SlideShare ist ein Scribd-Unternehmen logo
1 von 71
Downloaden Sie, um offline zu lesen
Understanding and Deploying DNSSEC
Champika Wijayatunga | APRICOT2015 – Fukuoka – Japan | Feb 2015
| 2
Acknowledgements
•  Rick Lamb
–  Sr. Program Manager DNSSEC - ICANN
•  Mauricio Vergara
–  DNS Operations Manager – ICANN
•  APNIC
•  NSRC
2
| 3
Background Why DNSSEC? How it Works?
Signatures and
Key Rollovers
Propagation of
Trust
DNSSEC Demo
1 2 3
4 5 6
Agenda
Background
4
| 5
DNS in a Nutshell
•  DNS is a distributed database
•  Types of DNS servers
–  DNS Authoritative
•  Master
•  Slaves
–  DNS Resolver
•  Recursive
•  Cache
•  Stub resolver
5
lamb@xtcn.co
m
+1-202-709-5262
VoIP
mydomainname.co
DNS is a part of all IT ecosystems
US-NSTIC effort
Smart Electrical Grid
OECS ID effort
| 7
Client Resolver
(ISP)
www.example.net. ? www.example.net. ?
a.server.net.
1.2.3.4
DNS Resolution
7
10.1.2.3
.net
nameserver
a.server.net.

1.2.3.4"
Root
Server
l.root-servers.net."
199.7.83.42

2001:500:3::42"
example.net
nameserver
ns.example.net.

