A Quick 20 Minute Introduction to DNSSEC for the session “DNS: Don’t Call It Insecure Any More” Joe St Sauver, Ph.D. Internet2 Nationwide Security Program.

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

3rd Annual Plex/2E Worldwide Users Conference 13A Batch Processing in 2E Jeffrey A. Welsh, STAR BASE Consulting, Inc. September 20, 2007.
1
Chapter 7 Constructors and Other Tools. Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 7-2 Learning Objectives Constructors Definitions.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
DNSSEC Support in SOHO CPE OARC Workshop Ottawa 24 th September 2008.
Slide 1 FastFacts Feature Presentation October 15, 2013 To dial in, use this phone number and participant code… Phone number: Participant.
1 Balloting/Handling Negative Votes September 22 nd and 24 th, 2009 ASTM Virtual Training Session Christine DeJong Joe Koury.
UNITED NATIONS Shipment Details Report – January 2006.
RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) Customer Supplier Customer authorizes Enrollment ( )
By Rick Clements Software Testing 101 By Rick Clements
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination. Introduction to the Business.
Writing Pseudocode And Making a Flow Chart A Number Guessing Game
1 Preliminary results of the Environmental Data Exchange Network for Inland Waters (EDEN-IW) project Practical lessons. P. Haastrup.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
Custom Statutory Programs Chapter 3. Customary Statutory Programs and Titles 3-2 Objectives Add Local Statutory Programs Create Customer Application For.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
© Tally Solutions Pvt. Ltd. All Rights Reserved 1 Control Centre December 09.
Photo Slideshow Instructions (delete before presenting or this page will show when slideshow loops) 1.Set PowerPoint to work in Outline. View/Normal click.
Lost in Translation Measuring and Managing GOOD Web Intentions Marilyn Harmacek. 1.
© Tally Solutions Pvt. Ltd. All Rights Reserved Shoper 9 License Management December 09.
INTERNET PROTOCOLS Class 9 CSCI 6433 David C. Roberts Entire contents copyright 2011, David C. Roberts, all rights reserved.
1. 2 Objectives Become familiar with the purpose and features of Epsilen Learn to navigate the Epsilen environment Develop a professional ePortfolio on.
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Computer Literacy BASICS
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
OFFICE OF SUPERINTENDENT OF PUBLIC INSTRUCTION Division of Assessment and Student Information Online MSP Testing District Assessment Coordinator eDIRECT.
Seungmi Choi PlanetLab - Overview, History, and Future Directions - Using PlanetLab for Network Research: Myths, Realities, and Best Practices.
EU market situation for eggs and poultry Management Committee 20 October 2011.
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
2 |SharePoint Saturday New York City
Green Eggs and Ham.
Mechelen - 06/02/2014 Telenet Security Day CYBER scrapings putting our 2 cents in.. Christian Van Heurck CERT.be coordinator CERT.be team.
VOORBLAD.
July 31, Disclaimer: TREx under development, minor modifications may occur pending final release. Prepared for Education Service Center TREx Training.
Sample Service Screenshots Enterprise Cloud Service 11.3.
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
Note to the teacher: Was 28. A. to B. you C. said D. on Note to the teacher: Make this slide correct answer be C and sound to be “said”. to said you on.
1 Community Alcohol Partnership Age-Restricted Sales Training & Support.
2004 EBSCO Publishing Presentation on EBSCOadmin.
Solving the eValue Rubik’s cube
Analyzing Genes and Genomes
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
SESSION ID: Continuous Monitoring with the 20 Critical Security Controls SPO1-W02 Wolfgang Kandek CTO.
Energy Generation in Mitochondria and Chlorplasts
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
Tips for Taking the FSA ELA Reading and Mathematics Assessments
Math 1140 Financial Mathematics Lecture 3 More about Simple Interest Ana Nora Evans 403 Kerchof
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Graduate Admission System User Guide for Applicants 1 Last updated: April 2014.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Vendor Guide to Mandatory Pre-Population in WAWF 5.4

DNSSEC In Higher Education Joe St Sauver, Ph.D. Internet2 Nationwide Security Program Manager or AMSAC Call, 1PM Pacific,
Security Issues with Domain Name Systems
Presentation transcript:

A Quick 20 Minute Introduction to DNSSEC for the session “DNS: Don’t Call It Insecure Any More” Joe St Sauver, Ph.D. Internet2 Nationwide Security Program Manager or Internet2 Member Meeting April 19 th, 2011, 1:15-2:30PM Salon C

