DNSSEC Brought to you by ISC-BIND, SUNYCT, and: Nick Merante – SUNYIT Comp Sci SysAdmin Nick Gasparovich – SUNYIT Campus SysAdmin Paul Brennan – SUNYIT.

Slides:



Advertisements
Similar presentations
Review iClickers. Ch 1: The Importance of DNS Security.
Advertisements

© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License DNSSEC ROLLING.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Deploying DNSSEC in Windows Server 2012 David Cates Platform Services Group Microsoft Corporation.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Implementing Domain Name System
Domain Name System. DNS is a client/server protocol which provides Name to IP Address Resolution.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
1 DNS. 2 BIND DNS –Resolve names to IP address –Resolve IP address to names (reverse DNS) BIND –Berkeley Internet Name Domain system Version 4 is still.
Domain Name System (DNS) Network Information Center (NIC) : HOSTS.TXT.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
DNS Security Extensions (DNSSEC) Ryan Dearing. Topics History What is DNS? DNS Stats Security DNSSEC DNSSEC Validation Deployment.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
DNS Security Brad Pokorny The University of Minnesota Informal Security Seminar 4/18/03.
Deploying DNSSEC in Windows Server 2012 Rob Kuehfus Program Manager Microsoft Corporation WSV325.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Tony Kombol ITIS Who knows this? Who controls this? DNS!
Domain Name Service (DNS) at Colorado State University
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
IIT Indore © Neminath Hubballi
Geoff Huston APNIC Labs
Test cases for domain checks – a step towards a best practice Mats Dufberg,.SE Sandoche Balakrichenan, AFNIC.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Troubleshooting.
Introduction to DNSSEC AROC Bamako, Mali, What is DNSSEC?
Zone Properties. Zone Properties Continued Aging allows zone to remove “stale” or “old” records for clients who have not updated within a certain period.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Secured Dynamic Updates. Caution Portions of this slide set present features that do not appear in BIND until BIND 9.3 –Snapshot code is available for.
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License The details.
Internet and Intranet Protocols and Applications Lecture 5 Application Protocols: DNS February 20, 2002 Joseph Conron Computer Science Department New York.
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Practicalities.
Tony Kombol ITIS DNS! overview history features architecture records name server resolver dnssec.
Configuring Name Resolution and Additional Services Lesson 12.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
DNS Session 5 Additional Topics Joe Abley AfNOG 2006, Nairobi, Kenya.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
DNS DNS overview DNS operation DNS zones. DNS Overview Name to IP address lookup service based on Domain Names Some DNS servers hold name and address.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
Linux Operations and Administration
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Web Server Administration Chapter 4 Name Resolution.
1 CMPT 471 Networking II DNS © Janice Regan,
OPTION section It is the first section of the named.conf User can use only one option statement and many option-value pair under the section. Syntax is.
2/26/2003 Lecture 4 Computer System Administration Lecture 4 Networking Startup/DNS.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Short Intro to DNS (part of Tirgul 9) Nir Gazit. What is DNS? DNS = Domain Name System. For translation of host names to IPs. A Distributed Database System.
Internet infrastructure 1. Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing.
What's so hard about DNSSEC? Paul Ebersman – May 2016 RIPE72 – Copenhagen 1.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
1 Internet Service DNS & BIND OPS335 Seneca College of Applied Technology.
Security Issues with Domain Name Systems
Domain Name System Tony Kombol ITIS 3110.
Module 5: Resolving Host Names by Using Domain Name System (DNS)
DNS Security Issues SeongHo Cho DPNM Lab., POSTECH
DNS Cache Poisoning Attack
Managing Name Resolution
A New Approach to DNS Security (DNSSEC)
NET 536 Network Security Lecture 8: DNS Security
NET 536 Network Security Lecture 6: DNS Security
Presentation transcript:

DNSSEC Brought to you by ISC-BIND, SUNYCT, and: Nick Merante – SUNYIT Comp Sci SysAdmin Nick Gasparovich – SUNYIT Campus SysAdmin Paul Brennan – SUNYIT Student Assistant SysAdmin

Wait… I thought you were from SUNYIT?

DNSSEC TIMELINE

Selective Timeline of DNSSEC 1987 – DNS Ratified to replace hosts.txt 1990 – DNS Security Flaws Found 1997 – First try at DNSSEC - RFC – Second try at DNSSEC - RFC2535 BIND9 is first DNSSEC capable implementation 2005 – Finalized RFCs Published July 2008 – Kaminsky exploit announced July 2010 – Root signed August 2010 –.edu TLD is signed March 2011 –.com TLD is signed ARIN signed for Reverse DNS

DNS BASICS A refresher to get us all on the same page…

DNS Records DNS comprised of various resource record (RR) types Primary types: A – map hostnames to IP addresses MX – map a host or domain to a list of mail servers CNAME – specifies an alias for a host PTR – map a IP address to a host name NS – Specifies authoritative name servers for a zone SOA – Specifies authoritative information about a zone Primary name server Domain administrator Serial number Timers related to refreshing the zone DNSSEC will introduce several new record types

DNS Security Issues Original DNS specifications did not account for security DNS Spoofing No data integrity checks Anyone can answer a request intended for another name server Attacks against query ID numbers Cache Poisoning A result of DNS spoofing Trick a DNS server into caching false information Nodes querying this name server will obtain false cached data Consequences: Clients misdirected to alternate locations Compromise host-based authentication systems