5.6.7.8"
Why DNSSEC?
8
| 9
DNS Data Flow
9
STUB
Resolver
caching
resolver
(recursive)
MASTER
SLAVES
SLAVES
zone
file
(text, DB)
dynamic
updates
man in the
middle
cache
poisoning
modified
data
spoofing
master
(routing/DoS)
spoofed
updates
corrupted
data
DATAATTACK
VECTORS
| 10
The Bad
•  DNSChanger*
–  Biggest Cybercriminal Takedown in History
–  4M machines, 100 countries, $14M
•  And many other DNS hijacks in recent times**
•  SSL / TLS doesn't tell you if you've been sent to the correct site, it
only tells you if the DNS matches the name in the certificate.
Unfortunately, majority of Web site certificates rely on DNS to
validate identity.
•  DNS is relied on for unexpected things though insecure.
* http://www.fbi.gov/news/stories/2011/november/malware_110911/malware_110911
End-2-end DNSSEC validation would have avoided the problems
** A Brief History of DNS Hijacking - Google
http://costarica43.icann.org/meetings/sanjose2012/presentation-dns-hijackings-marquis-boire-12mar12-en.pdf
| 11
Where DNSSEC fits in
•  CPU and bandwidth advances make legacy
DNS vulnerable to MITM attacks
•  DNS Security Extensions (DNSSEC) introduces
digital signatures into DNS to cryptographically
protect contents
•  With DNSSEC fully deployed a business can be
sure a customer gets un-modified data (and visa
versa)
| 12
The Internet’s Phone Book - Domain Name System
www.majorbank.jp=?
Get page
webserver
www @
1.2.3.4
Username / Password
Account Data
DNS Hierarchy
jp com
root
majorbank.jp
www.majorbank.jp
DNS
Resolver
www.majorbank.jp = 1.2.3.4
DNS
Server1.2.3.4
Login page
ISP Majorbank (Registrant)
| 13
Caching Responses for Efficiency
www.majorbank.jp=?
Get page
webserver
www @
1.2.3.4
Username / Password
Account Data
DNS
Resolver
www.majorbank.jp = 1.2.3.4
DNS
Server1.2.3.4
Login page
| 14
The Problem: DNS Cache Poisoning Attack
www.majorbank.jp=? DNS
Resolver
www.majorbank.jp = 1.2.3.4
DNS
Server5.6.7.8
Get page Attacker
webserver
www @
5.6.7.8
Username / Password
Error
Attacker
www.majorbank.jp = 5.6.7.8
Login page
Password database
| 15
Now all ISP customers get sent to attacker…
www.majorbank.jp=? DNS
Resolver
www.majorbank.jp = 1.2.3.4
DNS
Server5.6.7.8
Get page Attacker
webserver
www @
5.6.7.8
Username / Password
Error
Login page
Password database
| 16
Securing The Phone Book - DNS Security Extensions (DNSSEC)
www.majorbank.jp=? DNS
Resolver
with
DNSSEC
www.majorbank.jp = 1.2.3.4
DNS
Server with
DNSSEC
1.2.3.4
Get page
webserver
www @
1.2.3.4
Username / Password
Account Data
Login page
Attacker
www.majorbank.jp = 5.6.7.8
Attacker’s record does not
validate – drop it
| 17
Resolver only caches validated records
www.majorbank.jp=? DNS
Resolver
with
DNSSEC
www.majorbank.jp = 1.2.3.4
DNS
Server with
DNSSEC
1.2.3.4
Get page
webserver
www @
1.2.3.4
Username / Password
Account Data
Login page
| 18
What DNSSEC solves and what’s not
STUB
Resolver
caching
resolver
(recursive)
MASTER
SLAVES
SLAVES
zone
file
(text, DB)
dynamic
updates
man in the
middle
cache
poisoning
modified
data
spoofing
master
(routing/DoS)
spoofed
updates
corrupted
data
DATAATTACK
VECTORS
DNSSEC scope
| 19
Brief reminder on Cryptography
•  Nowadays most of our Security Services
are based in one (or a combination) of the
following areas:
–  One-way hash functions
–  Symmetric key crypto
–  Public-key crypto (or asymmetric)
19
How DNSSEC Works?
20
| 21
Client Resolver
(ISP)
www.example.net. ? www.example.net. ?
a.server.net.
How DNSSEC Works
21
10.1.2.3
.net
nameserver
Root
Server
example.net
nameserver
| 22
How DNSSEC Works
•  Data authenticity and integrity by signing the Resource
Records Sets with a private key
•  Public DNSKEYs published, used to verify the RRSIGs
•  Children sign their zones with their private key
–  Authenticity of that key established by parent signing hash (DS) of
the child zone's key
•  Repeat for parent…
•  Not that difficult on paper
–  Operationally, it is a bit more complicated
–  DSKEY → KEY –signs→ zone data
22
| 23
The Business Case for DNSSEC
•  Cyber security is becoming a greater concern to
enterprises, government, and end users. DNSSEC is a
key tool and differentiator.
•  DNSSEC is the biggest security upgrade to Internet
infrastructure in over 20 years. It is a platform for new
security applications (for those that see the opportunity).
•  DNSSEC infrastructure deployment has been brisk but
requires expertise. Getting ahead of the curve is a
competitive advantage.
| 24
DNSSEC ccTLD Map
https://rick.eng.br/dnssecstat/
| 25
DNSSEC TLDs
https://rick.eng.br/dnssecstat/
| 26
Domains with DS records
https://rick.eng.br/dnssecstat/
| 27
DNSSEC delegations in some ccTLD zones
https://rick.eng.br/dnssecstat/
| 28
DNSSEC - Where we are
•  Deployed on 630/808 TLDs (29 Jan 2015
78% .com .hr .es .in .af .ee .lb .bg .tm .cz .nl .uk .de .jp .cn .ru .
рф .my ‫ﻣﻠﻴﺴﻴﺎ‬ .asia .tw 台灣, .kr 한국 .net, .org, .post, +gtlds)
•  Root signed** and audited
•  > 86% of domain names could have DNSSEC
•  Required in new gTLDs. Basic support by ICANN registrars
•  Growing ISP support*.
•  3rd party signing solutions***
•  Growing S/W H/W support: NLNetLabs, ISC, Microsoft,
PowerDNS, Secure64…openssl, postfix, XMPP, mozilla: early
DANE support
•  IETF standard on DNSSEC SSL certificates (RFC6698)
•  Growing support from major players…(Apple iPhone/iPad,
Google 8.8.8.8,…)
**Int’l bottom-up trust model /w 21 TCRs from: TT, BF, RU, CN, US, SE, NL, UG, BR, Benin, PT, NP, Mauritius, CZ, CA, JP, UK, NZ…
*** Partial list of registrars: https://www.icann.org/en/news/in-focus/dnssec/deployment
* COMCAST /w 20M and others; most ISPs in SE ,CZ. AND ~12% of resolvers validate using DNSSEC
| 29
But…
•  DNSSEC Validation for World is ~ 11.47%
•  Many 2nd level domains have plans. Some have taken
the step (e.g., yandex.com, paypal.com*, comcast.com).
•  DNSChanger and other attacks highlight today’s need.
(e.g end-2-end DNSSEC validation would have avoided the
problems)
•  Innovative security solutions (e.g., DANE) highlight
tomorrow’s value.
http://stats.labs.apnic.net/dnssec/XA?c=XA&x=1&g=1&r=1&w=7&g=0
http://www.thesecuritypractice.com/the_security_practice/2011/12/all-paypal-domains-are-now-using-dnssec.html
| 30
DNSSEC: So what’s the problem?
•  Not enough IT departments know about it or are too busy
putting out other security fires.
•  When they do look into it they hear old stories of FUD
and lack of turnkey solutions.
•  Registrars*/DNS providers see no demand leading to
“chicken-and-egg” problems.
*but required by new ICANN registrar agreement
| 31
What you can do
•  For Companies:
–  Sign your corporate domain names
–  Just turn on validation on corporate DNS resolvers
•  For Users:
–  Ask ISP to turn on validation on their DNS resolvers
•  For All:
–  Take advantage of DNSSEC education and training
“More has happened here today than meets the
eye. An infrastructure has been created for a
hierarchical security system, which can be purposed
and re‐purposed in a number of different ways. ..” –
Vint Cerf (June 2010)
Game changing Internet Core
Infrastructure Upgrade
| 33
Too many CAs. Which one can we trust?
CA Certificate roots ~1500
Login security
SSHFP
RFC4255
DANE and other yet to be
discovered security
innovations,
enhancements, and
synergies
Content security
Commercial SSL
Certificates for
Web and e-mail
Content security
“Free SSL”
certificates for Web
and e-mail and
“trust agility”
Network security
IPSECKEY
RFC4025
Cross-
organizational
and trans-
national identity
and
authentication
E-mail security
DKIM RFC4871
DNSSEC root - 1
Domain
Names
Securing VoIP
https://www.eff.org/observatory
DNSSEC: Internet infrastructure
upgrade to help address today’s needs
and create tomorrow’s opportunity.
Hmm…how do I trust it?
| 36
ICANN DNSSEC Deployment @Root
•  Multi-stakeholder, bottom-up trust model* /w 21 crypto
officers from around the world
•  Broadcast Key Ceremonies and public docs
Root DPS
DNSSEC Practice Statement *Managed by technical community+ICANN
Photos: Kim Davies
Photos: Kim Davies
New concepts
40
| 41
New Concepts
•  Secure Entry Point and Chain of Trust
–  Delegating Signing Authority
•  New packet options (flags)
–  CD, AD, DO
•  New RRs
–  DNSKEY, RRSIG, NSEC/NSEC3 and DS
•  Signature expiration
•  Key Rollovers
41
| 42
Chain of Trust and Secure Entry Point
•  Using the existing delegation based model of distribution
•  Don’t sign the entire zone, sign a RRset
•  Parent DOES NOT sign the child zone. The parent signs a pointer
(hash) to the key used to sign the data of the child zone (DS record)
•  Example with www.myzone.net.!
42
“.”"
net"
myzone"
www"
Secure Entry Point
| 43
New Fields and Flags
•  DNSSEC Updates DNS protocol at the packet level
•  Non-compliant DNS recursive servers should
ignore these:
–  CD: Checking Disabled (ask recursing server to not
perform validation, even if DNSSEC signatures are
available and verifiable, i.e.: a SEP can be found)
–  AD: Authenticated Data, set on the answer by the
validating server if the answer could be validated, and the
client requested validation
–  DO: DNSSEC OK. A new EDNS0 option to indicate that
client supports DNSSEC options
43
New Resource Records
44
| 45
New RRs
•  Adds five new DNS Resource Records:
1.  DNSKEY: Public key used in zone signing operations.
2.  RRSIG: RRset signature
3.  NSEC &
4.  NSEC3: Returned as verifiable evidence that the name
and/or RR type does not exist
5.  DS: Delegation Signer. Contains the hash of the public
key used to sign the key which itself will be used to sign
the zone data. Follow DS RR's until a ”trusted” zone is
reached (ideally the root).
45
| 46
New RR: DNSKEY
•  FLAGS determines the usage of the key
•  PROTOCOL is always 3 (DNSSEC)
•  ALGORITHM can be (3: DSA/SHA-1, 5: RSA/SHA1, 8: RSA/SHA-256,
12: ECC-GOST)
–  http://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-
numbers.xml
46
example.net. "43200 DNSKEY " 256 3 7 (

