Measuring KSK Roll Readiness

Slides:



Advertisements
Similar presentations
IDN TLD Variants Implementation Guideline draft-yao-dnsop-idntld-implementation-01.txt Yao Jiankang.
Advertisements

0 Considerations on T2S Migration: Special contingency cases during migration T2S Programme Office European Central Bank T2S Advisory Group - 19 November.
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Measuring the DNS from the Users’ perspective Geoff Huston APNIC Labs, May 2014.
CMSC 414 Computer (and Network) Security Lecture 17 Jonathan Katz.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Geoff Huston APNIC Labs
Tyre Kicking the DNS Testing Transport Considerations of Rolling Roots Geoff Huston APNIC.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Measuring DNSSEC Geoff Huston APNIC Labs, June 2014.
Rolling the Keys of the DNS Root Zone Geoff Huston APNIC Labs.
Web Application Security Raymond Camden
Measuring DNSSEC Use Geoff Huston APNIC Labs. We all know…
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Rolling the Root Geoff Huston APNIC Labs. Use of DNSSEC in Today’s Internet.
Happy Eyeballs for the DNS Geoff Huston, George Michaelson APNIC Labs October 2015.
DNSSEC – Issues and Achievements Geoff Huston APNIC Labs.
What if Everyone Did It? Geoff Huston APNIC Labs.
Building Trust with Anchors Eric Osterweil Dan Massey Lixia Zhang 1.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
Developing a DNSSEC Policy The Compulsory Zone Distribution Which DNSSEC Protocol Keys – and Managing them Managing the Children Using DNSSEC Mark Elkins.
Root Zone KSK: After 5 years Elise Gerich | APNIC 40 | September 2015.
DNS64 draft-bagnulo-behave-dns64-01 m. bagnulo, P. Matthews, I. van Beijnum, A. Sullivan, M. Endo IETF 73 - Mineapolis.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
Rolling the Root Geoff Huston APNIC Labs March 2016.
Deploying DNSSEC. Pulling yourself up by your bootstraps João Damas ISC.
Security and Stuff Geoff Huston APNIC. What I’m working on at the moment..
Geoff Huston Chief Scientist, APNIC
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
Geoff Huston APNIC March 2017
Lecture 20 DNS Sec Slides adapted from Olag Kampman
DNS Team IETF 99 Hackathon.
KSK Rollover Update David Conrad, CTO ICANN 59 – GAC 29 June 2017.
What’s the relationship here?
Geoff Huston APNIC Labs
Geoff Huston APNIC Labs
Root Zone KSK Rollover: delay and next steps
“Size of DNS” Size of the DNS can be describe from the time before it was created all the computer on a network used to receive a host file named HOST.TXT,
Living on the Edge: (Re)focus DNS Efforts on the End-Points
A quick review of DNSSEC Validation in today’s Internet
Geoff Huston APNIC Labs September 2017
DNS.
Root Zone KSK Rollover Update
Geoff Huston APNIC Labs
draft-huston-kskroll-sentinel
A proposal to deprecate ip6.int reverse DNS service in APNIC
CZ.NIC in a nutshell Domain, DNSSEC, Turris Project and others
Domain Name System Presentation
Joao Damas, Geoff Labs March 2018
DNS over IPv6 - A Study in Fragmentation
Geoff Huston, Joao Damas APNIC Roy Arends ICANN
D* (DNS, and DNSSEC and DDOS)
Managing Name Resolution
Re-Engineering the Root of the DNS
Root KSK Roll Update DNS-OARC 27 Matt Larson, VP of Research
What DNSSEC Provides Cryptographic signatures in the DNS
Surviving IPv6 Fragmentation
Measuring KSK Roll Readiness
An Update on Multihoming in IPv6 Report on IETF Activity
Casey Deccio Sandia National Laboratories
Geoff Huston APNIC Labs
DNSSEC Status Update in UA
The Curious Case of the Crippling DS record
Trust Anchor Signals from Custom Applications
Geoff Huston APNIC Labs
ECDSA P-256 support in DNSSEC-validating Resolvers
What part of “NO” is so hard for the DNS to understand?
Domain Name Server Presented By: Mahesh Venkat Adusumelli
The Resolvers We Use Geoff Huston APNIC.
Presentation transcript:

Measuring KSK Roll Readiness Geoff Huston APNIC Labs

Measurement Objective What number of users are at risk of being impacted by the KSK Roll? There are two risk elements for resolvers: Unable to receive a 1,414 octet UDP response from the root servers (query for DNSKEY RR from the root zone) Failure to follow RFC5011 key introduction procedure In either case the resolver outcome is the same: Not loading the incoming trust key into the local trusted key store And if the user passes queries only to these affected resolvers than the roll will cause a loss of DNS service

Measuring Resolvers Getting resolvers to report on their local trusted key state Resolvers that support the RFC8145 signal mechanism periodically include the key tag of their locally trusted keys into a query directed towards the root servers But: The signal is only visible to root servers DNS forwarders confuse the attribution of the signal And the number of users that rely on reporting resolvers is not apparent And it is unclear whether the user has alternate resolvers that they can use

User-Visible Resolver Measurement Can we devise a DNS query that could reveal the state of the trusted keys of the resolvers back to the user? Not within the current parameters of DNSSEC and/or resolver behaviour But what if we could change resolver behaviour? Just as RFC8145 required a change in resolver behaviour What about a change to the resolver’s reporting of validation outcome depending on the resolver’s local trusted key state? If a query contains the label “_is-ta-<key-tag>” then a validating resolver will report validation failure if the key is NOT in the local trusted key store If a query contains the label “_not-ta-<key-tag>” then a validating resolver will report validation failure if the key IS in the local trusted key store

User-Visible Resolver Measurement Three DNS queries: _is-ta-4066.<some.signed.domain> _not-ta-4066.<some.signed.domain> <badly-signed>.<some.signed.domain> Single Resolver Analysis: Resolver Type Loaded New KSK NOT loaded New KSK Mechanism not supported Not validating Query 1 Query 2 Query 3 A SERVFAIL SERVFAIL SERVFAIL A SERVFAIL A A SERVFAIL A A A

User-Visible Resolver Measurement Multiple Resolver Analysis A SERVFAIL response will cause the use to repeat they query to other configured resolvers. In a multi-resolver scenario, and where forwarders are used we can still determine if the user will be impacted by the KSK roll User Impact OK NOT OK UNKNOWN NOT Impacted Query 1 Query 2 Query 3 A SERVFAIL SERVFAIL SERVFAIL A SERVFAIL A A SERVFAIL SERVFAIL SERVFAIL SERVFAIL A A A

Measuring User Impact Create these tests in a scripted web page and allow users to test the state of their resolvers Load these tests into an online ad campaign and use the ad to pass the test to millions of users If the user can resolve Query 1, and SERVFAILs on Query 2 and Query 3 then the user is able to validate using the nominated key as a trusted key If the user SERVFAILS on Query 1, resolves Query 2 and SERVFAILs on Query 3 then the user is unable to validate using the nominated key as a trusted keys Otherwise if the user SERVFAILS on Query 3 then the result is indeterminate

Privacy and Security Considerations This test itself does not reveal which resolvers are used by end users in resolving names The query itself need not contain any end user identifying material The methodology never changes “insecure” to ”authenticated” – it will only change “authenticated” to “insecure” depending on the resolver’s local trusted key state when resolving certain labels Anyone can set up a test condition within their delegated part of the DNS The results of the test are passed back only to the user in the form of a resolution outcome

Internet Draft draft-huston-kskroll-sentinel