Software Pieces for the DNSSEC-deployment roadmap SPARTA, Inc. 01/21/05.

Slides:



Advertisements
Similar presentations
Building a Knowledge Management System as a Life Cycle
Advertisements

.NET Technology. Introduction Overview of.NET What.NET means for Developers, Users and Businesses Two.NET Research Projects:.NET Generics AsmL.
CACORE TOOLS FEATURES. caCORE SDK Features caCORE Workbench Plugin EA/ArgoUML Plug-in development Integrated support of semantic integration in the plugin.
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Deploying DNSSEC in Windows Server 2012 David Cates Platform Services Group Microsoft Corporation.
1 DNSSEC From a protocol bug to a security advantage Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
T-FLEX DOCs PLM, Document and Workflow Management.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Software Connectors. Attach adapter to A Maintain multiple versions of A or B Make B multilingual Role and Challenge of Software Connectors Change A’s.
1 SecSpider: Distributed DNSSEC Monitoring Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
Web Server Administration
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
WNT Client/Server SDK Tony Vaccaro CS699 Project Presentation.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Stephen S. Yau CSE , Fall Security Strategies.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Key Management in Cryptography
Module 1: Introduction to Active Directory
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Deploying DNSSEC in Windows Server 2012 Rob Kuehfus Program Manager Microsoft Corporation WSV325.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Introduction to UDDI From: OASIS, Introduction to UDDI: Important Features and Functional Concepts.
Classroom User Training June 29, 2005 Presented by:
1 BTEC HNC Systems Support Castle College 2007/8 Systems Analysis Lecture 9 Introduction to Design.
These slides are designed to accompany Web Engineering: A Practitioner’s Approach (The McGraw-Hill Companies, Inc.) by Roger Pressman and David Lowe, copyright.
Chapter Intranet Agents. Chapter Background Intranet: an internal corporate network based on Internet technology. Typically, an intranet can.
Olaf M. Kolkman. Domain Pulse, February 2005, Vienna. DNSSEC Basics, Risks and Benefits Olaf M. Kolkman
Software Configuration Management (SCM)
Software Project Failure Software Project Failure Night Two, Part One CSCI 521 Software Project Management.
Security and Stability of Root Name Server System Jun Murai (From the panel on Nov. 13 th by Paul Vixie, Mark Kosters, Lars-Johan Liman and Jun Murai)
Olaf M. Kolkman. Apricot 2005, February 2005, Kyoto. DNSSEC An Update Olaf M. Kolkman
FI-CORE Data Context Media Management Chapter Release 4.1 & Sprint Review.
CHAPTER TEN AUTHORING.
Requirements Analysis Visual Modeling] Lab 02 Visual Modeling (from Visual Modeling with Rational Rose and UML) A way of thinking about problems using.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Application code Registry 1 Alignment of R-GMA with developments in the Open Grid Services Architecture (OGSA) is advancing. The existing Servlets and.
Software Quality Assurance
1 DNSSEC Deployment: Big Steps Forward; Several Steps to Go NANOG 32 Deployment D N S S E C Rob Austein Steve Crocker
DNSSEC-Deployment.org Secure Naming Infrastructure Pilot (SNIP) A.gov Community Pilot for DNSSEC Deployment JointTechs Workshop July 18, 2007 Scott Rose.
Course 6: IHS MPI Overview and Tool Usage February 2, 2011.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Capturing the requirements  Requirement: a feature of the system or a description of something the system is capable of doing in order to fulfill the.
AU, March 2, DNSSEC, APNIC, & how EPP might play a Role Ed Lewis DNS SIG APNIC 21.
By Rashid Khan Lesson 6-Building a Directory Service.
Developed by Reneta Barneva, SUNY Fredonia The Process.
OpenDNSSEC Deployment Tianyi Xing. Roadmap By mid-term – Establish a DNSSEC server within the mobicloud system (Hopfully be done by next week) Successfully.
Implementing Microsoft Exchange Online with Microsoft Office 365
BZUPAGES.COM. Presented to: Sir. Muizuddin sb Presented by: M.Sheraz Anjum Roll NO Atif Aneaq Roll NO Khurram Shehzad Roll NO Wasif.
Introduction to Active Directory
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Module 1: Introduction to Active Directory
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Module 14: Advanced Topics and Troubleshooting. Microsoft ® Windows ® Small Business Server (SBS) 2008 Management Console (Advanced Mode) Managing Windows.
Copyright © 2007, Oracle. All rights reserved. Managing Items and Item Catalogs.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
1 Management Information Systems M Agung Ali Fikri, SE. MM.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
SQL Database Management
Architecture Review 10/11/2004
Chapter 2: System Structures
Maintaining software solutions
System And Application Software
Health Ingenuity Exchange - HingX
Presentation transcript:

Software Pieces for the DNSSEC-deployment roadmap SPARTA, Inc. 01/21/05

How can we identify software pieces? Two approaches –One looks at the “big” picture –One breaks the problem into parts

Identifying software pieces –The “Forest” approach Addresses Immediate/Short-term/Long-term software needs Focuses on timeliness of software availability Divided into following categories of software –Essential Functionality –Proof-Of-Concept applications –Zone maintenance –Key Management –Tool Suites –Policy –Real-world applications relying on DNSSEC

Essential Functionality (EF) Validation Module (VAL) –Would provide a better understanding of the validation process in terms of the allowable states, error values and configuration knobs –Would form the basis of defining the API between the application and the security aware resolver –Would create heterogeneity in the available code base for validation modules –Would providing a useful test suite to test correctness and interoperability between multiple name server implementations –Would provide the basis for a good end user troubleshooting utility.

