Who’s watching your network DNS Security Extensions Presentation to 19th NANOG meeting Albuquerque, NM Edward Lewis NAI Labs June 11-13,

Slides:



Advertisements
Similar presentations
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Advertisements

State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
1 DNSSEC From a protocol bug to a security advantage Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
DNS Security A.Lioy, F.Maino, M. Marian, D.Mazzocchi Computer and Network Security Group Politecnico di Torino (Italy) presented by: Marius Marian.
A New Approach to DNS Security (DNSSEC) Author: Giuseppe Ateniese Stefan Mangard Presenter: Liu, Xiaotao.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
Domain Name System: DNS
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
© Afilias Limitedwww.afilias.info SM Challenges of Deploying DNSSEC: Prepare your ccTLD with Secondary DNS services LACNIC Meeting May 2010 Presented by:
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Domain Name System ( DNS )  DNS is the system that provides name to address mapping for the internet.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
DNS Security Brad Pokorny The University of Minnesota Informal Security Seminar 4/18/03.
Key Management in Cryptography
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Module 10 Advanced Topics. DNS and DHCP DHCP can be configured to auto- update (using DDNS) the forward and reverse map zones Can be secured using allow-update.
Cryptography 101 Frank Hecker
Tony Kombol ITIS Who knows this? Who controls this? DNS!
1 DNSSEC at ESnet ESCC/Internet2 Joint Techs Workshop July 19, 2006 R. Kevin Oberman Network Engineer Lawrence Berkeley National Laboratory.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Domain Names System The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the.
IIT Indore © Neminath Hubballi
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 17 Domain Name System (DNS)
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
Chapter 17 Domain Name System
Security and Stability of Root Name Server System Jun Murai (From the panel on Nov. 13 th by Paul Vixie, Mark Kosters, Lars-Johan Liman and Jun Murai)
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Module 8 DNS Tools & Diagnostics. Objectives Understand dig and nslookup Understand BIND toolset Understand BIND logs Understand wire level messages.
Secured Dynamic Updates. Caution Portions of this slide set present features that do not appear in BIND until BIND 9.3 –Snapshot code is available for.
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License The details.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
1 Kyung Hee University Chapter 18 Domain Name System.
Tony Kombol ITIS DNS! overview history features architecture records name server resolver dnssec.
Configuring Name Resolution and Additional Services Lesson 12.
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
Module 8 DNS Tools & Diagnostics. Dig always available with BIND (*nix) and windows Nslookup available on windows and *nix Dig on windows – unpack zip,
DNS DNS overview DNS operation DNS zones. DNS Overview Name to IP address lookup service based on Domain Names Some DNS servers hold name and address.
Linux Operations and Administration
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
1 CMPT 471 Networking II DNS © Janice Regan,
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
DHCP-DNS Interaction Bernie Volz IETF-61, DHC WG.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
Security Issues with Domain Name Systems
Networking Applications
IMPLEMENTING NAME RESOLUTION USING DNS
Chapter 19 Domain Name System (DNS)
A New Approach to DNS Security (DNSSEC)
NET 536 Network Security Lecture 8: DNS Security
NET 536 Network Security Lecture 6: DNS Security
Computer Networks Presentation
Presentation transcript:

Who’s watching your network DNS Security Extensions Presentation to 19th NANOG meeting Albuquerque, NM Edward Lewis NAI Labs June 11-13, 2000

# June Who’s watching your network Changes are coming to DNS DNS is undergoing a number of changes –DNSSEC - my topic –Dynamic Update RFC 2136 (see bibliography for URL) –IPv6 - new A6 records and reverse map dns-lookups-08.txt –Various other improvements EDNS0 - ftp://ftp.isi.edu/in-notes/rfc2671.txt Software boosts

# June Who’s watching your network DNSSEC Ingredients DNS Security Extensions –KEY and SIG resource records –NXT resource records Query-Response Security –TSIG and SIG(0) meta records –TKEY meta record Serving Security Data –CERT(ificate) resource record Dynamic Update Security –Update authorization

