DNSSEC for the Root Zone. IEPG IETF 77 Anaheim, USA March 2010
|
|
- Beatrix Rich
- 6 years ago
- Views:
Transcription
1 DNSSEC for the Root Zone IEPG IETF 77 Anaheim, USA March 2010 Joe Abley, ICANN Matt Larson, VeriSign 1
2 This design is the result of a cooperation between ICANN & VeriSign with support from the U.S. DoC NTIA 2
3 Signing the Root 3
4 Quick Recap 2048-bit RSA KSK, 1024-bit RSA ZSK Signatures with RSASHA256 Split ZSK/KSK operations Incremental deployment Deliberately-Unvalidatable Root Zone (DURZ) 4
5 For More Detail... design documentation copies of earlier presentations contact information 5
6 Signing Other Things (a brief diversion from the root zone) 6
7 ARPA IAB first requested that ARPA be signed on ICANN proposed an interim solution long-term solution to follow signed root Signed zone published since interim solution test deployment 7
8 IN-ADDR.ARPA Re-delegation planned for IN-ADDR.ARPA from root to RIR/IANA servers expected in the next few months Proposal to sign IN-ADDR.ARPA will be submitted to US DoC by ICANN following redelegation 8
9 E164.ARPA E164.ARPA is managed by the RIPE NCC RIPE NCC has advised ICANN that they intend to submit a request to add DS records to the ARPA zone in June
10 Other ARPA Offspring Proposal to sign URI.ARPA, URN.ARPA, IP6.ARPA, IN-ADDR-SERVERS.ARPA, IP6- SERVERS.ARPA submitted Pre-production testing was completed successfully If proposal is acceptable, signed zones will be published in a few weeks 10
11 Operational Update 11
12 Root Server Status Root Server Operated by Signed ARPA DURZ LTQC DITL A VeriSign submitting submitting B ISI unknown unknown C Cogent submitting submitting D UMD submitting submitting E NASA submitting submitting F ISC submitting submitting G US DoD submitting submitting H US Army submitting submitting I Autonomica submitting submitting J VeriSign N/A submitting submitting K RIPE NCC submitting submitting L ICANN submitting submitting M WIDE submitting submitting 12
13 KSR Processing KSR exchanges continue between VeriSign and ICANN software testing operational testing 13
14 Key Ceremonies Many rehearsals complete, more to follow Facility requirements continue to be refined, guided by external contributions Both east- and west-coast facilities expected to be on-line and tested on scheule 14
15 Trusted Community Representatives Proposed approach will involve TCRs as key ceremony participants and witnesses see Trusted Community Representatives Proposed Approach to Root Key Management 15
16 No Harmful Effects No harmful effects have been reported, from DURZ or signed ARPA deployment Some ancilliary observations have been made availability of TCP transport fragmentation behaviour 16
17 Analysis 17
18 DURZ Schedule L A I,M D, E, K B,C,F,G,H J
19 Data Is Collected at DNS- OARC Priming queries and responses constantly since December 2009 All queries 24h before and ater a root server switches to DURZ 19
20 UDP Priming Query Rate A significant change in priming query rate could indicate a client that s been cut off from the root servers. 20
21 UDP Priming Query Rate for the previous 4h as of :00:00 L- root s Maintenance Window L root Queries Per Second First post- DURZ priming response Final pre- DURZ priming response 50 Whew, no change! 0 16:00 16:30 17:00 17:30 18:00 18:30 19:00 19:30 Date/Time, UTC 21
22 Queries Per Second A typically receives more priming queries than the others. UDP Priming Query Rate for the previous 4h as of :00:00 (E has hourly spikes, not sure why) A root C root D root E root F root G root H root J root K root L root M root :00 16:30 17:00 17:30 18:00 18:30 19:00 19:30 Date/Time, UTC These are lower due to missing data 22
23 UDP Priming Query Rate for the previous 4h as of :00:00 A- root s Maintenance Window A root Queries Per Second :00 16:30 17:00 17:30 18:00 18:30 19:00 19:30 Date/Time, UTC 23
24 UDP Priming Query Rate for the previous 4h as of :00:00 M- root s Maintenance Window M root Queries Per Second :00 4:30 5:00 5:30 6:00 6:30 7:00 7:30 Date/Time, UTC 24
25 UDP Priming Response Size We expect the mean priming response size to increase as clients receive responses that include RRSIG records. 25
26 800 UDP Priming Query Mean Reply Size for the previous 4h as of :00:00 L root Bytes 650 Gradual increase in mean response size as L- root nodes switch to DURZ :00 16:30 17:00 17:30 18:00 18:30 19:00 19:30 Date/Time, UTC 26
27 800 UDP Priming Query Mean Reply Size for the previous 4h as of :00:00 A root Mean reply size did not increase as much as it did for L. Bytes :00 16:30 17:00 17:30 18:00 18:30 19:00 19:30 Date/Time, UTC 27
