Impact of Rolling the Root KSK. Ed Lewis NetNod October 2015
|
|
- Charlotte McDowell
- 6 years ago
- Views:
Transcription
1 Impact of Rolling the Root KSK Ed Lewis NetNod October 2015
2 Agenda Background on DNS, DNSSEC ICANN as the KSK maintainer Valida=on of DNSSEC Impact of a Key Roll Note I have more slides than minutes. All of the slides are new, I plan to skip some based on how the discussion goes 2
3 Background The next slides set up the importance of talking about the change of the KSK 3
4 For Engineers Who Don't Like Protocols What is the IPv4 address for The IPv4 address for is W.X.Y.Z 4
5 Details, Details The DNS is not client- server, not like the Web DNS has "authorita=ve" (source) servers and "recursive" (cache) servers Answers may come from the true source or a copy, rules govern what is allowed But not everyone follows rules 5
6 DNSSEC for Those Who Don't Like Protocols What is the IPv4 address for The IPv4 address for is W.X.Y.Z Digital signature by nic.se covering answer 6
7 A key Besides the data and signature, need a key to validate Need the key to be trustworthy (or it is useless) 7
8 Crypto- checking a Signature The IPv4 address for is W.X.Y.Z Digital signature by nic.se covering answer nic.se KEY ZSK? OR 8
9 What if it's? Bad things for network operators Trouble =ckets Whereever the user (ops' customers) wants to go is "down" Address is not handed to applica=on (it's broken) Applica=on can't tell it is a security problem This is why, ul=mately, this talk ma^ers 9
10 DNSSEC is more than Crypto Don't get the idea that DNSSEC only does a cryptographic check on the data, signature, and key There's about a dozen other things to check Details, details Remember, crypto is a security tool, not security 10
11 At the source nic.se KEY ZSK This gap is inten=onal The IPv4 address for is W.X.Y.Z Digital signature by nic.se covering answer The IPv6 address for is W::Z Digital signature by nic.se covering answer 11
12 Problem: Scaling and Trust "nic.se" isn't the only place to go The DNS is arranged as a hierarchy (a tree) Copying the key from the source is easy but establishing it is "true" is hard "Just because I say so" doesn't work in security 12
13 DNS is hierarchical The Root Other TLDs SE (TLD) Other SE's NIC.SE 13
14 To scale trust In DNSSEC two roles for keys were invented Zone Data Signing Key (ZSK) Key Signing Key (KSK) And at the point of delega=on (parent) Designated Signer (DS) Not a key, a pointer to a key 14
15 How this Works (DNSSEC) The Root root KEY KSK root KEY ZSK se DS Other TLDs Other SE's SE (TLD) NIC.SE se KEY KSK se KEY ZSK nic.se DS nic.se KEY KSK nic.se KEY ZSK 15
16 How this Works (DNS) The Root root SOA root NS se NS Other TLDs Other SE's SE (TLD) NIC.SE se SOA se NS nic.se NS nic.se SOA nic.se NS 16
17 What's really at the source nic.se KEY ZSK nic.se KEY KSK The IPv4 address for is W.X.Y.Z Digital signature by nic.se covering answer The IPv6 address for is W::Z Digital signature by nic.se covering answer <...>.nic.se DS 17
18 Chain of Trust The purple boxes show how a "chain of trust" is built leading to the key If one trusts the root zone's KSK key, links can be made to the nic.se ZSK, signing the data 18
19 Trus=ng the root KSK The lifecycle of the root KSK From crea=on to destruc=on Use Risks The distribu=on of the root KSK Via website Embedded in code Out of band due- diligence root KEY KSK root KEY ZSK se DS se KEY KSK se KEY ZSK nic.se DS nic.se KEY KSK nic.se KEY ZSK 19
20 Principles of Root Zone KSK opera=ons The next slides cover how ICANN manages the KSK today 20
21 ICANN's role ICANN performs the management of the root zone KSK as part of fulfilling the IANA Func=ons Contract The IANA Func=ons Contract is managed by the US Department of Commerce's Na=onal Telecommunica=ons and Informa=on Administra=on (NTIA) 21
22 DNSSEC at the Root Zone ICANN IANA Func=ons Operator Manages KSK opera=ons NTIA Root Zone Administrator Verisign - Root Zone Maintainer Manages ZSK opera=ons 22
23 Principles of Design Build Community's Trust in KSK Ac=ve external par=cipa=on 21 volunteers to fill roles (described later) Third party review SysTrust/SOC- 3 submission Emphasize incident detec=on over preven=on Choose protec=ons that can't be "fixed" ajerwards Mul=- party staff opera=ons Disaster recovery in face of travel ban ("no- fly") 23
24 A Secure Founda=on The machinery for the Root Zone KSK opera=ons include Data center, nested levels of access (cage, safes, compartments) Computer hardware configured to be air- gapped, only needed features, all sojware available for open review All opera=ons involving the private keys are recorded, tamper evident enclosures to detect lapses Published DNSSEC Prac=ces Statement 24
25 Acknowledgement Some of the folks involved in the original design 25
26 Yet Another Detail About Keys Each "DNSSEC Key" is really a pair of keys Private and Public are roles (too) Private and Public keys are specially bonded together, what one encrypts, the other decrypts and vice versa KEY KSK Public KEY ZSK Public KEY KSK Private KEY ZSK Private 26