"
"AwEAAbinasY+k/9xD4MBBa3QvhjuOHIpe319SFbWYIRj"
"/nbmVZfJnSw7By1cV3Tm7ZlLqNbcB86nVFMSQ3JjOFMr"
""
"....) ; ZSK; key id = 23807"
OWNER TYPE FLAGS
PROTOCOL
ALGORITHM
PUBLIC KEY
(BASE64)
KEY ID
| 47
DNSKEY: Two Keys, not one…
•  There are in practice at least two DNSKEY pairs for every
zone
•  Originally, one key-pair (public, private) defined for the zone
–  private: key used to sign the zone data (RRsets)
–  public: key published (DNSKEY) in the zone
•  DNSSEC works fine with a single key pair
•  Problem with using a single key:
–  Every time the key is updated, the DS record must be updated on the
parent zone as well
–  Introduction of Key Signing Key (flags=257)
47
| 48
KSK and ZSK
•  Key Signing Key (KSK)
–  Pointed to by parent zone in the form of DS (Delegation Signer).
Also called Secure Entry Point.
–  Used to sign the Zone Signing Key
–  Flags: 257
•  Zone Signing Key (ZSK)
–  Signed by the KSK
–  Used to sign the zone data RRsets
–  Flags: 256
•  This decoupling allows for independent updating of the
ZSK without having to update the KSK, and involve the
parents (i.e. less administrative interaction)
48
| 49
New RR: RRSIG (Resource Record Signature)
49
example.net. " 600 "A "192.168.10.10"
example.net. " 600 "A "192.168.23.45"
"
"


example.net. " 600 RRSIG A 7 2 600 ("


"
"
20150115154303 20141017154303 23807 example.net.



"
"
CoYkYPqE8Jv6UaVJgRrh7u16m/cEFGtFM8TArbJdaiPu"
W77wZhrvonoBEyqYbhQ1yDaS74u9whECEe08gfoe1FGg"
. . ."
)"
OWNER TYPE
TYPE COVERED
ALG
#LABELS
TTL
SIG. EXPIRATION SIG. INCEPTION KEY IDSIGNER NAME
SIGNATURE
| 50
RRSIG
•  Typical default values
–  Signature inception time is 1 hour before.
–  Signature expiration is 30 from now
–  Proper timekeeping (NTP) is required
•  What happens when signatures run out?
–  SERVFAIL
–  Domain effectively disappears from the Internet for validating
resolvers
•  Note that keys do not expire
•  No all RRSets need to be resigned at the same time
50
| 51
New RR: NSEC
•  NXDomains also must be verified
•  NSEC provides a pointer to the Next SECure
record in the chain of records.
51
myzone. " " NS "…"
alpha.myzone. " A"…"
beta.myzone. " CNAME "…"
charlie.myzone. A"…"
delta.myzone. " MX "…"


zulu.myzone. " A"…"
RESOLVER
AUTH for myzone.
omega.myzone ?
NSEC
] delta.myzone. ,
zulu.myzone.[
| 52
New RR: NSEC3
•  To avoid concerns about “zone enumeration”
•  To avoid large zone-files: opt-out concept
52
H(zulu.myzone.)

H(myzone.)"
H(delta.myzone.) 

