1 Observations from the DNSSEC Deployment Dan Massey Colorado State University Joint work with Eric Osterweil and Lixia Zhang UCLA.

Slides:



Advertisements
Similar presentations
DNSSEC in Windows Server. DNS Server changes Provide DNSSEC support in the DNS server – Changes should allow federal agencies to comply with SC-20 and.
Advertisements

Olaf M. Kolkman. APNIC, 6 February 2014, Bangkok. DNSSEC and in-addr an update Olaf M. Kolkman
Review iClickers. Ch 1: The Importance of DNS Security.
RRSIG:“I certify that this DNS record set is correct” Problem: how to certify a negative response, i.e. that a record doesn’t exist? NSEC:“I certify that.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Deploying DNSSEC in Windows Server 2012 David Cates Platform Services Group Microsoft Corporation.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
BGP Multiple Origin AS (MOAS) Conflict Analysis Xiaoliang Zhao, NCSU S. Felix Wu, UC Davis Allison Mankin, Dan Massey, USC/ISI Dan Pei, Lan Wang, Lixia.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Lecture 18 Page 1 CS 236 Online DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
DNS Security A.Lioy, F.Maino, M. Marian, D.Mazzocchi Computer and Network Security Group Politecnico di Torino (Italy) presented by: Marius Marian.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
1 SecSpider: Distributed DNSSEC Monitoring Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
Security and Information Assurance for the DNS Dan Massey USC/ISI.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
DNS Security Extensions (DNSSEC) Ryan Dearing. Topics History What is DNS? DNS Stats Security DNSSEC DNSSEC Validation Deployment.
PKI To The Masses IPCCC 2004 Dan Massey USC/ISI. 1 March PKI Is Necessary l My PKI related actions since arriving at IPCCC n Used an.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Measuring DANE TLSA Deployment Liang Zhu 1, Duane Wessels 2, Allison Mankin 2, John Heidemann 1 1. USC ISI 2. Verisign Labs 1.
Deploying DNSSEC in Windows Server 2012 Rob Kuehfus Program Manager Microsoft Corporation WSV325.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Tony Kombol ITIS Who knows this? Who controls this? DNS!
1 DNSSEC at ESnet ESCC/Internet2 Joint Techs Workshop July 19, 2006 R. Kevin Oberman Network Engineer Lawrence Berkeley National Laboratory.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
Issues in Internet Security. Securing the Internet How does the internet hold up security-wise? How does the internet hold up security-wise? Not well:
IIT Indore © Neminath Hubballi
Test cases for domain checks – a step towards a best practice Mats Dufberg,.SE Sandoche Balakrichenan, AFNIC.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
Olaf M. Kolkman. Domain Pulse, February 2005, Vienna. DNSSEC Basics, Risks and Benefits Olaf M. Kolkman
Introduction to DNSSEC AROC Bamako, Mali, What is DNSSEC?
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Security Through Publicity Eric Osterweil Dan Massey Batsukh Tsendjav Beichuan Zhang Lixia Zhang.
© Afilias Limitedwww.afilias.info SM Deploying DNSSEC Ram Mohan.
Olaf M. Kolkman. Apricot 2005, February 2005, Kyoto. DNSSEC An Update Olaf M. Kolkman
Packet Filtering & Firewalls. Stateless Packet Filtering Assume We can classify a “good” packet and/or a “bad packet” Each rule can examine that single.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Tony Kombol ITIS DNS! overview history features architecture records name server resolver dnssec.
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)
Designing a Secure and Resilient Internet Infrastructure Dan Massey USC/ISI.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Building Trust with Anchors Eric Osterweil Dan Massey Lixia Zhang 1.
Lecture 18 Page 1 CS 236, Spring 2008 DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
1 Is an Internet PKI the Right Approach? Eric Osterweil Join work with: Dan Massey and Lixia Zhang.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Internet infrastructure 1. Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Security Issues with Domain Name Systems
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
DNS Security Advanced Network Security Peter Reiher August, 2014
DNS Security.
DNS Cache Poisoning Attack
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS security.
What DNSSEC Provides Cryptographic signatures in the DNS
NET 536 Network Security Lecture 8: DNS Security
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
The Curious Case of the Crippling DS record
Presentation transcript:

1 Observations from the DNSSEC Deployment Dan Massey Colorado State University Joint work with Eric Osterweil and Lixia Zhang UCLA

2 Virtually every application uses the Domain Name System (DNS). DNS database maps: Name to IP address = And many other mappings (mail servers, IPv6, reverse…) Data organized as tree structure. Each zone is authoritative for its local data. Root educncom colostatesecure64edu netsec tsinghua The Domain Name System

3 DNS Vulnerabilities Original DNS design focused on data availability DNS zone data is replicated at multiple servers. A DNS zone works as long as one server is available. DDoS attacks against the root must take out 13 root servers. But the DNS design included no authentication. Any DNS response is generally believed. No attempt to distinguish valid data from invalid. Just one false root server could disrupt the entire DNS.

4 A Simple DNS Attack Caching DNS Server Lixia’s Laptop A? A Root DNS Server edu DNS Server ucla.edu DNS Server Dan’s Laptop Easy to observe UDP DNS query sent to well known server on well known port. A First response wins. Second response is silently dropped on the floor.

5 Secure DNS Query and Response Caching DNS Server End-user = Plus (RSA) signature by the ucla.edu private key Authoritative DNS Servers Follow the DNS tree to authenticate the response: 1)Assume root public key is well known 2)Root key signs edu key 3)edu key signs ucla.edu key 4)ucla.edu key signs the data

6 The Overall DNSSEC Design Simple Combination of DNS and public key cryptography Each zone manages its own key pair DNS Tree Hierarchy leveraged to form a PKI Standardized in RFC 4033, 4034, and 4035 Currently supported by most DNS implementations

7 Who is Deploying DNSSEC? Monitoring Started From Close to Day One DNSSEC RFCs published in March 2005 Monitoring launched in October 2005 Find Zones Using Crawling and User Submissions Continually crawl DNS looking for secure zones Allow users to submit the names of secure zones

8 DNSSEC Deployment Oct 16, 2007: 10,319 Secure Zones

9 Deployment Observations (Undirected) Crawling DNS Finds Few Secure Zones Vast DNS + tiny DNSSEC => low (near 0) hit rate for crawler User Submissions Drive Current Monitoring SecSpider is well publicized => high submission rate Augment secure zones with parent/child and popular sites Trend is positive, but still very small deployment overall Some top level domains deploying or deployed (e.g. “se” zone) Not yet at critical mass for DNSSEC

10 A Closer Look at Secure Zones Monitor Closely Tracks All Secure Zones Frequent Queries to Monitor Changes Exploit DNSSEC zone walking Still tractable due to relativley small DNSSEC deployment Monitoring Reveals Many Challenges DNSSEC deployment is not simple after all Challenge in Islands of Security Challenge in Key Management Challenge in Preventing Replays

11 Authenticated Denial of Existence What if the requested record doesn’t exist? Query for foo.colostate.edu returns “No such name” How do you authenticate this? Must return message that proves a name does not exist…. But cannot predict what non-existent names will be queried. And cannot sign message for specific non-existent name since private key off-line

12 Zone Walking and Monitoring Caching DNS Server End-user foo.colostate.edu. ? foo.colostate.edu. does not exist a.colostate.edu NSEC g.colostate.edu. a.colostate.edu RRSIG NSEC …. Authoritative DNS Servers Solution: sign “next name after a.colostate.edu. is g.colostate.edu.”

13 Challenge 1: Islands of Security DNS relies on the tree herarchy to learn public keys Everyone knows root public key But how would this happen and who manages it? Root key used to sign edu public key But neither root or edu have public keys now…. edu key used to sign colostate.edu key But no hierarchy leads to the public key? How does a resolver learn a secure zone’s public key?

