The Business Case for DNSSEC

Slides:



Advertisements
Similar presentations
The Business Case for DNSSEC Tunis Tunisia April 2013
Advertisements

Web Hosting. The purpose of this Startup Guide is to familiarize you with Own Web Now's Web Hosting. Own Web Now offers two web hosting platforms, one.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
DNSSEC Deployment: Where We Are (and where we need to be) MENOG 10, Dubai 30 April 2012
DNSSEC: Where We Are (and how we get to where we want to be) APNIC 34, Phnom Penh, Cambodia August 2012
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
PKI To The Masses IPCCC 2004 Dan Massey USC/ISI. 1 March PKI Is Necessary l My PKI related actions since arriving at IPCCC n Used an.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
ICANN’s multi-stakeholder approach OAS-CICTE REMJA/OAS + WEF Cyber Crime Workshop, Montevideo, Uruguay 10 July 2012
The Business Case for DNSSEC InterOp/ION Mumbai October 2012
DNSSEC: Where We Are (and how we get to where we want to be)
DNSSEC AsiaPKI - Bangkok, Thailand June 2013
Security for the Internet’s Domain Name System DNSSEC Current State of Deployment Prepared for Internet2 BoF Amy Friedlander, Shinkuro, Inc. Based on a.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
DNSSEC: A Game Changer ICCS 2012 January 9, 2012 New York, NY
Andreas Steffen, , 12-DNSSEC.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Deploying DNSSEC: From Content to End-customer InterOp Mumbai October 2012
DNSSEC 101 IGF 2012, Baku, Azerbaijan 6 November 2012
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
DNSSEC Update SANOG 27 Kathmandu, Nepal January 2016
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Security Issues with Domain Name Systems
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
Web Applications Security Cryptography 1
SaudiNIC Riyadh, Saudi Arabia May 2017
DATA SECURITY FOR MEDICAL RESEARCH
DNS Security Advanced Network Security Peter Reiher August, 2014
DNS Security.
KSK Rollover Update David Conrad, CTO ICANN 59 – GAC 29 June 2017.
SSL Certificates for Secure Websites
State of DNSSEC deployment ISOC Advisory Council
Principles of Computer Security
Cryptography and Network Security
Practical Censorship Evasion Leveraging Content Delivery Networks
Living on the Edge: (Re)focus DNS Efforts on the End-Points
Keyhub Identity and Access Management App is Powered by Azure and Offers Customers Easy Authentication, Authorization for Mobile Devices MICROSOFT AZURE.
Cybersecurity and Governance
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
Symantec Code Signing Certificate
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Tallinn, Estonia Sep 2017 Why DNSSEC Tallinn, Estonia Sep 2017
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DANE: The Future of Transport Layer Security (TLS)
DNSSEC Basics, Risks and Benefits
What’s New in Fireware v12.1.1
Risk of the Internet At Home
TRA, UAE May 2017 DNSSEC Introduction TRA, UAE May 2017
DNSSEC: An Update on Global Activities
Goals Introduce the Windows Server 2003 family of operating systems
Introducing Qwory, a Business-to-Business Search Engine That’s Powered by Microsoft Azure and Detects Vital Contact Information for Businesses MICROSOFT.
What DNSSEC Provides Cryptographic signatures in the DNS
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Public Key Infrastructure from the Most Trusted Name in e-Security
Lecture 4 - Cryptography
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Fed/ED December 2007 Jim Jokl University of Virginia
CS – E-commerce Technologies – Lecture 07
Presentation slide for courses, classes, lectures et al.
Computer Networks Primary, Secondary and Root Servers
Advanced Computer Networks
Designing IIS Security (IIS – Internet Information Service)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Vulnerability in an Android App I Found last November - Attack and Countermeasure - Ken Okuyama Sony Digital Network Applications.
Securing web applications Externally
Presentation transcript:

The Business Case for DNSSEC Cyber security is becoming a greater concern to government, enterprises and end users. DNSSEC is a key tool and differentiator. DNSSEC is the biggest security upgrade to Internet infrastructure in over 20 years. DNSSEC is a critical tool in combating the global nature of cyber crime providing a cross-organizational and trans-national platform for innovative security solutions and authentication. DNSSEC infrastructure deployment has been brisk but requires expertise. Getting ahead of the curve is a competitive advantage. Cyber interest at C-level, and govt mandates. Large US ISP says: it used to be speed, now its security too. DNS /w DNSSEC: a foothold for trust built into the Internet infrastructure.

