Deploying DNSSEC without Losing Your Mind Summer ESNET Conference July 2009.

Slides:



Advertisements
Similar presentations
Practical Considerations for DNSSEC Automation Joe Gersch OARC Presentation September 24, 2008.
Advertisements

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License DNSSEC ROLLING.
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Deploying DNSSEC in Windows Server 2012 David Cates Platform Services Group Microsoft Corporation.
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
DNSSEC Sample Implementation MENOG 10 Workshop 22 April 2012, Dubai
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
1. Failure is when users do not feel they get what they paid for. 2. Failure is when the overall organization fails to adopt the solution.
1 SecSpider: Distributed DNSSEC Monitoring Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
ITIL: Why Your IT Organization Should Care Service Support
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Network security policy: best practices
Deploying DNSSEC in Windows Server 2012 Rob Kuehfus Program Manager Microsoft Corporation WSV325.
Configuring Active Directory Certificate Services Lesson 13.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
System Design/Implementation and Support for Build 2 PDS Management Council Face-to-Face Mountain View, CA Nov 30 - Dec 1, 2011 Sean Hardman.
Installing and Troubleshooting Hardware Device and Drivers Chapter 6 powered by dj.
November 2009 Network Disaster Recovery October 2014.
Windows Vista: Volume Activation 2.0
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Hands-On Microsoft Windows Server 2008
1 DNSSEC at ESnet ESCC/Internet2 Joint Techs Workshop July 19, 2006 R. Kevin Oberman Network Engineer Lawrence Berkeley National Laboratory.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Module 13: Maintaining Software by Using Windows Server Update Services.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
© 2009 PGP Corporation Confidential State of Key Management Brian Tokuyoshi Solution Manager.
Service Overview CA- IROD- Instant Recovery on Demand CRITICAL SERVER CONTINUITY, NON-STOP OPERATIONS, TOTAL DATA PROTECTION Turnkey solution that provides.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
© Afilias Limitedwww.afilias.info SM Deploying DNSSEC Ram Mohan.
Krit Witwiyaruj Thai Name Server Co., Ltd.th DNSSEC Implementation.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
1 ESnet DNSSEC Update ESCC/Internet2 Joint Techs Workshop February 14, 2007 R. Kevin Oberman Network Engineer Lawrence Berkeley National Laboratory.
DNSSEC deployment in NZ Andy Linton
DNSSEC-Deployment.org Secure Naming Infrastructure Pilot (SNIP) A.gov Community Pilot for DNSSEC Deployment JointTechs Workshop July 18, 2007 Scott Rose.
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
OpenDNSSEC Deployment Tianyi Xing. Roadmap By mid-term – Establish a DNSSEC server within the mobicloud system (Hopfully be done by next week) Successfully.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Computer Security By Duncan Hall.
Data Coordinators Conference – 2014 Laura Marroquin CASEWORKER/JCMS Specialist Everything New Data Coordinators Should Know.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Chapter 8 System Management Semester 2. Objectives  Evaluating an operating system  Cooperation among components  The role of memory, processor,
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
Chapter 7. Identifying Assets and Activities to Be Protected
What DNSSEC Provides Cryptographic signatures in the DNS
Features Overview.
.uk DNSSEC Status update
Presentation transcript:

Deploying DNSSEC without Losing Your Mind Summer ESNET Conference July 2009

2 DNS Infrastructure Challenges Performance Demands Conventional DNS solutions can’t keep up with today’s performance and security demands BotnetsMalwareCache Poisoning DNS Security Demands Web 2.0More Devices Hidden Computing

3 Security Concerns Source: Arbor Networks Botnets, DNS and cache poisoning among the top concerns

4 The DDoS Threat Trends Attack volume is increasing Recent victims Time Warner Cable UltraDNS Register.com The Planet Results Outages and slowdowns Customer support issues Negative publicity Source: Arbor Networks Attacks on service providers are becoming bigger and more common

5 The Cache Poisoning Threat Attacks are real 1-3% of monitored unpatched nameservers have had a poisoning event detected Confirmed phishing attacks have been found Brazilian Bank poisoned April 23, 2009 Patches are short term fix Patched systems have been compromised in <10 hours Use of botnets can greatly reduce time to compromise DNSSEC is permanent solution Source: IO Active, Dagon et. al.