H(charlie.myzone.)
H(beta.myzone.)"
H(alpha.myzone.)"
1-Way Hash
AUTH for myzone digests.
RESOLVER
omega.myzone ?
NSEC3
] H(charlie.myzone.) ,
H(alpha.myzone.) [
| 53
New RR: DS (Delegation Signer)
•  Hash of the KSK of the child zone
•  Stored in the parent zone, together with the NS RRs indicating a
delegation of the child zone.
•  The DS record for the child zone is signed together with the rest of the
parent zone data
•  NS records are NOT signed (they are a hint/pointer)
53
myzone. "DS "61138 " 5 "1
F6CD025B3F5D0304089505354A0115584B56D683"
"
myzone. "DS "61138 " 5 "2
CCBC0B557510E4256E88C01B0B1336AC4ED6FE08C8268CC1AA5FBF00 5DCE3210"
Digest type 1 = SHA-1, 2 = SHA-256!
Signatures expiration and
Key Rollovers
54
| 55
Signature Expiration
•  Signatures are per default 30 days (BIND)
•  Need for regular resigning:
–  To maintain a constant window of validity for the signatures of the
existing RRset
–  To sign new and updated Rrsets
–  Use of jitter to avoid having to resign all expiring RRsets at the
same time
•  The keys themselves do NOT expire…
•  But they may need to be rolled over...
55
| 56
Key Rollovers
•  Try to minimise impact
–  Short validity of signatures
–  Regular key rollover
•  Remember: DNSKEYs do not have timestamps
–  the RRSIG over the DNSKEY has the timestamp
•  Key rollover involves second party or parties:
–  State to be maintained during rollover
–  Operationally expensive
56
| 57
Key Rollovers
•  Two methods for doing key rollover
–  Pre-Publish
–  Double Signature
•  KSK and ZSK rollover use different methods.
–  Remember that KSK needs to interact with parent zone
to update DS record.
57
| 58
Key Rollovers: Pre-Publish method
•  ZSK Rollover using the pre-publish method
1.  Wait for old zone data to expire from caches (TTL)
2.  Sign the zone with the KSK and published ZSK
3.  Wait for old zone data to expire from caches
4.  Adjust Key list and sign the zone with new ZSK
58
| 59
Key Rollovers: Pre-Publish method
59
KSK
ZSK
TTL
ZSK ZSK
TTL
ZSK
ZSK
TTL
ZSK
*SK Signing
*SK Present
Glossary
*SK Inactive
Signs
| 60
Key Rollovers: Double Signature
•  KSK Rollover using the Double Signature
method
1.  Wait for old zone data to expire from caches
2.  generate a new (published) KSK
3.  Wait for the old DNSKEY RRset to expire from caches
4.  roll the KSKs
5.  Transfer new DS keyset to the parent
6.  Wait for parent to publish the new DS record
7.  Reload the zone
•  It is also possible to use dual DS in the parent
zone
60
| 61
Key Rollovers: Double Signature
61
KSK
ZSK
TTL
KSK KSK
TTL TTL
KSK KSK KSK
*SK Signing
*SK Present
Glossary
*SK Inactive
Signs
Setting Up a Secure Zone - Demo
62
| 63
Steps
•  Enable DNSSEC in the configuration file (named.conf)
dnssec-enable yes;
dnssec-validation yes;
•  Create key pairs (KSK and ZSK)
dnssec-keygen -a rsasha1 -b 1024 -n zone myzone.net
dnssec-keygen -a rsasha1 -b 1400 -f KSK -n zone myzone.net
•  Publish your public key
$INCLUDE /path/Kmyzone.net.+005+33633.key ; ZSK
$INCLUDE /path/Kmyzone.net.+005+00478.key ; KSK
•  Signing the zone
•  Update the config file
–  Modify the zone statement, replace with the signed zone file
•  Test with dig
Tools to help the process
64
| 65
Tools to use in DNSSEC
•  Authoritative Servers that support DNSSEC
–  NSD (by NLNetLabs)
–  Knot (by CZ NIC Labs)
–  BIND (by ISC)
–  Vantio (by Nominum)
–  YADIFA (by EURid)
–  MS DNS Server (by Microsoft)
–  TinyDNSSEC (based on tinydns by D.J. Bernstein)
65
| 66
Tools to use in DNSSEC
•  Resolvers that support DNSSEC
–  Unbound (by NLNetLabs)
–  BIND (by ISC)
–  MS Windows Server (by Microsoft)
•  Tools to automate DNSSEC
–  OpenDNSSEC (by NLnetLabs, .SE, Nominet…et al)
–  DNSSEC-Tools (by Sparta)
–  BIND (by ISC)
66
| 67
Useful links
•  https://www.dnssec-deployment.org
•  http://www.internetsociety.org/deploy360/dnssec
•  http://dnssec-debugger.verisignlabs.com
•  http://dnsviz.net
•  http://www.dnssec-failed.org
67
| 68
Background Why DNSSEC? How it Works?
Signatures and
Key Rollovers
Propagation of
Trust
DNSSEC Demo
1 2 3
4 5 6
Summary
Questions?
69
DNSSEC: Internet infrastructure
upgrade to help address today’s needs
and create tomorrow’s opportunity.
Thank You!
<champika.wijayatunga@icann.org>
71

Weitere ähnliche Inhalte

Was ist angesagt?

Dns protocol design attacks and security
Dns protocol design attacks and securityDns protocol design attacks and security
Dns protocol design attacks and security
Michael Earls
 

Was ist angesagt? (20)

DNS Security
DNS SecurityDNS Security
DNS Security
 
Namespaces for Local Networks
Namespaces for Local NetworksNamespaces for Local Networks
Namespaces for Local Networks
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
 
Part 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksPart 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows Networks
 
Introduction DNSSec
Introduction DNSSecIntroduction DNSSec
Introduction DNSSec
 
The DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rollsThe DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rolls
 
Dns protocol design attacks and security
Dns protocol design attacks and securityDns protocol design attacks and security
Dns protocol design attacks and security
 
DNSSEC signing Tutorial
DNSSEC signing Tutorial DNSSEC signing Tutorial
DNSSEC signing Tutorial
 
DNSSEC - Domain Name System Security Extensions
DNSSEC - Domain Name System Security ExtensionsDNSSEC - Domain Name System Security Extensions
DNSSEC - Domain Name System Security Extensions
 
DoH, DoT and ESNI
DoH, DoT and ESNIDoH, DoT and ESNI
DoH, DoT and ESNI
 
Grey H@t - DNS Cache Poisoning
Grey H@t - DNS Cache PoisoningGrey H@t - DNS Cache Poisoning
Grey H@t - DNS Cache Poisoning
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing Solutions
 
DNS Cache Poisoning
DNS Cache PoisoningDNS Cache Poisoning
DNS Cache Poisoning
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption security
 
Yeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the rootYeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the root
 
DNS Cache White Paper
DNS Cache White PaperDNS Cache White Paper
DNS Cache White Paper
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
 
8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 
DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael Casadevall
 