Where DNSSEC fits in DNS converts names (www.tata.in) to numbers (64.37.102.54) ..to identify services such as www and e-mail ..that identify and link customers to business and visa versa

Where DNSSEC fits in ..but CPU and bandwidth advances make legacy DNS vulnerable to MITM attacks DNS Security Extensions (DNSSEC) introduces digital signatures into DNS to cryptographically protect contents from modification With DNSSEC fully deployed a entities can be sure the customer gets un-modified data (and visa versa) Discovery of DNS vulnerability: Bellovin 1995 then Aug 2008 Dan Kaminsky reveals DNS vulnerability shortcut. Being able to cryptographically trust Internet infrastructure data, think about what that means…can I now click and download a .exe file?

The Original Problem: DNS Cache Poisoning Attack ISP / ENTERPRISE / END NODE www.majorbank.se = 1.2.3.4 ENTERPRISE www.majorbank.se=? DNS Resolver DNS Server 5.6.7.8 Attacker www.majorbank.se = 5.6.7.8 Get page Attacker webserverwww @ 5.6.7.8 Login page Username / Password Error Password database Animated slide in .ppt detailed description at: http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html

Argghh! Now all ISP customers get sent to attacker. www.majorbank.se = 1.2.3.4 www.majorbank.se=? DNS Resolver DNS Server 5.6.7.8 Get page Attacker webserverwww @ 5.6.7.8 Login page Username / Password Error Password database Animated slide in .ppt

The Bad: DNSChanger - ‘Biggest Cybercriminal Takedown in History’ – 4M machines, 100 countries, $14M end-2-end DNSSEC validation would have avoided the problems. Nov 2011 http://krebsonsecurity.com/2011/11/malware-click-fraud-kingpins-arrested-in-estonia/ End-2-end DNSSEC validation would have avoided the problems

The Bad: Other DNS hijacks* 25 Dec 2010 - Russian e-Payment Giant ChronoPay Hacked 18 Dec 2009 – Twitter – “Iranian cyber army” 13 Aug 2010 - Chinese gmail phishing attack 25 Dec 2010 Tunisia DNS Hijack 2009-2012 google.* April 28 2009 Google Puerto Rico sites redirected in DNS attack May 9 2009 Morocco temporarily seize Google domain name 9 Sep 2011 - Diginotar certificate compromise for Iranian users SSL / TLS doesn't tell you if you've been sent to the correct site, it only tells you if the DNS matches the name in the certificate. Unfortunately, majority of Web site certificates rely on DNS to validate identity. DNS is relied on for unexpected things though insecure. *A Brief History of DNS Hijacking - Google http://costarica43.icann.org/meetings/sanjose2012/presentation-dns-hijackings-marquis-boire-12mar12-en.pdf

The Good: Securing DNS with DNSSEC Attacker’s record does not validate – drop it www.majorbank.se = 1.2.3.4 www.majorbank.se=? DNS Resolver with DNSSEC DNS Server with DNSSEC Attacker www.majorbank.se = 5.6.7.8 1.2.3.4 Get page webserverwww @ 1.2.3.4 Login page Username / Password Account Data Animated slide in .ppt

The Good: Resolver only caches validated records ISP / ENTERPRISE / END NODE ENTERPRISE www.majorbank.se = 1.2.3.4 www.majorbank.se=? DNS Resolver with DNSSEC DNS Server with DNSSEC 1.2.3.4 Get page webserverwww @ 1.2.3.4 Login page Username / Password Account Data Animated slide in .ppt

