29
DNSSEC: Where We Are (and how we get to where we want to be) APNIC 34, Phnom Penh, Cambodia 2131 August 2012 [email protected]

DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

DNSSEC:    Where  We  Are  (and  how  we  get  to  where  we  want  to  be)  

 APNIC  34,  Phnom  Penh,  Cambodia    21-­‐31  August  2012  

[email protected]  

Page 2: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

DNSSEC:  We  have  passed  the  point  of  no  return  

•  Fast  pace  of  deployment  at  the  TLD  level    •  Deployed  at  root  •  Supported  by  soIware  •  Growing  support  by  ISPs  •  Required  by  new  gTLDs    à  Inevitable  widespread  deployment  across  core  Internet  infrastructure  

Page 3: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

The  Problem:    DNS  Cache  Poisoning  ABack  

www.majorbank.se=? DNS Resolver

www.majorbank.se = 1.2.3.4 DNS Server 5.6.7.8

Get page Attacker webserverwww @ 5.6.7.8

Username / Password Error

Attacker www.majorbank.se = 5.6.7.8

Login page

Password database

                 ISP  /  ENTERPRISE  /  END  NODE  

                                                           ENTERPRISE  

Animated  slide  

Page 4: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

www.majorbank.se=? DNS Resolver

www.majorbank.se = 1.2.3.4 DNS Server 5.6.7.8

Get page Attacker webserverwww @ 5.6.7.8

Username / Password Error

Login page

Password database

Argghh!  Now  all  ISP  customers  get  sent  to  aBacker.  

Animated  slide  

Page 5: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

Securing  The  Phone  Book  -­‐  DNS  Security  Extensions  (DNSSEC)  

www.majorbank.se=? DNS Resolver with DNSSEC

www.majorbank.se = 1.2.3.4 DNS Server with DNSSEC

1.2.3.4

Get page webserverwww @ 1.2.3.4

Username / Password Account Data

Login page

Attacker www.majorbank.se = 5.6.7.8

Attacker’s record does not validate – drop it

Animated  slide  

Page 6: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

Resolver  only  caches  validated  records  

www.majorbank.se=? DNS Resolver with DNSSEC

www.majorbank.se = 1.2.3.4 DNS Server with DNSSEC

1.2.3.4

Get page webserverwww @ 1.2.3.4

Username / Password Account Data

Login page

                 ENTERPRISE  

                 ISP  /  ENTERPRISE  /  END  NODE  

Animated  slide  

Page 7: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

DNSSEC:  Plenty  of  MoOvaOon  

•  DNSChanger  (Nov  2011),  calls  for  deployment  by  government,  etc…  

•  DANE  –  Improved  Web  TLS  and  certs  for  all  –  Email  S/MIME  for  all  

•  …and  –  SSH,  IPSEC,  VoIP  – Digital  idenWty  – Other  content  (e.g.  configuraWons,  XML,  app  updates)  –  Smart  Grid  – A  global  PKI  

A  good  ref  hBp://www.internetsociety.org/deploy360/dnssec/  

Page 8: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

The  BAD:  DNSChanger  -­‐  ‘Biggest  Cybercriminal  Takedown  in  History’  –  4M  machines,  100  countries,  $14M  

Nov  2011  hBp://krebsonsecurity.com/2011/11/malware-­‐click-­‐fraud-­‐kingpins-­‐arrested-­‐in-­‐estonia/                                                          End-­‐2-­‐end  DNSSEC  validaOon  would  have  avoided  the  problems  

Page 9: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

The  BAD:  Brazilian  ISP  fall  vicOm  to  a  series  of  DNS  aBacks    

7  Nov  2011  hBp://www.securelist.com/en/blog/208193214/Massive_DNS_poisoning_aBacks_in_Brazil                                                                                            End-­‐2-­‐end  DNSSEC  validaOon  would  have  avoided  the  problems  

Page 10: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

The  BAD:  Other  DNS  hijacks*  •  25  Dec  2010  -­‐  Russian  e-­‐Payment  Giant  ChronoPay  Hacked  •  18  Dec  2009  –  TwiBer  –  “Iranian  cyber  army”  •  13  Aug  2010  -­‐  Chinese  gmail  phishing  aBack  •  25  Dec  2010  Tunisia  DNS  Hijack  •  2009-­‐2012  google.*  

–  April  28  2009  Google  Puerto  Rico  sites  redirected  in  DNS  aBack  –  May  9  2009  Morocco  temporarily  seize  Google  domain  name  

•  9  Sep  2011  -­‐  Diginotar  cerOficate  compromise  for  Iranian  users    •  SSL  /  TLS  doesn't  tell  you  if  you've  been  sent  to  the  correct  site,  it  only  

tells  you  if  the  DNS  matches  the  name  in  the  cerOficate.  Unfortunately,  majority  of  Web  site  cerOficates  rely  on  DNS  to  validate  idenOty.  

