1 Is DNSSEC a Burden? Thus far, DNSSEC adoption has been slow –In part, immaturity of the standards has been a past issue –Many trials, and some signed.

Slides:



Advertisements
Similar presentations
International Telecommunication Union ENUM Issues and Solutions Houlin Zhao Director Telecommunication Standardization Bureau International Telecommunication.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Bridging Technical Possibilities With Policy Technicalities Montreal, QC June 24, 2003.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Extended Validation Models in PKI Alternatives and Implications Marc Branchaud John Linn
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
1 Lecture 13: Public Key Infrastructure terms PKI trust models –monopoly with registration authorities with delegated certificate authorities –oligarchy.
CMSC 414 Computer (and Network) Security Lecture 17 Jonathan Katz.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
DNS-centric PKI Sean Turner Russ Housley Tim Polk.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
PKI To The Masses IPCCC 2004 Dan Massey USC/ISI. 1 March PKI Is Necessary l My PKI related actions since arriving at IPCCC n Used an.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Managing Client Access
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
IDENTITY MANAGEMENT Hoang Huu Hanh (PhD), OST – Hue University hanh-at-hueuni.edu.vn.
CNRI Handle System and its Applications
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
ENUM? “ Telephone Number Mapping (ENUM or Enum, from TElephone NUmber Mapping) is a suite of protocols to unify the telephone numbering system E.164 with.
DNS: Domain Name System
1 San Diego, California 25 February Securing Routing: RPKI Overview Mark Kosters Chief Technology Officer.
Olaf M. Kolkman. Domain Pulse, February 2005, Vienna. DNSSEC Basics, Risks and Benefits Olaf M. Kolkman
1 Application Layer Lecture 6 Imran Ahmed University of Management & Technology.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Industry Canada 1 Bob Leafloor Colman Ho Peter Chau Industry Canada January 2003 (ENUM) T E lephone NU mber M apping.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Information-Centric Networks06a-1 Week 6 / Paper 1 Untangling the Web from DNS –Michael Walfish, Hari Balakrishnan and Scott Shenker –Networked Systems.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Packet Filtering & Firewalls. Stateless Packet Filtering Assume We can classify a “good” packet and/or a “bad packet” Each rule can examine that single.
Module 9: Fundamentals of Securing Network Communication.
IP Network Clearinghouse Solutions ENUM IP-Enabling The Global Telephone Directory Frank Estes Vice President , ext 224
ENUM and its impact on the VoIP market Jay Daley.
The State of VoIP Peering Charles Studt Director of Product Management, VoEX.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
1 Madison, Wisconsin 9 September14. 2 Security Overlays on Core Internet Protocols – DNSSEC and RPKI Mark Kosters ARIN Engineering.
Peering: A Minimalist Approach Rohan Mahy IETF 66 — Speermint WG.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
Patrik Fältström. ITU Tutorial Workshop on ENUM. Feb 8, 2002, Geneva Explanation of ENUM (RFC 2916) Patrik Fältström Area Director, Applications Area,
Security fundamentals Topic 5 Using a Public Key Infrastructure.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Validation Working Group: Proposed Revisions to
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
05/03/2011Pomcor 1 Meeting the Privacy Goals of NSTIC in the Short Term Presentation at the 2011 Internet Identity Workshop Francisco Corella and Karen.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Let’s Encrypt and DANE ENOG 11 | Moscow | 8 Jun 2016.
Key management issues in PGP
SSL Certificates for Secure Websites
Cryptography and Network Security
CS 465 Certificates Last Updated: Oct 14, 2017.
Presentation transcript:

1 Is DNSSEC a Burden? Thus far, DNSSEC adoption has been slow –In part, immaturity of the standards has been a past issue –Many trials, and some signed ccTLD zones, but not much adoption by the largest gTLDs The real questions are: –Does it solve real problems? –Do customers want it? –How will it be financed (by registries/registrars)? Most real Internet security today relies on certificates –What is the impact of DNSSEC on certificates?

