Andreas Steffen, 28.11.2011, 12-DNSSEC.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.

Slides:



Advertisements
Similar presentations
DNSSEC in Windows Server. DNS Server changes Provide DNSSEC support in the DNS server – Changes should allow federal agencies to comply with SC-20 and.
Advertisements

Practical Considerations for DNSSEC Automation Joe Gersch OARC Presentation September 24, 2008.
Naming: The Domain Name System Nick Feamster CS 4251 Fall 2008.
Review iClickers. Ch 1: The Importance of DNS Security.
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Deploying DNSSEC in Windows Server 2012 David Cates Platform Services Group Microsoft Corporation.
ICANN’s Preparedness for Signing the Root September 24, 2008 DNS OARC Meeting, Ottawa, CA
DNSSEC Brought to you by ISC-BIND, SUNYCT, and: Nick Merante – SUNYIT Comp Sci SysAdmin Nick Gasparovich – SUNYIT Campus SysAdmin Paul Brennan – SUNYIT.
DNSSEC Sample Implementation MENOG 10 Workshop 22 April 2012, Dubai
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
DNS DOMAIN NAME SYSTEM NAME SYSTEM By Lijo George.
High-Level Awareness of DNSSEC KENIC/NSRC Workshop, Nairobi, May 2011 Phil Regnauld Joe Abley
Anne-Marie Eklund Löwinder Chief Information Security Officer Twitter: amelsec Thank’s to Fredrik Ljunggren, Kirei & Mehmet.
IANA Status Update ARIN XXVI meeting, Atlanta Barbara Roseman October 2010.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
1 DNSSEC BoF Internet2 Member Meeting October 15th, 2008 Noon, Napoleon A2
1 Observations from the DNSSEC Deployment Dan Massey Colorado State University Joint work with Eric Osterweil and Lixia Zhang UCLA.
© Afilias Limitedwww.afilias.info SM Challenges of Deploying DNSSEC: Prepare your ccTLD with Secondary DNS services LACNIC Meeting May 2010 Presented by:
1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
DNS Security Extensions (DNSSEC) Ryan Dearing. Topics History What is DNS? DNS Stats Security DNSSEC DNSSEC Validation Deployment.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Deploying DNSSEC in Windows Server 2012 Rob Kuehfus Program Manager Microsoft Corporation WSV325.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Data You Can Trust: The Key to Information Security Dr. Burt Kaliski, Jr. Senior Vice President and CTO, Verisign 25 th HP Information Security Colloquium.
Tony Kombol ITIS Who knows this? Who controls this? DNS!
Domain Name Service (DNS) at Colorado State University
CS 4396 Computer Networks Lab
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
IIT Indore © Neminath Hubballi
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Troubleshooting.
Introduction to DNSSEC AROC Bamako, Mali, What is DNSSEC?
DNSSEC an introduction ccTLD workshop November 26-29th, 2007 Amman, Jordan Based on slides from RIPE NCC.
© 2015 ISC November 2013 Sunset for the DLV?. © 2015 ISC Background (c) Interested
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License The details.
Tony Kombol ITIS DNS! overview history features architecture records name server resolver dnssec.
* Agenda  What is the DNS ?  Poisoning the cache  Short term solution  Long term solution.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
DNS 安全防護傘 - DNSSEC 報告者:劉旭哲. 原因 2008 駭客年會 Dan Kaminsky 公布重大安全漏 洞「 DNS Cache Poisoning 」 雲端運算的興起.
Presented by Mark Minasi 1 SESSION CODE: WSV333.
Olaf M. Kolkman. IETF58, Minneapolis, November DNSSEC Operational Practices draft-ietf-dnsop-dnssec-operational-practices-00.txt.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
ICESat/GLAS Status at NSIDC Doug Fowler NSIDC Product Team Lead PoDAG Oct , 2006.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Developing a DNSSEC Policy The Compulsory Zone Distribution Which DNSSEC Protocol Keys – and Managing them Managing the Children Using DNSSEC Mark Elkins.
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Internet infrastructure 1. Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
DNSSEC an introduction ccTLD workshop November 26-29th, 2007 Amman, Jordan Based on slides from RIPE NCC.
Rolling the Root Zone DNSSEC Key Signing Key
Lecture 20 DNS Sec Slides adapted from Olag Kampman
In collaboration with HKCERT and HKIRC July 2016
DNS Security.
Domain Name System Tony Kombol ITIS 3110.
State of DNSSEC deployment ISOC Advisory Council
Principles of Computer Security
DNS Cache Poisoning Attack
DNSSEC Iván González Montemayor A
A Longitudinal, End-to-End View of the DNSSEC Ecosystem
Anycast & dns by SHAURYA RASTOGI.
What DNSSEC Provides Cryptographic signatures in the DNS
DNSSEC Status Update in UA
DNSSEC Tutorial: Status “Today”
The Domain Name System.
Presentation transcript:

Andreas Steffen, , 12-DNSSEC.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications (ITA) 12 DNS Security Extensions DNSSEC

Andreas Steffen, , 12-DNSSEC.pptx 2 DNS Resolution via Recursive Nameserver

Andreas Steffen, , 12-DNSSEC.pptx 3 DNS Request

Andreas Steffen, , 12-DNSSEC.pptx 4 DNS Response

Andreas Steffen, , 12-DNSSEC.pptx 5 Simple DNS Cache Poisoning

Andreas Steffen, , 12-DNSSEC.pptx 6 Guessing Query ID and UDP Source Port

Andreas Steffen, , 12-DNSSEC.pptx 7 The Dan Kaminsky DNS Vulnerability – July 2008

Andreas Steffen, , 12-DNSSEC.pptx 8 DNS Root Servers A VeriSign Inc. B C D E F G H I J K L M Information Sciences Institute, USC OperatorIPv IPv6 2001:503:BA3E::2:30 # 2001:478:65:: :500:2F::F :500:1::803F: :7FE:: :503:C27::2: :7FD::1 2001:500:3:: :DC3::35 Cogent Communications University of Maryland1 NASA Ames Research Center1 Internet Systems Consortium Inc.49 US DoD Network Information Center6 US Army Research Lab1 Autonomica/NORDUnet34 VeriSign Inc.70 RIPE NCC18 ICANN3 WIDE Project6 200 Total number of servers:

Andreas Steffen, , 12-DNSSEC.pptx 9 Global Map of Root Servers

Andreas Steffen, , 12-DNSSEC.pptx 10 root DNSKEY (KSK) * * explicit import e.g. via trusted web site ch. DNSKEY (KSK) ZSK ch. DS DNSSEC Chain of Trust root KSK/ZSK ch. DNSKEY (ZSK) ZSK switch.ch. DS switch.ch. DNSKEY (KSK) KSK/ZSK switch.ch. DNSKEY (ZSK) ch. switch.ch. A x.x.x.x ZSK switch.ch. NS ns1/ns2 ZSKKSK/ZSK root DNSKEY (ZSK)

Andreas Steffen, , 12-DNSSEC.pptx 11 DNSSEC Resource Records I - DNSKEY DNSKEY - DNS Public Key Contains a public key used to sign the RRsets of a zone switch.ch IN DNSKEY AwEAAeCDWwjJO4mXBzayiKf4p7waJ7Ew eUnsTsAWkxpfELci4iaVdBugzYPfsZIg 9R6TIPky3LoPAPmIjCc2fbFkKnrGI7hJ jXAGMRwRJIBprFx4BXZSsjsvGb6MGC+e xHSlXw== ;{id = (zsk), size = 768b} Flags field 256 -> Zone Signing Key (ZSK) 257 -> Key Signing Key (KSK) with secure entry point (SEP) flag set Algorithm field 5 -> SHA-1 with RSA 7 -> SHA-1 with RSA & NSEC3 with SHA-1 8 -> SHA-256 with RSA 10 -> SHA-512 with RSA

Andreas Steffen, , 12-DNSSEC.pptx 12 DNSSEC Resource Records II - RRSIG RRSIG - Resource Record Signature Contains a public key signature over a resource record set (RRset) merapi.switch.ch IN A merapi.switch.ch IN RRSIG A switch.ch. 3KW9YjxdL08FqVYKFSn9 Q4+8U1iYrVCun+J1Ny8Y IiMC+6oQS/GZwRn2mr+H MruwEjNB9s7bWGzRmRiR TATPvS67gxjCiJkSP58P kGJ1dW3wBaz6r1feGNvz KhHLhvRe ;{id = 64608} Signature Expiration and Inception Fields The signature is not valid before Inception and after Expiration date. Key Tag Field Contains the key tag of the key which signed the RRset.

Andreas Steffen, , 12-DNSSEC.pptx 13 DNSSEC Resource Records III - DS DS - Delegation Signer Signed hash computed over KSK of child zone switch.ch IN DS dcfca519cf8b cc switch.ch IN DS cef df83311a92b48ae7f19 1ae e38b1ab7b3d0966b9ee55 switch.ch IN RRSIG DS ch. LPh8RgXQSqPcdQz6s1PJOjTuopO9RxQg s1YYCY/CnhYaHxb6ndNBJ7QP20eKN+91 /ULjN4Ep/k9Pgtos979i5OfEXpfLcWcv rKP1xGvqW4PjP+MT1PDs6uKisEUqGBoQ p7+nkkzjY+YsDbxtTV+/8uHcSnNmXoMm SqPms3G0aw4= ;{id = 31034}

Andreas Steffen, , 12-DNSSEC.pptx 14 DNSSEC Resource Records IV - NSEC NSEC – Next Owner Name Authenticated denial of existence of an owner name merapi.switch.ch. 180 IN NSEC mercury.switch.ch. A PTR AAAA LOC RRSIG NSEC merapi.switch.ch. 180 IN RRSIG NSEC switch.ch. kW1SnXWoJKwOHEG1P3INI83EOGuQ GujwvBT/MSWVQ+ms/2DXxjQcpt1Z P07+XI51cc0t7erUUG31KZdmUpXZ tQzPUJh49jjLh9aTjRiH1xGhlxv5 af+N95JDykRGSOAq ;{id = 64608} Proof that there is no name between merapi.switch.ch. and mercury.switch.ch. Allows enumeration of complete zone data!!!

