SlideShare a Scribd company logo
1 of 28
Download to read offline
Key pieces of the Cyber Security Puzzle
Scorecard!
DNS & Routing !
Overview of the problem!
Exhibit A: The Great YouTube Blackout of ‘08 	
Mukom Akong T. | @perfexcellence |! Slide 3!
Exhibit A: The Great YouTube Blackout of ‘08 	
Mukom Akong T. | @perfexcellence |! Slide 4!
1 billion (non)views per day!
Date: 24th February 2008
Extent: Two thirds of Internet
Damage: Inaccessible for 2 hours
Exhibit B: Great Firewall of China extends abroad	
Mukom Akong T. | @perfexcellence |! Slide 5!
Exhibit B: Great Firewall of China extends overseas	
Mukom Akong T. | @perfexcellence |! Slide 6!
Date: 24 March 2010
Extent: Some networks in USA & Chile
Damage: US & Chilean citizens became
subject to the online policies of
the Chinese gov’t
Oh God, how
did we get
here?
Identifying computers on the Internet	
Mukom Akong T. | @perfexcellence |! Slide 8!
192.0.2.1
2001:db8:dead::a1d
learn.afrinic.net
IP addresses are ineffective for human use on a large scale
How this can happen to you	
①  You type your bank’s address: www.yourbank.com
②  Your PC asks your ISP’s DNS servers for the matching IP address
③  The DNS server goes through a hierarchy to get the answer:
§  Asks the root DNS servers which points it to .com servers
§  The .com servers direct it to .yourbank.com DNS server
§  The .yourbank.com DNS server sends the answer (an IP address)
§  The server passes the response to your PC which makes the connection
④  An attacker can inject a fake answer during any of the above steps
⑤  The response that comes to you
§  Is NOT the same IP address of you bank (which you don’t know)
§  The website LOOKS exactly like the one you often use
⑥  You type in your credentials, then you get a error e.g. page cannot be
displayed
⑦  3 weeks later, you scream: “Where’s my money??!!"
Mukom Akong T. | @perfexcellence |! Slide 9!
Identifying organisations on the Internet	
☀ Domain name e.g
afrinic.net
☀ A block of IP addresses
§  196.1.0.0/24
§  2001:4290::/32
☀ Autonomous System
Number e.g.
Mukom Akong T. | @perfexcellence |! Slide 10!
For the Internet to work ..	
Mukom Akong T. | @perfexcellence |! Slide 11!
2001:db8:dead::a1dlearn.afrinic.net
For the Internet to work ..	
Mukom Akong T. | @perfexcellence |! Slide 12!
How do I send
information to
the computer
with address B?
The Problem: Breakdown of TRUST	
Mukom Akong T. | @perfexcellence |! Slide 13!
I AM …
www.google.com
www.yourbank.com
www.statehouse.gov.ng
www.prc.cm
www.cto.int
www.afrinic.net
I AM …
2c0f:face:b00c::/48
197.253.0.0/16
65.25.0/24
It is possible to impersonate any entity by name or address
The Problem: Breakdown of TRUST	
☀ It is possible for one computer to
impersonate another node by name.
☀ There’s no real way of knowing if the
answer your computer got to “what is
the IP address of www.yourbank.com” is
legitimate or not
Mukom Akong T. | @perfexcellence |! Slide 14!
The Problem: Breakdown of TRUST	
☀ It is possible for one entity (e.g an ISP)
to impersonate a whole network by IP
address
☀ There’s been no way verify if that entity
owns that IP address it’s claiming
Mukom Akong T. | @perfexcellence |! Slide 15!
A Fix: Certify & authenticate Internet identity	
☀ Sign DNS records
