Domain Name System Security (DNSSEC)
|
|
|
- Godfrey Conley
- 10 years ago
- Views:
Transcription
1 Dept. of Homeland Security Science & Technology Directorate Domain Name System Security (DNSSEC) CA CISO Lecture Series Sacramento, CA December 15, 2009 Douglas Maughan, Ph.D. Program Manager, CCI / /15/2009 1
2 Agenda What is the Domain Name System (DNS)? What is DNS Security (DNSSEC)? What is the U.S. Government doing with DNSSEC? Who s involved? DHS, OMB, GSA, NIST How might that impact State and Local governments? What help is available? What vendors have DNSSEC capable products? What questions should I ask the vendors? Summary / Conclusions 12/15/2009 2
3 The Domain Name System (DNS) is... What Internet users use to reference anything by name on the Internet The mechanism by which applications get translations of names to IP addresses and vice versa A globally distributed, loosely coherent, scalable, reliable, dynamic database Comprised of two primary types of components The information itself, sometimes called the name space or DNS Content The moving parts that provide the means for users to get information - can be further divided to: Servers that provide answers to the DNS questions Resolvers (clients) which ask questions about DNS information 12/15/2009 3
4 The Domain Name System DNS database maps: Name to IP address = And many other mappings (mail servers, IPv6, reverse ) root.edu.mil.ru Data organized as tree structure: Each zone is authoritative for its own data Minimal coordination between zone operators isi nge darpa usmc alpha mil 12/15/2009 4
5 DNS Name Resolution Root Server TLD Server Other Servers Zone Server "End" user Local DNS Server Important Other servers include: ISP Enterprise Hotel/travel Public WLAN 12/15/2009 5
6 What and Who are the DNS (and DNSSEC) Players and Pieces? DNSSEC fits HERE Registries Zone Name Servers Content Responsibility Area Publication Area Content Flow Content Starts Here Registrars DNS and DNSSEC Content Picture DNS Resolvers Content Flow Content Used Here Registrants User Applications 12/15/2009 6
7 1 Webpage = Multiple Name Resolutions Mar 12, /15/ # 7
8 Agenda What is the Domain Name System (DNS)? What is DNS Security (DNSSEC)? What is the U.S. Government doing with DNSSEC? Who s involved? DHS, OMB, GSA, NIST How might that impact State and Local governments? What help is available? What vendors have DNSSEC capable products? What questions should I ask the vendors? Summary / Conclusions 12/15/2009 8
9 Why is the DNS so Vulnerable? Designed in 1980s when the trust model and the threat model were very different from today Attack the trust model and you can change the way information is found and exchanged on the Internet Optimized for fast query/response times Not optimized for authenticity or integrity Trust is implied - legitimate queries and legitimate replies are expected DNS threats identified in early 1990s Attacks via DNS and against the DNS are increasing August 2008 Kaminsky bug is a prime example Attacks are becoming costly and difficult to remedy 12/15/2009 9
10 Cache Poisoning (Kaminsky) Attack. Technically nothing new Vulnerability identified in 95 at least. What opened eyes: was the scope of vulnerability millions of DNS servers. was the ease of executing the attack. was the novel ways in which cache poisoning could be used as a tool to undermine other critical network services and trust models. What people are learning: Is that there is no simple quick fix. The patch while important only moved the vulnerability from trivial to exploit to easy to exploit The Kaminsky attacks will continue software available, patched systems proven still vulnerable. The Kaminsky attack is just the latest instance to exploit a systemic DNS vulnerability. There are and will be more.. 12/15/
11 What Does DNSSEC Do? Provides an approach so DNS users can: Validate that data they receive came from the correct originator Source Authenticity Validate that data they receive is the data the originator put into the DNS Data Integrity This approach integrates with existing server infrastructure and user clients Maximized benefit when application software can determine if DNS data was received with authenticity and integrity Not provided by DNSSEC: message encryption, security for denial-of-service attacks 12/15/
12 DNS Attacks Graphical View Forged/compromised data Local Server End-user = Man in the Middle Attackers Zone Servers Actually = But how do you determine this? Cache poisoning 12/15/
