DNSSec-why - Richard Lamb
DNSSec-why - Richard Lamb
OECS ID effort
[email protected]
mydomainname.com
The Original Problem:
DNS Cache Poisoning Attack
www.majorbank.se = 1.2.3.4
www.majorbank.se=? DNS DNS
5.6.7.8 Resolver Server ENTERPRISE
Attacker
www.majorbank.se = 5.6.7.8
Get page Attacker
Login page webserver
Username / Password www @
Error 5.6.7.8
ISP /
ENTERPRISE /
END NODE Password database
Animated slide
detailed description at: http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
Argghh! Now all ISP customers get
sent to attacker.
www.majorbank.se = 1.2.3.4
www.majorbank.se=? DNS DNS
5.6.7.8 Resolver Server
Password database
Animated slide
The Bad: DNSChanger - ‘Biggest
Cybercriminal Takedown in History’ –
4M machines, 100 countries, $14M
Animated slide
The Good: Resolver only caches
validated records
www.majorbank.se = 1.2.3.4
www.majorbank.se=? DNS DNS
1.2.3.4 Resolver Server with
with DNSSEC
DNSSEC
Get page
Login page webserver
Username / Password www @
Account Data 1.2.3.4
ISP / ENTERPRISE
ENTERPRISE /
END NODE
Animated slide
The Business Case for DNSSEC
• Cyber security is becoming a greater concern to
enterprises, government, and end users. DNSSEC
is a key tool and differentiator.
• DNSSEC is the biggest security upgrade to
Internet infrastructure in over 20 years. It is a
platform for new security applications (for those
that see the opportunity).
• DNSSEC infrastructure deployment has been brisk
but requires expertise. Getting ahead of the
curve is a competitive advantage.
DNSSEC interest from governments
• Sweden, Brazil, Netherlands, Czech Republic and
others encourage DNSSEC deployment to varying
degrees
• Mar 2012 - AT&T, CenturyLink (Qwest), Comcast,
Cox, Sprint, TimeWarner Cable, and Verizon have
pledged to comply and abide by US FCC [1]
recommendations that include DNSSEC.. “A report by
Gartner found 3.6 million Americans getting redirected to bogus
websites in a single year, costing them $3.2 billion.,”[2].
• 2008 US .gov mandate. >60% operational. [3]
*COMCAST Internet (18M), TeliaSonera SE, Sprint,Vodafone CZ,Telefonica CZ, T-mobile NL, SurfNet NL, SANYO Information
Technology Solutions JP, others..
**Int’l bottom-up trust model /w 21 TCRs from: TT, BF, RU, CN, US, SE, NL, UG, BR, Benin, PT, NP, Mauritius, CZ, CA, JP, UK, NZ…
*** Partial list of registrars: https://www.icann.org/en/news/in-focus/dnssec/deployment
But…
• But deployed on < 1% (~2M) of 2nd level
domains. Many have plans. Few have taken
the step (e.g., yandex.com, paypal.com*,
comcast.com).
• DNSChanger and other attacks highlight
today’s need. (e.g end-2-end DNSSEC validation
would have avoided the problems)
• Innovative security solutions (e.g., DANE)
highlight tomorrow’s value.
* http://fedv6-deployment.antd.nist.gov/cgi-bin/generate-com
http://www.thesecuritypractice.com/the_security_practice/2011/12/all-paypal-domains-are-now-using-dnssec.html
http://www.nacion.com/2012-03-15/Tecnologia/Sitios-web-de-bancos-ticos-podran-ser-mas-seguros.aspx
DNSSEC: So what’s the problem?
• Not enough IT departments know about it or
are too busy putting out other fires.
Network security
DANE and other yet to be IPSECKEY RFC4025 E-mail security
discovered security DKIM RFC4871
innovations, enhancements, Securing VoIP
and synergies Login security
Domain Names SSHFP RFC4255
https://www.eff.org/observatory
http://royal.pingdom.com/2011/01/12/internet-2010-in-numbers/
Opportunity: New Security Products
• Improved Web SSL and certificates for all*
• Secured e-mail (S/MIME) for all*
• Validated remote login SSH, IPSEC*
• Securing VoIP
• Cross organizational digital identity systems
• Secured content delivery (e.g. configurations,
updates, keys)
• Securing Smart Grid efforts
• A global PKI
• Increasing trust in e-commerce
A good ref http://www.internetsociety.org/deploy360/dnssec/
*IETF standards complete or currently being developed
Hmm…how do I trust it?
ICANN DNSSEC Deployment @Root
• Multi-stakeholder, bottom-up trust model* /w 21
crypto officers from around the world
• Broadcast Key Ceremonies and public docs
• SysTrust audited
• FIPS 140-2 level 4 HSMs
Root DPS
DNSSEC Practice Statement
ICANN DNSSEC Deployment @Root
(and elsewhere)
DCID 6/9
http://www.flickr.com/photos/kjd/sets/72157624302045698/
DNS
Server
Animated slide . (Root)