DNSSEC interest from governments Sweden, Brazil, Czech Republic and others encourage DNSSEC deployment to varying degrees Mar 2012 - AT&T, CenturyLink (Qwest), Comcast, Cox, Sprint, TimeWarner Cable, and Verizon have pledged to comply and abide by US FCC [1] recommendations that include DNSSEC.. “A report by Gartner found 3.6 million Americans getting redirected to bogus websites in a single year, costing them $3.2 billion.,”[2]. 2008 US .gov mandate. ~70% operational. [3] Side note: dnssec may help remove chaff in determining the source of cyber attacks. Attribution is one of the the key elements in a successful approach to stemming the tide of cyber attacks. [1] FCC=Federal Communications Commission=US communications Ministry [2] http://securitywatch.pcmag.com/security/295722-isps-agree-to-fcc-rules-on-anti-botnet-dnssec-internet-routing [3] http://www.whitehouse.gov/sites/default/files/omb/memoranda/fy2008/m08-23.pdf

DNSSEC: Where we are Deployed on 95/316 TLDs (.br, .cz, .co, .ua, .nl, .bg, .kg, .am, .lv, .ug, .mm, .mn, .de, .eu, .uk, .tt, .pl, .in, .lk, .com, .my مليسيا , .asia, .tw 台灣, .kr 한국, .jp, .fr, .post, …) Root signed** and audited New gTLDs require it >84% of domain names could have DNSSEC Growing ISP support* 3rd party signing solutions: GoDaddy, Binero, VeriSign…*** Vendors support it: ISC/Bind, Microsoft, … New standards being developed on DNSSEC (e.g., IETF RFC6698 SSL Certificates) Growing interest from others major players… Major ISP says security now on checklist for customers Comcast and >5000 domain names http://blog.comcast.com/2011/12/dnssec-deployment-update.html *COMCAST Internet (18M), TeliaSonera SE, Sprint,Vodafone CZ,Telefonica CZ, T-mobile NL, SurfNet NL, SANYO Information Technology Solutions JP, others.. **21 TCRs from: TT, BF, RU, CN, US, SE, NL, UG, BR, Benin, PT, NP, Mauritius, CZ, CA, JP, UK, NZ *** Partial list of registrars: https://www.icann.org/en/news/in-focus/dnssec/deployment

The Bad: SSL Dilution of Trust The Good: DNSSEC = Global “free” PKI DNSSEC root - 1 CA Certificate roots ~1482 Content security “Free SSL” certificates for Web and e-mail and “trust agility” Cross-organizational and trans-national identity and authentication Content security Commercial SSL Certificates for Web and e-mail SSL cert for tata.in can be provided by 1482 CAs including govts!! How do you know who to trust? The Internet community started by with just trying to secure the DNS but we ended up with something much more. (see Vint Cerf’s quote) With so many, trust is diluted. Used to be good when there were fewer. Any one can encrypt. Few can Identify : Encryption != Identity Comodo, MD5 crack, etc.. Fact is that DNS has been unfortunately used as an independent authentication tool for some time: e.g. email authentication Build and improve on established trust models, e.g., CAs Greatly expanded SSL usage (currently ~4M/200M) Make SMIME (secured email) a reality. All email packages already have support for this. They just don’t have a way to distribute keys. /w DNSSEC – now they do. May work in concert with in enhancing or extending other cyber security efforts like digital Identities, WebID, BrowserID, CAs, .. Securing VoIP Simplify WiFi roaming security Secure distribution of configurations (e.g., blacklists, anti-virus sigs) Network security IPSECKEY RFC4025 DANE and other yet to be discovered security innovations, enhancements, and synergies E-mail security DKIM RFC4871 Securing VoIP Login security SSHFP RFC4255 Domain Names https://www.eff.org/observatory http://royal.pingdom.com/2011/01/12/internet-2010-in-numbers/

Opportunity: New Security Products Improved Web SSL and certificates for all* Secured e-mail (S/MIME) for all* Validated remote login SSH, IPSEC* Securing VoIP Cross organizational digital identity systems Secured content delivery (e.g. configurations, updates, keys) Securing Smart Grid efforts A global PKI Increasing trust in e-commerce Configuration data examples: anti-virus signatures, blacklists, etc… Imagine if you could trust “the ‘Net” – again? A good ref http://www.internetsociety.org/deploy360/dnssec/ *IETF standards complete or currently being developed RFC6698

DNS is a part of all IT ecosystems +1-202-709-5262 VoIP US-NSTIC effort DNS is a part of all IT ecosystems OECS ID effort Every time you create an account on a service, logon, buy something you rely on the honesty of DNS. Even CAs rely on DNS to issue credentials so SSL is suspect. “lazy” CA is as good as “thorough” CA. PKI and ID systems also rely on DNS to connect to databases to offer services and transfer authentication info. VoIP relies on the e164 DNS zone as well. Even with a FOB, you are relying on non-MITM connectivity to the service. Smart Electrical Grid lamb@xtcn.com mydomainname.com

DNSSEC: Classic bottom-up, multi-stakeholder built Internet infrastructure upgrade to help address today’s needs and create tomorrow’s opportunity.