13 Secure DNS Query and Response Local Server root Server End-user = Plus signature by dhs.gov gov Server Attacker can not forge this answer without the dhs.gov private key. dhs.gov Server 12/15/
14 Agenda What is the Domain Name System (DNS)? What is DNS Security (DNSSEC)? What is the U.S. Government doing with DNSSEC? Who s involved? DHS, OMB, GSA, NIST How might that impact State and Local governments? What help is available? What vendors have DNSSEC capable products? What questions should I ask the vendors? Summary / Conclusions 12/15/
15 National Strategy to Secure Cyberspace The National Strategy to Secure Cyberspace (2003) recognized the DNS as a critical weakness NSSC called for the Department of Homeland Security to coordinate public-private partnerships to encourage the adoption of improved security protocols, such as DNS The security and continued functioning of the Internet will be greatly influenced by the success or failure of implementing more secure and more robust BGP and DNS. The Nation has a vital interest in ensuring that this work proceeds. The government should play a role when private efforts break down due to a need for coordination or a lack of proper incentives. 12/15/
16 DNSSEC Initiative Performers Shinkuro, Washington, DC Roadmap Development and Execution International partner participation Support Tool Development Sparta, Columbia, MD Software Development Servers, resolvers, applications Internet Standards activities NIST, Gaithersburg, MD Measurement and Evaluation Tools Government and Standards activities Connections with GSA, FISMA, and OMB 12/15/
17 DNSSEC Initiative Activities Roadmap published in February 2005; Revised March Multiple workshops held world-wide Involvement with numerous deployment pilots DNSSEC testbed developed by NIST Formal publicity and awareness plan including newsletter Working with Civilian government (.gov) to develop policy and technical guidance for secure DNS operations and beginning deployment activities at all levels. Working with Microsoft, Mozilla, OpenDNS and others to promote DNSSEC capability and awareness in their software or projects 12/15/
18 DNSSEC Roadmap Identifies the following activities: Remaining R&D Issues (Lead: Shinkuro) Software Development (Lead: Sparta) Server Resolver Applications Operational Considerations (Lead: Shinkuro) Root Registries Registrants Measurement and Evaluation (Lead: NIST) Outreach and Training (Lead: Shinkuro) 12/15/
19 DNSSEC Current State RFC 4033 DNS Security Introduction and Requirements RFC 4034 Resource Records for the DNS Security Extensions RFC 4035 Protocol Modifications for the DNS Security Extensions RFC 5011 DNS Key Rollover RFC 5155 DNSSEC Hashed Authenticated Denial of Existence for the entire collection 12/15/
20 DNSSEC Tools Identifies the following available open-source tools: Authoritative Zones Authoritative Servers Recursive Servers Applications Application Developers 12/15/
21 Incremental Deployment Registries Work through various readiness levels Registrars Initial study -> Initial design -> Pilot -> Pre-deployment -> Operation Migrate to an Extensible Provisioning Protocol (EPP)-based system Build extensions for existing non-epp system ISPs Validation as a preferred service for some customers. Requires managing customized set of Trust Anchors for sets of customers Detect key rollover events for known islands of trust Enterprise Internal deployment as part of corporate system integrity and protection Trading partners Distinguish between safe and questionable sites 12/15/
22 Leveraging Existing Efforts cctlds with operational DNSSEC Services Sweden: Bulgaria: Brazil: Puerto Rico: The Czech Republic: RIPE-NCC Reverse zones that it manages and e164.arpa zone (ENUM) DNSSEC initiatives in.uk and.de Strong advocates of DNSSEC, implementation in progress and JPRS Working on integrating DNSSEC signing into existing workflow to maintain short update assurances /15/
23 Leveraging Existing Efforts (cont).org testbed PIR has maintained the.org testbed to enable its registrars to test DNSSEC-capable systems SNIP testbed for.gov Provide distributed training ground for.gov operators deploying DNSSEC IANA Testbed for signing zones that IANA controls Also has a prototype for a signed copy of the Root zone 12/15/
