DNSSEC. Introduction Principles Deployment
|
|
|
- Amberlynn Wilson
- 10 years ago
- Views:
Transcription
1 DNSSEC Introduction Principles Deployment
2 Overview What we will cover The problems that DNSSEC addresses The protocol and implementations Things to take into account to deploy DNSSEC The practical problems tied to real-world deployment
3 Contents Scope of the problem DNS reminders Basics of DNSSEC Deployment & operations Issues (what isn't solved) & other aspects Status of DNSSEC today Live demonstration
4 What's the problem? So what are the issues? DNS Cache Poisoning Forgery: respond before the intended nameserver Redirection of a domain's nameserver Redirection of NS records to another target domain DNS Hijacking Response to non-existent domains Rogue DNS servers These have been spotted in the wild code IS available...
5 What's the problem? What risks? See Dan Kaminsky's slides for the extent of the risks - MANY case scenarios MX hijacking Entire domain redirection Take a large.com offline Complete spoofing of a bank's DNS info More fun stuff A great illustrated guide
6 Refresher
7 DNS reminders ISC BIND zone file format is commonly used, and we will use this notation here. zone. SOA nsx.zone. hostmaster.zone. ( ; serial 1d ; refresh 12h ; retry 1w ; expire 1h ) ; neg. TTL zone. NS ns.zone. NS ns.otherzone. zone. MX 5 server.otherzone. A
8 DNS reminders Record structure: NAME [TTL] TYPE DATA (type specific) host.zone A sub.zone MX 5 server.otherzone.
9 DNS reminders Multiple resource records with same name and type are grouped into Resource Record Sets (RRsets): mail.zone. MX 5 server1.zone. mail.zone. MX 10 server2.zone. server1.zone. A server1.zone. A server1.zone. A server1.zone. AAAA 2001:123:456::1 server1.zone. AAAA 2001:123:456::2 server2.zone. A RRset RRset RRset RRset
10 DNS points of attack
11 ATTACK VECTORS DATA DNS Data Flow Points of attack MASTER MASTER zone file (text, DB) STUB STUB resolver resolver caching caching resolver resolver (recursive) (recursive) Zone Transfer dynamic updates SLAVES SLAVES SLAVES man in the middle cache poisoning modified data spoofing master (routing/dos) spoofed updates corrupted data
12 DNSSEC concepts
13 DNSSEC quick summary Data authenticity and integrity by signing the Resource Records Sets with a private key Public DNSKEYs published, used to verify the RRSIGs Children sign their zones with their private key Authenticity of that key established by signature/checksum by the parent of the (DS) delegation signer record Repeat for parent... Not that difficult on paper Operationally, it is a bit more complicated
14 DNSSEC overview DNS SECurity extensions Concepts New Resource Records (DNSKEY, RRSIG, NSEC/NSEC3 and DS) New packet options (CD, AD, DO) Setting up a Secure Zone Delegating Signing Authority Key Rollovers
15 DNSSEC concepts Changes DNS trust model from one of open and trusting to one of verifiable Extensive use of public key cryptography to provide: Authentication of origin Data integrity Authenticated denial of existence No attempt to provide confidentiality DNSSEC does not place computational load on the authoritative servers (!= those signing the zone) No modifications to the core protocol Can coexist with today's infrastructure... kind of (EDNS0)
16 DNSSEC concepts Build a chain of trust using the existing delegationbased model of distribution that is the DNS Don't sign the entire zone, sign a RRset. SIGNED ORG SIGNED NSRC SIGNED WS SIGNED Note: the parent DOES NOT sign the child zone. The parent signs a pointer (hash) to the key used to sign the data of child zone (important!)
17 New Resource Records
18 DNSSEC: new RRs Adds four new DNS Resource Records*: 1 DNSKEY: Public key used in zone signing operations. 2 RRSIG: RRset signature 3 NSEC/NSEC3: Returned as verifiable evidence that the name and/or RR type does not exist 4 DS: Delegation Signer. Contains the hash of the public key used to sign the key which itself will be used to sign the zone data. Follow DS RR's until a trusted zone is reached (ideally the root). *See Geoff Huston's excellent discussion at
19 DNSSEC: DNSKEY RR OWNER TYPE FLAGS PROTOCOL ALGORITHM MYZONE. 600 DNSKEY ( AwEAAdevJXb4NxFnDFT0Jg9d/jRhJwzM/YTu PJqpvjRl14WabhabS6vioBX8Vz6XvnCzhlAx...) ; key id = 5538 KEY ID - FLAGS determines the usage of the key (more on this...) - PROTOCOL is always 3 in the current version of DNSSEC - ALGORITHM can be: 0 reserved 5 RSA/SHA-1 (mandatory) 1 RSA/MD5 (deprecated) 8 RSA/SHA Diffie/Hellman 3 DSA/SHA-1 (optional) 4 reserved PUBLIC KEY (BASE64)
20 DNSSEC: DNSKEY RR There are in practice at least two DNSKEY pairs for every zone: Originally, one key-pair (public, private) defined for the zone: private key used to sign the zone data (RRsets) public key published (DNSKEY) in zone DS record (DNSKEY hash) published in parent zone, and signed in turn with rest of data Problem with using a single key: to update this key, DS record in parent zone needs to be updated (since DS is fingerprint of public key) Introduction of Key Signing Key (flags = 257)
21 DNSSEC: KSK and ZSK To allow for key updates ( rollovers ), generate two keys: Key Signing Key (KSK) pointed to by parent zone (Secure Entry Point), in the form of DS (Delegation Signer) used to sign the Zone Signing Key (ZSK) Zone Signing Key (ZSK) signed by the Key Signing Key used to sign the zone data RRsets This decoupling allows for independent updating of the ZSK without having to update the KSK, and involve the parent less administrative interaction.