☀ Establish a chain of trust
☀ Establish ‘ownership’ of
address space
Mukom Akong T. | @perfexcellence |! Slide 16!
Digital certificates & public
key infrastructure
How DNSSEC solves the problem	
①  Digitally sign DNS (name to IP address)
records using public keys
②  Establishes a chain of trust where parent
domains authenticate child domains
③  Ensures responses have not been
tampered with in transit
Does NOT provide confidentiality (encryption)
Mukom Akong T. | @perfexcellence |! Slide 17!
DNSSEC – What It Solves	
☀ Use public keys to authenticate
§  The original name to address mapping
§  That queries were not tampered with
☀ Prevents impersonation by domain name
☀ Completely backwards compatible with
existing DNS infrastructure
☀ It would prevent the extension of the Great
Firewall of China outside China
Mukom Akong T. | @perfexcellence |! Slide 18!
Bene"ts of DNSSEC	
①  The Internet community: Improved security in
the zones that are signed.
②  Registrars: Offer domain signing services to
their customers.
③  ISPs: Increasing the security of the data
returned to their customers.
④  Users: Protection from DNS vulnerabilities
such as cache poisoning and man-in-the-
middle attacks.
Mukom Akong T. | @perfexcellence |! Slide 19!
RPKI – What It Solves	
☀ Ties an organization's IP address
range(s) to its ASN
☀ Solves the “does this address block
belong to this organization”
☀ Blocks impersonation by IP address
(number)
☀ RPKI would have prevented the Youtube
Blackout of ‘08
Mukom Akong T. | @perfexcellence |! Slide 20!
How RPKI Works	
☀ Digitally certify that a resource has been allocated
to a specific entity.
☀ Usage rights for resources is proven by digital
certificate.
☀ Connect resources (ASNs, IP addresses) to a trust
anchor, thus forming a chain of trust.
☀ Control authority to originate a routing
announcement by a certificate via ROAs
☀ Certificates are used to verify that a network has
the authority to announce a given block of
addresses.
Mukom Akong T. | @perfexcellence |! Slide 21!
Implications for National Infrastructure	
①  Is the ccTLD DNSSEC enabled?
②  Government network
☀ Support DNSSEC on all gov’t networks
☀ Is gov’t IP space RPKI-protected?
③  Key network operators (ideally Everyone)
☀ Secure your names domain with DNSSEC
☀ Secure your number domains with RPKI
Because Cyber Crime is an industry that will
only grow (to the chagrin of us all) and extend
to Cyber War & Terrorism
Mukom Akong T. | @perfexcellence |! Slide 22!
Source: http://www.dnssec-deployment.org
Consequences: think of the e#ect	
①  We consolidate governance around
technology …then the e-gov’t portal is
inaccessible due to attack
②  We consolidate education around
hosted content and that platform was
inaccessible
③  Our bank websites get hijacked
Mukom Akong T. | @perfexcellence |! Slide 24!
Our digital way of life is under threat	
Mukom Akong T. | @perfexcellence |! Slide 25!
e-Banking E-Gov’t E-Commerce
The Problem: Breakdown of TRUST
Call to Action	
Mukom Akong T. | @perfexcellence |! Slide 27!
RPKI & DNSSEC are not Silver Bullets but are a core part of the solution.
Fix up your own part of this mess! RPKI & DNSSEC on gov’t infrastructure
Na Gode! Thank You ! Sh’kran
mukom@afrinic.net | Twitter: @perfexcellent

