DNSSEC and Business Case Study

Similar documents
DNSSEC Deployment: Where We Are (and where we need to be) MENOG 10, Dubai 30 April 2012

DNSSEC: Where We Are (and how we get to where we want to be) APNIC 34, Phnom Penh, Cambodia August 2012

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment

NIST Security Improvements. William C. Barker and Scott Rose October 22, 2015 M3AAWG 35 th General Meeting

Next Steps In Accelerating DNSSEC Deployment

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

DNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS

Resilience improving features of MPLS, IPv6 and DNSSEC

Securing DNS Infrastructure Using DNSSEC

Cer$ficates- as- an- Insurance (CaaI): Incen$vizing Accountability in SSL/TLS

SSL and Browsers: The Pillars of Broken Security

Security. Guevara Noubir Network Security Northeastern University

Security in the Network Infrastructure - DNS, DDoS,, etc.

DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In)

Securing End-to-End Internet communications using DANE protocol

DNS Risks, DNSSEC. Olaf M. Kolkman and Allison Mankin. and 8 Feb 2006 Stichting NLnet Labs

NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS

DANE Secured Demonstration. Wes Hardaker Parsons

Software Defined Perimeter

A Study of What Really Breaks SSL HITB Amsterdam 2011

AMSAC Open Mee*ng, Internet2 Member Mee*ng 10/4/2011 4:30PM 306A

The Security Framework 4.1 Programming and Design

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

Guidance for Preparing Domain Name Orders, Seizures & Takedowns

SAC075: SSAC Comments to ITU-D on Establishing New Certification Authorities

Domain Name System Security

Security Protocols: SSH. Michael E. Locasto University of Calgary

Privileged Administra0on Best Prac0ces :: September 1, 2015

Introduction to the DANE Protocol

ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB

DDOS Mi'ga'on in RedIRIS. SIG- ISM. Vienna

Strengthening our Ecosystem through Stakeholder Collaboration. Jia-Rong Low, Sr Director, Asia 20 August 2015

Number of relevant issues

Domain Name Industry. Comparing ZA with the rest

DNSSEC Explained. Marrakech, Morocco June 28, 2006

Protect Yourself in the Cloud Age

CS615 - Aspects of System Administration

DomainWire. Edition 11 Q Council of European National Top level Domain Registries -

Is Your SSL Website and Mobile App Really Secure?

Domain Name Control Considerations

Intro Fun. S#ck- figure strip humor sourced and courtesy of h8p://xkcd.com and is provided for informa#ve use only.

DNSSEC Policy Statement Version Introduction Overview Document Name and Identification Community and Applicability

Migrating to.bank A step-by-step roadmap for migrating to.bank

DNSSEC Briefing for GAC and ccnso

Before the National Telecommunications and Information Administration DEPARTMENT OF COMMERCE Washington, D.C

Trends in Asia Internet as seen from Hong Kong

NCSC conference, january 23, 2013 Marco Davids Technical Advisor. DANE, the next big thing (after DNSSEC)

ICANN: achievements and challenges of a multi-stakeholder, bottom up, transparent model

Deploying DNSSEC: From End-Customer To Content

Broadening Iden-ty & Access Management: InCommon Federa-on

BPO. Accerela*ng Revenue Enhancements Through Sales Support Services

On and off premises technologies Which is best for you?

Computer Networks: Domain Name System

Public Key Infrastructure (PKI)

The Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases

Alternatives and Enhancements to CAs for a Secure Web

Internet Structure and Organization

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Before the. Committee on Energy and Commerce Subcommittee on Communications and Technology United States House of Representatives

Authenticating and policing the internet for consumer confidence and security

CSA SDP Working Group

Kick starting science...

Internet Standards. Sam Silberman, Constant Contact

DNSSEC in stats. GC-SEC Global Cyber Security Center. Andrea Rigoni. CENTR Bruxelles, 7th October Global Cyber Security Center Director General

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

An Econocom Group company. Your partner in the transi4on towards Mobile IT

2008 DNS Cache Poisoning Vulnerability Cairo, Egypt November 2008

Server Certificates based on DNSSEC

DNS and BIND. David White

DNS Security FAQ for Registrants

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

A Step-by-Step guide for implementing DANE with a Proof of Concept

ANATOMY OF A DDoS ATTACK AGAINST THE DNS INFRASTRUCTURE

The DOMAIN NAME INDUSTRY BRIEF VOLUME 8 - ISSUE 3 - AUGUST 2011

GlobalSign Enterprise Solutions

THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE 2 AUGUST 2014

JP Morgan Chase Trusted Registry - Review

Legacy Archiving How many lights do you leave on? September 14 th, 2015

ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt

Internet Banking Attacks. Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic)

NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314

DNSSEC Applying cryptography to the Domain Name System

DNS Changer Remediation Study

Cloud Risks and Opportunities

One year of DANE Tales and Lessons Learned. sys4.de

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)

Current Counter-measures and Responses by the Domain Name System Community

Telephone Related Queries (TeRQ) IETF 85 (Atlanta)

Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011

Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves

How to sync Office 365 with Gmail

DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces

Department of Defense PKI Use Case/Experiences

How To Use The Domain Name Server (Dns)

Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs

DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April Raed Al-Fayez SaudiNIC CITC rfayez@citc.gov.sa, DNS & IPv6.