22 test.myzone. 600 A test.myzone. 600 A DNSSEC: RRSIG Resource Record Signature lists the signatures performed using the ZSK on a given RRset TYPE TYPE COVERED ALGO # LABELS ORIG. TTL SIG. EXPIR. test.myzone. 600 RRSIG A ( 2 1 SIG. INCEP. ) myzone. KEY ID SIGNER NAME roxjsowdir576vraoibfbk0tptxvp+1pi0xh p1mvwfr3u+zulbgxkajkorengxuvthv9egbc... SIGNATURE = SIG(records + ) RRSIG-RDATA -- SIG
23 DNSSEC: RRSIG Typical defaults: Signature inception time is 1 hour before Signature expiration is 30 days from now Needless to say, proper timekeeping (NTP) is strongly recommended What happens when the signatures run out? SERVFAIL... Your domain effectively disappears from the Internet for validating resolvers Note that the keys do not expire. Therefore, regular re-signing is part of the operations process (not only when changes occur) the entire zone doesn't have to be resigned...
24 DNSSEC: NSEC/NSEC3 NSEC proof of non-existence Remember, the authoritative servers are serving precalculated records. No on-the-fly generation is done. NSEC provides a pointer to the Next SECure record in the chain of records. there are no other records between this one and the next, signed. The entire zone is sorted lexicographically: myzone. sub.myzone. test.myzone.
25 DNSSEC: NSEC/NSEC3 myzone NSEC test.myzone. NS SOA RRSIG NSEC DNSKEY myzone RRSIG NSEC ( myzone. ZTYDLeUDMlpsp+IWV8gcUVRkIr7KmkVS5TPH KPsxgXCnjnd8qk+ddXlrQerUeho4RTq8CpKV... ) Last NSEC record points back to the first. Problem: Zone enumeration (walk list of NSEC records) Yes, DNS shouldn't be used to store sensitive information, but policy requirements vary.
26 DNSSEC: NSEC/NSEC3 If the server responds NXDOMAIN: One or more NSEC RRs indicate that the name (or a wildcard expansion) does not exist If the server's response is NOERROR:...and the answer section is empty The NSEC proves that the TYPE did not exist
27 DNSSEC: NSEC/NSEC3 What about NSEC3? We won't get into details here, but the short story is: Don't sign the name of the Next SECure record, but a hash of it. Still possible to prove non-existence, without revealing name. This is a simplified explanation. RFC 5155 covering NSEC3 is 53 pages long. Also introduces the concept of opt-out (see section 6 of the RFC) which has uses for so-called delegation-centric zones with unsigned delegations in short: don't bother signing RRsets for delegations which you know don't implement DNSSEC.
28 DNSSEC: DS Delegation Signer Hash of the KSK of the child zone Stored in the parent zone, together with the NS RRs indicating a delegation of the child zone The DS record for the child zone is signed together with the rest of the parent zone data NS records are NOT signed (they are a hint/pointer) Digest type 1 = SHA-1, 2 = SHA-256 myzone. DS F6CD025B3F5D A B56D683 myzone. DS CCBC0B557510E4256E88C01B0B1336AC4ED6FE08C826 8CC1AA5FBF00 5DCE3210 digest = hash( canonical FQDN on KEY RR KEY_RR_rdata)
29 DNSSEC: DS Two hashes generated by default: 1 SHA-1 MANDATORY 2 SHA-256 MANDATORY New algorithms are being standardised upon This will happen continually as algorithms are broken/proven to be unsafe
30 DNSSEC: new fields Updates DNS protocol at the packet level Non-compliant DNS recursive servers should ignore these: CD: Checking Disabled (ask recursing server to not perform validation, even if DNSSEC signatures are available and verifiable, i.e.: a Secure Entry Point can be found) AD: Authenticated Data, set on the answer by the validating server if the answer could be validated, and the client requested validation A new EDNS0 option DO: DNSSEC OK (EDNS0 OPT header) to indicate client support for DNSSEC options
31 Demo: the new records
32 Security Status of Data ( 4.3 (RFC4035 Secure Resolver is able to build a chain of signed DNSKEY and DS RRs from a trusted security anchor to the RRset Insecure Resolver knows that it has no chain of signed DNSKEY and DS RRs from any trusted starting point to the RRset Bogus Resolver believes that it ought to be able to establish a chain of trust but for which it is unable to do so May indicate an attack but may also indicate a configuration error or some form of data corruption Indeterminate Resolver is not able to determine whether the RRset should be signed