24 NIST Effort - SNIP Secure Naming Infrastructure Pilot (SNIP) Aiding deployment by: Providing a connected training ground Educational resources/guides Modeling infrastructures Testbed for systems Relying on user participation Aid in deployment, not a proof-of-concept experiment 12/15/
25 USG Road to Deployment Not a Chicken and Egg Problem! Clear answer is to establish signed infrastructure first. then deploy validators/applications to use it. Phased Development & Deployment Plan Phase Technology Development and Testing Deployment Guidance Phase Sign the USG DNS Infrastructure (.gov) Phase Deploy validation tools to leverage signed infrastructure. Deploy DNSSEC-aware applications. 12/15/
26 Recommendations, Requirements and Policies Embodied in evolving FISMA Requirements: FIPS Minimum Security Requirements for Federal Information and Information Systems (FISMA) Recommended Security Controls for Federal Information Systems (NIST SP ) (FISMA) Guide for Assessing the Security Controls in Federal Information Systems (NIST SP A) Secure Domain Name System (DNS) Deployment Guide (NIST SP ). Recommendation for Key Management (NIST SP ). Embodied in specific policies: Securing the Federal Government s Domain Name System Infrastructure (OMB M-08-23) 12/15/
27 OMB memo on DNSSEC 12/15/
28 OMB DNSSEC Memo Discussions began back in 2006 with OMB/OSTP Specific Purposes: Introduction to DNSSEC Reminder of existing security controls Announcement of plans to sign.gov domain Instructions for each agency to develop plans for the deployment of DNSSEC to all applicable systems Identifies other sources of information Discusses training available (from DNSSEC team) 12/15/
29 DNSSEC Deployment Guidance Secure DNS Deployment Guide NIST Special Publication Deals with DNS Security, not just DNSSEC Technical deployment guidance for enterprise DNS administrators and security officers. Provides both information for robust configuration of traditional DNS services and deployment / operational guidance for DNSSEC. Provides cookbook configuration examples for commonly used DNS servers. NIST SP800-81r1 to be released any day 1024 bit RSA/SHA-1 (or RSA/SHA-256) ZSK s still allowed until 2015 Expected that Elliptic Curve will be specified and implemented by then. Note that the Root will begin signing using RSA/SHA /15/
30 What is Required When? Phase 2 Sign the USG Infrastructure FISMA Dec 2006 Revision Required HIGH & MODERATE impact systems to sign and HIGH *to be able to* validate zones. Aug 2008 OMB Requires.gov TLD to be signed by early External facing agency.gov zones to be signed by Dec Agencies to comply with 2009 FISMA DNSSEC requirements. FISMA May 2009 Revision All (HIGH, MODERATE, LOW) systems must sign DNS by May Phase 3 Validation / Application Infrastructure Target FISMA 2010 Revision. 12/15/
31 GSA -.GOV Program Overview GSA became the managing partner Agency in 1997 Governing document is the Code of Federal Regulations Final Rule 41 CFR Part (March 28, 2003). Federal, state and local government organizations, and Native Sovereign Nations (NSNs) may register a.gov top level domain (TLD) name on the Internet at GSA charges an annual fee for a.gov domain name. GSA s.gov program is the only source in the world for obtaining a.gov domain name. Extremely high visibility program 24x7 helpdesk emergency support Total of 4,705 registered.gov domain names (February 25, 2009). Active Federal 1,748 Active State/Local 2,438 Active NSN 107 Awaiting info to activate /15/
32 .GOV DNSSEC Deployment Support to Agencies DNSSEC Registration Support Self registration through Automated monitoring Policy Support and Lessons Learned DNSSEC FAQ and policies available on Open testing environment for Agencies ready to implement DNSSEC Seamless integration with NIST s SNIP test environment to allow Agencies/Departments/States/Locals a safe place to test and work through DNSSEC issues Live Help Desk Support [email protected] 12/15/
33 .GOV DNSSEC 12/15/
34 .GOV DNSSEC where to get info 12/15/
35 .GOV DNSSEC FAQ s 12/15/
36 .GOV DNSSEC Registration 12/15/
37 Agenda What is the Domain Name System (DNS)? What is DNS Security (DNSSEC)? What is the U.S. Government doing with DNSSEC? Who s involved? DHS, OMB, GSA, NIST How might that impact State and Local governments? What help is available? What vendors have DNSSEC capable products? What questions should I ask the vendors? Summary / Conclusions 12/15/