28 Bytes UDP Priming Query Mean Reply Size for the previous 4h as of :00:00 A root C root D root E root F root G root H root J root L root M root :00 16:30 17:00 17:30 18:00 18:30 19:00 19:30 Date/Time, UTC 28
29 Histogram of Priming Response Sizes A root Responses Per Hour n 10Feb 1pm 2pm 3pm 4pm 5pm 6pm 7pm 8pm 9pm 10pm 11pm Date/Time, UTC 29
30 800 UDP Priming Query Mean Reply Size for the previous 4h as of :00:00 M root Bytes :00 4:30 5:00 5:30 6:00 6:30 7:00 7:30 Date/Time, UTC 30
31 Total UDP Query Rate Significant changes in the overall UDP rate may also indicate clients having problems with DURZ responses. 31
32 UDP Query Rate Queries Per Second A C D E F H J K L M Jan27 Jan28 32
33 UDP Query Rate Queries Per Second A- root s Maintenance Window A C D E F H J K L M Feb10 Feb11 33
34 UDP Query Rate Queries Per Second M- root s Maintenance Window A C D E F H J K L M Mar03 Mar04 34
35 UDP Query Rate Queries Per Second A C D E F H I J K L M Pre DURZ L DURZ A DURZ I,M DURZ 35
36 UDP Query Rate Queries Per Second This spike is due to afack- like traffic A C D E F H J K L M Pre DURZ L DURZ A DURZ I,M DURZ 36
37 TCP Query Rate We expect an increase in TCP queries from clients that cannot receive response larger than 512 octets. 37
38 TCP Query Rate 30 L 25 Queries Per Second Jan27 Jan28 38
39 TCP Query Rate 120 A 100 Queries Per Second Feb10 Feb11 39
40 TCP Query Rate M- root s Maintenance Window M Queries Per Second Mar03 Mar04 40
41 TCP Query Rate Queries Per Second A C D E F H I J K L M Pre DURZ L DURZ A DURZ I,M DURZ 41
42 RCODE/DO Knowing the RCODE/DO mixture helps us predict changes in bandwidth for responses. 42
43 RCODE/DO Mix For L root nxdomains other rcode=3,do=1 rcode=0,do=1 rcode=3,do=0 rcode=0,do=0 Fraction of Queries referrals 0.2 nxdomains 0 referrals Jan27 Jan28 43
44 Bufsize/DO We look at changes in adverised Bufsize and DO values over ime to see if problemaic clients are migraing to non- DURZ roots. 44
45 Bufsize/DO Mix 2010ï01ï26.18:00:00 ïï 2010ï03ï04.18:00: ï02ï09.18:00: ï03ï02.06:00: ï01ï28.18:00: ï02ï11.18:00:00 1 nodedns bufsiz<=512,do=0 bufsiz<=1500,do=0 bufsiz<=4096,do=0 bufsiz>4096,do=0 bufsiz<=512,do=1 bufsiz<=1500,do=1 bufsiz<=4096,do=1 bufsiz>4096,do=1 Fraction of Queries A C D E F H J K L M 45
46 DNSSEC Query Types We look at DNSSEC query types for possible evidence of premature validaion. 46
47 DNSSEC Query Types For L root 100 DNSKEY RRSIG DS NSEC NSEC3 DLV Queries Per Second Note log- scaled Y- axis Jan27 Jan28 47
48 Client Rate Buckets Another way to look for problem clients is to group them by how many queries they send. 48
49 There Are This Many Clients Client Query Rates For L root Making This Many Queries 1/sec 2/sec 4/sec 8/sec 16/sec 32/sec 64/sec 128/sec 256/sec 512/sec 1024/sec Jan27 Jan28 49
50 Acknowledgements Thanks to the Root Server Operators that are providing data. Thanks to ISC for being DNS- OARC s remote hands. 50
51 More Informaion dnssec.org 51
DNSSECfor the Root ZoneIEPG IETF 77 Anaheim, USA March 2010
DNSSECfor the Root ZoneIEPG IETF 77 Anaheim, USA March 2010 Joe Abley, ICANN Matt Larson, VeriSign This design is the result of a cooperation between ICANN & VeriSign with support from the U.S. DoC NTIA
More informationDNSSEC for the Root Zone. ICANN 37 Nairobi March 2010
DNSSEC for the Root Zone ICANN 37 Nairobi March 2010 Kim Davies, ICANN This design is the result of a cooperation between ICANN & VeriSign with support from the U.S. DoC NTIA Design Design Requirements
More informationDNS Security and DNSSEC in the root zone Luzern, Switzerland February 2010
DNS Security and DNSSEC in the root zone Luzern, Switzerland February 2010 Kim Davies Manager, Root Zone Services Internet Corporation for Assigned Names & Numbers Recap DNS originally not designed with
More informationDNSSEC for the Root Zone. IETF 76 8 November 2009
DNSSEC for the Root Zone IEPG @ IETF 76 8 November 2009 Richard Lamb, ICANN Joe Abley, ICANN Matt Larson, VeriSign 1 This design is the result of a cooperation between ICANN & VeriSign with support from
More informationDNSSEC for the Root Zone. NZNOG Hamilton, NZ January 2010
DNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN This design is the result of a cooperation between ICANN & VeriSign with support from the U.S. DoC NTIA Design Design Requirements
More informationDNSSEC for the Root Zone. IETF 76 Hiroshima November 2009
DNSSEC for the Root Zone IETF 76 Hiroshima November 2009 Jakob Schlyter Richard Lamb, ICANN Matt Larson, VeriSign 1 This design is the result of a cooperation between ICANN & VeriSign with support from
More informationRIPE Network Coordination Centre. K-root and DNSSEC. Wolfgang Nagele RIPE NCC.
