DNSSEC an introduction ccTLD workshop November 26-29th, 2007 Amman, Jordan Based on slides from RIPE NCC.

Slides:



Advertisements
Similar presentations
DNSSEC in Windows Server. DNS Server changes Provide DNSSEC support in the DNS server – Changes should allow federal agencies to comply with SC-20 and.
Advertisements

Review iClickers. Ch 1: The Importance of DNS Security.
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License DNSSEC ROLLING.
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
DNS Transfers in DNSSEC world Olafur Gudmundsson Steve Crocker Shinkuro, Inc.
1 Securing BGP using DNSSEC Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Deploying DNSSEC in Windows Server 2012 David Cates Platform Services Group Microsoft Corporation.
DNSSEC Brought to you by ISC-BIND, SUNYCT, and: Nick Merante – SUNYIT Comp Sci SysAdmin Nick Gasparovich – SUNYIT Campus SysAdmin Paul Brennan – SUNYIT.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
A New Approach to DNS Security (DNSSEC) Author: Giuseppe Ateniese Stefan Mangard Presenter: Liu, Xiaotao.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
1 SecSpider: Distributed DNSSEC Monitoring Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
1 Observations from the DNSSEC Deployment Dan Massey Colorado State University Joint work with Eric Osterweil and Lixia Zhang UCLA.
1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
Phil Regnauld Hervey Allen June 2009 Papeete, Tahiti DNSSEC overview.
1 Secure DNS Solutions Rooster. 2 Introduction What does security mean for DNS? What security problems exist for DNS, what is being done about them, and.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
DNS Security Brad Pokorny The University of Minnesota Informal Security Seminar 4/18/03.
Deploying DNSSEC in Windows Server 2012 Rob Kuehfus Program Manager Microsoft Corporation WSV325.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Olaf M. Kolkman. Apricot 2003, February 2003, Amsterdam. /disi Steps towards a secured DNS Olaf M. Kolkman, Henk Uijterwaal, Daniel.
Tony Kombol ITIS Who knows this? Who controls this? DNS!
DNSSEC Introduction to Concepts Bill Manning
1 DNSSEC at ESnet ESCC/Internet2 Joint Techs Workshop July 19, 2006 R. Kevin Oberman Network Engineer Lawrence Berkeley National Laboratory.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
1 DNSSEC Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb dig +dnssec e164.arpa. naptr.
IIT Indore © Neminath Hubballi
Olaf M. Kolkman. Domain Pulse, February 2005, Vienna. DNSSEC Basics, Risks and Benefits Olaf M. Kolkman
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Troubleshooting.
Introduction to DNSSEC AROC Bamako, Mali, What is DNSSEC?
Andreas Steffen, , 12-DNSSEC.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Olaf M. Kolkman. Apricot 2005, February 2005, Kyoto. DNSSEC An Update Olaf M. Kolkman
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License The details.
TODAY & TOMORROW DAY 2 - GROUP 5 PRESENTED BY: JAMES SPEIRS CHARLES HIGBY BRADY REDFEARN Domain Name System (DNS)
ISOC.NL SIP © 15 March 2007 Stichting NLnet Labs DNSSEC and ENUM Olaf M. Kolkman
Tony Kombol ITIS DNS! overview history features architecture records name server resolver dnssec.
1 DNSSEC Deployment: Big Steps Forward; Several Steps to Go NANOG 32 Deployment D N S S E C Rob Austein Steve Crocker
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
Joint Techs, Albuquerque Feb © 8 Feb 2006 Stichting NLnet Labs DNS Risks, DNSSEC Olaf M. Kolkman and Allison Mankin
How to use DNS during the evolution of ICN? Zhiwei Yan.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)
OpenDNSSEC Deployment Tianyi Xing. Roadmap By mid-term – Establish a DNSSEC server within the mobicloud system (Hopfully be done by next week) Successfully.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Building Trust with Anchors Eric Osterweil Dan Massey Lixia Zhang 1.
Olaf M. Kolkman. IETF58, Minneapolis, November DNSSEC Operational Practices draft-ietf-dnsop-dnssec-operational-practices-00.txt.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
DRAFT STEP-BY-STEP DNS SECURITY ILLUSTRATIVE GUIDE Version 0.2 Sparta, Inc Samuel Morse Dr. Columbia MD Ph:
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Internet infrastructure 1. Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
DNSSEC an introduction ccTLD workshop November 26-29th, 2007 Amman, Jordan Based on slides from RIPE NCC.
Security Issues with Domain Name Systems
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
Lecture 20 DNS Sec Slides adapted from Olag Kampman
In collaboration with HKCERT and HKIRC July 2016
DNS Security.
DNS Cache Poisoning Attack
DNSSEC Basics, Risks and Benefits
A New Approach to DNS Security (DNSSEC)
NET 536 Network Security Lecture 8: DNS Security
NET 536 Network Security Lecture 6: DNS Security
Presentation transcript:

DNSSEC an introduction ccTLD workshop November 26-29th, 2007 Amman, Jordan Based on slides from RIPE NCC

Overview DNS Vulnerabilities DNSSEC Mechanisms - New Resource Records - Setting Up a Secure Zone - Delegating Signing Authority - Key Rollovers Operational Concerns

DNS Vulnerabilities

A DNS Resolving ask.net nameservers caching forwarder (recursive resolver)‏ stub resolver root server gtld server RIPE server ask ripe.net nameservers A QuestionAnswer

DNS Data Flow Zone file Dynamic updates Master Caching fowarder Resolver Slaves

DNS Vulnerabilities Zone file Dynamic updates Master Caching fowarder Resolver Slaves corrupting data unauthorised updates impersonating master altered zone data cache impersonation cache pollution by data spoofing data protection cache pollution by data spoofing server protection

DNS Exploit Example MX RR resolver QuestionAnswer receiving mail server Spoofed answer MX RR Black Hat sending mail server Mail goes to the server in the MX resource record Path only visible in headers

Other Possible DNS Targets SPF, DomainKey and family  Technologies that use the DNS to mitigate spam and phishing: $$$ value for the black hats StockTickers, RSS feeds  Usually no source authentication but supplying false stock information through a stockticker and a news feed can have $$$ value ENUM  Mapping telephone numbers to services in the DNS As soon as there is some incentive

Mitigate by Deploying SSL?

Claim: SSL is not the magic bullet  (Neither is DNSSEC)‏ Problem: Users are offered a choice  Far too often  Users are annoyed Implementation and use make SSL vulnerable  Not the technology

Where Does DNSSEC Come In? DNSSEC secures the name to address mapping  Before the certificates are needed DNSSEC provides an “independent” trust path  The person administering “https” is most probably a different from person from the one that does “DNSSEC”  The chains of trust are most probably different

DNSSEC Provides Data Origin Authentication Data Integrity Authenticating Name and Type Non- Existence DNSSEC  Is not designed to provide confidentiality  Provides no protection against denial of service attacks

DNSSEC Components TSIG/SIG(0): provides mechanisms to authenticate communication between machines DNSKEY/RRSIG/NSEC: provides mechanisms to establish authenticity and integrity of data DS: provides a mechanism to delegate trust to public keys of third parties A secure DNS will be used as an infrastructure with public keys  However it is NOT a PKI

Questions? Summary DNS introduction DNS vulnerabilities SSL not the complete answer

DNSSEC Mechanisms New Resource Records Setting Up a Secure Zone Delegating Signing Authority Key Rollovers

DNSSEC Protected Vulnerabilities Zone file Dynamic updates Master Caching fowarder Resolver Slaves altered zone data cache impersonation cache pollution by data spoofing cache pollution by data spoofing

DNSSEC hypersummary Data authenticity and integrity by signing the Resource Records Sets with private key Public DNSKEYs used to verify the RRSIGs Children sign their zones with their private key  Authenticity of that key established by signature/checksum by the parent (DS)‏ Ideal case: one public DNSKEY distributed

DNSSEC summary trusted-keys { “ripe.net." “..."; }; net. ripe.net. Locally Configured Verifier (named.conf)‏ IN 900 A IN 900 RRSIG A ripe.net.... ripe.net IN 3600 DNSKEY ripe.net IN 3600 RRSIG DNSKEY ripe.net.... ripe.netIN 3600 DS ripe.netIN 3600 RRSIG DS net....

Security Status of Data (RFC4035)‏ Secure  Resolver is able to build a chain of signed DNSKEY and DS RRs from a trusted security anchor to the RRset Insecure  Resolver knows that it has no chain of signed DNSKEY and DS RRs from any trusted starting point to the RRset Bogus  Resolver believes that it ought to be able to establish a chain of trust but for which it is unable to do so  May indicate an attack but may also indicate a configuration error or some form of data corruption Indeterminate  Resolver is not able to determine whether the RRset should be signed

New Resource Records

RRs and RRSets Resource Record:  name TTL class type rdata INA RRset: RRs with same name, class and type: IN A A A RRSets are signed, not the individual RRs

New Resource Records Three Public key crypto related RRs  RRSIG Signature over RRset made using private key  DNSKEYPublic key, needed for verifying a RRSIG  DSDelegation Signer; ‘Pointer’ for building chains of authentication One RR for internal consistency  NSECIndicates which name is the next one in the zone and which typecodes are available for the current name authenticated non-existence of data

NSEC Records NSEC RR provides proof of non-existence If the servers response is NXDOMAIN:  One or more NSEC RRs indicate that the name or a wildcard expansion does not exist If the servers response is NOERROR:  And empty answer section  The NSEC proves that the QTYPE did not exist More than one NSEC may be required in response  Wildcards NSEC records are generated by tools  Tools also order the zone

NSEC Walk NSEC records allow for zone enumeration Providing privacy was not a requirement Zone enumeration is a deployment barrier Work has started to study solutions  Requirements are gathered  If and when a solution is developed, it will co- exist with DNSSEC-BIS !

