start of this week the root zone
                           contains 34 secured delegations

                               be bg biz br
                               cat ch cz dk
                               edu eu info lk
                               museum na org
                               pm se tf pr
                                                ...and the 11 test IDN
                               tm uk us th      TLD zones


Thursday, September 23, 2010
Start your validators!


                •      The trust anchor is available at
                          ‣    https://www.iana.org/dnssec/




Thursday, September 23, 2010
Next KSK Ceremony
                •      The next ceremony will take place in Culpeper,
                       VA on 2010 November 1-2
                          ‣    Detailed schedule can be found at
                               •   http://dns.icann.org/ksk/ceremony/
                                   ceremony-3/
                               •   Watch the HD Live Stream at
                                   •   http://dns.icann.org/ksk/stream/



Thursday, September 23, 2010
Questions?
                               mehmet@icann.org




Thursday, September 23, 2010

Weitere ähnliche Inhalte

Andere mochten auch

The Sharing Economy: Uber and Airbnb – Can They Exist in a Regulated World? W...
The Sharing Economy: Uber and Airbnb – Can They Exist in a Regulated World? W...The Sharing Economy: Uber and Airbnb – Can They Exist in a Regulated World? W...
The Sharing Economy: Uber and Airbnb – Can They Exist in a Regulated World? W...Best Best and Krieger LLP
 
SMX East 2016 - Optimize Google Shopping 
with the help of Euclid
SMX East 2016 - Optimize Google Shopping 
with the help of EuclidSMX East 2016 - Optimize Google Shopping 
with the help of Euclid
SMX East 2016 - Optimize Google Shopping 
with the help of EuclidWhoop!
 

Andere mochten auch (6)

Multiple exposures
Multiple exposuresMultiple exposures
Multiple exposures
 
Disinfection Sterilization
Disinfection SterilizationDisinfection Sterilization
Disinfection Sterilization
 
Sbc4 photocaption psu
Sbc4 photocaption psuSbc4 photocaption psu
Sbc4 photocaption psu
 
The Sharing Economy: Uber and Airbnb – Can They Exist in a Regulated World? W...
The Sharing Economy: Uber and Airbnb – Can They Exist in a Regulated World? W...The Sharing Economy: Uber and Airbnb – Can They Exist in a Regulated World? W...
The Sharing Economy: Uber and Airbnb – Can They Exist in a Regulated World? W...
 
CURRICULUM VITAE EN
CURRICULUM VITAE ENCURRICULUM VITAE EN
CURRICULUM VITAE EN
 
SMX East 2016 - Optimize Google Shopping 
with the help of Euclid
SMX East 2016 - Optimize Google Shopping 
with the help of EuclidSMX East 2016 - Optimize Google Shopping 
with the help of Euclid
SMX East 2016 - Optimize Google Shopping 
with the help of Euclid
 

Ähnlich wie Dnssec root-lacnog

DNSSEC Deployment for .VN and share information of DNSSEC's plan in 2017
DNSSEC Deployment for .VN and share information of DNSSEC's plan in 2017DNSSEC Deployment for .VN and share information of DNSSEC's plan in 2017
DNSSEC Deployment for .VN and share information of DNSSEC's plan in 2017APNIC
 
MENOG6 Root Signing
MENOG6 Root SigningMENOG6 Root Signing
MENOG6 Root SigningMehmet Akcin
 
Rootsign menog6-overview
Rootsign menog6-overviewRootsign menog6-overview
Rootsign menog6-overviewMehmet Akcin
 
Rolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing KeyRolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing KeyAPNIC
 
FOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedFOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedNeustar, Inc.
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]APNIC
 
DNSSEC Deployment at ROOT Zone
DNSSEC Deployment at ROOT ZoneDNSSEC Deployment at ROOT Zone
DNSSEC Deployment at ROOT ZoneMehmet Akcin
 
DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallGlenn McKnight
 
F5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructureF5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructureDSorensenCPR
 
Dnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 EnDnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 EnErol Dizdar
 
