Rolling the Root Zone DNSSEC Key Signing Key

Slides:



Advertisements
Similar presentations
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License DNSSEC ROLLING.
Advertisements

State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Deploying DNSSEC in Windows Server 2012 David Cates Platform Services Group Microsoft Corporation.
IANA Status Update ARIN XXVI meeting, Atlanta Barbara Roseman October 2010.
Welcome to IANA Activities Update Elise Gerich | APRICOT 2015 | 4 March 2015.
1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
IANA Activities Update Jean-Jacques Sahel | RIPE 70 Amsterdam| 15 May 2015.
DNS-centric PKI Sean Turner Russ Housley Tim Polk.
PKI To The Masses IPCCC 2004 Dan Massey USC/ISI. 1 March PKI Is Necessary l My PKI related actions since arriving at IPCCC n Used an.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Introduction to DNSSEC AROC Bamako, Mali, What is DNSSEC?
Tyre Kicking the DNS Testing Transport Considerations of Rolling Roots Geoff Huston APNIC.
IANA Activities Update Naela Sarras | ARIN 35 San Francisco | 14 April 2015.
© 2015 ISC November 2013 Sunset for the DLV?. © 2015 ISC Background (c) Interested
Root Zone KSK: The Road Ahead Edward Lewis | DNS-OARC & RIPE DNSWG | May 2015
Rolling the Keys of the DNS Root Zone Geoff Huston APNIC Labs.
Text #ICANN51. Text #ICANN51 DAY October 2014 Presentation Title Presenter Name Presenter Title Session Name.
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
OpenDNSSEC Deployment Tianyi Xing. Roadmap By mid-term – Establish a DNSSEC server within the mobicloud system (Hopfully be done by next week) Successfully.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
Root Zone KSK Maintenance Jaap Akkerhuis | ENOG -10 | October 2015.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
The VVSG 2005 Revision Overview EAC Standards Board Meeting February 26-27, 2009 John P. Wack NIST Voting Program National Institute.
Rolling the Root Geoff Huston APNIC Labs March 2016.
Increasing the Zone Signing Key Size for the Root Zone
Geoff Huston Chief Scientist, APNIC
Key management issues in PGP
What’s New at the Development and Public Responsibility Department?
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Security Issues with Domain Name Systems
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
A longitudinal, End-to-End View of the DNSSEC Ecosystem
ICANN Africa Strategy FY16 – FY20
Project Management: Messages
DNS Security Advanced Network Security Peter Reiher August, 2014
New gTLD Program Reviews and Related Work
DNS Team IETF 99 Hackathon.
Implementation Review Team Meeting
KSK Rollover Update David Conrad, CTO ICANN 59 – GAC 29 June 2017.
SSL Certificates for Secure Websites
State of DNSSEC deployment ISOC Advisory Council
IT443 – Network Security Administration Instructor: Bo Sheng
Implementation Review Team Meeting
Root Zone KSK Rollover: delay and next steps
IANA Stewardship Transition
Living on the Edge: (Re)focus DNS Efforts on the End-Points
Internet2 DNSSEC Pilot Shumon Huque University of Pennsylvania
Geoff Huston APNIC Labs September 2017
Root Zone KSK Rollover Update
CZ.NIC in a nutshell Domain, DNSSEC, Turris Project and others
ICANN Update APStar Retreat | 21 Feb 2016
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DANE: The Future of Transport Layer Security (TLS)
DNSSEC Iván González Montemayor A
The Issue We all depend on the Internet
Using SSL – Secure Socket Layer
Root KSK Roll Update DNS-OARC 27 Matt Larson, VP of Research
What DNSSEC Provides Cryptographic signatures in the DNS
Measuring KSK Roll Readiness
Geoff Huston APNIC Labs
Encrypting DNS traffic
Internet2 DNSSEC Pilot Shumon Huque University of Pennsylvania
Measuring KSK Roll Readiness
DNS operator transfers with DNSSEC
DNSSEC & KSK Rollover Patrick Jones Middle East DNS Forum & APTLD 75
Security of People, Property and Information
DNSSEC Status Update in UA
The Curious Case of the Crippling DS record
Trust Anchor Signals from Custom Applications
.uk DNSSEC Status update
Presentation transcript:

Rolling the Root Zone DNSSEC Key Signing Key Alexandra Kulikova| EE DNS Forum| 1 December, 2016 Alexandra.kulikova@icann.org

Motivation for this talk ICANN is about to change an important configuration parameter in DNSSEC For a network operator, this may create a need for action This discussion is meant to inform: Why this is happening, what is happening, and when Highlighting: the availability of project plan documents

Trust Anchors & Root KSK 1 2 3 Trust Anchors & Root KSK Root Zone DNSSEC KSK Roll Project

DNS for Those Who Don’t Like Protocols What is the IPv6 address for www.example.com.? www.example.com. is 2001:db8::

DNS for Those Who Don’t Like Protocols What is the IPv6 address for www.example.com.? www.example.com. is 2001:db8:: Digital signature by example.com.

What is DNSSEC Validation? Validation includes the process of inspecting the digital signature and the data to verify the answer is the appropriate one The signature and data need a public key, a chain of keys, and the trust anchor Software tools today can do this when configured Validation is more than a cryptographic check Is the answer related to the question? Is the answer “fresh”, replayed, and so on?

Why Bother? Why bother? Validation is “self-protection” for clients The DNS protocol is gullible, easily fooled Forged answers in DNS can result in misdirected traffic Protect your DNS service, protect customers Validation is “self-protection” for clients With DNSSEC as a base Extensions to secure email transfer (stop spam) Supplement to PKIX certificate operations

Roles of Keys in DNSSEC DNSSEC has two kinds of cryptographic keys. The records exist because of the use of the data or “role”/“job” KSK – Key Signing Key, produce signatures of keys ZSK – Zone Signing Key, produces all other signatures Both types of keys are kept in DNSKEY resource records

Crypto-checking a Signature www.example.com. is 2001:db8:: ✔ ? Digital signature by example.com. OR ✖ example.com. ZSK

Trusting a Key root KSK The Root root ZSK com. DS com. KSK .COM com. ZSK example.com. DS example example.com. KSK example.com. ZSK

Over 1300 DNS - DNSSEC TLDs root KSK The Root root ZSK com. DS net. DS .COM .BR .UK org. DS lk. DS .SE .中国 .ORG uk. DS .LK Over 1300 DS sets! .NET .NL .INFO +Over 500K in com...

Anchor of the Chain of Trust The Root root KSK root ZSK com. DS .COM com. KSK com. ZSK example.com. DS example example.com. KSK example.com. ZSK

What is a Trust Anchor? It is the “top” of any DNSSEC validation process A trust anchor is a key into which an operator places full faith and trust for the purposes of verifying responses It might be implicitly trusted because it came with the software It might be explicitly trusted because of due diligence examination by the operator

Trust Anchors & Root KSK 1 2 3 Trust Anchors & Root KSK Root Zone DNSSEC KSK Roll Project

DNSSEC in the Root Zone DNSSEC in the root zone is managed by ICANN and Verisign ICANN, responsible for operating the root KSK KSK lifecycle management, “sign the ZSK” Verisign, responsible for operating the root ZSK ZSK lifecycle management, “sign the root zone” These activities are coordinated but are operated separately

Current Root KSK The current root KSK was created in 2010 Stored in hardware security modules (HSMs) Two key management facilities (KMFs) have the same data as redundant backups (The operation of these is an entirely different talk)

Getting and Validating the Root KSK The root KSK comes in the DNS ...but is only as reliable as the data in unprotected DNS Get the trust anchor validation from IANA directly https://data.iana.org/root-anchors/root-anchors.xml Secured by a PKIX certificate and signature Trust anchor validation may also come by other means Might come in the source code of your validating software

