DNSSEC: Where We Are (and how we get to where we want to be) APNIC 34, Phnom Penh, Cambodia August 2012

Slides:



Advertisements
Similar presentations
The Business Case for DNSSEC Tunis Tunisia April 2013
Advertisements

State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Authentication Approaches Phillip Hallam-Baker VeriSign Inc.
DNSSEC Sample Implementation Module 1 DNSSEC ASIA SUMMIT August 2012, Hong Kong
DNSSEC Sample Implementation Module 1 LACNIC October 2012, Montevideo
Dane?. Enough said? No? The Longer Version…
DNSSEC Sample Implementation MENOG 10 Workshop 22 April 2012, Dubai
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
Lecture 23 Internet Authentication Applications
DNSSEC Deployment: Where We Are (and where we need to be) MENOG 10, Dubai 30 April 2012
A Third Party Service for Providing Trust on the Internet Work done in 2001 at HP Labs by Michael VanHilst and Ski Ilnicki.
1.ORG DNSSEC Testbed Deployment Edmon Chung Creative Director Afilias Perth, AU 2 March, 2006.
Dartmouth PKI Deployment Robert Brentrup PKI Summit July 14, 2004.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
1 USHER Update Fed/ED December 2007 Jim Jokl University of Virginia.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
ICANN’s multi-stakeholder approach OAS-CICTE REMJA/OAS + WEF Cyber Crime Workshop, Montevideo, Uruguay 10 July 2012
Website Hardening HUIT IT Security | Sep
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
The Business Case for DNSSEC InterOp/ION Mumbai October 2012
DNSSEC: Where We Are (and how we get to where we want to be)
DNSSEC AsiaPKI - Bangkok, Thailand June 2013
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
PKI interoperability and policy in the wireless world.
What DNS is Not 0 Kylie Brown, Jordan Eberst, Danielle Franz Drew Hanson, Dennis Kilgore, Charles Newton, Lindsay Romano, Lisa Soros 0 Paul Vixie
DNSSEC: A Game Changer ICCS 2012 January 9, 2012 New York, NY
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
© 2015 ISC November 2013 Sunset for the DLV?. © 2015 ISC Background (c) Interested
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Deploying DNSSEC: From Content to End-customer InterOp Mumbai October 2012
Configuring Directory Certificate Services Lesson 13.
TODAY & TOMORROW DAY 2 - GROUP 5 PRESENTED BY: JAMES SPEIRS CHARLES HIGBY BRADY REDFEARN Domain Name System (DNS)
Dartmouth PKI Update Robert Brentrup Internet2 Member Meeting April 21, 2004.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
DNSSEC 101 IGF 2012, Baku, Azerbaijan 6 November 2012
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Using Public Key Cryptography Key management and public key infrastructures.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
X.509 Proxy Certificates for Dynamic Delegation Ian Foster, Jarek Gawor, Carl Kesselman, Sam Meder, Olle Mulmo, Laura Perlman, Frank Siebenlist, Steven.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
DNSSEC Update SANOG 27 Kathmandu, Nepal January 2016
Trent Hemann Bunde Walker James Yost.  Industry involvement ◦ Internet Industry  Search Engine  Online Advertising ◦ Software Industry ◦ Electronic.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Let’s Encrypt and DANE ENOG 11 | Moscow | 8 Jun 2016.
Web Applications Security Cryptography 1
SaudiNIC Riyadh, Saudi Arabia May 2017
KSK Rollover Update David Conrad, CTO ICANN 59 – GAC 29 June 2017.
Living on the Edge: (Re)focus DNS Efforts on the End-Points
Tallinn, Estonia Sep 2017 Why DNSSEC Tallinn, Estonia Sep 2017
DANE: The Future of Transport Layer Security (TLS)
TRA, UAE May 2017 DNSSEC Introduction TRA, UAE May 2017
Public Key Infrastructure from the Most Trusted Name in e-Security
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Fed/ED December 2007 Jim Jokl University of Virginia
The Business Case for DNSSEC
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

DNSSEC: Where We Are (and how we get to where we want to be) APNIC 34, Phnom Penh, Cambodia August 2012

DNSSEC: We have passed the point of no return Fast pace of deployment at the TLD level Deployed at root Supported by software Growing support by ISPs Required by new gTLDs  Inevitable widespread deployment across core Internet infrastructure

DNSSEC: Plenty of Motivation DNSChanger (Nov 2011), calls for deployment by government, etc… DANE – Improved Web TLS and certs for all – S/MIME for all …and – SSH, IPSEC, VoIP – Digital identity – Other content (e.g. configurations, XML, app updates) – Smart Grid – A global PKI A good ref

The BAD: DNSChanger - ‘Biggest Cybercriminal Takedown in History’ – 4M machines, 100 countries, $14M Nov

The BAD: Brazilian ISP fall victim to a series of DNS attacks 7 Nov

The BAD: Other DNS hijacks* 25 Dec Russian e-Payment Giant ChronoPay Hacked 18 Dec 2009 – Twitter – “Iranian cyber army” 13 Aug Chinese gmail phishing attack 25 Dec 2010 Tunisia DNS Hijack google.* – April Google Puerto Rico sites redirected in DNS attack – May Morocco temporarily seize Google domain name 9 Sep Diginotar certificate compromise for Iranian users SSL / TLS doesn't tell you if you've been sent to the correct site, it only tells you if the DNS matches the name in the certificate. Unfortunately, majority of Web site certificates rely on DNS to validate identity. DNS is relied on for unexpected things though insecure. *A Brief History of DNS Hijacking - Google