K-root and DNSSEC Wolfgang Nagele RIPE NCC RIPE NCC One of the five Regional Internet Registries Provides IP address and AS number resources to Europe and Middle-East regions DNS related work - Parent
More informationSigning the Root. MENOG 7 Istanbul, Turkey October 2010
Signing the Root MENOG 7 Istanbul, Turkey October 2010 Mehmet Akcin AS SEEN IN ROOT and my T-Shirt. IN DS 19036 8 2 49AAC11D7B6F6446702E54A 1607371607A1A41855200FD 2CE1CDDE32F24E8FB5 Since July 15, 2010
More informationPacket Traces from a Simulated Signed Root
Packet Traces from a Simulated Signed Root Duane Wessels DNS-OARC DNS-OARC Workshop Beijing, China November 2009 Background We know from active measurements that some DNS resolvers cannot receive large
More information12 DNS Security Extensions DNS resolution via recursive nameserver DNS request/response format Simple DNS cache poisoning The Dan Kaminsky DNS
12 DNS Security Extensions DNS resolution via recursive nameserver DNS request/response format Simple DNS cache poisoning The Dan Kaminsky DNS vulnerability DNS root servers DNSSEC chain of trust DNSSEC
More informationDNS Security. Wolfgang Nagele DNS Services Manager
DNS Security Wolfgang Nagele DNS Services Manager DNS: the Domain Name System Specified by Paul Mockapetris in 1983 Distributed Hierarchical Database Main purpose: Translate names to IP addresses Since
More informationRSSAC Activities Update. Lars Johan Liman and Tripti Sinha RSSAC Chair ICANN-54 October 2015
RSSAC Activities Update Lars Johan Liman and Tripti Sinha RSSAC Chair ICANN-54 October 2015 Agenda 1 2 3 Overview RSSAC002 Implementation Status Update RSSAC003: RSSAC Report on Root Zone TTLs 4 5 6 RSSAC
More informationThe impact of DNSSEC on k.root-servers.net and ns-pri.ripe.net
The impact of DNSSEC on k.root-servers.net and ns-pri.ripe.net Olaf M. Kolkman Question What would be the immediate and initial effect on memory, CPU and bandwidth resources if we were to deploy DNSSEC
More informationDNS Security. Wolfgang Nagele DNS Group Manager
DNS Security Wolfgang Nagele DNS Group Manager DNS: the Domain Name System Specified by Paul Mockapetris in 1983 Distributed Hierarchical Database Main purpose: Translate names to IP addresses Since then:
More informationMeasuring the effects of DNSSEC deployment on query load
Measuring the effects of DNSSEC deployment on query load Jelte Jansen NLnet Labs NLnet Labs document 26-2 May 1, 26 Abstract Ripe NCC recently started signing the zones on their DNS servers. This document
More informationRIPE NCC DNS Update. Wolfgang Nagele DNS Services Manager
RIPE NCC DNS Update Wolfgang Nagele DNS Services Manager DNS Department Services Reverse DNS for RIPE NCC zones Secondary for other RIRs K-root F-reverse (in-addr.arpa & ip6.arpa) Secondary DNS for cctlds
More informationDeploying New DNSSEC Algorithms
Deploying New DNSSEC Algorithms ICANN 53 DNSSEC Workshop June 24, 2015 Buenos Aires, Argentina Dan York, Internet Society DNSSEC Algorithms Used to generate keys for signing DNSKEY Used in DNSSEC signatures
More informationDNSSec Operation Manual for the.cz and e164.arpa Registers
DNSSec Operation Manual for the.cz and 0.2.4.e164.arpa Registers version 1.9., valid since 1 January 2010 Introduction This material lays out operational rules that govern the work of the CZ.NIC association
More informationRolling the Root Zone KSK. Matt Larson ICANN56 (Helsinki ) June 2016
Rolling the Root Zone KSK Matt Larson ICANN56 (Helsinki ) June 2016 matt.larson@icann.org 1 DNSSEC in the Root Zone Managed Jointly ICANN (IANA Functions Operator) Manages the KSK, same key since operations
More informationDNSSEC All You Need To Know To Get Started
DNSSEC All You Need To Know To Get Started Olaf M. Kolkman RIPE NCC A Semi Technical Introduction Why do we need DNSSEC What does DNSSEC provide How does DNSSEC work Question: www.ripe.net A Reminder:
More informationHoda Rohani Anastasios Poulidis Supervisor: Jeroen Scheerder. System and Network Engineering July 2014
Hoda Rohani Anastasios Poulidis Supervisor: Jeroen Scheerder System and Network Engineering July 2014 DNS Main Components Server Side: Authoritative Servers Resolvers (Recursive Resolvers, cache) Client
More information5 DNS Security Extensions DNSSEC
Information Security 1 (InfSi1) 5 DNS Security Extensions DNSSEC Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications (ITA) Andreas Steffen, 22.10.2013, 5-DNSSEC.pptx 1 Information
More informationRSA and ECDSA. Geoff Huston APNIC. #apricot2017