27 Key Ceremonies To expose any use of the KSK (private key) Each =me KSK is put in ac=on is during a ceremony In- person witnesses, reviewers, streamed video Archives ( Between ceremonies, all KSK assets are kept in tamper- evident states Ceremony "explains" when seals are broken 27
28 Root Zone KSK Crea=on Created in June 2010 Installed into two HSMs in Culpeper, Virginia, US (June 16, 2010) Signed first Root Zone ZSKs Copied into two more HSMs in El Segundo, California, US (July 12, 2010) Signed second set of Root Zone ZSKs Video, ar=facts available on- line h^ps:// 28
29 Use of the KSK since then Culpepper facility Odd numbered ceremonies, spring and fall Every 6 months Alternate HSM in use (inspect tamper evidence each ceremony) El Segundo facility Even numbered ceremonies, winter and summer Same as above 29
30 Photo Montage of First Ceremonies 30
31 What's an HSM? Hardware Security Module People like to talk about them, but they aren't that interes=ng Role is to prevent anyone from seeing the private component of a key HSM creates key, generates signatures, wraps key, and many other func=ons 31
32 It's not the key, it's the HSM The HSM makes stealing the key imprac=cal But you can steal the HSM How is it protected? Physical security "Igni=on" security 32
33 Protec=on of the Root Zone KSK Availability protec=on Seven recovery key shares distributed to chosen shareholders In case of HSM "fleet" destruc=on/failure Access protec=on Physical access, many levels of access needed "Igni=on" security for HSM Three- of- seven crypto offices needed to turn on the HSM 33
34 Emphasis on Public Par=cipa=on Seven Recovery Key share holders Non- ICANN staff, individuals selected via a process in 2010, located around the globe Annual verifica=on of the shares Five- of- seven shares needed to reassemble Two sets of Seven Crypto Officers Non- ICANN staff, as above One set for Culpeper, one for El Segundo Three- of- seven needed to start an HSM 34
35 Recovery Envelope At the =me a KSK (private) key is used Signatures are generated for the next calendar quarter This allows about 3 months (give or take) of recovery =me in face of a failure It's important to note this to avoid panic 35
36 Change History HSM There's a given assump=on that a cri=cal internal ba^ery will last 5 years At the 5 year mark a "tech(nical) refresh" occurred KSK The KSK has never been changed since it's crea=on in
37 Why change the KSK? Secrets eventually become Forgo^en (all HSMs crushed) Exposed (private key copied out of HSM) Discovered (someone reverse engineers it) Will that happen soon? Probably not. But what happens if it does? Prepara=on/Prac=ce or Panic! 37
38 Valida=on Considera=ons The next few slides look at the Root Zone KSK from the "consumer" side of the opera=on 38
39 Changing the Perspec=ve DNSSEC is designed to protect the receiver of the informa=on The past slides covered the supplier of the informa=on Its =me to change the perspec=ve and look at this from the consumer's point of view 39
40 Validators Who runs this? The IPv4 address for is W.X.Y.Z Digital signature by nic.se covering answer? nic.se KEY ZSK 40
41 Validator Operators Large providers Open public managed valida=ng servers ISPs/LIRs Usually bundled service like (used to be) Enterprises/ins=tu=ons Corpora=ons, university campus Any one with a computer Down load open source and run it 41
42 State of Valida=on Growing (faster than IPv6!) Most recent measurement I saw was 14% of lookups involved DNSSEC (frankly, that's just a number) No one has a roster of all those doing valida=on (good, but makes managing harder) 42
43 What is Needed to do DNSSEC DNS sojware The root zone KSK public key (or other keys lower in the tree) Lots of pa=ence, sufficient clue 43
44 Gesng the Root Zone KSK One can servers.net. DNSKEY' and pull the key with flags=257 From there is a page where the the KSK is available But if you rely on that, you aren't really securing yourself. 44
45 Mixing Sources It's be^er to rely on a mix of sources, in case any one source has a corrupted key Out of band is also desirable, because an a^ack on the DNS is meant to steer one away from the real, true keys Note no recommenda=on is made here 45
46 Maintaining the Root Zone KSK Once a trusted KSK is on hand there is a means to check if it is current and/or if there is a successor Process and protocol specified in RFC 5011, "Automated Updates of DNSSEC Trust Anchors" 46
47 "RFC 5011" ICANN will follow the process in RFC 5011 RFC 5011 more or less says this Introduce a new key for 30 days Once the key has been seen for that long, signed by the old key, it can be trusted A key can be revoked by changing flags and self- signing it's record There is a protocol defini=on but one can follow the spirit of this separately 47
48 Why Follow RFC 5011 only in Spirit? RFC 5011's protocol counts on a DNS validator changing it's configura=on Change management systems prefer to push out configura=ons to servers like validators Instead of having the validator "do" RFC 5011, a NOC can "do" RFC 5011 and then push out the new keys in the spirit of the protocol. 48
