DNSSEC AsiaPKI - Bangkok, Thailand 2013 12 June 2013

Slides:



Advertisements
Similar presentations
Technical Services Develop Integrate Operate APNIC technical infrastructure.
Advertisements

The Business Case for DNSSEC Tunis Tunisia April 2013
Web Hosting. The purpose of this Startup Guide is to familiarize you with Own Web Now's Web Hosting. Own Web Now offers two web hosting platforms, one.
Internet Identity For All.my ccTLD IPv6 Update By Lai Heng Choong Head of Application, Database and Security.my DOMAIN REGISTRY APTLD Member Meeting, 1.
Web security (Spoofing & TLS & DNS) Ge Zhang. Web surfing yahoo IP of yahoo? Get index.htm from Response from
DNSSEC Sample Implementation Module 1 LACNIC October 2012, Montevideo
Dane?. Enough said? No? The Longer Version…
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
Lecture 18 Page 1 CS 236 Online DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
DNSSEC Deployment: Where We Are (and where we need to be) MENOG 10, Dubai 30 April 2012
DNSSEC: Where We Are (and how we get to where we want to be) APNIC 34, Phnom Penh, Cambodia August 2012
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
Password?. Project CLASP: Common Login and Access rights across Services Plan
By: Ansuya Chauhan.
A Third Party Service for Providing Trust on the Internet Work done in 2001 at HP Labs by Michael VanHilst and Ski Ilnicki.
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
Windows Vista And Longhorn Server PKI Enhancements Avi Ben-Menahem Lead Program Manager Windows Security Microsoft Corporation.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
Registrars and Security Greg Rattray Chief Internet Security Advisor.
Use of Kerberos-Issued Certificates at Fermilab Kerberos  PKI Translation Matt Crawford & Dane Skow Fermilab.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 9 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
PKI To The Masses IPCCC 2004 Dan Massey USC/ISI. 1 March PKI Is Necessary l My PKI related actions since arriving at IPCCC n Used an.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
ICANN’s multi-stakeholder approach OAS-CICTE REMJA/OAS + WEF Cyber Crime Workshop, Montevideo, Uruguay 10 July 2012
Norman SecureSurf Protect your users when surfing the Internet.
11-01: Get Started with SCP Supply Chain Platform Training Presentation Updated April 2009.
The Business Case for DNSSEC InterOp/ION Mumbai October 2012
Internet Trust Defined. Delivered. Electronic Business the Way It Was Meant to Be.
DNSSEC: Where We Are (and how we get to where we want to be)
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
What DNS is Not 0 Kylie Brown, Jordan Eberst, Danielle Franz Drew Hanson, Dennis Kilgore, Charles Newton, Lindsay Romano, Lisa Soros 0 Paul Vixie
Using the Powerful Microsoft Azure Platform, e-SUAP Properly and Securely Manages All Steps for Customizable Business Activities Permissions MICROSOFT.
DNSSEC: A Game Changer ICCS 2012 January 9, 2012 New York, NY
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Deploying DNSSEC: From Content to End-customer InterOp Mumbai October 2012
Security Through Publicity Eric Osterweil Dan Massey Batsukh Tsendjav Beichuan Zhang Lixia Zhang.
Module 9: Fundamentals of Securing Network Communication.
TODAY & TOMORROW DAY 2 - GROUP 5 PRESENTED BY: JAMES SPEIRS CHARLES HIGBY BRADY REDFEARN Domain Name System (DNS)
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
1 DNSSEC Deployment: Big Steps Forward; Several Steps to Go NANOG 32 Deployment D N S S E C Rob Austein Steve Crocker
DNSSEC 101 IGF 2012, Baku, Azerbaijan 6 November 2012
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Patrik Fältström. ITU Tutorial Workshop on ENUM. Feb 8, 2002, Geneva Explanation of ENUM (RFC 2916) Patrik Fältström Area Director, Applications Area,
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
DNSSEC Update SANOG 27 Kathmandu, Nepal January 2016
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Maximize Your Hosting Business: Covering all your SSL requirements Tim Callan May 31, 2006 VeriSign / thawte Confidential.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
Security Issues with Domain Name Systems
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
SaudiNIC Riyadh, Saudi Arabia May 2017
DNS Security Advanced Network Security Peter Reiher August, 2014
KSK Rollover Update David Conrad, CTO ICANN 59 – GAC 29 June 2017.
State of DNSSEC deployment ISOC Advisory Council
Living on the Edge: (Re)focus DNS Efforts on the End-Points
Tallinn, Estonia Sep 2017 Why DNSSEC Tallinn, Estonia Sep 2017
DANE: The Future of Transport Layer Security (TLS)
TRA, UAE May 2017 DNSSEC Introduction TRA, UAE May 2017
The Business Case for DNSSEC
Presentation transcript:

DNSSEC AsiaPKI - Bangkok, Thailand June 2013

DNS Basics DNS converts names ( to numbers ( )..to identify services such as www and ..that identify and link customers to business and visa versa

Where DNSSEC fits in..but CPU and bandwidth advances make legacy DNS vulnerable to MITM attacks DNS Security Extensions (DNSSEC) introduces digital signatures into DNS to cryptographically protect contents With DNSSEC fully deployed a business can be sure a customer gets un-modified data (and visa versa)

VoIP mydomainname.com DNS is a part of all IT ecosystems US-NSTIC effort Smart Electrical Grid OECS ID effort

The Original Problem: DNS Cache Poisoning Attack DNS Resolver = DNS Server Get page Attacker webserver Username / Password Error Attacker = Login page Password database ISP / ENTERPRISE / END NODE ENTERPRISE Animated slide detailed description at:

DNS Resolver = DNS Server Get page Attacker webserver Username / Password Error Login page Password database Argghh! Now all ISP customers get sent to attacker. Animated slide

The Bad: DNSChanger - ‘Biggest Cybercriminal Takedown in History’ – 4M machines, 100 countries, $14M Nov End-2-end DNSSEC validation would have avoided the problems

The Bad: Brazilian ISP fall victim to a series of DNS attacks 7 Nov End-2-end DNSSEC validation would have avoided the problems

The Bad: Other DNS hijacks* *A Brief History of DNS Hijacking - Google 25 Dec Russian e-Payment Giant ChronoPay Hacked 18 Dec 2009 – Twitter – “Iranian cyber army” 13 Aug Chinese gmail phishing attack 25 Dec 2010 Tunisia DNS Hijack google.* – April Google Puerto Rico sites redirected in DNS attack – May Morocco temporarily seize Google domain name 9 Sep Diginotar certificate compromise for Iranian users 7 Jan 2013 – Turktrust / EGO SSL / TLS doesn't tell you if you've been sent to the correct site, it only tells you if the DNS matches the name in the certificate. Unfortunately, majority of Web site certificates rely on DNS to validate identity. DNS is relied on for unexpected things though insecure.

The Good: Securing DNS with DNSSEC DNS Resolver with DNSSEC = DNS Server with DNSSEC Get page webserver Username / Password Account Data Login page Attacker = Attacker’s record does not validate – drop it Animated slide

The Good: Resolver only caches validated records DNS Resolver with DNSSEC = DNS Server with DNSSEC Get page webserver Username / Password Account Data Login page ENTERPRISEISP / ENTERPRISE / END NODE Animated slide

The Business Case for DNSSEC Cyber security is becoming a greater concern to enterprises, government, and end users. DNSSEC is a key tool and differentiator. DNSSEC is the biggest security upgrade to Internet infrastructure in over 20 years. It is a platform for new security applications (for those that see the opportunity). DNSSEC infrastructure deployment has been brisk but requires expertise. Getting ahead of the curve is a competitive advantage.