33 Signing a zone...
34 Enabling DNSSEC Multiple systems involved Stub resolvers Nothing to be done... but more on that later Caching resolvers (recursive) Enable DNSSEC validation Configure trust anchors manually, or use DLV Authoritative servers Enable DNSSEC logic (if required). Signing & serving need not be performed on same machine. Signing system can be offline
35 Signing the zone 1.Generate keypairs 2.Include public DNSKEYs in zone file 3.Sign the zone using the secret key ZSK 4.Publishing the zone 5.Push DS record up to your parent 6.Wait...
36 1. Generating the keys # Generate ZSK dnssec-keygen -a rsasha1 -b n ZONE myzone # Generate KSK dnssec-keygen -a rsasha1 -b n ZONE -f KSK myzone This generates 4 files: Kmyzone.+005+id_of_zsk.key Kmyzone.+005+id_of_zsk.private Kmyzone.+005+id_of_ksk.key Kmyzone.+005+id_of_ksk.private
37 2. Including the keys into the zone Include the DNSKEY records for the ZSK and KSK into the zone, to be signed with the rest of the data: cat Kmyzone*key >>myzone or add to the end of the zone file: $INCLUDE Kmyzone.+005+id_of_zsk.key $INCLUDE Kmyzone.+005+id_of_ksk.key
38 3. Signing the zone Sign your zone # dnssec-signzone myzone dnssec-signzone will be run with all defaults for signature duration, the serial will not be incremented by default, and the private keys to use for signing will be automatically determined. Signing will: Sort the zone (lexicographically) Insert:. NSEC records ( RRset. RRSIG records (signature of each ( parent. DS records from child keyset files (for Generate key-set and DS-set files, to be communicated to the parent
39 3. Signing the zone (2) Since version 9.7.0, BIND can automatically sign/re-sign your zone Makes life much easier Key generation, management & rollover still needs to be done separately
40 4. Publishing the signed zone Publish signed zone by reconfiguring the nameserver to load the signed zonefile.... but you still need to communicate the DS RRset in a secure fashion to your parent, otherwise no one will know you use DNSSEC
41 5. Pushing DS record to parent Need to securely communicate the KSK derived DS record set to the parent RFCs 4310, but what if your parent isn't DNSSEC-enabled?
42 Enabling DNSSEC in the resolver Configure forwarding resolver to validate DNSSEC not strictly necessary, but useful if only to verify that your zone works Test... Remember, validation is only done in the resolver.
43 Summary Generating keys Signing and publishing the zone Resolver configuration Testing the secure zone Questions so far?
44 ATTACK VECTORS DATA So, what does DNSSEC protect? MASTER MASTER zone file (text, DB) STUB STUB resolver resolver caching caching resolver resolver (recursive) (recursive) Zone Transfer dynamic updates SLAVES SLAVES SLAVES man in the middle cache poisoning modified data spoofing master (routing/dos) spoofed updates corrupted data (TSIG) PROTECTION BY DNSSEC
45 What doesn't it protect? Confidentiality The data is not encrypted Communication between the stub resolver (i.e: your OS/desktop) and the caching resolver. For this, you would have to use TSIG, SIG(0), or you will have to trust your resolver It performs all validation on your behalf
46 Why the long timeframe? Many different reasons... It's complicated. Not much best practice. More and more tools are appearing. Operational experience is the keyword. Risks of failure (failure to sign, failure to update) which will result in your zone disappearing Specification has changed several times since the 90s NSEC Allows for zone enumeration. Until Kaminsky, DNSSEC looked like a solution looking for a problem Delay in getting the root signed (politics)
47 Delegating Signing Authority
48 Walking the Chain of Trust (slide courtesy RIPE) Trusted Key DNSKEY ( ) 5TQ3s (8907) ; KSK DNSKEY ( ) lase5 (2983) ; ZSK RRSIG DNSKEY ( ) Hw9 org. DS ab15 RRSIG DS ( ) Locally Configured (root). org. DNSKEY ( ) q3dew (7834) ; KSK DNSKEY ( ) 5TQ3s (5612) ; ZSK RRSIG DNSKEY ( ) 7834 org. cmas nsrc.org. DS ab15 RRSIG DS ( ) org org. nsrc.org. DNSKEY ( ) rwx002 (4252) ; KSK DNSKEY ( ) sovp42 (1111) ; ZSK RRSIG DNSKEY ( ) 4252 nsrc.org. 5t... nsrc.org. A RRSIG A ( ) 1111 nsrc.org. a3...
