DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS
|
|
|
- Cori Patterson
- 10 years ago
- Views:
Transcription
1 AFNIC s Issue Papers DNSSEC Domain Name System Security Extensions 1 - Organisation and operation of the DNS 2 - Cache poisoning attacks 3 - What DNSSEC can do 4 - What DNSSEC cannot do 5 - Using keys in DNSSEC 6 - The deployment of DNSSEC 7 - Questions to ask about implementing DNSSEC Introduction DNSSEC issues The security of any system depends on both the security of its various components and the interactions between them. This observation is also valid for the DNS (Domain Name System), a key component in the operation of the Internet, in that almost all online services use domain names at one time or another. The DNS was developed in the 80s, however, in a context during which its ability to meet the needs in terms of performance and resilience prevailed over security. Over time, and in particular since 2008 when the "Kaminsky flaw" was disclosed, the need to improve DNS security has become a top priority for all the industry. 8 - Find out more While it cannot counter all of the attacks possible against the DNS, the DNSSEC protocol can provide protection that is viable and will be vital tomorrow against attacks 9 - Glossary known as "cache poisoning", designed to substitute false information for true data in the process of resolving domain names. The attacker can thus hope to lure users and divert them to its site without their knowledge. But the growing capacity of machines and networks in terms of speed now enables attacks that until today were only theoretical, given their low probability of success. This issue paper continues on from that which AFNIC has already devoted to DNS security 1, by exploring the more specific ins and outs of DNSSEC. The paper is designed to enable greater understanding of the issues involved and how DNS security operates, so that the reader can better grasp the developments in question, which are liable to change the face of the DNS in the years to come. 1 DNSSEC - Domain Name System Security Extensions 1/8 Copyright AFNIC 2010
2 1 Organisation and operation of the DNS The DNS is organised in the form of an inverted tree, with a "root" from which stem the various "branches". At the first level of the tree are the "Top Level Domains" such as.fr,.com etc. At the second level lie the "classic" domain names such as "afnic.fr". Operating as a distributed database on millions of machines, the DNS is based on interactions between these machines in order to identify the one most likely to respond to the request of a visitor. 1 User Resolver fr server fr wikipedia.fr server wikipedia.fr In the example above, the user wishes to connect to the site and sends the request via a browser. The request is received by a server, known as a "resolver", the primary task of which is to identify the machine on which the domain name wikipedia.fr is installed. The resolver initially addresses the "root" of the DNS, which specifies which servers are "authoritative" (i.e. competent) for.fr since the domain name is in.fr. Secondly, the.fr servers in turn indicate to DNS Resolution the resolver that the domain name wikipedia.fr is hosted on a given server. The resolver is then able to indicate to the user s browser the IP address of the web server hosting the content of the website This pattern applies, regardless of the website that the user wishes to access, or the address to which s/he wishes to write. 2 Cache poisoning attacks The issue paper by AFNIC devoted to the security of the DNS provides an overview of main types of possible attacks, from those that do not directly target the DNS (cybersquatting, theft of domain names, etc.) to those focusing on the DNS, such as Denial of Service or cache poisoning. DNSSEC specifically addresses cache poisoning attacks designed to intoxicate the resolver into believing that the "hacker" is the legitimate server, instead of the original server. In particular, this allows the hacker to collect and divert requests to another website without the users realising this is the case, the issue at stake being the risk of users entrusting personal data to the hacker in the belief that they are on the legitimate site of the victim of the attack. 2/8
3 DNS server A Request forwarding DNS server B DNS requests Response Fake responses Hacker Correct operation of the DNS depends to a high degree on the reliability of the data transmitted at each step. DNS Security Extensions seek to address 3 What DNSSEC can do Cache poisoning attack this constraint by ensuring the integrity of the data transmitted over the network, in particular between resolvers and the authoritative servers. DNSSEC is the acronym for Domain Name System Security Extensions, and refers to a finite set of security extensions of the DNS protocol. These extensions use the mechanisms of asymmetric cryptographic signature to authenticate records. The signatures and public keys are in the form of complementary new records in order to ensure their authentication. These new records cause an increase in the size of messages and the number of exchanges required to verify signatures and keys. DNSSEC therefore requires additional machine resources, as well as recent, updated versions of DNS software. The protocol was naturally designed to operate safely in an environment which, initially at least, will not be entirely composed of DNSSEC-validating resolvers. In the case where a non-dnssec validating resolver queries DNSSEC servers, they simply return the information normally exchanged without the signatures or records specific to DNSSEC. 