A Step-by-Step guide for implementing DANE with a Proof of Concept

Size: px
Start display at page:

Download "A Step-by-Step guide for implementing DANE with a Proof of Concept"

Transcription

1 A Step-by-Step guide for implementing DANE with a Proof of Concept Sandoche BALAKRICHENAN, Stephane BORTZMEYER, Mohsen SOUISSI AFNIC R&D {sandoche.balakrichenan, stephane.bortzmeyer, mohsen.souissi}@afnic.fr April 15, Context The attacks on Certificate Authorities (CAs) such as DigiNotar [1] and Comodo [2] in 2011 have demonstrated the weakness in the current PKIX (X.509 Public-Key Infrastructure ) [3] [4] model and boosted the discussion of using DNS leveraged by DNSSEC as an alternative PKI. These discussions led to the creation of the DANE (DNS-based Authentication of Named Entities) Working Group [5] in the IETF. DANE defines the protocol for storing TLS certificates in the DNS for a variety of applications using them. It not only reinforces the PKIX model but also provides facilities to secure communications by only using the DNS as an alternative PKI for certain scenarios. The outcome of this tutorial is: 1. Implementing a Proof of Concept that demonstrates the use of DANE protocol via a browser client 2. Publishing a reference documentation which could be in the form of a tutorial that enables DANE protocol to be implemented and understood by a wider audience 2 Motivation for working on DANE In order to have a secure web communication (HTTPS (Hypertext Transfer Protocol Secure)), first, the browser obtains the IP address of a domain name using the Domain Name System (DNS) infrastructure and then it connects to the domain s web server using the IP address to obtain a digital certificate. The digital certificate is issued and signed usually by a trusted third party i.e. a Signing Authority 1. Wherever it is mentioned "CA" 2 in this document, it could mean either a CA or a subordinate CA. The CA is used to assert to the browser that the web server is the representative of the domain asked by the client. A Transport Layer Security (TLS) connection is established between the browser and the web server on a successful authentication of the certificate. With the TLS connection established, the traffic between the browser and the web server is encrypted and is protected against any third party eavesdropping. 1 The Signing Authority may be a CA, Registration Authority (RA) or some other intermediate authority (such as a subordinate CA) or it may be a self-signed one 2 The CA is the an integral part of the Public Key Infrastructure (PKI). PKI is an infrastructure for supporting and managing Public key based digital certificates. The digital certificates used in the secure web communication is an example of Public Key based digital certificate. Even though there are different PKI approaches, our focus will be on PKIX, which is the PKI standard mostly used in the Internet 1

2 While establishing a secure connection to a domain, an end user has an higher probability of being compromised while establishing the TLS connection using the PKIX rather than resolving the IP address using the DNS 3 assuming that the domain is signed using DNSSEC. The reason is, a browser client such as Firefox for example trusts 1,482 CA Certificates (as per SSL observatory [6]) provided by 651 organizations. Even if only one of them is compromised, the compromised CA can generate a certificate for any domain name which will be authenticated by Firefox, and thereby compromising a secure web communication of an end user who is using Firefox as browser. For instance, multiple CAs can (and in fact has been) issue multiple certificates for which will then be trusted by the browser. The fault here, is that the domain owner had up to now no way of telling the world how the domain server should be authenticated (for example using a particular CA or certificate). The DANE WG have developed a new type of DNS record called Transport Layer Security Authentication (TLSA), that allows a domain owner to sign statements about which entities are authorized to emit certificates on their behalf. End users applications can use these records either to augment the existing system of CAs or to rely alone on the additional chain of trust, rooted in the DNS. Two RFC s relating to DANE have been published by the IETF: 1. DANE Use case RFC 6394 [7] and 2. DANE Protocol RFC 6698 [8] This tutorial will focus on different steps involved in implementing DANE both at the client and at the server end. The example in this document will involve implementation of DANE using a web browser client, but, it should be noted that DANE is also not limited to web, and may be used on any TLS connection. 3 Background In the motivation [section 2], a brief introduction to the issue pertaining to the PKIX is provided. This section will further explain the issue with an example and then briefly demonstrate how DANE is a solution. When an user types a URL: in his browser, then the browser performs the following steps (as shown in Figure [1]): 1. Step 1 : Obtain the IP address of the domain requested 2. Step 2 : With the help of the obtained IP address, the browser connects to the domain s web server and obtains the digital certificate 3. Step 3 : The browser validates the certificate with the CA mentioned in the certificate. The CA mentioned should be trusted by the browser 4 and valid otherwise it will trigger an alert. As shown in Figure [1] 5, there are two types of attacks possible: 1. Type 1: An attacker could use various tactics (e.g. Cache poisoning) in step 1 (Figure [1]) to provide a rogue IP address to the browser 3 The Compromise of a particular domain name at the DNS infrastructure can occur only at the particular registry, registrar or at the hosting provider, hence reducing the attack surface 4 Each web browser by default has a pre-installed list of CAs certificate and the browser client trusts all the digital certificates signed by those CAs 5 The Orange color is to point the danger and the yellow color to show it is an issue 2

3 Figure 1: Web browsing Without DNSSEC and DANE 2. Type 2: The s at the end of http indicates that the browser is connecting to the domain s web server via TLS (which is the successor of SSL developed by the IETF). During the initial communication (TLS handshake) between the browser and the web server, the server responds to the client by presenting PKIX digital certificate. The certificate is meant to assert that the server is the representative of the domain asked by the client. The browser evaluates this certificate to decide whether the server is fraudulent or not. This decision is normally based on two criteria: Whether the certificate contains the desired domain name and Whether the certificate is issued by a trusted CA. As mentioned earlier, Web browsers (e.g. Firefox, Chrome etc..) come with a default list of trusted CAs. The number of CAs trusted by a browser varies, and there are examples of up to 1500 distinct CAs trusted by a browser. If an attacker has been able to compromise any of the CA (out the many CAs) trusted by the browser, then he/she/they can create a fraudulent certificate for any domain (for e.g. Further, when a user is connecting to if the attacker has the means to be the Man In The Middle (MITM), he/she/they can send the created fraudulent certificate to the end user. Since the fraudulent certificate is created by a CA which is trusted by the user s browser, the browser will accept the certificate and the credentials sent by the attacker. This could help the attacker to redirect the user to a spoofed server. During the communication between the end user and the spoofed web server, the attacker could steal the data of the user such as login, password, bank details etc. As explained in the motivation [Section 2], such attacks have already occurred. It has to be noted that the issue is not the security of the PKIX technology, but with such a big list of the CAs accepted by the browser s there is a higher probability of being compromised. With PKIX, a domain owner does not have the possibility of telling the browser that any user connecting to his domain should be validated by a certificate provided by a particular CA. With the issues explained, let us now to look at the solutions. Type 1 attack (at step 1 in (Figure [1])) is mitigated by DNSSEC. As explained in the motivation [Section 2], the DANE WG at the IETF was 3