38 Questions to ask the Vendors GovSec The Basics: Does it do DNSSEC according to the most recent RFC s? (RFC 4033, 4034, and 4035) Do your products have FIPS 140 certification? Does it generate keys of the appropriate size? (2048 bit RSA/SHA-1) Can the product be used to manage key material? Can the product generate both NSEC and NSEC3 signed zones? Can I sign/serve/manage multiple zones using this product? 12/15/
39 Questions to ask the Vendors (cont d) The Not-So-Basics: Does it integrate with <your content management system>? Does it work in your network infrastructure? Does it work with MS Active Directory/Your DHCP server of Choice? Can you use an HSM for key management with your product? How do you update zone data using your product? What about logging/debugging tools? 12/15/
40 DNSSEC Product Vendors - 1 AEP Networks Somerset, New Jersey Afilias Hardware Security Modules Dublin, Ireland (Horsham, PA) Registrar and DNSSEC provider Blue Cat Networks Toronto, Canada DNSSEC Appliance 12/15/
41 DNSSEC Product Vendors - 2 Data Mountain Solutions, Inc. Northern Virginia Infoblox Manage.GOV domain for GSA Santa Clara, CA DNS Appliances Internet Systems Consortium (ISC) Redwood City, California Original developers of BIND 12/15/
42 DNSSEC Product Vendors - 3 Microsoft Redmond, WA Available in Windows Server 2008 R2 and Windows 7 NLNet Labs Amsterdam, The Netherlands Open Source NSD software Nominum, Inc. Redwood City, California DNS and DNSSEC service provider 12/15/
43 DNSSEC Product Vendors - 4 Secure64 Corporation Greenwood Village, CO DNSSEC Signer Appliance Funded by DHS S&T Winner Best of FOSE 2009 Xelerance Corporation Ottawa, Canada DNSSEC Appliance and Services 12/15/
44 Drawbacks of DNS Security Increased complexity Extra queries to create chain of trust Resolvers must be able to verify digital signatures Increased zone database size Contains more data Increased interaction between delegations To secure delegations to sub-zones, or allow opt-ins (Actually, this is a positive benefit) 12/15/
45 Business Case Motivations The bad guys Increasingly attacks are much more sophisticated, highly motivated and resource rich. Phishing and pharming attacks for $. Nation state attacks for military / intelligence goals. Infrastructure attacks to pull the rug from under hardened hosts / services. The good guys Face technical, economic, and political barriers to deployment of some technologies. Unregulated, low margin industry in the core of the network. Who pays for security? Who pays for insecurity? Must have incremental deployment plan. Must have favorable / viable business model. 12/15/
46 DNSSEC Summary Domain Name System has vulnerabilities Already being exploited, most recent demonstrations in Aug 2008 Fixing it requires significant involvement with governments and private sector entities ICANN, USG, Foreign governments, Domain owners, Domain Name Registrars There is a lack of customer pull for DNSSEC deployment Government needs to set the example and we think we are doing that with OMB and GSA Still plenty of work to do. 12/15/
47 Douglas Maughan, Ph.D. Program Manager, CCI / For more information, visit 12/15/
48 Resources Reference: DNS and BIND, Albitz & Liu, O Reilly & Associates FAQ: BIND9 Administrator Reference Manual RFCs: ftp://ftp.ripe.net/rfc/ Drafts: ftp://ftp.ripe.net/internet-drafts/ 12/15/
49 Additional Resources Papers from the 5th USENIX UNIX Security Symposium, Salt Lake City, Utah, June 1995 P. Vixie: DNS and BIND Security Issues S. Bellovin: Using the DNS for Break-ins 12/15/
50 Related mailing lists DNS OARC: IETF DNSOP: DNSEXT IETF working group (DNS protocol development) RIPE Technical Security working group RIPE DNS working group 12/15/
51 DNSSEC Initiative Resources DNSSEC Deployment Working Group Mailing list: NIST DNSSEC Project page Links to NIST tools SPARTA DNSSEC Project page Tools, Applications, Step-by-step guides. Secure Naming Infrastructure Pilot Distributed test domain/training pilot 12/15/
DNS Risks, DNSSEC. Olaf M. Kolkman and Allison Mankin. [email protected] and [email protected]. http://www.nlnetlabs.nl/ 8 Feb 2006 Stichting NLnet Labs
DNS Risks, DNSSEC Olaf M. Kolkman and Allison Mankin [email protected] and [email protected] 8 Feb 2006 Stichting NLnet Labs DNSSEC evangineers of the day Allison: Independent consultant Member of the Internet2
DNS Security: New Threats, Immediate Responses, Long Term Outlook. 2007 2008 Infoblox Inc. All Rights Reserved.
