DNSSec.TLD is signed! What next? V.Dolmatov November 2011.

Slides:



Advertisements
Similar presentations
DNSSEC in Windows Server. DNS Server changes Provide DNSSEC support in the DNS server – Changes should allow federal agencies to comply with SC-20 and.
Advertisements

Review iClickers. Ch 1: The Importance of DNS Security.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
1 SecSpider: Distributed DNSSEC Monitoring Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Olaf M. Kolkman. Apricot 2003, February 2003, Amsterdam. /disi Steps towards a secured DNS Olaf M. Kolkman, Henk Uijterwaal, Daniel.
DNS operator/registrar changes toolkit of actions Steve Crocker Ólafur Guðmundsson Shinkuro 2011/03/26.
Identity Management and DNS Services Tianyi XING.
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
Introduction to DNSSEC AROC Bamako, Mali, What is DNSSEC?
Rev Mats Dufberg TeliaSonera, Sweden Resolving DNSsec.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Internet Corporation for Assigned Names & Numbers Update on ITAR Elise Gerich Vice President, IANA.
DNSSEC deployment in NZ Andy Linton
1 DNSSEC Deployment: Big Steps Forward; Several Steps to Go NANOG 32 Deployment D N S S E C Rob Austein Steve Crocker
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
AU, March 2, DNSSEC, APNIC, & how EPP might play a Role Ed Lewis DNS SIG APNIC 21.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
Building Trust with Anchors Eric Osterweil Dan Massey Lixia Zhang 1.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Deploying DNSSEC. Pulling yourself up by your bootstraps João Damas ISC.
BIND 10 DNS Project Status + DNS Resolver Status/Plans Shane Kerr 23 January 2013.
DNSSEC usage statistics and some observations SEE 5, Tirana Sergey Myasoedov
1 Improving the resilience of DNS ENISA – Athens Productive DNSSEC environments Lutz Donnerhacke IKS GmbH, Jena DNSSEC e164.arpa.
Security Issues with Domain Name Systems
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
SaudiNIC Riyadh, Saudi Arabia May 2017
DNS Security Advanced Network Security Peter Reiher August, 2014
Agenda DNSSEC automation overview How to implement it in FRED
Lecture 20 DNS Sec Slides adapted from Olag Kampman
In collaboration with HKCERT and HKIRC July 2016
DNS Security.
KSK Rollover Update David Conrad, CTO ICANN 59 – GAC 29 June 2017.
Domain Name System Tony Kombol ITIS 3110.
State of DNSSEC deployment ISOC Advisory Council
IT443 – Network Security Administration Instructor: Bo Sheng
Cryptography and Network Security
Living on the Edge: (Re)focus DNS Efforts on the End-Points
DNSSEC Operations in .gov
Geoff Huston APNIC Labs September 2017
Authentication Applications
(ITI310) SESSIONS 6-7-8: Active Directory.
DNSSEC made simple. DNSSEC made simple ~]$ whoami Emil Natan, CTO, ISOC-IL.
DNS Cache Poisoning Attack
CZ.NIC in a nutshell Domain, DNSSEC, Turris Project and others
The Last Link in the DNSSEC Chain of Trust
S/MIME T ANANDHAN.
A Longitudinal, End-to-End View of the DNSSEC Ecosystem
DNS security.
DNSSEC Basics, Risks and Benefits
IIS.
TRA, UAE May 2017 DNSSEC Introduction TRA, UAE May 2017
DNSSEC: An Update on Global Activities
.edu DNSSEC Testbed Lessons Learned
Root KSK Roll Update DNS-OARC 27 Matt Larson, VP of Research
What DNSSEC Provides Cryptographic signatures in the DNS
Measuring KSK Roll Readiness
Geoff Huston APNIC Labs
DNS operator transfers with DNSSEC
DNSSEC & KSK Rollover Patrick Jones Middle East DNS Forum & APTLD 75
DNSSEC Status Update in UA
The Curious Case of the Crippling DS record
.uk DNSSEC Status update
ECDSA P-256 support in DNSSEC-validating Resolvers
Neda Kianpour - Lead Network Engineer - Salesforce
Presentation transcript:

DNSSec.TLD is signed! What next? V.Dolmatov November 2011

Topics DNSSec now (Nov.2011) Cryptography in DNSSec DNSSec caveats and pitfalls

DNSSec at glance (managerial view) 15 years of development (!) Finally, root zone is signed and deployed Some (84 of 310 ) TLDs are signed Some (78 of 84) of signed TLDs are linked with the root by DS-records Some (few!) registrars are DNSSEC- aware, more to come

DNS at glance (Technical view) NS A, MX, etc. Root -..tld.domain.tld.TLD Registry Root operator.TLD Registrar DNS administrator Domain administrator User DNS caching resolver named.r oot

DNSSec at glance (Technical view) DNSKEY RRSIG DS DNSKEY RRSIG DS DNSKEY RRSIG Root -..tld.domain.tld.TLD Registry Root operator.TLD Registrar DNS administrator Domain administrator User DNS caching resolver Trust anchor

Cryptic cryptos Cryptography is a sensitive field Cryptography has a lot of specifics Cryptography is monitored and controlled by governments There are different specific laws and rules in different countries which should be followed simultaneously

GOST cryptography ГОСТ , ГОСТ Р , ГОСТ Р (open and proved to be reliable and stable) RFCs 5830, 5831, 5832 Open and not limited usage in the world Certified implementations should be used for public services and/or personal data handling in Russia

GOST in DNSSEC RFC 5933 – Standard Track RRSIG algorithm code – 12 DS algorithm code – 3 Fully featured DNSSEC set of GOST algorithms

GOST implementation OpenSSL 1.0.0a and later (implemented by Cryptocom) Unbound – included by default Bind – included by default

DNSSEC with GOST in the wild. (root is RSA signed) TLD.org (is RSA signed) dnssec-with-gost.org (is GOST signed) gost.dnssec-with-gost.org (is GOST signed) rsa.dnssec-with-gost.org (is RSA signed)

RSA-GOST chain – OK!

RSA-GOST-RSA chain – OK!

How to switch it on? Unbound ldns – ready now! bind ready now! Cryptography Open version – OpenSSL 1.0.0a Certified version – “MagPro DNS” by Cryptocom OpenDNSSEC (support moved to 2.x version)

DNSSEC in Russia All main DNSSEC services are GOST- capable Certified GOST DNSSEC is also available Waiting for DNSSEC GOST-capable support in.RU,.SU and.РФ TLDs Usage in other TLDs is not restricted

DNSSec Caveats and pitfalls Wrong feeling of «security» («using cryptography makes everything secure») Generating keys and switching DNSSec «on» in given zone does NOT mean automatic increase in the security of this zone Signing TLD zone and linking it to the root does NOT mean «DNSSec implementation» in this zone DNSSec demands a LOT of changes in DNS operations and procedures in TLD

DNSSec at glance (Operational view) DNSKEY RRSIG DS DNSKEY RRSIG DS DNSKEY RRSIG Root -..tld.domain.tld.TLD Registry Root operator.TLD Registrar DNS administrator Domain administrator User DNS caching resolver Trust anchor

DNSSec Caveats and pitfalls (Cont.) Wrong feeling of «authenticity» («using DNSSec makes everything authentic») DNSSec was designed to solve particular DNS operation problems Signed DNS-record does NOT add any trust to the resource it points to (Hello, JANE, EFF and other «initiatives» ) Huge problems with random data sources

Questions?