4 conceived to mitigate Type 2 attack (at step 2 and 3 in (Figure [1])). DANE protocol with DNSSEC allows applications to provide a trust path using security provided by the TLS which hasn t really been possible before. Using DANE protocol, a domain owner will sign the certificate provided by the web server based on different options (Refer Section 3.1) and add it to the domains zone, thus enabling the domain owner an option of informing the application (e.g. browser) on how to validate the certificate obtained from the web server. For example, if the domain CA is X, with DANE mechanism, the browser will only accept a certificate from X for authenticating the server, thus, reducing the attack probability. DANE also enables domains using self-signed certificates to secure the communication between the web server and the browser within the DNS infrastructure (Bypassing the CA ecosystem). 3.1 TLSA Resource Record (RR) The first focus by the DANE WG was to standardize the TLSA Resource Record (RR) [8]. The basic role of this record is to exist in a DNSSEC signed zone, and to indicate the certificate information that corresponds to a specific service on a specific port of a name in that zone. As shown in Figure [2], the RDATA (RR specific data) for a TLSA RR consists of a certificate usage field, a selector field, a matching type field and the certificate for association data field: Figure 2: TLSA Resource Record Explained Before further digging into the TLSA RDATA, it should be noted that the payload of the TLSA RR (i.e. the Certificate for association as shown in Figure [3]) MUST be matched with the certificate given by the web server. The certificate provided by the server is identified as "Target Certificate". The fields Usage, Selector, Matching type determines how the matching between the payload (i.e. the Certificate for association in the TLSA RR) and the target certificate is done. Figure 3: TLSA Resource Record in Wire-Format Usage [Refer Table:1 for further explanation] - Also called as Certificate Usage field describes how the target certificate should be matched with the Certificate for association payload in the TLSA RR ( 3 in Figure:2) 4

5 Table 1: Usage explained Value Meaning 0 0 in the certificate usage field informs the application (e.g. browser) that it should perform the PKIX validation (i.e. validating a domain s certificate using the CA ecosystem) and during the PKIX validation it should use the CA certificate that matches the TLSA RR obtained from the DNS zone of the domain. This usage helps to pin a CA to a domain thus limiting which CA can be used to issue certificates for a domain. 1 Same as 0, but adds another level of security wherein the target certificate must match the payload in the TLSA RR (e.g. Validate only with the specific certificate from a specific CA for a domain) 2 Useful while a domain is using its own CA which is not listed with the browsers. For example, an organization has planned to create its own CA and each of the department in the organization creates its own self-signed certificates with the created CA as trust anchor for their respective department web sites. Browser s such as Firefox, Chrome will not trust the organization department web site since it does not have the organization CA in its list of trusted CA. The TLSA RR is received by the application (i.e. browser) as a result of DNSSEC validation. Hence, it is sure that the TLSA payload is not forged unless and otherwise someone has access to the DNS zone. The application (e.g. browser) while performing the certificate validation has to make sure that the CA of the target certificate is the same as that of the TLSA payload received. 3 There is no PKIX validation. There is no CA involved. Domain administrator issues the self-signed certificate which is stored as target certificate in the server and a fingerprint of the certificate is added in the domain s zone as the certificate association payload of the TLSA RR. The application authenticates the server once the target certificate matches the TLSA payload. Selector [Refer Table:2 for further explanation] - Describes what part of the target certificate will be matched against the Certificate for association data ( 0 in Figure:2) Table 2: Selector explained Value Meaning 0 Indicates the certificate association data field contains the full target certificate 1 Indicates the certificate association data field contains only the Subject Public Key Info [4] of the target certificate Matching type [Refer Table:3 for further explanation] - Describes how the Certificate for association data is matched ( 1 in Figure: 2) Table 3: Matching type explained Value Meaning 0 indicates that the application has to match the target certificate and the payload at the certificate association data field exactly 1 Indicates that the SHA-256 algorithm is applied on the target certificate and the result (i.e. the hash) is matched with the payload at the certificate association data field 2 Indicates that the SHA-512 algorithm is applied on the target certificate and the result (i.e. the hash) is matched with the payload at the certificate association data field 5

6 3.2 DNSSEC is essential for DANE As specified in the DANE protocol RFC [8], the TLSA RR resulting from a DNS Query must be validated by DNSSEC. It is MUST that the zone which has a TLSA RR must be signed by DNSSEC and the applications which query the domain for TLSA RR validation should use a DNSSEC aware resolver. 4 State of Art Attacks on popular CAs such as comodo [2] and diginotar [1] trusted by default in popular web browsers and operating systems have led many to question the state of trust in the PKIX. There have been calls for reevaluating PKIX either providing an alternative or reinforcing the CAs behind the TLS system. Some of them include Perspectives [9], Convergence [10], Public Key Pinning [11] and Certification Authority Authorization (CAA) [12] RR in DNSSEC. Now that DNSSEC has been deployed at the DNS root and by several Top Level Domains (TLDs), the IETF and various other groups started considering the possibility of replacing/reinforcing CA certification model with one based on the secured DNS. At the IETF 78, there was a Birds of a Feather (BoF) meeting on the topic under the title which was organized to discuss how to establish a chain of trust from DNSSEC root to to the root CA certificate. At IETF 79, the same topic was discussed under the name Keys In DNS (kidns). Following these discussions a WG was formed in the security area. This WG got the name DANE [5] and was officially announced at the end of As mentioned in the motivation [section 2], two RFC s [7],[8] relating to DANE have been published by the DANE WG. There are other drafts in process which look at how DANE mechanism could be used for Secure/Multipurpose Internet Mail Extensions (s/mime), Post Office Protocol (POP3), Internet Message Access Protocol (IMAP) and Simple Mail Transfer Protocol (SMTP). To implement DANE, TLSA RR(s) should be created for a domain and payload of the TLSA RR should be matched with the target certificate subject to its different options as explained in the section 3.1. SWEDE [13] is a tool to create and verify TLSA RR s based on different usages. An example is shown in sections [5.2.3]. SWEDE developer mentions that it is mostly untested and the last update made to the SWEDE tool is on April 2012 (as of 17/01/2013). Openssl-dane [14] is another tool similar to SWEDE where it validates the TLSA record using OpenSSL. There is a dane module added to the SSHFP [15] tool which allows creating TLSA RR(s) for a domain as explained in section [5.2.3]. As mentioned in section 1, our aim is to implement the proof of concept for DANE using a browser. The browser needs to have a DANE module which does the verification part. As of now there are two working browser implementations of DANE - both for Firefox. DANE add-on for Firefox [16] is explained in detail in section 6. CZNIC [17] has published a add-on for Firefox called DANE patrol which has been tested. Since this add-on for Firefox was published at the end of the project in 2012, it has not been further evaluated which could be done during the second version of this document in Implementation Description The task for implementing the DANE demonstrator is described in three sections: 1. Platform set up 2. Implementing the components necessary for DANE set up at the server end 3. Implementing the add-on at the browser client (for Firefox) 6

7 5.1 Platform set up Naming plan For convenience of testing, the domains that will be chosen for the DANE demo will be delegated under AFNIC s R&D DNS namespace rd.nic.fr. As explained in section 4, the demonstrator will test an upgraded version [22] of the Firefox add-on [16] for DANE. Two distinct domains have been used for testing the Firefox add-on: one to test it is working under various criteria and another to test the broken scenarios. The domain s used are mentioned below: Table 4: Naming Plan Domain Name DNSSEC Target Certificate dane.rd.nic.fr OK Self-signed certificate dane-broken.rd.nic.fr OK Self-signed certificate There is no CA involved in the testing of the above domains. Hence the demonstrator will test only usage 3 [Refer section 3.1] Addressing plan As explained in [Table:5] all test domains are accessible both in IPv4 and IPv6. Table 5: Addressing plan Domain Name IPv4 IPv6 dane :67c:2218:6::7:155 dane-broken :67c:2218:6::7: Filtering rules All the domains used for test will be accessible on port 53 (DNS), port 80 (http) and port 443 (https) Initial Configurations Both IPv4 and IPv6 addresses [Mentioned in the section 5.1.2] for the demo are added to a physical host "telma.rd.nic.fr" : debian 6.0 (squeeze). BIND DNS software implementation is used at the server end for all the domains [Mentioned in the section 5.1.1]. There is a separate instance of named running for each domain on "telma.rd.nic.fr" for this demo. Apache is configured on telma so that it listens to all domains both on IPv4 and IPv6. On "telma.rd.nic.fr", the important directories are: 1. For DNS - /etc/dane (BIND conf) and /var/dane (dane zone) 2. For apache - /etc/apache2/ 3. For SSL certificates - /etc/dane/ca 5.2 Setting up Components necessary for implementing DANE at the server end At the server end, we need to implement three steps (from Step:1 to Step:3) as described in Figure 4. 7

