The Importance of Being an Earnest stub

Size: px
Start display at page:

Download "The Importance of Being an Earnest stub"

Transcription

1 The Importance of Being an Earnest Challenges and solution for the versatile Willem Toorop 13 May 2017 OARC 26 (Madrid)

2 From the ground-up security et n A rc a -o s 98 n 1 d Recursive dns-oarc WebSrv https Every secure connection is preceded by a DNS lookup The does the lookup at the request of the application The recursive does all the heavy lifting 2/45

3 From the ground-up security t ne rc oa 61 s dn 66 = et n A rc a -o s 98 n 1 d Validation Recursive dns-oarc WebSrv https DNSSEC protects against cache poisoning 3/45

4 From the ground-up security dn s-o ar c ne t A? Validation Recursive dns-oarc WebSrv http DNSSEC protects against cache poisoning But not against hijacking ( ie ARP or DHCP hijacking or routing tricks ) THE FIRST/LAST MILE 4/45

5 From the ground-up security A et n c Y r E a SK DS DN s-o Y E SK dn DN t ne KEY DS DNSSEC Aware S DN dns-oarc Recursive WebSrv https DNSSEC protects against cache poisoning But not against hijacking One possibility: DNSSEC on the THE FIRST/LAST MILE 5/45

6 From the ground-up security/privacy dn s- oa rc n et A 19 8 Validation Recursive dns-oarc WebSrv https DNSSEC protects against cache poisoning But not against hijacking Another possibility: DNS over TLS THE FIRST/LAST MILE 6/45

7 From the ground-up security/privacy Applies to DNS over TLS too 19 8 dns-oarc WebSrv 1 19 https https 64 Validation Recursive 0 dn s -o ar c ne t A TLS hijacking? Is That Possible?! Durumeric, Zakir, et al "The Security Impact of HTTPS Interception" Network and Distributed Systems Symposium (NDSS 17) /45

8 From the ground-up security/privacy Strengthen TLS security with the : DANE ( DNS-based Authentication of Named Entities ) Also signalling system for TLS support ( For application without user interaction ) 8/45

9 From the ground-up security/privacy Authenticate DNS-over-TLS with DANE? dn s-oa 64 rc 1 n 91 et 0 A 1 98 Validation Recursive dns-oarc WebSrv https Bootstrap the TLSA lookup with regular DNS? 9/45

10 From the ground-up security/privacy Authenticate DNS-over-TLS with DANE? s dn ap n i et SA TL t ge p t DNSSEC Aware tc _ ne DS S Recursive 53 D pi SKEY _8NSKEY nsa N D t D td ne KEY e g dns-oarc getdnsapi S DN c A dns-oar https Validation Recursive WebSrv Bootstrap the TLSA lookup with regular DNS? Chicken and Egg problem 10/45

11 From the ground-up security/privacy _853_tcpgetdnsapi getdnsapi RRSIGs TLSA DNSKEY DS DNSKEY DS DNSKEY dns-oarc getdnsapi c A dns-oar _853_tcpgetdnsapi TLSA getdnsapi DNSKEY DS DNSKEY DS DNSKEY RRSIGs https Validation Recursive WebSrv Bootstrap the TLSA lookup with regular DNS? Have the TLSA record + the complete DNSSEC authentication chain embedded in a TLS extension 11/45

12 From the ground-up security/privacy _853_tcpgetdnsapi getdnsapi RRSIGs TLSA DNSKEY DS DNSKEY DS DNSKEY dns-oarc getdnsapi _853_tcpgetdnsapi TLSA getdnsapi DNSKEY DS DNSKEY DS DNSKEY RRSIGs https Validation Recursive WebSrv TLS DNSSEC authentication chain Bootstrap the TLSA lookup with regular DNS? extension must be Have the TLSA record + the complete DNSSEC obligatory, to prevent the authentication chain embedded Too in a TLS extension many CA s problem c A dns-oar 12/45

13 From the ground-up security/privacy DNSSEC Availability DNS Privacy status Clear text DNS Private DNS Authenticated Private DNS The is close to the application Inform status of DNSSEC and DNS Privacy 13/45

14 From the ground-up security/privacy Round-robin Validation Recursive Validation Recursive Validation Recursive Validation Recursive Validation Recursive s u n Bo e r u t a e F dns-oarc WebSrv Enhanced privacy by round-robining upstreams 14/45

15 Requirements for the versatile Cross the first DNSSEC mile From the ground up Privacy Strengthened TLS authentication (DANE) Strengthened opportunistic TLS (DANE) Provide status of DNSSEC & DNS over TLS kup DN SSE DN C So v er No TL na S dd re s AP s lo I o s From the ground-up security/privacy 15/45

16 Requirements for the versatile Cross the first DNSSEC mile From the ground up Privacy Strengthened TLS authentication (DANE) Strengthened opportunistic TLS (DANE) Provide status of DNSSEC & DNS over TLS kup DN SSE DN C So v er No TL na S dd re s AP s lo I o s From the ground-up security/privacy 16/45

17 DNSSEC Roadblocks A et n c Y r E a SK DS DN s-o Y E SK dn DN t ne KEY DS recursive S DN dns-oarc WebSrv https Resolving DNSSEC (to cross the first mile) needs DNSSEC Aware recursive 17/45

18 DNSSEC Roadblocks recursive dns-oarc WebSrv https Resolving DNSSEC (to cross the first mile) needs DNSSEC Aware recursive DNSSEC Roadblock Avoidance +Full recursion capability 18/45

19 DNSSEC Roadblocks Does Doesnot notapply applyto tofirst-mile first-mile crossed by DNS-over-TLS crossed by DNS-over-TLS recursive dns-oarc _853_tcpgetdnsapi getdnsapi RRSIGs WebSrv dns-oarc getdnsapi https TLSA DNSKEY DS DNSKEY DS DNSKEY A dns-oarc _853_tcpgetdnsapi TLSA getdnsapi DNSKEY DS DNSKEY DS DNSKEY RRSIGs https Validation Recursive WebSrv Resolving DNSSEC (to cross the first mile) needs DNSSEC Aware recursive DNSSEC Roadblock Avoidance +Full recursion capability 19/45

20 DNSSEC Roadblocks IPv6 Only AAA com A r e t DNS64 twit 2ac1 9b::68e0: 64:ff twittercom NAT64 IPv4 only https https com DNSSEC Roadblock Avoidance IPv6 Address Synthesis Prefix Discovery +DNS64 capability /45