•  DNS  is  relied  on  for  unexpected  things  though  insecure.  

*A  Brief  History  of  DNS  Hijacking  -­‐  Google  hBp://costarica43.icann.org/meeOngs/sanjose2012/presentaOon-­‐dns-­‐hijackings-­‐marquis-­‐boire-­‐12mar12-­‐en.pdf  

Page 11: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

DNSSEC  support  from  government  

•  Sweden,  Brazil,  and  others  encourage  DNSSEC  deployment  

•  Mar  2012  -­‐  AT&T,  CenturyLink  (Qwest),  Comcast,  Cox,  Sprint,  TimeWarner  Cable,  and  Verizon  have  pledged  to  comply  and  abide  by  US  FCC  [1]  recommendaWons  that  include  DNSSEC..  “A  report  by  Gartner  found  3.6  million  Americans  gegng  redirected  to  bogus  websites  in  a  single  year,  cosWng  them  $3.2  billion.,”[2].  

•  2008  US  .gov  mandate.    >60%  operaWonal.  [3]  [1]  FCC=Federal  CommunicaOons  Commission=US  communicaOons  Ministry    [2]  hBp://securitywatch.pcmag.com/security/295722-­‐isps-­‐agree-­‐to-­‐fcc-­‐rules-­‐on-­‐anO-­‐botnet-­‐dnssec-­‐internet-­‐rouOng      [3]  hBp://www.whitehouse.gov/sites/default/files/omb/memoranda/fy2008/m08-­‐23.pdf  

Page 12: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

DNSSEC  =  Global  PKI  

CA  CerWficate  roots  ~1482  

Login  security  SSHFP  RFC4255  

Yet  to  be  discovered  security  innovaWons,  enhancements,  and  synergies  

Content  security  Commercial  SSL  CerWficates  for  Web  and  e-­‐mail  

Content  security  “Free  SSL”  cerWficates  for  Web  and  e-­‐mail  and  “trust  agility”  (DANE)  

Network  security  IPSECKEY  RFC4025  

Cross-­‐organizaWonal  and  trans-­‐naWonal  idenWty  and  authenWcaWon  

E-­‐mail  security    DKIM  RFC4871  

DNSSEC  root  -­‐  1  

Domain  Names  

Securing  VoIP  

hqps://www.eff.org/observatory  hqp://royal.pingdom.com/2011/01/12/internet-­‐2010-­‐in-­‐numbers/  

Page 13: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

DNSSEC:  Where  we  are  

*COMCAST  Internet  (18M),  TeliaSonera  SE,  Sprint,Vodafone  CZ,Telefonica  CZ,  T-­‐mobile  NL,  SurfNet  NL,  SANYO  InformaWon  Technology  SoluWons  JP,  others..    

•   Deployed  on  92/315  TLDs  (.asia,  .tw  台灣 台湾,  .kr  한국,  .jp,  .in,  .lk,  .kg,  .tm,  .am,  .mm,  .ua,  .cr,  .cz,  .br,  .se,  .uk,  .fr,  .com,  .q,  …post)  

•  Root  signed**  and  audited  •  >84%  of  domain  names  could  have  DNSSEC  •  Growing  ISP  support*  •  3rd  party  signing  soluWons  are  appearing  (e.g.,  GoDaddy,  VeriSign,  Binero,…)  

•  Unbound,  BIND,  DNSSEC-­‐trigger,  vsResolver  and  other  s/w  support  and  secure  last-­‐mile  

•  IETF  DANE  CerWficate  support  RFC  almost  out  **21  TCRs  from:  TT,  BF,  RU,  CN,  US,  SE,  NL,  UG,  BR,  Benin,  PT,  NP,  MauriWus,  CZ,  CA,  JP,  UK,  NZ  

Page 14: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

But…  

•  But  deployed  on  <  1%  of  2nd  level  domains.    Many  have  plans.  Few  have  taken  the  step  (e.g.,  yandex.com,  paypal.com*,  comcast.com).  