4 What DNSSEC cannot do Although rightly presented as a necessary evolution in terms of securing the DNS, DNSSEC does not purport to address all the types of attacks which may occur. For example, it is not intended to encrypt DNS records, or ensure the confidentiality of the information exchanged over the network, or ensure the security of a transaction in the way that SSL certificates do. It does not protect against phishing and theft of domain names, against virus infection or other forms of technical infection of workstations, or against attacks on the websites themselves (SQL injection etc.). 3/8
4 In addition, each security level only makes sense within the chain of trust: for example, signed records cannot be authenticated as long as the key to the zone has not been published in the parent zone. Conversely, no specific security is provided for users if their resolver has not implemented DNSSEC. Finally, DNSSEC does not protect the integrity of data that have been modified either accidentally or intentionally upstream of their publication in the DNS. 5 Using keys in DNSSEC DNSSEC uses a mechanism based on a key pair with complementary roles. The first key, the private one, signs by encryption, while the second key, the public one, verifies the signatures by decrypting them. Signer Authoritative master server Validation of a signature by the validating DNSSEC recurvive server DNS information private wikipedia.fr is hosted at address Private key Encryption Digital signature AwEAAdzt V8QQzRLg Hko0P9nI DNS message public wikipedia.fr is hosted at address AwEAAdzt V8QQzRLg Hko0P9nI Public key Network - Network - Network - Network - Network Decryption Authentic message Identical comparison wikipedia.fr is hosted at address Error Non-authentic message Signature and signature validation in the case of DNS A message is encrypted using the private key, creating a signature accompanying the message. This signature can be authenticated by DNSSEC validating resolvers using the corresponding public key published in the zone. To prevent an attacker from using its own set of keys, the DNSSEC designers have proceeded such that each parent zone, located on the upper level of the DNS tree, guarantees the authenticity of the keys of their child zones by signing them, the exchange of keys between parent and child zones exclusively taking place through secure channels. This system creates real chains of trust down to the root of the DNS. DNSSEC also requires proper management of the life of signatures in relation to the publication of the keys, since expired signatures may block the resolution of the zone in question. Like other DNS records, DNSSEC records have finite lifetimes in order to ensure the resilience of the system and to enable updates in due course. When a signature expires, it is considered invalid and is no longer possible to connect to the service. It is therefore necessary to regularly re-sign records in addition to new signatures produced due to the creation of, or changes in records. The deployment of DNSSEC therefore induces extra work and potentially generates new risks of errors (incorrect configurations, expired signatures, etc.). For this reason, if the key inserted in the parent zone is not that used for the signature, the child zone will be considered invalid and there will be a resolution error. 4/8
5 DNS root DS TLD registry DS Registrar Web Voip Stub resolver ISPs Companies DNS zone host Name holder Applications DNSSEC authoritative server User Internet Services Validating DNSSEC recursive server Request & DNS response NS procurement + KSK hash DS Key which signs the keys Chain of trust Components of the DNSSEC chain of trust 6 The deployment of DNSSEC Although there has been a sharp build-up in the use of DNSSEC since the disclosure of the Kaminsky flaw, the security extensions are nothing new for DNS experts. Indeed, the IETF (Internet Engineering Task Force) started working on such a protocol for securing the DNS as early as It was not until 2005, after many iterations in the technical community, that the registry for the.se Top Level Domain (Sweden) was the first to sign its zone. The country was also the first to open the service to registrants in Viewed with interest but without any sense of urgency until 2008, DNSSEC became a top priority for all the TLD registries from the summer of 2008 onwards, when the Kaminsky flaw made everyone realise the magnitude of the potential problem. By mid-2010 fifteen registries had signed their TLD, and most of the others are working on the issue. The.fr TLD was signed on 14th September Even though DNSSEC involves the registries, its deployment does not stop there: the managers of the resolvers (ISPs, registrars, companies, etc.) must in turn implement DNSSEC so that it is fully operational. A number of solutions exist, from open-source software solutions such as open-dnssec, to proprietary boxes, including programming libraries that simplify developments. 5/8