8 Figure 4: Steps for implementing DANE for the demo Step 1 : Enabling DNSSEC Different steps in setting up DNSSEC for the test domains are explained in this section. Configuration involved in this section is done at the authoritative server for each domain and at the recursive nameserver. First step is to check whether the parent for the domain is signed. If it is true, the complete tree is checked for each parent until the TLD [Table:6]. In the case of the DNS Root, it is a known fact that it is signed. Table 6: DNSSEC verification for the parent zones Test Type Command used Status Verifying whether the cctld fr is signed dig +short dnskey zone Done Verifying whether nic.fr is signed dig +short dnskey zone Done Verify whether rd.nic.fr is signed dig +short dnskey zone Done The second step is to enable DNSSEC on authoritative servers of each of the domain ( "dane.rd.nic.fr", "dane-broken.rd.nic.fr". Once it is signed it can be checked using the same technique as it has been done for validating the parents. An example of the Zone-Signing Key (ZSK) and the Key-Signing Key (KSK) for the domain "dane.rd.nic.fr" is shown here: dane.rd.nic.fr. IN DNSKEY AwEAAeI3FfKI+96FXufElXWspcxnp6LEt6S2FVESAbV5pPUb9hbP6oJU yakxwc9hraqwtjs+ziqrnd8cenyujequqhv9uo2mdpawo722riiyxrxu SH/7qnP4/EWeSNEzFT+zDsuRzWa9D68xtGKfKtdjnKNS8bS8ApgaxXUr n/tmy19// dane.rd.nic.fr. IN DNSKEY AwEAAd4dVcbYLRV6IDO6Icw4Es5HSVY6rfGB4iNTbw+Y84G2YS7nYGzi nd8rjisxeryiimsj0xwuocuzm9drvmtdr1qy0yeijceajom45xis+xol m0mmicitf1hja+vdtsambubeyvdkvtq2z52hqvvh4lmyj9po8enzuay9 BgQWfIfbyA+NouOvECWOH6KvI05IT4hAaaqUnBU47bG9imuFmytFpgL9 t17pv5t8jmotbje9tblmxzbedyyb6zqrs2cbs7u+4sxo3o+r+wfkotga XCheXUP1W3j+In/KpZ2zCVt5Iefvyodq4WgQKU8gTbbw2DTVmqWphBlc ciqqzg8saub5zavhzyzh6hmjo16guqe+ylblpapedmxt2ziju3l+yghb r2me9uibllklhnosakofefxhcyy2r1i/jgyygg/mci10kivkiz9muwyr 0hZCEcpbNCs1ru9UbTpVlQpQIu9w0Uk5gozF/yUaCr/fKFEZjRvG/x02 vj4dgydw9bevv+jwipbsaxxlea/nbzniqs3xabhstgnhet6pjkfpc/jy fktze2krqbr1sccjslvsy6wtqavwrhihywknbxkukz+mgzsw8lwkyju6 rskann3biic//anffnyunhuqctr1jdxujkvtttirjj8ualhyqiqu13w1 d8ctzgc4qhqoqa7l The third step is to add the the Delegation Signer (DS) records for the four domains at its parent zone "rd.nic.fr": dane.rd.nic.fr. dane.rd.nic.fr. dane-broken.rd.nic.fr. dane-broken.rd.nic.fr. IN DS AE983EBAD81130C170AE2AF2393D6EEF4FA2F97E IN DS F3FE7BF385A40E FEEFA017CDAED7A1FB85256F2D63EE4D B7 IN DS BA5CC64D B214D941CA29FE27687D99E IN DS DA3B395E FD02CDECEE2303BFDF8BCF3BD5FC6C2462CA645CF F8D20B7B 8

9 As explained in section 3.2, the resolver should be enabled for DNSSEC validation. In the case of BIND the configuration depends on version. Starting with BIND 9.7.0, the trusted keys can be managed by the process of automated updates of DNSSEC trust anchors as explained in RFC 5011 [19]. An example of how the root. trusted keys are added to a recursive resolver is shown below: managed-keys { "." initial-key "AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjF FVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoX bfdauevpquyehg37nzwajq9vnmvdxp/vhl496m/qzxkjf5/efucp2gad X6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpz W5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relS Qageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulq QxA+Uk1ihz0="; }; Note: Enabling the resolver for DNSSEC is not needed for the demo explained in this tutorial, since the add-on in Firefox has in itself a DNSSEC aware resolver Step 2 : Set up TLS for the domain Configuration involved in this section is done at the Web Server for each domain. For setting up TLS, the first step is to enable the web server to accept both requests on port 443 (TLS) and 80 (http) and install TLS in case it is not installed. An example from the ports.conf file (using apache) shows the addition: NameVirtualHost *:80 <IfModule mod_ssl.c> Listen 443 </IfModule> The next step is to create the certificate. Normally there are two options 1. Create a CA and sign a server certificate with it for each domain or 2. Self-sign a server certificate without a CA. The domains used for the demo have self-signed certificate without a CA. There are two reasons for choosing option (2) for the demo. Our primary objective as part of this work in 2012 is to demonstrate that the DANE protocol can be implemented in a browser and to prove that users can have a secure web connection without the PKIX ecosystem. The second reason is that the tools to create the TLSA RR concentrated on the Usage 3 (Refer section 3.1), as a result of which, their implementation for other usages were either buggy or not implemented. For further explanation on generating a self-signed certificate and then finally configuring the SSL virtual host for each domain please refer to [20] Step 3 - Creating the TLSA RR Section 3.1 explained the TLSA RR and its relation with the DANE protocol. An example of the TLSA RR which is added to the domain s zone is shown here: _443._tcp.dane.rd.nic.fr. IN TLSA e781577c0eabb6701a0caf287e48ceebd3ba64b81792ef49705f0f5e b There are different tools available which can be used to create a TLSA RR for a domain name. These tools can be installed in any host and run to create the TLSA RR. The only necessity is that they should be connected to the Internet. This section details how TLSA RR is created with the help of two such tools. As explained earlier (Section 4), SWEDE is a tool developed to create and verify TLSA RR s. SWEDE can be used to create/verify different TLSA records based on different usages. One has to be careful in 9

