The Future of DNS. Johan Ihrén Netnod. October 15, 2015. http://www.netnod.se/



Similar documents
DNSSEC Applying cryptography to the Domain Name System

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

PowerDNS Introduction

ANATOMY OF A DDoS ATTACK AGAINST THE DNS INFRASTRUCTURE

page 1 DNS Rate Limiting W. Matthijs Mekking matthijs@nlnetlabs.nl 28 Feb 2013 Stichting NLnet Labs

NET0183 Networks and Communications

A Survey of cctld DNS Vulnerabilities. ITU cctld Workshop March 3, 2003

Network Infrastructure Under Siege

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE

DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS

DOMAIN NAME SECURITY EXTENSIONS

The story of dnsdist - or - Do we need a DNS Delivery Controller?

Harness Your Internet Activity!

Deploying IP Anycast. Core DNS Services for University of Minnesota Introduction and General discussion

DNS Risks, DNSSEC. Olaf M. Kolkman and Allison Mankin. and 8 Feb 2006 Stichting NLnet Labs

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)

DNSSEC and DNS Proxying

USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION

Computer Networks: Domain Name System

DNSSEC Deployment a case study

All about the PowerDNS nameserver and how you can use it.

Defending your DNS in a post-kaminsky world. Paul Wouters <paul@xelerance.com>

DNSSEC in your workflow

Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011

The story of dnsdist - or - Do we need a DNS Delivery Controller?

Building Nameserver Clusters with Free Software

F-Root's DNSSEC Signing Plans. Keith Mitchell Internet Systems Consortium DNS-OARC NANOG48, Austin, 24 th Feb 2010

The Survey Report on DNS Cache & Recursive Service in China Mainland

Products, Features & Services

Domain Name System (DNS) Fundamentals

IPV6 SERVICES DEPLOYMENT

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment

A versatile platform for DNS metrics with its application to IPv6

F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution

How To Plan For Cloud Computing

DNSSEC for Everybody: A Beginner s Guide

High-Performance DNS Services in BIG-IP Version 11

Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN)

Akamai CDN, IPv6 and DNS security. Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013

How To Use The Domain Name Server (Dns)

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

The secret life of a DNS query. Igor Sviridov <sia@nest.org>

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: Mob.:

Unbound a caching, validating DNSSEC resolver. Do you trust your name server? Configuration. Unbound as a DNS cache (SEC-less)

Domain Name System (DNS) RFC 1034 RFC

PowerDNS dnsdist. NLUUG Najaarsconferentie Presentation is on:

DNS at NLnet Labs. Matthijs Mekking

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002

A Technical Overview of.tel. Jim Reid

How To Set Up A Net Integration Firewall

Securing DNS Infrastructure Using DNSSEC

DNS security: poisoning, attacks and mitigation

DNS Best Practices. Mike Jager Network Startup Resource Center

DNS ROUND ROBIN HIGH-AVAILABILITY LOAD SHARING

DNS and BIND. David White

NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS

DNS Measurements, Monitoring & Quality Control

CENSURFRIDNS a.k.a. UNCENSOREDDNS. Thomas Steen Rasmussen

The F5 Intelligent DNS Scale Reference Architecture.

Distributed Denial of Service Attacks

How To Understand The Power Of A Content Delivery Network (Cdn)

Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Reducing the Impact of Amplification DDoS Attack

Lecture 2 CS An example of a middleware service: DNS Domain Name System

Networking Domain Name System

STATE OF DNS AVAILABILITY REPORT

Networking Domain Name System

Use Domain Name System and IP Version 6

Application Note. SIP Domain Management

Copyright International Business Machines Corporation All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure

Yahoo Attack. Is DDoS a Real Problem?

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

Part 5 DNS Security. SAST01 An Introduction to Information Security Martin Hell Department of Electrical and Information Technology

How to launch and defend against a DDoS

Presented by Greg Lindsay Technical Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group April 7, 2010

DNS Response Policy Zones Roadmap to Accellerate Adoption

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .

IANA Functions to cctlds Sofia, Bulgaria September 2008

Internet-Praktikum I Lab 3: DNS

DNS. DNS Fundamentals. Goals of this lab: Prerequisites: LXB, NET

Transcription:

The Future of DNS Johan Ihrén Netnod October 15, 2015 Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 1 / 16

The Future of DNS I have no idea about the future of DNS. Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 2 / 16

The Future of DNS Fin. Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 3 / 16

The Future of DNS: Complexity Johan Ihrén Netnod October 15, 2015 Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 4 / 16

Once upon a time DNS was simple In the early days, DNS was not considered a problem (but rather a solution) the only thing needed was the DNS server of course it was both authoritative and recursive everyone behaved nicely (at least regarding DNS) for a long time there was often only one server and only one implementation DNS server Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 5 / 16

Once upon a time DNS was simple In the early days, DNS was not considered a problem (but rather a solution) the only thing needed was the DNS server of course it was both authoritative and recursive everyone behaved nicely (at least regarding DNS) for a long time there was often only one server and only one implementation (BIND4.7.2beta26 if I remember correctly) However, things went south over time: good guys started doing bad things (split-dns, strange forwarding setups, policy-based responses, lots of rope everywhere) bad guys showed up doing bad things (also with DNS) Over time, the One True implementation started cracking at the seams Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 5 / 16

What happens when stuff is attacked (i.e. bad guys doing bad things and good guys doing stupid things)? Defenses get developed. defense may require new protocols and it most certainly requires new software, and not least new architectural solutions And therefore protocols get more complicated (DNSSEC, privacy stuff,...) software get more ////////////// complicated sophisticated (BIND4, BIND8, BIND9, [BIND10]) alternative approaches get traction (NSD, Unbound, PowerDNS, PDNS Recursor, Knot-DNS, Knot-DNS Resolver,...) Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 6 / 16

Separation of Authoritative and Recursive Service For a long time it has been Best Current Practice to separate authoritative and recursive service authoritative service is simple and crucially important to customers, recursive service is difficult, and only important to your own organisation (ignoring ISPs for the moment) auth server recursive server However, most of the evolution happened in the authoritative end because of the primary funding source (TLD registries) This is likely a major reason for recursive service evolving much later than many of the changes in the authoritative service, in spite of recursive service being more complex from the start. Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 7 / 16

Developments in Authoritative Service Anycast DNS is no longer just for root and TLDs it s rather well established also in the enterprise sector in five years I m sure that frightening fraction of mom-pop-and-the-dog zones will be anycast And while global anycast for a few dozen TLD zones is a well-known problem space, trying to do the same thing for hundreds of thousands or even millions of enterprise zones does pose significant technical challenges add stats gathering from a large anycast platform, DDOS defences and load balancing and it starts getting complicated anycast doesn t make monitoring and debugging any easier either Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 8 / 16

Developments in Authoritative Service Anycast DNS is no longer just for root and TLDs it s rather well established also in the enterprise sector in five years I m sure that frightening fraction of mom-pop-and-the-dog zones will be anycast And while global anycast for a few dozen TLD zones is a well-known problem space, trying to do the same thing for hundreds of thousands or even millions of enterprise zones does pose significant technical challenges add stats gathering from a large anycast platform, DDOS defences and load balancing and it starts getting complicated anycast doesn t make monitoring and debugging any easier either distribution master Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 8 / 16

Developments in Authoritative Service Anycast DNS is no longer just for root and TLDs it s rather well established also in the enterprise sector in five years I m sure that frightening fraction of mom-pop-and-the-dog zones will be anycast And while global anycast for a few dozen TLD zones is a well-known problem space, trying to do the same thing for hundreds of thousands or even millions of enterprise zones does pose significant technical challenges add stats gathering from a large anycast platform, DDOS defences and load balancing and it starts getting complicated anycast doesn t make monitoring and debugging any easier either distribution master Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 8 / 16

Load Balancing DNS? Is that really needed? Isn t anycast DNS supposed to solve that problem? Well, anycast is obviously a global form of load balancing, but that may not always be enough especially not when it becomes important to separate attack traffic from real traffic, to be able to provide service for the latter while getting rid of the former So how to do local load balancing for DNS? do it with a h/w load balancer that knows enough about DNS (extra h/w, possibly a new single point of failure) do it directly in the routing infrastructure (avoiding extra h/w) do it in software that knows a lot about DNS (eg. dnsdist) 1st auth server 2nd auth server 3rd auth server 4th auth server dnsdist Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 9 / 16