More Related Content

What's hot

CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018PKF Francis Clark
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIAcharitha garimella
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram communityMohammed Adam
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
 

What's hot (20)

Internet security
Internet securityInternet security
Internet security
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
internet security
internet securityinternet security
internet security
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram community
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 

Similar to High Level Overview of RPKI & DNSSEC

Philippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsPhilippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsAPNIC
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityRob Dudley
 
How to prevent cyber terrorism taragana
How to prevent cyber terrorism  taraganaHow to prevent cyber terrorism  taragana
How to prevent cyber terrorism taraganaGilles Sgro
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerBlockstrap.com
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityPrateek Panda
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDebra Baker, CISSP CSSP
 
Upsc science AND technology
Upsc   science AND technologyUpsc   science AND technology
Upsc science AND technologyGautam Kumar
 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackPriyanka Aash
 
FFMUC presents #ffmeet - #virtualUKNOF
FFMUC presents #ffmeet - #virtualUKNOFFFMUC presents #ffmeet - #virtualUKNOF
FFMUC presents #ffmeet - #virtualUKNOFAnnika Wickert
 
How Internet Peering Improves Security
How Internet Peering Improves SecurityHow Internet Peering Improves Security
How Internet Peering Improves SecurityWilliam Norton
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTsWeb 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTsAurora Consulting
 
Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...ITCamp
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Andrew Hammond
 
Superfast Business - Technology Trends for Business
Superfast Business - Technology Trends for BusinessSuperfast Business - Technology Trends for Business
Superfast Business - Technology Trends for BusinessSuperfast Business
 
Scot Cloud 2017
Scot Cloud 2017Scot Cloud 2017
Scot Cloud 2017Ray Bugg
 
Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101Mayank Jain
 

Similar to High Level Overview of RPKI & DNSSEC (20)

ION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSECION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSEC
 
Philippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsPhilippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTs
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application Security
 
How to prevent cyber terrorism taragana
How to prevent cyber terrorism  taraganaHow to prevent cyber terrorism  taragana
How to prevent cyber terrorism taragana
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primer
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
Upsc science AND technology
Upsc   science AND technologyUpsc   science AND technology
Upsc science AND technology
 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation Track
 
FFMUC presents #ffmeet - #virtualUKNOF
FFMUC presents #ffmeet - #virtualUKNOFFFMUC presents #ffmeet - #virtualUKNOF
FFMUC presents #ffmeet - #virtualUKNOF
 
How Internet Peering Improves Security
How Internet Peering Improves SecurityHow Internet Peering Improves Security
How Internet Peering Improves Security
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTsWeb 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTs
 
Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
 
Superfast Business - Technology Trends for Business
Superfast Business - Technology Trends for BusinessSuperfast Business - Technology Trends for Business
Superfast Business - Technology Trends for Business
 
Scot Cloud 2017
Scot Cloud 2017Scot Cloud 2017
Scot Cloud 2017
 
Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101
 

More from Mukom Akong Tamon

Cracking the Enigma of Innovation in Established Companies
Cracking the Enigma of Innovation in Established CompaniesCracking the Enigma of Innovation in Established Companies
Cracking the Enigma of Innovation in Established CompaniesMukom Akong Tamon
 
Deploying #IPv6 Amidst Competing Priorities
Deploying #IPv6 Amidst Competing Priorities Deploying #IPv6 Amidst Competing Priorities
Deploying #IPv6 Amidst Competing Priorities Mukom Akong Tamon
 
How to Love Your Email Again: Inbox-Zero via GTD
How to Love Your Email Again: Inbox-Zero via GTDHow to Love Your Email Again: Inbox-Zero via GTD
How to Love Your Email Again: Inbox-Zero via GTDMukom Akong Tamon
 
How to Effectively Integrate ICTs in Education in Africa
How to Effectively Integrate ICTs in Education in Africa How to Effectively Integrate ICTs in Education in Africa
How to Effectively Integrate ICTs in Education in Africa Mukom Akong Tamon
 
Importance of IP Resource Planning in ICT Strategies
Importance of IP Resource Planning in ICT StrategiesImportance of IP Resource Planning in ICT Strategies
Importance of IP Resource Planning in ICT StrategiesMukom Akong Tamon
 
Effective Student Management (EduERP)
Effective Student Management (EduERP)Effective Student Management (EduERP)
Effective Student Management (EduERP)Mukom Akong Tamon
 

More from Mukom Akong Tamon (6)

Cracking the Enigma of Innovation in Established Companies
Cracking the Enigma of Innovation in Established CompaniesCracking the Enigma of Innovation in Established Companies
Cracking the Enigma of Innovation in Established Companies
 
Deploying #IPv6 Amidst Competing Priorities
Deploying #IPv6 Amidst Competing Priorities Deploying #IPv6 Amidst Competing Priorities
Deploying #IPv6 Amidst Competing Priorities
 