10 choosing the parameters to create the TLSA RR. A mis configured TLSA RRset will effectively disable access to the TLS server for all conforming clients. Since the demo (as of now) concentrates on Usage 3, the command used to create the TLSA RR is as follows:./swede create --usage 3 --output rfc dane.rd.nic.fr The result of the above command is as follows: Attempting to get certificate from Got a certificate with Subject: /C=FR/ST=SQY/L=Montigny/O=AFNIC/OU=ReD/CN=dane.rd.nic.fr _443._tcp.dane.rd.nic.fr. IN TLSA e781577c0eabb6701a0caf287e48ceebd3ba64b81792ef49705f0f5e b Attempting to get certificate from 2001:67c:2218:6::7:155 Got a certificate with Subject: /C=FR/ST=SQY/L=Montigny/O=AFNIC/OU=ReD/CN=dane.rd.nic.fr _443._tcp.dane.rd.nic.fr. IN TLSA e781577c0eabb6701a0caf287e48ceebd3ba64b81792ef49705f0f5e b The tool connects to the specified domain name (e.g: dane.rd.nic.fr ) both in IPv4 and IPv6 to verify whether it is a valid domain. Then it retrieves the TLS certificate from the domain s web server. Depending on the parameters (such as usage, selector etc) provided, it creates the TLSA RR. The obtained TLSA RR is provisioned in the DNS zone of the domain. It should be noted that even though the tool creates the TLSA RR twice, each for IPv4 and IPv6 connection, they are both identical since they are created based on the same certificate from the web server of the domain. Hence, only one TLSA RR is added to the DNS zone. Similar to SWEDE there is a dane module added to the SSHFP tool to create and verify TLSA RR s. The TLSA RR obtained using dane module from sshfp tool is as follows: dane --rfc dane.rd.nic.fr _443._tcp.dane.rd.nic.fr IN TLSA 1 1 E781577C0EABB6701A0CAF287E48CEEBD3BA64B81792EF49705F0F5E B As in the SWEDE tool, the option rfc is used to generate the TLSA RR as specified in RFC 6698 [8]. The idea of using the dane module in addition to SWEDE, is to check whether the result (TLSA RR generated) is identical for both the tools. But only the payload (i.e. the Certificate for association) field is identical for both tools. As of the time of writing, it is not clear how to specify the options (such as Usage, selector and matching type) with dane module while creating the TLSA RR. Note: Once the TLSA RR is created it should be added to the domain zone and the zone should be re signed. 6 Step 4 - DANE demo: Analysis of Firefox browser with extended DNSSEC validator In the previous section, we have tested using existing tools for the creation/validation of TLSA RRs. But, as explained in the context [section 1], our objective is to implement a Proof of Concept that demonstrates the use of DANE protocol via a browser. This section will focus on implementing the Step:4 as shown in Figure 4. At the client end, the browser should be capable of performing DNSSEC and TLSA validation. In our search we found that no browser support DANE natively. There are add-on s for Firefox and in this section we test an upgraded version [22] of the Extended DNSSEC validator[16] add-on. In addition to DNSSEC validation, the add-on checks for the existence of TLSA records in the domain s zone and validates the TLSA record with the certificate obtained from the domain s server based on the TLSA usage specified. The add-on comes with a DNSSEC enabled unbound resolver. The advantage of having a resolver embedded with the browser will appeal to a larger public. Any user wanting to implement DANE on their browser client need not worry about enabling DNSSEC either in their host or at their Internet Service Provider (ISP). On installing the upgraded version of add-on [22] in Firefox and launching the domain dane.rd.nic.fr, the result is as shown in (Figure:5). The result ( Domain name is secured by DNSSEC and the certificate is validated by DNSSEC ), demonstrates that the test domain is validated for DNSSEC as well as TLSA. 10

11 Figure 5: Screen-shot of the test domain with Extended DNSSEC validator In case of a self-signed certificate as it is in our test and the connection is on a secure channel ( HTTPS ), the add-on verifies if the trust can be obtained from the DNS using DNSSEC. If it can be trusted based on a validated data from the DNS, an exception for the certificate is passed to the browser. This exception will disable the self-signed certificate warning and the end-user will be able to browse a secured version of the domain. Without the Extended DNSSEC validator add-on, Firefox will display the exception (Figure:6) for the same domain. Figure 6: Screen-shot of the test domain without the Extended DNSSEC validator On understanding the add-on successfully validates a valid domain which is configured properly for DANE, we further conduct some tests to determine whether the add-on is programmed to satisfy certain other criteria with respect to a DANE implementation. The criteria for the tests are : 1. Whether the add-on identifies broken DNSSEC domains 2. Successful TLSA validation with respect to the following: Does the add-on identifies a broken TLSA RR during the course of matching Normally, DANE mechanism should satisfy all the four usages explained in section 3.1. The domain that is tested as shown in the Figure 5 is limited to Certificate Usage 3. Here the test is done to verify whether the add-on support other certificate usages. Test whether the add-on supports DNS alias i.e. CNAME (Canonical Name) RR Test whether the add-on supports wildcards 11

12 6.1 DNSSEC Validation Two tests are conducted here: 1. Test1 - To test whether the add-on validates, when the signature used to sign the domain s zone is broken (i.e. corrupt or expired) 2. Test2 - To test whether the add-on validates, when there is a bogus RRSIG (Resource Record digital SIGnature) [23] in the domain s zone Table 7: Testing DNSSEC validation with extended DNSSEC validator add-on S.NO What is done How is it broken Result Test1 Launch the domain is a domain provided Page does not load by Comcast with a deliberately broken signature Test2 Launch the domain A bogus RRSIG Domain name is secured dane-broken.rd.nic.fr record is added by DNSSEC and the certificate is validated by DNSSEC For the Test2 which failed (Table 7), the bogus RRSIG is added deliberately for a A type DNS record [24] and not for the TLSA RR. Even though The TLSA RR is valid, this issue should be fixed in the add-on, since in the case of the browser using a proper DNSSEC capable resolver (not the extended DNSSEC validator add-on) will not be able to connect to the server and retrieve the IP address, as the domain zone is provisioned with a bogus RRSIG for A record. 6.2 TLSA Validation Table 8: Testing the add-on with a broken TLSA RR What is done How is it broken Result Launch the domain Deliberately corrupt the TLSA record. The certificate Domain name is dane-broken.rd.nic.fr offered by the server (6e013c54df90d42d3c016e1 secured by DNSSEC but ac9eb21e6da45403d3a5ae9b2d8f21fc3600d409c) the certificate has Does not match the TLSA record in the DNS zone (6e013c54df an invalid signature 90d42d3c016e1ac9eb21e6da45403d3a5ae9b2d8f21fc3600d409d) but the domain is correctly signed with DNSSEC The add-on successfully identifies when the target certificate and the TLSA RR in the DNS zone does not match for Usage: TLSA Validation for certificate usage other than Usage:3 : Even though we have limited to the Usage:3 for TLSA validation (Figure 5), the test here is to check whether the add-on validates Usages other than 3 in the TLSA record. The result (Table:9) proves that the add-on validates only Usage 3 and does not bother for values other than 3 in the usage field. Table 9: Test the add-on for Usage other than Usage:3 Domain Name How it is broken How the Firefox browser reacts Launch the domain The TLSA record is correct. The domain is correctly signed with DNSSEC. Domain name is secured by dane-broken.rd.nic.fr But the TLSA parameters are incorrect. For the certificate, DNSSEC and the certificate is the TLSA parameters are: Usage:1, Selector: 0, matchingtype: 1 validated by DNSSEC whereas it should be Usage:3, Selector: 0, matchingtype: TLSA Validation with CNAME [25]: It is a common technique in DNS to have a domain name aliased to another. The use of aliases provides number of advantages and this option is provided by CNAME RR. A brief view of the domain dane.rd.nic.fr zone file used for testing CNAME is as follows: 12