DNS Security: New Threats, Immediate Responses, Long Term Outlook 2007 2008 Infoblox Inc. All Rights Reserved. A Brief History of the Recent DNS Vulnerability Kaminsky briefs key stakeholders (CERT, ISC,
Security in the Network Infrastructure - DNS, DDoS,, etc.
Security in the Network Infrastructure - DNS, DDoS,, etc. GTER, São Paulo December 8, 2006 Steve Crocker, [email protected] Russ Mundy, [email protected] Proactive Security Build security into the infrastructure
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
Securing DNS Infrastructure Using DNSSEC
Securing DNS Infrastructure Using DNSSEC Ram Mohan Executive Vice President, Afilias [email protected] February 28, 2009 Agenda Getting Started Finding out what DNS does for you What Can Go Wrong A Survival
F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution
F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution As market leaders in the application delivery market and DNS, DHCP, and IP Address Management (DDI) market
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
DNSSEC Applying cryptography to the Domain Name System
DNSSEC Applying cryptography to the Domain Name System Gijs van den Broek Graduate Intern at SURFnet Overview First half: Introduction to DNS Attacks on DNS Second half: DNSSEC Questions: please ask! DNSSEC
DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS
AFNIC s Issue Papers DNSSEC Domain Name System Security Extensions 1 - Organisation and operation of the DNS 2 - Cache poisoning attacks 3 - What DNSSEC can do 4 - What DNSSEC cannot do 5 - Using keys
DNSSEC in your workflow
DNSSEC in your workflow Presentation roadmap Overview of problem space Architectural changes to allow for DNSSEC deployment Deployment tasks Key maintenance DNS server infrastructure Providing secure delegations
Next Steps In Accelerating DNSSEC Deployment
Next Steps In Accelerating DNSSEC Deployment Dan York, CISSP Senior Content Strategist, Internet Society DNSSEC Deployment Workshop, ICANN 45 Toronto, Canada October 17, 2012 Internet Society Deploy360
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
Deploying DNSSEC: From End-Customer To Content
Deploying DNSSEC: From End-Customer To Content March 28, 2013 www.internetsociety.org Our Panel Moderator: Dan York, Senior Content Strategist, Internet Society Panelists: Sanjeev Gupta, Principal Technical
DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In)
DNSSEC: A Vision Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Outline DNS Today DNS Attacks DNSSEC: An Approach Countering DNS Attacks Conclusion 2 DNS Today DNS is
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment Dan York, CISSP Senior Content Strategist, Internet Society Eurasia Network Operators' Group (ENOG) 4 Moscow, Russia October
DNSSEC Deployment a case study
DNSSEC Deployment a case study Olaf M. Kolkman [email protected] RIPE NCCs Project Team: Katie Petrusha, Brett Carr, Cagri Coltekin, Adrian Bedford, Arno Meulenkamp, and Henk Uijterwaal Januari 17, 2006
Secure Domain Name System (DNS) Deployment Guide
NIST Special Publication 800-81-2 Secure Domain Name System (DNS) Deployment Guide Ramaswamy Chandramouli Scott Rose C O M P U T E R S E C U R I T Y NIST Special Publication 800-81-2 Secure Domain Name
DNS and BIND. David White
DNS and BIND David White DNS: Backbone of the Internet Translates Domains into unique IP Addresses i.e. developcents.com = 66.228.59.103 Distributed Database of Host Information Works seamlessly behind
American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2
American International Group, Inc. DNS Practice Statement for the AIG Zone Version 0.2 1 Table of contents 1 INTRODUCTION... 6 1.1 Overview...6 1.2 Document Name and Identification...6 1.3 Community and
IANA Functions to cctlds Sofia, Bulgaria September 2008
IANA Functions to cctlds Sofia, Bulgaria September 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers What is IANA? Internet Assigned Numbers Authority
Secure Domain Name System (DNS) Deployment Guide