Questions? Summary DNSSEC not a PKI Zone status New RRs: DNSKEY, RRSIG, NSEC, DS

Setting Up a secure Zone

Securing a Zone: Step 1 Generate keypair  Include public key (DNSKEY) in zone file  dnssec-keygen tool comes with BIND

Securing a Zone: Step 2 Sign your zone Signing will:  Sort the zone  Insert: NSEC records RRSIG records (signature over each RRset)‏ DS records (optional)‏  Generate key-set and ds-set files

Securing a Zone: Step 3 Publish signed zone Signed zone is regular zonefile format  With extra resource records Make sure all your servers are DNSSEC capable!

Securing a Zone: Step 4 Configure forwarding resolver Test DNSSEC verification only done in resolver!

Securing a Zone: Step 5 Distribute your public key (DNSKEY)‏  To parent zone (key-set or ds-set can be used)‏  To everyone that wants/needs you as SEP Make sure to inform everyone of key rollovers!

Questions? Summary Generating keys Signing and publishing the zone Resolver configuration Testing the secure zone

Delegating Signing Authority Chains of Trust

Using the DNS to Distribute Keys Secured islands make key distribution problematic Distributing keys through DNS:  Use one trusted key to establish authenticity of other keys  Building chains of trust from the root down  Parents need to sign the keys of their children Only the root key needed in ideal world  Parents always delegate security to child

Key Problem Interaction with parent administratively expensive  Should only be done when needed  Bigger keys are better Signing zones should be fast  Memory restrictions  Space and time concerns  Smaller keys with short lifetimes are better

Key Functions Large keys are more secure  Can be used longer  ‏  Large signatures => large zonefiles   Signing and verifying computationally expensive  Small keys are fast  Small signatures  ‏  Signing and verifying less expensive  ‏  Short lifetime 

Key solution: More Than One Key RRsets are signed, not RRs DS points to specific key  Signature from that key over DNSKEY RRset transfers trust to all keys in DNSKEY RRset Key that DS points to only signs DNSKEY RRset  Key Signing Key (KSK)‏ Other keys in DNSKEY RRset sign entire zone  Zone Signing Key (ZSK)‏

Walking the Chain of Trust (root). Trusted Key net. ripe.net. Locally Configured ripe.net. DNSKEY (…) rwx002… (4252) ; KSK DNSKEY (…) sovP42… (1111) ; ZSK RRSIG DNSKEY (…) 4252 ripe.net. 5t... A RRSIG A (…) 1111 ripe.net. a3... net. DNSKEY (…) q3dEw… (7834) ; KSK DNSKEY (…) 5TQ3s… (5612) ; ZSK RRSIG DNSKEY (…) 7834 net. cMas… ripe.net. DS ab15… RRSIG DS (…) net DNSKEY (…) 5TQ3s… (8907) ; KSK DNSKEY (…) lasE5… (2983) ; ZSK RRSIG DNSKEY (…) Hw9… net. DS ab15… RRSIG DS (…). 2983

Questions? Summary Scaling problem: secure islands Zone signing key, key signing key Chain of trust

Key Rollovers

Try to minimise impact  Short validity of signatures  Regular key rollover Remember: DNSKEYs do not have timestamps  the RRSIG over the DNSKEY has the timestamp Key rollover involves second party or parties:  State to be maintained during rollover  Operationally expensive

Key Rollover - Summary 1. Generate new KSK 2. Sign with old and new KSKs 3. Wait for your servers + TTL of old DNSKEY RRset 4. Inform resolvers of the new key - that have you as a trusted entry point Query for the parental DS and remember the TTL Upload the new KSK or DS to the parent Check if *all* parental servers have new DS Wait another TTL before removing the old key

Questions? Summary Key size and signature lifetimes Key rollovers Emergency procedure

Operational Concerns

Upper Bound

Operational Issues Increased memory, CPU & bandwidth usage Who signs the root zone?  IANA/ICANN  Department of Commerce  Verisign No system call for DNSSEC Local verifier on trusted network? End user choice?

Questions? Summary Increased memory and bandwidth demands “Political” issues

The End! Fin Ende Kpaj Konec Son Fine Pabaiga Einde Fim Finis Koniec Lõpp Kрай Sfârşit Конeц Kraj Vége Kiнець Slutt Loppu Τέλος Y Diwedd Amaia Tmiem Соңы Endir Slut Liðugt An Críoch Fund הסוף Fí