DNSSEC: An Update on Global Activities

Slides:



Advertisements
Similar presentations
Get ready! New-gTLD Preparedness Project Thoughts August, 2013 © Mikey OConnor (just attribution is fine) version 0.3.
Advertisements

INDIANAUNIVERSITYINDIANAUNIVERSITY GENI Global Environment for Network Innovation James Williams Director – International Networking Director – Operational.
ICANN Plan for Enhancing Internet Security, Stability and Resiliency.
International Telecommunication Union ENUM Issues and Solutions Houlin Zhao Director Telecommunication Standardization Bureau International Telecommunication.
PRINCIPLES OF A CALIBRATION MANAGEMENT SYSTEM
Course: e-Governance Project Lifecycle Day 1
Microsoft ® System Center Configuration Manager 2007 R3 and Forefront ® Endpoint Protection Infrastructure Planning and Design Published: October 2008.
Internet Identity For All.my ccTLD IPv6 Update By Lai Heng Choong Head of Application, Database and Security.my DOMAIN REGISTRY APTLD Member Meeting, 1.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Security for the Internet’s Domain Name System DNSSEC Current State of Deployment Prepared for Internet2 BoF Amy Friedlander, Shinkuro, Inc. Based on a.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
Chapter 6 of the Executive Guide manual Technology.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Update on IPv6 Transition U.S. Federal IPv6 Task Force Jane Coffin Co-Chair of the U.S. Federal IPv6 Task Force August 2011 – CITEL PCC.I, Mar del Plata,
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
1 ESnet DNSSEC Update ESCC/Internet2 Joint Techs Workshop February 14, 2007 R. Kevin Oberman Network Engineer Lawrence Berkeley National Laboratory.
DNSSEC Deployment Initiative: Roadmap Version 2.0 Suresh Krishnaswamy, SPARTA Steve Crocker, Shinkuro, Inc.
1 DNSSEC Deployment: Big Steps Forward; Several Steps to Go NANOG 32 Deployment D N S S E C Rob Austein Steve Crocker
DNSSEC-Deployment.org Secure Naming Infrastructure Pilot (SNIP) A.gov Community Pilot for DNSSEC Deployment JointTechs Workshop July 18, 2007 Scott Rose.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
National Geospatial Enterprise Architecture N S D I National Spatial Data Infrastructure An Architectural Process Overview Presented by Eliot Christian.
NATIONAL INCIDENT MANAGEMENT SYSTEM Department of Homeland Security Executive Office of Public Safety.
U N I T E D S T A T E S D E P A R T M E N T O F C O M M E R C E N A T I O N A L O C E A N I C A N D A T M O S P H E R I C A D M I N I S T R A T I O N.
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
ENF/ERO ENUM Convergence Workshop Tony Holmes Chairman ETSI SPAN11 NAR BTexact Technologies Numbering Addressing & Routeing 9-10 January 2002 Standards.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Bob Jones EGEE Technical Director
Security Issues with Domain Name Systems
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
KSK Rollover Update David Conrad, CTO ICANN 59 – GAC 29 June 2017.
JRA3 Introduction Åke Edlund EGEE Security Head
State of DNSSEC deployment ISOC Advisory Council
Principles of Computer Security
Ian Bird GDB Meeting CERN 9 September 2003
InCommon Steward Program: Community Review
Securing the Network Perimeter with ISA 2004
Internet2 DNSSEC Pilot Shumon Huque University of Pennsylvania
IS4680 Security Auditing for Compliance
EOB Methodology Overview
Lame DNS Server Sweeping
Information Security Board
IDN Variant TLDs Program Update
Description of Revision
ICANN62 GAC Capacity Building
.edu DNSSEC Testbed Lessons Learned
Leigh Grundhoefer Indiana University
What DNSSEC Provides Cryptographic signatures in the DNS
APNIC Trial of Certification of IP Addresses and ASes
IS4550 Security Policies and Implementation
Future DNSSEC Directions
NET 536 Network Security Lecture 8: DNS Security
Continuity Guidance Circular Webinar
Implementation of ENUM on telecommunication networks
NET 536 Network Security Lecture 6: DNS Security
Research data preservation in Canada
Internet2 DNSSEC Pilot Shumon Huque University of Pennsylvania
GENI Global Environment for Network Innovation
Group Meeting Ming Hong Tsai Date :
Employee engagement Delivery guide
DNSSEC & KSK Rollover Patrick Jones Middle East DNS Forum & APTLD 75
NGEC Executive Board Meeting
The National IPv6 Roadmap and its Regulatory Role
Module 1.1 Overview of Master Facility Lists in Nigeria
Presentation transcript:

DNSSEC: An Update on Global Activities Dept. of Homeland Security Science & Technology Directorate DNSSEC: An Update on Global Activities EDUCAUSE Net@EDU Annual Mtg Tempe, AZ February 12, 2008 Douglas Maughan, Ph.D. Program Manager, CCI douglas.maughan@dhs.gov 202-254-6145 / 202-360-3170 11/19/2018

National Strategy to Secure Cyberspace The National Strategy to Secure Cyberspace (2003) recognized the DNS as a critical weakness NSSC called for the Department of Homeland Security to coordinate public-private partnerships to encourage the adoption of improved security protocols, such as DNS The security and continued functioning of the Internet will be greatly influenced by the success or failure of implementing more secure and more robust BGP and DNS. The Nation has a vital interest in ensuring that this work proceeds. The government should play a role when private efforts break down due to a need for coordination or a lack of proper incentives. 11/19/2018

Domain Name System Security (DNSSEC) Program DNSSEC Program Objective “Carry forward to completion the recommendation from the National Strategy to Secure Cyberspace by engaging industry, government, and academia to enable all DNS-related traffic on the Internet to be DNSSEC compliant” Rationale / Background / Historical: DNS is a critical component of the Internet infrastructure and was not designed for security DNS vulnerabilities have been identified for over a decade and we are addressing these vulnerabilities End Goal: Greatly increase the security of the Internet (as critical infrastructure) by securing the DNS through the use of crypto signatures 11/19/2018

Performers Shinkuro, Washington, DC Sparta, Columbia, MD Roadmap Development and Execution International partner participation Support Tool Development Sparta, Columbia, MD Software Development – Servers, resolvers, applications Internet Standards activities NIST, Gaithersburg, MD Measurement and Evaluation Tools Government and Standards activities Connections with GSA, FISMA, and OMB 11/19/2018

DNSSEC Initiative Activities Roadmap published in February 2005; Revised March 2007 http://www.dnssec-deployment.org/roadmap.php Multiple workshops held world-wide DNSSEC testbed developed by http://www-x.antd.nist.gov/dnssec/ Involvement with numerous deployment pilots Formal publicity and awareness plan including newsletter Working with Civilian government (.gov) to develop policy and technical guidance for secure DNS operations and beginning deployment activities at all levels. Working with the operators of the “.us” and “.mil” zones towards DNSSEC deployment and compliance 11/19/2018

DNSSEC Roadmap Identifies the following activities: Remaining R&D Issues (Lead: Shinkuro) Software Development (Lead: Sparta) Server Resolver Applications Operational Considerations (Lead: Shinkuro) Root Registries Registrants Measurement and Evaluation (Lead: NIST) Outreach and Training (Lead: Shinkuro) 11/19/2018

Incremental Deployment Registries Work through various readiness levels Initial study -> Initial design -> Pilot -> Pre-deployment -> Operation Registrars Migrate to an EPP-based system Build extensions for existing non-EPP system ISPs Validation as a preferred service for some customers. Manage customized set of Trust Anchors for set of customers Detect key rollover events for known islands of trust Enterprise Internal deployment as part of corporate system integrity and protection Trading partners Distinguish between safe and questionable sites 11/19/2018

Leveraging Existing Efforts ccTLDs with operational DNSSEC Services Sweden: http://www.iis.se/products/sednssec2 Bulgaria: https://www.register.bg/ Brazil: https://www.registro.br Puerto Rico: http://www.dnssec.nic.pr/ RIPE-NCC Reverse zones that it manages and e164.arpa zone (ENUM) https://www.ripe.net/rs/ DNSSEC initiatives in .UK and .DE Strong advocates of DNSSEC, but waiting for NSEC3 for some zones http://www.denic.de/en/domains/dnssec/index.html and http://www.nominet.org.uk/tech/dnssectest/ JPRS Working on integrating DNSSEC signing into existing workflow to maintain short update assurances http://losangeles2007.icann.org/node/77 11/19/2018