Thoughts about DNS for DDoS
Thoughts about DNS for DDoSThoughts about DNS for DDoS
Thoughts about DNS for DDoS
 

Ähnlich wie Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]

PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSECPLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSEC
PROIDEA
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
Peter Silva
 
Kailash Pankaj CV@May2016 (1)
Kailash Pankaj CV@May2016 (1)Kailash Pankaj CV@May2016 (1)
Kailash Pankaj CV@May2016 (1)
kailash Pankaj
 
Kailash Pankaj CV@May2016 (1)
Kailash Pankaj CV@May2016 (1)Kailash Pankaj CV@May2016 (1)
Kailash Pankaj CV@May2016 (1)
kailash Pankaj
 
Ashish Resume 2
Ashish Resume 2 Ashish Resume 2
Ashish Resume 2
Ashish Pal
 
Managed dns webinar 2015 internap
Managed dns webinar 2015 internapManaged dns webinar 2015 internap
Managed dns webinar 2015 internap
Internap
 

Ähnlich wie Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015] (20)

ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?
 
ION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSECION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSEC
 
ION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSECION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSEC
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People
 
ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
 
ION Djibouti: KENIC DNSSEC Case Study
ION Djibouti: KENIC DNSSEC Case StudyION Djibouti: KENIC DNSSEC Case Study
ION Djibouti: KENIC DNSSEC Case Study
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutions
 
PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSECPLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSEC
 
RIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarRIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinar
 
Rolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing KeyRolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing Key
 
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSKDefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
 
ION Trinidad and Tobago - The Business Case for DNSSEC
ION Trinidad and Tobago - The Business Case for DNSSECION Trinidad and Tobago - The Business Case for DNSSEC
ION Trinidad and Tobago - The Business Case for DNSSEC
 
Domain Name System (DNS)
Domain Name System (DNS)Domain Name System (DNS)
Domain Name System (DNS)
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
Kailash Pankaj CV@May2016 (1)
Kailash Pankaj CV@May2016 (1)Kailash Pankaj CV@May2016 (1)
Kailash Pankaj CV@May2016 (1)
 
Kailash Pankaj CV@May2016 (1)
Kailash Pankaj CV@May2016 (1)Kailash Pankaj CV@May2016 (1)
Kailash Pankaj CV@May2016 (1)
 
Ashish Resume 2
Ashish Resume 2 Ashish Resume 2
Ashish Resume 2
 
David mootrey july 2018 resume
David mootrey july 2018 resumeDavid mootrey july 2018 resume
David mootrey july 2018 resume
 
Managed dns webinar 2015 internap
Managed dns webinar 2015 internapManaged dns webinar 2015 internap
Managed dns webinar 2015 internap
 
Graham Chatfield16CV
Graham Chatfield16CVGraham Chatfield16CV
Graham Chatfield16CV
 

Mehr von APNIC

Mehr von APNIC (20)

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 

Kürzlich hochgeladen

valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
nirzagarg
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 

Kürzlich hochgeladen (20)

Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 

Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]