# June Who’s watching your network Features Protection of Internet-scale DNS data transfers –Data is signed using scaleable public keys –Absent data notices (e.g. NXDOMAIN) secured Protection of local DNS transfers –Entire message secured (header and data) Public Key Infrastructure –Look up keys instead of trusting “what is heard” or manually entered Secured dynamic updates to zones –Authorized changes to zone data can be made

# June Who’s watching your network Specification, Software Status DNSSEC is defined in RFC 2535 & others –IETF proposed standard (proposed,draft,full) –See bibliography for more docs Internet Software Consortium’s BIND –Version 8.2 (March 1999) was the beginning Not a full implementation of DNSSEC Current version P5 –Third Beta of Version 9 has been released Partial build of what will be the first full implementation of DNSSEC

# June Who’s watching your network State of the Protocol Work is progressing to refine protocol –IETF WG on DNS Extensions (DNSEXT) –Much work remains to progress to "Full Standard" –Internet Drafts document the work in progress Operational experience is very limited –IETF WG on DNS Operations (DNSOP) –Three workshops have been held with BINDv8 –“How to operate” and “policy” questions abound

# June Who’s watching your network Deployment Plans Major push in Europe –Three ccTLD's plan to have signed zones by first quarter next year, one as soon as 1/1/2001 –CENTR has a DNSSEC WG in action Root Servers –Looking into adoption, sooner rather than later –Need BIND 9 to be out & stable first U.S. –Nothing firm, just some "interest" Deployment experience is needed to evaluate the current protocol definition

# June Who’s watching your network DNS Terminology Secondary “Other” Server Recursive ServerCache Root Server Secondary Authoritative Server Primary Resolver Name Servers Things to keep in mind

# June Who’s watching your network DNS RRs and RR sets –myname.xy IN A –myname.xy IN A In DNS today –Records with common owner, type, class are treated together, but still are singular entities For DNSSEC –The RR set is formalized –No longer are records singular, always treated as a set  So, I will be talking about “sets” of data Things to keep in mind

# June Who’s watching your network Zones vs. Servers Zone is an a dministrative cut of the name space Name server is a h ost dispensing information Relationship –A zone is served by name servers (1 or more) –A name server may serve many zones (0 or more) –Authoritative servers have the original zone data –Primary master server has the data in a source text file  DNSSEC secures on the basis of zones  Query/Response secures between a resolver and a server –Or, in the case of zone transfers, between two servers Things to keep in mind

# June Who’s watching your network Cryptography Symmetric keys (aka shared secret) –One key, encrypts and decrypts/signs and verifies –Problem: distributing the secret secretly, storing the secret secretly Asymmetric keys (aka public key) –Pair of keys, one encrypts/signs, other decrypts/verifies –Problem: slower than symmetric Optimization –Use asymmetric keys to agree upon a symmetric key Other issues: patents and export control Things to keep in mind

# June Who’s watching your network DNS Security Extensions Protecting data transfers in which scalability is critical –I.e., inter-server queries Resource records introduced –SIG holds a digital signature (asym. keys) –KEY holds a public key –NXT indicates data present and next name Start of "detail s"

# June Who’s watching your network The KEY RR KEY 0x AQOp5t...d68o6r Flags Protocol Algorithm (Crypto) Key bits

# June Who’s watching your network The SIG RR SOA in-addr.arpa. (sig) Algorithm Original TTL Expiration Start Time Signer Key Footprint and Domain Name Signature Type Covered Label count Squint

# June Who’s watching your network The NXT RR in-addr.arpa. NS SOA TXT SIG KEY NXT Next name Type Bit Map

# June Who’s watching your network A quirk of NXT The NXT record indicates the data sets present at the owner's name It also indicates the next name in the zone There is one NXT for most names, but delegation names have two –A delegation name appears both above and below the cut point –One NXT belongs to the "upper" zone –The other to the "lower" zone NXT's are not generally "loved"