•  DNSChanger  and  other  aqacks  highlight  today’s  need.  (e.g  end-­‐2-­‐end  DNSSEC  validaWon  would  have  avoided  the  problems)  

•  InnovaWve  security  soluWons  (e.g.,  DANE)  highlight  tomorrow’s  value.  

   *  hBp://fedv6-­‐deployment.antd.nist.gov/cgi-­‐bin/generate-­‐com  hBp://www.thesecuritypracOce.com/the_security_pracOce/2011/12/all-­‐paypal-­‐domains-­‐are-­‐now-­‐using-­‐dnssec.html  hBp://www.nacion.com/2012-­‐03-­‐15/Tecnologia/SiOos-­‐web-­‐de-­‐bancos-­‐Ocos-­‐podran-­‐ser-­‐mas-­‐seguros.aspx  

Page 15: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

DNSSEC:  So  what’s  the  problem?  

•  Not  enough  enterprise  IT  departments  know  about  it  or  are  busy  pugng  out  other  fires.  

•  When  they  do  look  into  it  they  hear  FUD  and  lack  of  turnkey  soluWons.  

•   Registrars/DNS  providers  see  no  demand      

Page 16: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

Barriers  to  success  •  Lack  of  Awareness  at  enterprise  and  customer  level  (e.g.,  security  

implicaWons)  •  Lack  of  Registrar  support*  and/or  experWse  or  turn-­‐key  soluWons  

–  Chicken  and  egg  –  JusWfying  cost  

•  ImplementaWon  F.U.D.  –  Security/crypto/key  management/complexity  –  Effect  on  exisWng  enterprise  operaWons:  e.g.  expiry,  LB,  CDN,  etc..  

•  Un-­‐trustworthy  deployment  –  Yet  another  security  thing  to  manage:  “email  the  keys  to  everyone”  –  Insecure  pracWces  and  processes  –  Garbage  in,  garbage  out  -­‐  what  does  signing  my  zone  buy  me?    

*ParOal  list  of  Registrars  supporOng  DNSSEC    hBp://www.icann.org/en/news/in-­‐focus/dnssec/deployment  

Page 17: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

"What  You  Can  Do"    

•  Raise  Awareness  of  DNSSEC  and  its  security  value  in  your  enterprises.  Deploy  on  your  domain  names  –  it  is  “a  feature”.  

•  Start  DNSSEC  implementaWon  early,  combine  with  other  upgrades.    Later,  offer  hosWng  as  a  service.  

•  At  minimum  ensure  network  and  resolvers  pass  DNSSEC  responses  to  end  users  unscathed  to  allow  validaWon  to  occur  there.  

Page 18: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

SoluOons  •  Raise  awareness  of  domain  holders,  end  users,  h/w+s/w  vendors  [1]  

–  Point  to  improved  security  as  differenWator  and  the  disadvantage  of  not  adopWng  –  New  opportuniWes  for  O/S  (mobile  and  desktop)  and  browser  vendors  –  Added  security  for  hardware  products  (e.g.,  validator  in  CPE)  –  Meet  with  Registrars  and  DNS  providers  

•  Ease  ImplementaWon:    –  Take  advantage  of  DNSSEC  training[2]  and  learn  from  exisWng  implementaWons  –  Automate  key  management  and  monitoring  –  Crypto:  HSM?  Smartcard?  TPM  chip?  SoI  keys?  -­‐  all  good  –  Seek  “click  and  sign”  interface  simplicity  –  Start  implementaWon  early  since  to  get  ahead  in  learning  curve  –  For  ISPs,  at  minimum  ensure  validaWon  can  occur  downstream  to  support  end2end  security  

•  Make  it  trustworthy:    –  Transparent  and  secure  processes  and  pracWces  –  WriWng  a  DPS  creates  the  right  mindset  for:  

•  SeparaWon  of  duWes  •  Documented  procedures  •  Audit  logging  

–  Opportunity  to  improve  overall  operaWons  using  DNSSEC  as  an  excuse  [3]  

[1]  DNSSEC.jp  and  other  groups  are  excellent  examples  [2]  APNIC,  NSRC,  ISOC,  ICANN  offer  training  [3]  ENISA  report  on  DNSSEC  deployment  

Page 19: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

Trustworthy  ImplementaOon  

Page 20: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

Building  in  security  

•  Gegng  the  machinery  for  DNSSEC  is  easy  (BIND,  NSD/Unbound,  OpenDNSSEC,  etc..).  