Dnssec proposal-09oct08-en
Dnssec proposal-09oct08-enDnssec proposal-09oct08-en
Dnssec proposal-09oct08-enguest3131f85
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsAPNIC
 
Using PerfDHCP tool to scale DHCP in OpenStack Neutron
Using PerfDHCP tool to scale DHCP in OpenStack NeutronUsing PerfDHCP tool to scale DHCP in OpenStack Neutron
Using PerfDHCP tool to scale DHCP in OpenStack NeutronVikram G Hosakote
 
F5's Dynamic DNS Services
F5's Dynamic DNS ServicesF5's Dynamic DNS Services
F5's Dynamic DNS ServicesF5 Networks
 
DevOpsDays TLV 2019 - The Treacherous Road Towards Multi-DNS
DevOpsDays TLV 2019 - The Treacherous Road Towards Multi-DNSDevOpsDays TLV 2019 - The Treacherous Road Towards Multi-DNS
DevOpsDays TLV 2019 - The Treacherous Road Towards Multi-DNSDaniel Mittelman
 
WebRTC overview
WebRTC overviewWebRTC overview
WebRTC overviewRouyun Pan
 

Ähnlich wie Dnssec root-lacnog (20)

DNSSEC Deployment for .VN and share information of DNSSEC's plan in 2017
DNSSEC Deployment for .VN and share information of DNSSEC's plan in 2017DNSSEC Deployment for .VN and share information of DNSSEC's plan in 2017
DNSSEC Deployment for .VN and share information of DNSSEC's plan in 2017
 
MENOG6 Root Signing
MENOG6 Root SigningMENOG6 Root Signing
MENOG6 Root Signing
 
Rootsign menog6-overview
Rootsign menog6-overviewRootsign menog6-overview
Rootsign menog6-overview
 
Rolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing KeyRolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing Key
 
ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
 
8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 
FOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedFOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons Learned
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
 
DNSSEC Deployment at ROOT Zone
DNSSEC Deployment at ROOT ZoneDNSSEC Deployment at ROOT Zone
DNSSEC Deployment at ROOT Zone
 
DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael Casadevall
 
F5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructureF5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructure
 
Dnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 EnDnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 En
 
Dnssec proposal-09oct08-en
Dnssec proposal-09oct08-enDnssec proposal-09oct08-en
Dnssec proposal-09oct08-en
 
ION Toronto - Deploying DNSSEC: A .CA Case Study
ION Toronto - Deploying DNSSEC: A .CA Case StudyION Toronto - Deploying DNSSEC: A .CA Case Study
ION Toronto - Deploying DNSSEC: A .CA Case Study
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutions
 
Using PerfDHCP tool to scale DHCP in OpenStack Neutron
Using PerfDHCP tool to scale DHCP in OpenStack NeutronUsing PerfDHCP tool to scale DHCP in OpenStack Neutron
Using PerfDHCP tool to scale DHCP in OpenStack Neutron
 
ION Sri Lanka - DNSSEC at LK Domain Registry
ION Sri Lanka - DNSSEC at LK Domain RegistryION Sri Lanka - DNSSEC at LK Domain Registry
ION Sri Lanka - DNSSEC at LK Domain Registry
 
F5's Dynamic DNS Services
F5's Dynamic DNS ServicesF5's Dynamic DNS Services
F5's Dynamic DNS Services
 
DevOpsDays TLV 2019 - The Treacherous Road Towards Multi-DNS
DevOpsDays TLV 2019 - The Treacherous Road Towards Multi-DNSDevOpsDays TLV 2019 - The Treacherous Road Towards Multi-DNS
DevOpsDays TLV 2019 - The Treacherous Road Towards Multi-DNS
 