DNS: A Key Service The domain name system (DNS) is a fundamental service – virtually every application relies on DNS to translate names (such as to IP addresses (such as ) Without DNS, a lot of fairly cool tricks would be impossible. Some simple examples: -- we’d all have to remember IP addresses instead of fully qualified domain names (yuck) -- you couldn’t easily and transparently move a well known server from one address to another -- high density virtual web hosting would be difficult -- you couldn’t do round robin DNS (e.g., you couldn’t bind multiple IP addresses to a single fully qualified domain name) -- etc., etc., etc. Bottom line, we really need DNS, and yet we know that DNS is continually under attack. 2

Why Would Someone Attack DNS? If I Could Successfully Attack DNS, What Might I Do? If cyber attackers can modify the answers that DNS servers return, they can mislead users into going to the wrong places. For example, if you were trying to go to your bank, you might be taken to a “knock off” bank site in the Ukraine instead, or you might be involuntarily taken to a malware infected site. I could also DDoS key network resources by poisoning your DNS: could be set to (e.g., localhost) That intentional DNS misdirection is normally accomplished via a technical attack known as “cache poisoning.” (This is not just a theoretical attack; cyber criminals are actually using this one) 3

What’s DNS Caching? DNS resolvers remember, or “cache,” the DNS information they receive. By doing this, they don’t need to continually re-resolve popular DNS names from scratch. For example, having resolved once, they can then remember the answer they received “for a while” and then use that info for additional users. How long do DNS resolvers remember those answers? Well, the authoritative DNS server can recommend a duration, and normally that’s how long a response will be cached. Typical cache lifetimes might range from 7200 seconds (a couple of hours) to seconds (e.g., multiple days) or more. Caching of DNS data is generally a Really Good Thing: it makes DNS faster, and reduces the load on the DNS infrastructure. But, caching also means that if I can convince you to accept and remember an incorrect response, that one unlucky moment can have a protracted impact. 4

So How Would I Poison a DNS Cache? If an attacker wanted to convince a resolver’s cache to remember bogus information, that is, to “poison” the resolver’s cache, an attacker would generate a stream of spurious DNS responses that would compete with real answers that might be coming in for the same domain name. As you might expect, those answers would need to correspond to a pending query – for example, if you wanted to poison yahoo.com, there would need to be a pending query for that domain name. But the answer needs to match more than just the domain name: it needs to also match the source port associated with the query, and the transaction ID number. In the ideal world, given a random distribution of values, it would be hard to guess these numbers. Unfortunately, many implementations have source port and transaction IDs that are insufficiently random and too predictable 5

Testing Your Resolver’s Entropy % dig +short porttest.dns-oarc.net TXT " is GREAT: 26 queries in 0.6 seconds from 26 ports with std dev 17311” Rating Standard Deviation Bits of Entropy GREAT , GOOD POOR Note: some name servers break this test… For example, if you are told “Only received 3 queries. Please try again in 60 seconds” then a network middlebox is interfering with your DNS service. 6

How Can I Prevent DNS Cache Poisoning? Cache poisoning attacks can be prevented IF… (a) the authoritative DNS servers (which ultimately provide DNS queries) cryptographically sign their DNS data, and (b) recursive resolvers (which generate DNS queries) cryptographically validate the DNS signatures they receive. (c) if that signature doesn’t validate, the DNS answer that’s been received gets ignored as invalid/broken/bogus The rest of the DNSSEC story is just a matter of “details.” Cough! :-; 7

An Example of A “Detail:” Keys and Chains of Trust All cryptographic protocols need some solution for managing keys and maintaining “chains of trust.” DNSSEC uses a so-called “tree model,” beginning with cryptographic keys for the root of the DNS tree (“.”) For a long time, the root wasn’t signed, which meant that you needed to manually maintain trust anchors for each DNSSEC- enabled top level domain, or look to a third party to maintain those trust anchors for you 8

Key Parts of the DNS Tree Have Been Signed The root (“.”) got signed on July 15 th, Dot edu domain got signed on August 2 nd, Dot info got signed on September 1 st, Dot net got signed on December 10 th, Dot com got signed on March 31 st, Plus plenty of other top level domains are also DNSSEC signed… The good news is that this means that those of us who want to DNSSEC-validate 2 nd level domains won’t need to manually collect and maintain trust anchors for each such 2 nd level domain or top level domain– we can simply have ONE cryptographic key for the root, and then leverage that single key to bootstrap all the TLDs that have been signed by the root key, and all the 2 nd level domains that have been signed by those TLDs, etc. Are 2 nd level domains, including university TLDs, getting signed? 9

