Measuring KSK Roll Readiness

Slides:



Advertisements
Similar presentations
IDN TLD Variants Implementation Guideline draft-yao-dnsop-idntld-implementation-01.txt Yao Jiankang.
Advertisements

Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Measuring the DNS from the Users’ perspective Geoff Huston APNIC Labs, May 2014.
A Question of Protocol Geoff Huston APNIC. Originally there was RFC791:
DT211/3 Internet Application Development JSP: Processing User input.
DNS-centric PKI Sean Turner Russ Housley Tim Polk.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Geoff Huston APNIC Labs
Tyre Kicking the DNS Testing Transport Considerations of Rolling Roots Geoff Huston APNIC.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Rev Mats Dufberg TeliaSonera, Sweden Resolving DNSsec.
Measuring DNSSEC Geoff Huston APNIC Labs, June 2014.
Rolling the Keys of the DNS Root Zone Geoff Huston APNIC Labs.
Measuring DNSSEC Use Geoff Huston APNIC Labs. We all know…
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
Rolling the Root Geoff Huston APNIC Labs. Use of DNSSEC in Today’s Internet.
Happy Eyeballs for the DNS Geoff Huston, George Michaelson APNIC Labs October 2015.
DNSSEC – Issues and Achievements Geoff Huston APNIC Labs.
What if Everyone Did It? Geoff Huston APNIC Labs.
Building Trust with Anchors Eric Osterweil Dan Massey Lixia Zhang 1.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
Developing a DNSSEC Policy The Compulsory Zone Distribution Which DNSSEC Protocol Keys – and Managing them Managing the Children Using DNSSEC Mark Elkins.
Root Zone KSK: After 5 years Elise Gerich | APNIC 40 | September 2015.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
Rolling the Root Geoff Huston APNIC Labs March 2016.
Increasing the Zone Signing Key Size for the Root Zone
Security and Stuff Geoff Huston APNIC. What I’m working on at the moment..
Geoff Huston Chief Scientist, APNIC
EDNS Client Subnet (ECS) in CDN solution
Security Issues with Domain Name Systems
Rolling the Root Zone DNSSEC Key Signing Key
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
Geoff Huston APNIC March 2017
DNS Team IETF 99 Hackathon.
KSK Rollover Update David Conrad, CTO ICANN 59 – GAC 29 June 2017.
DNSSEC Deployment Challenges
Geoff Huston APNIC Labs
Geoff Huston APNIC Labs
Root Zone KSK Rollover: delay and next steps
Living on the Edge: (Re)focus DNS Efforts on the End-Points
A quick review of DNSSEC Validation in today’s Internet
Geoff Huston APNIC Labs September 2017
Root Zone KSK Rollover Update
Geoff Huston APNIC Labs
draft-huston-kskroll-sentinel
CZ.NIC in a nutshell Domain, DNSSEC, Turris Project and others
A Speculation on DNS DDOS
CS 465 Secure Last Updated: Nov 30, 2017.
Joao Damas, Geoff Labs March 2018
DNS over IPv6 - A Study in Fragmentation
DNSSEC Basics, Risks and Benefits
ROUND ROBIN DNS Round robin DNS is usually used for balancing the load of geographically distributed Web servers. For example, a company has one domain.
Geoff Huston, Joao Damas APNIC Roy Arends ICANN
Managing Name Resolution
Re-Engineering the Root of the DNS
Root KSK Roll Update DNS-OARC 27 Matt Larson, VP of Research
What DNSSEC Provides Cryptographic signatures in the DNS
Surviving IPv6 Fragmentation
Casey Deccio Sandia National Laboratories
Geoff Huston APNIC Labs
Measuring KSK Roll Readiness
DNSSEC & KSK Rollover Patrick Jones Middle East DNS Forum & APTLD 75
PHP Forms and Databases.
The Curious Case of the Crippling DS record
Trust Anchor Signals from Custom Applications
Geoff Huston APNIC Labs
ECDSA P-256 support in DNSSEC-validating Resolvers
What part of “NO” is so hard for the DNS to understand?
Domain Name Server Presented By: Mahesh Venkat Adusumelli
The Resolvers We Use Geoff Huston APNIC.
Presentation transcript:

Measuring KSK Roll Readiness Geoff Huston APNIC Labs

The DNS may look simple

For the DNS looks are very deceiving

What we would like the DNS to be DNS Server Client DNS Resolver

What we suspect is more like theDNS Client DNS Resolver DNS Server DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver

Signalling via Queries Client DNS Resolver Server Queries DNS Resolver DNS Resolver DNS Resolver DNS Resolver The query contains information which passes inward in the DNS towards the authoritative server(s) DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver

Signalling via Responses Client DNS Resolver Server Responses DNS Resolver DNS Resolver DNS Resolver DNS Resolver The response contains information which passes backward in the DNS towards the original querier DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver DNS Resolver

KSK Roll Measurement Objective What number of users are at risk of being impacted by the KSK Roll? There are two risk elements for resolvers: Unable to receive a 1,414 octet UDP response from the root servers (query for DNSKEY RR from the root zone) Failure to follow RFC5011 key introduction procedure In either case the resolver outcome is the same: Not loading the incoming trust key into the local trusted key store And if the user passes queries only to these affected resolvers than the roll will cause a loss of DNS service

Measuring Resolvers via RFC8145 Signaling Getting resolvers to report on their local trusted key state Resolvers that support the RFC 8145 signal mechanism periodically include the key tag of their locally trusted keys into a query directed towards the root servers

What did we see at (some) roots? Duane Wessels VeriSign RFC 8145 Signaling Trust Anchor Knowledge In DNS Security Extensions Presentation to DNSSEC Workshop @ ICANN 60 – 1 Nov 2017 https://schd.ws/hosted_files/icann60abudhabi2017/ea/Duane%20Wessels-VeriSign-RFC%208145-Signaling%20Trust%20Anchor%20Knowledge%20in%20DNS%20Security%20Extensions.pdf

What is this saying? Its clear that there is some residual set of resolvers that are signalling that they have not yet learned to trust the new KSK key But its not clear if: This is an accurate signal about the state of this resolver This is an accurate signal about the identity of this resolver How many users sit ‘behind’ this resolver Whether these uses rely solely on this resolver, or if they also have alternate resolvers that they can use What proportion of all users are affected

Why? Because the DNS does not disclose the antecedents of a query If A forwards a query to B, who queries a Root Server then if the query contains an implicit signal (as in this case) then it appears that B is querying, not A At no time is the user made visible in the referred query Because caching If A and B both forward their queries via C, then it may be that one or both of these queries may be answered from C’s cache In this case the signal is being suppressed Because its actually measuring a cause, not the outcome Its measuring resolvers’ uptake of the new KSK, but is not able to measure the user impact of this

User-Side Measurement Can we devise a DNS query that could reveal the state of the trusted keys of the resolvers back to the user? Not within the current parameters of DNSSEC and/or resolver behaviour

User-Side Measurement Can we devise a DNS query that could reveal the state of the trusted keys of the resolvers back to the user? What if we could change resolver behaviour? Just as RFC8145 required a change in resolver behaviour What about a change to the resolver’s reporting of validation outcome depending on the resolver’s local trusted key state? If a query contains the label “_is-ta-<key-tag>” then a validating resolver will report validation failure if the key is NOT in the local trusted key store If a query contains the label “_not-ta-<key-tag>” then a validating resolver will report validation failure if the key IS in the local trusted key store

User-Side Resolver Measurement Three DNS queries: _is-ta-4066.<some.signed.domain> _not-ta-4066.<some.signed.domain> <badly-signed>.<some.signed.domain> Single Resolver Analysis: Resolver Behaviour Type Loaded New KSK NOT loaded New KSK Mechanism not supported Not validating Query 1 Query 2 Query 3 A SERVFAIL SERVFAIL SERVFAIL A SERVFAIL A A SERVFAIL A A A

User-Side DNS Measurement Multiple Resolver Analysis A SERVFAIL response will cause the use to repeat they query to other configured resolvers. In a multi-resolver scenario, and where forwarders are used we can still determine if the user will be impacted by the KSK roll User Impact OK NOT OK Query 1 Query 2 Query 3 A SERVFAIL SERVFAIL SERVFAIL A SERVFAIL A A SERVFAIL SERVFAIL SERVFAIL SERVFAIL A A A UNKNOWN NOT Impacted

Measuring User Impact Create these tests in a scripted web page and allow users to test the state of their resolvers Load these tests into an online ad campaign and use the ad to pass the test to millions of users If the user can resolve Query 1, and SERVFAILs on Query 2 and Query 3 then the user is able to validate using the nominated key as a trusted key If the user SERVFAILS on Query 1, resolves Query 2 and SERVFAILs on Query 3 then the user is unable to validate using the nominated key as a trusted keys Otherwise if the user SERVFAILS on Query 3 then the result is indeterminate

Privacy and Security Considerations This test itself does not reveal which resolvers are used by end users in resolving names The query itself need not contain any end user identifying material The methodology never changes “insecure” to ”authenticated” – it will only change “authenticated” to “insecure” depending on the resolver’s local trusted key state when resolving certain labels Anyone can set up a test condition within their delegated part of the DNS The results of the test are passed back only to the user in the form of a resolution outcome

A Description of the Mechanism draft-huston-kskroll-sentinel

Thanks!