F-Root's DNSSEC Signing Plans. Keith Mitchell Internet Systems Consortium DNS-OARC NANOG48, Austin, 24 th Feb 2010



Similar documents
IANA Functions to cctlds Sofia, Bulgaria September 2008

DNS security: poisoning, attacks and mitigation

Overview of DNSSEC deployment worldwide

Root Zone KSK: The Road Ahead. Edward Lewis DNS-OARC & RIPE DNSWG May 2015 edward.lewis@icann.org

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

JPNIC Public Forum. Paul Vixie. Chairman, Internet Software Consortium. January 21, 2003

Computer Networks: Domain Name System

DNS Root NameServers

Chapter 25 Domain Name System Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

DOMAIN NAME SECURITY EXTENSIONS

Pre Delegation Testing (PDT) Frequently Asked Questions (FAQ)

Verisign/ICANN Proposal in Response to NTIA Request

DNS and BIND. David White

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE

Defending your DNS in a post-kaminsky world. Paul Wouters <paul@xelerance.com>

Internet-Praktikum I Lab 3: DNS

Use Domain Name System and IP Version 6

DNS Security: New Threats, Immediate Responses, Long Term Outlook Infoblox Inc. All Rights Reserved.

NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS

Building Nameserver Clusters with Free Software

DNSSec Operation Manual for the.cz and e164.arpa Registers

dnsperf DNS Performance Tool Manual

Secure Domain Name System (DNS) Deployment Guide

DNSwitness: A Generic Platform For DNS-based Measurements

A Best Practices Architecture for DNSSEC

FAQ (Frequently Asked Questions)

Domain Name System Security (DNSSEC)

Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN)

DNS Risks, DNSSEC. Olaf M. Kolkman and Allison Mankin. and 8 Feb 2006 Stichting NLnet Labs

SAC 049 SSAC Report on DNS Zone Risk Assessment and Management

DNSSEC Practice Statement (DPS)

The IANA Functions. An Introduction to the Internet Assigned Numbers Authority (IANA) Functions

IETF DPRIVE WG: Encrypting DNS

Unbound a caching, validating DNSSEC resolver. Do you trust your name server? Configuration. Unbound as a DNS cache (SEC-less)

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April Raed Al-Fayez SaudiNIC CITC rfayez@citc.gov.sa, DNS & IPv6.

DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In)

The Future of DNS. Johan Ihrén Netnod. October 15,

Public-Root Name Server Operational Requirements

USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment

DNS at NLnet Labs. Matthijs Mekking

IPV6 SERVICES DEPLOYMENT

Secure Domain Name System (DNS) Deployment Guide

Configuring DNS. Finding Feature Information

IPv6 and DNS. Secure64

Consultation on Root Zone KSK Rollover

IPv6 support in the DNS

State of the Cloud DNS Report

DNS Appliance Architecture: Domain Name System Best Practices

GDS Resource Record: Generalization of the Delegation Signer Model

The Internet Ecosystem and ICANN!! Steve Stanford University, Center for Information and Society! 29 April 2013!

The secret life of a DNS query. Igor Sviridov <sia@nest.org>

Securing DNS Infrastructure Using DNSSEC

Harness Your Internet Activity!

Acano solution. Acano Solution Installation Guide. Acano. January B

DNS Queries And IPv6 Root Servers

An Introduction to the Domain Name System

Recommendations for dealing with fragmentation in DNS(SEC)

DNSSEC - SECURE DNS FOR GOVERNMENT. Whitepaper

F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution

DNSSEC Deployment a case study

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements

Domain Name System (DNS) RFC 1034 RFC

Registry Update. John Dickinson. Nominet UK

Large-scale DNS and DNSSEC data sets for network security research

Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435

A versatile platform for DNS metrics with its application to IPv6

Response Policy Zones for the Domain Name System (DNS RPZ) By Paul Vixie, ISC (et.al.) 2010 World Tour

A Plan for the Continued Development of the DNS Statistics Collector

Transcription:

F-Root's DNSSEC Signing Plans Keith Mitchell Internet Systems Consortium DNS-OARC NANOG48, Austin, 24 th Feb 2010

What is ISC? Internet Systems Consortium, Inc. Headquartered in Redwood City, California 501(c)(3) Nonprofit Corporation Mission: To develop and maintain production quality Open Source software, such as BIND, DHCP & AFTR Enhance the stability of the global DNS through reliable F-root nameserver operations, and providing DNS-OARC secretariat Further protocol development efforts, particularly in the areas of DNS evolution and facilitating the transition to IPv6.

Background DNSSEC has been around for many years Allows for cryptographic verification that DNS records are authentic Its time has finally come: Standards and implementations are now mature Kaminsky etc vulnerabilities Many TLDs now signed or signing soon: e.g..org,.gov,.se,.pt,.br

Background DNSSEC is based upon a hierarchy of trust anchors The apex of these is the root Signing the root is necessary for full deployment Will allow DNSSEC-aware clients to follow a completely signed and verified delegation path ICANN finally agreed to have this happen in 2010

Background ICANN and VeriSign, with support from the U.S. Department of Commerce. have come up with the root signing plan and time-line, available at: http://www.root-dnssec.org/ The 12 operators of the 13 root server instances will be implementing this plan ISC is involved both as F-root operator and supplier of BIND software to several others

F-root Plans There are over 50 anycast instances of F-root globally, each with 2 servers: https://www.isc.org/community/f-root

F-root Deployment Plan We will be upgrading all our F-root servers to BIND version 9.6.2 in support of a signed root during March 3-hour window between 21:00 and midnight UTC on 14 th April to switch them all to DURZ Data gathering and submission to DNS-OARC during both our transition and all the other root DURZ transition slots

Side-Effects & Testing The (DURZ) Deliberately Unvalidatable Root Zone ) provides opportunity for testing during the transition phase Network elements non-transparent to EDNS0 or large MTU UDP 53 may degrade DNS queries Testing tool provided by OARC at: https://www.dns-oarc.net/oarc/services/replysizetest If you see issues, best to address them on your network ASAP, or there will likely be performance issues when signed root goes live on July 1st

Data Gathering During the transition, F and all but one other root operator will be gathering data to monitor for possible issues This will be uploaded and shared via: DNS-OARC (http://www.dns-oarc.net) Various tools will be used to capture both longterm trends, and short-term snapshots during changes

What About DLV? ISC's DNSSEC-Lookaside Validation service: https://www.isc.org/solutions/dlv was conceived as a transition tool to connect trust-anchor islands until the root downwards is signed We will continue to operate it as long as there are islands that need it, but will be very happy when the need goes away!

Summary Full plans/documents available at: http://www.root-dnssec.org/ ISC will be working with other root operators to transition F-root to the DURZ during the week of 12-Apr-10 More info at http://blog.isc.org/ BIND 9.6.2 will be available by end February to support root operators Signed root planned to go live 01-Jul-10 BIND 9.7.0 now available try it if you haven't deployed DNSSEC yet!

BIND Versions ISC recommends and will be using internally a minimum consistent version: BIND 9.6.2, released next week This has support for the SHA-2 DNSSEC algorithm used to sign the root not strictly needed as root servers only serve signed zone as content, not validate it but we want to be able to support a specific version for this Other root operators who use BIND are being encouraged to Beta test this version early

BIND Versions Latest version of BIND is 9.7.0, just released: DNSSEC for Humans It has many features to make deployment of DNSSEC within your network much more userfriendly Strongly recommend this version for your authoritative servers Recommend waiting for patch (available in ~2-4 weeks) for validating resolvers