49 DNSSEC Deployment & Operations
50 Signature expiration Signatures are per default 30 days (BIND) Need for regular resigning: To maintain a constant window of validity for the signatures of the existing RRset To sign new and updated RRsets Who does this? The keys themselves do NOT expire... But they do need to be rolled over...
51 Key Rollovers Try to minimise impact Short validity of signatures Regular key rollover Remember: DNSKEYs do not have timestamps the RRSIG over the DNSKEY has the timestamp Key rollover involves second party or parties: State to be maintained during rollover Operationally expensive There is a standard for this: RFC5011 BIND 9.7 supports See
52 Key Rollovers Two methods for doing key rollover pre-publish double signature KSK and ZSK rollover use different methods (courtesy DNSSEC-Tools.org)
53 Key Rollovers ZSK Rollover Using the Pre-Publish Method 1. wait for old zone data to expire from caches (TTL) 2. sign the zone with the KSK and published ZSK 3. wait for old zone data to expire from caches 4. adjust keys in key list and sign the zone with new ZSK
54 Key Rollovers KSK Rollover Using the Double Signature Method 1. wait for old zone data to expire from caches 2. generate a new (published) KSK 3. wait for the old DNSKEY RRset to expire from caches 4. roll the KSKs 5. transfer new DS keyset to the parent 6. wait for parent to publish the new DS record 7. reload the zone
55 Automated toolkits Luckily, a number of toolkits already exist to make DNSSEC operations as smooth as possible Doesn't solve all problems yet, such as interaction with parent and children (DS management, ), but take care of all the rough edges of running a PKI (yes, that's what it is...)
56 What does it take to deploy DNSSEC? A DPS (DNSSEC Policy & Practice Statement) Details the design, implementation, methods and practices governing the operation of a DNSSEC signed zone Helps external parties review/scrutinize the process and evaluate the trustworthiness of the system. A thorough understanding of DNS Existing operational framework in which to insert the DNSSEC process much larger chance of shooting one self in the foot if the organisation doesn't have proper operational procedures in the first place.
57 SIGN What does it take to deploy DNSSEC? (2) Monitoring DB export www A www A ! xyz A completeness validate www A xyz A HSM a a serve a PUBLISH www A xyz A a
58 Physical security HSM Hardware Security Module Quick explanation
59 Deployment hurdles and other issues
60 Lack of operational experience... Everyone talks about DNSSEC... but few people have real hands-on experience with day-to-day operations One can't just turn DNSSEC on and off stopping to sign a zone isn't enough parent needs to stop publishing DS record + signatures Failure modes are fairly well known, but recovery procedures cumbersome and need automated help
61 DS publication mechanisms Standardized way to communicate DS to parent, but not widely deployed, or different method used SSL upload? PGP/GPG signed mail? EPP extension (RFC4310) Remember, this should happen reliably Redelegation or change of registrant when the zone is signed Share the key during the transition? Turn off DNSSEC for the time? What if the original administrator is not cooperative? Policy issues
62 EDNS0 and broken firewalls, DNS servers DNSSEC implies EDNS0 Larger DNS packets means > 512 bytes EDNS0 not always recognized/allowed by firewall TCP filtering, overzealous administrators.. Many hotel network infrastructures (maybe this one as well) do not allow DNSSEC records through
63 Application awareness This could be a long term pain... Application's knowledge of DNSSEC... is non-existent Users cannot see why things failed Push support questions back to network staff Compare with SSL failures (for users who can read...) There are APIs currently Firefox plugin example (pullup from DNS layer to user) What if applications explicitly set +CD?
64 Securing the last link Stub resolvers remain open to man in the middle attacks Not many ways around this Either trust your resolver, or use TSIG How to distribute keys? (MS uses GSS-TSIG with Kerberos) Resolvers not designed handled hundreds of thousands of clients with TSIG signing SIG(0) does not scale either Work is being done to address these issues DNS over other transport protocols to work around excessive filtering dnssec-trigger project
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
Rough Outline. Introduction Why DNSSEC DNSSEC Theory Famous last words. http://www.nlnetlabs.nl/ Universiteit van Amsterdam, Sep 2006.