Leveraging Existing Efforts (cont) NIC Mexico Developing the infrastructure, procedures and technology for a future DNSSEC deployment in the .mx ccTLD http://www.dnssec.org.mx .ORG testbed PIR has maintained the .ORG testbed to enable its registrars to test DNSSEC-capable systems http://www.pir.org/RegistrarResources/DNSSecurityTestbed.aspx SNIP testbed for .GOV Provide “distributed training ground” for .gov operators deploying DNSSEC http://www.dnsops.gov IANA Testbed for signing zones that IANA controls Also has a prototype for ‘a’ signed copy of the Root zone https://ns.iana.org/dnssec/status.html 11/19/2018

FISMA Activities Intended to set the IT security policy for all USG systems, contractors, and data. Collection of documents produced by NIST FIPS, Special Publications (SP) series Goes into effect one year after publication of security controls publication (SP 800-53r1) Published Dec, 2006 -> goes into effect Dec, 2007 NIST Special Pub 800-53A Guide for Assessing the Security Controls in Federal Information Systems Final publication scheduled Dec 2007 NIST SP800-57 Recommendations for Key Management 3-part companion guide to FISMA

The Big Picture – DNSSEC in .gov Internet2 DNSSEC Pilot SNIP Core Infrastructure dnsops.gov. dnsops.biz esnet.doe.dnsops.gov. fda.dnsops.gov. zoneedit dhs.dnsops.gov. nist.dnsops.gov. ag1.dnsops.gov. ag2.dnsops.biz. DREN DNSSEC Pilot dns-outsource.com antd.nist.dnsops.gov. 11

NIST Effort - SNIP Secure Naming Infrastructure Pilot (SNIP) Aiding deployment by: Providing a connected training ground Educational resources/guides Modeling infrastructures Testbed for systems Relying on user participation Aid in deployment, not a proof-of-concept experiment 11/19/2018

SNIP Overview Agencies get delegations to run a secure “shadow-zone” nist.gov becomes nist.dnsops.gov Contractors become “contractor.dnsops.biz” Administrators use dnsops.gov/biz delegation to practice DNSSEC operations Infrastructure modeling Attempts to model an agency’s current DNS in NIST/Sparta labs Testbed for systems Authoritative servers, caches, and DNSSEC administrator tools 11/19/2018

Need for Signing the Root Zone Root Zone is at the top of the DNS hierarchy Signing the Root Zone will allow DNSSEC-capable resolvers to perform the data integrity and origin authenticity checks using the Root Zone Public Key(s) as the common trust point(s). A signed Root Zone and a widely deployed DNS system that supports DNSSEC will be a major step forward in the ongoing effort to secure the Internet 11/19/2018

Root Zone Requirements Full operation of DNSSEC at the Root level requires several component capabilities Generation and Maintenance of Keys Accepting “secure delegation” from TLDs Signing the Root Zone and handling of private key material Distribution and the subsequent “serving” of the signed Root Zone by Root Name Server Operators Publication of the Root Zone Public Keys 11/19/2018

Future Activities Pilot deployments of DNSSEC on .us and .gov networks Continue getting all the necessary government players Working with OMB, DHS, DOC on rollout strategy Outreach, communication and training Preparation of root servers Testing of end user software gTLD and ccTLD testbeds Community-based identification of existing software Candidate operational policies and procedures 11/19/2018

Summary and Challenge Lots of progress over the past 24 months More to come in 2008 USG taking a leadership role Working with other parts of Internet infrastructure Working with vendors Providing resources to help others Challenge: What’s keeping you from securing your DNS infrastructure? 11/19/2018

For more information, visit http://www.cyber.st.dhs.gov Douglas Maughan, Ph.D. Program Manager, CCI douglas.maughan@dhs.gov 202-254-6145 / 202-360-3170 For more information, visit http://www.cyber.st.dhs.gov 11/19/2018