14 Challenge 1: Islands of Security Island of Security: DNS sub-tree where every zone in the sub-tree has deployed DNSSEC Design envisioned a single island of security All zones deploy DNSSEC and manually configure the root key Monitoring reality shows disconnected deployments DNSSEC deployed in isolated subtrees and must manually configure the public key for each island of security

15 Islands of Security Vast majority of secure zones are single zone islands…. Small number of large islands… but this includes testbeds.

16 Addressing Islands of Security Deploy DNSSEC at all zones or at least from root down Has yet to happen operationally….. Develop an Alternative PKI? DLV provides some service to store and report public keys Can we trust the public keys visible at the monitor? Must ensure keys came from monitor Must ensure monitor was not tricked… But can rely on distributed services and checking by actual admins….

17 Challenge 2: Key Management Design is Relatively Simple, But Operations are complex Establish key pair and sign the zone Relatively straight-forward, but issues below add challenges.. Establish an Authentication Chain with a Secure Parent Cross-domain coordination with a different administration Update the key pair periodically Due to planned changes or key compromise Simple concept of parent private key signs the child public key…. But many complex details

18 DNS Key Management edu DNS Server colostate.edu DNS Server edu NS records A record RRSIG(A) by key 2 colostate.edu DNSKEY (pub key 1) colostate.edu DNSKEY (pub key 2) colostate.edu RRSIG() by key 1 colostate.edu DS record (hash of pubkey 1) colostate.edu RRSIG(DS) by edu private key Can Change edu key without notifying colostate.edu Can Change key 2 without notifying.edu }

19 DNS Key Signing Key Roll-Over edu DNS Server colostate.edu DNS Server colostate.edu DNSKEY (pub key 1) colostate.edu DNSKEY (pub key 2) colostate.edu RRSIG() by key 1 colostate.edu DS record (hash of pubkey 1) colostate.edu RRSIG(DS) by edu private key colostate.edu DNSKEY (pub key 3) colostate.edu RRSIG(A) by key 3 colostate.edu DS record (hash of pubkey 3) colostate.edu RRSIG(DS) by edu private key Objective: Replace DNSKEY 1 with new DNSKEY 3 colostate.edu RRSIG(A) by key 1 colostate.edu RRSIG(A) by key 3 } } }

20 Minimum and Maximum Values

21 Average Key Lifetimes

22 Addressing Key Management Manual operation of complex steps is unrealistic Need to improve management tools and increase automation Possible, but need to overcome off-line key issues Match operations with monitoring Must have monitoring to provide external view of zone Must have some form of correctness check Monitoring data can aide in the automation process by checking which steps have been done Ex: detect when the DS record at the parent has changed

23 Challenge 3: Lifetimes&Replays Each cryptographic signature has a fixed lifetime Ex: Signature for edu expires on Oct 31. What if the addresses changes today? Actions Taken in the DNS Server removes changed record and replaces with new copy But attacker can still replay the old record and signature Vulnerable Records: data has changed, but the signature on old copy has not yet expired Vulnerable records can be replayed and resolver will authenticate the old copy

24 Vulnerable DNS Record Sets

25 Addressing Lifetimes & Replays With sufficient prediction, vulnerable records can be avoided Make signature lifetime match data lifetime Dramatic Improvement Coincided With Monitoring Vulnerable records greatly reduced in current data

26 The Role of Monitoring Monitoring is essential is large-scale systems Monitoring illustrates extent of known issues in deployment Monitoring identifies new challenges in deployment SecSpider Monitoring Benefits DNSSEC Illustrates progress and documents scale of known issues Identifies new challenges Allows zone admins to see how others perceive them Various examples of how monitoring led to changes Monitoring is the solution to many challenges

27 Monitoring Solutions and Future Directions Challenge 1: Islands of Security Monitor can be used to bootstrap public key information Challenge is to authenticate public keys came from monitor and limit chance monitor data is subverted by attacer Challenge 2 and 3: Cryptographic Management Given an external view of data, zone admins can adapt Monitoring can verify key management is working Monitoring can aide in automating DNS key management Current work is using SecSpider data to identify new challenges and practically solve existing challenges

28