21 DNSSEC Roadblocks IPv6 Only NAT64 twittercom DNS64 com Privacy DNSSEC Roadblock Avoidance IPv6 Address Synthesis Prefix Discovery +DNS64 capability /45

22 DNSSEC Roadblocks Root KSK Rollover DNSSEC validating s must do RFC /45

23 DNSSEC Roadblocks Root In-band In-bandRFC5011 RFC5011tracking tracking KSK with withdnssec DNSSECauth authchain chain TLS TLSextension extension Rollover _853_tcpgetdnsapi getdnsapi RRSIGs TLSA DNSKEY DS DNSKEY DS DNSKEY dns-oarc getdnsapi DNSSEC validating s must do RFC5011 A dns-oarc _853_tcpgetdnsapi TLSA getdnsapi DNSKEY DS DNSKEY DS DNSKEY RRSIGs https Validation Recursive WebSrv 23/45

24 DNSSEC Roadblocks Root KSK Rollover DNSSEC validating s must do RFC5011 A library for DANE has no system config +bootstrap DNSSEC capability: A library for DANE runs with user's privileges 24/45

25 DNSSEC Roadblocks DNSSEC s capability requirements DNSSEC validation DNSSEC Roadblock Avoidance (various) RFC8027 IPv6 Prefix Discovery RFC7050 IPv6 Address Synthesis RFC6147 Automated Trust Anchor Updates RFC5011 Automated Initial Trust Anchor retrieval RFC /45

26 Requirements for the versatile Cross the first DNSSEC mile From the ground up Privacy Strengthened TLS authentication (DANE) Strengthened opportunistic TLS (DANE) Provide status of DNSSEC & DNS over TLS ku p DN SSE DN C So v er No TL na S dd AP re s I s lo o s From the ground-up security/privacy 26/45

27 Requirements for DNS-over-TLS DNS-over-TLS A DNS-over-TLS B Privacy Privacy B TCP fastopen (optional) Connection reuse EDNS0 keepalive EDNS0 padding A /45

28 Requirements for DNS-over-TLS DNS-over-TLS A Connection reuse Pipe-lining of queries C B B A Privacy C (Q/R, Q/R, Q/R) (Q,Q,Q,R,R,R) 28/45

29 Requirements for DNS-over-TLS DNS-over-TLS C B A A DNS-over-TLS B C B B C A C Connection reuse Pipe-lining of queries Process Out-Of-Order-Responses Privacy Privacy A (Q/R, Q/R, Q/R) (Q,Q,Q,R,R,R) (Q1,Q2, R2, R1) 29/45

30 Requirements for DNS-over-TLS 19 8 ne t A Privacy dn s -oar c dns-oarc WebSrv https Strict or Opportunistic usage profiles? 1) Authenticated Private DNS 2) Private DNS 3) Clear text DNS 30/45

31 Requirements for DNS-over-TLS 19 8 ne t A Privacy dn s -oar c dns-oarc WebSrv https Strict or Opportunistic usage profiles? RFC7858 (DNS-over-TLS) RFC7858 (DNS-over-TLS) 1) Authenticated Private DNS defined direct defineddns directspki SPKIauthentication authenticationonly only 2) Private 3) Clear text DNS 31/45

32 Requirements for DNS-over-TLS t ne i ap s n td e g A AA A A/ DNSSEC Resolver c A dns-oar https dns-oarc getdnsapi Privacy WebSrv Regular PKI authentication (bootstrap address lookup with regular DNS(SEC)) 32/45

33 Requirements for DNS-over-TLS A pi Y KE nsa S DN td ge DS DNSSEC Aware Recursive getdnsapi c dns-oar DNSSEC A https Privacy WebSrv Regular PKI authentication Authenticate with DANE (stricter opportunistic with TLSA signalling) 33/45

34 Requirements for DNS-over-TLS _853_tcpgetdnsapi getdnsapi RRSIGs TLSA DNSKEY DS DNSKEY DS DNSKEY dns-oarc getdnsapi DNSSEC c A dns-oar _853_ tcpgetdnsapi TLSA getdnsapi DNSKEY DS DNSKEY DS DNSKEY RRSIGs https Privacy WebSrv Regular PKI authentication Authenticate with DANE DNSSEC authentication chain TLS extension 34/45

35 Requirements for DNS Privacy DNS-over-TLS RFC7858 Reuse / Pipelining / OOOR RFC7766 TCP Fastopen RFC7413 ENDS0 keepalive RFC7828 ENDS0 padding RFC7830 PKI support for authentication (various) DNSSEC support (for address lookup and authentication) (various) 35/45

36 Requirements for the versatile Cross the first DNSSEC mile From the ground up Privacy Strengthened TLS authentication (DANE) Strengthened opportunistic TLS (DANE) Provide status of DNSSEC & DNS over TLS kup DN SSE DN C So v er No TL na S dd re s AP s lo I o s From the ground-up security/privacy 36/45

37 Non address lookups - Application Interface Application getaddrinfo() and getnameinfo() (PI standard extended by RFC3493 for IPv6) 37/45

38 Non address lookups - Application Interface Application getaddrinfo() and getnameinfo() (PI standard extended by RFC3493 for IPv6) Application Talk to upstreams directly with a library: libresolv, libval, ldns, libunbound, libgetdns library Learn upstreams from /etc/resolvconf, NetworkManager, registry 38/45

39 Non address lookups - Application Interface Applications Applicationsusing using getaddrinfo()api API getaddrinfo() and getaddrinfo() getnameinfo() Application will not get the versatile features will not get the versatile features (PI standard extended by RFC3493 (first DNSSEC mile coverage, DNS privacy)for IPv6) (first DNSSEC mile coverage, DNS privacy) Application Talk to upstreams directly with a library: libresolv, libval, ldns, libunbound, libgetdns library Learn upstreams from /etc/resolvconf, NetworkManager, registry 39/45

40 Non address lookups - Application Interface Application Stub server listening on :53 getaddrinfo() and getnameinfo() use system which uses server server Stubby Dnssec-Trigger Dnsmasq 40/45

41 Non address lookups - Application Interface Application server getaddrinfo() and getnameinfo() use systemd-resolved via nsswitch module Stub server listening on :53 systemd-resolvedservice systemd-resolved 41/45

42 Non address lookups - Application Interface App Application library server Talk to server via a library: libresolv, libval, ldns, libunbound, libgetdns systemd-resolvedservice systemd-resolved Stubby :53 Dnssec-Trigger Dnsmasq 42/45