49 Rolling the Root Zone KSK These final slides talk about the reason this is not a simple task Why there's need for communica=on amongst many par=es 49
50 Design Team To cover more ground ICANN has engaged a external, volunteer Design Team Draj report was open for an ICANN formal public comment from 6 August to 5 October 2015 Now closed h^ps:// comments/root- ksk en Design Team is preparing to review comments and include other factors A final report will be made available when ready 50
51 Impact of Rolling the KSK When ICANN, as IANA Func=ons Operator, makes a change to the Root Zone KSK All validator operators have to Pay a^en=on Perform the RFC 5011 protocol Follow in the spirit of RFC 5011 Or update systems accordingly If not, there will be trouble =ckets galore 51
52 Who Calls the Shots? It is not the intent of ICANN "as the supplier" to make changes blindly But there is li^le monitoring available RFC 5011 adherence can't be measured remotely Only the operator has access to the configura=ons A fool- proof, fail- safe plan is desirable but not feasible 52
53 What Will ICANN Do? Plans are not final yet Adhere to RFC 5011's protocol Publish new keys outside the DNS following the spirit of RFC 5011 Strive to publicize the event well in advance, minding prepara=on =me Work in concert with impacted par=es to avoid trouble =ckets 53
54 What will help ICANN? Knowing whom to inform Building a contact list of those who "pull the levers" Knowing how operators establish trust What third par=es are trusted, how many are needed? Knowing how to gauge readiness to roll 54
55 When Will All This Happen? Don't know yet. "It's complicated." But we are preparing for the change. 55
56 For more informa=on Join the mailing list h^ps://mm.icann.org/mailman/lis=nfo/root- dnssec- announce Follow on Twi^er Hashtag: #KeyRollover for the most up to date news 56
KSK Roll Prepping: RFC Presented at RIPE 71 DNS WG November 19, 2015
KSK Roll Prepping: RFC 5011 Presented at RIPE 71 DNS WG November 19, 2015 Intro ICANN is preparing to roll the Root Zone KSK ICANN performs the management of the root zone KSK as part of fulfilling the
More informationRolling the Root Zone DNSSEC Key Signing Key Edward Lewis AFRINIC25 November 2016
Rolling the Root Zone DNSSEC Key Signing Key Edward Lewis AFRINIC25 November 2016 edward.lewis@icann.org 1 Motivation for this talk ICANN is about to change an important configuration parameter in DNSSEC
More information2017 Root DNSSEC KSK Rollover. NANOG 70 June 6, 2017
2017 Root DNSSEC KSK Rollover Punky.Duero@iana.org NANOG 70 June 6, 2017 What is the Root Zone DNSSEC KSK? KSK The Root Zone DNSSEC Key Signing Key KSK is the top most cryptographic key in the DNSSEC hierarchy
More informationDNS Security and DNSSEC in the root zone Luzern, Switzerland February 2010
DNS Security and DNSSEC in the root zone Luzern, Switzerland February 2010 Kim Davies Manager, Root Zone Services Internet Corporation for Assigned Names & Numbers Recap DNS originally not designed with
More informationRoot Zone DNSSEC KSK Rollover
Root Zone DNSSEC KSK Rollover 51 51 KSK Rollover: An Overview ICANN is in the process of performing a Root Zone DNS Security Extensions (DNSSEC) Key Signing Key (KSK) rollover The Root Zone DNSSEC Key
More informationRolling the Root. Geoff Huston APNIC Labs March 2016
Rolling the Root Geoff Huston APNIC Labs March 2016 Use of DNSSEC Validation in Today s Internet Why is this relevant? Because the root zone managers are preparing to roll the DNS Root Zone Key Signing
More informationDNSSEC for the Root Zone. IETF 76 8 November 2009
DNSSEC for the Root Zone IEPG @ IETF 76 8 November 2009 Richard Lamb, ICANN Joe Abley, ICANN Matt Larson, VeriSign 1 This design is the result of a cooperation between ICANN & VeriSign with support from
More informationRoot Zone DNSSEC KSK Rollover. DSSEC KSK Rollover
Root Zone DNSSEC KSK Rollover 2017 Edward Lewis DSSEC KSK Rollover ENOG 15 Edward.Lewis@icann.org FIRST TC September 11, 2017 5 June 2018 The Basics This talk is related to the Domain Name System, in particular,
More informationDNSSEC for the Root Zone. ICANN 37 Nairobi March 2010
DNSSEC for the Root Zone ICANN 37 Nairobi March 2010 Kim Davies, ICANN This design is the result of a cooperation between ICANN & VeriSign with support from the U.S. DoC NTIA Design Design Requirements
More information2017 DNSSEC KSK Rollover. Guillermo Cicileo LACNIC March 22, 2017
2017 DNSSEC KSK Rollover Guillermo Cicileo LACNIC March 22, 2017 Purpose of this Talk 1 2 3 To publicize the new Root Zone DNSSEC KSK Provide status, upcoming events, and contact information Provide helpful
More informationRoot KSK Rollover Update (or, We're really doing it this time)
Root KSK Rollover Update (or, We're really doing it this time) Andres Pavez IANA LACNIC 29 / LACNOG 4 May 2018 What is the DNSSEC KSK? Two Components ("Keys") with a special mathematical bond Private KSK
More informationDNS/DNSSEC and Domain Transfers: Are they compa:ble? Olafur Gudmundsson Steve Crocker Shinkuro inc.
