1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.

Slides:



Advertisements
Similar presentations
DNSSEC in Windows Server. DNS Server changes Provide DNSSEC support in the DNS server – Changes should allow federal agencies to comply with SC-20 and.
Advertisements

Olaf M. Kolkman. APNIC, 6 February 2014, Bangkok. DNSSEC and in-addr an update Olaf M. Kolkman
Availability Problems in the DNSSEC Deployment Eric Osterweil Dan Massey Lixia Zhang 1.
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License DNSSEC ROLLING.
DNS Transfers in DNSSEC world Olafur Gudmundsson Steve Crocker Shinkuro, Inc.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Deploying DNSSEC in Windows Server 2012 David Cates Platform Services Group Microsoft Corporation.
Measuring DNSSEC validation i.e. how to do it Ólafur Guðmundsson Steve Crocker ogud, steve at shinkuro.com.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
Lecture 18 Page 1 CS 236 Online DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
Survey of DNSSEC Lutz Donnerhacke DNSSEC Meeting ( )
1 SecSpider: Distributed DNSSEC Monitoring Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
Security and Information Assurance for the DNS Dan Massey USC/ISI.
1 Observations from the DNSSEC Deployment Dan Massey Colorado State University Joint work with Eric Osterweil and Lixia Zhang UCLA.
Impact of Configuration Errors on DNS Robustness Vasileios Pappas, Zhiguo Xu, Songwu Lu, Daniel Massey, Andreas Terzis, Lixia Zhang SIGCOMM 2004 Presented.
© Afilias Limitedwww.afilias.info SM Challenges of Deploying DNSSEC: Prepare your ccTLD with Secondary DNS services LACNIC Meeting May 2010 Presented by:
DNS Security Extensions (DNSSEC) Ryan Dearing. Topics History What is DNS? DNS Stats Security DNSSEC DNSSEC Validation Deployment.
PKI To The Masses IPCCC 2004 Dan Massey USC/ISI. 1 March PKI Is Necessary l My PKI related actions since arriving at IPCCC n Used an.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Measuring DANE TLSA Deployment Liang Zhu 1, Duane Wessels 2, Allison Mankin 2, John Heidemann 1 1. USC ISI 2. Verisign Labs 1.
Deploying DNSSEC in Windows Server 2012 Rob Kuehfus Program Manager Microsoft Corporation WSV325.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
1 DNSSEC at ESnet ESCC/Internet2 Joint Techs Workshop July 19, 2006 R. Kevin Oberman Network Engineer Lawrence Berkeley National Laboratory.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
IIT Indore © Neminath Hubballi
Arthur Harris Gennadiy Kofman James Mendoza Domain Name System.
Test cases for domain checks – a step towards a best practice Mats Dufberg,.SE Sandoche Balakrichenan, AFNIC.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
Olaf M. Kolkman. Domain Pulse, February 2005, Vienna. DNSSEC Basics, Risks and Benefits Olaf M. Kolkman
Introduction to DNSSEC AROC Bamako, Mali, What is DNSSEC?
DNSSEC an introduction ccTLD workshop November 26-29th, 2007 Amman, Jordan Based on slides from RIPE NCC.
Andreas Steffen, , 12-DNSSEC.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Domain Name System. CONTENTS Definitions. DNS Naming Structure. DNS Components. How DNS Servers work. DNS Organizations. Summary.
Security Through Publicity Eric Osterweil Dan Massey Batsukh Tsendjav Beichuan Zhang Lixia Zhang.
Olaf M. Kolkman. Apricot 2005, February 2005, Kyoto. DNSSEC An Update Olaf M. Kolkman
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License The details.
1 DNSSEC Deployment: Big Steps Forward; Several Steps to Go NANOG 32 Deployment D N S S E C Rob Austein Steve Crocker
DNSSEC-Deployment.org Secure Naming Infrastructure Pilot (SNIP) A.gov Community Pilot for DNSSEC Deployment JointTechs Workshop July 18, 2007 Scott Rose.
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
1 Madison, Wisconsin 9 September14. 2 Security Overlays on Core Internet Protocols – DNSSEC and RPKI Mark Kosters ARIN Engineering.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)
OpenDNSSEC Deployment Tianyi Xing. Roadmap By mid-term – Establish a DNSSEC server within the mobicloud system (Hopfully be done by next week) Successfully.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
Presented by Mark Minasi 1 SESSION CODE: WSV333.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Building Trust with Anchors Eric Osterweil Dan Massey Lixia Zhang 1.
Web Server Administration Chapter 4 Name Resolution.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
1 Is an Internet PKI the Right Approach? Eric Osterweil Join work with: Dan Massey and Lixia Zhang.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Domain Name System INTRODUCTION to Eng. Yasser Al-eimad
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
Security Issues with Domain Name Systems
DNS Security Advanced Network Security Peter Reiher August, 2014
DNS Security.
State of DNSSEC deployment ISOC Advisory Council
DNS Cache Poisoning Attack
DNSSEC Basics, Risks and Benefits
What DNSSEC Provides Cryptographic signatures in the DNS
NET 536 Network Security Lecture 8: DNS Security
Casey Deccio Sandia National Laboratories
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Presentation transcript:

1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang

2 Monitoring Shows What’s Working and What needs Work DNS operations must already deal with wide- spread misconfigurations and errors DNSSEC adds a significant amount of complexity to plain-old DNS In this talk we show evidence that the DNSSEC deployment is gaining ground - and - evidence that DNSSEC’s complexity is becoming visible in crypto management and the delegation hierarchy

3 Outline DNSSEC primer Growth of DNSSEC Crypto Management Crypto is a Challenge Faced by DNSSEC Conclusion

4 DNSSEC Primer DNSSEC provides origin authenticity, data integrity, and secure denial of existence by using public-key cryptography Origin authenticity: –Resolvers can verify that data has originated from authoritative sources. Data integrity –Can also verify that responses are not modified in-flight Secure denial of existence –When there is no data for a query, authoritative servers can provide a response that proves no data exists

5 How DNSSEC Works Each DNSSEC zone creates one or more pairs of public/private key(s) –Public portion put in DNSSEC record type DNSKEY Zones sign all RRsets with private key(s) and resolvers use DNSKEY(s) to verify RRsets –Each RRset has a signature attached to it: RRSIG So, if a resolver has a zone’s DNSKEY(s) it can verify that RRsets are intact by verifying their RRSIGs

6 Signing Example Using a zone’s key on a standard RRset (the NS) Signature (RRSIG) will only verify with the DNSKEY if no data was modified

7 Getting the Keys Until a resolver gets the DNSKEY(s) for a zone, data can be spoofed How can a resolver know that the DNSKEY(s) themselves are not being spoofed? DNSSEC zones securely delegate from parents to children Zones that have no secure parents are called trust anchors When a zone is a trust anchor the zones that it delegates to form an island of security

8 Measurements from SecSpider SecSpider is the first DNSSEC monitoring project –Began late in 2005 –Zones taken from user submissions, various crawling engines, and NSEC walking Monitoring over time from distributed locations has allowed us to: –Observe the deployment’s growth –Study distributed inconsistencies –Study policies and general behavior of early adopters

9 Production Set Zones are classified as production iff they: –Are under arpa Reverse mappings in-addr.arpa –Or, are a TLD com, edu, se, de, bg –Or, maintain a reachable web server at a www domain –Or have a mail server listed under an MX –We currently track 1,627 production DNSSEC zones

10 Growth of DNSSEC

11 Crypto Management Having keys and creating signatures can be more involved that it first seems Paul Mockapetris, SIGCOMM'88: “Distributing authority for a database does not distribute a corresponding amount of expertise.” We, therefore, posit that: “Deploying cryptography for a database does not deploy a corresponding amount of expertise.”

12 Key vs. Signature Lifetimes There is a distinct difference between the signature lifetimes of DNSKEYs and the actual period of use –A key with a short signature lifetime can be re-signed indefinitely!

13 Signature vs Actual Lifetimes Signature lifetimes -> Actual average lifetime –0-30 days -> days –31-60 days -> days –> 60 days -> Pruning keys that have not expired yet –0-30 days -> days –31-60 days -> days –> 60 days -> days Key lifetimes are clearly different than signature lifetimes

14 How Keys Should be Changed When Key changes are needed, old keys need to overlap with new keys We call these chained rollovers Sign with Key_1 -> add Key_2 -> Sign with Key_2 -> Stop serving Key_1

15 Otherwise… Abrupt key changes may leave signatures from old keys in caches Resolvers may not be able to verify data with an old signature and a new key That is why key changes must be chained –Until all signatures from a key have expired, a zone must serve that key, or resolvers may encounter data that seems false

16 Distribution of Chained Rollovers

17 Rollovers - New Keys Only

18 Learning Keys - the Delegation Hierarchy 1,134 trust anchors today –Out of 1,627 zones –1,113 islands size 1 (98.15%) Coordination with a parent zone is an involved process

19 Verifiable Secure Delegations Monitoring blip in the middle, but w/ the uptake in DNSSEC we are seeing more misconfigurations

20 Conclusions DNSSEC is taking off –Though it still has a ways to go Though the uptake is encouraging, we must be mindful of configuration complexity / errors We need tools that can see misoncfigurations and help operators (like SecSpider) We also need tools to help automate as much of the operational complexity as is safe –The delegation hierarchy serves as evidence that complexity can lead to slow uptake and errors

21 Come Visit us

22 Questions?

23 Backup

24 Distributed Polling We use distributed pollers to measure consistency (or inconsistencies) For example: DNSKEY RRsets spoofing at one poller will not fool others, and discrepencies can be seen In addition, network issues can cause some vantage points to be unable (or less able) to access DNSSEC information –We call this availability dispersion

25 Submissions by TLD Since August ru 147 br 71 arpa 43 com 31 de 28 se 27 org 15 net 12 pr 11 bg 10 eu 9 fr 8 edu 8 asia 7 uk 6 hk 4 ch 3 info 3 gov

26

27 How to Use SecSpider From our front page, submit your zone After the next polling cycle, you will see your zone on our web site For DNSKEYs (for example) check their consistency

28 Checkout Our Paper in IMC “Quantifying the Operational Status of the DNSSEC Deployment”