  • 1. Understanding and Deploying DNSSEC Champika Wijayatunga | APRICOT2015 – Fukuoka – Japan | Feb 2015
  • 2. | 2 Acknowledgements •  Rick Lamb –  Sr. Program Manager DNSSEC - ICANN •  Mauricio Vergara –  DNS Operations Manager – ICANN •  APNIC •  NSRC 2
  • 3. | 3 Background Why DNSSEC? How it Works? Signatures and Key Rollovers Propagation of Trust DNSSEC Demo 1 2 3 4 5 6 Agenda
  • 5. | 5 DNS in a Nutshell •  DNS is a distributed database •  Types of DNS servers –  DNS Authoritative •  Master •  Slaves –  DNS Resolver •  Recursive •  Cache •  Stub resolver 5
  • 6. lamb@xtcn.co m +1-202-709-5262 VoIP mydomainname.co DNS is a part of all IT ecosystems US-NSTIC effort Smart Electrical Grid OECS ID effort
  • 7. | 7 Client Resolver (ISP) www.example.net. ? www.example.net. ? a.server.net. 1.2.3.4 DNS Resolution 7 10.1.2.3 .net nameserver a.server.net.
 1.2.3.4" Root Server l.root-servers.net." 199.7.83.42
 2001:500:3::42" example.net nameserver ns.example.net.
 5.6.7.8"
  • 9. | 9 DNS Data Flow 9 STUB Resolver caching resolver (recursive) MASTER SLAVES SLAVES zone file (text, DB) dynamic updates man in the middle cache poisoning modified data spoofing master (routing/DoS) spoofed updates corrupted data DATAATTACK VECTORS
  • 10. | 10 The Bad •  DNSChanger* –  Biggest Cybercriminal Takedown in History –  4M machines, 100 countries, $14M •  And many other DNS hijacks in recent times** •  SSL / TLS doesn't tell you if you've been sent to the correct site, it only tells you if the DNS matches the name in the certificate. Unfortunately, majority of Web site certificates rely on DNS to validate identity. •  DNS is relied on for unexpected things though insecure. * http://www.fbi.gov/news/stories/2011/november/malware_110911/malware_110911 End-2-end DNSSEC validation would have avoided the problems ** A Brief History of DNS Hijacking - Google http://costarica43.icann.org/meetings/sanjose2012/presentation-dns-hijackings-marquis-boire-12mar12-en.pdf
  • 11. | 11 Where DNSSEC fits in •  CPU and bandwidth advances make legacy DNS vulnerable to MITM attacks •  DNS Security Extensions (DNSSEC) introduces digital signatures into DNS to cryptographically protect contents •  With DNSSEC fully deployed a business can be sure a customer gets un-modified data (and visa versa)
  • 12. | 12 The Internet’s Phone Book - Domain Name System www.majorbank.jp=? Get page webserver www @ 1.2.3.4 Username / Password Account Data DNS Hierarchy jp com root majorbank.jp www.majorbank.jp DNS Resolver www.majorbank.jp = 1.2.3.4 DNS Server1.2.3.4 Login page ISP Majorbank (Registrant)
  • 13. | 13 Caching Responses for Efficiency www.majorbank.jp=? Get page webserver www @ 1.2.3.4 Username / Password Account Data DNS Resolver www.majorbank.jp = 1.2.3.4 DNS Server1.2.3.4 Login page
  • 14. | 14 The Problem: DNS Cache Poisoning Attack www.majorbank.jp=? DNS Resolver www.majorbank.jp = 1.2.3.4 DNS Server5.6.7.8 Get page Attacker webserver www @ 5.6.7.8 Username / Password Error Attacker www.majorbank.jp = 5.6.7.8 Login page Password database
  • 15. | 15 Now all ISP customers get sent to attacker… www.majorbank.jp=? DNS Resolver www.majorbank.jp = 1.2.3.4 DNS Server5.6.7.8 Get page Attacker webserver www @ 5.6.7.8 Username / Password Error Login page Password database
  • 16. | 16 Securing The Phone Book - DNS Security Extensions (DNSSEC) www.majorbank.jp=? DNS Resolver with DNSSEC www.majorbank.jp = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page webserver www @ 1.2.3.4 Username / Password Account Data Login page Attacker www.majorbank.jp = 5.6.7.8 Attacker’s record does not validate – drop it
  • 17. | 17 Resolver only caches validated records www.majorbank.jp=? DNS Resolver with DNSSEC www.majorbank.jp = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page webserver www @ 1.2.3.4 Username / Password Account Data Login page
  • 18. | 18 What DNSSEC solves and what’s not STUB Resolver caching resolver (recursive) MASTER SLAVES SLAVES zone file (text, DB) dynamic updates man in the middle cache poisoning modified data spoofing master (routing/DoS) spoofed updates corrupted data DATAATTACK VECTORS DNSSEC scope
  • 19. | 19 Brief reminder on Cryptography •  Nowadays most of our Security Services are based in one (or a combination) of the following areas: –  One-way hash functions –  Symmetric key crypto –  Public-key crypto (or asymmetric) 19
  • 21. | 21 Client Resolver (ISP) www.example.net. ? www.example.net. ? a.server.net. How DNSSEC Works 21 10.1.2.3 .net nameserver Root Server example.net nameserver
  • 22. | 22 How DNSSEC Works •  Data authenticity and integrity by signing the Resource Records Sets with a private key •  Public DNSKEYs published, used to verify the RRSIGs •  Children sign their zones with their private key –  Authenticity of that key established by parent signing hash (DS) of the child zone's key •  Repeat for parent… •  Not that difficult on paper –  Operationally, it is a bit more complicated –  DSKEY → KEY –signs→ zone data 22
  • 23. | 23 The Business Case for DNSSEC •  Cyber security is becoming a greater concern to enterprises, government, and end users. DNSSEC is a key tool and differentiator. •  DNSSEC is the biggest security upgrade to Internet infrastructure in over 20 years. It is a platform for new security applications (for those that see the opportunity). •  DNSSEC infrastructure deployment has been brisk but requires expertise. Getting ahead of the curve is a competitive advantage.
  • 24. | 24 DNSSEC ccTLD Map https://rick.eng.br/dnssecstat/
  • 26. | 26 Domains with DS records https://rick.eng.br/dnssecstat/
  • 27. | 27 DNSSEC delegations in some ccTLD zones https://rick.eng.br/dnssecstat/