DNSSEC support from government Sweden, Brazil, and others encourage DNSSEC deployment Mar AT&T, CenturyLink (Qwest), Comcast, Cox, Sprint, TimeWarner Cable, and Verizon have pledged to comply and abide by US FCC [1] recommendations that include DNSSEC.. “A report by Gartner found 3.6 million Americans getting redirected to bogus websites in a single year, costing them $3.2 billion.,” [2] US.gov mandate. >60% operational. [3] [1] FCC=Federal Communications Commission=US communications Ministry [2] [3]

Global PKI CA Certificate roots ~1482 Login security SSHFP RFC4255 Yet to be discovered security innovations, enhancements, and synergies Content security Commercial SSL Certificates for Web and Content security “Free SSL” certificates for Web and and “trust agility” (DANE) Network security IPSECKEY RFC4025 Cross- organizational and trans-national identity and authentication security DKIM RFC4871 DNSSEC root - 1 Domain Names Securing VoIP

DNSSEC: Where we are *COMCAST Internet (18M), TeliaSonera SE, Sprint,Vodafone CZ,Telefonica CZ, T- mobile NL, SurfNet NL, SANYO Information Technology Solutions JP, others.. Deployed on 89/313 TLDs (.asia,.tw 台灣 台湾,.kr 한국,.jp,.in,.lk,.kg,.tm,.am,.mm,.ua,.cr,.cz,.br,.se,.uk,.fr,.com,…) Root signed and audited by PwC >84% of domain names could have DNSSEC Growing ISP support* 3 rd party signing solutions are appearing (e.g., GoDaddy, VeriSign, Binero,…) Unbound, BIND, DNSSEC-trigger, vsResolver and other s/w support and secure last-mile IETF DANE Certificate support RFC almost out

But… But deployed on < 1% of 2 nd level domains. Many have plans. Few have taken the step (e.g., yandex.com, paypal.com*). DNSChanger and other attacks highlight today’s need. Innovative security solutions (e.g., DANE) highlight tomorrow’s value. *

DNSSEC: So what’s the problem? Not enough enterprise IT departments know about it or are putting out other fires. When they do look into it they hear FUD and lack of turnkey solutions. Registrars/DNS providers see no demand

Barriers to success Lack of Awareness at enterprise and customer level (e.g., security implications) Lack of Registrar support* – Chicken and egg – Lack of expertise and/or simple solutions – Justifying cost Implementation F.U.D. by solution provider – Security/crypto/key management/complexity – Effect on existing enterprise operations: e.g. expiry, LB, CDN, etc.. Un-trustworthy deployment – Yet another security thing to manage: “ the keys to everyone” – Insecure practices and processes – Garbage in, garbage out - what does signing my zone buy me? *Partial list of Registrars supporting DNSSEC

Solutions Raise awareness of domain holders, end users, h/w+s/w vendors [1] – Point to improved security as differentiator and the disadvantage of not adopting – New opportunities for O/S (mobile and desktop) and browser vendors – Added security for hardware products (e.g., validator in CPE) – Meet with Registrars and DNS providers Ease Implementation: – Take advantage of DNSSEC training [2] and learn from existing implementations – Automate key management and monitoring – Crypto: HSM? Smartcard? TPM chip? Soft keys? - all good – Seek “click and sign” interface simplicity – Start implementation early since to get ahead in learning curve – For ISPs, at minimum ensure validation can occur downstream to support end2end security Make it trustworthy: – Transparent and secure processes and practices – Writing a DPS creates the right mindset for: Separation of duties Documented procedures Audit logging – Opportunity to improve overall operations using DNSSEC as an excuse [3] [1] DNSSEC.jp and other groups are excellent examples [2] APNIC, NSRC, ISOC, ICANN offer training [3] ENISA report on DNSSEC deployment

Trustworthy Implementation

The good: – The people – The mindset – The practices – The legal framework – The audit against international accounting and technical standards The bad: – Diluted trust with a race to the bottom (>1400 CA’s) – DigiNotar Weak and inconsistent polices and controls Lack of compromise notification (non-transparent) Audits don’t solve everything (ETSI audit) Learn from CA successes (and mistakes)

An implementation can be thi$

+ …or this

..or this (CR NIC) Offline Laptop with TPM Online/off-net DNSSEC Signer with TPM Generate ZSKs Transport public half of ZSKs Generate KSK Sign ZSKs with KSK Transport KSK signed DNSKEY RRsets Sign zones with ZSK signed zone unsigned zone ZSKs KSK Secure Off-line Environment

KSK on FD RNG laptop Live O/S DVD SAFE RACK CAGE DATA CENTER All in tamper evident bags RACK CAGE DATA CENTER signer firewall zonefile ZSKs FD with public ZSKs FD with KSK signed DNSKEY RRsets hidden master …or even this Off-line Off-net

But all must have: Published practice statement – Overview of operations – Setting expectations Normal Emergency – Limiting liability Documented procedures Multi person access requirements Audit logs Good Random Number Generators DRBGs FIPS 140 Intel RdRand 15 Feb 12 – “Ron was wrong, Whit is right” Useful IETF RFCs: DNSSEC Operational Practices A Framework for DNSSEC Policies and DNSSEC Practice Statements

Summary DNSSEC has left the starting gate but without greater support by Registrars, demand from domain name holders and trustworthy deployment by operators, it will die on the vine Building awareness amongst a larger audience based on recent attacks and increased interest in cyber security may be one solution Drawing on lessons learned from certificate authorities and other sources of trust on the Internet can make DNSSEC a source of innovation and opportunity for all

OECS ID effort