1.ORG DNSSEC Testbed Deployment Edmon Chung Creative Director Afilias Perth, AU 2 March, 2006.

Slides:



Advertisements
Similar presentations
< APTLD in BUSAN, 2011/08/25 > DNSSEC Update in .KR KISA
Advertisements

DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
IANA Status Update ARIN XXVI meeting, Atlanta Barbara Roseman October 2010.
Introduction to Security Computer Networks Computer Networks Term B10.
Privacy and Security on the Web Part 1. Agenda Questions? Stories? Questions? Stories? IRB: I will review and hopefully send tomorrow. IRB: I will review.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
© Afilias Limitedwww.afilias.info SM Challenges of Deploying DNSSEC: Prepare your ccTLD with Secondary DNS services LACNIC Meeting May 2010 Presented by:
PKI To The Masses IPCCC 2004 Dan Massey USC/ISI. 1 March PKI Is Necessary l My PKI related actions since arriving at IPCCC n Used an.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Designed By: Technical Training Department
LEARN THE QUICK AND EASY WAY! VISUAL QUICKSTART GUIDE HTML and CSS 8th Edition Chapter 21: Publishing Your Pages on the Web.
Deploying DNSSEC in Windows Server 2012 Rob Kuehfus Program Manager Microsoft Corporation WSV325.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Norman SecureSurf Protect your users when surfing the Internet.
Overview What are the provisioning methods used in the Australian registry system? How are these provisioning systems secured?
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Lecture # 34 Privacy and Security. Passwords Spam Scams Viruses and Worms (Malware) Intellectual Property and Copyright Cookies Encryption Back-Ups.
1 Platform for Success of.aero Dot Aero Council Geneva March 23, 2006.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
CORE Volunteer Training Presented by: Key Functions in CORE July 21, 2014.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
Staying Safe Online Keep your Information Secure.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Olaf M. Kolkman. Domain Pulse, February 2005, Vienna. DNSSEC Basics, Risks and Benefits Olaf M. Kolkman
©2006, CSA Creating and Managing Your COS Expertise Profile Managing Your CV and Promoting Your Work ® Resources for Research, Worldwide.
Tyre Kicking the DNS Testing Transport Considerations of Rolling Roots Geoff Huston APNIC.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Management How hard can it be? Mark Rogers, Enterprise Architecture Team, IP Australia
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
© 2015 ISC November 2013 Sunset for the DLV?. © 2015 ISC Background (c) Interested
Large Space IPv4 Trial Usage Program for Future IPv6 Deployment ACTIVITIES UPDATE Vol.5 APNIC 16 Meeting / Policy SIG August 21st, 2003 at Seoul Kosuke.
Internet Corporation for Assigned Names & Numbers Update on ITAR Elise Gerich Vice President, IANA.
Packet Filtering & Firewalls. Stateless Packet Filtering Assume We can classify a “good” packet and/or a “bad packet” Each rule can examine that single.
Rolling the Keys of the DNS Root Zone Geoff Huston APNIC Labs.
DNSSEC deployment in NZ Andy Linton
DNSSEC-Deployment.org Secure Naming Infrastructure Pilot (SNIP) A.gov Community Pilot for DNSSEC Deployment JointTechs Workshop July 18, 2007 Scott Rose.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
© 2015 ISC November 2013 Sunset for the DLV?. © 2015 ISC Background (c) Interested
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
AU, March 2, DNSSEC, APNIC, & how EPP might play a Role Ed Lewis DNS SIG APNIC 21.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Securing Future Growth: Getting Ready for IPv6 NOW! ccTLD Workshop, 8 th April 2011 Noumea, New Caledonia Miwa Fujii, Senior IPv6 Program Specialist, APNIC.
Presented by Mark Minasi 1 SESSION CODE: WSV333.
ASSIGNMENT 2 Salim Malakouti. Ticketing Website  User submits tickets  Admins answer tickets or take appropriate actions.
ITU ccTLD Workshop March 3, 2003 A Survey of ccTLD DNS Vulnerabilities.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
APNIC DNSSEC deployment considerations APNIC 23, Bali George Michaelson R&D Officer APNIC.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
LOGIN FORMS.
1 FRED – open source registry system CZ.NIC, z.s.p.o. Jaromír Talíř
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Agenda DNSSEC automation overview How to implement it in FRED
Assess Survey Invitations
Geoff Huston APNIC Labs September 2017
CZ.NIC in a nutshell Domain, DNSSEC, Turris Project and others
Protect Your Computer Against Harmful Attacks!
Root KSK Roll Update DNS-OARC 27 Matt Larson, VP of Research
The Curious Case of the Crippling DS record
Trust Anchor Signals from Custom Applications
Communicating in the IT Industry
Securing and Protecting Citizens' Data
Presentation transcript:

1.ORG DNSSEC Testbed Deployment Edmon Chung Creative Director Afilias Perth, AU 2 March, 2006

2 Overview.ORG Testbed Implementation Perception Problems Risk vs. Return What next?

3.ORG Testbed Logistics and Topology Launched on 31 October, 2005 DNSSEC-aware name servers EPP 1.0 front end servers feed zone data to the name servers

4 EPP Front End Only.ORG accredited registrars allowed access to the EPP servers Want to keep out the cruft Use same creds as.ORG OT&E servers New registrars added when added to OT&E Dedicated testbed servers Runs on epp1.dnssec-testbed.pir.org & epp2.dnssec-testbed.pir.org Separate from.ORG Production servers!

5 DNS Back End Running on dedicated BIND servers at the moment Will cut over to UltraDNS in 2006 Isolated DNS systems Query using Where is: ns1.dnssec-testbed.pir.org or ns2.dnssec-testbed.pir.org Started with “empty” zone

6 Registrar Toolkit Experimental toolkit (Not for Prime Time) Don’t use it for.ORG production Availability: PIR website SourceForge EPP Transactions based on the -03 Hollenbeck draft

7 Policy Decisions Running according to -bis specifications Looking to showcase some pitfalls May code NSEC3 in 2006 to run parallel Same for roll-over drafts, as they flush out Roll-over Already rolled in November (did anyone notice?) Will do an unannounced ZSK and KSK “compromise scenario” in 2006 Will publish a key roll-over schedule as well

8 Participation... 3 Registrars logged in, 15 names in the zone, 12 DS records (as of 23 Nov 2005) 135 names in the zone as of now What can we do to help you participate? On the PIR side? On the Afilias side?

9 Perception Problems.CL (Chilean) survey Many in the technological community in Chile do not know what DNSSEC is Some thought it was “all about confidentiality” Have not deployed DNSSEC because: Worry it will confuse the market (providers are not knowledgeable yet makes many promises to end- users) Multiple providers to deal with (ISC, APNIC, RIPE, etc.) Education and Testbed

10 What DNSSEC does NOT do DNSSEC does NOT provide confidentiality of DNS responses DNSSEC does NOT protect against DDOS attacks DNSSEC is NOT about privacy DNSSEC is NOT a PKI DNSSEC does NOT protect against IP Spoofing

11 Why is DNSSEC important? ROI vs. Return on Risk Not about increased revenues, but about reduced risks Reducing risks for your community / customers High vulnerability, low awareness High dependance on DNS Trust is easy to lose difficult to re-gain

12 What Next? Not without technical challenges (e.g. Key Rollovers) Main Challenge is still awareness and adoption (i.e. demand driving) Technologists tend to get over excited about technical details Some disconnect with business managers Not as high profile as worms, viruses and DDOS attacks Even as security is highest priority

13 Man-in-the-middle Attacks Stories to tell: Bank Account from your bank telling you that, for security reasons, they need you to update your password You know about these scams called ‘phishing’, where the bad guys send an pretending to be legit, and the link actually goes to their website Just to be safe, instead of clicking on your bank’s link, you open up your browser, and type in the URL for your bank login page On the front page is the request for password change. You put in your ‘old’ password, and your ‘new’ password (twice) Two hours later, your entire savings account is wiped clean. Automated Systems compromised being intercepted

14 IDN and DNSSEC Many similarities Requries Application (DNS Clients) updates Requires Registries and DNS operator updates / deployment Requires Root changes for complete experience One major difference: Lack of explicit user demand

15 Awareness & Participation ccTLDs and gTLDs should implement DNSSEC testbeds Application Providers Browsers, MTAs ISPs Industry should help promote awareness Must a catastrophe happen first?... For more info and to participate:

16 Thank You Edmon Chung