Special Publication 800-81 Sponsored by the Department of Homeland Security Secure Domain Name System (DNS) Deployment Guide Recommendations of the National Institute of Standards and Technology Ramaswamy
DNS security: poisoning, attacks and mitigation
DNS security: poisoning, attacks and mitigation The Domain Name Service underpins our use of the Internet, but it has been proven to be flawed and open to attack. Richard Agar and Kenneth Paterson explain
F-Root's DNSSEC Signing Plans. Keith Mitchell Internet Systems Consortium DNS-OARC NANOG48, Austin, 24 th Feb 2010
F-Root's DNSSEC Signing Plans Keith Mitchell Internet Systems Consortium DNS-OARC NANOG48, Austin, 24 th Feb 2010 What is ISC? Internet Systems Consortium, Inc. Headquartered in Redwood City, California
DNSSEC Practice Statement (DPS)
DNSSEC Practice Statement (DPS) 1. Introduction This document, "DNSSEC Practice Statement ( the DPS ) for the zones under management of Zodiac Registry Limited, states ideas of policies and practices with
TECHNICAL WHITE PAPER. Infoblox and the Relationship between DNS and Active Directory
TECHNICAL WHITE PAPER Infoblox and the Relationship between DNS and Active Directory Infoblox DNS in a Microsoft Environment Infoblox is the first, and currently only, DNS/DHCP/IP address management (DDI)
DNSSEC in stats. GC-SEC Global Cyber Security Center. Andrea Rigoni. CENTR Bruxelles, 7th October 2010. Global Cyber Security Center Director General
Global Cyber Security Center DNSSEC in stats CENTR Bruxelles, 7th October 2010 Andrea Rigoni Global Cyber Security Center Director General [email protected] On the 7 th of May 2010 Poste Italiane
Overview of DNSSEC deployment worldwide
The EURid Insights series aims to analyse specific aspects of the domainname environment. The reports are based on surveys, studies and research conducted by EURid in cooperation with industry experts
GDS Resource Record: Generalization of the Delegation Signer Model
GDS Resource Record: Generalization of the Delegation Signer Model Gilles Guette, Bernard Cousin, David Fort To cite this version: Gilles Guette, Bernard Cousin, David Fort. GDS Resource Record: Generalization
Internet-Praktikum I Lab 3: DNS
Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans
An Introduction to the Domain Name System
An Introduction to the Domain Name System Olaf Kolkman [email protected] October 28, 2005 Stichting NLnet Labs This Presentation An introduction to the DNS Laymen level For non-technologists About protocol
DNS Root NameServers
DNS Root NameServers An Overview Dr. Farid Farahmand Updated: 9/24/12 Who- is- Who! Over half million networks are connected to the Internet 5 billion users by 2015! Network numbers are managed by ICANN
Reliable DNS and DHCP for Microsoft Active Directory
WHITEPAPER Reliable DNS and DHCP for Microsoft Active Directory Protecting and Extending Active Directory Infrastructure with Infoblox Appliances Microsoft Active Directory (AD) is the distributed directory
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
The Continuing Denial of Service Threat Posed by DNS Recursion (v2.0)
The Continuing Denial of Service Threat Posed by DNS Recursion (v2.0) US-CERT Summary US-CERT has been alerted to an increase in distributed denial of service (DDoS) attacks using spoofed recursive DNS
DNSSEC for Everybody: A Beginner s Guide
DNSSEC for Everybody: A Beginner s Guide San Francisco, California 14 March 2011 4:00 to 5:00 p.m. Colonial Room The Schedule 2 This is Ugwina. She lives in a cave on the edge of the Grand Canyon... This
Defending your DNS in a post-kaminsky world. Paul Wouters <[email protected]>
Defending your DNS in a post-kaminsky world Paul Wouters Overview History of DNS and the Kaminsky attack Various DNS problems explained Where to address the DNS problem Nameservers,
Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology
SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2
Network Infrastructure Under Siege
Network Infrastructure Under Siege Char Sample Security Engineer, CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk represents the opinions and research of the presenter