WebRTC overview
WebRTC overviewWebRTC overview
WebRTC overview
 

Dnssec root-lacnog

  • 1. Signing the Root LACNOG Sao Paolo October 2010 Mehmet Akcin Thursday, September 23, 2010
  • 2. AS SEEN IN ROOT . IN DS 19036 8 2 49AAC11D7B6F6446702E54A 1607371607A1A41855200FD 2CE1CDDE32F24E8FB5 Since July 15, 2010 Thursday, September 23, 2010
  • 3. How did we get here? Thursday, September 23, 2010
  • 4. Little bit of DNSSEC History Thursday, September 23, 2010
  • 5. 1997 RFC 2065 Domain Name System Security Extensions Thursday, September 23, 2010
  • 6. 1999 • RFC 2535 Domain Name System Security Extensions • Obsoletes RFC 2065 • DNSSEC appears to be complete • BIND9 is being developed to implement DNSSEC Thursday, September 23, 2010
  • 7. 2000 • BIND 9.0.0 is released ‣ First implementation of DNSSEC Thursday, September 23, 2010
  • 8. 2001 • Key handling in RFC 2535 is causing operational problems that will make deployment impossible. • The Delegation Signer resource record is proposed to solve the problems. It only exists in the parent zone, so introduces protocol difficulty of it’s own. • BIND9 doesn’t understand the new DS RR. • It’s decided to rewrite RFC 2535 in 3 new drafts. Thursday, September 23, 2010
  • 9. 2003 • BIND9 snapshots appear that support what is now known as DNSSEC-bis • NLnet Labs SECREG shows that DNSSEC-bis is ready for deployment Thursday, September 23, 2010
  • 10. 2004 • BIND 9.3 and NSD 2 have support for DNSSEC-bis Thursday, September 23, 2010
  • 11. 2005 • The DNSSEC-bis RFCs are published ‣ RFC 4033: DNS Security Introduction and Requirements ‣ RFC 4034: Resource Records for the DNS Security Extensions ‣ RFC 4035: Protocol Modifications for the DNS Security • .SE (Sweden) is the first signed ccTLD • RIPE NCC begin signing their portion of the in- addr.arpa tree Thursday, September 23, 2010
  • 12. 2006 • ISC launches their Domain Lookaside Validation Registry: dlv.isc.org • .PR (Puerto Rico) is signed (I was there..) Thursday, September 23, 2010
  • 13. 2007 • .BR (Brazil) is signed • .BG (Bulgaria) is signed Thursday, September 23, 2010
  • 14. 2008 • .CZ (Czech Republic) is signed • RFC 5155: DNS SecurityExistence Hashed Authenticated Denial of (DNSSEC) ‣ New RR type: NSEC3 ‣ Solves zone enumeration ‣ Opt-in allows incremental growth in delegation- centric zones • Dan Kaminsky discovers a new cache poisoning vulnerability • The US “Enhancing the Security and Stability of entitled DoC NTIA publish a Notice of Inquiry the Internet’s Domain Name and Addressing System” Thursday, September 23, 2010
  • 15. 2009 • IANA launches the ITAR • .GOV is signed ‣ First major use of NSEC3 • .ORG is signed ‣ The first gTLD to be signed • ICANN and VeriSign announce a joint project to sign the root Thursday, September 23, 2010
  • 16. Signing the Root Thursday, September 23, 2010
  • 17. The Project A cooperation between ICANN & VeriSign with support from the U.S. DoC NTIA Thursday, September 23, 2010
  • 18. Roles and Responsibilities Thursday, September 23, 2010
  • 19. ICANN IANA Functions Operator • Manages the Key Signing Key (KSK) • Accepts DS records from TLD operators • Verifies and processes request • Sends update requests to DoC for authorization and to VeriSign for implementation Thursday, September 23, 2010
  • 20. DoC NTIA U.S. Department of Commerce National Telecommunications and Information Administration • Authorizes changes to the root zone ‣ DS records ‣ Key Signing Keys ‣ DNSSEC update requests follow the same process as other changes • Checks that ICANN has followed their agreed upon verification/processing policies and procedures Thursday, September 23, 2010
  • 21. VeriSign Root Zone Maintainer • Manages the Zone Signing Key (ZSK) • Incorporates NTIA-authorized changes • Signs the root zone with the ZSK • Distributes the signed zone to the root server operators Thursday, September 23, 2010