 •  Finding  good  security  pracWces  to  run  it  is  not.  

Page 21: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

•  The  good:  –  The  people  –  The  mindset  –  The  pracWces  –  The  legal  framework  –  The  audit  against  internaWonal  accounWng  and  technical  standards  

•  The  bad:  –  Diluted  trust  with  a  race  to  the  boqom  (>1400  CA’s)  –   DigiNotar  

•  Weak  and  inconsistent  polices  and  controls  •  Lack  of  compromise  noWficaWon  (non-­‐transparent)  •  Audits  don’t  solve  everything  (ETSI  audit)  

Learn  from  CA  successes    (and  mistakes)  

Page 22: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

An  implementaOon  can  be  thi$  

Page 23: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

+

…or  this            

Page 24: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

..or  this    (CR  NIC)  

Offline  Laptop  with  TPM  

Online/off-­‐net  DNSSEC  Signer  

with  TPM  

Generate  ZSKs  

Transport  public  half  of  

ZSKs  

Generate  KSK  

Sign  ZSKs  with  KSK  

Transport  KSK  signed  DNSKEY  

RRsets   Sign  zones  with  ZSK  

signed  zone  

unsigned  zone  

ZSKs  

KSK  

Secure  Off-­‐line  Environment  

Animated  slide  

Page 25: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

KSK  on  FD  

RNG  

laptop  

Live  O/S  DVD  

SAFE  RACK  CAGE  DATA  CENTER  

All  in  tamper  evident  bags  

RACK  CAGE  

DATA  CENTER  

signer  

firewall  

zonefile   ZSKs  

FD  with  public  ZSKs  

FD  with  KSK  signed  DNSKEY  RRsets  

hidden  master  

…or  even  this  Off-­‐line  

Off-­‐net  

Page 26: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

But  all  must  have:  •  Published  pracWce  statement  – Overview  of  operaWons  –  Segng  expectaWons  

•  Normal  •  Emergency  

–  LimiWng  liability  •  Documented  procedures  •  MulW  person  access  requirements  •  Audit  logs  •  Monitoring  (e.g.,  for  signature  expiry)  •  Good  Random  Number  Generators  

DRBGs  FIPS  140  

Intel  RdRand  

Useful  IETF  RFCs:  DNSSEC  OperaOonal  PracOces    hBp://tools.iey.org/html/draz-­‐iey-­‐dnsop-­‐rfc4641bis  A  Framework  for  DNSSEC  Policies  and  DNSSEC  PracOce  Statements  hBp://tools.iey.org/html/draz-­‐iey-­‐dnsop-­‐dnssec-­‐dps-­‐framework  

Page 27: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

Summary  

•  DNSSEC  has  leI  the  starWng  gate  but  without  greater  support  by  Registrars,  demand  from  domain  name  holders  and  trustworthy  deployment  by  operators,  it  will  die  on  the  vine  

•  Building  awareness  amongst  a  larger  audience  based  on  recent  aqacks  and  increased  interest  in  cyber  security  may  be  one  soluWon  

•  Drawing  on  lessons  learned  from  cerWficate  authoriWes  and  other  exisWng  sources  of  trust  on  the  Internet  can  make  DNSSEC  a  source  of  innovaWon  and  opportunity  for  all  

Page 28: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

OECS  ID  effort  

Page 29: DNSSEC:’’Where’We’Are’(and’how’ …...Resolver’only’caches’validated’records’ =? DNS Resolver with DNSSEC = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page

The  Internet’s  Phone  Book  -­‐  Domain  Name  System  (DNS+DNSSEC)  

www.majorbank.se=?

Get page webserverwww @ 1.2.3.4

Username / Password Account Data

DNS Resolver

www.majorbank.se = 1.2.3.4 DNS Server 1.2.3.4

Login page

ISP/  HotSpot  /  Enterprise/  End  Node  

Majorbank.se (Registrant)  

DNS Server

.se (Registry)  

DNS Server . (Root)  Animated  slide