DNS Risks, DNSSEC. Olaf M. Kolkman and Allison Mankin. olaf@nlnetlabs.nl and mankin@psg.com. http://www.nlnetlabs.nl/ 8 Feb 2006 Stichting NLnet Labs



Similar documents
DNSSEC Deployment a case study

Rough Outline. Introduction Why DNSSEC DNSSEC Theory Famous last words. Universiteit van Amsterdam, Sep 2006.

DNSSEC in your workflow

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment

DNSSEC Briefing for GAC and ccnso

Securing DNS Infrastructure Using DNSSEC

An Introduction to the Domain Name System

DNS Security: New Threats, Immediate Responses, Long Term Outlook Infoblox Inc. All Rights Reserved.

Next Steps In Accelerating DNSSEC Deployment

DNS Security FAQ for Registrants

DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS

Deploying DNSSEC: From End-Customer To Content

DNSSEC Explained. Marrakech, Morocco June 28, 2006

Computer Networks: Domain Name System

Before the. Committee on Energy and Commerce Subcommittee on Communications and Technology United States House of Representatives

DNS at NLnet Labs. Matthijs Mekking

XN--P1AI (РФ) DNSSEC Policy and Practice Statement

Security in the Network Infrastructure - DNS, DDoS,, etc.

IANA Functions to cctlds Sofia, Bulgaria September 2008

DNS Root NameServers

Part 5 DNS Security. SAST01 An Introduction to Information Security Martin Hell Department of Electrical and Information Technology

DNSSEC - Tanzania

EDU DNSSEC Testbed. Shumon Huque, University of Pennsylvania Larry Blunk, MERIT Network

Current Counter-measures and Responses by the Domain Name System Community

Secure and Hardened DNS Appliances for the Internet

DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April Raed Al-Fayez SaudiNIC CITC rfayez@citc.gov.sa, DNS & IPv6.

DNS security: poisoning, attacks and mitigation

ftld Registry Services Security Requirements December 2014

American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2

DNSSEC Practice Statement (DPS)

FAQ (Frequently Asked Questions)

Domain Name System Security (DNSSEC)

DNS and BIND. David White

CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12. CentralNic. Version 1.0. July 31,

DNSSEC Policy Statement Version Introduction Overview Document Name and Identification Community and Applicability

DNSSEC Policy and Practice Statement.amsterdam

How To Use Dnsec

DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .

Internet-Praktikum I Lab 3: DNS

Response to Solicitation Number: SA R-P0-016

Defending your DNS in a post-kaminsky world. Paul Wouters <paul@xelerance.com>

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In)

Xerox SMart esolutions. Security White Paper

Comments on Docket Number , Enhancing the Security and Stability of the Internet s Domain Name and Addressing System

Lecture 2 CS An example of a middleware service: DNS Domain Name System

This framework is documented under NLnet Labs copyright and is licensed under a Creative Commons Attribution 4.0 International License.

14. Privacy Policies Introduction

MS Installing and Configuring Windows Server 2012

DOMAIN NAME SECURITY EXTENSIONS

Cisco Advanced Services for Network Security

signing the root saga

Root zone update for TLD managers Mexico City, Mexico March 2009

IEncrypt a work-in-progress

NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS

SAC075: SSAC Comments to ITU-D on Establishing New Certification Authorities

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Installing and Configuring Windows Server 2012 MOC 20410

USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution

Georgia College & State University

Flexible Training Options to Make the Most of Your IPAM Deployment

Innovating with the Domain Name System: From Web to Cloud to the Internet of Things

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

The USP Maker for the hosting industry Welcome to my presentation Christian Heutger WorldHostingDay

Alternatives and Enhancements to CAs for a Secure Web

Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN

Strengthening our Ecosystem through Stakeholder Collaboration. Jia-Rong Low, Sr Director, Asia 20 August 2015

Installing and Configuring Windows Server 2012

SSAC since last RIPE 55 ICANN SSAC

mydnsipv6 Success Story

Server Certificates based on DNSSEC

CS Lecture 22 DNS Security

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Windows Active Directory. DNS, Kerberos and LDAP T h u r s d a y, J a n u a r y 2 7, 2011 INLS 576 Spring 2011

GDS Resource Record: Generalization of the Delegation Signer Model

Distributed Systems. 22. Naming Paul Krzyzanowski. Rutgers University. Fall 2013

SSL and Browsers: The Pillars of Broken Security

The IANA Functions. An Introduction to the Internet Assigned Numbers Authority (IANA) Functions

Domain Name System (DNS) RFC 1034 RFC

Using the Domain Name System for System Break-ins

DNSSEC Applying cryptography to the Domain Name System

A Best Practices Architecture for DNSSEC

Internet Security and Resiliency: A Collaborative Effort

DomainKeys Identified Mail DKIM authenticates senders, message content

Course Outline: Course Installing and Configuring Windows Server 2012

How To Protect A Web Application From Attack From A Trusted Environment

Application Security: Threats and Architecture

The Future of DNS. Johan Ihrén Netnod. October 15,

OVERVIEW OF THE DNS AND GLOSSARY OF TERMS

Software Defined Perimeter Working Group. SDP Hackathon Whitepaper

WHITE PAPER. Best Practices DNSSEC Zone Management on the Infoblox Grid

OVERVIEW OF THE DNS AND GLOSSARY OF TERMS

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Networking Domain Name System