DNS/DNSSEC and Domain Transfers: Are they compa:ble? Olafur Gudmundsson Steve Crocker Shinkuro inc. {ogud,steve}@shinkuro.com Background Shinkuro was asked by ORG to look into how DNSSEC affects transfers
More information12 DNS Security Extensions DNS resolution via recursive nameserver DNS request/response format Simple DNS cache poisoning The Dan Kaminsky DNS
12 DNS Security Extensions DNS resolution via recursive nameserver DNS request/response format Simple DNS cache poisoning The Dan Kaminsky DNS vulnerability DNS root servers DNSSEC chain of trust DNSSEC
More informationDNSSEC for the Root Zone. IETF 76 Hiroshima November 2009
DNSSEC for the Root Zone IETF 76 Hiroshima November 2009 Jakob Schlyter Richard Lamb, ICANN Matt Larson, VeriSign 1 This design is the result of a cooperation between ICANN & VeriSign with support from
More information2017 DNSSEC KSK Rollover. DSSEC KSK Rollover
2017 DNSSEC KSK Rollover 2017 Edward Lewis DSSEC KSK Rollover APNIC 44 Edward.Lewis@icann.org FIRST TC September 11, 2017 13 September 2017 DNSSEC Signing vs. Validation DNS Security Extensions Digital
More informationDNSSEC for the Root Zone. NZNOG Hamilton, NZ January 2010
DNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN This design is the result of a cooperation between ICANN & VeriSign with support from the U.S. DoC NTIA Design Design Requirements
More informationRolling the Root Zone KSK. Matt Larson ICANN56 (Helsinki ) June 2016
Rolling the Root Zone KSK Matt Larson ICANN56 (Helsinki ) June 2016 matt.larson@icann.org 1 DNSSEC in the Root Zone Managed Jointly ICANN (IANA Functions Operator) Manages the KSK, same key since operations
More informationRoot & TLD DNSSEC. Early Deployment Observations. Edward Lewis NANOG 56 October 23, Neustar, Inc.
Root & TLD DNSSEC Early Deployment Observations Edward Lewis ed.lewis@neustar.biz NANOG 56 October 23, 2012 1 Introduction» DNSSEC is an extension to DNS to add some security to the system, "in the works"
More informationAfilias DNSSEC Practice Statement (DPS) Version
Afilias DNSSEC Practice Statement (DPS) Version 1.07 2018-02-26 Page 1 of 8 1. INTRODUCTION 1.1. Overview This document was created using the template provided under the current practicing documentation.
More informationAn Overview of DNSSEC. Cesar Diaz! lacnic.net!
An Overview of DNSSEC Cesar Diaz! cesar@ lacnic.net! 1 DNSSEC??? The DNS Security Extension (DNS SEC) attach special kind of information called criptographic signatures to the queries and response that
More informationAPNIC DNSSEC APNIC DNSSEC. Policy and Practice Statement. DNSSEC Policy and Practice Statement Page 1 of 12
APNIC DNSSEC Policy and Practice Statement DNSSEC Policy and Practice Statement Page 1 of 12 Table of Contents Overview 4 Document name and identification 4 Community and applicability 4 Specification
More informationDNSSEC Trust tree: (A) ---dnslab.org. (DS keytag: 9247 dig (DNSKEY keytag. ---org. (DS keytag: d
DNSSEC Trust tree: www.dnslab.org. (A) ---dnslab.org. (DNSKEY keytag: 7308 alg ---dnslab.org. (DNSKEY keytag: 9247 ---dnslab.org. (DS keytag: 9247 dig DNSSEC ---org. (DNSKEY keytag: 24209 a Domain Name
More informationDNSSEC All You Need To Know To Get Started
DNSSEC All You Need To Know To Get Started Olaf M. Kolkman RIPE NCC A Semi Technical Introduction Why do we need DNSSEC What does DNSSEC provide How does DNSSEC work Question: www.ripe.net A Reminder:
More informationDNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific
DNS/DNSSEC Workshop In Collaboration with APNIC and HKIRC Hong Kong Champika Wijayatunga Regional Security Engagement Manager Asia Pacific 22-24 January 2018 1 DNSSEC 2 2 DNS: Data Flow Zone administrator
More informationThat KSK Roll. Geoff Huston APNIC Labs
That KSK Roll Geoff Huston APNIC Labs The DNS may look simple But with the DNS, looks are very deceiving So lets talk DNSSEC DNSSEC introduces digital signatures into the DNS It allows a DNS resolver to
More informationRoot KSK Roll Update Webinar
Root KSK Roll Update Webinar Matt Larson, VP of Research 11 October 2017 1 Who has KSK-2017 configured as a trust anchor? Until recently, there was no way to know which trust anchors validators have configured
More informationDNS Mark Kosters Carlos Martínez ARIN - LACNIC
DNS Workshop @CaribNOG8 Mark Kosters Carlos Martínez ARIN - LACNIC DNS Refresher and Intro to DNS Security Extension (DNSSEC) Outline Introduction DNSSEC mechanisms to establish authenticity and integrity
More informationOpen Mee'ng of the Security & Stability Advisory Commi=ee. 26 October 2009
Open Mee'ng of the Security & Stability Advisory Commi=ee 26 Agenda Introduc'on Steve Crocker, Chair, SSAC SSAC Retreat Ram Mohan DNS Redirec'on Ram Mohan Root Scaling Study Ram Mohan Orphaned Name Servers
More information3. The DNSSEC Primer. Data Integrity (hashes) Authenticated Denial of Existence (NSEC,
3. The DNSSEC Primer Authentication (keys, signatures) Data Integrity (hashes) Chain of Trust (root zone, when signed) Authenticated Denial of Existence (NSEC, NSEC3) DNS Authoritative ROOT SERVERS TLD
More informationRoot KSK Roll Delay Update
Root KSK Roll Delay Update Data is good! David Conrad, CTO (channeling Roy Arends, ICANN Principal Research Scientist) 12 November 2017 1 Background When you validate DNSSEC signed DNS records, you need
More informationICANN proposal to sign the root. ICANN DNSSEC Workshop November 5, 2008, Cairo Dr. Richard Lamb