13 IN A IN AAAA 2001:67c:2218:6::7:155 ; Specifying the alias test.dane.rd.nic.fr. IN CNAME The question arises how/where a domain owner will provision the TLSA RR s. For the above example, the right-hand side of the DNS entry is the Canonical name i.e. " and the lefthand side is the Owner name i.e. "test.dane.rd.nic.fr.". There are three possible scenarios for provisioning the TLSA RR: 1. Scenario:1 The TLSA RR is provisioned for the Owner name (left-hand entry) _443._tcp.test.dane.rd.nic.fr. IN TLSA c68ebcc998fda83222cabf2c0228ecc413566e709e5dc5cf25396a8bf4342dd3 2. Scenario:2 The TLSA RR is provisioned for the Canonical name (right-hand entry) and no TLSA RR for the owner name _443._tcp. IN TLSA c68ebcc998fda83222cabf2c0228ecc413566e709e5dc5cf25396a8bf4342dd3 3. Scenario:3 The TLSA RR is provisioned for both owner and canonical name Both scenario 1 and 2 have the same TLSA RR while creating the TLSA RR, for example with the tool SWEDE, the TLSA RR is created from the (single) target certificate present at the domain s web server. The motivation here is to test whether the add-on successfully does TLSA validation for the above three scenarios. Table 10: Test the add-on for CNAME scenarios S.NO What is done How the Firefox browser (with the add-on) reacts Test1 Scenario:1 and open the Owner name test1.dane.rd.nic.fr It shows that both DNSSEC and TLSA validation is OK Test2 Scenario:1 and open the Canonical name Invalid Certificate Test3 Scenario:2 and open the Owner name test1.dane.rd.nic.fr Invalid Certificate Test4 Scenario:2 and open the Canonical name It shows that both DNSSEC and TLSA validation is OK Test5 Scenario:3 and on opening both Owner and Canonical name It shows that both DNSSEC and TLSA validation is OK Both Test 2 and Test 3 failed because the the add-on after retrieving the TLSA RR from the DNS server, matches the domain name in the TLSA RR with the domain name used by the browser for querying. On finding that they don t match, the add-on relinquishes control to the browser which on identifying it as a self-signed certificate throws the invalid certificate exception TLSA Validation with Wildcards [26]: Like CNAME (mapping a domain name to another), wildcards could make life easier for DNS administrator in mapping many domain names to one even though its usage should be carefully applied. Testing TLSA validation for wildcards, the TLSA record in the DNS zone of the test domain (dane.rd.nic.fr) is as follows: *._tcp.dane.rd.nic.fr IN TLSA D7D DACFB432E EAC9A3A6586BD109D5C5466 Table 11: Test the add-on for wildcards What is done Launch dane.rd.nic.fr How the Firefox browser reacts Invalid domain name signature has been detected The validation seems to have failed by the unbound libraries in the add-on. What we understand from testing the extended DNSSEC validator add-on is that the add-on as it is now is yet ready for a production environment. 13

14 7 Conclusion From this work we have achieved the following : A DANE demo set up for testing valid as well as broken sites The current document which would be used as a tutorial. Such a document has been in demand in the DANE mailing list Providing feed-back to the add-on developers for DANE The Firefox Extended validator add-on is a good beginning for incorporating DANE mechanisms in a browser. But it seems to have been developed with specific goals - for example, just to demonstrate that DANE mechanism is feasible in a browser. The source code for this add-on seems not to be modular and as pointed out earlier it assumes certain properties for validation. Our focus had been to test the add-on under various scenarios (even though it may not be exhaustive) and help the community to take all these issues into account while upgrading the existing implementations or while developing a new one. 7.1 Prospective work The DANE protocol as of now seems to be a promising mechanism for the deployment of DNSSEC. The Deploy360 Program (for the promotion of DNSSEC) by the ISOC has incorporated DANE into this effort. We identified quite early that DANE could become the promising application only if its use is experienced by normal users. Hence, we started working on the add-on s for DANE in browsers. Even though there are partial efforts to implement DANE in browsers, it is important that the browser vendors support it natively. To support it natively, they need to know that their users need it. This is where comes the importance of people who actually publish the TLSA records and that is where our role (AFNIC) comes into focus, educating the registry community of publishing TLSA records. It may take some time for normal usage of DANE, but it is important that we should follow this effort until the technology reaches normal end users. 8 Acknowledgements Phil Regnauld and Niall O Reilly have provided input and suggestions to this document. References [1] [2] [3] IETF PKIX, in [4] David Cooper, Stefan Santesson, Stephen Farrell, Sharon Boeyen, Russell Housley and Tim Polk; RFC Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, May 2008 [5] DANE Charter, [6] 14

15 [7] R. Barnes; RFC Use Cases and Requirements for DNS-Based Authentication of Named Entities (DANE)., October 2011 [8] P. Hoffman, J. Schlyter ; RFC The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA., August 2012 [9] Perspectives Project, [10] Convergence Project, [11] Public Key Pinning, [12] P. Hallam-Baker, R. Stradling; RFC DNS Certification Authority Authorization (CAA) Resource Record., January 2013 [13] SWEDE Tool, [14] OpenSSL DANE Tool, [15] DANE module in SSHFP, [16] Extended DNSSEC Validator, [17] DANE Patrol, [18] Stapled Certificates, [19] M. StJohns; RFC Automated Updates of DNS Security (DNSSEC) Trust Anchors., September 2007 [20] [21] [22] [23] R. Arends, R. Austein, M. Larson, D. Massey, S. Rose; RFC Resource Records for the DNS Security Extensions., March 2005 [24] P. Mockapetris; RFC Domain names - Implementation and specification, November 1987 [25] P. Mockapetris; RFC Domain names - Concepts and facilities, November 1987 [26] E. Lewis; RFC The Role of Wildcards in the Domain Name System, July

Securing End-to-End Internet communications using DANE protocol

Securing End-to-End Internet communications using DANE protocol Securing End-to-End Internet communications using DANE protocol Today, the Internet is used by nearly.5 billion people to communicate, provide/get information. When the communication involves sensitive

More information

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment Dan York, CISSP Senior Content Strategist, Internet Society Eurasia Network Operators' Group (ENOG) 4 Moscow, Russia October

More information

Deploying DNSSEC: From End-Customer To Content

Deploying DNSSEC: From End-Customer To Content Deploying DNSSEC: From End-Customer To Content March 28, 2013 www.internetsociety.org Our Panel Moderator: Dan York, Senior Content Strategist, Internet Society Panelists: Sanjeev Gupta, Principal Technical

More information

Introduction to the DANE Protocol

Introduction to the DANE Protocol Introduction to the DANE Protocol ICANN 47 July 17, 2013 Internet Society Deploy360 Programme Providing real-world deployment info for IPv6, DNSSEC, routing and other Internet technologies: Case Studies

More information

Next Steps In Accelerating DNSSEC Deployment

Next Steps In Accelerating DNSSEC Deployment Next Steps In Accelerating DNSSEC Deployment Dan York, CISSP Senior Content Strategist, Internet Society DNSSEC Deployment Workshop, ICANN 45 Toronto, Canada October 17, 2012 Internet Society Deploy360

More information

SSL and Browsers: The Pillars of Broken Security

SSL and Browsers: The Pillars of Broken Security SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the