RSA and ECDSA Geoff Huston APNIC It s all about Cryptography Why use Cryptography? Public key cryptography can be used in a number of ways: protecting a session from third party eavesdroppers Encryption
More informationARIN Support for DNSSEC and RPKI. ION San Diego 11 December 2012 Pete Toscano, ARIN
ARIN Support for DNSSEC and ION San Diego 11 December 2012 Pete Toscano, ARIN 2 DNS and BGP They have been around for a long time. DNS: 1982 BGP: 1989 They are not very secure. Methods for securing them
More informationDENIC DNSSEC Testbed Software support for DNSSEC Ralf Weber
DENIC DNSSEC Testbed Software support for DNSSEC Ralf Weber (ralf.weber@nominum.com) Who is Nominum? Mission Product Leadership Industry Expertise Deliver the Trusted Internet Experience Strategic Partners:
More informationAssessing and Improving the Quality of DNSSEC
Assessing and Improving the Quality of DNSSEC Deployment Casey Deccio, Ph.D. Sandia National Laboratories AIMS-4 CAIDA, SDSC, San Diego, CA Feb 9, 2012 Sandia is a multiprogram laboratory operated by Sandia
More informationICANN proposal to sign the root. ICANN DNSSEC Workshop November 5, 2008, Cairo Dr. Richard Lamb
ICANN proposal to sign the root ICANN DNSSEC Workshop November 5, 2008, Cairo Dr. Richard Lamb richard.lamb@icann.org protects the lookup like HTTPS/SSL protects the conversation is about security not
More informationRoot Zone DNSSEC KSK Rollover
Root Zone DNSSEC KSK Rollover 51 51 KSK Rollover: An Overview ICANN is in the process of performing a Root Zone DNS Security Extensions (DNSSEC) Key Signing Key (KSK) rollover The Root Zone DNSSEC Key
More informationDNSSEC in Switzerland 2 nd DENIC Testbed Meeting
DNSSEC in Switzerland 2 nd DENIC Testbed Meeting Frankfurt, 26. January 2010 Samuel Benz samuel.benz@switch.ch About SWITCH The SWITCH foundation operates the national research network since 1987 SWITCH
More informationRolling the Root. Geoff Huston APNIC Labs March 2016
Rolling the Root Geoff Huston APNIC Labs March 2016 Use of DNSSEC Validation in Today s Internet Why is this relevant? Because the root zone managers are preparing to roll the DNS Root Zone Key Signing
More information2017 DNSSEC KSK Rollover. Guillermo Cicileo LACNIC March 22, 2017
2017 DNSSEC KSK Rollover Guillermo Cicileo LACNIC March 22, 2017 Purpose of this Talk 1 2 3 To publicize the new Root Zone DNSSEC KSK Provide status, upcoming events, and contact information Provide helpful
More informationARIN Update. Summer 2011 ESCC/Internet2 Joint Techs Mark Kosters Chief Technology Officer
ARIN Update Summer 2011 ESCC/Internet2 Joint Techs Mark Kosters Chief Technology Officer Agenda A Brief Overview of ARIN IPv4 and IPv6 Stats Call to Action Technology Initiatives 2 of 23 About ARIN Regional
More informationK-Root Name Server Operations
K-Root Name Server Operations Andrei Robachevsky andrei@ripe.net 1 Outline Root Server System brief update Architecture Current locations Anycast deployment K.root-servers.net Server Major milestones Current
More informationDocumentation. Name Server Predelegation Check
Name Server Predelegation Check Doc. version: 1.4.1 Doc. status: Final Doc. date: 01.12.2015 Doc. name: Name Server Predelegation Check- -DNS Services-V1.4.1-2015-12-01 Copyright 2015 DENIC eg Imprint
More informationThe ISP Column A monthly column on things Internet
The ISP Column A monthly column on things Internet February 2010 George Michaelson Patrik Wallström Roy Arends Geoff Huston Roll Over and Die? In this month's column I have the pleasure of being joined
More information(Further) Dispatches from the DNS Frontier. Keith Mitchell DNS-OARC NANOG71 San Jose, Oct 2017
(Further) Dispatches from the DNS Frontier Keith Mitchell DNS-OARC NANOG71 San Jose, Oct 2017 OARC's Mission Statement The Domain Name System Operations Analysis and Research Center (DNS-OARC) is a non-profit,
More informationSummary of the Impact of Root Zone Scaling
Summary of the Impact of Root Zone Scaling Date of Publication: October 2010 Executive Summary In February 2009, the ICANN Board requested a study be undertaken to examine the impact of the inclusion of
More informationApplicability Statement: DNS Security (DNSSEC) DNSKEY Algorithm Implementation Status
Internet Engineering Task Force (IETF) S. Rose Request for Comments: 6944 NIST Updates: 2536, 2539, 3110, 4034, 4398, April 2013 5155, 5702, 5933 Category: Standards Track ISSN: 2070-1721 Applicability
More informationImplementing DNSSEC with DynDNS and GoDaddy
Implementing DNSSEC with DynDNS and GoDaddy Lawrence E. Hughes Sixscape Communications 27 December 2017 DNSSEC is an IETF standard for adding security to the DNS system, by digitally signing every resource