  • 23. The guiding principle behind the design is that the result must be trustworthy Thursday, September 23, 2010
  • 24. Transparency Processes and procedures should be as open as possible for the Internet community to trust the signed root Thursday, September 23, 2010
  • 25. Audited Processes and procedures should be audited against industry standards, e.g. ISO/IEC 27002:2005 Thursday, September 23, 2010
  • 26. High Security Root system should meet all NIST SP 800-53 technical security controls required by a HIGH IMPACT system Thursday, September 23, 2010
  • 27. Community Involvement Trusted representatives from the community are invited to take an active role in the key management process Thursday, September 23, 2010
  • 28. Approach to Protecting the KSK Thursday, September 23, 2010
  • 31. Physical Security More photos on http://dns.icann.org Thursday, September 23, 2010
  • 32. Physical Security Enforced Dual Occupancy Separation of Duties External Monitoring Video Surveillance Motion, Seismic other Sensors ..and more 32 Thursday, September 23, 2010
  • 33. ICANN Staff Roles Roles related KSK Ceremonies can be summarized as ; Ceremony Administrator (CA) is the staff member who runs the ceremony. Internal Witness (IW) is the ICANN staff witnessing and recording the ceremony and exceptions if any. System Administrator (SA) is technical staff members responsible IT needs. Safe Security Controllers (SSC) are the ICANN staff who operates the safe. Thursday, September 23, 2010
  • 35. DPS DNSSEC Practice Statement • States the practices and provisions that are employed in root zone signing and zone distribution services ‣ Issuing, managing, changing and distributing DNS keys in accordance with the specific requirements of the U.S. DoC NTIA • Comparable to a certification practice statement (CPS) from an X.509 certification authority (CA) Thursday, September 23, 2010
  • 36. Auditing & Transparency • Third-party auditors check that ICANN operates as described in the DPS • Other external witness may also attend the key ceremonies • Working toward having a Systrust audit performed later this year Thursday, September 23, 2010
  • 37. Trusted Community Representatives (TCRs) • Have an active roll in the management of the KSK ‣ as Crypto Officers needed to activate the KSK ‣ as Recovery Key Share Holders protecting shares of the symmetric key that encrypts the backup copy of the KSK Thursday, September 23, 2010
  • 38. Crypto Officer (CO) • Have physical keys to safe deposit boxes holding smartcards that activate the HSM • ICANN cannot generate new key or sign ZSK without 3-of-7 COs • Able to travel up to 4 times a year to US. 16 Thursday, September 23, 2010
  • 39. Recovery Key Shareholder (RKSH) • Have smartcards holding pieces (M-of-N) of the key used to encrypt the KSK inside the HSM • If both key management facilities fall into the ocean, 5- of-7 RKSH smartcards and an encrypted KSK smartcard can reconstituted KSK in a new HSM • Backup KSK encrypted on smartcard held by ICANN • Able to travel on relatively short notice to US. Hopefully never. Annual inventory. 17 Thursday, September 23, 2010
  • 40. CO CO Backup RKSH Alain Aina, BJ Christopher Griffiths, US Bevil Wooding, TT Anne-Marie Fabian Arbogast, TZ Dan Kaminsky, US Eklund Löwinder, SE John Curran, US Jiankang Yao, CN Frederico Neves, BR Nicolas Antoniello, UY Moussa Guebre, BF Gaurab Upadhaya, NP Rudolph Daniel, UK Norm Ritchie, CA Olaf Kolkman, NL Sarmad Hussain, PK Ondřej Surý, CZ Robert Seastrom, US Ólafur Guðmundsson, IS Paul Kane, UK Vinton Cerf, US Andy Linton, NZ BCK Carlos Martinez, UY David Lawrence, US Dmitry Burkov, RU Dileepa Lathsara, LK Edward Lewis, US Jorge Etges, BR João Luis Silva Damas, PT Kristian Ørmen, DK Masato Minda, JP Ralf Weber, DE Subramanian Moonesamy, MU Warren Kumari, US 18 Thursday, September 23, 2010