43 Non address lookups - Application Interface App Application library server Talk to server via a library: libresolv, libval, ldns, libunbound, libgetdns systemd-resolvedservice systemd-resolved Stubby :53 Dnssec-Trigger Dnsmasq 43/45

44 Non address lookups - Application Interface App Application Talk to server via the dbus API dbus API server systemd-resolvedservice systemd-resolved 44/45

45 The Importance of Being an Earnest 45/45

DNS Privacy Clients. Stubby, Mobile apps and beyond! dnsprivacy.org

DNS Privacy Clients. Stubby, Mobile apps and beyond! dnsprivacy.org DNS Privacy Clients Stubby, Mobile apps and beyond! dnsprivacy.org Sara Dickinson Allison Mankin Willem Toorop sara@sinodun.com amankin@salesforce.com willem@nlnetlabs.com OARC 27 San Jose, Sep 2017 Overview

More information

How to get a trustworthy DNS Privacy enabling recursive resolver

How to get a trustworthy DNS Privacy enabling recursive resolver How to get a trustworthy DNS an analysis of authentication mechanisms for DNS s Willem Toorop NLnet Labs (presenter) Melinda Shore Fastly Benno Overeinder NLnet Labs DNS over TLS What are the actors, and

More information

getdns API Implementation Update Update Willem Toorop NLnet Labs 14 May 2015 NLnet Labs

getdns API Implementation Update Update Willem Toorop NLnet Labs 14 May 2015 NLnet Labs AP implementation Willem Toorop Update Willem@.nl Willem Toorop ( ) getdns AP mplementation Update 1 / 13 AP is: A DNS AP specification by and for application developers (for resolving) (for applications)

More information

DNS Privacy - Implementation and Deployment Status

DNS Privacy - Implementation and Deployment Status DNS Privacy - Implementation and Deployment Status Sara Dickinson Sinodun Allison Mankin Salesforce IEPG@IETF96 Berlin, July 2016 DNS Privacy - Background RFC 7558 - Pervasive Monitoring is an Attack DPRIVE

More information

Introduction to the DANE Protocol And Updates From IETF 88

Introduction to the DANE Protocol And Updates From IETF 88 Introduction to the DANE Protocol And Updates From IETF 88 Dan York, Senior Content Strategist Internet Society ICANN 48, Buenos Aires, Argentina November 20, 2013 A Quick Overview of DANE www.internetsociety.org

More information

DNSSEC DNS SECURITY EXTENSIONS INTRODUCTION TO DNSSEC FOR SECURING DNS QUERIES AND INFORMATION

DNSSEC DNS SECURITY EXTENSIONS INTRODUCTION TO DNSSEC FOR SECURING DNS QUERIES AND INFORMATION DNSSEC DNS SECURITY EXTENSIONS INTRODUCTION TO DNSSEC FOR SECURING DNS QUERIES AND INFORMATION Peter R. Egli 1/10 Contents 1. Security Problems of DNS 2. Solutions for securing DNS 3. Security with DNSSEC

More information

MAGPI: Advanced Services IPv6, Multicast, DNSSEC

MAGPI: Advanced Services IPv6, Multicast, DNSSEC MAGPI: Advanced Services IPv6, Multicast, DNSSEC Shumon Huque MAGPI GigaPoP & Univ. of Pennsylvania MAGPI Technical Meeting April 19th 2006, Philadelphia, PA 1 Outline A description of advanced services

More information

Introduction to the DANE Protocol

Introduction to the DANE Protocol Introduction to the DANE Protocol ICANN 46 April 10, 2013 Internet Society Deploy360 Programme Providing real-world deployment info for IPv6, DNSSEC and other Internet technologies: Case Studies Tutorials

More information

DNSSEC. Lutz Donnerhacke. db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb dig +dnssec e164.arpa. naptr

DNSSEC. Lutz Donnerhacke. db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb dig +dnssec e164.arpa. naptr DNSSEC Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb dig +dnssec 1.6.5.3.7.5.1.4.6.3.9.4.e164.arpa. naptr 1 A protocol from better times An ancient protocol People were friendly and

More information

Towards Secure Name Resolution on the Internet

Towards Secure Name Resolution on the Internet Towards Secure Name Resolution on the Internet C. Grothoff M. Wachs M. Ermert J. Appelbaum 26.2.2017 The Domain Name System is the Achilles heel of the Web. Tim Berners-Lee Security Goals for Name Systems

More information

DNSSEC KSK-2010 Trust Anchor Signal Analysis

DNSSEC KSK-2010 Trust Anchor Signal Analysis DNSSEC KSK-2010 Trust Anchor Signal Analysis MAPRG @ IETF102 1 Overview Background: DNSSEC KSK rollover and plan Problems with the KSK rollover Case study analysis: difficulty in identifying old Trust

More information

Hoda Rohani Anastasios Poulidis Supervisor: Jeroen Scheerder. System and Network Engineering July 2014

Hoda Rohani Anastasios Poulidis Supervisor: Jeroen Scheerder. System and Network Engineering July 2014 Hoda Rohani Anastasios Poulidis Supervisor: Jeroen Scheerder System and Network Engineering July 2014 DNS Main Components Server Side: Authoritative Servers Resolvers (Recursive Resolvers, cache) Client

More information

the edge (end user devices)

the edge (end user devices) Living on the Edge Greatly needed stub resolver capabilities for applications and systems with the library Willem Toorop 4 February 2018 FOSDEM18 (Bruxelles) photo: Pixabay the edge (end user devices)

More information

6 March 2012

6 March 2012 6 March 2012 richard.lamb@icann.org www.majorbank.se=? 1.2.3.4 Get page Login page Username / Password Account Data DNS Resolver ISP www.majorbank.se = 1.2.3.4 DNS Server webserver www @ 1.2.3.4 Majorbank

More information

DNS Privacy. EDU Tutorial dnsprivacy.org. Sara Dickinson Sinodun

DNS Privacy. EDU Tutorial dnsprivacy.org. Sara Dickinson Sinodun DNS Privacy EDU Tutorial dnsprivacy.org Sara Dickinson Sinodun sara@sinodun.com IETF 99 Prague, July 2017 Overview The problem: Why Internet privacy and DNS Privacy are important (DNS leakage) Recent Progress:

More information

A Look at RFC 8145 Trust Anchor Signaling for the 2017 KSK Rollover

A Look at RFC 8145 Trust Anchor Signaling for the 2017 KSK Rollover A Look at RFC 8145 Trust Anchor Signaling for the 2017 KSK Rollover Duane Wessels DNS-OARC 26 San Jose, CA September 29, 2017 Background 2 2017 Root Zone KSK Rollover October 11, 2017! Root zone DNSKEY

More information

DNS Sessions. - where next? OARC 27 San Jose, Sep Sep 2017, San Jose. DNS OARC 27

DNS Sessions. - where next? OARC 27 San Jose, Sep Sep 2017, San Jose. DNS OARC 27 DNS Sessions - where next? Sara Dickinson sara@sinodun.com OARC 27 San Jose, Sep 2017 1 Overview A tour of the evolution of doing DNS over session based protocols Recent use cases for DNS Sessions Trade-offs

More information

Updates: 7858 (if approved) Intended status: Standards Track Expires: March 15, 2018 McAfee September 11, 2017

Updates: 7858 (if approved) Intended status: Standards Track Expires: March 15, 2018 McAfee September 11, 2017 dprive Internet-Draft Updates: 7858 (if approved) Intended status: Standards Track Expires: March 15, 2018 S. Dickinson Sinodun D. Gillmor ACLU T. Reddy McAfee September 11, 2017 Usage and (D)TLS Profiles

More information

Root Zone DNSSEC KSK Rollover

Root Zone DNSSEC KSK Rollover Root Zone DNSSEC KSK Rollover 51 51 KSK Rollover: An Overview ICANN is in the process of performing a Root Zone DNS Security Extensions (DNSSEC) Key Signing Key (KSK) rollover The Root Zone DNSSEC Key

More information

API implementation. Willem Toorop NLnet. Labs. 11 May NLnet. Labs

API implementation. Willem Toorop NLnet. Labs. 11 May NLnet. Labs AP implementation Willem Toorop Willem@.nl Willem Toorop ( ) getdns AP mplementation 1 / 22 AP is: A DNS AP specification by and for application developers (for resolving) (for applications) LABS From

More information

DNSSEC in Switzerland 2 nd DENIC Testbed Meeting

DNSSEC in Switzerland 2 nd DENIC Testbed Meeting DNSSEC in Switzerland 2 nd DENIC Testbed Meeting Frankfurt, 26. January 2010 Samuel Benz samuel.benz@switch.ch About SWITCH The SWITCH foundation operates the national research network since 1987 SWITCH

More information

Rolling the Root KSK. Geoff Huston. APNIC Labs. September 2017

Rolling the Root KSK. Geoff Huston. APNIC Labs. September 2017 Rolling the Root KSK Geoff Huston APNIC Labs September 2017 Will this break the Internet? Why? If we stuff up this trust anchor key roll then resolvers that perform DNSSEC validation will fail to provide

More information

An Overview of DNSSEC. Cesar Diaz! lacnic.net!

An Overview of DNSSEC. Cesar Diaz! lacnic.net! An Overview of DNSSEC Cesar Diaz! cesar@ lacnic.net! 1 DNSSEC??? The DNS Security Extension (DNS SEC) attach special kind of information called criptographic signatures to the queries and response that

More information

DNSSEC Trust tree: (A) ---dnslab.org. (DS keytag: 9247 dig (DNSKEY keytag. ---org. (DS keytag: d

DNSSEC Trust tree:  (A) ---dnslab.org. (DS keytag: 9247 dig (DNSKEY keytag. ---org. (DS keytag: d DNSSEC Trust tree: www.dnslab.org. (A) ---dnslab.org. (DNSKEY keytag: 7308 alg ---dnslab.org. (DNSKEY keytag: 9247 ---dnslab.org. (DS keytag: 9247 dig DNSSEC ---org. (DNSKEY keytag: 24209 a Domain Name

More information

DNSSEC From a protocol bug to a security advantage

DNSSEC From a protocol bug to a security advantage DNSSEC From a protocol bug to a security advantage Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb 1 A protocol from better times An ancient protocol People were friendly and trustworthy

More information

DNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific

DNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific DNS/DNSSEC Workshop In Collaboration with APNIC and HKIRC Hong Kong Champika Wijayatunga Regional Security Engagement Manager Asia Pacific 22-24 January 2018 1 DNSSEC 2 2 DNS: Data Flow Zone administrator

More information

DNS and DNSSEC Management and Monitoring Changes Required During A Transition To DNSSEC. Wes Hardaker

DNS and DNSSEC Management and Monitoring Changes Required During A Transition To DNSSEC. Wes Hardaker DNS and DNSSEC Management and Monitoring Changes Required During A Transition To DNSSEC Wes Hardaker Overview Business Model Changes Relationship Requirements Relationship with

More information

Domain Name System (DNS)

Domain Name System (DNS) Domain Name System (DNS) Computer Networks Lecture 9 http://goo.gl/pze5o8 Domain Name System Naming service used in the Internet Accomplishes mapping of logical ("domain") names to IP addresses (and other

More information

Assessing and Improving the Quality of DNSSEC

Assessing and Improving the Quality of DNSSEC Assessing and Improving the Quality of DNSSEC Deployment Casey Deccio, Ph.D. Sandia National Laboratories AIMS-4 CAIDA, SDSC, San Diego, CA Feb 9, 2012 Sandia is a multiprogram laboratory operated by Sandia

More information

2017 DNSSEC KSK Rollover. Guillermo Cicileo LACNIC March 22, 2017

2017 DNSSEC KSK Rollover. Guillermo Cicileo LACNIC March 22, 2017 2017 DNSSEC KSK Rollover Guillermo Cicileo LACNIC March 22, 2017 Purpose of this Talk 1 2 3 To publicize the new Root Zone DNSSEC KSK Provide status, upcoming events, and contact information Provide helpful

More information

Advanced Caching DNS Server

Advanced Caching DNS Server This chapter explains how to set the Caching DNS parameters for the advanced features of the server. Before you proceed with the tasks in this chapter, see Introduction to the Domain Name System which

More information

The GNU Name System: A Public Key Infrastructure for Social Movements in the Age of Universal Surveillance

The GNU Name System: A Public Key Infrastructure for Social Movements in the Age of Universal Surveillance The GNU Name System: A Public Key Infrastructure for Social Movements in the Age of Universal Surveillance Christian Grothoff The GNUnet Project 28.04.2017 Never doubt your ability to change the world.