More information2017 Root DNSSEC KSK Rollover. NANOG 70 June 6, 2017
2017 Root DNSSEC KSK Rollover Punky.Duero@iana.org NANOG 70 June 6, 2017 What is the Root Zone DNSSEC KSK? KSK The Root Zone DNSSEC Key Signing Key KSK is the top most cryptographic key in the DNSSEC hierarchy
More informationShared cctld DNSSEC Signing Platform Bill Woodcock and Rick Lamb ICANN San Francisco March 2011
Shared cctld DNSSEC Signing Platform Bill Woodcock and Rick Lamb ICANN San Francisco March 2011 ICANN - Common Goals ICANN Goals: Accelerate DNSSEC deployment Maintain the highest standards of security
More informationRoot KSK Roll Update Webinar
Root KSK Roll Update Webinar Matt Larson, VP of Research 11 October 2017 1 Who has KSK-2017 configured as a trust anchor? Until recently, there was no way to know which trust anchors validators have configured
More informationTable of Contents. DNS security. Alternative DNS security mechanism. DNSSEC specification. The long (and winding) road to the DNSSEC specification
Table of Contents DNS security Karst Koymans Informatics Institute University of Amsterdam (version 1.19, 2011/09/27 14:18:11) Friday, September 23, 2011 The long (and winding) road to the DNSSEC specification
More informationStep by step DNSSEC deployment in.se. Anne-Marie Eklund Löwinder Quality & Security
Step by step DNSSEC deployment in.se Anne-Marie Eklund Löwinder Quality & Security Manager,.SE amel@iis.se @amelsec www.iis.se Timeline 2005 signing of the.se zone. 2006 allowing DS records from friendly
More informationTable of Contents DNS. Short history of DNS (1) DNS and BIND. Specification and implementation. A short history of DNS.
Table of Contents Specification and implementation DNS dr. C. P. J. Koymans Informatics Institute University of Amsterdam September 14, 2009 A short history of DNS Root servers Basic concepts Delegation
More informationSome Internet exploits target name resolution servers. DNSSEC uses cryptography to protect the name resolution
SYSADMIN DNSSEC Sergey Ilin, Fotolia Trusted name resolution with DNSSEC CHAIN OF TRUST Some Internet exploits target name resolution servers. DNSSEC uses cryptography to protect the name resolution service.
More informationDNSSEC Validators Requirements
DNSSEC Validators Requirements draft-mglt-dnsop-dnssec-validator-requirements-05 Migault, Lewis, York IETF99 ToC Time Requirements Trust Anchor Requirements Bootstrapping / configuration TA Datastore Interaction
More informationDNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific
DNS/DNSSEC Workshop In Collaboration with APNIC and HKIRC Hong Kong Champika Wijayatunga Regional Security Engagement Manager Asia Pacific 22-24 January 2018 1 DNSSEC 2 2 DNS: Data Flow Zone administrator
More informationAfriNIC 14 Shared cctld DNSSEC Signing Platform June 9, 2011 Bill Woodcock Research Director Packet Clearing House
AfriNIC 14 Shared cctld DNSSEC Signing Platform June 9, 2011 Bill Woodcock Research Director Packet Clearing House ICANN - Common Goals ICANN Goals: Accelerate DNSSEC deployment Maintain the highest standards
More informationRoot KSK Rollover Update (or, We're really doing it this time)
Root KSK Rollover Update (or, We're really doing it this time) Andres Pavez IANA LACNIC 29 / LACNOG 4 May 2018 What is the DNSSEC KSK? Two Components ("Keys") with a special mathematical bond Private KSK
More informationDNS. dr. C. P. J. Koymans. September 16, Informatics Institute University of Amsterdam. dr. C. P. J. Koymans (UvA) DNS September 16, / 46
DNS dr. C. P. J. Koymans Informatics Institute University of Amsterdam September 16, 2008 dr. C. P. J. Koymans (UvA) DNS September 16, 2008 1 / 46 DNS and BIND DNS (Domain Name System) concepts theory
More informationBIND-USERS and Other Debugging Experiences. Mark Andrews Internet Systems Consortium
BIND-USERS and Other Debugging Experiences Mark Andrews Internet Systems Consortium Mark_Andrews@isc.org http://isc.org BIND-USERS and Other Debugging Experiences We will look at some typical debugging
More informationDNS security. Karst Koymans & Niels Sijm. Tuesday, September 18, Informatics Institute University of Amsterdam
DNS security Karst Koymans & Niels Sijm Informatics Institute University of Amsterdam Tuesday, September 18, 2012 Karst Koymans & Niels Sijm (UvA) DNS security Tuesday, September 18, 2012 1 / 38 1 Chain
More informationTable of Contents. DNS security basics. What DNSSEC has to offer. In what sense is DNS insecure? Why DNS needs to be secured.