Enterprise Public Key Infrastructure (EPKI) Manager. Version 3.5

Main Research Gaps in Cyber Security

Transcription:

The Business Case for DNSSEC

DNS Basics DNS converts names (www.bot.tz) to numbers (208.112.30.18)..to iden=fy services such as www and e- mail..that iden=fy and link customers to business and visa versa

+1-202- 709-5262 VoIP US- NSTIC effort DNS is a part of all IT ecosystems lamb@xtcn.com OECS ID effort Smart Electrical Grid mydomainname.com

Where DNSSEC fits in..but CPU and bandwidth advances make legacy DNS vulnerable to MITM akacks DNS Security Extensions (DNSSEC) introduces digital signatures into DNS to cryptographically protect contents With DNSSEC fully deployed a business can be sure a customer gets un- modified data (and visa versa)

The Bad: DNSChanger - Biggest Cybercriminal Takedown in History 4M machines, 100 countries, $14M Nov 2011 h\p://krebsonsecurity.com/2011/11/malware- click- fraud- kingpins- arrested- in- estonia/ End- 2- end DNSSEC valida_on would have avoided the problems

The Bad: Brazilian ISP fall vic_m to a series of DNS a\acks 7 Nov 2011 h\p://www.securelist.com/en/blog/208193214/massive_dns_poisoning_a\acks_in_brazil End- 2- end DNSSEC valida_on would have avoided the problems

The Bad: Other DNS hijacks* 25 Dec 2010 - Russian e- Payment Giant ChronoPay Hacked 18 Dec 2009 Twi\er Iranian cyber army 13 Aug 2010 - Chinese gmail phishing a\ack 25 Dec 2010 Tunisia DNS Hijack 2009-2012 google.* April 28 2009 Google Puerto Rico sites redirected in DNS a\ack May 9 2009 Morocco temporarily seize Google domain name 9 Sep 2011 - Diginotar cer_ficate compromise for Iranian users 7 Jan 2013 Turktrust / EGO SSL / TLS doesn't tell you if you've been sent to the correct site, it only tells you if the DNS matches the name in the cer_ficate. Unfortunately, majority of Web site cer_ficates rely on DNS to validate iden_ty. DNS is relied on for unexpected things though insecure. *A Brief History of DNS Hijacking - Google h\p://costarica43.icann.org/mee_ngs/sanjose2012/presenta_on- dns- hijackings- marquis- boire- 12mar12- en.pdf

The Business Case for DNSSEC Cyber security is becoming a greater concern to enterprises, government, and end users. DNSSEC is a key tool and differen=ator. DNSSEC is the biggest security upgrade to Internet infrastructure in over 20 years. It is a plasorm for new security applica=ons (for those that see the opportunity). DNSSEC infrastructure deployment has been brisk but requires exper=se. GeVng ahead of the curve is a compe==ve advantage.

DNSSEC interest from governments Sweden, Brazil, Netherlands, Czech Republic and others encourage DNSSEC deployment to varying degrees Mar 2012 - AT&T, CenturyLink (Qwest), Comcast, Cox, Sprint, TimeWarner Cable, and Verizon have pledged to comply and abide by US FCC [1] recommenda=ons that include DNSSEC.. A report by Gartner found 3.6 million Americans gevng redirected to bogus websites in a single year, cos=ng them $3.2 billion., [2]. 2008 US.gov mandate. 85% opera=onal. [3] [1] FCC=Federal Communica_ons Commission=US communica_ons Ministry [2] h\p://securitywatch.pcmag.com/security/295722- isps- agree- to- fcc- rules- on- an_- botnet- dnssec- internet- rou_ng [3] h\p://www.whitehouse.gov/sites/default/files/omb/memoranda/fy2008/m08-23.pdf hkp://fedv6- deployment.antd.nist.gov/snap- all.html