  • 41. DNSSEC Protocol Parameters Thursday, September 23, 2010
  • 42. Split keys • The Zone Signing Key (ZSK) is used to sign the zone • The Key Signing Key (KSK) is used to sign the ZSK • This split is not required by the protocol, but it enhances security by reducing access to the key which forms the trust anchor while reducing the importance of the key which must be exercised often to sign the zone. Thursday, September 23, 2010
  • 43. Key Signing Key • KSK is 2048-bit RSA ‣ Rolled as required ‣ RFC 5011 for automatic key rollovers • Signatures made using SHA-256 Thursday, September 23, 2010
  • 44. Zone Signing Key • ZSK is 1024-bit RSA ‣ Rolled once a quarter (four times per year) • Zone signed with NSEC • Signatures made using SHA-256 Thursday, September 23, 2010
  • 45. Signature Validity • DNSKEY-covering RRSIG (by KSK) validity 15 days ‣ new signatures published every 10 days • Other RRSIG (by ZSK) validity 7 days ‣ zone generated and resigned twice per day Thursday, September 23, 2010
  • 46. Key Ceremonies • Key Generation ‣ Generation of new KSK • Processing of ZSK Signing Request (KSR) ‣ Signing ZSK for the next upcoming quarter ‣ Every quarter Thursday, September 23, 2010
  • 47. Root Trust Anchor • Published on a web site by ICANN as ‣ XML-wrapped and plain DS record • to facilitate automatic processing ‣ PKCS #10 certificate signing request (CSR) • as self-signed public key • Allows third-party CAs to sign the KSK • ICANN will sign the CSR producing a CERT Thursday, September 23, 2010
  • 49. Goals • Deploy a signed root zone ‣ Transparent processes ‣ Audited procedures ‣ Community involvement Thursday, September 23, 2010
  • 51. Deploy Incrementally • The goal was to leave the client population with some root servers not offering large responses until the impact of those large responses is better understood • Relies upon resolvers not always choosing a single server Thursday, September 23, 2010
  • 52. DURZ • Deploy conservatively ‣ It is the root zone, after all • Prevent a community of validators from forming ‣ This allows us to un-sign the root zone during the deployment phase (if we have to) without collateral damage Thursday, September 23, 2010
  • 53. DURZ • “Deliberately Unvalidatable Root Zone” • Sign RRSets with keys that are not published in the zone (but with matching keytag…) • Publish keys in the zone which are not used, and which additionally contain advice for operators (see next slide) • Swap in actual signing keys (which enables validation) at the end of the deployment process Thursday, September 23, 2010
  • 54. DURZ .       3600    IN     DNSKEY  257  3  5 (                        AwEAAa++++++++++++++++++++++++++++++                        ++THIS/KEY/AN/INVALID/KEY/AND/SHOULD                        /NOT/BE/USED/CONTACT/ROOTSIGN/AT/ICA                        NN/DOT/ORG/FOR/MORE/INFORMATION+++++                        ++++++++++++++++++++++++++++++++++++                        ++++++++++++++++++++++++++++++++++++                        ++++++++++++++++++++++++++++++++++++                        ++++++++++++++++++++++++++++++++++++                        ++++++++++++++++++++++++++++++++++++                        ++++++++++++++++++++++/=                        ) ; Key ID = 6477 Thursday, September 23, 2010
  • 55. Testing • A prerequisite for this plan was a captive test of the deployment ‣ Test widely-deployed resolvers, with validation enabled and disabled, against the DURZ ‣ Test with clients behind broken networks that drop large responses Thursday, September 23, 2010