6 What Is DNSSEC? What does it do? Validates the source of the DNS response Ensures the response has not been altered in transit Authenticates replies of non- existence How does it work? Adds digital signatures to DNS responses Uses chains of trust to validate responses Identifies bogus responses With DNSSEC, we are certain that a response is correct Caching Server Authoritative Server Client Digitally Signed Response Bogus Response Digitally Signed Response Bogus Response

7 Why You Must Act Now Because you have to … OMB mandate M requires all agencies to sign all external zones (low, medium and high impact) by December 2009 Publication of NIST SP rev 3 specifies deployment of DNSSEC with internal zones (low, medium and high impact) FISMA requires compliance 1 year from publication date, which is June 2010 Because you should … Real attacks have escalated. The Kaminsky exploit alone has captured the attention of the entire planet. Your user base is at risk right now with any web, , or other Internet transaction

8 DNSSEC Deployment Challenges Complexity Education, development, QA required Security General purpose OS cannot protect keys Crypto cards are complicated Offline keys labor intensive Failover How to handle a hardware or network failure? Scalability Signing speed for large or numerous zones Offline key management Dynamic Updates to DNS zone data Auditability What zones are signed? What keys are about to expire? Early adopters invest 4-6+ man-months to deploy, ½ full time person to maintain

9 DNSSEC Complexity Initially Generate public/private key pairs (one pair per zone, ideally) Insert keys into zone files Sign the zones Whenever data changes or before signatures expire Retrieve keys from secure storage Re-sign the zones Roll the ZSKs Generate new key pairs per zone Add the new keys to the zone Re-sign the zone using the old key Wait for one TTL period Re-sign the zone using the new key Wait for one TTL period Remove the old ZSK from the zone file Re-sign the zone Roll the KSKs Generate new key pairs (ideally one per zone) Sign the DNSKEY RRset with both KSKs Wait one TTL period Update the DS record at the parent and verify Remove the old KSK from the zone and re-sign Complexity must be managed with good process discipline or automated tools Once At least weekly, or whenever data changes Monthly Once or twice a year

10 DNSSEC Solution Matrix Provisioning Systems Secure Key Management (Risk driver) DNSSEC Automation (Cost driver) Low High 1 st Gen Manual Tools 2nd Gen Manual Tools Secure, Automated Appliances

11 Do-It-Yourself Method BIND programs DNSSEC-Keygen & DNSSEC-Signzone Visit LDNS library  Examples include a zone-walker (follows NSEC records) and DNSSEC validation tools to check signatures, etc.  Also contain programs to manually sign zones and generate keys (alternative to BIND tools) DRILL (an interesting version of DIG) Visit Tools and programs from SPARTA labs created with DHS funding assistance to validate, error-check, sign zones, rollkeys Key signer and roller Donuts (LINT-like error checking tool) Validation tools to check signatures, etc.

12 Manual DNSSEC Deployment Steps Generate keys and Insert them into zone files Sign and publish the zones generate NSECs generate RRSIGs Do process over and over again when data changes or when keys need to be replaced OK for small deployments, but begs for automation

13 What could go wrong…will go wRornG Wrong keys Expired Keys Stolen Keys Lose the Recipe Solution doesn’t scale

14 Manual Deployment Example: Swedbank

15 Secure Key Management Offline Keys Pros Keys can be secured with proper procedures in place Cons Labor intensive for zones that change Introduces higher potential for errors Possible risk of insider attack Online Keys Pros Can sign dynamic zones Reduces operational costs Eliminates manual errors Eliminates insider attacks Cons Crypto module should be certified to FIPS level 2 or above OS must be hardened DNS data must be secured Trust in signed responses is only as good as your key and data security

16 DNSSEC Solution Matrix Provisioning Systems Secure Key Management (Risk driver) DNSSEC Automation (Cost driver) Low High 1 st Gen Manual Tools 2nd Gen Manual Tools Secure, Automated Appliances

17 Questions To Ask Your Vendors CategoryQuestion Secure Key Management Is the product FIPS certified? If so, to what level (1-4)? Can the product use an HSM (crypto card) for key management? AutomationCan the product be used to manage key material? Does the product automatically sign and re-sign zones without user intervention? Does the product automatically roll the keys without user intervention? ComplianceDoes the product generate and use keys of the appropriate size (1024, 2048 bits)? Does the product meet the most current DNSSEC specs? Does the product meet the NIST guidelines in SP ? ScalabilityCan the product sign/serve/manage multiple zones? FunctionalityCan the product generate NSEC and NSEC3 signed zones? FailoverDoes the product have a failover mechanism to ensure continuous signing? CompatibilityDoes the product integrate with Content Management Systems? Which ones? Does it work with your agency’s network infrastructure? Does it work with Microsoft AD/DHCP? How do you update zone data with the product? AuditabilityWhat logging/debugging tools are provided? How do I know if something goes wrong? Sources:

18 Secure64 Software Corporation Privately funded, Colorado-based corporation, founded in 2002 Focused on making the DNS trustworthy and secure Secure64 products: ‘DNS Authority’ & ‘DNS Signer’ Partially funded by the US Department of Homeland Security