More information

DNSSEC All You Need To Know To Get Started

DNSSEC All You Need To Know To Get Started DNSSEC All You Need To Know To Get Started Olaf M. Kolkman RIPE NCC A Semi Technical Introduction Why do we need DNSSEC What does DNSSEC provide How does DNSSEC work Question: www.ripe.net A Reminder:

More information

DNS Mark Kosters Carlos Martínez {ARIN, LACNIC} CTO

DNS Mark Kosters Carlos Martínez {ARIN, LACNIC} CTO DNS Workshop @CaribNOG12 Mark Kosters Carlos Martínez {ARIN, LACNIC} CTO DNS Refresher and Intro to DNS Security Extension (DNSSEC) Outline Introduction DNSSEC mechanisms to establish authenticity and

More information

Impact of security vulnerabilities in timing protocols on Domain Name System (DNS)

Impact of security vulnerabilities in timing protocols on Domain Name System (DNS) November 12 2017 IEPG Open Meeting-IETF100 Impact of security vulnerabilities in timing protocols on Domain Name System (DNS) Aanchal Malhotra 1, Willem Toorop 2, Benno Overeinder 2, Sharon Goldberg 1

More information

2017 DNSSEC KSK Rollover. DSSEC KSK Rollover

2017 DNSSEC KSK Rollover. DSSEC KSK Rollover 2017 DNSSEC KSK Rollover 2017 Edward Lewis DSSEC KSK Rollover APNIC 44 Edward.Lewis@icann.org FIRST TC September 11, 2017 13 September 2017 DNSSEC Signing vs. Validation DNS Security Extensions Digital

More information

DNS Mark Kosters Carlos Martínez ARIN - LACNIC

DNS Mark Kosters Carlos Martínez ARIN - LACNIC DNS Workshop @CaribNOG8 Mark Kosters Carlos Martínez ARIN - LACNIC DNS Refresher and Intro to DNS Security Extension (DNSSEC) Outline Introduction DNSSEC mechanisms to establish authenticity and integrity

More information

DANE Demonstration! Duane Wessels, Verisign! ICANN 49 DNSSEC Workshop! March 26, 2014!

DANE Demonstration! Duane Wessels, Verisign! ICANN 49 DNSSEC Workshop! March 26, 2014! DANE Demonstration! Duane Wessels, Verisign! ICANN 49 DNSSEC Workshop! March 26, 2014! Outline! What is DANE?! The TLSA Record! TLSA Browser Plugin! Generating the TLSA Record! Other uses for DANE! 2!

More information

What's so hard about DNSSEC? Paul Ebersman May 2016 RIPE72 Copenhagen

What's so hard about DNSSEC? Paul Ebersman May 2016 RIPE72 Copenhagen What's so hard about DNSSEC? Paul Ebersman Paul_Ebersman@cable.comcast.com 23-27 May 2016 RIPE72 Copenhagen 1 Why use DNSSEC What does it solve? Helps against cache poisoning Identifies DNS lying Enables

More information

DNSSEC Basics, Risks and Benefits

DNSSEC Basics, Risks and Benefits DNSSEC Basics, Risks and Benefits Olaf M. Kolkman olaf@ripe.net This presentation About DNS and its vulnerabilities DNSSEC status DNSSEC near term future DNS: Data Flow Registry/Registrar Provisioning

More information

12 DNS Security Extensions DNS resolution via recursive nameserver DNS request/response format Simple DNS cache poisoning The Dan Kaminsky DNS

12 DNS Security Extensions DNS resolution via recursive nameserver DNS request/response format Simple DNS cache poisoning The Dan Kaminsky DNS 12 DNS Security Extensions DNS resolution via recursive nameserver DNS request/response format Simple DNS cache poisoning The Dan Kaminsky DNS vulnerability DNS root servers DNSSEC chain of trust DNSSEC

More information

DNSSEC Basics, Risks and Benefits

DNSSEC Basics, Risks and Benefits DNSSEC Basics, Risks and Benefits Olaf M. Kolkman olaf@ripe.net This presentation About DNS and its vulnerabilities DNSSEC status DNSSEC near term future DNS: Data Flow Registry/Registrar Provisioning

More information

Understanding and Deploying DNSSEC. Champika Wijayatunga SANOG29 - Pakistan Jan 2017

Understanding and Deploying DNSSEC. Champika Wijayatunga SANOG29 - Pakistan Jan 2017 Understanding and Deploying DNSSEC Champika Wijayatunga SANOG29 - Pakistan Jan 2017 Agenda 1 2 3 Background Why DNSSEC? How it Works? 4 5 Signatures and Key Rollovers DNSSEC Demo 2 3 Background DNS in

More information

DNSSEC operational experiences and recommendations. Antti Ristimäki, CSC/Funet

DNSSEC operational experiences and recommendations. Antti Ristimäki, CSC/Funet DNSSEC operational experiences and recommendations Antti Ristimäki, CSC/Funet Agenda Funet DNSSEC status A short DNSSEC tutorial Zone signing considerations Private key security Network layer impacts Monitoring

More information

DNSSEC Validators Requirements

DNSSEC Validators Requirements DNSSEC Validators Requirements draft-mglt-dnsop-dnssec-validator-requirements-05 Migault, Lewis, York IETF99 ToC Time Requirements Trust Anchor Requirements Bootstrapping / configuration TA Datastore Interaction

More information

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track. McAfee March 2018

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track. McAfee March 2018 Internet Engineering Task Force (IETF) Request for Comments: 8310 Updates: 7858 Category: Standards Track ISSN: 2070-1721 S. Dickinson Sinodun D. Gillmor ACLU T. Reddy McAfee March 2018 Usage Profiles

More information

Measuring DNSSEC validation deployment with RIPE ATLAS. Willem Toorop (presenting) Nicolas Canceill.

