18
DNSSEC: Why, How, So What? Matt Larson, Chief Architect, Dyn

Matt Larson On DNSSEC: Why? How? So What?

  • View
    578

  • Download
    0

Embed Size (px)

DESCRIPTION

So what is DNSSEC? Why do people need to know about it? So what? Dyn Chief Architect Matt Larson talks about that and more in this 20 minute talk at the first-ever Geek Summer Camp. Watch the video here: http://dyn.wistia.com/medias/pl865m2qp7

Citation preview

Page 1: Matt Larson On DNSSEC: Why? How? So What?

DNSSEC: Why, How, So What?

Matt Larson, Chief Architect, Dyn

Page 2: Matt Larson On DNSSEC: Why? How? So What?

Security in DNS

• There isn’t any• OK, there wasn’t any• DNSSEC: The DNS Security Extensions

Page 3: Matt Larson On DNSSEC: Why? How? So What?

The Main Problem

• One packet for a query, one packet for a response

Page 4: Matt Larson On DNSSEC: Why? How? So What?

The Main Problem

• One packet for a query, one packet for a response

Page 5: Matt Larson On DNSSEC: Why? How? So What?

Who are you really?

• Client has to trust the source address• Source addresses can be spoofed

Page 6: Matt Larson On DNSSEC: Why? How? So What?

Who are you really?

Page 7: Matt Larson On DNSSEC: Why? How? So What?

Who are you really?

Page 8: Matt Larson On DNSSEC: Why? How? So What?

Possible Solutions

• Use a connection-oriented protocol• Sign the packets• Sign the DNS data

Page 9: Matt Larson On DNSSEC: Why? How? So What?

DNSSEC to the Rescue

1. All DNS data in a zone is signed2. Zones have public/private key pairs3. Your parent vouches for your public key

Page 10: Matt Larson On DNSSEC: Why? How? So What?

Delegation

Page 11: Matt Larson On DNSSEC: Why? How? So What?

Delegation

Page 12: Matt Larson On DNSSEC: Why? How? So What?

Delegation

Page 13: Matt Larson On DNSSEC: Why? How? So What?

Chain of Trust

Page 14: Matt Larson On DNSSEC: Why? How? So What?

Chain of Trust

Page 15: Matt Larson On DNSSEC: Why? How? So What?

Chain of Trust

Page 16: Matt Larson On DNSSEC: Why? How? So What?

Deploying DNSSEC

• Zones:– Sign DNS data– Send public key to parent

• Clients:– Configure trust anchor– Validate DNS responses

Page 17: Matt Larson On DNSSEC: Why? How? So What?

So What?

• No more spoofing

• Put stuff you really care about in DNS

Page 18: Matt Larson On DNSSEC: Why? How? So What?

Example: DANE