Data You Can Trust: The Key to Information Security Dr. Burt Kaliski, Jr. Senior Vice President and CTO, Verisign 25 th HP Information Security Colloquium.

Slides:



Advertisements
Similar presentations
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Introduction.
Advertisements

State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
An Application-Oriented API for DANE and DNS Shumon Huque, Verisign Labs Presented to the W3C TPAC Allison Mankin and Melinda Shore October, 2014.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
Chapter 5 Network Security Protocols in Practice Part I
DESIGNING A PUBLIC KEY INFRASTRUCTURE
DNS Security A.Lioy, F.Maino, M. Marian, D.Mazzocchi Computer and Network Security Group Politecnico di Torino (Italy) presented by: Marius Marian.
CS470, A.Selcuk Security1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
DNS-centric PKI Sean Turner Russ Housley Tim Polk.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Measuring DANE TLSA Deployment Liang Zhu 1, Duane Wessels 2, Allison Mankin 2, John Heidemann 1 1. USC ISI 2. Verisign Labs 1.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Cryptography 101 Frank Hecker
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
IIT Indore © Neminath Hubballi
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
Introduction to DNSSEC AROC Bamako, Mali, What is DNSSEC?
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Security Through Publicity Eric Osterweil Dan Massey Batsukh Tsendjav Beichuan Zhang Lixia Zhang.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License The details.
Module 9: Fundamentals of Securing Network Communication.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
ISOC.NL SIP © 15 March 2007 Stichting NLnet Labs DNSSEC and ENUM Olaf M. Kolkman
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
1 Madison, Wisconsin 9 September14. 2 Security Overlays on Core Internet Protocols – DNSSEC and RPKI Mark Kosters ARIN Engineering.
Joint Techs, Albuquerque Feb © 8 Feb 2006 Stichting NLnet Labs DNS Risks, DNSSEC Olaf M. Kolkman and Allison Mankin
How to use DNS during the evolution of ICN? Zhiwei Yan.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
S/MIME (Secure/Multipurpose Internet Mail Extensions) security enhancement to MIME – original Internet RFC822 was text only – MIME provided.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
EMU and DANE Jim Schaad August Cellars. EMU TLS Issues Trust Anchor Matching PKIX cert to EMU Server Name Certificate Revocation Checking – CRLs – OCSP.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
DANE/DNSSEC/TLS Testing in the Go6lab Jan Žorž, ISOC/Go6 Institute, Slovenia
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Security Issues with Domain Name Systems
Security is one of the most widely used and regarded network services
DNS Security.
Cryptography and Network Security
Living on the Edge: (Re)focus DNS Efforts on the End-Points
DANE: The Future of Transport Layer Security (TLS)
S/MIME T ANANDHAN.
What DNSSEC Provides Cryptographic signatures in the DNS
The Secure Sockets Layer (SSL) Protocol
Presentation transcript:

Data You Can Trust: The Key to Information Security Dr. Burt Kaliski, Jr. Senior Vice President and CTO, Verisign 25 th HP Information Security Colloquium December 15, 2014

Verisign Public Full version of presentation The body of this presentation is adapted from a talk by Shumon Huque of Verisign Labs Reference: Shumon Huque. DANE & Application Uses of DNSSEC. Presented at Internet2 Technology Exchange, Indianapolis, IN, USA, October 29, huque-dnssec-dane.pdf 2

Verisign Public Agenda: Data You Can Trust The perennial question in public-key cryptography DNSSEC at a glance Application uses of DNSSEC getdns: a brief introduction Conclusion 3

Verisign Public Introduction: The perennial question in public- key cryptography How do I get Alice’s public key?

Verisign Public Traditional answer: Public CA model Get Alice’s certificate & check certificate authority’s signature

Verisign Public But we’re back to where we started … How do I get the CA’s public key?

Verisign Public Traditional answer: Trust lists Trust your app (or browser or operating system or device) …

Verisign Public But there’s still one more question … How do I know that this is actually Alice’s CA? In other words, what data can I actually trust?

Verisign Public DNSSEC at a glance 9

Verisign Public DNSSEC at a glance Original DNS protocol wasn’t built with security in mind No way to verify the authenticity of DNS data other than trusting the connection to the DNS server DNSSEC: “DNS Security Extensions” A system to verify the authenticity of DNS data Specifications: RFC 4033, 4034, 4035, 5155 Protects against DNS spoofing & cache poisoning Secondary benefits: Ability to store and verify cryptographic keying material in the DNS, which can be used by new & existing application protocols SSHFP, IPSECKEY, CERT, DKIM, etc. DANE family: TLSA, OPENPGPKEY, SMIMEA, etc. 10

Verisign Public DNSSEC at a glance Uses public key cryptography Each zone has a public and private key Typically a 2-level hierarchy (KSK and ZSK) is used for each zone Zone owner uses private key to sign the zone data, producing digital signatures for each resource record set Public key is used by DNS resolvers to validate the signatures -> proof of authenticity Public key is published in the zone Zone public keys are organized in a chain of trust that follows the DNS delegation hierarchy Resolvers authenticate signatures from the root down to the target zone containing the queried name 11

