.edu DNSSEC Testbed Lessons Learned

Slides:



Advertisements
Similar presentations
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Advertisements

Module 12: Auditing SQL Server Environments
Internet Applications Update Internet Rechartering August 26, 2009.
Copyright © 2006 Software Quality Research Laboratory DANSE Software Quality Assurance Tom Swain Software Quality Research Laboratory University of Tennessee.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Deploying and Managing Software by Using Group Policy.
Microsoft ® Official Course Module 13 Troubleshooting and Recovering Windows 8.
Name Resolution Domain Name System.
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
AUTOMATION OF WEB-FORM CREATION - KINNERA ANGADI – MS FINAL DEFENSE GUIDANCE BY – DR. DANIEL ANDRESEN.
Week #3 Objectives Partition Disks in Windows® 7 Manage Disk Volumes Maintain Disks in Windows 7 Install and Configure Device Drivers.
Module 6: Deploying and Managing Software by Using Group Policy.
Evaluating & Maintaining a Site Domain 6. Conduct Technical Tests Dreamweaver provides many tools to assist in finalizing and testing your website for.
Web Server Administration Chapter 4 Name Resolution.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
1 FRED – open source registry system CZ.NIC, z.s.p.o. Jaromír Talíř
Use Cases Discuss the what and how of use cases: Basics Examples Benefits Parts Stages Guidelines.
1 Remote Installation Service Windows 2003 Server Prof. Abdul Hameed.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
ClickOnce Deployment (One-click Deployment)
Ip addressing: dhcp & dns
Windchill WorkGroup Manager (WGM) for Inventor installation
Progress Apama Fundamentals
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
Project Management: Messages
Agenda DNSSEC automation overview How to implement it in FRED
Guide to Linux Installation and Administration, 2e
Implementation Review Team Meeting
KSK Rollover Update David Conrad, CTO ICANN 59 – GAC 29 June 2017.
Module 5: Resolving Host Names by Using Domain Name System (DNS)
Use Cases Discuss the what and how of use cases: Basics Benefits
Internet Rechartering Update
Department of Computer Science
Principles of Computer Security
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 6: Planning, Configuring, And Troubleshooting WINS.
DNS.
Software Testing With Testopia
Publishing and Maintaining a Website
CZ.NIC in a nutshell Domain, DNSSEC, Turris Project and others
Lesson 9 Sharing Documents
Using DataStore Plus ActiveX in FactoryTalk View Studio ME Projects
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Google Docs Workshop Jan. 2014
To the ETS – Password Reset Online Training Course
MICROSOFT Networking with Windows Server VCE
Net 323 D: Networks Protocols
Lesson 9 Sharing Documents
Unit 3 NT1330 Client-Server Networking II Date: 1/6/2016
New Functionality in ARIN Online
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
Lesson 6: Protecting, Maintaining and Managing Databases
Training course Part 2: Administration tasks
PLC / SCADA / HMI Controllers: Name : Muhammad Zunair Comsats University Date: 28-October-2018.
What's New in eCognition 9
Standard Design Process (SDP) Software Tom Czerniewski Entergy Nuclear
Lesson 14 Sharing Documents
Ip addressing: dhcp & dns
To the ETS – Password Reset Online Training Course
DNS operator transfers with DNSSEC
Engineering Processes
Final Design Authorization
Overview Multimedia: The Role of WINS in the Network Infrastructure
Software for Home, Personal, and Educational Use
Windows Name Resolution
ClickOnce Deployment (One-click Deployment)
What's New in eCognition 9
What's New in eCognition 9
How to install and manage exchange server 2010 OP Saklani.
Presentation transcript:

.edu DNSSEC Testbed Lessons Learned Becky Granger, EDUCAUSE Shumon Huque, University of Pennsylvania April 20, 2010 1

Agenda .edu testbed EDUCAUSE registrar application functionality Overview Registrant experience Findings Lessons learned EDUCAUSE registrar application functionality Getting started with DNSSEC Implementing your own testbed Recruiting testers Managing the process

.edu DNSSEC Testbed Goal & Objectives Exercise DNSSEC registration and resolution in a representative end-to-end test environment Objectives Demonstrate that all components function properly Document where actual behavior differs from expected behavior Obtain technical feedback from registrants Inform future DNSSEC implementations in larger zones

Testbed Landscape Duration – 2 months Active Participants – 12 VeriSign: operator of the .edu registry EDUCAUSE: registrar for the .edu zone Registrants: 10 volunteering domain name holders 7 universities 3 regional networks

High-Level Architecture Test environment was a reproduction of the .edu domain name space End-to-end testing to exercise the following Registrant to Registrar (EDUCAUSE) application Registrar (EDUCAUSE) to Registry (VeriSign) application Zone file updates (Registry) Zone file updates (Registrant’s) Name server resolution (Registrant to VeriSign)