Proof-of-concept Applications (POC) Mail Transfer Agent (MTA) –Signed SPF records to guard against spoofed values –Terminate connections before spam is sent Web Browser (WB) –User interface for DNSSEC –Obtain “buy-in” from OS vendors

Zone Maintenance (ZM) Zone operation tools (ZOP) –That assist operators in the day to day operation of their zones, including operations such as zone transfer, zone signing and zone changes (static and dynamic). Log-based tools (LT) –That consume the log information generated by various tools in order to allow the operator to get a better sense of errors and abnormalities in the DNS configuration. Zonefile-based tools (ZT) –That allow the operator to check their zonefiles for correctness. This might also include enhancements to existing tools to make them more DNSSEC-aware. Query-based tools (QT) –That allow the operator to perform additional sanity checks on the DNS data, checking for availability and security of their own domains from different/external views for different for different trusted keys. Watchdog/Notification tools (WNT) –That can be used for tracking important events (such as expiry of signatures). They would also form the framework for a more comprehensive incident detection and notification module.

Key Management (KM) Zone Owner tools (ZO) –For creating, storing and rolling over keys. Also symmetric key management for zone transfers Parent-child tools (PC) –For managing the interaction between the parent and child zones while creating and maintaining signed delegations Trusted-key tools (TK) –For managing trusted keys at the end resolvers, and at trusted key “distribution points” Last-hop security tools (LH) –Secure-channel construction tools Registry-Registrar-Registrant (RRR) –Software that implements EPP extensions

Tool Suites (TS) Zone Maintenance (ZM) –A configuration mechanism to define the "operation profile" for DNSSEC. –There will be multiple ways to manage the DNS. –The operator should be given the flexibility of choosing the manner in which each of the various constituent operations are performed. Visualization (VIS) –These tools would provide visual indicators for the "health" of DNSSEC or even the "security posture" of the enterprise with respect to DNS. Troubleshooting (TR) –Aggregation of indicators and logs from various tools to give a unified view of DNSSEC events. –Being able to look at problems from multiple looking glasses can assist in troubleshooting operations. –This task would involve defining a unified logging format for all components ability to correlate notification/output from different components

Policy (POL) Key Management (KM) –This tool would provide a consistent interface for the definition of key- related parameters. –Related tasks would be identifying typical enterprise and registry policies for keys Single Resolver (SR) –This tool would provide a consistent interface for specifying all the knobs that can be defined for a validator. –These knobs are sometimes explicit (such as trust anchors) or might be implicitly defined (unspecified or underspecified) in the DNSSEC specification. Enterprise (ENT) –This tool would provide a consolidated interface for specifying enterprise-wide policy for DNSSEC. Predefined "policy profiles" would include those for "typical enterprises" and "typical registries". –The tool would assist the operators in making better choices for various parameters by providing some kind of feedback on the implications of a particular change. –At the other end of the spectrum, a similar tool would be used to check if some configuration complies with "organizational policy".

Software needs - Timeline Essential Functionality (EF)1.Validator (VAL) Proof-of-concept applications that use DNSSEC (POC) 1.Mail Transfer Agents (MTA) 2.Web Browsers (WB) Zone Maintenance (ZM)1.Zone operation (ZOP) 2.Log-based tools (LT) 3.Zonefile-based Tools (ZT) 4.Query-based tools (QT) 5.Watchdog/notification tools (WNT) Key Management (KM) 1.Zone Owner (ZO) 2.Parent-child (PC) 3.Trusted-key (TK) 4.Last-hop (LH) 5.R-R-R (RRR) Tool Suites (TS)1.Zone maintenance (ZM) 2.Visualization (VIS) 3.Troubleshooting (TR) Policy (POL)1.Key management (KM) 2.Single Resolver (SR) 3.Enterprise (ENT) Applications (APP)1.Applications that thrive on DNSSEC (???) Immediate Short-term Long Term

Identifying Software Pieces – The “Trees” approach Identify all operational pieces that interoperate to make DNSSEC “work” For each operational piece identify all available and missing pieces not only for software, but also documentation, policy, training and roles –Operational pieces can be enumerated by breaking all the DNS operations into “procedural flows” –“Procedural flows” was described in an earlier version of the roadmap –Slow progress in building the complete list of procedural flows – characteristics of some flows are still being identified by the community

Procedural Flows Nineteen flows had been identified earlier –Lookup –Registration –Enterprise Delegation –Trusted key configuration –Zone Transfer, Zone maintenance –ZSK Roll-over –KSK Roll-over –Root Zone Setup/Signing –Root Zone Signing Key Change –Root Key Signing Key Change –Registrant Change –Registrar Change –Registry Change –TLD delegation cycle (is this different – interaction with root) –TLD zone maintenance (is this different) –TLD key rollover (is this different – interaction with root) –Inverse tree procedures (same as TLD procedures?) –Trust anchor distribution (inline, DLV etc) The above flows will change as our understanding of the different organization types improves (.arpa procedures, types of registries, types of registrants, etc)

Some of the software pieces identified using the “trees” approach DNSSEC-aware applications Resolver library implementing the resolver-application API Last-hop channel security: key management tools, secure channel construction tools Validation module Recursive Name server functionality Authoritative name server functionality Name server maintenance tools Key-set/DS-set creation tools Tools for securely communicating zone information to parent (or parent-like entity) Tools for verifying the correctness of delegation information Tools that aid in trusted key roll-over Tools that aid in trusted key addition and deletion Zone transfer: functionality, secure channel construction, key management Zone maintenance: Zone creation/modification, zone update, zone checking tools Key generation tools: for zones, dynamic update, last hop, online signing Key roll-over tools Dynamic update: functionality in name servers, incremental signing of zones, tools that can provide the interface for dynamic updates, secure channel construction and key management for dynamic updates Troubleshooting tools Watchdog and notification tools Incident detection and response tools