WHITE PAPER. Best Practices DNSSEC Zone Management on the Infoblox Grid
WHITE PAPER Best Practices DNSSEC Zone Management on the Infoblox Grid What Is DNSSEC, and What Problem Does It Solve? DNSSEC is a suite of Request for Comments (RFC) compliant specifications developed
The Domain Name System from a security point of view
The Domain Name System from a security point of view Simon Boman Patrik Hellström Email: {simbo105, pathe321}@student.liu.se Supervisor: David Byers, {[email protected]} Project Report for Information Security
Defending your DNS in a post-kaminsky world. Paul Wouters <[email protected]>
Defending your DNS in a post-kaminsky world Paul Wouters Vendor and NGO's involved Two phase deployment First release a generic fix for the Kaminsky attack that does not leak information
Internet Security and Resiliency: A Collaborative Effort
Internet Security and Resiliency: A Collaborative Effort Baher Esmat Manager, Regional Relations Middle East MENOG 4 Manama, 9 April 2009 1 WHAT IS THIS PRESENTATION ABOUT? ICANN s effort in enhancing
SAC 049 SSAC Report on DNS Zone Risk Assessment and Management
SAC 049 SSAC Report on DNS Zone Risk Assessment and Management A Report from the ICANN Security and Stability Advisory Committee (SSAC) 03 June 2011 SAC049 1 Preface This is a Report of the Security and
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
F5 Technical Brief DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn t working,
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] http://www.nlnetlabs.nl/ 28 Feb 2013 Stichting NLnet Labs
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] page 2 One slide DNS Root www.nlnetlabs.nl A Referral: nl NS www.nlnetlabs.nl A 213.154.224.1 www.nlnetlabs.nl A www.nlnetlabs.nl A 213.154.224.1
THE DOMAIN NAME SYSTEM DNS
Announcements THE DOMAIN NAME SYSTEM DNS Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 Today s Lecture I. Names vs. Addresses II. III. IV. The Namespace
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS
1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS Dominic Stahl Systems Engineer Central Europe 11.3.2014 Agenda Preface Advanced DNS Protection DDOS DNS Firewall dynamic Blacklisting
Recommendations for dealing with fragmentation in DNS(SEC)
Recommendations for dealing with fragmentation in DNS(SEC) Abstract DNS response messages can sometimes be large enough to exceed the Maximum Transmission Unit (MTU) size for the underlying physical network.
Using the Domain Name System for System Break-ins
Using the Domain Name System for System Break-ins Steven M. Bellovin Presented by: Thomas Repantis [email protected] CS255-Computer Security, Winter 2004 p.1/37 Overview Using DNS to spoof a host s name
Networking Domain Name System
IBM i Networking Domain Name System Version 7.2 IBM i Networking Domain Name System Version 7.2 Note Before using this information and the product it supports, read the information in Notices on page
A Best Practices Architecture for DNSSEC
WHITEPAPER A Best Practices Architecture for DNSSEC Cricket Liu, Vice President of Architecture Background The Domain Name System is the Internet s standard naming service. DNS is responsible for mapping
DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April 2009. Raed Al-Fayez SaudiNIC CITC [email protected], www.nic.net.sa. DNS & IPv6.
DNS & IPv6 MENOG4, 8-9 April 2009 Raed Al-Fayez SaudiNIC CITC [email protected], www.nic.net.sa Agenda DNS & IPv6 Introduction What s next? SaudiNIC & IPv6 About SaudiNIC How a cctld Registry supports
DNSSEC Root Zone. High Level Technical Architecture
DNSSEC Root Zone Prepared by the Root DNSSEC Design Team Joe Abley David Blacka David Conrad Richard Lamb Matt Larson Fredrik Ljunggren David Knight Tomofumi Okubo Jakob Schlyter Version 1.2.1 October
Basic DNS Course. Module 1. DNS Theory. Ron Aitchison ZYTRAX, Inc. Page 1 of 24
Basic DNS Course Module 1 Ron Aitchison ZYTRAX, Inc. Page 1 of 24 The following are the slides used in this Module of the course. Some but not all slides have additional notes that you may find useful.