# June Who’s watching your network A signed zone, page 1 This example shows the KEY, SIG, and NXT RRs ; Generated by dns_signer dated October 18, 1999 $ORIGIN IN SOA test.netsec.tislabs.com. lewis.tislabs.com D 1H 1W 4H IN SIG SOA tise.cairn.net. ( AIrF9Hb/BzoZ3xir1K81xLzprIEVBFZLEE6Sqy8HlaU5r3ux VfBbcTA= ) IN KEY 0x ( ALb/qZQ/oVHyotuSbBWI1N+OYwRLv5RMc7XXb0wYE/tY02qF Uf+9czS0B7pU2jYppF7RwL8b/OcWG3iAzaztzq6S0ZoQIh8J M5LummzJiNl3aqxDxUZH6pwmPNuiMbGl++2tUks+MAallpUz 4tEJPeBF+Zj8boYwWhQDaV6nwDY6kIrqRqhvAmOZHqtqzFT6 SdA07usEZEzZkXXS6PIg6JcN7mNhUa0qkDSNTIkrHWNCh++G 56dtKNxk4qn3ESreg/S2BRGWQ2/7X0PjMyBkDefvdIsw ) IN SIG KEY tise.cairn.net. ( AKM6fdJmcV3Wec7sYKR5ktX2C3kWTLTcITD4iBP2rJVSF1Kx nsi3bRI= )...continues on next slide... Squint

# June Who’s watching your network A signed zone, page IN NS buddy.netsec.tislabs.com IN NS active.netsec.tislabs.com IN NS test.netsec.tislabs.com IN SIG NS tise.cairn.net. ( AKqbf3kRV1P63jDVS96dq9dMB/OXjLw0FDtdUuyVIq2Q3Z23Ep5835k= ) IN NXT active.tise.cairn.net. NS SOA SIG KEY NXT IN SIG NXT tise.cairn.net. ( AHZaL7BjH0l2VULlQJb6gXIsXjRhICsWvMapVfP2qBrGMGYl3c7yIk8= ) active IN CNAME active.netsec.tislabs.com IN SIG CNAME tise.cairn.net. ( ACqtgIY8TkwTw83rQmt3f0P0x+TmpcCtCz1+EsFmYybcSY0lhP2Nht4= ) active IN NXT amp.tise.cairn.net. CNAME SIG NXT IN SIG NXT tise.cairn.net. ( AC75idNrAm5O1YUS1ZBD9ecDgEDdFWlWN+etN74AqVoDlhtYW8dmWeo= ) amp IN NS test.netsec.tislabs.com IN NS active.netsec.tislabs.com IN NS buddy.netsec.tislabs.com. amp IN NXT buddy.tise.cairn.net. NS SIG KEY NXT IN SIG NXT tise.cairn.net. ( ADg3LFw5GvcFHgC7UaCZrK/rn5IVOg8ddTgkWz9PK9Z1KvToQbNZ3NQ= )....and there's still more to the zone, not shown Squint

# June Who’s watching your network DNSSEC Queries Query- Response Security DNSSEC Security Squint

# June Who’s watching your network Going secure Preparation (not necessarily in order) –A "secured" zone begins with an "unsecured" zone –Zone key pair generated and validated by parent –SIG records generated for each set in zone –NXT and SIG(NXT) are generated and added Running –Response to query includes the desired set(s), the SIG (set), and possibly KEY and SIG(KEY)'s that will help the resolver evaluate the answer –There are many variations on this, this is the general theme

# June Who’s watching your network Query/Response Security Processing power is a greater issue than scalability –This includes lightweight resolver queries to a "preferred" server –Zone transfers (AXFR) –A basis for securing dynamic update (Meta-) Resource records introduced –TSIG/SIG(0) –TKEY

# June Who’s watching your network TSIG DNS Header Question Answer Authority Additional & TSIG data A “keyed hash” covering entire DNS message –Uses a shared secret, shared between resolver and server Messages covered –query - response –zone transfer –dynamic updates DNS’ Original Message Format

# June Who’s watching your network TSIG Notes Storage of shared secret is an issue –No problem for named.conf, it can be protected –Problem for resolv.conf –TKEY is a proposed method for creating TSIGs Early use of TSIG –Zone transfers –“Special” clients (e.g., DHCP updaters) Widespread use later –Once overhead of sharing secrets is reduced

# June Who’s watching your network TSIG in configuration files Primary server options {...;}; key "test" { algorithm hmac-md5; secret "ThePlaceToBe"; }; server { keys {test;}; }; Secondary server options {...;}; key "test" { algorithm hmac-md5; secret "ThePlaceToBe"; }; server { keys {test;}; };