ICANN proposal to sign the root ICANN DNSSEC Workshop November 5, 2008, Cairo Dr. Richard Lamb richard.lamb@icann.org protects the lookup like HTTPS/SSL protects the conversation is about security not
More informationRSSAC Activities Update. Lars Johan Liman and Tripti Sinha RSSAC Chair ICANN-54 October 2015
RSSAC Activities Update Lars Johan Liman and Tripti Sinha RSSAC Chair ICANN-54 October 2015 Agenda 1 2 3 Overview RSSAC002 Implementation Status Update RSSAC003: RSSAC Report on Root Zone TTLs 4 5 6 RSSAC
More informationManaging the Root KSK Rollover, Step by Step for Operators
Managing the Root KSK Rollover, Step by Step for Operators Quickly spun by Edward.Lewis @ ICANN.ORG Changed-by: carlos @ lacnic.net LACNIC 27 Foz do Iguassu 1 Agenda What is the problem here? Some tools
More informationRoot Servers. Root hints file come in many names (db.cache, named.root, named.cache, named.ca) See root-servers.org for more detail
What is DNS? Systems to convert domain names into ip addresses: For an instance; www.tashicell.com 118.103.136.66 Reverse: 118.103.136.66 www.tashicell.com DNS Hierarchy Root Servers The top of the DNS
More informationRichemont DNS Inc. DNS Practice Statement for the PANERAI Zone. Version 0.2
Richemont DNS Inc. DNS Practice Statement for the PANERAI Zone Version 0.2 1 Table of contents 1 INTRODUCTION...6 1.1 Overview... 6 1.2 Document Name and Identification... 6 1.3 Community and Applicability...
More informationCIRA DNSSEC PRACTICE STATEMENT
CIRA DNSSEC PRACTICE STATEMENT 1. Introduction This DNSSEC Practice Statement ( DPS ) is a statement of security practices and provisions made by the Canadian Internet Registration Authority (CIRA). These
More informationSome DNSSEC thoughts. DNSOPS.JP BOF Interop Japan Geoff Huston Chief Scientist, APNIC June 2007
Some DNSSEC thoughts DNSOPS.JP BOF Interop Japan 2007 Geoff Huston Chief Scientist, APNIC June 2007 The DNS is a miracle! You send out a question into the net And an answer comes back! Somehow But WHO
More informationAlgorithm for DNSSEC Trusted Key Rollover
Algorithm for DNSSEC Trusted Key Rollover Gilles Guette, Bernard Cousin, and David Fort IRISA, Campus de Beaulieu, 35042 Rennes CEDEX, FRANCE {gilles.guette, bernard.cousin, david.fort}@irisa.fr Abstract.
More informationRoot KSK Roll Delay Update
Root KSK Roll Delay Update PacNOG 21 Patrick Jones, Sr. Director, Global Stakeholder Engagement 4 December 2017 1 Background When you validate DNSSEC signed DNS records, you need a Trust Anchor. A Trust
More informationDNSSEC for Humans and BIND 10. Paul Vixie Internet Systems Consortium June 9, 2011
DNSSEC for Humans and BIND 10 Paul Vixie Internet Systems Consortium June 9, 2011 Agenda BIND and DNSSEC Why do I want DNSSEC? Why DNSSEC for Humans? BIND 9.7 Features More DNSSEC for Humans Why BIND 10?
More informationDNSSec Operation Manual for the.cz and e164.arpa Registers
DNSSec Operation Manual for the.cz and 0.2.4.e164.arpa Registers version 1.9., valid since 1 January 2010 Introduction This material lays out operational rules that govern the work of the CZ.NIC association
More informationDNSSEC. Lutz Donnerhacke. db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb dig +dnssec e164.arpa. naptr
DNSSEC Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb dig +dnssec 1.6.5.3.7.5.1.4.6.3.9.4.e164.arpa. naptr 1 A protocol from better times An ancient protocol People were friendly and
More informationWhat If Everyone Did It? Geoff Huston APNIC Labs
What If Everyone Did It? Geoff Huston APNIC Labs DNS Security Se#ng the AD bit in a recursive resolver response seems like a rather unimpressive way of conveying a posi;ve security outcome, and in the
More informationDNSSEC Activities In North America: Comcast
DNSSEC Activities In North America: Comcast ICANN 45 October 17, 2012 NATIONAL ENGINEERING & TECHNICAL OPERATIONS DNSSEC Deployment Status We began working on this in 2008 (see 4meline) We completed our
More informationDNSSEC KSK-2010 Trust Anchor Signal Analysis
DNSSEC KSK-2010 Trust Anchor Signal Analysis MAPRG @ IETF102 1 Overview Background: DNSSEC KSK rollover and plan Problems with the KSK rollover Case study analysis: difficulty in identifying old Trust
More informationUniversal Acceptance. ICANN 52 9 February 2015
Universal Acceptance ICANN 52 9 February 2015 Agenda q Introduction to Universal Acceptance q High priority issues q Marketing and communications approach q Call for a global community initiative q Next
More informationRSA and ECDSA. Geoff Huston APNIC. #apricot2017
RSA and ECDSA Geoff Huston APNIC It s all about Cryptography Why use Cryptography? Public key cryptography can be used in a number of ways: protecting a session from third party eavesdroppers Encryption
More informationHoda Rohani Anastasios Poulidis Supervisor: Jeroen Scheerder. System and Network Engineering July 2014
Hoda Rohani Anastasios Poulidis Supervisor: Jeroen Scheerder System and Network Engineering July 2014 DNS Main Components Server Side: Authoritative Servers Resolvers (Recursive Resolvers, cache) Client
More informationInternet Number Certification
Internet Number Certification Terry Manderson ICANN involvement In response to requests from the Internet community 2 What you are about to see Possibili*es of Implementa*on Technical manifesta*on of some
More informationSecurity and Stability Advisory Committee!! Activities Update! ICANN Los Angeles Meeting! October 2014! #ICANN51