How to Love Your Email Again: Inbox-Zero via GTD
How to Love Your Email Again: Inbox-Zero via GTDHow to Love Your Email Again: Inbox-Zero via GTD
How to Love Your Email Again: Inbox-Zero via GTD
 
How to Effectively Integrate ICTs in Education in Africa
How to Effectively Integrate ICTs in Education in Africa How to Effectively Integrate ICTs in Education in Africa
How to Effectively Integrate ICTs in Education in Africa
 
Importance of IP Resource Planning in ICT Strategies
Importance of IP Resource Planning in ICT StrategiesImportance of IP Resource Planning in ICT Strategies
Importance of IP Resource Planning in ICT Strategies
 
Effective Student Management (EduERP)
Effective Student Management (EduERP)Effective Student Management (EduERP)
Effective Student Management (EduERP)
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

High Level Overview of RPKI & DNSSEC

  • 1. Key pieces of the Cyber Security Puzzle
  • 2. Scorecard! DNS & Routing ! Overview of the problem!
  • 3. Exhibit A: The Great YouTube Blackout of ‘08 Mukom Akong T. | @perfexcellence |! Slide 3!
  • 4. Exhibit A: The Great YouTube Blackout of ‘08 Mukom Akong T. | @perfexcellence |! Slide 4! 1 billion (non)views per day! Date: 24th February 2008 Extent: Two thirds of Internet Damage: Inaccessible for 2 hours
  • 5. Exhibit B: Great Firewall of China extends abroad Mukom Akong T. | @perfexcellence |! Slide 5!
  • 6. Exhibit B: Great Firewall of China extends overseas Mukom Akong T. | @perfexcellence |! Slide 6! Date: 24 March 2010 Extent: Some networks in USA & Chile Damage: US & Chilean citizens became subject to the online policies of the Chinese gov’t
  • 7. Oh God, how did we get here?
  • 8. Identifying computers on the Internet Mukom Akong T. | @perfexcellence |! Slide 8! 192.0.2.1 2001:db8:dead::a1d learn.afrinic.net IP addresses are ineffective for human use on a large scale
  • 9. How this can happen to you ①  You type your bank’s address: www.yourbank.com ②  Your PC asks your ISP’s DNS servers for the matching IP address ③  The DNS server goes through a hierarchy to get the answer: §  Asks the root DNS servers which points it to .com servers §  The .com servers direct it to .yourbank.com DNS server §  The .yourbank.com DNS server sends the answer (an IP address) §  The server passes the response to your PC which makes the connection ④  An attacker can inject a fake answer during any of the above steps ⑤  The response that comes to you §  Is NOT the same IP address of you bank (which you don’t know) §  The website LOOKS exactly like the one you often use ⑥  You type in your credentials, then you get a error e.g. page cannot be displayed ⑦  3 weeks later, you scream: “Where’s my money??!!" Mukom Akong T. | @perfexcellence |! Slide 9!
  • 10. Identifying organisations on the Internet ☀ Domain name e.g afrinic.net ☀ A block of IP addresses §  196.1.0.0/24 §  2001:4290::/32 ☀ Autonomous System Number e.g. Mukom Akong T. | @perfexcellence |! Slide 10!
  • 11. For the Internet to work .. Mukom Akong T. | @perfexcellence |! Slide 11! 2001:db8:dead::a1dlearn.afrinic.net
  • 12. For the Internet to work .. Mukom Akong T. | @perfexcellence |! Slide 12! How do I send information to the computer with address B?
  • 13. The Problem: Breakdown of TRUST Mukom Akong T. | @perfexcellence |! Slide 13! I AM … www.google.com www.yourbank.com www.statehouse.gov.ng www.prc.cm www.cto.int www.afrinic.net I AM … 2c0f:face:b00c::/48 197.253.0.0/16 65.25.0/24 It is possible to impersonate any entity by name or address
  • 14. The Problem: Breakdown of TRUST ☀ It is possible for one computer to impersonate another node by name. ☀ There’s no real way of knowing if the answer your computer got to “what is the IP address of www.yourbank.com” is legitimate or not Mukom Akong T. | @perfexcellence |! Slide 14!