6 The workload caused by the deployment of DNSSEC, both in costs and in terms of refresher training for the teams, can be seen as important, given the risks that it helps prevent. Although potentially justified in the short term, this approach does not take into account, however, the increase in network throughput and machine capacity, which mechanically advances the chances of successful cache poisoning attacks in the current format of DNS operation. The implementation of DNSSEC should be considered as an unavoidable necessity in the medium term. The main issue in the deployment of DNSSEC is that of setting up effective key management. Keys must be regularly changed in order to prevent their theft or recalculation, but they must also be protected by physical and digital means. Updates must also be carried out in order to take into account the propagation lead-time for information in the DNS, so that the resolvers do correlate a new signature with an old key or vice-versa. This imposes a certain period of latency between the declaration of the keys and the signature with them. The implementation of DNSSEC means each zone must carry out the following operations: Create the keys; Sign its records; Publish the signed zone; Manage their validity periods; Manage the publications of the key summary in the parent zone with each KSK rollover; Check the publication of a new key before signing with it. 7 Questions to ask about implementing DNSSEC The implementation of DNSSEC is not only a major technological development for the DNS: it also induces an adaptation of the organisation and management of domain names and may require changes in both, mainly because of the emergence of new issues such as key management. It may therefore be necessary to foresee the need for a certain increase in the technical competence of the teams - the subject remains little known for the time being - but also a change in procedures while maintaining overall consistency with the various aspects of the company s security policy. Here is a list of the various questions to ask, without presuming to be exhaustive: Who hosts the company s DNS zones? How skilled is the provider in DNSSEC management? What level of transparency does the provider offer its customers in terms of practices? What security systems does the provider use in addition to DNSSEC? Does the provider offer secure transaction channels? What type of organisation does provider recommend for key management, within its own teams and in conjunction with those of the company? Is there an impact in implementing DNSSEC in terms of costs? If the company calls on a provider to sign its zones, how does it manage transfers to another provider of its signed domain names? Is the resulting level of dependency on that provider acceptable, or is it liable to incite the company to internalise that function at least for its most strategic domain names? If such is the case, what resources and capabilities are available to the company to solve these issues, and what means would be required to support that build-up? 6/8
7 8 Find out more web DNSSEC page on AFNIC s website: Wikipedia page on DNSSEC in English: For further information about DNSSEC at AFNIC : [email protected] 9 Glossary DNS : Domain Name System. DNSSEC : Domain Name System Security Extensions. DS : Delegation Signer. KSK : Key Signing Key. NS : Name Server. SSL : Secure Sockets Layer. SQL : Structured Query Language. ZSK : Zone Signing Key. 7/8
8 Read all of our issue papers: web - [email protected] 8/8
Deploying DNSSEC: From End-Customer To Content
Deploying DNSSEC: From End-Customer To Content March 28, 2013 www.internetsociety.org Our Panel Moderator: Dan York, Senior Content Strategist, Internet Society Panelists: Sanjeev Gupta, Principal Technical
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
Next Steps In Accelerating DNSSEC Deployment
Next Steps In Accelerating DNSSEC Deployment Dan York, CISSP Senior Content Strategist, Internet Society DNSSEC Deployment Workshop, ICANN 45 Toronto, Canada October 17, 2012 Internet Society Deploy360
Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology
SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment Dan York, CISSP Senior Content Strategist, Internet Society Eurasia Network Operators' Group (ENOG) 4 Moscow, Russia October
DNSSEC Practice Statement (DPS)
DNSSEC Practice Statement (DPS) 1. Introduction This document, "DNSSEC Practice Statement ( the DPS ) for the zones under management of Zodiac Registry Limited, states ideas of policies and practices with