Security and Stability Advisory Committee!! Activities Update! ICANN Los Angeles Meeting! October 2014! 1 Agenda 1. Overview (5 minutes) 2. Recent Achievements (5 minutes) 3. IANA Functions Stewardship
More informationDNS and DNSSEC Management and Monitoring Changes Required During A Transition To DNSSEC. Wes Hardaker
DNS and DNSSEC Management and Monitoring Changes Required During A Transition To DNSSEC Wes Hardaker Overview Business Model Changes Relationship Requirements Relationship with
More informationIANA ccnso Update Kim Davies ICANN 55, 8 March 2016
IANA ccnso Update Kim Davies ICANN 55, 8 March 2016 Agenda Introduction to IANA Performance Overview Implementing new post-transition performance metrics Framework of Interpretation RDAP Update Other Work
More information2008 DNS Cache Poisoning Vulnerability Cairo, Egypt November 2008
2008 DNS Cache Poisoning Vulnerability Cairo, Egypt November 2008 Kim Davies Manager, Root Zone Services Internet Corporation for Assigned Names & Numbers How do you attack the DNS? A typical DNS query
More informationDNSSEC at ORNL. Paige Stafford Joint Techs Conference, Fairbanks July 2011
DNSSEC at ORNL Paige Stafford Joint Techs Conference, Fairbanks July 2011 Outline Background Brief review of DNSSEC ORNL before DNSSEC was implemented Implementation experience Signer appliance Validation
More informationMigrating an OpenDNSSEC signer (February 2016)
Migrating an OpenDNSSEC signer (February 2016) Contributors David Njuki Amreesh Phokeer Logan Velvindron Alain Aina Email david.njuki@afrinic.net amreesh@afrinic.net logan@afrinic.net aalain@trstech.net
More informationDNSSEC in Switzerland 2 nd DENIC Testbed Meeting
DNSSEC in Switzerland 2 nd DENIC Testbed Meeting Frankfurt, 26. January 2010 Samuel Benz samuel.benz@switch.ch About SWITCH The SWITCH foundation operates the national research network since 1987 SWITCH
More informationDNSSEC DNS SECURITY EXTENSIONS INTRODUCTION TO DNSSEC FOR SECURING DNS QUERIES AND INFORMATION
DNSSEC DNS SECURITY EXTENSIONS INTRODUCTION TO DNSSEC FOR SECURING DNS QUERIES AND INFORMATION Peter R. Egli 1/10 Contents 1. Security Problems of DNS 2. Solutions for securing DNS 3. Security with DNSSEC
More informationDENIC DNSSEC Testbed Software support for DNSSEC Ralf Weber
DENIC DNSSEC Testbed Software support for DNSSEC Ralf Weber (ralf.weber@nominum.com) Who is Nominum? Mission Product Leadership Industry Expertise Deliver the Trusted Internet Experience Strategic Partners:
More information15 September ICANN Proposal to DNSSEC-Sign the Root Zone
Page 1 ICANN Proposal to DNSSEC-Sign the Root Zone Executive Summary This document asks and proposes answers to three questions related to DNSSEC signing of the root zone: 1. Why should the root zone be
More informationAnother Way To Chain: NSDS. Dan Kaminsky Chief Scien9st Recursion Ventures
Another Way To Chain: NSDS Dan Kaminsky Chief Scien9st Recursion Ventures The Good News The DNS Root is being signed! DNS has scaled magnificently for 25 years by there being one agreed upon root DNSSEC
More informationICANN Policy Update & KSK Rollover
ICANN Policy Update & KSK Rollover Savenaca Vocea VP, Stakeholder Engagement - Oceania Commonwealth Broadband Pacific Forum 2017, Apia, Samoa 25-27 July 2017 1 Overview Coordinating with our partners,
More informationICANN and Technical Work: Really? Yes! Steve Crocker DNS Symposium, Madrid, 13 May 2017
ICANN and Technical Work: Really? Yes! Steve Crocker DNS Symposium, Madrid, 13 May 2017 Welcome, everyone. I appreciate the invitation to say a few words here. This is an important meeting and I think
More informationThe State and Challenges of the DNSSEC Deployment. Eric Osterweil Michael Ryan Dan Massey Lixia Zhang
The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang 1 Monitoring Shows What s Working and What needs Work DNS operations must already deal with widespread
More informationDNSSEC Validators Requirements
DNSSEC Validators Requirements draft-mglt-dnsop-dnssec-validator-requirements-05 Migault, Lewis, York IETF99 ToC Time Requirements Trust Anchor Requirements Bootstrapping / configuration TA Datastore Interaction
More informationDNS Mark Kosters Carlos Martínez {ARIN, LACNIC} CTO
DNS Workshop @CaribNOG12 Mark Kosters Carlos Martínez {ARIN, LACNIC} CTO DNS Refresher and Intro to DNS Security Extension (DNSSEC) Outline Introduction DNSSEC mechanisms to establish authenticity and
More informationDocumentation. Name Server Predelegation Check
Name Server Predelegation Check Doc. version: 1.4.1 Doc. status: Final Doc. date: 01.12.2015 Doc. name: Name Server Predelegation Check- -DNS Services-V1.4.1-2015-12-01 Copyright 2015 DENIC eg Imprint
More informationShared cctld DNSSEC Signing Platform Bill Woodcock and Rick Lamb ICANN San Francisco March 2011
Shared cctld DNSSEC Signing Platform Bill Woodcock and Rick Lamb ICANN San Francisco March 2011 ICANN - Common Goals ICANN Goals: Accelerate DNSSEC deployment Maintain the highest standards of security
More informationDNSSEC PRACTICE STATEMENT FOR TOP-LEVEL DOMAINS
MAY 28, 2016 DNSSEC PRACTICE STATEMENT FOR TOP-LEVEL DOMAINS ABSTRACT THIS DOCUMENT IS A STATEMENT OF SECURITY PRACTICES AND PROVISIONS WHICH ARE APPLIED TO THE ADMINISTRATION AND OPERATION OF DNS SECURITY
More informationIn the Domain Name System s language, rcode 0 stands for: no error condition.