  • 15. The Problem: Breakdown of TRUST ☀ It is possible for one entity (e.g an ISP) to impersonate a whole network by IP address ☀ There’s been no way verify if that entity owns that IP address it’s claiming Mukom Akong T. | @perfexcellence |! Slide 15!
  • 16. A Fix: Certify & authenticate Internet identity ☀ Sign DNS records ☀ Establish a chain of trust ☀ Establish ‘ownership’ of address space Mukom Akong T. | @perfexcellence |! Slide 16! Digital certificates & public key infrastructure
  • 17. How DNSSEC solves the problem ①  Digitally sign DNS (name to IP address) records using public keys ②  Establishes a chain of trust where parent domains authenticate child domains ③  Ensures responses have not been tampered with in transit Does NOT provide confidentiality (encryption) Mukom Akong T. | @perfexcellence |! Slide 17!
  • 18. DNSSEC – What It Solves ☀ Use public keys to authenticate §  The original name to address mapping §  That queries were not tampered with ☀ Prevents impersonation by domain name ☀ Completely backwards compatible with existing DNS infrastructure ☀ It would prevent the extension of the Great Firewall of China outside China Mukom Akong T. | @perfexcellence |! Slide 18!
  • 19. Bene"ts of DNSSEC ①  The Internet community: Improved security in the zones that are signed. ②  Registrars: Offer domain signing services to their customers. ③  ISPs: Increasing the security of the data returned to their customers. ④  Users: Protection from DNS vulnerabilities such as cache poisoning and man-in-the- middle attacks. Mukom Akong T. | @perfexcellence |! Slide 19!
  • 20. RPKI – What It Solves ☀ Ties an organization's IP address range(s) to its ASN ☀ Solves the “does this address block belong to this organization” ☀ Blocks impersonation by IP address (number) ☀ RPKI would have prevented the Youtube Blackout of ‘08 Mukom Akong T. | @perfexcellence |! Slide 20!
  • 21. How RPKI Works ☀ Digitally certify that a resource has been allocated to a specific entity. ☀ Usage rights for resources is proven by digital certificate. ☀ Connect resources (ASNs, IP addresses) to a trust anchor, thus forming a chain of trust. ☀ Control authority to originate a routing announcement by a certificate via ROAs ☀ Certificates are used to verify that a network has the authority to announce a given block of addresses. Mukom Akong T. | @perfexcellence |! Slide 21!
  • 22. Implications for National Infrastructure ①  Is the ccTLD DNSSEC enabled? ②  Government network ☀ Support DNSSEC on all gov’t networks ☀ Is gov’t IP space RPKI-protected? ③  Key network operators (ideally Everyone) ☀ Secure your names domain with DNSSEC ☀ Secure your number domains with RPKI Because Cyber Crime is an industry that will only grow (to the chagrin of us all) and extend to Cyber War & Terrorism Mukom Akong T. | @perfexcellence |! Slide 22!
  • 24. Consequences: think of the e#ect ①  We consolidate governance around technology …then the e-gov’t portal is inaccessible due to attack ②  We consolidate education around hosted content and that platform was inaccessible ③  Our bank websites get hijacked Mukom Akong T. | @perfexcellence |! Slide 24!
  • 25. Our digital way of life is under threat Mukom Akong T. | @perfexcellence |! Slide 25! e-Banking E-Gov’t E-Commerce
  • 27. Call to Action Mukom Akong T. | @perfexcellence |! Slide 27! RPKI & DNSSEC are not Silver Bullets but are a core part of the solution. Fix up your own part of this mess! RPKI & DNSSEC on gov’t infrastructure
  • 28. Na Gode! Thank You ! Sh’kran mukom@afrinic.net | Twitter: @perfexcellent