Table of Contents DNS security basics The basics Karst Koymans (with Niels Sijm) Informatics Institute University of Amsterdam (version 2.3, 2013/09/13 11:46:36) Tuesday, Sep 17, 2013 Why DNS needs to
More informationDraft Applicant Guidebook, v3
Draft Applicant Guidebook, v3 Module 5 Please note that this is a discussion draft only. Potential applicants should not rely on any of the proposed details of the new gtld program as the program remains
More informationMeasuring the resource requirements of DNSSEC
Measuring the resource requirements of DNSSEC Olaf M. Kolkman RIPE NCC / NLnet Labs October, RIPE- Executive Summary We measured the effects of deploying DNSSEC on CPU, memory and bandwidth consumption
More informationInternet Engineering Task Force (IETF) Request for Comments: Category: Best Current Practice. Parsons November 2016
Internet Engineering Task Force (IETF) Request for Comments: 8027 BCP: 207 Category: Best Current Practice ISSN: 2070-1721 W. Hardaker USC/ISI O. Gudmundsson CloudFlare S. Krishnaswamy Parsons November
More informationInternet Engineering Task Force (IETF) Request for Comments: 6725 Category: Standards Track August 2012 ISSN:
Internet Engineering Task Force (IETF) S. Rose Request for Comments: 6725 NIST Category: Standards Track August 2012 ISSN: 2070-1721 Abstract DNS Security (DNSSEC) DNSKEY Algorithm IANA Registry Updates
More informationDITL George Michaelson APNIC
DITL 2008 2009 George Michaelson APNIC ggm@apnic.net ABOUT APNIC The DG The Chief Scientist Office life at APNIC Apologies to ESNOG attendees You ve seen (most) of it before. but there are some new bits.
More informationK-Root Nameserver Operations
K-Root Nameserver Operations Andrei Robachevsky Chief Technical Officer andrei@ripe.net 1 Outline Root Server System What is a root server? Where is the root? Anycast Routing The basics Advantages of using
More informationNetwork Working Group Request for Comments: 5702 Category: Standards Track October 2009
Network Working Group J. Jansen Request for Comments: 5702 NLnet Labs Category: Standards Track October 2009 Abstract Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC This
More informationNote: This document is still a draft, the research is not completed. Abstract
K-root measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-001 February 17, 2010 Note: This document is still a draft, the research is not completed. Abstract Enabling DNSSEC at the root
More information4. Performance Specifications. 4.1 Goals and intentions of Service Level Agreements and Public Service Monitoring. Goals of Service Level Agreements:
4. Performance Specifications 4.1 Goals and intentions of Service Level Agreements and Public Service Monitoring Goals of Service Level Agreements: Service Level Agreements are set between ICANN and Registry
More informationccnso IANAWG: DNSSEC BRIEFING and Root Zone Signing (Part I) Date: 4th February 2008
ccnso IANAWG: DNSSEC BRIEFING and Root Zone Signing (Part I) Date: 4th February 2008 Summary This document is the first part of a briefing from the ccnso IANA Working Group about DNSSEC, provided in response
More informationA Look at RFC 8145 Trust Anchor Signaling for the 2017 KSK Rollover
A Look at RFC 8145 Trust Anchor Signaling for the 2017 KSK Rollover Duane Wessels DNS-OARC 26 San Jose, CA September 29, 2017 Background 2 2017 Root Zone KSK Rollover October 11, 2017! Root zone DNSKEY
More informationRoot & TLD DNSSEC. Early Deployment Observations. Edward Lewis NANOG 56 October 23, Neustar, Inc.