page 2 Rough Outline An introduction to DNSSEC Olaf Kolkman 21 September 2006 Stichting (www.nlnetlabs.nl) Introduction Why DNSSEC DNSSEC Theory Famous last words page 3 DNSSEC evangineers of the day Olaf:
DNSSEC in your workflow
DNSSEC in your workflow Presentation roadmap Overview of problem space Architectural changes to allow for DNSSEC deployment Deployment tasks Key maintenance DNS server infrastructure Providing secure delegations
DNSSEC Applying cryptography to the Domain Name System
DNSSEC Applying cryptography to the Domain Name System Gijs van den Broek Graduate Intern at SURFnet Overview First half: Introduction to DNS Attacks on DNS Second half: DNSSEC Questions: please ask! DNSSEC
DNSSec Operation Manual for the.cz and 0.2.4.e164.arpa Registers
DNSSec Operation Manual for the.cz and 0.2.4.e164.arpa Registers version 1.9., valid since 1 January 2010 Introduction This material lays out operational rules that govern the work of the CZ.NIC association
DNSSEC Practice Statement (DPS)
DNSSEC Practice Statement (DPS) 1. Introduction This document, "DNSSEC Practice Statement ( the DPS ) for the zones under management of Zodiac Registry Limited, states ideas of policies and practices with
Networking Domain Name System
IBM i Networking Domain Name System Version 7.2 IBM i Networking Domain Name System Version 7.2 Note Before using this information and the product it supports, read the information in Notices on page
Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology
SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2
The Domain Name System from a security point of view
The Domain Name System from a security point of view Simon Boman Patrik Hellström Email: {simbo105, pathe321}@student.liu.se Supervisor: David Byers, {[email protected]} Project Report for Information Security
DNSSEC Policy Statement Version 1.1.0. 1. Introduction. 1.1. Overview. 1.2. Document Name and Identification. 1.3. Community and Applicability
DNSSEC Policy Statement Version 1.1.0 This DNSSEC Practice Statement (DPS) conforms to the template included in RFC 6841. 1. Introduction The approach described here is modelled closely on the corresponding
American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2
American International Group, Inc. DNS Practice Statement for the AIG Zone Version 0.2 1 Table of contents 1 INTRODUCTION... 6 1.1 Overview...6 1.2 Document Name and Identification...6 1.3 Community and
Step-by-Step DNSSEC-Tools Operator Guidance Document
Step-by-Step DNSSEC-Tools Operator Guidance Document Using the DNSSEC-Tools v1.0 distribution SPARTA, Inc. Table of Contents 1. Introduction... 1 Organization of this Document... 1 Key Concepts... 2 Zones
DNSSEC Deployment a case study
DNSSEC Deployment a case study Olaf M. Kolkman [email protected] RIPE NCCs Project Team: Katie Petrusha, Brett Carr, Cagri Coltekin, Adrian Bedford, Arno Meulenkamp, and Henk Uijterwaal Januari 17, 2006
DNSSEC - SECURE DNS FOR GOVERNMENT. Whitepaper
DNSSEC - SECURE DNS FOR GOVERNMENT Whitepaper ii BlueCat Networks Use of this document Copyright This document and all information (in text, Graphical User Interface ( GUI ), video and audio forms), images,
Deploying DNSSEC: From End-Customer To Content
Deploying DNSSEC: From End-Customer To Content March 28, 2013 www.internetsociety.org Our Panel Moderator: Dan York, Senior Content Strategist, Internet Society Panelists: Sanjeev Gupta, Principal Technical
WHITE PAPER. Best Practices DNSSEC Zone Management on the Infoblox Grid
WHITE PAPER Best Practices DNSSEC Zone Management on the Infoblox Grid What Is DNSSEC, and What Problem Does It Solve? DNSSEC is a suite of Request for Comments (RFC) compliant specifications developed
DNSSEC and DNS Proxying
DNSSEC and DNS Proxying DNS is hard at scale when you are a huge target 2 CloudFlare DNS is big 3 CloudFlare DNS is fast 4 CloudFlare DNS is always under attack 5 CloudFlare A secure reverse proxy for
DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In)
DNSSEC: A Vision Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Outline DNS Today DNS Attacks DNSSEC: An Approach Countering DNS Attacks Conclusion 2 DNS Today DNS is
Resilient Networking. Overview of DNS Known attacks on DNS Denial-of-Service Cache Poisoning. Securing DNS Split-Split-DNS DNSSEC.
Resilient Networking 6: Attacks on DNS Overview of DNS Known attacks on DNS Denial-of-Service Cache Poisoning Securing DNS Split-Split-DNS DNSSEC SoSe 2014 Fachbereich Informatik Telecooperation Group
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment Dan York, CISSP Senior Content Strategist, Internet Society Eurasia Network Operators' Group (ENOG) 4 Moscow, Russia October
Domain Name System Security
Abstract Domain Name System Security Ladislav Hagara [email protected] Department of Automated Command Systems and Informatics Military Academy in Brno Brno, Czech Republic Domain Name System (DNS) is one of
DNSSEC for Everybody: A Beginner s Guide
DNSSEC for Everybody: A Beginner s Guide San Francisco, California 14 March 2011 4:00 to 5:00 p.m. Colonial Room The Schedule 2 This is Ugwina. She lives in a cave on the edge of the Grand Canyon... This
DNS. Some advanced topics. Karst Koymans. (with Niels Sijm) Informatics Institute University of Amsterdam. (version 2.6, 2013/09/19 10:55:30)
DNS Some advanced topics Karst Koymans (with Niels Sijm) Informatics Institute University of Amsterdam (version 2.6, 2013/09/19 10:55:30) Friday, September 13, 2013 Karst Koymans (with Niels Sijm) (UvA)
DNS security: poisoning, attacks and mitigation
DNS security: poisoning, attacks and mitigation The Domain Name Service underpins our use of the Internet, but it has been proven to be flawed and open to attack. Richard Agar and Kenneth Paterson explain
This framework is documented under NLnet Labs copyright and is licensed under a Creative Commons Attribution 4.0 International License.