Measuring DNSSEC validation deployment with RIPE ATLAS. Willem Toorop (presenting) Nicolas Canceill. Measuring DNSSEC validation deployment with RPE ATLAS Willem Toorop (presenting) Willem@.nl Nicolas Canceill nicolas.canceill@os3.nl Willem Toorop ( ) 1 / 11 Research scope Research question What is the

More information

Expires: June 16, 2004 VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST December 17, 2003

Expires: June 16, 2004 VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST December 17, 2003 DNS Extensions Internet-Draft Expires: June 16, 2004 R. Arends Telematica Instituut M. Larson VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST December 17, 2003 Protocol Modifications for the DNS

More information

Toward Unspoofable Network Identifiers. CS 585 Fall 2009

Toward Unspoofable Network Identifiers. CS 585 Fall 2009 Toward Unspoofable Network Identifiers CS 585 Fall 2009 The Problem DNS Spoofing Attacks (e.g., Kaminsky) At link (Ethernet) and IP layers, either: Software sets the source address in the packet, or Software

More information

ARIN Support for DNSSEC and RPKI. ION San Diego 11 December 2012 Pete Toscano, ARIN

ARIN Support for DNSSEC and RPKI. ION San Diego 11 December 2012 Pete Toscano, ARIN ARIN Support for DNSSEC and ION San Diego 11 December 2012 Pete Toscano, ARIN 2 DNS and BGP They have been around for a long time. DNS: 1982 BGP: 1989 They are not very secure. Methods for securing them

More information

Protecting Privacy: The Evolution of DNS Security

Protecting Privacy: The Evolution of DNS Security Protecting Privacy: The Evolution of DNS Security Burt Kaliski Senior Vice President and CTO, Verisign NSF Technology Transfer to Practice in Cyber Security Workshop November 4, 2015 Agenda DNS Overview

More information

Root Servers. Root hints file come in many names (db.cache, named.root, named.cache, named.ca) See root-servers.org for more detail

Root Servers. Root hints file come in many names (db.cache, named.root, named.cache, named.ca) See root-servers.org for more detail What is DNS? Systems to convert domain names into ip addresses: For an instance; www.tashicell.com 118.103.136.66 Reverse: 118.103.136.66 www.tashicell.com DNS Hierarchy Root Servers The top of the DNS

More information

Algorithm for DNSSEC Trusted Key Rollover

Algorithm for DNSSEC Trusted Key Rollover Algorithm for DNSSEC Trusted Key Rollover Gilles Guette, Bernard Cousin, and David Fort IRISA, Campus de Beaulieu, 35042 Rennes CEDEX, FRANCE {gilles.guette, bernard.cousin, david.fort}@irisa.fr Abstract.

More information

DNS Security and DNSSEC in the root zone Luzern, Switzerland February 2010

DNS Security and DNSSEC in the root zone Luzern, Switzerland February 2010 DNS Security and DNSSEC in the root zone Luzern, Switzerland February 2010 Kim Davies Manager, Root Zone Services Internet Corporation for Assigned Names & Numbers Recap DNS originally not designed with

More information

DNSSEC for the Root Zone. NZNOG Hamilton, NZ January 2010

DNSSEC for the Root Zone. NZNOG Hamilton, NZ January 2010 DNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN This design is the result of a cooperation between ICANN & VeriSign with support from the U.S. DoC NTIA Design Design Requirements

More information

Let s Encrypt and DANE

Let s Encrypt and DANE Let s Encrypt and DANE CaribNOG 13 Barbados 18 Apr 2017 The Deploy360 Programme The Challenge: The IETF creates protocols based on open standards, but some are not widely known or deployed People seeking

More information

DNSSEC for the Root Zone. IETF 76 Hiroshima November 2009

DNSSEC for the Root Zone. IETF 76 Hiroshima November 2009 DNSSEC for the Root Zone IETF 76 Hiroshima November 2009 Jakob Schlyter Richard Lamb, ICANN Matt Larson, VeriSign 1 This design is the result of a cooperation between ICANN & VeriSign with support from

More information

Research Project 1. Extended Validation using DNSSEC

Research Project 1. Extended Validation using DNSSEC University of Amsterdam System & Network Engineering Research Project 1 Extended Validation using DNSSEC Authors: Danny Groenewegen danny.groenewegen@os3.nl Pieter Lange pieter.lange@os3.nl Coordinators:

More information

DNSSEC Why, how, why now? Olaf Kolkman (NLnet Labs)

DNSSEC Why, how, why now? Olaf Kolkman (NLnet Labs) DNSSEC Why, how, why now? Olaf Kolkman (NLnet Labs) olaf@nlnetlabs.nl Stichting NLnet Labs page 2 Registrars/ Registrants DNS Architecture As friend secondary As ISP Cache server Registry DB primary As

More information

Root Zone DNSSEC KSK Rollover. DSSEC KSK Rollover

Root Zone DNSSEC KSK Rollover. DSSEC KSK Rollover Root Zone DNSSEC KSK Rollover 2017 Edward Lewis DSSEC KSK Rollover ENOG 15 Edward.Lewis@icann.org FIRST TC September 11, 2017 5 June 2018 The Basics This talk is related to the Domain Name System, in particular,

More information

3. The DNSSEC Primer. Data Integrity (hashes) Authenticated Denial of Existence (NSEC,

3. The DNSSEC Primer. Data Integrity (hashes) Authenticated Denial of Existence (NSEC, 3. The DNSSEC Primer Authentication (keys, signatures) Data Integrity (hashes) Chain of Trust (root zone, when signed) Authenticated Denial of Existence (NSEC, NSEC3) DNS Authoritative ROOT SERVERS TLD

More information

Expires: November 15, 2004 VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST May 17, 2004

Expires: November 15, 2004 VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST May 17, 2004 DNS Extensions Internet-Draft Expires: November 15, 2004 R. Arends Telematica Instituut M. Larson VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST May 17, 2004 Protocol Modifications for the DNS

More information

Implementing DNSSEC with DynDNS and GoDaddy

Implementing DNSSEC with DynDNS and GoDaddy Implementing DNSSEC with DynDNS and GoDaddy Lawrence E. Hughes Sixscape Communications 27 December 2017 DNSSEC is an IETF standard for adding security to the DNS system, by digitally signing every resource

More information

A new stub resolver. Willem Toorop.