# June Who’s watching your network SIG(0) DNS Header Question Answer Authority Additional & SIG (0) data Functionally equivalent to TSIG –Uses asymmetric keys instead of shared secret Messages covered –query - response –zone transfer –dynamic updates DNS’ Original Message Format

# June Who’s watching your network SIG (0) Notes Defined in RFC 2535 w/KEY, SIG, and NXT –A current Internet Draft fixes the specification SIG(0) requires a public key to be in a zone Suffers performance hit of public key cryptography –Useful where performance hit isn't as bad as overhead managing shared secrets Requires client to have a private key available to the resolver

# June Who’s watching your network TKEY DNS Header Question Answer Authority Additional & TKEY,KEY,... Sent in a request to create a TSIG shared secret Request is accompanied by a KEY from which to generate the shared secret This is an example of the optimization on the "Cryptography" slide (#11) DNS’ Original Message Format

# June Who’s watching your network TKEY Notes TKEY is sent by resolver to set up a TSIG with server –Diffie-Hellman mode –GSSAPI - in Windows 2000 –Server or Client assigned (no implementations) A TSIG is set up and used in subsequent queries and responses Unsigned DH TKEY requests can pose a denial of service threat –Allowing "anonymous" TKEY is dangerous because of the CPU load induced

# June Who’s watching your network Security Data Server DNS can provide a public, scaleable, redundant mechanism to pass public security data –Certificates & Public Keys DNSSEC validation of data has limits –DNSSEC provides that "what you see is what I sent" –DNSSEC does not provide assurance that the contents were entered correctly Resource record introduced –CERT(ificate)

# June Who’s watching your network The CERT RR Certificates are a means to bind a public key to an identity with conditions DNS CERT RR’s can store different kinds of certificates (X.509, SPKI, PGP) Software to make the RR’s is still lacking abcdef... Key Footprint Key Algorithm Certificate Cert Type

# June Who’s watching your network Securing Dynamic Update Still in definition BINDv9 will implement "Simple Secure Update" –TSIG or SIG(0) covered messages identify the requestor –The name server holds an authorization matrix indicating whether the requestor is allowed to make the requested change –Granularity of the policy is being defined, some defaults are being identified, rest is up to admin

# June Who’s watching your network Impact DNSSEC will increase attention paid to DNS –Data (SIG) "expires" from the authoritative server No more "load & forget" –Delegations have a recurring relationship –Administrators have to manage keys NOC procedures needed for this –Need more resources (CPU) to run Start of "wrap- up"

# June Who’s watching your network Validating Delegations Validation of a zone's keys by its parent is important –Provides "proof" of zone delegation –Relationship between delegations be interactive Work is progressing on automating this Will this help keep registry info current?

# June Who’s watching your network Off-line Signing Key Generator & Zone Signer Air Gap or Firewall DNS Server(s) Company/Public Network Admin/Protected Network Reason: Protect the Private Key(s) Secure Dynamic Update complicates this Issue: Will this be done? The DNSSEC specification refers to "off-line signing"

# June Who’s watching your network Performance Hits Resource consumption –Increase data held and transferred –Increase in use of TCP –Increase in CPU cycles Verifying keys (up to the root) will require more queries –Requires a lot of computation, message latency

# June Who’s watching your network Bibliography - IETF Documents IETF Standards Documents –RFC and and others -- Dynamic Update ftp://ftp.isi.edu/in-notes/rfc2845.txt -- TSIG –DNSEXT, DNSOP WG pages –Internet Drafts (relevant to DNS security) TKEY SIG(0) Simple Secure Update Other documents

# June Who’s watching your network Bibliography - Other Documents Technical Presentations –NAI Labs paper Some of its references are out of date –NIC-SE Workshop, May, –CAIRN Workshop, September, —NLnet Labs DNS & BIND –Cricket Liu is working on explaining DNSSEC (in Danish) - PDF files are at the bottom of the page, in English –BIND ftp://ftp.isc.org/isc/bind9/ URLs checked May. 31, 2000