  • 56. Deploy Incrementally L 27 January A 10 February M, I March 3rd D, K, E March 22nd B, H, C, G, F April 12th J May 5th Thursday, September 23, 2010
  • 57. Measurement • Full packet captures and subsequent analysis around signing events in addition to long term collection of priming queries • Dialogue with operator communities to assess real-world impact of changes Thursday, September 23, 2010
  • 58. DURZ Data Analysis • Looking at the data for indications of problems ‣ Query rates ‣ TCP traffic ‣ Message sizes ‣ Priming queries Thursday, September 23, 2010
  • 60. H  DURZ C  DURZ G  DURZ B  DURZ F  DURZ Thursday, September 23, 2010
  • 63. This  drop  is   due  to   upgraded   resolvers   within  an   ISP’s  /23. Thursday, September 23, 2010
  • 66. Summary • No problems evident in the data • No problems reported by users Thursday, September 23, 2010
  • 68. Project Web Page • http://www.root-dnssec.org ‣ Status updates ‣ Documents ‣ Presentation Archive ‣ Contact information Thursday, September 23, 2010
  • 69. Communication • Reaching the technical audiences via mailing lists and other means, such as showing up in person to make presentations ‣ IETF DNS lists (e.g. DNSOP) ‣ non-IETF DNS lists (e.g. DNS-OARC) ‣ General operator lists (e.g. NANOG) Thursday, September 23, 2010
  • 71. 2009 • August ‣ Project to sign the root formally announced • October ‣ The plan receives first public airing at RIPE 59 • December ‣ http://www.root-dnssec.org site launched ‣ First signed root zone created internally at VeriSign Thursday, September 23, 2010
  • 72. 2010 • January through May ‣ Incremental roll-out of the DURZ to the root servers • June ‣ First ceremony in Culpeper, Virginia • Created initial root zone KSK • Processed initial KSR for Q3/2010 ‣ First DS records added to the root zone Thursday, September 23, 2010
  • 73. Key  Ceremony  I 71 Thursday, September 23, 2010
  • 74. 2010 • July ‣ Second ceremony in Los Angeles, California • Key material from the first ceremony replicated and stored • Q4/2010 KSR processed • Live streamed to the world. ‣ The fully validatable signed root zone is published to the root servers by VeriSign ‣ The root zone trust anchor is published by Thursday, September 23, 2010
  • 75. Key  Ceremony ParIcipants  and  ALendees 73 Thursday, September 23, 2010
  • 76. Root DNSSEC Design Team Joe Abley Mehmet Akcin David Blacka David Conrad Richard Lamb Matt Larson Fredrik Ljunggren Dave Knight Tomofumi Okubo Jakob Schlyter Duane Wessels Thursday, September 23, 2010
  • 77. The root is signed! DNSSEC is now part of standard operations Thursday, September 23, 2010
  • 78. ARPA • ARPA is signed since March ‣ Keys currently managed by Verisign, will change to a joint model like the root • E164.ARPA signed by RIPE NCC since 2007 • Other ARPA children, with the exception of IN- ADDR.ARPA are signed by ICANN since April ‣ Addition of DS records to ARPA in progress Thursday, September 23, 2010
  • 79. DS Submission • TLD operators can submit DS records to the IANA for inclusion in the root zone • Instructions ‣ http://www.iana.org/procedures/root-dnssec- records.html Thursday, September 23, 2010
  • 80. Secured delegations As of the start of this week the root zone contains 34 secured delegations be bg biz br cat ch cz dk edu eu info lk museum na org pm se tf pr ...and the 11 test IDN tm uk us th TLD zones Thursday, September 23, 2010
  • 81. Start your validators! • The trust anchor is available at ‣ https://www.iana.org/dnssec/ Thursday, September 23, 2010
  • 82. Next KSK Ceremony • The next ceremony will take place in Culpeper, VA on 2010 November 1-2 ‣ Detailed schedule can be found at • http://dns.icann.org/ksk/ceremony/ ceremony-3/ • Watch the HD Live Stream at • http://dns.icann.org/ksk/stream/ Thursday, September 23, 2010
  • 83. Questions? mehmet@icann.org Thursday, September 23, 2010