Developments in Recursive Service For a very long time Recursive Service = BIND9. then Unbound arrived and we finally had a modern recursive-only implementation as an alternative. then nothing happened for a long time again (because all funding was going into the authoritative side). But that is changing, and now we re rapidly getting more implementations of recursive servers to choose from designs like PDNS Recursor and Knot Resolver (which are both quite different from BIND9 and Unbound) are challenging the way to provide recursive service new things like confederations of recursive servers (that share cache and possibly other data) rate limiting also for recursive service (previously a no-no) Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 10 / 16

Implementation Space Once the mirage of only needing the One True Implementation of DNS (BIND) disappeared we started to see other implemenations. Authoritative: NSD YADIFA PowerDNS Knot-DNS And later on the recursive side: Unbound PDNS Recursor Knot-DNS Resolver Initially, they were rather similar, but over time they are becoming more and more different in various ways. The choice is becoming more difficult... and more imporant. Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 11 / 16

Configuration Plane Complexity DNS is migrating from a static service (or set of services) that is configured via a static config file to a dynamic service that is configured in other ways : configuration via database configuration via APIs scriptable configs with CLI access to the nameserver Interestingly, two of the most interesting new recursive servers (PDNS Recursor and Knot-DNS Resolver) provide high-level scripting of configs via built in Lua support. while I m all for Lua, it is clear that being able to script entire new functions that modify the server behaviour... will be used in creative ways also, this breaks the old assumption that server behaviour can be understood from the config file. Now there s a running config and a written config and they can be different Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 12 / 16

Development of APIs As DNS space consolidates and fewer providers provide service for vast numbers of zones (athoritative service) or vast numbers of users (recursive service) but always with vast numbers of servers, the configuration file disappears. one of the new requirements on DNS service is becoming API access What is that? Well, there are provisioning APIs (adding and removing zones, modifying content of zones, etc) stats APIs (returning statistics and sometimes pretty graphics) management APIs (managing servers, modifying policies, etc) With the APIs follow new needs for authentication and authorization models. And later perhaps standardization work. Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 13 / 16

DNSSEC Complexity DNSSEC is no longer a novelty, it s in wide use and millions of zones are signed (in.se about 40% of the delegations are signed and there are other TLDs with even higher DNSSEC adoption). However, just because many zones are signed (i.e. someone figured out how to sign the zone and perhaps even do KSK rollovers) doesn t mean there aren t problems. DNSSEC keys are a headache. Keep them in the filesystem and you go mad. Keep them in an HSM and... you get to deal with the HSM. HSMs can break. HSMs have a different set of vulnerabilities than DNS. At some point the HSMs need replacement (i.e. an HSM rollover ). regardless of whether HSMs are used or not, at some point DNSSEC algorithm rollovers will be needed. Those make KSK rollovers seems trivial by comparision. Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 14 / 16

Policy Knobs and the Resulting Complexity Another major change in DNS service is the increasing breakage of the assumption that the contents of the zone defines the answer that the stub resolver (i.e. the end user) should get. There are an increasing amount of policy knobs in the authoritative space: geography-based responses, multiple levels of split-dns (now also with DNSSEC), etc And even more in the recursive area: RPZ (response-policy-zones) all sorts of local overrides that modify the response received from the authoritative servers loadable modules and scripting support specifically designed for reponse modification An interesting sub-topic here is the future clash between DNSSEC (which is designed to detect in-flight modifications to responses) and the percieved need for recursive tweaks that do just that... Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 15 / 16

Some Predictions for the Future 1 The drivers for further DNS evolution remain DNS service and routing is becoming more and more mixed up due to prevalent use of anycast, both for authoritative and for recursive service hence DNS will continue to become an ever more complex service with increasing complexity more and more of the hobbyist level DNS service will be edged out 2 DNS is becoming a more professionalised service with a smaller number of professional providers however, fewer providers implies ever more zones per provider (and the zone count is not going down) which by itself adds complexity 3 DNS consulting will remain a good field of work Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, johani@netnod.se 16 / 16