More information

Analyzing DANE's Response to Known DNSsec Vulnerabilities

Analyzing DANE's Response to Known DNSsec Vulnerabilities Analyzing DANE's Response to Known DNSsec Vulnerabilities Matthew Henry Joseph Kirik Emily Scheerer UMBC UMBC UMBC henmatt1@umbc.edu joskir1@umbc.edu semily1@umbc.edu May 9, 2014 Abstract: SSL/TLS is currently

More information

DNSSEC Applying cryptography to the Domain Name System

DNSSEC Applying cryptography to the Domain Name System DNSSEC Applying cryptography to the Domain Name System Gijs van den Broek Graduate Intern at SURFnet Overview First half: Introduction to DNS Attacks on DNS Second half: DNSSEC Questions: please ask! DNSSEC

More information

DNS at NLnet Labs. Matthijs Mekking

DNS at NLnet Labs. Matthijs Mekking DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the

More information

A PKI approach targeting the provision of a minimum security level within Internet

A PKI approach targeting the provision of a minimum security level within Internet A PKI approach targeting the provision of a minimum security level within Internet Maryline Laurent-Maknavicius CNRS Samovar UMR 5157, GET/INT/LOR Maryline.Maknavicius@int-evry.fr Abstract After decades

More information

Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011

Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011 The Internet is for Everyone. Become an ISOC Member. Cyber Security Symposium 2011 Where is Hong Kong in the secure Internet infrastructure development Warren Kwok, CISSP Internet Society Hong Kong 12

More information

Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology

Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2

More information

Apache Security with SSL Using Ubuntu

Apache Security with SSL Using Ubuntu Apache Security with SSL Using Ubuntu These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background

More information

SSL BEST PRACTICES OVERVIEW

SSL BEST PRACTICES OVERVIEW SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%

More information

ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB

ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB Scott Rea DigiCert, Inc. Session ID: SEC-T02 Session Classification: Intermediate BACKGROUND: WHAT IS A CERTIFICATION AUTHORITY? What is a certification

More information

A Study of What Really Breaks SSL HITB Amsterdam 2011

A Study of What Really Breaks SSL HITB Amsterdam 2011 A Study of What Really Breaks SSL HITB Amsterdam 2011 v1.0 Ivan Ristic Michael Small 20 May 2011 Agenda 1. State of SSL 2. Quick intro to SSL Labs 3. SSL Configuration Surveys 4. Survey of Actual SSL Usage

More information

The Shape and Size of Threats: Defining a Networked System s Attack Surface

The Shape and Size of Threats: Defining a Networked System s Attack Surface The Shape and Size of Threats: Defining a Networked System s Attack Surface Eric Osterweil eosterweil@verisign.com Danny McPherson dmcpherson@verisign.com Lixia Zhang lixia@cs.ucla.edu Abstract As more

More information

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere

More information

One year of DANE Tales and Lessons Learned. sys4.de

One year of DANE Tales and Lessons Learned. sys4.de One year of DANE Tales and Lessons Learned sys4.de DANE secures Security Why secure Security? Encryption Models Opportunistic Encryption > Expect anything > Proceed if absent > Try if offered > Proceed

More information

Networking Domain Name System

Networking Domain Name System IBM i Networking Domain Name System Version 7.2 IBM i Networking Domain Name System Version 7.2 Note Before using this information and the product it supports, read the information in Notices on page

More information

Digital certificates and SSL

Digital certificates and SSL Digital certificates and SSL 20 out of 33 rated this helpful Applies to: Exchange Server 2013 Topic Last Modified: 2013-08-26 Secure Sockets Layer (SSL) is a method for securing communications between

More information

DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS

DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS AFNIC s Issue Papers DNSSEC Domain Name System Security Extensions 1 - Organisation and operation of the DNS 2 - Cache poisoning attacks 3 - What DNSSEC can do 4 - What DNSSEC cannot do 5 - Using keys

More information

Internet-Praktikum I Lab 3: DNS

Internet-Praktikum I Lab 3: DNS Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans

More information

A quick overview of the DANE WG. * DNS-based Authentication of Named Entities

A quick overview of the DANE WG. * DNS-based Authentication of Named Entities A quick overview of the DANE WG * DNS-based Authentication of Named Entities Some background... When you connect to https://www.example.com you use SSL (actually TLS) to secure your connection. Need a

More information

Alternatives and Enhancements to CAs for a Secure Web

Alternatives and Enhancements to CAs for a Secure Web Alternatives and Enhancements to CAs for a Secure Web Ben Wilson Digicert, Inc. - CA/Browser Forum Eran Messeri Google Session Classification: Intermediate Current Web PKI System OS / Browsers have Managed

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Server Certificates based on DNSSEC

Server Certificates based on DNSSEC Server Certificates based on DNSSEC Audun Jøsang and Kashif Sana Dar University of Oslo josang@mn.uio.no and kashifd@ifi.uio.no Abstract. Globally unique domain names and IP addresses that are provided

More information

Lesson 13: DNS Security. Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division

Lesson 13: DNS Security. Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division Lesson 13: DNS Security Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation

More information

Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs

Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs OWASP AppSec APAC 2012 The OWASP Foundation http://www.owasp.org Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs

More information

Should You Trust the Padlock? Web Security and the HTTPS Value Chain. Keeping Current 20 November 2013 Ken Calvert

Should You Trust the Padlock? Web Security and the HTTPS Value Chain. Keeping Current 20 November 2013 Ken Calvert Should You Trust the Padlock? Web Security and the HTTPS Value Chain Keeping Current 20 November 2013 Ken Calvert Outline 1. What are we afraid of? 2. Countermeasures: Securing the Web 3. Public-key Crypto

More information

How to configure SSL proxying in Zorp 3 F5

How to configure SSL proxying in Zorp 3 F5 How to configure SSL proxying in Zorp 3 F5 June 14, 2013 This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2013 BalaBit IT Security Ltd. Table of Contents 1. Preface...

More information

SSL/TLS: The Ugly Truth

SSL/TLS: The Ugly Truth SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team adrian.hayter@cnsuk.co.uk Contents Introduction to SSL/TLS Cryptography

More information

How to configure SSL proxying in Zorp 6

How to configure SSL proxying in Zorp 6 How to configure SSL proxying in Zorp 6 April 17, 2015 Abstract This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2015 BalaBit IT Security Ltd. Table of Contents 1. Preface...

More information

GDS Resource Record: Generalization of the Delegation Signer Model

GDS Resource Record: Generalization of the Delegation Signer Model GDS Resource Record: Generalization of the Delegation Signer Model Gilles Guette, Bernard Cousin, David Fort To cite this version: Gilles Guette, Bernard Cousin, David Fort. GDS Resource Record: Generalization

More information

XN--P1AI (РФ) DNSSEC Policy and Practice Statement

XN--P1AI (РФ) DNSSEC Policy and Practice Statement XN--P1AI (РФ) DNSSEC Policy and Practice Statement XN--P1AI (РФ) DNSSEC Policy and Practice Statement... 1 INTRODUCTION... 2 Overview... 2 Document name and identification... 2 Community and Applicability...