2 The Purpose of Certificates Certificates provide: –A binding between a domain name and a set of keying material Of course, there are many possible subjects of a certificate, but for e- commerce, the hostname of the web site is most common Thus, certificate authorities must verify namespace ownership –As a business requirement, they must do so quickly Many promise certificates in 30 minutes or less, like pizza For different levels of security, some more intensive verification schemes are employed –Many do so through simple DNS-based verification schemes Either using WHOIS, or simple DNS queries Certification of hostnames necessarily is predicated on the DNS! –Enrollment is the greatest challenge for the certificate business Successfully parlaying enrollment to business end users requires industrial- grade delegation technology Not successfully been demonstrated for consumers

3 The Business Model for Certificates Today, certificates come embedded in web browsers –Browser manufacturers are thus the ultimate keying authorities –Most charge some fee for inclusion of root CA certificates in distributions of their browser Do you trust browser manufacturers? Certificates are then sold to businesses and other end users by the CA –Prices vary quite widely, from as low as $10 to hundreds or thousands of dollars per year –Oftentimes coupled with domain name sales Certificates today are really used only for web browsers –Aside from hobbyist applications or closed networks –Thus, the business is limited to solving e-commerce problems

4 Domain-based Internet Applications The names used in the web ( are URIs rooted in domains –Most common application of certificates today –Domain names are used in the namespace (e.g. –The DNS root delegates to the name owner, and the name owner assigns the ‘local-part’ of an address VoIP has several dependencies on hostnames –Most protocols use -like URIs –ENUM as well has known privacy and security issues related to the openness of the DNS Because of enrollment problems, certificate usage today has not caught on for user-to-user applications like and VoIP

5 DNSSEC and Authentication In the IETF, the MASS effort targets authentication –Both use the DNS to discover keys scoped to a domain –Keys are either stored in the DNS directly, or, a pointer to a key is stored in the DNS Yahoo! DomainKeys –Uses a DNS TXT record, much like SPF Cisco Identified Internet Mail (IIM) –Uses a new DNS RR, “KR” Both approaches currently rely on the inherent security of the DNS –No question that it is easier to forge the From address of than it is to subvert the DNS –However, both approaches would be made more secure by DNSSEC

6 DNSSEC and SIP Many VoIP requests established with SIP use telephone numbers –Instead of tel: With DNSSEC, one can put keys in the DNS corresponding to the hostname of a SIP URI –What to do when a request is sent from a “tel” URI? –Common case for PSTN-SIP interworking An answer: ENUM can be used to find keys corresponding to the owner of the namespace ENUM provides a way of identifying the owner of the namespace via DNS –Accordingly, it is natural for the namespace owner to provide keys in this fashion

7 Leveraging DNSSEC for the Web Once keying material is in the DNS –It will be used to make decisions about higher-layer applications Connecting to a web site, one must verify the DNS first Other higher-layer security decisions may also be predicated on the presence of DNSSEC –Why is e-commerce secure (at a protocol level) today? Reference integrity: –The URL of the website is compared to the certificate returned by a TLS connection to the website –Even if the DNS is compromised, a violation will be detected However, a DNS lookup still must be performed –With DNSSEC, key exchange outside of the DNS may become superfluous

8 Corner-cases of Certificates: Revocation Why revoke certificates? –Certificates tend to be issued for long periods of time One or more years is common Accordingly, if your certificate is compromised, you need to inform relying parties –Based practice is certificate revocation lists (CRLs) Unfortunately, CRLs are rarely used by relying parties In DNSSEC, the lifetime of keys is based on the lifetime of DNS records (ttl) –Keys can therefore be changed as needed –Revocation is essentially free When your key changes, put a new one in the DNS Can still be cumbersome administratively –Delegation Signer (DS) records must also be updated –Root-key roll-over still needs to be addressed

9 Will DNSSEC Supplant Certificates? If you need keying material to verify DNS queries, why not reuse it at the application layer? –Even if the DNSKEY material isn’t suitable, it can be used to sign other keying material in the DNS What qualities do certificates provide that cannot be provided with DNSSEC? –DNSSEC keys can take the place of certificate keying material used to set up integrity/confidentiality mechanisms for TLS and other protocols –DNSKEY best practice is the use of RSA/SHA-1, same as for TLS –Some loose ends, like attribute certificates, contractual liability, and so on that are specific to the PKI model For cases where these are necessary, it is likely that certificates will continue to be used Change in the administration –Rather than the browser manufacturer controlling keys for Internet applications, the DNS root becomes the ultimate arbiter of trust for domain names –Increases the applicability of keys – no longer just e-commerce

10 Registry Incentives for DNSSEC New revenue from security services –The money currently being spent on certificates will go somewhere –Selling DNSSEC as an add-on to existing DNS sales follows existing marketing practice Names and certs are commonly bundled as an offering There are operational costs of implementing DNSSEC –These could be reimbursed, with a profit, and still undersell the existing cert market Likely that both registries and registrars can profit from this