Registrant preparation for testbed Deploy authoritative DNS servers with signed zones Test servers and test zones okay Some participants used signed production servers Run “validating” resolvers Configured to use testbed .edu servers as authoritative for .edu top level domain Will be different for registrars that provide dns – at a minimum they need to provide interface for registrants, but should also consider providing it as an additional service if they offer dns services

Overview of some registrant tests Confirm connectivity to testbed Add DS records of various algorithms and digests Remove DS records Add incorrect DS records View DS record history report Perform key rollover operations and DS updates At each test stage, perform verification tests with appropriately configured validating resolver Attempt to validate records of other participants also

Current DNSSEC activity inside .edu Signed subdomains directly under .edu 7 total second level domains berkeley.edu, merit.edu, penn.edu, psc.edu, upenn.edu, internet2.edu, ucaid.edu Signed zones further down 58 more (as of Jan 2010) 3rd level domains inside universities Many are subdomains for computer science departments, or for DNS research projects. Data from SecSpider (http://secspider.cs.ucla.edu/)

Testbed Findings

Testbed Findings Registrant to Registrar application General satisfaction from registrants Minor functionality and display alterations suggested Registrar to Registry application Successfully exercised info, delete, and update EPP commands Discovered a limitation in RFC 4310, which prompted a new RFC revision (draft-gould-rfc4310bis)

Testbed Findings Zone updates Name Server resolution No issues identified; zones were updated correctly Name Server resolution Resolution worked correctly Current version of BIND is needed for NSEC3

Participant Survey Results 100% of testbed participants… Agreed that the test cases were representative of the functionality required for DNSSEC Had a high confidence level about implementing DNSSEC Most testers used BIND but other software packages worked too 7 used BIND 2 used ZKT 1 used a DNSSEC signing appliance

Participant Survey Results - Challenges Developing a strong technical understanding of the end- to-end DNSSEC process Lack of documentation and best practices for DNSSEC implementations Timing, managing, and automating key rollovers Troubleshooting validation failures

Lessons Learned

Lessons Learned - General Learn, Live, Love the RFCs RFC 4033 – DNSSEC introduction and requirements RFC 4034 – Resource records for DNSSEC RFC 4310 – DNSSEC mapping for EPP Also see revision draft-gould-rfc4310bis RFC 4641 – DNSSEC operational practices Brush up on DNS

Lessons Learned – Registrant Application Validate everything Key Tag must be an integer between 1 and 65535 Algorithm must be an integer Digest Type must be an integer SHA-1 Digests must be a sequence of 40 hexadecimal digits SHA-256 Digests must be a sequence of 64 hexadecimal digits Dig to compare the entered DS data against the public key in the domain’s zone

Lessons Learned – Registrant Application Remove whitespace automatically Allow multiple Digests to have the same Key Tag Consider automatically generating DS records Allow upload of BIND DSSET file or Allow data entry of public key information

EDUCAUSE Registrar Application

EDUCAUSE Registrar Application

EDUCAUSE Registrar Application Functional specs are in the RFC 4034. We knew what fields we needed and what the valid values were from the RFC. Also refer to EPP SDK documentation.

EDUCAUSE Registrar Application Dig , parse out the zone public key, run it thru a function to generate a DS record (function will be available in an upcoming version of the SDK – ver 3.11) , and then validate that the DS record matches what they entered in the form. Totally optional whether you want to do this or not – not required.

EDUCAUSE Registrar Application

EDUCAUSE Registrar Application Dummy data – not real! Using the update command to implement the delete buttons at the moment.

EDUCAUSE Registrar Application Value add not required

Getting Started with DNSSEC

Why Implement a DNSSEC Testbed? Make sure *you* understand the intricacies of DNSSEC Evaluate the user interface of your registrar application Make sure your registrant application WORKS Get your registrants involved Build confidence throughout the community

Recruiting Testers Ask! Include registrants with different technical ability Include registrants using different software packages

Managing Your Testbed Create a set of tests for testers to perform Specify expected results of each test and ask testers to note where their results differed Provide a way for testers to interact when they have questions Provide a central location for tracking testing progress, noting inconsistencies, and making suggestions Survey testers after testbed completion to gauge comfort with process and challenges faced Each tester completes the same tests Ensures thorough testing of all cases Ask testers to note where their results differ from expected results An e-mail listserve was effective for us We used a password-protected Google document with sheets for each tester and a master suggestion sheet

Many Resources Available Use VeriSign's DNSSEC OTE for .net and .com Test the Registrar to Registry EPP interface Leverage VeriSign’s EPP SDK & active EPP Tool Test your signing and key management solution Leverage VeriSign’s DNSSEC Tool Guide to evaluate signing solutions Engage with VeriSign’s DNSSEC Forum to ask your questions and dialogue with technical colleagues

Questions? Contact Becky Granger at rgranger@educause.edu