More information

IEncrypt a work-in-progress

IEncrypt a work-in-progress IEncrypt a work-in-progress open-source initiative to increase encryption of traffic to and from.ie web sites, starting with newly registered second-level.ie domains. Developed by Tolerant Networks Limited

More information

Glossary of Technical Terms Related to IPv6

Glossary of Technical Terms Related to IPv6 AAAA Record An AAAA record stores a 128-bit Internet Protocol version 6 (IPv6) address, which does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid

More information

Internal Server Names and IP Address Requirements for SSL:

Internal Server Names and IP Address Requirements for SSL: Internal Server Names and IP Address Requirements for SSL: Guidance on the Deprecation of Internal Server Names and Reserved IP Addresses provided by the CA/Browser Forum June 2012, Version 1.0 Introduction

More information

Presented by Greg Lindsay Technical Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group April 7, 2010

Presented by Greg Lindsay Technical Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group April 7, 2010 Presented by Greg Lindsay Technical Writer Windows Server Information Experience Presented at: Seattle Windows Networking User Group April 7, 2010 Windows 7 DNS client DNS devolution Security-awareness:

More information

The Domain Name System from a security point of view

The Domain Name System from a security point of view The Domain Name System from a security point of view Simon Boman Patrik Hellström Email: {simbo105, pathe321}@student.liu.se Supervisor: David Byers, {davby@ida.liu.se} Project Report for Information Security

More information

DNSSEC in your workflow

DNSSEC in your workflow DNSSEC in your workflow Presentation roadmap Overview of problem space Architectural changes to allow for DNSSEC deployment Deployment tasks Key maintenance DNS server infrastructure Providing secure delegations

More information

Attacks against certification service providers and their ramifications

Attacks against certification service providers and their ramifications Federal IT Steering Unit FITSU Federal Intelligence Service FIS Reporting and Analysis Centre for Information Assurance MELANI www.melani.admin.ch Technological consideration Attacks against certification

More information

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI) Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure

More information

Sonian Getting Started Guide October 2008

Sonian Getting Started Guide October 2008 Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using

More information

Setup Guide Access Manager Appliance 3.2 SP3

Setup Guide Access Manager Appliance 3.2 SP3 Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS

More information

Unbound a caching, validating DNSSEC resolver. Do you trust your name server? Configuration. Unbound as a DNS cache (SEC-less)

Unbound a caching, validating DNSSEC resolver. Do you trust your name server? Configuration. Unbound as a DNS cache (SEC-less) Unbound a caching, validating DNSSEC resolver UKUUG Spring 2011 Conference Leeds, UK March 2011 Jan-Piet Mens $ dig 1.1.0.3.3.0.8.1.7.1.9.4.e164.arpa naptr Do you trust your name server? DNS clients typically

More information

DNS Risks, DNSSEC. Olaf M. Kolkman and Allison Mankin. olaf@nlnetlabs.nl and mankin@psg.com. http://www.nlnetlabs.nl/ 8 Feb 2006 Stichting NLnet Labs

DNS Risks, DNSSEC. Olaf M. Kolkman and Allison Mankin. olaf@nlnetlabs.nl and mankin@psg.com. http://www.nlnetlabs.nl/ 8 Feb 2006 Stichting NLnet Labs DNS Risks, DNSSEC Olaf M. Kolkman and Allison Mankin olaf@nlnetlabs.nl and mankin@psg.com 8 Feb 2006 Stichting NLnet Labs DNSSEC evangineers of the day Allison: Independent consultant Member of the Internet2

More information

Securing DNS Infrastructure Using DNSSEC

Securing DNS Infrastructure Using DNSSEC Securing DNS Infrastructure Using DNSSEC Ram Mohan Executive Vice President, Afilias rmohan@afilias.info February 28, 2009 Agenda Getting Started Finding out what DNS does for you What Can Go Wrong A Survival

More information

A versatile platform for DNS metrics with its application to IPv6

A versatile platform for DNS metrics with its application to IPv6 A versatile platform for DNS metrics with its application to IPv6 Stéphane Bortzmeyer AFNIC bortzmeyer@nic.fr RIPE 57 - Dubai - October 2008 1 A versatile platform for DNS metrics with its application

More information

DNSSEC and DNS Proxying

DNSSEC and DNS Proxying DNSSEC and DNS Proxying DNS is hard at scale when you are a huge target 2 CloudFlare DNS is big 3 CloudFlare DNS is fast 4 CloudFlare DNS is always under attack 5 CloudFlare A secure reverse proxy for

More information

DANE for SMTP. Viktor Dukhovni & Wes Hardaker. IETF 87, Berlin July 2013

DANE for SMTP. Viktor Dukhovni & Wes Hardaker. IETF 87, Berlin July 2013 DANE for SMTP Viktor Dukhovni & Wes Hardaker IETF 87, Berlin July 2013 1 Addresses in SMTP is security agnostic: SMTP with and without TLS runs over port 25 There is no URI scheme

More information

DNS SECURITY TROUBLESHOOTING GUIDE

DNS SECURITY TROUBLESHOOTING GUIDE DNS SECURITY TROUBLESHOOTING GUIDE INTERNET DEPLOYMENT OF DNS SECURITY 27 November 2006 Table of Contents 1. INTRODUCTION...3 2. DNS SECURITY SPECIFIC FAILURE MODES...3 2.1 SIGNATURES...3 2.1.1 Signature

More information

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Computer Networks: Domain Name System

Computer Networks: Domain Name System Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com

More information

FAQ (Frequently Asked Questions)

FAQ (Frequently Asked Questions) FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias

More information

DNSSEC for Everybody: A Beginner s Guide

DNSSEC for Everybody: A Beginner s Guide DNSSEC for Everybody: A Beginner s Guide San Francisco, California 14 March 2011 4:00 to 5:00 p.m. Colonial Room The Schedule 2 This is Ugwina. She lives in a cave on the edge of the Grand Canyon... This

More information

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance ITL BULLETIN FOR JULY 2012 Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance Paul Turner, Venafi William Polk, Computer Security Division, Information

More information

Introduction to Network Security Key Management and Distribution

Introduction to Network Security Key Management and Distribution Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology cetinkayae@mst.edu http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015

More information

DANE Secured E-Mail Demonstration. Wes Hardaker Parsons <wes.hardaker@parsons.com>

DANE Secured E-Mail Demonstration. Wes Hardaker Parsons <wes.hardaker@parsons.com> DANE Secured E-Mail Demonstration Wes Hardaker Parsons Overview My Background In scope topics Securing E-Mail Requirements Implementing Each Requirement 2 My Background Part of the Network Security

More information

F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution

F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution As market leaders in the application delivery market and DNS, DHCP, and IP Address Management (DDI) market

More information

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components

More information

Progress of DNS Security Deployment in the Federal Government

Progress of DNS Security Deployment in the Federal Government Progress of DNS Security Deployment in the Federal Government Scott Rose NIST Abstract In 2008, the US Federal government mandated that all Federal Executive Branch owned DNS zones must deploy DNSSEC.