DNSSEC interest from governments Sweden, Brazil, Netherlands and others encourage DNSSEC deployment to varying degrees Mar AT&T, CenturyLink (Qwest), Comcast, Cox, Sprint, TimeWarner Cable, and Verizon have pledged to comply and abide by US FCC [1] recommendations that include DNSSEC.. “A report by Gartner found 3.6 million Americans getting redirected to bogus websites in a single year, costing them $3.2 billion.,” [2] US.gov mandate. >60% operational. [3] [1] FCC=Federal Communications Commission=US communications Ministry [2] [3]

COM DNSSEC TLDs NL

Deployed on 107/317 TLDs (.th.mm.my.in.kg.lk.nc.nz.la.pw.tv.kr.jp.ru.рф.de.my مليسيا.asia.tw 台灣,.kr 한국.com.net,.post, … and soon.cn) Root signed** and audited >86% of domain names could have DNSSEC Required in new gTLDs Growing ISP support* 3 rd party signing solutions*** Growing S/W H/W support: NLNetLabs, ISC, Microsoft, PowerDNS, Secure64…? openssl, mozilla: early DANE support IETF standard on DNSSEC SSL certificates (RFC6698) Growing support from major players…(Apple iPhone/iPad, Google ,…) DNSSEC - Where we are *COMCAST Internet (18M), TeliaSonera SE, Sprint,Vodafone CZ,Telefonica CZ, T-mobile NL, SurfNet NL, SANYO Information Technology Solutions JP, others.. **Int’l bottom-up trust model /w 21 TCRs from: TT, BF, RU, CN, US, SE, NL, UG, BR, Benin, PT, NP, Mauritius, CZ, CA, JP, UK, NZ… *** Partial list of registrars:

But… But deployed on < 1% (~2M) of 2 nd level domains. Many have plans. Few have taken the step ( e.g., yandex.com, paypal.com*, comcast.com ). DNSChanger and other attacks highlight today’s need. ( e.g end-2-end DNSSEC validation would have avoided the problems ) Innovative security solutions ( e.g., DANE ) highlight tomorrow’s value. *

DNSSEC: So what’s the problem? Not enough IT departments know about it or are too busy putting out other fires. When they do look into it they hear old stories of FUD and lack of turnkey solutions. Registrars/DNS providers see no demand leading to “chicken-and-egg” problems.

For Companies: – Sign your corporate domain names – Just turn on validation on corporate DNS resolvers For Users: – Ask ISP to turn on validation on their DNS resolvers For All: – Take advantage of ICANN, ISOC and other organizations offering DNSSEC education and training What you can do

“More has happened here today than meets the eye. An infrastructure has been created for a hierarchical security system, which can be purposed and re‐purposed in a number of different ways...” – Vint Cerf (June 2010) Game changing Internet Core Infrastructure Upgrade

SSL Dilution of Trust DNSSEC = Global “free” PKI CA Certificate roots ~1482 Login security SSHFP RFC4255 DANE and other yet to be discovered security innovations, enhancements, and synergies Content security Commercial SSL Certificates for Web and Content security “Free SSL” certificates for Web and and “trust agility” Network security IPSECKEY RFC4025 Cross- organizational and trans-national identity and authentication security DKIM RFC4871 DNSSEC root - 1 Domain Names Securing VoIP

Opportunity: New Security Products Improved Web SSL and certificates for all* Secured (S/MIME) for all* Validated remote login SSH, IPSEC* Securing VoIP Cross organizational digital identity systems Secured content delivery (e.g. configurations, updates, keys) Securing Smart Grid efforts A global PKI Increasing trust in e-commerce A good ref *IETF standards complete or currently being developed

ICANN DNSSEC Multi-stakeholder, bottom-up trust model* /w 21 crypto officers from around the world Broadcast Key Ceremonies and public docs SysTrust audited FIPS level 4 HSMs Root DPS DNSSEC Practice Statement

ICANN DNSSEC (and elsewhere) DCID 6/9 FIPS level 4

Photos: Kim Davies

DNSSEC: Internet infrastructure upgrade to help address today’s needs and create tomorrow’s security opportunities.

The Internet’s Phone Book - Domain Name System (DNS+DNSSEC) Get page webserver Username / Password Account Data DNS Resolver = DNS Server Login page ISP/ HotSpot / Enterprise/ End Node Majorbank.se (Registrant) DNS Server.se (Registry) DNS Server. (Root) Animated slide