Changing the Root KSK The root KSK is changing for the first time This plan is precedent-setting because it involves an uncountable roster of participants and impacted parties When the KSK changes, anyone who relies on it has to change a configuration on their end Although their software might make this happen automatically We don’t know who is relying on it because they don’t have to register anywhere

Why make this change? Good cryptographic hygiene Secrets may not remain secret forever Good operational hygiene Have a plan that is complete enough to execute Exercise the plan under normal circumstances Why not first do a private test? The change of the KSK involves everyone doing DNSSEC validation on the Internet, service operators, software producers

Bottom Line Changing the root KSK will impact just about all DNSSEC validations If the trust anchor is “misconfigured” (i.e., the wrong key) DNSSEC will reject legitimate responses To anyone or any process relying on DNS, it will appear that the desired data is unavailable, website is unreachable, “the Internet is down”

Trust Anchors & Root KSK 1 2 3 Trust Anchors & Root KSK Root Zone DNSSEC KSK Roll Project

Overview of Project Plans Steps are happening now The new KSK was created on October 27, 2016 If the plan stays on track, on October 11, 2017 a new KSK will go into use and the current KSK retired If someone is validating using manual configuration, they need to have the new trust anchor in place by that date Plans include Following Automated Updates of DNSSEC Trust Anchors Fitting the roll into normal maintenance events Testing and monitoring

The KSK Rollover Plan Documents Available at: https://www.icann.org/kskroll 2017 KSK Rollover Operational Implementation Plan 2017 KSK Rollover Systems Test Plan 2017 KSK Rollover Monitoring Plan 2017 KSK Rollover External Test Plan 2017 KSK Rollover Back Out Plan We encourage interested folks to given them a read

Operational Implementation Plan Dates Plans publicly available from July 22, 2016 Key signing ceremonies Q4 2016 ceremony (October 27): generate KSK-2017 Q1 2017 ceremony (February): KSK-2017 operationally ready DNS changes KSK-2017 added to root zone on July 11, 2017 (with KSK-2010 still there) KSK-2017 signs DNSKEY RRset (instead of KSK-2010) beginning October 11, 2017 KSK-2010 revoked on January 11, 2018 but is still in the root zone

DNS Response Size Concerns Specific DNS responses will grow to 1425 bytes during the project Experimentation, especially in IPv6, suggests this might be a concern despite empirical evidence to the contrary How to avoid potential problems Where UDP is allowed to port 53, also allow TCP Do not filter DNS messages based on size

Dates to Watch September 19, 2017: The root zone DNSKEY set will increase to 1414 bytes for 20 days Prior to that date, 1139 bytes has been the high water mark October 11, 2017: The root zone DNSKEY set will be signed only by the new KSK January 11, 2018: The root zone DNSKEY set will increase to 1425 bytes for 20 days

Trust Anchor Management Automated updates of DNSSEC trust anchors Most direct, reliable means for getting the key Often called “RFC 5011 updates” Manual configuration Are your trust anchors subject to configuration control? Do you know how your software is configured? Are DNSSEC validation failures monitored?

Tools & Testbeds We are working with DNS software and tool developers and distributors Management/troubleshooting aids Updates of bundled keys Testbeds for Service Operators Can test your setup to see if automatic updates for new trust anchors work Planned for end-of-2016

For More Information Join the ksk-rollover@icann.org mailing list: https://mm.icann.org/listinfo/ksk-rollover Follow on Twitter @ICANN Hashtag: #KeyRoll Visit the web page: https://www.icann.org/kskroll Note: inserted graphics

Engage with ICANN Thank You and Questions Reach me at: Email: ksk-rollover@icann.org Website: icann.org/kskroll twitter.com/icann gplus.to/icann facebook.com/icannorg weibo.com/ICANNorg You can adjust the email/web address to whichever email or web address is best suited to your presentation. This should be your final slide. linkedin.com/company/icann flickr.com/photos/icann youtube.com/user/icannnews slideshare.net/icannpresentations