12/2017 SIMPLE, FAST, RESILIENT In the Domain Name System s language, rcode 0 stands for: no error condition. If a DNS server answers a query with this result code, the service is running properly. This
More informationCyber Security and Power System Communica4ons Essen4al Parts of a Smart Grid Infrastructure. Talal El Awar
Cyber Security and Power System Communica4ons Essen4al Parts of a Smart Grid Infrastructure Author: Goran N. Ericsson, Senior Member, IEEE Talal El Awar Submi.ed in Par3al Fulfillment of the Course Requirements
More informationAssessing and Improving the Quality of DNSSEC
Assessing and Improving the Quality of DNSSEC Deployment Casey Deccio, Ph.D. Sandia National Laboratories AIMS-4 CAIDA, SDSC, San Diego, CA Feb 9, 2012 Sandia is a multiprogram laboratory operated by Sandia
More informationRolling the Root KSK. Geoff Huston. APNIC Labs. September 2017
Rolling the Root KSK Geoff Huston APNIC Labs September 2017 Will this break the Internet? Why? If we stuff up this trust anchor key roll then resolvers that perform DNSSEC validation will fail to provide
More informationScott Rose, NIST Winter JointTechs Meeting Jan 30, 2011 Clemson University
Scott Rose, NIST scottr@nist.gov 2011 Winter JointTechs Meeting Jan 30, 2011 Clemson University Special Thanks to RIPE NCC who provided the base slides for this tutorial. DNS is not secure Known vulnerabilities
More informationDNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific
DNS/DNSSEC Workshop In Collaboration with APNIC and HKIRC Hong Kong Champika Wijayatunga Regional Security Engagement Manager Asia Pacific 22-24 January 2018 1 Agenda 1 2 3 Introduction to DNS DNS Features
More information6 March 2012
6 March 2012 richard.lamb@icann.org www.majorbank.se=? 1.2.3.4 Get page Login page Username / Password Account Data DNS Resolver ISP www.majorbank.se = 1.2.3.4 DNS Server webserver www @ 1.2.3.4 Majorbank
More informationRoot Management Update
Root Management Update San Francisco, USA March 2011 Kim Davies Manager, Root Zone Services Internet Corporation for Assigned Names & Numbers IANA NOI Notice of Inquiry IANA Contract expires later in 2011
More informationBy Paul Wouters
By Paul Wouters Overview presentation Theory of DNSSEC Using bind with DNSSEC Securing Ò.nlÓ with SECREG Securing Ò.orgÓ with VerisignLabs Deploying DNSSEC on large scale Audience participation
More informationToward Unspoofable Network Identifiers. CS 585 Fall 2009
Toward Unspoofable Network Identifiers CS 585 Fall 2009 The Problem DNS Spoofing Attacks (e.g., Kaminsky) At link (Ethernet) and IP layers, either: Software sets the source address in the packet, or Software
More informationKeeping DNS parents and children in sync at Internet Speed! Ólafur Guðmundsson
Keeping DNS parents and children in sync at Internet Speed! Ólafur Guðmundsson olafur@cloudflare.com How long does it take to? Post a new selfie on Facebook and all your friends to be notified few seconds
More informationDNSSEC operational experiences and recommendations. Antti Ristimäki, CSC/Funet
DNSSEC operational experiences and recommendations Antti Ristimäki, CSC/Funet Agenda Funet DNSSEC status A short DNSSEC tutorial Zone signing considerations Private key security Network layer impacts Monitoring
More informationTHE BRUTAL WORLD OF DNSSEC
THE BRUTAL WORLD OF DNSSEC Patrik Fältström Head of Technology Netnod 1 Security Issues with DNS Zone Administrator Bad Data False Master Caching Resolver Zonefile Master Slave slave slave False Cache
More informationROOT SERVERS MANAGEMENT AND SECURITY
ROOT SERVERS MANAGEMENT AND SECURITY WSIS African regional meeting 01/29/05 ALAIN PATRICK AINA aalain@trstech.net What is DNS(1)? Addresses are used to locate objects Names are easier to remember than
More informationLab 6 Implementing DNSSEC
Lab 6 Implementing DNSSEC Objective: Deploy DNSSEC-signed zones. Background DNSSEC (or DNS Security Extensions) provide security to the zone files. Note: In the steps below, we are using myzone.net - our
More informationQualita've DNS Measurement Perspec'ves
Qualita've DNS Measurement Perspec'ves Casey Deccio Sandia Na/onal Laboratories ISC/CAIDA Data Collabora/on Workshop Oct 22, 2012 Sandia National Laboratories is a multi-program laboratory managed and
More informationDNSSEC From a protocol bug to a security advantage
DNSSEC From a protocol bug to a security advantage Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb 1 A protocol from better times An ancient protocol People were friendly and trustworthy
More informationDomain Name System.