A new stub resolver. Willem Toorop. A new stub resolver Willem Toorop willem@nlnetlabs.nl API is: A DNS API specification by and for application developers First implementation by LABS From Verisign: (for resolving) (for application) and

More information

Lab 6 Implementing DNSSEC

Lab 6 Implementing DNSSEC Lab 6 Implementing DNSSEC Objective: Deploy DNSSEC-signed zones. Background DNSSEC (or DNS Security Extensions) provide security to the zone files. Note: In the steps below, we are using myzone.net - our

More information

DENIC DNSSEC Testbed Software support for DNSSEC Ralf Weber

DENIC DNSSEC Testbed Software support for DNSSEC Ralf Weber DENIC DNSSEC Testbed Software support for DNSSEC Ralf Weber (ralf.weber@nominum.com) Who is Nominum? Mission Product Leadership Industry Expertise Deliver the Trusted Internet Experience Strategic Partners:

More information

ICANN DNSSEC Workshop Comcast s Operational Experiences 14 March 2012

ICANN DNSSEC Workshop Comcast s Operational Experiences 14 March 2012 ICANN DNSSEC Workshop Comcast s Operational Experiences 14 March 2012 NATIONAL ENGINEERING & TECHNICAL OPERATIONS DNSSEC Deployment Status We began working on this in 2008 (see Bmeline) We completed our

More information

The ISP Column A column on various things Internet. DNSSEC and DNS over TLS. August 2018 Geoff Huston

The ISP Column A column on various things Internet. DNSSEC and DNS over TLS. August 2018 Geoff Huston The ISP Column A column on various things Internet August 2018 Geoff Huston DNSSEC and DNS over TLS The APNIC Blog has recently published a very interesting article by Willem Toorop of NLnet Labs on the

More information

DNSSEC for the Root Zone. ICANN 37 Nairobi March 2010

DNSSEC for the Root Zone. ICANN 37 Nairobi March 2010 DNSSEC for the Root Zone ICANN 37 Nairobi March 2010 Kim Davies, ICANN This design is the result of a cooperation between ICANN & VeriSign with support from the U.S. DoC NTIA Design Design Requirements

More information

Network Working Group

Network Working Group Network Working Group R. Arends Request for Comments: 4035 Telematica Instituut Obsoletes: 2535, 3008, 3090, 3445, 3655, 3658, R. Austein 3755, 3757, 3845 ISC Updates: 1034, 1035, 2136, 2181, 2308, 3225,

More information

Internet Engineering Task Force. Updates: 6698 (if approved) Intended status: Standards Track Expires: January 06, 2016 Two Sigma July 05, 2015

Internet Engineering Task Force. Updates: 6698 (if approved) Intended status: Standards Track Expires: January 06, 2016 Two Sigma July 05, 2015 Internet Engineering Task Force Internet-Draft Updates: 6698 (if approved) Intended status: Standards Track Expires: January 06, 2016 S. Huque Verisign Labs D. James Verisign, Inc. V. Dukhovni Two Sigma

More information

2017 Root DNSSEC KSK Rollover. NANOG 70 June 6, 2017

2017 Root DNSSEC KSK Rollover. NANOG 70 June 6, 2017 2017 Root DNSSEC KSK Rollover Punky.Duero@iana.org NANOG 70 June 6, 2017 What is the Root Zone DNSSEC KSK? KSK The Root Zone DNSSEC Key Signing Key KSK is the top most cryptographic key in the DNSSEC hierarchy

More information

Evaluation and consideration of multiple responses. Kazunori Fujiwara, JPRS OARC 28

Evaluation and consideration of multiple responses. Kazunori Fujiwara, JPRS OARC 28 Evaluation and consideration of multiple responses Kazunori Fujiwara, JPRS fujiwara@jprs.co.jp OARC 28 Past discussion Background DNS is query response based protocol Each query contains one QNAME / QTYPE

More information

BIND-USERS and Other Debugging Experiences. Mark Andrews Internet Systems Consortium

BIND-USERS and Other Debugging Experiences. Mark Andrews Internet Systems Consortium BIND-USERS and Other Debugging Experiences Mark Andrews Internet Systems Consortium Mark_Andrews@isc.org http://isc.org BIND-USERS and Other Debugging Experiences We will look at some typical debugging

More information

GDS Resource Record: Generalization of the Delegation Signer Model

GDS Resource Record: Generalization of the Delegation Signer Model GDS Resource Record: Generalization of the Delegation Signer Model Gilles Guette, Bernard Cousin, and David Fort IRISA, Campus de Beaulieu, 35042 Rennes CEDEX, France {gilles.guette, bernard.cousin, david.fort}@irisa.fr

More information

Measuring the effects of DNSSEC deployment on query load

Measuring the effects of DNSSEC deployment on query load Measuring the effects of DNSSEC deployment on query load Jelte Jansen NLnet Labs NLnet Labs document 26-2 May 1, 26 Abstract Ripe NCC recently started signing the zones on their DNS servers. This document

More information

Internet Engineering Task Force (IETF) Request for Comments: Category: Best Current Practice. Parsons November 2016

Internet Engineering Task Force (IETF) Request for Comments: Category: Best Current Practice. Parsons November 2016 Internet Engineering Task Force (IETF) Request for Comments: 8027 BCP: 207 Category: Best Current Practice ISSN: 2070-1721 W. Hardaker USC/ISI O. Gudmundsson CloudFlare S. Krishnaswamy Parsons November

More information

IP Addressing: DNS Configuration Guide

IP Addressing: DNS Configuration Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Domain Name System Security

Domain Name System Security Slide title 70 pt APITALS Domain Name System Security e subtitle um 30 pt Bengt Sahlin Ericsson Research NomadicLab Bengt.Sahlin@ericsson.com Objectives Provide DNS basics, essential for understanding

More information

DNSSEC Policy and Practice Statement. Anne-Marie Eklund Löwinder Quality and Security Manager

DNSSEC Policy and Practice Statement. Anne-Marie Eklund Löwinder Quality and Security Manager DNSSEC Policy and Practice Statement Anne-Marie Eklund Löwinder Quality and Security Manager amel@iis.se What is a DNSSEC Policy and Practice Statement (DPS)? A document that contains the DNSSEC Policy

More information

Less is More Cipher-Suite Negotiation for DNSSEC

Less is More Cipher-Suite Negotiation for DNSSEC Less is More Cipher-Suite Negotiation for DNSSEC Amir Herzberg Bar-Ilan University Haya Shulman Technische Universität Darmstadt Bruno Crispo Trento University Domain Name System (DNS) Lookup services

More information

How can we provide the devices with valid certificates?

How can we provide the devices with valid certificates? How can we provide the devices with valid certificates? What kind of TLS server certificate should we adopt for the devices? https://github.com/httpslocal/usecases/blob/master/certificates.md A) Public

More information

Where s my DNS? Sara Dickinson IDS 2. Where s my DNS?