  • 28. | 28 DNSSEC - Where we are •  Deployed on 630/808 TLDs (29 Jan 2015 78% .com .hr .es .in .af .ee .lb .bg .tm .cz .nl .uk .de .jp .cn .ru . рф .my ‫ﻣﻠﻴﺴﻴﺎ‬ .asia .tw 台灣, .kr 한국 .net, .org, .post, +gtlds) •  Root signed** and audited •  > 86% of domain names could have DNSSEC •  Required in new gTLDs. Basic support by ICANN registrars •  Growing ISP support*. •  3rd party signing solutions*** •  Growing S/W H/W support: NLNetLabs, ISC, Microsoft, PowerDNS, Secure64…openssl, postfix, XMPP, mozilla: early DANE support •  IETF standard on DNSSEC SSL certificates (RFC6698) •  Growing support from major players…(Apple iPhone/iPad, Google 8.8.8.8,…) **Int’l bottom-up trust model /w 21 TCRs from: TT, BF, RU, CN, US, SE, NL, UG, BR, Benin, PT, NP, Mauritius, CZ, CA, JP, UK, NZ… *** Partial list of registrars: https://www.icann.org/en/news/in-focus/dnssec/deployment * COMCAST /w 20M and others; most ISPs in SE ,CZ. AND ~12% of resolvers validate using DNSSEC
  • 29. | 29 But… •  DNSSEC Validation for World is ~ 11.47% •  Many 2nd level domains have plans. Some have taken the step (e.g., yandex.com, paypal.com*, comcast.com). •  DNSChanger and other attacks highlight today’s need. (e.g end-2-end DNSSEC validation would have avoided the problems) •  Innovative security solutions (e.g., DANE) highlight tomorrow’s value. http://stats.labs.apnic.net/dnssec/XA?c=XA&x=1&g=1&r=1&w=7&g=0 http://www.thesecuritypractice.com/the_security_practice/2011/12/all-paypal-domains-are-now-using-dnssec.html
  • 30. | 30 DNSSEC: So what’s the problem? •  Not enough IT departments know about it or are too busy putting out other security fires. •  When they do look into it they hear old stories of FUD and lack of turnkey solutions. •  Registrars*/DNS providers see no demand leading to “chicken-and-egg” problems. *but required by new ICANN registrar agreement
  • 31. | 31 What you can do •  For Companies: –  Sign your corporate domain names –  Just turn on validation on corporate DNS resolvers •  For Users: –  Ask ISP to turn on validation on their DNS resolvers •  For All: –  Take advantage of DNSSEC education and training
  • 32. “More has happened here today than meets the eye. An infrastructure has been created for a hierarchical security system, which can be purposed and re‐purposed in a number of different ways. ..” – Vint Cerf (June 2010) Game changing Internet Core Infrastructure Upgrade
  • 33. | 33 Too many CAs. Which one can we trust? CA Certificate roots ~1500 Login security SSHFP RFC4255 DANE and other yet to be discovered security innovations, enhancements, and synergies Content security Commercial SSL Certificates for Web and e-mail Content security “Free SSL” certificates for Web and e-mail and “trust agility” Network security IPSECKEY RFC4025 Cross- organizational and trans- national identity and authentication E-mail security DKIM RFC4871 DNSSEC root - 1 Domain Names Securing VoIP https://www.eff.org/observatory
  • 34. DNSSEC: Internet infrastructure upgrade to help address today’s needs and create tomorrow’s opportunity.
  • 35. Hmm…how do I trust it?
  • 36. | 36 ICANN DNSSEC Deployment @Root •  Multi-stakeholder, bottom-up trust model* /w 21 crypto officers from around the world •  Broadcast Key Ceremonies and public docs Root DPS DNSSEC Practice Statement *Managed by technical community+ICANN
  • 38.
  • 41. | 41 New Concepts •  Secure Entry Point and Chain of Trust –  Delegating Signing Authority •  New packet options (flags) –  CD, AD, DO •  New RRs –  DNSKEY, RRSIG, NSEC/NSEC3 and DS •  Signature expiration •  Key Rollovers 41
  • 42. | 42 Chain of Trust and Secure Entry Point •  Using the existing delegation based model of distribution •  Don’t sign the entire zone, sign a RRset •  Parent DOES NOT sign the child zone. The parent signs a pointer (hash) to the key used to sign the data of the child zone (DS record) •  Example with www.myzone.net.! 42 “.”" net" myzone" www" Secure Entry Point
  • 43. | 43 New Fields and Flags •  DNSSEC Updates DNS protocol at the packet level •  Non-compliant DNS recursive servers should ignore these: –  CD: Checking Disabled (ask recursing server to not perform validation, even if DNSSEC signatures are available and verifiable, i.e.: a SEP can be found) –  AD: Authenticated Data, set on the answer by the validating server if the answer could be validated, and the client requested validation –  DO: DNSSEC OK. A new EDNS0 option to indicate that client supports DNSSEC options 43
  • 45. | 45 New RRs •  Adds five new DNS Resource Records: 1.  DNSKEY: Public key used in zone signing operations. 2.  RRSIG: RRset signature 3.  NSEC & 4.  NSEC3: Returned as verifiable evidence that the name and/or RR type does not exist 5.  DS: Delegation Signer. Contains the hash of the public key used to sign the key which itself will be used to sign the zone data. Follow DS RR's until a ”trusted” zone is reached (ideally the root). 45
  • 46. | 46 New RR: DNSKEY •  FLAGS determines the usage of the key •  PROTOCOL is always 3 (DNSSEC) •  ALGORITHM can be (3: DSA/SHA-1, 5: RSA/SHA1, 8: RSA/SHA-256, 12: ECC-GOST) –  http://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg- numbers.xml 46 example.net. "43200 DNSKEY " 256 3 7 (
 " "AwEAAbinasY+k/9xD4MBBa3QvhjuOHIpe319SFbWYIRj" "/nbmVZfJnSw7By1cV3Tm7ZlLqNbcB86nVFMSQ3JjOFMr" "" "....) ; ZSK; key id = 23807" OWNER TYPE FLAGS PROTOCOL ALGORITHM PUBLIC KEY (BASE64) KEY ID
  • 47. | 47 DNSKEY: Two Keys, not one… •  There are in practice at least two DNSKEY pairs for every zone •  Originally, one key-pair (public, private) defined for the zone –  private: key used to sign the zone data (RRsets) –  public: key published (DNSKEY) in the zone •  DNSSEC works fine with a single key pair •  Problem with using a single key: –  Every time the key is updated, the DS record must be updated on the parent zone as well –  Introduction of Key Signing Key (flags=257) 47
  • 48. | 48 KSK and ZSK •  Key Signing Key (KSK) –  Pointed to by parent zone in the form of DS (Delegation Signer). Also called Secure Entry Point. –  Used to sign the Zone Signing Key –  Flags: 257 •  Zone Signing Key (ZSK) –  Signed by the KSK –  Used to sign the zone data RRsets –  Flags: 256 •  This decoupling allows for independent updating of the ZSK without having to update the KSK, and involve the parents (i.e. less administrative interaction) 48
  • 49. | 49 New RR: RRSIG (Resource Record Signature) 49 example.net. " 600 "A "192.168.10.10" example.net. " 600 "A "192.168.23.45" " " 
 example.net. " 600 RRSIG A 7 2 600 (" 
 " " 20150115154303 20141017154303 23807 example.net.
 