More information

Lesson 10: Attacks to the SSL Protocol

Lesson 10: Attacks to the SSL Protocol Lesson 10: Attacks to the SSL Protocol Luciano Bello - luciano@debian.org Chalmers University Dr. Alfonso Muñoz - amunoz@diatel.upm.es T>SIC Group. Universidad Politécnica de Madrid Security of the SSL

More information

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler Certificates Noah Zani, Tim Strasser, Andrés Baumeler Overview Motivation Introduction Public Key Infrastructure (PKI) Economic Aspects Motivation Need for secure, trusted communication Growing certificate

More information

DNS Security FAQ for Registrants

DNS Security FAQ for Registrants DNS Security FAQ for Registrants DNSSEC has been developed to provide authentication and integrity to the Domain Name System (DNS). The introduction of DNSSEC to.nz will improve the security posture of

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Category: Experimental November 2009

Category: Experimental November 2009 Network Working Group S. Farrell Request for Comments: 5697 Trinity College Dublin Category: Experimental November 2009 Abstract Other Certificates Extension Some applications that associate state information

More information

BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs ag@qrator.net

BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs ag@qrator.net BREAKING HTTPS WITH BGP HIJACKING Artyom Gavrichenkov R&D Team Lead, Qrator Labs ag@qrator.net ABSTRACT OVERVIEW OF BGP HIJACKING GLOBAL AND LOCAL HIJACKING HIJACKING A CERTIFICATE AUTHORITY MITIGATIONS

More information

DNSSEC - Tanzania

DNSSEC - Tanzania DNSSEC Policy & Practice Statement for.tz Zone Version 1.1 Effective Date: January 1, 2013 Tanzania Network Information Centre 14107 LAPF Millenium Towers, Ground Floor, Suite 04 New Bagamoyo Road, Dar

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Purpose, Methods, Revocation, PKIX To distribute public keys securely Requires - Certificates and Certification Authorities - Method for retrieving certificates

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Fasthosts Internet Parallels Plesk 10 Manual

Fasthosts Internet Parallels Plesk 10 Manual Fasthosts Internet Parallels Plesk 10 Manual Introduction... 2 Before you begin... 2 Logging in to the Plesk control panel... 2 Securing access to the Plesk 10 control panel... 3 Configuring your new server...

More information

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Certificate Management. PAN-OS Administrator s Guide. Version 7.0 Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

DNSSEC Practice Statement (DPS)

DNSSEC Practice Statement (DPS) DNSSEC Practice Statement (DPS) 1. Introduction This document, "DNSSEC Practice Statement ( the DPS ) for the zones under management of Zodiac Registry Limited, states ideas of policies and practices with

More information

SAC075: SSAC Comments to ITU-D on Establishing New Certification Authorities

SAC075: SSAC Comments to ITU-D on Establishing New Certification Authorities 03 December 2015 Subject: SAC075: SSAC Comments to ITU-D on Establishing New Certification Authorities The Internet Corporation for Assigned Names and Numbers (ICANN) Security and Stability Advisory Committee

More information

SBClient SSL. Ehab AbuShmais

SBClient SSL. Ehab AbuShmais SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three

More information

CHAPTER 7 SSL CONFIGURATION AND TESTING

CHAPTER 7 SSL CONFIGURATION AND TESTING CHAPTER 7 SSL CONFIGURATION AND TESTING 7.1 Configuration and Testing of SSL Nowadays, it s very big challenge to handle the enterprise applications as they are much complex and it is a very sensitive

More information

DNSSEC Policy and Practice Statement.amsterdam

DNSSEC Policy and Practice Statement.amsterdam DNSSEC Policy and Practice Statement.amsterdam Contact T +31 26 352 55 00 support@sidn.nl www.sidn.nl Offices Meander 501 6825 MD Arnhem Mailing address Postbus 5022 6802 EA Arnhem May 24, 2016 Public

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

DNSSec Operation Manual for the.cz and 0.2.4.e164.arpa Registers

DNSSec Operation Manual for the.cz and 0.2.4.e164.arpa Registers DNSSec Operation Manual for the.cz and 0.2.4.e164.arpa Registers version 1.9., valid since 1 January 2010 Introduction This material lays out operational rules that govern the work of the CZ.NIC association

More information

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0 THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people

More information

Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL. http://www.protonet.co.za/

Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL. http://www.protonet.co.za/ Proto Balance SSL TLS Off-Loading, Load Balancing http://www.protonet.co.za/ User Manual - SSL Copyright c 2003-2010 Shine The Way 238 CC. All rights reserved. March 13, 2010 Contents 1. Introduction........................................................................

More information

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

DNSSEC Deployment a case study

DNSSEC Deployment a case study DNSSEC Deployment a case study Olaf M. Kolkman Olaf@NLnetLabs.nl RIPE NCCs Project Team: Katie Petrusha, Brett Carr, Cagri Coltekin, Adrian Bedford, Arno Meulenkamp, and Henk Uijterwaal Januari 17, 2006

More information

DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks

DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks F5 Technical Brief DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn t working,

More information

Rough Outline. Introduction Why DNSSEC DNSSEC Theory Famous last words. http://www.nlnetlabs.nl/ Universiteit van Amsterdam, Sep 2006.

Rough Outline. Introduction Why DNSSEC DNSSEC Theory Famous last words. http://www.nlnetlabs.nl/ Universiteit van Amsterdam, Sep 2006. page 2 Rough Outline An introduction to DNSSEC Olaf Kolkman 21 September 2006 Stichting (www.nlnetlabs.nl) Introduction Why DNSSEC DNSSEC Theory Famous last words page 3 DNSSEC evangineers of the day Olaf:

More information

DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In)

DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In) DNSSEC: A Vision Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Outline DNS Today DNS Attacks DNSSEC: An Approach Countering DNS Attacks Conclusion 2 DNS Today DNS is

More information

DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .

DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. . Computer System Security and Management SMD139 Lecture 5: Domain Name System Peter A. Jonsson DNS Translation of Hostnames to IP addresses Hierarchical distributed database DNS Hierarchy The Root Name

More information

Websense Content Gateway HTTPS Configuration

Websense Content Gateway HTTPS Configuration Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco

More information

More on SHA-1 deprecation:

More on SHA-1 deprecation: Dear PTC Axeda Customer, This message specifies Axeda and IDM Agent upgrade requirements and timelines for transitioning Axeda Enterprise Server, Global Access Server (GAS), Policy Server, and Questra

More information

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7. Lecture 13 Public Key Distribution (certification) 1 PK-based Needham-Schroeder TTP 1. A, B 4. B, A 2. {PKb, B}SKT B}SKs 5. {PK a, A} SKT SKs A 3. [N a, A] PKb 6. [N a, N b ] PKa 7. [N b ] PKb B Here,

More information

NIST ITL July 2012 CA Compromise

NIST ITL July 2012 CA Compromise NIST ITL July 2012 CA Compromise Prepared for: Intelligent People paul.turner@venafi.com 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These

More information

DNSSEC Misconfigurations: How incorrectly configured security leads to unreachability

DNSSEC Misconfigurations: How incorrectly configured security leads to unreachability DNSSEC Misconfigurations: How incorrectly configured security leads to unreachability Niels L. M. van Adrichem, Antonio Reyes Lúa, Xin Wang, Muhammad Wasif, Ficky Fatturrahman and Fernando A. Kuipers Network

More information

NIST Test Personal Identity Verification (PIV) Cards

NIST Test Personal Identity Verification (PIV) Cards NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper

More information

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1 PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority

More information

WHITE PAPER Citrix Secure Gateway Startup Guide

WHITE PAPER Citrix Secure Gateway Startup Guide WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server

More information

WHITE PAPER. Best Practices DNSSEC Zone Management on the Infoblox Grid

WHITE PAPER. Best Practices DNSSEC Zone Management on the Infoblox Grid WHITE PAPER Best Practices DNSSEC Zone Management on the Infoblox Grid What Is DNSSEC, and What Problem Does It Solve? DNSSEC is a suite of Request for Comments (RFC) compliant specifications developed

More information

Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org

Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP

More information