Domain Name System http://xkcd.com/302/ CSCI 466: Networks Keith Vertanen Fall 2011 Overview Final project + presentation Some TCP and UDP experiments Domain Name System (DNS) Hierarchical name space Maps
More informationInternet Engineering Task Force (IETF) Request for Comments: 7706 Category: Informational ISSN: November 2015
Internet Engineering Task Force (IETF) Request for Comments: 7706 Category: Informational ISSN: 2070-1721 W. Kumari Google P. Hoffman ICANN November 2015 Decreasing Access Time to Root Servers by Running
More informationOne Namespace, Many Circles. Dr. Paul Vixie, CEO Farsight Security, Inc.
One Namespace, Many Circles Dr. Paul Vixie, CEO Farsight Security, Inc. DNS Works Only Because of Voluntary Cooperation Every Internet host chooses Recursive DNS servers Can either believe ISP settings,
More informationARIN Support for DNSSEC and RPKI. ION San Diego 11 December 2012 Pete Toscano, ARIN
ARIN Support for DNSSEC and ION San Diego 11 December 2012 Pete Toscano, ARIN 2 DNS and BGP They have been around for a long time. DNS: 1982 BGP: 1989 They are not very secure. Methods for securing them
More informationDNSSEC the.se way: Overview, deployment and lessons learned. Anne-Marie Eklund Löwinder Quality & Security Manager
DNSSEC the.se way: Overview, deployment and lessons learned Anne-Marie Eklund Löwinder Quality & Security Manager My agenda Getting Started Finding out about.se Finding out what DNS does for you Why DNSSEC?
More informationDNSSEC Policy and Practice Statement. Anne-Marie Eklund Löwinder Quality and Security Manager
DNSSEC Policy and Practice Statement Anne-Marie Eklund Löwinder Quality and Security Manager amel@iis.se What is a DNSSEC Policy and Practice Statement (DPS)? A document that contains the DNSSEC Policy
More information6.033 Computer System Engineering
MIT OpenCourseWare http://ocw.mit.edu 6.033 Computer System Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. Nickolai Zeldovich
More informationTyre Kicking the DNS. Testing Transport Considerations of Rolling Roots. Geoff Huston APNIC
Tyre Kicking the DNS Testing Transport Considerations of Rolling Roots Geoff Huston APNIC Five Years Ago The US KSK Repository The Amsterdam KSK Repository George Michaelson Five Years Ago Five Years Ago
More informationAfriNIC 14 Shared cctld DNSSEC Signing Platform June 9, 2011 Bill Woodcock Research Director Packet Clearing House
AfriNIC 14 Shared cctld DNSSEC Signing Platform June 9, 2011 Bill Woodcock Research Director Packet Clearing House ICANN - Common Goals ICANN Goals: Accelerate DNSSEC deployment Maintain the highest standards
More informationDNSSEC Practice Statement (DPS) for.lat TLD
DNSSEC Practice Statement (DPS) for.lat TLD Network Information Center Mexico Ave Eugenio Garza Sada 427 Loc. 4, 5 y 6 - C. P. 64840 Monterrey, NL, Mexico 1 Table of Contents 1. Introduction... 6 1.1.
More informationTable of Contents. DNS security. Alternative DNS security mechanism. DNSSEC specification. The long (and winding) road to the DNSSEC specification
Table of Contents DNS security Karst Koymans Informatics Institute University of Amsterdam (version 1.19, 2011/09/27 14:18:11) Friday, September 23, 2011 The long (and winding) road to the DNSSEC specification
More informationCybersecurity Curricular Guidelines
Cybersecurity Curricular Guidelines Ma2 Bishop, University of California Davis, co-chair Diana Burley The George Washington University, co-chair Sco2 Buck, Intel Corp. Joseph J. Ekstrom, Brigham Young
More information4. Performance Specifications. 4.1 Goals and intentions of Service Level Agreements and Public Service Monitoring. Goals of Service Level Agreements:
4. Performance Specifications 4.1 Goals and intentions of Service Level Agreements and Public Service Monitoring Goals of Service Level Agreements: Service Level Agreements are set between ICANN and Registry
More informationA Look at RFC 8145 Trust Anchor Signaling for the 2017 KSK Rollover
A Look at RFC 8145 Trust Anchor Signaling for the 2017 KSK Rollover Duane Wessels DNS-OARC 26 San Jose, CA September 29, 2017 Background 2 2017 Root Zone KSK Rollover October 11, 2017! Root zone DNSKEY
More informationSecSpider: Distributed DNSSEC Monitoring and Key Learning
SecSpider: Distributed DNSSEC Monitoring and Key Learning Eric Osterweil UCLA Joint work with Dan Massey and Lixia Zhang Colorado State University & UCLA 1 Who is Deploying DNSSEC? Monitoring Started From
More information