DNSSEC Infrastructure Audit Framework NLnet Labs Document 2013-002 Version 1.0 by Matthijs Mekking ([email protected]) and Olaf Kolkman ([email protected]) This framework is documented under NLnet
DNS Security: New Threats, Immediate Responses, Long Term Outlook. 2007 2008 Infoblox Inc. All Rights Reserved.
DNS Security: New Threats, Immediate Responses, Long Term Outlook 2007 2008 Infoblox Inc. All Rights Reserved. A Brief History of the Recent DNS Vulnerability Kaminsky briefs key stakeholders (CERT, ISC,
DNS SECURITY TROUBLESHOOTING GUIDE
DNS SECURITY TROUBLESHOOTING GUIDE INTERNET DEPLOYMENT OF DNS SECURITY 27 November 2006 Table of Contents 1. INTRODUCTION...3 2. DNS SECURITY SPECIFIC FAILURE MODES...3 2.1 SIGNATURES...3 2.1.1 Signature
KSRegistry DNSSEC Policy Statement
KSRegistry DNSSEC Policy Statement 1. INTRODUCTION...5 1.1 Overview...5 1.2 Document name and identification...5 1.3. Community and Applicability...5 1.3.1 Registry...5 1.3.2 Registrars...5 1.3.3 Registrants...6
A Review of Administrative Tools for DNSSEC Spring 2010
Page 1 (29) Andreas Nilsson Certezza AB Stockholm 2010-05-31 A Review of Administrative Tools for DNSSEC Spring 2010 Kornhamnstorg 61, 2 tr SE-111 27 Stockholm Sweden Telefon: +46 (0)8 791 92 00 Telefon:
Unbound a caching, validating DNSSEC resolver. Do you trust your name server? Configuration. Unbound as a DNS cache (SEC-less)
Unbound a caching, validating DNSSEC resolver UKUUG Spring 2011 Conference Leeds, UK March 2011 Jan-Piet Mens $ dig 1.1.0.3.3.0.8.1.7.1.9.4.e164.arpa naptr Do you trust your name server? DNS clients typically
DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS
AFNIC s Issue Papers DNSSEC Domain Name System Security Extensions 1 - Organisation and operation of the DNS 2 - Cache poisoning attacks 3 - What DNSSEC can do 4 - What DNSSEC cannot do 5 - Using keys
Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works
DNSSEC Root Zone. High Level Technical Architecture
DNSSEC Root Zone Prepared by the Root DNSSEC Design Team Joe Abley David Blacka David Conrad Richard Lamb Matt Larson Fredrik Ljunggren David Knight Tomofumi Okubo Jakob Schlyter Version 1.2.1 October
Table of Contents DNS. How to package DNS messages. Wire? DNS on the wire. Some advanced topics. Encoding of domain names.
Table of Contents DNS Some advanced topics Karst Koymans Informatics Institute University of Amsterdam (version 154, 2015/09/14 10:44:10) Friday, September 11, 2015 DNS on the wire Encoding of domain names
Overview of DNSSEC deployment worldwide
The EURid Insights series aims to analyse specific aspects of the domainname environment. The reports are based on surveys, studies and research conducted by EURid in cooperation with industry experts
A Security Evaluation of DNSSEC with NSEC3
A Security Evaluation of DNSSEC with NSEC3 Jason Bau Stanford University Stanford, CA, USA [email protected] Abstract Domain Name System Security Extensions (DNSSEC) with Hashed Authenticated Denial of
The Impact of DNSSEC. Matthäus Wander. on the Internet Landscape. <[email protected]> Duisburg, June 19, 2015
The Impact of DNSSEC on the Internet Landscape Matthäus Wander Duisburg, June 19, 2015 Outline Domain Name System Security problems Attacks in practice DNS Security Extensions
Verisign DNSSEC Practice Statement for EDU Zone
Verisign DNSSEC Practice Statement for EDU Zone Version 1.4 Effective Date: November 11, 2013 Abstract This document is the DNSSEC Practice Statement for the EDU Zone. It states the practices and provisions
Internet-Praktikum I Lab 3: DNS
Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution
F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution As market leaders in the application delivery market and DNS, DHCP, and IP Address Management (DDI) market
Securing DNS Infrastructure Using DNSSEC
Securing DNS Infrastructure Using DNSSEC Ram Mohan Executive Vice President, Afilias [email protected] February 28, 2009 Agenda Getting Started Finding out what DNS does for you What Can Go Wrong A Survival
A Case for Comprehensive DNSSEC Monitoring and Analysis Tools
A Case for Comprehensive DNSSEC Monitoring and Analysis Tools Casey Deccio Sandia National Laboratories [email protected] Jeff Sedayao and Krishna Kant Intel Corporation {jeff.sedayao,krishna.kant}@intel.com
A Step-by-Step guide for implementing DANE with a Proof of Concept
A Step-by-Step guide for implementing DANE with a Proof of Concept Sandoche BALAKRICHENAN, Stephane BORTZMEYER, Mohsen SOUISSI AFNIC R&D {sandoche.balakrichenan, stephane.bortzmeyer, mohsen.souissi}@afnic.fr
netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab dns Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani, M.