19 Automation: the Secure64 DNS Signer Simple Deployment Automated key management, rollover, signing, re-signing Secure Key Repository Malware-immune OS FIPS compliant (pending) Scalable High performance signing algorithms Incremental zone signing Secure64 DNS Signer makes it easy to deploy DNSSEC correctly and securely

20 Simple to Configure SERVER: # Default signing policy Dnssec-automate: ON Dnssec-notify: Dnssec-ksk: 1024 RSASHA1 Dnssec-ksk-rollover: ,8 * Dnssec-ksk-siglife 7D Dnssec-zsk: 2048 RSASHA1 Dnssec:zsk-rollover: * * Dnssec-zsk-siglife 7D Dnssec-nsec-type: nsec3 Dnssec-nsec-settings: OPT-OUT 12 aabbccdd ZONE: Name: myzone. File: myzonefile Dnssec-nsec-type: nsec … DNSSEC can be deployed in days, not months Configuration file 1-line automation Optional parameters to override defaults Can be applied system-wide or zone by zone

21 Compatible With Current Infrastructure “Signer-in-the-middle” Provisioning System (IPAM, Registry, Hidden Master, Etc.) Secure64 DNS Slave BIND Slave NSD Slave Unsigned Zone Data Signed Zone Data Secure64 DNS Signer Just plug it into your existing provisioning system

22 Automation from: Large-to-Small, Static-to-Dynamic Design for the extremes and the small cases will take care of themselves

23 Challenges for Large-Scale Deployments 1. Key Generation for huge numbers of keys 2. Bulk Signing and Re-signing can take lots of time --- and you don’t have enough time 3. Small Changes to Large Zones 4. Disaster Planning: Automatic & Secure Backup of Metadata 5. Chain-of-Trust Coordination

24 Fast Signing Performance Optimized code for 1024 bits outperforms many hardware cryptography accelerators Configuration: HP Integrity rx2660 server, 1 dual core Itanium 1.4 Ghz processor, 4 GB RAM 1 zone, 177,005 records, 344,010 signatures, 1024 bit RSA SHA1 algorithm

25 Incremental Signing Challenge How fast can zone changes be signed? Can you still meet your target update interval? Solution Accept changes via DDNS or IXFR Only sign changes Update slaves via IXFR Secure64 DNS Signer Signed Zones DDNS, IXFR Keys Even the largest, most dynamic environments can be updated quickly Signing Policy >20 updates/second, regardless of # zones, zone size

26 Simplified Key Rollover Currently Manual transmission of DS record to parent Automated DS detection and rollover Next Automated transmission of DS record to parent.gov DS RR example.gov DS RR sub.example.gov DS Offline, secure process DS Public KSK Are you there, yet? Are you there, yet?

27 Disaster Recovery DNSSEC MetaData: Signing Keys – private & public Serial # tracking key rollover state Chain-of-trust info Automated backup of encrypted metadata to standard storage devices Secure backup with TPM prevents INSIDER attacks

28 “The Secure64 software was subjected to a number of attacks known to be disruptive to servers, and ignored the attacks, delivering information as requested up to the saturation point of the Gigabit connection used.” Read the full report Resistant to Network Attacks DNS Authority Results Independently tested against DDoS attacks - 100% resistant Attack characteristics provided via SNMP and syslog to help set upstream filters Easily anycasted for improved performance & DDoS resiliency

29 Benefits Summary For management Quicker implementation Reduced cost For staff Simple. Less to learn Timely. Deploy in days, not months Correct. Eliminates errors that can take you offline Secure. Protects the signing keys For users: Internet is safer to access Secure64 DNS Signer makes it easy to deploy DNSSEC correctly and securely versus

30 Secure64: The DNSSEC Leader Agencies trained with NIST: US Department of Commerce National Telecommunication Information Administration Economic and Statistics Administration Bureau of Statistics Bureau of Economic Analysis International Trade Administration US Patent and Trademark Office National Oceanic and Atmospheric Administration US Department of Health and Human Services National Institute of Health Federal Aviation Administration US Department of Housing and Urban Development US Antarctic Program US Department of Energy US Department of Agriculture US Department of the Interior National Park Service US Agency of International Development US Department of State US Nuclear Regulatory Commission US Department of Treasury Court Services and Offender Supervision Agency Federal Maritime Commission US Government Accountability Office US Department of Labor

31 Thank You! For More Information Secure64 web site: Sign up to access to an online signing engine to try it out with your own data Contact Copies of this presentation Schedule a demo of our automated DNSSEC solution DNSSEC whitepapers, newsletters, case studies Invitation to hands on training workshops (NIST, HP)