DNS security: poisoning, attacks and mitigation
DNS security: poisoning, attacks and mitigation The Domain Name Service underpins our use of the Internet, but it has been proven to be flawed and open to attack. Richard Agar and Kenneth Paterson explain
DNSSEC. What is DNSSEC? Why is DNSSEC necessary? Ensuring a secure Internet
SEC Ensuring a secure Internet What is SEC? SEC is an extension of the Domain Name System (), that ensures the authenticity and integrity of the data in replies. Technical measures have been implemented
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
Securing DNS Infrastructure Using DNSSEC
Securing DNS Infrastructure Using DNSSEC Ram Mohan Executive Vice President, Afilias [email protected] February 28, 2009 Agenda Getting Started Finding out what DNS does for you What Can Go Wrong A Survival
DNS Risks, DNSSEC. Olaf M. Kolkman and Allison Mankin. [email protected] and [email protected]. http://www.nlnetlabs.nl/ 8 Feb 2006 Stichting NLnet Labs
DNS Risks, DNSSEC Olaf M. Kolkman and Allison Mankin [email protected] and [email protected] 8 Feb 2006 Stichting NLnet Labs DNSSEC evangineers of the day Allison: Independent consultant Member of the Internet2
American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2
American International Group, Inc. DNS Practice Statement for the AIG Zone Version 0.2 1 Table of contents 1 INTRODUCTION... 6 1.1 Overview...6 1.2 Document Name and Identification...6 1.3 Community and
DNSSEC Applying cryptography to the Domain Name System
DNSSEC Applying cryptography to the Domain Name System Gijs van den Broek Graduate Intern at SURFnet Overview First half: Introduction to DNS Attacks on DNS Second half: DNSSEC Questions: please ask! DNSSEC
DNSSEC for Everybody: A Beginner s Guide
DNSSEC for Everybody: A Beginner s Guide San Francisco, California 14 March 2011 4:00 to 5:00 p.m. Colonial Room The Schedule 2 This is Ugwina. She lives in a cave on the edge of the Grand Canyon... This
DNSSEC and DNS Proxying
DNSSEC and DNS Proxying DNS is hard at scale when you are a huge target 2 CloudFlare DNS is big 3 CloudFlare DNS is fast 4 CloudFlare DNS is always under attack 5 CloudFlare A secure reverse proxy for
DNSSEC Deployment a case study
DNSSEC Deployment a case study Olaf M. Kolkman [email protected] RIPE NCCs Project Team: Katie Petrusha, Brett Carr, Cagri Coltekin, Adrian Bedford, Arno Meulenkamp, and Henk Uijterwaal Januari 17, 2006
Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011
The Internet is for Everyone. Become an ISOC Member. Cyber Security Symposium 2011 Where is Hong Kong in the secure Internet infrastructure development Warren Kwok, CISSP Internet Society Hong Kong 12
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
F5 Technical Brief DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn t working,
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
IEncrypt a work-in-progress
IEncrypt a work-in-progress open-source initiative to increase encryption of traffic to and from.ie web sites, starting with newly registered second-level.ie domains. Developed by Tolerant Networks Limited
THE MASTER LIST OF DNS TERMINOLOGY. v 2.0
THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people
DNSSEC in your workflow
DNSSEC in your workflow Presentation roadmap Overview of problem space Architectural changes to allow for DNSSEC deployment Deployment tasks Key maintenance DNS server infrastructure Providing secure delegations
Overview of DNSSEC deployment worldwide
The EURid Insights series aims to analyse specific aspects of the domainname environment. The reports are based on surveys, studies and research conducted by EURid in cooperation with industry experts
SAC 049 SSAC Report on DNS Zone Risk Assessment and Management
SAC 049 SSAC Report on DNS Zone Risk Assessment and Management A Report from the ICANN Security and Stability Advisory Committee (SSAC) 03 June 2011 SAC049 1 Preface This is a Report of the Security and
The Impact of DNSSEC. Matthäus Wander. on the Internet Landscape. <[email protected]> Duisburg, June 19, 2015
The Impact of DNSSEC on the Internet Landscape Matthäus Wander Duisburg, June 19, 2015 Outline Domain Name System Security problems Attacks in practice DNS Security Extensions
F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution
F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution As market leaders in the application delivery market and DNS, DHCP, and IP Address Management (DDI) market
14. Privacy Policies. 14.1. Introduction
14. Privacy Policies 14.1. Introduction 14.2. Policy Accent Media Ltd, incorporated in England, is the Registry Operator for the Top Level Domain TLD.tickets ( the Registry ). As a company registered in
Securing End-to-End Internet communications using DANE protocol
Securing End-to-End Internet communications using DANE protocol Today, the Internet is used by nearly.5 billion people to communicate, provide/get information. When the communication involves sensitive
CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12. CentralNic. Version 1.0. July 31, 2012. https://www.centralnic.
CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12 CentralNic Privacy Policy Version 1.0 July 31, 2012 https://www.centralnic.com/ CentralNic Privacy Policy Last Updated: February 6, 2012
WHITE PAPER. Best Practices DNSSEC Zone Management on the Infoblox Grid
WHITE PAPER Best Practices DNSSEC Zone Management on the Infoblox Grid What Is DNSSEC, and What Problem Does It Solve? DNSSEC is a suite of Request for Comments (RFC) compliant specifications developed
Internet Programming. Security
Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures
INFORMATION SECURITY REVIEW
INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,
KSRegistry DNSSEC Policy Statement
KSRegistry DNSSEC Policy Statement 1. INTRODUCTION...5 1.1 Overview...5 1.2 Document name and identification...5 1.3. Community and Applicability...5 1.3.1 Registry...5 1.3.2 Registrars...5 1.3.3 Registrants...6
THE MASTER LIST OF DNS TERMINOLOGY. First Edition
THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource. Without
Networking Domain Name System
IBM i Networking Domain Name System Version 7.2 IBM i Networking Domain Name System Version 7.2 Note Before using this information and the product it supports, read the information in Notices on page
DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In)
DNSSEC: A Vision Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Outline DNS Today DNS Attacks DNSSEC: An Approach Countering DNS Attacks Conclusion 2 DNS Today DNS is
Presented by Greg Lindsay Technical Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group April 7, 2010
Presented by Greg Lindsay Technical Writer Windows Server Information Experience Presented at: Seattle Windows Networking User Group April 7, 2010 Windows 7 DNS client DNS devolution Security-awareness:
Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon
1 Common security requirements Basic security tools Secret-key cryptography Public-key cryptography Example Online shopping with Amazon 2 Alice credit card # is xxxx Internet What could the hacker possibly
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
DNSSEC Policy Statement Version 1.1.0. 1. Introduction. 1.1. Overview. 1.2. Document Name and Identification. 1.3. Community and Applicability
DNSSEC Policy Statement Version 1.1.0 This DNSSEC Practice Statement (DPS) conforms to the template included in RFC 6841. 1. Introduction The approach described here is modelled closely on the corresponding
Module 2. Configuring and Troubleshooting DNS. Contents:
Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring
Network Infrastructure Under Siege
Network Infrastructure Under Siege Char Sample Security Engineer, CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk represents the opinions and research of the presenter
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
The Domain Name System from a security point of view
The Domain Name System from a security point of view Simon Boman Patrik Hellström Email: {simbo105, pathe321}@student.liu.se Supervisor: David Byers, {[email protected]} Project Report for Information Security
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
DNSSEC Root Zone. High Level Technical Architecture
DNSSEC Root Zone Prepared by the Root DNSSEC Design Team Joe Abley David Blacka David Conrad Richard Lamb Matt Larson Fredrik Ljunggren David Knight Tomofumi Okubo Jakob Schlyter Version 1.2.1 October
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314
NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2002 LETTER NO.: 02-CU-16 TO: All Federally-Insured Credit Unions SUBJ: Protection of Credit Union Internet Addresses
Web Security. Mahalingam Ramkumar
Web Security Mahalingam Ramkumar Issues Phishing Spreading misinformation Cookies! Authentication Domain name DNS Security Transport layer security Dynamic HTML Java applets, ActiveX, JavaScript Exploiting
Technical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
DNS and BIND. David White
DNS and BIND David White DNS: Backbone of the Internet Translates Domains into unique IP Addresses i.e. developcents.com = 66.228.59.103 Distributed Database of Host Information Works seamlessly behind
Introduction to the DANE Protocol