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
Presented by Greg Lindsay Technical Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group April 7, 2010
Presented by Greg Lindsay Technical Writer Windows Server Information Experience Presented at: Seattle Windows Networking User Group April 7, 2010 Windows 7 DNS client DNS devolution Security-awareness:
Networking Domain Name System
System i Networking Domain Name System Version 5 Release 4 System i Networking Domain Name System Version 5 Release 4 Note Before using this information and the product it supports, read the information
dnsperf DNS Performance Tool Manual
dnsperf DNS Performance Tool Manual Version 2.0.0 Date February 14, 2012 Copyright 2002-2012, Inc. - All Rights Reserved This software and documentation is subject to and made available pursuant to the
Conexim DNS Administrator s Guide
Conexim DNS Administrator s Guide Last Updated August 2013 Contents Conexim DNS Quick Reference... 1 DNS Delegation Information... 1 Control Panel Access... 1 Supported Record Types... 1 Getting Support...
DNS zone transfers from FreeIPA to non-freeipa slave servers
FreeIPA Training Series DNS zone transfers from FreeIPA to non-freeipa slave servers FreeIPA 3.0 and bind-dyndb-ldap 2.3 Petr Špaček 01-03-2013 Text file based
Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011
The Internet is for Everyone. Become an ISOC Member. Cyber Security Symposium 2011 Where is Hong Kong in the secure Internet infrastructure development Warren Kwok, CISSP Internet Society Hong Kong 12
Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
GDS Resource Record: Generalization of the Delegation Signer Model
GDS Resource Record: Generalization of the Delegation Signer Model Gilles Guette, Bernard Cousin, David Fort To cite this version: Gilles Guette, Bernard Cousin, David Fort. GDS Resource Record: Generalization
Domain Name System (DNS) Security By Diane Davidowicz 1999 Diane Davidowicz
Domain Name System (DNS) Security By Diane Davidowicz 1999 Diane Davidowicz Contents 1. Abstract...3 2. Introduction...3 3. Overview of the DNS...3 3.1. Fundamentals of DNS...4 3.1.1. The Domain Name Space...4
Networking Domain Name System
System i Networking Domain Name System Version 6 Release 1 System i Networking Domain Name System Version 6 Release 1 Note Before using this information and the product it supports, read the information
Response Policy Zones for the Domain Name System (DNS RPZ) By Paul Vixie, ISC (et.al.) 2010 World Tour
Response Policy Zones for the Domain Name System (DNS ) By Paul Vixie, ISC (et.al.) 2010 World Tour Overview Motivation for DNS Response Policy Zones Relationship to DNS RBL (DNSBL) Constraints and Goals
Reverse DNS considerations for IPv6
Reverse DNS considerations for IPv6 Kostas Zorbadelos OTE David Freedman - ClaraNet Reverse DNS in IPv4 Every Internet-reachable host should have a name Make sure your PTR and A records match. For every
DNSSEC Misconfigurations: How incorrectly configured security leads to unreachability
DNSSEC Misconfigurations: How incorrectly configured security leads to unreachability Niels L. M. van Adrichem, Antonio Reyes Lúa, Xin Wang, Muhammad Wasif, Ficky Fatturrahman and Fernando A. Kuipers Network
Prepared by: National Institute of Standards and Technology SPARTA, Inc. Shinkuro, Inc.