DNSSEC CONCEPTS

4 Security Objectives of DNSSEC 1. Key Distribution 2. Origin Authentication 3. Data Integrity 4. Authenticated Denial of Existence

New Record Types DNSKEY Public side of Private/Public Keyset Key Signing Key Zone Signing Key RRSIG Signed Validation of Resource Record Set DS Delegation Signer Builds Chain of Trust NSEC/NSEC3 Certified Non-existence record

Traditional DNS Lookup (un-cached) Recursive DNS Server Client looking for: fang.cs.sunyct.edu Iterative calls edu sunyct cs fang cs sunyct edu root 1 8

DNS Lookup Under Attack Recursive DNS Server Client looking for: fang.cs.sunyct.edu Targeted by cache poisoning Iterative calls edu sunyct cs fang cs sunyct edu root 1 8

Keys Public/Private Keyset Private Key used to sign records Should be kept in a secure location (not on live DNS servers) Public Key used to check signatures Must be 512 to 4096 bits for DNSSEC Several Algorithms available Zone Signing Key used to sign zones Key Signing Key used to sign ZSK record Generally larger & more secure Cryptographic Digest of KSK is sent upstream DS Record Verifies Authority of KSK

Key Flow DS KSK ZSK ampere nagios logit (sunyct.edu) DS KSK ZSK fang yoshi spuds (cs.sunyct.edu) DS KSK ZSK maryann gilligan professor (island.sunyct.edu) (edu)

Chain of Trust / Tower of Authority Recursive DNS Server Client looking for: fang.cs.sunyct.edu Targeted by cache poisoning Iterative calls edu sunyct cs fang cs sunyct edu root Crushes you when your data is bad 1 8

Key Rollover Changing ZSK: Recommended monthly to quarterly Changing KSK Recommended annually Why Rollover Reduced window of key exposure ZSKs sign many records Keys become more vulnerable with use

NSEC/NSEC3 Comparison Presented as evidence of non-existence

ldns-walk of berkeley.edu

What’s all this RRSIG stuff? Key tag of signing key Date of signing Signature expiration Algorithm Starting TTL The signature itself

Gotchas DoS Danger Load Increase Signed zone can be 4x LARGER than unsigned Bigger record size = more network traffic Key Security Dynamic DNS = fail (Have to keep private keys loaded to resign, no support for that) Network Gear must support EDNS0 for UDP packets Performance!

IMPLEMENTATION

Our Test Environment 3 VM’s running OEL (sunyct.edu) 3 Hosts running FreeBSD (cs.sunyct.edu) BIND P2

BIND Versions/Restrictions We recommend using the most up-to-date version of your preferred DNS software Updates often pertain to security issues Preliminary DNSSEC support introduced in BIND 8.2 Recommended version of BIND 9.7 for all capabilities Windows Server 2003 has preliminary support Slave support only Must be activated in Registry Windows Server 2008 R2 has full support

Key Generation Specifies Key Type Algorithm Key Size Name Type Zone Name ZSK is default Smaller Key Size Key tag added

Signing the Zone NSEC3 Hex Salt ZoneZone File Generated Zone File

named.conf Edits – Authoritative Servers Add “dnssec-enable yes” to the options section For your first time signing, make sure you increment your serial number! After signing your zones, point to the new signed zones Same names as your old zone files, but with “.signed” appended

named.conf Edits – Recursive Servers To start validating results add: “dnssec-validation yes” You also need to get the KSK for root into your config. As of this presentation, it would look like this for BIND >= 9.7: managed-keys { "." initial-key "AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjF FVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoX bfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaD X6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpz W5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relS Qageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulq QxA+Uk1ihz0="; };

Determine Your DS Info Domain Digest Key Tag Algorithm and Digest Type Fields Key File Specify SHA1 Hash

Send Your Digest to EDUCAUSE

Key rotation - ZSK 1. Generate and publish new ZSK one TTL before planned rotation, but don’t sign the zone with it! 2. After TTL expiration, sign with new ZSK 1. Leave old DNSKEY record in zone for 1 TTL cycle 2. Allows cached signed records to be verified (Signatures created with old key need time to expire) Here’s one option: Have 3 ZSK’s in your zone. The previous, current and next. Your zones will always contain the necessary keys.

Key rotation - KSK 1. Generate and publish new KSK at least one TTL before planned rotation and sign ZSK records with both the old and the new keys. 2. Make sure you send your new DS record upstream! 3. After TTL expiration, remove the old DS record from your upstream provider and remove the old KSK from your zone files

VERIFICATION

Verification – dnsviz.net All ClearTrust Issue

DNSSEC Debugger – Verisign Labs Everything looks good This shows a problem with the keys

dig – Points of Interest DNS Server Name DNSSEC Enabled Search Host to query for Record Type ad flag = authenticated data (this means it’s been confirmed valid)

dig – Points of Interest aa flag = authoritative answer (if you’re querying the authoritative server, you won’t see the ad flag, just the aa flag)

QUESTIONS? Get a copy of the

References 7 Things You Should Know About DNSSEC Microsoft DNSSEC Deployment Guide DNSSEC Debugger – Verisign Labs DNSViz – DNS Visualization Tool Firefox DNSSEC Validator Plugin DNSSEC for Beginners DNSSEC Zone Key Tool DNSSEC in 6 Minutes DNSSEC Reference Card ISC Steps for setting up a validating server