 " " CoYkYPqE8Jv6UaVJgRrh7u16m/cEFGtFM8TArbJdaiPu" W77wZhrvonoBEyqYbhQ1yDaS74u9whECEe08gfoe1FGg" . . ." )" OWNER TYPE TYPE COVERED ALG #LABELS TTL SIG. EXPIRATION SIG. INCEPTION KEY IDSIGNER NAME SIGNATURE
  • 50. | 50 RRSIG •  Typical default values –  Signature inception time is 1 hour before. –  Signature expiration is 30 from now –  Proper timekeeping (NTP) is required •  What happens when signatures run out? –  SERVFAIL –  Domain effectively disappears from the Internet for validating resolvers •  Note that keys do not expire •  No all RRSets need to be resigned at the same time 50
  • 51. | 51 New RR: NSEC •  NXDomains also must be verified •  NSEC provides a pointer to the Next SECure record in the chain of records. 51 myzone. " " NS "…" alpha.myzone. " A"…" beta.myzone. " CNAME "…" charlie.myzone. A"…" delta.myzone. " MX "…" 
 zulu.myzone. " A"…" RESOLVER AUTH for myzone. omega.myzone ? NSEC ] delta.myzone. , zulu.myzone.[
  • 52. | 52 New RR: NSEC3 •  To avoid concerns about “zone enumeration” •  To avoid large zone-files: opt-out concept 52 H(zulu.myzone.)
 H(myzone.)" H(delta.myzone.) 
 H(charlie.myzone.) H(beta.myzone.)" H(alpha.myzone.)" 1-Way Hash AUTH for myzone digests. RESOLVER omega.myzone ? NSEC3 ] H(charlie.myzone.) , H(alpha.myzone.) [
  • 53. | 53 New RR: DS (Delegation Signer) •  Hash of the KSK of the child zone •  Stored in the parent zone, together with the NS RRs indicating a delegation of the child zone. •  The DS record for the child zone is signed together with the rest of the parent zone data •  NS records are NOT signed (they are a hint/pointer) 53 myzone. "DS "61138 " 5 "1 F6CD025B3F5D0304089505354A0115584B56D683" " myzone. "DS "61138 " 5 "2 CCBC0B557510E4256E88C01B0B1336AC4ED6FE08C8268CC1AA5FBF00 5DCE3210" Digest type 1 = SHA-1, 2 = SHA-256!
  • 55. | 55 Signature Expiration •  Signatures are per default 30 days (BIND) •  Need for regular resigning: –  To maintain a constant window of validity for the signatures of the existing RRset –  To sign new and updated Rrsets –  Use of jitter to avoid having to resign all expiring RRsets at the same time •  The keys themselves do NOT expire… •  But they may need to be rolled over... 55
  • 56. | 56 Key Rollovers •  Try to minimise impact –  Short validity of signatures –  Regular key rollover •  Remember: DNSKEYs do not have timestamps –  the RRSIG over the DNSKEY has the timestamp •  Key rollover involves second party or parties: –  State to be maintained during rollover –  Operationally expensive 56
  • 57. | 57 Key Rollovers •  Two methods for doing key rollover –  Pre-Publish –  Double Signature •  KSK and ZSK rollover use different methods. –  Remember that KSK needs to interact with parent zone to update DS record. 57
  • 58. | 58 Key Rollovers: Pre-Publish method •  ZSK Rollover using the pre-publish method 1.  Wait for old zone data to expire from caches (TTL) 2.  Sign the zone with the KSK and published ZSK 3.  Wait for old zone data to expire from caches 4.  Adjust Key list and sign the zone with new ZSK 58
  • 59. | 59 Key Rollovers: Pre-Publish method 59 KSK ZSK TTL ZSK ZSK TTL ZSK ZSK TTL ZSK *SK Signing *SK Present Glossary *SK Inactive Signs
  • 60. | 60 Key Rollovers: Double Signature •  KSK Rollover using the Double Signature method 1.  Wait for old zone data to expire from caches 2.  generate a new (published) KSK 3.  Wait for the old DNSKEY RRset to expire from caches 4.  roll the KSKs 5.  Transfer new DS keyset to the parent 6.  Wait for parent to publish the new DS record 7.  Reload the zone •  It is also possible to use dual DS in the parent zone 60
  • 61. | 61 Key Rollovers: Double Signature 61 KSK ZSK TTL KSK KSK TTL TTL KSK KSK KSK *SK Signing *SK Present Glossary *SK Inactive Signs
  • 62. Setting Up a Secure Zone - Demo 62
  • 63. | 63 Steps •  Enable DNSSEC in the configuration file (named.conf) dnssec-enable yes; dnssec-validation yes; •  Create key pairs (KSK and ZSK) dnssec-keygen -a rsasha1 -b 1024 -n zone myzone.net dnssec-keygen -a rsasha1 -b 1400 -f KSK -n zone myzone.net •  Publish your public key $INCLUDE /path/Kmyzone.net.+005+33633.key ; ZSK $INCLUDE /path/Kmyzone.net.+005+00478.key ; KSK •  Signing the zone •  Update the config file –  Modify the zone statement, replace with the signed zone file •  Test with dig
  • 64. Tools to help the process 64
  • 65. | 65 Tools to use in DNSSEC •  Authoritative Servers that support DNSSEC –  NSD (by NLNetLabs) –  Knot (by CZ NIC Labs) –  BIND (by ISC) –  Vantio (by Nominum) –  YADIFA (by EURid) –  MS DNS Server (by Microsoft) –  TinyDNSSEC (based on tinydns by D.J. Bernstein) 65
  • 66. | 66 Tools to use in DNSSEC •  Resolvers that support DNSSEC –  Unbound (by NLNetLabs) –  BIND (by ISC) –  MS Windows Server (by Microsoft) •  Tools to automate DNSSEC –  OpenDNSSEC (by NLnetLabs, .SE, Nominet…et al) –  DNSSEC-Tools (by Sparta) –  BIND (by ISC) 66
  • 67. | 67 Useful links •  https://www.dnssec-deployment.org •  http://www.internetsociety.org/deploy360/dnssec •  http://dnssec-debugger.verisignlabs.com •  http://dnsviz.net •  http://www.dnssec-failed.org 67
  • 68. | 68 Background Why DNSSEC? How it Works? Signatures and Key Rollovers Propagation of Trust DNSSEC Demo 1 2 3 4 5 6 Summary
  • 70. DNSSEC: Internet infrastructure upgrade to help address today’s needs and create tomorrow’s opportunity.