NL DNSSEC TLDs

DNSSEC - Where we are Deployed on 111/318 TLDs (.tz.nl.k.sb.sx.cr.ag.hn.lc.bz.pr.br.gn.nz.ca.cl.de.uk.co.in.ru.рф.de.my مليسيا.asia.tw,.kr.com.net,.post, and soon.cn) Root signed** and audited >86% of domain names could have DNSSEC Required in new gtlds. Basic support by ICANN registrars Growing ISP support* 3 rd party signing solu=ons*** Growing S/W H/W support: NLNetLabs, ISC, Microsoo, PowerDNS, Secure64? openssl, mozilla: early DANE support IETF standard on DNSSEC SSL cer=ficates (RFC6698) Growing support from major players (Apple iphone/ipad, Google 8.8.8.8, ) *COMCAST Internet (18M), TeliaSonera SE, Sprint,Vodafone CZ,Telefonica CZ, T- mobile NL, SurfNet NL, SANYO Informa_on Technology Solu_ons JP, others.. **Int l bo\om- up trust model /w 21 TCRs from: TT, BF, RU, CN, US, SE, NL, UG, BR, Benin, PT, NP, Mauri_us, CZ, CA, JP, UK, NZ *** Par_al list of registrars: h\ps://www.icann.org/en/news/in- focus/dnssec/deployment

But But deployed on < 1% (~2M) of 2 nd level domains. Many have plans. Few have taken the step (e.g., yandex.com, paypal.com*, comcast.com). DNSChanger and other akacks highlight today s need. (e.g end- 2- end DNSSEC valida=on would have avoided the problems) Innova=ve security solu=ons (e.g., DANE) highlight tomorrow s value. * h\p://fedv6- deployment.antd.nist.gov/cgi- bin/generate- com h\p://www.thesecurityprac_ce.com/ the_security_prac_ce/2011/12/all- paypal- domains- are- now- using- dnssec.html h\p://www.nacion.com/2012-03- 15/Tecnologia/Si_os- web- de- bancos- _cos- podran- ser- mas- seguros.aspx

DNSSEC: So what s the problem? Not enough IT departments know about it or are too busy puvng out other fires. When they do look into it they hear old stories of FUD and lack of turnkey solu=ons. Registrars*/DNS providers see no demand leading to chicken- and- egg problems. *but required by new ICANN registrar agreement

What you can do For Companies: Sign your corporate domain names Just turn on valida=on on corporate DNS resolvers For Users: Ask ISP to turn on valida=on on their DNS resolvers For All: Take advantage of ICANN, ISOC and other organiza=ons offering DNSSEC educa=on and training

I smell opportunity!

Game changing Internet Core Infrastructure Upgrade More has happened here today than meets the eye. An infrastructure has been created for a hierarchical security system, which can be purposed and re- purposed in a number of different ways... Vint Cerf (June 2010)

The Bad: SSL Dilu_on of Trust The Good: DNSSEC = Global free PKI CA Cer=ficate roots ~1482 DNSSEC root - 1 Content security Commercial SSL Cer=ficates for Web and e- mail DANE and other yet to be discovered security innova=ons, enhancements, and synergies hkps://www.eff.org/observatory hkp://royal.pingdom.com/2011/01/12/internet- 2010- in- numbers/ Content security Free SSL cer=ficates for Web and e- mail and trust agility Network security IPSECKEY RFC4025 Securing VoIP Domain Names Cross- organiza=onal and trans- na=onal iden=ty and authen=ca=on E- mail security DKIM RFC4871 Login security SSHFP RFC4255

Opportunity: New Security Products Improved Web SSL and cer=ficates for all* Secured e- mail (S/MIME) for all* Validated remote login SSH, IPSEC* Securing VoIP Cross organiza=onal digital iden=ty systems Secured content delivery (e.g. configura=ons, updates, keys) Securing Smart Grid efforts A global PKI Increasing trust in e- commerce A good ref h\p://www.internetsociety.org/deploy360/dnssec/ *IETF standards complete or currently being developed

DNSSEC: Internet infrastructure upgrade to help address today s needs and create tomorrow s opportunity.

Hmm how do I trust it?

ICANN DNSSEC Deployment @Root Mul_- stakeholder, bo\om- up trust model* /w 21 crypto officers from around the world Broadcast Key Ceremonies and public docs SysTrust audited FIPS 140-2 level 4 HSMs Root DPS DNSSEC Prac_ce Statement

ICANN DNSSEC Deployment @Root (and elsewhere) FIPS 140-2 level 4 DCID 6/9

hkp://www.flickr.com/photos/kjd/sets/72157624302045698/ Photos: Kim Davies

Photos: Kim Davies

DNSSEC: Internet infrastructure upgrade to help address today s needs and create tomorrow s opportunity.

The Internet s Phone Book - Domain Name System (DNS+DNSSEC) www.majorbank.se=? 1.2.3.4 Get page Login page Username / Password Account Data DNS Resolver ISP/ HotSpot / Enterprise/ End Node www.majorbank.se = 1.2.3.4 DNS Server webserver www @ 1.2.3.4 Majorbank.se (Registrant) DNS Server.se (Registry) Animated slide DNS Server. (Root)