Where s my DNS? Sara Dickinson IDS 2. Where s my DNS? Sara Dickinson sara@sinodun.com Stub to recursive The DNS protocol is evolving DoT: DNS-over-TLS DoH: DNS-over-HTTPS (WIP) DoT RFC7858 standard May 2016 Implemented to-date in standard open source DNS

More information

DNS and cctld Management. Save Vocea and Champika Wijayatunga Apia Samoa July 2015

DNS and cctld Management. Save Vocea and Champika Wijayatunga Apia Samoa July 2015 DNS and cctld Management Save Vocea and Champika Wijayatunga Apia Samoa 14-15 July 2015 Agenda 1 2 3 Intro to ICANN DNS Concepts Root Server Operation 4 5 6 Managing Zones cctld Management Security, Stability

More information

DNSSEC Workshop. Dan York, Internet Society ICANN 54 October 2015

DNSSEC Workshop. Dan York, Internet Society ICANN 54 October 2015 DNSSEC Workshop Dan York, Internet Society ICANN 54 October 2015 Remote Participation Slides and audio streams at: https://meetings.icann.org/en/dublin54/ schedule/wed-dnssec Live video stream via YouTube

More information

Recommendations for DNS Privacy Service Operators

Recommendations for DNS Privacy Service Operators Recommendations for DNS Privacy Service Operators Presenter: Sara Dickinson sara@sinodun.com Co-authors: Roland van Rijswijk-Deij, Allison Mankin, Benno Overeinder 1 Brief history of DNS Privacy Date 2

More information

In the Domain Name System s language, rcode 0 stands for: no error condition.

In the Domain Name System s language, rcode 0 stands for: no error condition. 12/2017 SIMPLE, FAST, RESILIENT In the Domain Name System s language, rcode 0 stands for: no error condition. If a DNS server answers a query with this result code, the service is running properly. This

More information

SecSpider: Distributed DNSSEC Monitoring and Key Learning

SecSpider: Distributed DNSSEC Monitoring and Key Learning SecSpider: Distributed DNSSEC Monitoring and Key Learning Eric Osterweil UCLA Joint work with Dan Massey and Lixia Zhang Colorado State University & UCLA 1 Who is Deploying DNSSEC? Monitoring Started From

More information

Shifting Sands. PLNOG March Andrzej Wolski Training Department

Shifting Sands. PLNOG March Andrzej Wolski Training Department Shifting Sands PLNOG March 2014 Andrzej Wolski Training Department RIPE NCC 2 Began operating in 1992 Not-for-profit membership organisation 10,000 members (Local Internet Registries) Neutral, Impartial,

More information

Securing Domain Name Resolution with DNSSEC

Securing Domain Name Resolution with DNSSEC White Paper Securing Domain Name Resolution with DNSSEC diamondip.com by Timothy Rooney Product management director BT Diamond IP Resolution with DNSSEC Introduction By Tim Rooney, Director, Product Management

More information

DNSSEC for the Root Zone. IETF 76 8 November 2009

DNSSEC for the Root Zone. IETF 76 8 November 2009 DNSSEC for the Root Zone IEPG @ IETF 76 8 November 2009 Richard Lamb, ICANN Joe Abley, ICANN Matt Larson, VeriSign 1 This design is the result of a cooperation between ICANN & VeriSign with support from

More information

Web Security. Mahalingam Ramkumar

Web Security. Mahalingam Ramkumar Web Security Mahalingam Ramkumar Web Security Abusing cookies Phishing, Spreading misinformation You are not seeing what you think you are! HREFs, Ill-constructed strings in HREFs Dynamic HTML, Scripting

More information

Innovative uses as result of DNSSEC

Innovative uses as result of DNSSEC Innovative uses as result of DNSSEC AKA: Some happenings in the DANE* WG in the IETF. * DNS-based Authentication of Named Entities Some background... When you connect to https://www.example.com you use

More information

Scott Rose, NIST Winter JointTechs Meeting Jan 30, 2011 Clemson University

Scott Rose, NIST Winter JointTechs Meeting Jan 30, 2011 Clemson University Scott Rose, NIST scottr@nist.gov 2011 Winter JointTechs Meeting Jan 30, 2011 Clemson University Special Thanks to RIPE NCC who provided the base slides for this tutorial. DNS is not secure Known vulnerabilities

More information

DANE, why we need it. Daniel Stirnimann Bern, 29. March SWITCH 1

DANE, why we need it. Daniel Stirnimann Bern, 29. March SWITCH 1 DANE, why we need it Daniel Stirnimann daniel.stirnimann@switch.ch Bern, 29. March 2017 2017 SWITCH 1 Why do we trust this website? 2017 SWITCH 2 Why do we trust this website? 1. DNS lookup for www.credit-suisse.com

More information

THE BRUTAL WORLD OF DNSSEC

THE BRUTAL WORLD OF DNSSEC THE BRUTAL WORLD OF DNSSEC Patrik Fältström Head of Technology Netnod 1 Security Issues with DNS Zone Administrator Bad Data False Master Caching Resolver Zonefile Master Slave slave slave False Cache

More information

A Security Evaluation of DNSSEC with NSEC Review

A Security Evaluation of DNSSEC with NSEC Review A Security Evaluation of DNSSEC with NSEC Review Network Security Instructor:Dr. Shishir Nagaraja Submitted By: Jyoti Leeka November 16, 2011 1 Introduction to the topic and the reason for the topic being

More information

Keeping DNS parents and children in sync at Internet Speed! Ólafur Guðmundsson

Keeping DNS parents and children in sync at Internet Speed! Ólafur Guðmundsson Keeping DNS parents and children in sync at Internet Speed! Ólafur Guðmundsson olafur@cloudflare.com How long does it take to? Post a new selfie on Facebook and all your friends to be notified few seconds

More information

Network Working Group. Category: Informational SPARTA, Inc. S. Crocker Shinkuro Inc. S. Krishnaswamy SPARTA, Inc. August 2007

Network Working Group. Category: Informational SPARTA, Inc. S. Crocker Shinkuro Inc. S. Krishnaswamy SPARTA, Inc. August 2007 Network Working Group Request for Comments: 4986 Category: Informational H. Eland Afilias Limited R. Mundy SPARTA, Inc. S. Crocker Shinkuro Inc. S. Krishnaswamy SPARTA, Inc. August 2007 Requirements Related

More information

DS TTL shortening experience in.jp

DS TTL shortening experience in.jp DS TTL shortening experience in.jp APRICOT2014 DNS Session 27 Feb 2014 Yoshiro YONEYA Copyright 2014 Japan Registry Services Co., Ltd. 1 What is DS? Establish a DNSSEC chain

More information