Root & TLD DNSSEC Early Deployment Observations Edward Lewis ed.lewis@neustar.biz NANOG 56 October 23, 2012 1 Introduction» DNSSEC is an extension to DNS to add some security to the system, "in the works"
More informationIPv6 How-To for a Registry 17th CENTR Technical Workshop
IPv6 How-To for a Registry 17th CENTR Technical Workshop Amsterdam, October 2007 Alvaro Vives (alvaro.vives@consulintel.es) Jordi Palet (jordi.palet@consulintel.es) Introduction Main steps to be undertaken
More informationRSSAC028 Technical Analysis of the Naming Scheme Used For Individual Root Servers
RSSAC028 Technical Analysis of the Naming Scheme Used For Individual Root Servers An Advisory from the ICANN Root Server System Advisory Committee (RSSAC) 3 August 2017 Preface This is a report to the
More information2017 DNSSEC KSK Rollover. DSSEC KSK Rollover
2017 DNSSEC KSK Rollover 2017 Edward Lewis DSSEC KSK Rollover APNIC 44 Edward.Lewis@icann.org FIRST TC September 11, 2017 13 September 2017 DNSSEC Signing vs. Validation DNS Security Extensions Digital
More informationThat KSK Roll. Geoff Huston APNIC Labs
That KSK Roll Geoff Huston APNIC Labs The DNS may look simple But with the DNS, looks are very deceiving So lets talk DNSSEC DNSSEC introduces digital signatures into the DNS It allows a DNS resolver to
More informationRolling the Root Zone DNSSEC Key Signing Key Edward Lewis AFRINIC25 November 2016
Rolling the Root Zone DNSSEC Key Signing Key Edward Lewis AFRINIC25 November 2016 edward.lewis@icann.org 1 Motivation for this talk ICANN is about to change an important configuration parameter in DNSSEC
More informationDomain Name System (DNS)
Domain Name System (DNS) Computer Networks Lecture 9 http://goo.gl/pze5o8 Domain Name System Naming service used in the Internet Accomplishes mapping of logical ("domain") names to IP addresses (and other
More informationOperations, Analysis and Research Center for the Internet Co-ordination centre to protect Global DNS infrastructure Trusted, neutral environment for
Recent DNS Events and OARC Activities Keith Mitchell OARC Programme Manager Internet Systems Consortium RIPE54 DNS WG Tallinn, Estonia May 2007 What is OARC? Operations, Analysis and Research Center for
More informationRoot KSK Roll Delay Update
Root KSK Roll Delay Update Data is good! David Conrad, CTO (channeling Roy Arends, ICANN Principal Research Scientist) 12 November 2017 1 Background When you validate DNSSEC signed DNS records, you need
More informationDNSSEC KSK-2010 Trust Anchor Signal Analysis
DNSSEC KSK-2010 Trust Anchor Signal Analysis MAPRG @ IETF102 1 Overview Background: DNSSEC KSK rollover and plan Problems with the KSK rollover Case study analysis: difficulty in identifying old Trust
More informationImpact on Root Server Operations and Provisioning
Impact on Root Server Operations and Provisioning Due to New Joe Abley & Kim Davies 2012 Impact'on'Root'Server'Operations'and'Provisioning'Due'to'New'gTLDS'June'2012' ' ' Table&of&Contents& Management&Summary&...&4!
More informationExpires: June 16, 2004 VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST December 17, 2003
DNS Extensions Internet-Draft Expires: June 16, 2004 R. Arends Telematica Instituut M. Larson VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST December 17, 2003 Protocol Modifications for the DNS
More informationMeasurements of traffic in DITL 2008
Measurements of traffic in DITL 2008 Sebastian Castro secastro@caida.org CAIDA / NIC Chile 2008 OARC Workshop Sep 2008 Ottawa, CA Overview DITL 2008 General statistics Query characteristics Query rate
More informationDNSSEC Trust tree: (A) ---dnslab.org. (DS keytag: 9247 dig (DNSKEY keytag. ---org. (DS keytag: d
DNSSEC Trust tree: www.dnslab.org. (A) ---dnslab.org. (DNSKEY keytag: 7308 alg ---dnslab.org. (DNSKEY keytag: 9247 ---dnslab.org. (DS keytag: 9247 dig DNSSEC ---org. (DNSKEY keytag: 24209 a Domain Name
More informationICANN DNSSEC Workshop Comcast s Operational Experiences 14 March 2012
ICANN DNSSEC Workshop Comcast s Operational Experiences 14 March 2012 NATIONAL ENGINEERING & TECHNICAL OPERATIONS DNSSEC Deployment Status We began working on this in 2008 (see Bmeline) We completed our
More informationRolling the Root KSK. Geoff Huston. APNIC Labs. September 2017
Rolling the Root KSK Geoff Huston APNIC Labs September 2017 Will this break the Internet? Why? If we stuff up this trust anchor key roll then resolvers that perform DNSSEC validation will fail to provide
More informationAn Overview of DNSSEC. Cesar Diaz! lacnic.net!
An Overview of DNSSEC Cesar Diaz! cesar@ lacnic.net! 1 DNSSEC??? The DNS Security Extension (DNS SEC) attach special kind of information called criptographic signatures to the queries and response that
More informationTable of Contents DNS. Short history of DNS (1) DNS and BIND. Specification and implementation. A short history of DNS. Root servers.