12. (root).edu upenn.edu recursive resolver endstation (stub resolver) answer Recursive Resolver is prepopulated with root DNS server addresses referral to.edu referral to upenn.edu

13. (root).edu upenn.edu recursive resolver endstation (stub resolver) Recursive Resolver is prepopulated with root DNS server addresses and the root’s public key referral to.edu + DS,RRSIG referral to upenn.edu + DS, RRSIG answer RRSIG set DO bit (has root’s pubkey) answer + AD bit root’s pubkey edu pubkey upenn pubkey (Also queries for DNSKEY and DS records are performed as needed)

Verisign Public Brief DNSSEC Deployment status DNS Root was signed in July 2010 TLDs signed [1] :.COM,.NET,.EDU,.ORG,.GOV, etc.: All TLDs: 543 of 726 (74.8%), as of October 2014 ccTLDs: 102 of 286 (36%) New gTLDs: all are signed (418 of 418) Reverse trees (in-addr.arpa and ip6.arpa) are signed Levels beneath TLDs are where more needs to be done US.GOV federal: ~ 82% [3] (Oct 2014) – FISMA OMB Mandate Internet2 Higher Ed members [1] : 27 of ~ 266 (10.2%).NL (Netherlands) has over 2 million signed delegations [2].COM has over ~ 405,000 signed delegations (0.35%) [4] 14 [1] [2] [3] [4] &

Verisign Public DNSSEC Validation map (from APNIC) 15 gronggrong.rand.apnic.net/cgi-bin/worldmap

Verisign Public Application Uses of DNSSEC 16

Verisign Public Application uses of DNSSEC One of the more exciting prospects for DNSSEC is DNS- based Authentication of Named Entities (DANE) DANE can be employed to describe the association between services and their cryptographic keys, and.. Allow applications to securely obtain (authenticate) those keys and use them in application security protocols Some possible applications: SSH, SSL/TLS, HTTPS, S/MIME, PGP, SMTP, DKIM, and many others.. Existing records: SSHFP, IPSECKEY, DKIM TXT record, … DANE records: TLSA, OPENPGPKEY Upcoming: SMIMEA, IPSECA, … 17

Verisign Public DANE and the TLSA record RFC 6698: The DANE Protocol for Transport Layer Security Defines a new DNS record type “TLSA”, that can be used for better & more secure ways to authenticate SSL/TLS certificates By specifying constraints on which CA can vouch for a certificate, or which specific PKIX end-entity certificate is valid By specifying that a service certificate or a CA can be directly authenticated in the DNS itself. 18

Verisign Public TLSA configuration parameters 19 Usage field: 0 PKIX-TA: CA Constraint 1 PKIX-EE: Service Certificate Constraint 2 DANE-TA: Trust Anchor Assertion 3 DANE-EE: Domain Issued Certificate Selector field: 0 Match full certificate 1 Match only SubjectPublicKeyInfo Matching type field: 0 Exact match on selected content 1 SHA-256 hash of selected content 2 SHA-512 hash of selected content Certificate Association Data: raw cert data in hex Co-exists with and Strengthens Public CA system Operation without Public CAs

Verisign Public Early large adopters of SMTP + DANE posteo.de mailbox.org umbkw.de bund.de denic.de freebsd.org unitybox.de debian.org, debian.net ietf.org nlnetlabs.nl nic.cz nic.ch torproject.org 20 Quite a few are large systems in Germany. See a larger list at

Verisign Public SMIMEA Using DNSSEC to associate certificates with domain names for S/MIME S/MIME is a method of encrypting and signing MIME data used in messages The SMIMEA DNS record proposes to associate S/MIME certificates with DNS domain names Verisign DANE/SMIMEA early Mail User Agent Prototype dnssec-dane-smime-15oct14-en 21

Verisign Public getdns: a brief introduction A new application friendly interface to the DNS 22

Verisign Public getdns: a new DNS library for applications getdns: A new application-friendly interface to the DNS Get and use arbitrary data in the DNS easily Get this data securely, authenticated with DNSSEC if it’s available Full iterative resolver mode with validation Validating stub resolver mode Designed by application developers. Most previous APIs have been developed by DNS protocol people with less concern for the needs of app developers. 23

Verisign Public getdns API specification: Latest revision: October 2014 Creative Commons Attribution 3.0 Unported license Opensource implementation: A joint project of Verisign Labs and NLNet Labs First release (0.1.0) in February 2014 Latest release (0.1.5) in August 2014 C library Bindings in Python, and Node.js (upcoming: go, ruby, perl) BSD 3 License 24

Verisign Public Conclusion 25

Verisign Public A question of trust, revisited … How do I know that this is actually Alice’s CA?

Verisign Public New answer: Public CAs, trust lists & DANE 27 Get Alice’s DANE record & validate its DNSSEC signature Summary: I can trust more because I know more about what others trust

© 2014 VeriSign, Inc. All rights reserved. VERISIGN and other trademarks, service marks, and designs are registered or unregistered trademarks of VeriSign, Inc. and its subsidiaries in the United States and in foreign countries. All other trademarks are property of their respective owners.