DNSSEC @ the root: A bottom-up, multi-stakeholder operation

Community driven Listened to calls from global community for deployment: Internet community (e.g., RIPE, APNIC, ccNSO…) Governments Business (e.g., Kaminsky 2008, Press) National cybersecurity strategy – Common goals between agencies through education by all of us. ccNSO surveys: all will do DHS Interagency push Even naysayer Dan came around

Deploying it Problem Bureaucracy and Fear: Hard to change anything that has not changed since 1983. Many excuses not to. root - An internationally agreed to single key – right Trust me - I will manage the root key. ..uh huh. Deploying it – “the Ugly?” Root barrier from parts of own USG.

Approach Eliminate excuses and lead by example – start at root Solution Multi-stakeholder – get buy in up front Bottom up – like the Internet itself Transparency and Choice Draw from existing secure practices and trusted models DNSSEC at the root – a classic example of bottom up Internet development and successful public-private partnership Transparency and choice = Notice and Choice Still – much convincing of govts. Optional, no there are no black helicopters in the crypto box. Public-private partnership with US Department of Commerce and VeriSign (existing DNS management partner)

DNSSEC at the root: result Deployed 15 July 2010 Completed in ~2years Biggest upgrade to the Internet’s core infrastructure in 20 years Set the stage for deployment in rest of hierarchy (e.g., top level domains, end user domains)

Cont… Got global buy in Direct stakeholder participation in key management – 21 Trusted Community Representatives made up of respected members of Internet community from 18 countries Currently: URUGUAY, BRAZIL, TRINIDAD AND TOBAGO, CANADA, BENIN, SWEDEN, NEPAL, NETHERLANDS, NEW ZEALAND, RUSSIAN FEDERATION, PORTUGAL, JAPAN, MAURITIUS, CHINA, BURKINA FASO,CZECH REPUBLIC, UNITED KINGDOM, USA TCR=Vint Cerf, Kaminsky, Kolkman = Chair of IAB, CNNIC, RU, JP…URUGUAY, BRAZIL, TRINIDAD AND TOBAGO, CANADA, BENIN, SWEDEN, NEPAL, NETHERLANDS, NEW ZEALAND, RUSSIAN FEDERATION, PORTUGAL, JAPAN, MAURITIUS, CHINA, BURKINA FASO,CZECH REPUBLIC, UNITED KINGDOM, USA

Cont…. Enabled DNSSEC deployment throughout hierarchy – need just one key to validate all Publish, broadcast everything. Pass 3rd party annual SysTrust audit ICANN Secure Key Management Facilities in Culpepper, VA and El Segundo, CA. FIPS 140-2 Level 4 crypto, GSA Class 5 safes, multiple tiers, biometrics, etc. Nist requirments for high impact Learned much from CA’s, auditing firms, (and of all places, DCID 6/9) Explain the split KSK / ZSK role if asked.

See root-dnssec at http://dns.icann.org/ FR, NZ, root, com, UK, DCID 6/9 See root-dnssec at http://dns.icann.org/

http://www.flickr.com/photos/kjd/sets/72157624302045698/

Documentation - Root 91 Pages and tree of other documents! Root DPS Spells out multiparty controls (e.g., at least two)

Fips 140-2 level 4 Gsa class 5 Biometrics Multi-person control Publicly documented Draw from CA Dcid 6/9 9 gauge mesh drywall

Summary DNSSEC multi stakeholder effort from start and at root is a concrete operational example of how successful the bottom-up multi-stakeholder approach can be. Example of Internet style cooperation succeeding where top-down political approaches have been difficult