Table of Contents Specification and implementation DNS Karst Koymans Informatics Institute University of Amsterdam (version 1.11, 2010/10/04 10:03:37) Tuesday, September 14, 2010 A short history of DNS
More informationRIPE NCC DNS Update. K-root and DNSSEC. Anand Buddhdev October 2018 RIPE 77
RIPE NCC DNS Update K-root and DNSSEC Anand Buddhdev October 2018 RIPE 77 K-root Status 63 instances (2 new since RIPE 76, in Vilnius and Lugansk) Response rate across all of K-root Capacity and usage
More informationA Case for Comprehensive DNSSEC Monitoring and Analysis Tools
A Case for Comprehensive DNSSEC Monitoring and Analysis Tools Casey Deccio Sandia National Laboratories ctdecci@sandia.gov Jeff Sedayao and Krishna Kant Intel Corporation {jeff.sedayao,krishna.kant}@intel.com
More information6 March 2012
6 March 2012 richard.lamb@icann.org www.majorbank.se=? 1.2.3.4 Get page Login page Username / Password Account Data DNS Resolver ISP www.majorbank.se = 1.2.3.4 DNS Server webserver www @ 1.2.3.4 Majorbank
More informationDNSSEC for ISPs workshop João Damas
DNSSEC for ISPs workshop João Damas (joao@isc.org) 1 Outline of workshop Brief intro to DNSSEC Overview of zone signing DNSSEC validation trust anchors validation impact of enabling validation debugging
More informationUpdate on the DLV Shutdown Vicky Risk ISC.org. source: flickr, lic cc 2.0 Marrakech Market by Jacky Jourdren
Update on the DLV Shutdown Vicky Risk ISC.org source: flickr, lic cc 2.0 Marrakech Market by Jacky Jourdren DLV, the DNS Lookaside Validator Created in 2006 To allow use of DNSSEC before root and TLDs
More informationInternet Engineering Task Force (IETF) April Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC
Internet Engineering Task Force (IETF) Request for Comments: 6605 Category: Standards Track ISSN: 2070-1721 P. Hoffman VPN Consortium W.C.A. Wijngaards NLnet Labs April 2012 Abstract Elliptic Curve Digital
More informationLab 6 Implementing DNSSEC
Lab 6 Implementing DNSSEC Objective: Deploy DNSSEC-signed zones. Background DNSSEC (or DNS Security Extensions) provide security to the zone files. Note: In the steps below, we are using myzone.net - our
More informationSecuring Routing: RPKI Overview. Mark Kosters Chief Technology Officer
Securing Routing: RPKI Overview Mark Kosters Chief Technology Officer Why are DNSSEC and RPKI important? Two of the most critical resources DNS Routing Hard to tell when resource is compromised Focus of
More informationDS TTL shortening experience in.jp
DS TTL shortening experience in.jp APRICOT2014 DNS Session 27 Feb 2014 Yoshiro YONEYA Copyright 2014 Japan Registry Services Co., Ltd. 1 What is DS? Establish a DNSSEC chain
More informationDNSSEC. Lutz Donnerhacke. db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb dig +dnssec e164.arpa. naptr
DNSSEC Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb dig +dnssec 1.6.5.3.7.5.1.4.6.3.9.4.e164.arpa. naptr 1 A protocol from better times An ancient protocol People were friendly and
More informationDNS SECurity Extensions technical overview
The EURid Insights series aims to analyse specific aspects of the domainname environment. The reports are based on surveys, studies and research developed by EURid in cooperation with industry experts
More informationDNSSEC Why, how, why now? Olaf Kolkman (NLnet Labs)
DNSSEC Why, how, why now? Olaf Kolkman (NLnet Labs) olaf@nlnetlabs.nl Stichting NLnet Labs page 2 Registrars/ Registrants DNS Architecture As friend secondary As ISP Cache server Registry DB primary As
More informationSome Lacunae in APNIC DNS Measurement. George Michaelson CAIDA WIDE Workshop Marina Del Ray 2006
Some Lacunae in APNIC DNS Measurement George Michaelson CAIDA WIDE Workshop Marina Del Ray 2006 Backtracking Same DNS measurement since 2001/2.. Re-installation of nameservers forced reinstallation of
More informationRoot Servers. Root hints file come in many names (db.cache, named.root, named.cache, named.ca) See root-servers.org for more detail
What is DNS? Systems to convert domain names into ip addresses: For an instance; www.tashicell.com 118.103.136.66 Reverse: 118.103.136.66 www.tashicell.com DNS Hierarchy Root Servers The top of the DNS
More informationSecurity Overlays on Core Internet Protocols DNSSEC and RPKI. Mark Kosters ARIN CTO
Security Overlays on Core Internet Protocols DNSSEC and RPKI Mark Kosters ARIN CTO Why are DNSSEC and RPKI Important Two critical resources DNS Routing Hard to tell if compromised From the user point of
More informationMAGPI: Advanced Services IPv6, Multicast, DNSSEC
MAGPI: Advanced Services IPv6, Multicast, DNSSEC Shumon Huque MAGPI GigaPoP & Univ. of Pennsylvania MAGPI Technical Meeting April 19th 2006, Philadelphia, PA 1 Outline A description of advanced services
More informationTHE BRUTAL WORLD OF DNSSEC
THE BRUTAL WORLD OF DNSSEC Patrik Fältström Head of Technology Netnod 1 Security Issues with DNS Zone Administrator Bad Data False Master Caching Resolver Zonefile Master Slave slave slave False Cache
More information