Are Any Schools Currently Signing Their 2 nd Level dot edu domains? Yes. tracks (most) domains that are DNSSEC signing their zones, including (most) dot edu’s. Schools that are known to have signed their 2 nd level dot edu zones include: (1) baker.edu, (2) berkeley.edu, (3) carnegiemellon.edu, (4) cmu.edu, (5) desales.edu, (6) eunc.edu, (7) fhtc.edu, (8) gtc.edu, (9) indiana.edu, (10) internet2.edu, (11) iu.edu, (12) iub.edu, (13) iup.edu, (14) iupui.edu, (15) jhuapl.edu, (16) k-state.edu, (17) ksu.edu, (18) lctcs.edu, (19) lsu.edu, (20) ltc.edu, (21) merit.edu, (22) minnesota.edu, (23) monmouth.edu, (24) okstate.edu, (25) oxford-university.edu, (26) pacificu.edu, (27) penn.edu, (28) psc.edu, (29) southern.edu, (30) suu.edu, (31) ucaid.edu, (32) ucr.edu, (33) uiowa.edu, (34) umbc.edu, (35) upenn.edu, (36) upf.edu, (37) valencia.edu, (38) washjeff.edu, (39) weber.edu, and (40) wnec.edu Note that some schools may have multiple related domains (e.g., carnegiemellon.edu and cmu.edu for example) 10

How Many Schools Currently Validate DNSSEC Signatures? Unfortunately, we don’t have solid data for that question. A site can enable DNSSEC validation with no externally discernible sign that they’re doing so, and many sites might enable DNSSEC validation even if they don’t sign their own zones. For example, while UOregon doesn’t sign its own zones yet, it does validate DNSSEC signatures from other domains on its production resolvers (that part’s pretty painless). Why doesn’t EVERYONE enable DNSSEC validation? Multiple potential reasons: -- Some recursive resolver software may not support DNSSEC -- DNSSEC works silently; there’s no discernible indication that DNSSEC is doing anything for you when everything is working the way it should. If I fix a problem and no one knows, should I bother? Some people apparently think “nah, why bother?” -- DNSSEC can “break” domains that would otherwise be accessible, if a site accidentally screws up their DNSSEC signatures (e.g., by letting them expire); this may not be viewed as a “feature” by your users -- DNSSEC requires support for EDNS0 (“extra long” DNS replies); some sites may have older or misconfigured firewalls that are unable to handle EDNS0 extensions -- Chicken and egg issues (“no one’s signing, so why bother trying to validate?”) 11

What If You Want To Try DNSSEC? Start by having a conversation with your DNS administrators -- they may already be testing or doing planning with respect to DNSSEC. Before embarking on DNSSEC, make sure that your DNS infrastructure is otherwise up to snuff (e.g., if you’re running an ancient version of BIND on end-of-life hardware, you need to get the meat-and-potatoes handled before you get dessert!). can help ID many DNS configuration issues. Recognize that you can “ease into” doing DNSSEC. For example: -- you can try offering DNSSEC-enabled test resolvers for opt-in use (or you can try the validating resolvers that DNS-OARC is making available; see ) -- you can try signing some less-critical (“toy”) domains to get some signing experience w/o putting critical institutional assets at risk -- you can decide you only want to sign, or only want to validate – you don’t need to do both at once 12

DNSSEC Resources for Your DNS Admin Team Begin with your current DNS vendor – DNSSEC aware vendors (such as ISC BIND) will often have specific DNSSEC documentation that will walk you through what you need to do, and obviously O’Reilly’s “DNS and BIND” (now in its 5 th edition) is a bible that every DNS admin should own. There are also many freely available community documents, see the list at (I’m particularly fond of ISC’s “DNSSEC in 6 Minutes” (79 slides) from that list, see alan.clegg.com/files/DNSSEC_in_6_minutes.pdf ) Some sites may prefer to buy rather than build. If that’s you or a site you know, you should know that there are multiple DNSSEC- enabled appliance vendors you can consider, both for DNSSEC- enabled authoritative servers and for validating resolvers (but at least some of them may not be cheap – federal agencies are prime customers, and pricing sometimes reflects that target audience). 13

What Might Internet2 and Our Campuses Do To Help? -- Publicly highlight the importance of DNS as a critical (but potentially vulnerable) service -- Explicitly endorse DNSSEC as one important way to help improve the trustworthiness of DNS results -- Lead by example/commit to “eating their own dog food” by working to deploy DNSSEC on their own campuses -- Acknowledge community participants who have made the effort to deploy DNSSEC (“Map of glory” with stars for DNSSEC-enabled Internet2 participants? Plaque or other tangible award for particularly enthusiastic community DNSSEC boosters?) -- Explicitly encourage DNSSEC appliance vendors to participate as part of the Internet2 corporate membership -- [your ideas here] 14

Thanks For The Chance to Talk Today! Are there any questions? 15