Andreas Steffen, , 12-DNSSEC.pptx 15 DNSSEC Resource Records V - NSEC3 NSEC3 – Next Owner Name in Hashed Order Hashed Authenticated Denial of Existence h9p7u7tr2u91d0v0ljs9l1gidnp90u3h.org. 691 IN NSEC d399eaab h9rsfb7fpf2l8hg35cmpc765tdk23rp6 NS SOA RRSIG DNSKEY NSEC3PARAM ; flags: optout h9p7u7tr2u91d0v0ljs9l1gidnp90u3h.org. 691 IN RRSIG NSEC org. a+CC37hRM7yCFBaZn2SeRgY9h247GXptCuBYf45TwaoR xvBwTAXPT+UwZ/4hxwc2v7AR7ZZ8UOMiNJvYsl59eFW8 Xtgws4/Aih0fJ2/O8yUHwI695fRf9PrpxXEpqzStjSZP 5arJ1oldDAHcnxgLqdAMW6wnK1FNrslfJblJlmU= ;{id = 5273} Proof that there is no name between org. and ???.org. Does not allow straight enumeration of zone data! Dictionary attacks are possible but expensive.

Andreas Steffen, , 12-DNSSEC.pptx 16 DNSSEC Root Zone Signing Process ICANN Vetting and Processing TLD Operator DS Records DoC NTIA Authorization of Changes DS Records VeriSign Editing and Signing of Root Zone DS Records Root Servers (A,..., M) DS Records Root ZSK ZSK

Andreas Steffen, , 12-DNSSEC.pptx 17 DNSSEC Root Zone Signing Key Signing Process VeriSign ZSK Management ZSK Private Key ZSK ICANN KSK Management KSR Key Signing Request KSK Private Key KSK Published on Web Site ZSK KSK SKR Signed Key Response

Andreas Steffen, , 12-DNSSEC.pptx 18 ICANN Key Ceremonies Tier 1 – Facility – Access Control by Data Center Tier 2 – Facility – Access Control by Data Center Tier 3 – Facility – Access Control by Data Center Tier 4 – Cage – Access Control by Data Center Tier 5 – Safe Room – Access Control by ICANN Tier 6 – Safe #1 Tier 6 – Safe #2 Tier 7 – Safe Deposit Box Crypto Officers‘ Credentials Tier 7 – HSM KSK Private Keys Key Ceremony Computer

Andreas Steffen, , 12-DNSSEC.pptx 19 ICANN Key Ceremonies

Andreas Steffen, , 12-DNSSEC.pptx 20 Periodic Key Rollover T-10T+0T+10T+20T+30T+40T+50T+60T+70T+80T+90 ZSK post-publish ZSK pre-publish ZSK post-publish ZSK pre-publish ZSK KSK publish+sign KSK publish+sign KSK publish+sign KSK publish+sign KSK publish+sign KSK publish+sign KSK publish+sign KSK revoke+sign KSK revoke+sign KSK publish KSK publish KSK publish KSK publish KSK publish KSK publish+sign KSK publish+sign KSK publish+sign KSK publish+sign ZSK Rollover (every 90 days) Optional KSK Rollover (every 2-5 years or on demand) RRSIG Validity Period (10 days + 50% overlap)

Andreas Steffen, , 12-DNSSEC.pptx 21 DNSSEC Deployment (November ) TLDs signed by root zone: 11 gTLDs: arpa asia biz cat com edu gov info museum net org 54 ccTLDS: ac ag am be bg br bz ch cl co cz de dk eu fi fr gi gl gr hn in io jp kg kr la lc li lk lu me mn my na nc nl nu pm pr pt re sc se sh su tf th tm tw ug uk us wf yt 2 IDN ccTLDS: xn--kprw13d xn--kpry57d ( 台湾 Taiwan) TLDs with DNSKEY set: 1 gTLD: mil 3 ccTLDs: mm nz vc 2 IDN ccTLDs: xn--fzc2c9e2c ( Sinhala Sri Lanka) xn--xkc2al3hye2a ( இலங்கை Tamil Sri Lanka) Signing of major gTLDs: net: December 9, 2010 com: March 2011