Introduction to the DANE Protocol ICANN 47 July 17, 2013 Internet Society Deploy360 Programme Providing real-world deployment info for IPv6, DNSSEC, routing and other Internet technologies: Case Studies
The Survey Report on DNS Cache & Recursive Service in China Mainland
The Survey Report on DNS Cache & Recursive Service in China Mainland Wei WANG, Chinese Academy of Sciences Zhiwei YAN, China Internet Network Information Center Motivation Improve the traditional recursive
Secure Domain Name System (DNS) Deployment Guide
NIST Special Publication 800-81-2 Secure Domain Name System (DNS) Deployment Guide Ramaswamy Chandramouli Scott Rose C O M P U T E R S E C U R I T Y NIST Special Publication 800-81-2 Secure Domain Name
How to Build an Effective Mail Server Defense
How to Build an Effective Mail Server Defense A multi-stage approach to securing your email communication August, 21 2006 Author: Alin Dobre, Head of Customer Support, AXIGEN GECAD Technologies 10A Dimitrie
Secure Domain Name System (DNS) Deployment Guide
Special Publication 800-81 Sponsored by the Department of Homeland Security Secure Domain Name System (DNS) Deployment Guide Recommendations of the National Institute of Standards and Technology Ramaswamy
Monitoring the DNS. Gustavo Lozano Event Name XX XXXX 2015
Monitoring the DNS Gustavo Lozano Event Name XX XXXX 2015 Agenda 1 2 3 Components of the DNS Monitoring gtlds Monitoring other components of the DNS 4 5 Monitoring system Conclusion 2 Components of the
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep) survey says: There are things that go bump in the night, and things that go bump against your DNS security. You probably know
Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
Chapter 25 Domain Name System. 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 25 Domain Name System 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 25.2 Figure 25.1 Example of using the DNS service 25-1 NAME SPACE To be unambiguous,
Internet-Praktikum I Lab 3: DNS
Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Rough Outline. Introduction Why DNSSEC DNSSEC Theory Famous last words. http://www.nlnetlabs.nl/ Universiteit van Amsterdam, Sep 2006.
page 2 Rough Outline An introduction to DNSSEC Olaf Kolkman 21 September 2006 Stichting (www.nlnetlabs.nl) Introduction Why DNSSEC DNSSEC Theory Famous last words page 3 DNSSEC evangineers of the day Olaf:
DNSSEC Practice Statement.OVH
DPS.OVH 11/06/2013 1 DNSSEC Practice Statement.OVH Registry domain signature policy and conditions of implementation (Version 02 11/06/2013) DPS.OVH 11/06/2013 2 Document management Document identification
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
DNSSEC - SECURE DNS FOR GOVERNMENT. Whitepaper
DNSSEC - SECURE DNS FOR GOVERNMENT Whitepaper ii BlueCat Networks Use of this document Copyright This document and all information (in text, Graphical User Interface ( GUI ), video and audio forms), images,
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
Domain Name System (DNS) Security By Diane Davidowicz 1999 Diane Davidowicz
Domain Name System (DNS) Security By Diane Davidowicz 1999 Diane Davidowicz Contents 1. Abstract...3 2. Introduction...3 3. Overview of the DNS...3 3.1. Fundamentals of DNS...4 3.1.1. The Domain Name Space...4
Secure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
Domain Name System Security
Abstract Domain Name System Security Ladislav Hagara [email protected] Department of Automated Command Systems and Informatics Military Academy in Brno Brno, Czech Republic Domain Name System (DNS) is one of
DNS Security: New Threats, Immediate Responses, Long Term Outlook. 2007 2008 Infoblox Inc. All Rights Reserved.
DNS Security: New Threats, Immediate Responses, Long Term Outlook 2007 2008 Infoblox Inc. All Rights Reserved. A Brief History of the Recent DNS Vulnerability Kaminsky briefs key stakeholders (CERT, ISC,
NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS
NANOG DNS BoF DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS The Role Of An ISP In DNSSEC Valida;on ISPs act in two different DNSSEC roles, both signing and valida;ng
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