Signing the Domain Name System Root Zone: Technical Specification Prepared for: Science and Technology Directorate US Department of Homeland Security Prepared by: National Institute of Standards and Technology
The Domain Name System
Internet Engineering 241-461 Robert Elz [email protected] [email protected] http://fivedots.coe.psu.ac.th/~kre DNS The Domain Name System Kurose & Ross: Computer Networking Chapter 2 (2.5) James F. Kurose
Some advanced topics. Karst Koymans. Friday, September 11, 2015
DNS Some advanced topics Karst Koymans Informatics Institute University of Amsterdam (version 154, 2015/09/14 10:44:10) Friday, September 11, 2015 Karst Koymans (UvA) DNS Friday, September 11, 2015 1 /
Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace
Motivation Domain Name System (DNS) IP addresses hard to remember Meaningful names easier to use Assign names to IP addresses Name resolution map names to IP addresses when needed Namespace set of all
A Best Practices Architecture for DNSSEC
WHITEPAPER A Best Practices Architecture for DNSSEC Cricket Liu, Vice President of Architecture Background The Domain Name System is the Internet s standard naming service. DNS is responsible for mapping
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
Verisign DNSSEC Practice Statement for TLD/GTLD Zone
Verisign DNSSEC Practice Statement for TLD/GTLD Zone Version 1.0 Effective Date: July 28, 2011 Abstract This document is the DNSSEC Practice Statement for the TLD/GTLD Zone. It states the practices and
Root Zone KSK: The Road Ahead. Edward Lewis DNS-OARC & RIPE DNSWG May 2015 [email protected]
Root Zone KSK: The Road Ahead Edward Lewis DNS-OARC & RIPE DNSWG May 2015 [email protected] Agenda Setting the scene Change of Hardware Security Modules (HSMs) Roll (change) the Key Signing Key (KSK)
Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure
iseries DNS iseries DNS Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule
DNS/DNSSEC loose ends
DNS/DNSSEC loose ends Karst Koymans & Niels Sijm Informatics Institute University of Amsterdam Friday, September 21, 2012 Karst Koymans & Niels Sijm (UvA) DNS/DNSSEC loose ends Friday, September 21, 2012
Agenda. Network Services. Domain Names. Domain Name. Domain Names Domain Name System Internationalized Domain Names. Domain Names & DNS
Agenda Network Services Domain Names & DNS Domain Names Domain Name System Internationalized Domain Names Johann Oberleitner SS 2006 Domain Names Naming of Resources Problems of Internet's IP focus IP
Secure Domain Name System (DNS) Deployment Guide
Special Publication 800-81 Sponsored by the Department of Homeland Security Secure Domain Name System (DNS) Deployment Guide Recommendations of the National Institute of Standards and Technology Ramaswamy
Next Steps In Accelerating DNSSEC Deployment
Next Steps In Accelerating DNSSEC Deployment Dan York, CISSP Senior Content Strategist, Internet Society DNSSEC Deployment Workshop, ICANN 45 Toronto, Canada October 17, 2012 Internet Society Deploy360
Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley [email protected]
Domain Name System (DNS) Session-1: Fundamentals Ayitey Bulley [email protected] Computers use IP addresses. Why do we need names? Names are easier for people to remember Computers may be moved between
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
F5 Technical Brief DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn t working,
THE DOMAIN NAME SYSTEM DNS
Announcements THE DOMAIN NAME SYSTEM DNS Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 Today s Lecture I. Names vs. Addresses II. III. IV. The Namespace
DNS and LDAP persistent search
FreeIPA Training Series DNS and LDAP persistent search FreeIPA 3.0 and bind-dyndb-ldap 2.3 Petr Špaček 01-14-2013 FreeIPA DNS integration FreeIPA is able to store
DNSSEC Practice Statement.OVH
DPS.OVH 11/06/2013 1 DNSSEC Practice Statement.OVH Registry domain signature policy and conditions of implementation (Version 02 11/06/2013) DPS.OVH 11/06/2013 2 Document management Document identification
BIND 9 DNS Security. Enterprise Applications Division of the Systems and Network Analysis Center (SNAC) Information Assurance Directorate
BIND 9 DNS Security Report # I733-004R-2010 Date: 02/14/2011 Enterprise Applications Division of the Systems and Network Analysis Center (SNAC) Information Assurance Directorate Author(s) I733 National
Secure Domain Name System (DNS) Deployment Guide
NIST Special Publication 800-81-2 Secure Domain Name System (DNS) Deployment Guide Ramaswamy Chandramouli Scott Rose C O M P U T E R S E C U R I T Y NIST Special Publication 800-81-2 Secure Domain Name
Network Infrastructure Under Siege
Network Infrastructure Under Siege Char Sample Security Engineer, CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk represents the opinions and research of the presenter
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
Defending your DNS in a post-kaminsky world. Paul Wouters <[email protected]>
Defending your DNS in a post-kaminsky world Paul Wouters Vendor and NGO's involved Two phase deployment First release a generic fix for the Kaminsky attack that does not leak information
Thales nshield HSM. Integration Guide for ISC BIND DNSSEC. www.thalesgroup.com/iss
Thales nshield HSM Integration Guide for ISC BIND DNSSEC www.thalesgroup.com/iss Version: 1.1 Date: 15 June 2011 Copyright 2011 Thales e-security Limited. All rights reserved. Copyright in this document
IPv6 support in the DNS
IPv6 support in the DNS How important is the DNS? Getting the IP address of the remote endpoint is necessary for every communication between TCP/IP applications Humans are unable to memorize millions of