Recommended IP Telephony Architecture

DNSSEC. What is DNSSEC? Why is DNSSEC necessary? Ensuring a secure Internet

Transcription:

DNS Risks, DNSSEC Olaf M. Kolkman and Allison Mankin olaf@nlnetlabs.nl and mankin@psg.com 8 Feb 2006 Stichting NLnet Labs

DNSSEC evangineers of the day Allison: Independent consultant Member of the Internet2 Tech. Advisory Comm. IETF Transport Area Director Member of ICANN s SSAC Olaf: NLnet Labs (www.nlnetlabs.nl) DNS and DNSSEC research Protocol and software development (NSD) Co-Chair of the IETF DNSEXT working group (Shinkuro is acknowledged for sponsoring our trip)

Why DNSSEC Good security is multi-layered Multiple defense rings in physical secured systems

Bourtange, source Wikipedia

Why DNSSEC Good security is multi-layered Multiple defense rings in physical secured systems Multiple layers in the networking world DNS infrastructure Providing DNSSEC to raise the barrier for DNS based attacks Provides a security ring around many systems and applications

The Problem DNS data published by the registry is being replaced on its path between the server and the client. This can happen in multiple places in the DNS architecture Some places are more vulnerable to attacks then others Vulnerabilities in DNS software make attacks easier (and there will always be software vulnerabilities)

Solution a Metaphor Compare DNSSEC to a sealed transparent envelope. The seal is applied by whoever closes the envelope Anybody can read the message The seal is applied to the envelope, not to the message

Registrars/ Registrants DNS Architecture edu as friend secondary edu institution as ISP Cache server Registry DB primary edu as DNS provider Provisioning DNS Protocol secondary client

Registrars Registrants DNS Architecture Server compromise Inter-server communication Cache Poisoning Registry DB Provisioning DNS Protocol

Subject: tenure Example: Unauthorized mail scanning Astrophysics Mail Server Central Admin Mail Server Where? There! DNS

Subject: tenure Example: Unauthorized mail scanning Astrophysics Mail Server Central Admin Mail Server Where? Elsewhere DNS Bad Guy Bad Guy

Where Does DNSSEC Come In? DNSSEC secures the name to address mapping Tranport and Application security are just other layers.

DNSSEC secondary benefits DNSSEC provides an independent trust path The person administering https is most probably a different from person from the one that does DNSSEC The chains of trust are most probably different See acmqueue.org article: Is Hierarchical Public-Key Certification the Next Target for Hackers?

More benefits? With reasonable confidence perform opportunistic key exchanges SSHFP and IPSECKEY Resource Records With DNSSEC one could use the DNS for a priori negotiation of security requirements. You can only access this service over a secure channel

DNSSEC properties DNSSEC provides message authentication and integrity verification through cryptographic signatures Authentic DNS source No modifications between signing and validation It does not provide authorization It does not provide confidentiality

DNSSEC deployment practicalities RIPE NCC deployed DNSSEC on the reverse tree 202.in-addr.arpa etc are now signed and you can get secure delegations We followed the architecture to plan the changes to our system You may want to follow the same steps when planning for local DNSSEC deployment

DNSSEC Architecture modifications Zone Creation Zone signer Primary DNS Provisioning DB DNS and input checks Secondary DNS DNSSEC aware servers Customer interfaces DNSSEC aware provisioning

Server Infrastructure Part of keeping up to date Your most recent version of BIND and NSD run DNSSEC Memory might be an issue Predictable (see RIPE352) Coordination with secondaries

Provisioning Realize that interaction with child is not drastically different. DS and NS have the same security properties You may need to respond a bit different to child emergency cases Thinking security will make you notice security

Key Mastering and Signing Key management and signing needs to be reliable Failure will lead to loss of service Cost factors: Automation and Education

How about the client side Set up your caching nameserver to perform validation and the infrastructure behind it is protected DNSSEC has not yet been pushed to the host or application Costs are in maintaining trust anchors There is no standard to automate against.

What s keeping folk New technology; chicken and egg Zone walking possibility Is this really an issue in your environment? Solutions are being engineered Automated key rollover and distribution

Why would you be a(n) (early) player Keeping the commons clean EDU and international research nets are important parts of the commons Significant hot spots of delegation EDU networks have interesting properties for the black hats.

Early players Demonstrate the ability to self-regulate Before the guys up the hill force it down your throat Before a bad thing happens and you are woken up at 2 am Lead by example Break the egg

What you can do Deploy in your own domain www.dnssec.net contains a myriad of information resources. Ask your registry and your registrar? Educause, ARIN, Verisign, CC-TLD registries,.gov etc. Ask your OS and network equipment and application vendors Microsoft, Cisco, Firewalls vendors, etc

This Week Get involved in an Internet2 pilot Charles Yun, Internet2 Security Program Director, organizing now Talk to him this week Get to our workshop http://dnssec-nm.secret-wg.org Talk to your colleagues for bilateral pilots Talk to us.

Next Week Deploying locally provides immediate security benefits Sign your own zone and configure your keys

Mitigate by Deploying SSL? Claim: SSL is not the magic bullet (Neither is DNSSEC) Problem: Users are offered a choice Far too often Users are annoyed Implementation and use make SSL vulnerable Not the technology

Confused?