DNSSec Operation Manual for the.cz and 0.2.4.e164.arpa Registers
DNSSec Operation Manual for the.cz and 0.2.4.e164.arpa Registers version 1.9., valid since 1 January 2010 Introduction This material lays out operational rules that govern the work of the CZ.NIC association
Root Zone KSK: The Road Ahead. Edward Lewis DNS-OARC & RIPE DNSWG May 2015 [email protected]
Root Zone KSK: The Road Ahead Edward Lewis DNS-OARC & RIPE DNSWG May 2015 [email protected] Agenda Setting the scene Change of Hardware Security Modules (HSMs) Roll (change) the Key Signing Key (KSK)
Reliable DNS and DHCP for Microsoft Active Directory Protecting and Extending Active Directory Infrastructure with Infoblox Appliances
Reliable DNS and DHCP for Protecting and Extending Active Directory Infrastructure with Infoblox Appliances Reliable DNS and DHCP for (AD) is the distributed directory service and the information hub of
F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689
F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application
NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS
NANOG DNS BoF DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS The Role Of An ISP In DNSSEC Valida;on ISPs act in two different DNSSEC roles, both signing and valida;ng
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep) survey says: There are things that go bump in the night, and things that go bump against your DNS security. You probably know
DNS SECURITY TROUBLESHOOTING GUIDE
DNS SECURITY TROUBLESHOOTING GUIDE INTERNET DEPLOYMENT OF DNS SECURITY 27 November 2006 Table of Contents 1. INTRODUCTION...3 2. DNS SECURITY SPECIFIC FAILURE MODES...3 2.1 SIGNATURES...3 2.1.1 Signature
Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION
USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION Transaction Signatures (TSIG) provide a secure method for communicating in the Domain Name System (DNS) from a primary to a secondary
NET0183 Networks and Communications
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many
The Future of DNS. Johan Ihrén Netnod. October 15, 2015. http://www.netnod.se/
The Future of DNS Johan Ihrén Netnod October 15, 2015 Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, [email protected] 1 / 16 The Future of DNS I have no idea about the future of DNS.
Public-Root Name Server Operational Requirements
Public-Root Name Server Operational Requirements Published January the 17 th, 2005 Status of this Document This document provides information to the Public-Root and Internet technical community. This document
DNSSEC - SECURE DNS FOR GOVERNMENT. Whitepaper
DNSSEC - SECURE DNS FOR GOVERNMENT Whitepaper ii BlueCat Networks Use of this document Copyright This document and all information (in text, Graphical User Interface ( GUI ), video and audio forms), images,
A Review of Administrative Tools for DNSSEC Spring 2010
Page 1 (29) Andreas Nilsson Certezza AB Stockholm 2010-05-31 A Review of Administrative Tools for DNSSEC Spring 2010 Kornhamnstorg 61, 2 tr SE-111 27 Stockholm Sweden Telefon: +46 (0)8 791 92 00 Telefon:
DNSSEC Policy Statement Version 1.1.0. 1. Introduction. 1.1. Overview. 1.2. Document Name and Identification. 1.3. Community and Applicability
DNSSEC Policy Statement Version 1.1.0 This DNSSEC Practice Statement (DPS) conforms to the template included in RFC 6841. 1. Introduction The approach described here is modelled closely on the corresponding
DNS Firewalls with BIND: ISC RPZ and the IID Approach. Tuesday, 26 June 2012
DNS Firewalls with BIND: ISC RPZ and the IID Approach Tuesday, 26 June 2012 1 About the Presenters»»» Paul Vixie Chairman and Founder Internet Systems Consortium Rod Rasmussen President and CTO IID (Internet
Prepared by: National Institute of Standards and Technology SPARTA, Inc. Shinkuro, Inc.
Signing the Domain Name System Root Zone: Technical Specification Prepared for: Science and Technology Directorate US Department of Homeland Security Prepared by: National Institute of Standards and Technology
A Survey of cctld DNS Vulnerabilities. ITU cctld Workshop March 3, 2003 [email protected]
A Survey of cctld DNS Vulnerabilities ITU cctld Workshop March 3, 2003 [email protected] RATIONALE Health-check on DNS infrastructure > Now becoming a critical national resource Attacks on DNS servers
IPv6 support in the DNS
IPv6 support in the DNS How important is the DNS? Getting the IP address of the remote endpoint is necessary for every communication between TCP/IP applications Humans are unable to memorize millions of
