46
Internet Society © 1992– 2016 The role of the Internet Society (this report describes the timeline of activities of the Internet Society from the submission of the proposal to NTIA in March 2016 until September 30, 2016) The IANA Stewardship Transition Kathy Brown President & CEO October 6, 2016 Presentation title – Client name 1

ION Bucharest - Deploying DNSSEC

Embed Size (px)

Citation preview

Page 1: ION Bucharest - Deploying DNSSEC

Internet Society © 1992–2016

The role of the Internet Society(this report describes the timeline of activities of the Internet Society from the submission of the proposal to NTIA in March 2016 until September 30, 2016)

The IANA Stewardship Transition

Kathy BrownPresident & CEO

October 6, 2016

Presentation title – Client name 1

Page 2: ION Bucharest - Deploying DNSSEC

Internet Society © 1992–2016

ION BucharestOctober 12, 2016Dan York, CISSPDNSSEC Program Manager – [email protected]

Deploying DNSSEC

2

Page 3: ION Bucharest - Deploying DNSSEC

Trusted Internet

3

Trust in privacy of information (ex. encryption)Trust in online identity systems (ex. Kantara)Trust in network communication (ex. TLS, DANE)Trust in Internet identifiers (ex. DNSSEC)Trust in the Internet’s core infrastructure (ex. MANRS)Trust in cryptography (ex. Cryptech)

Page 4: ION Bucharest - Deploying DNSSEC

https://www.flickr.com/photos/powerbooktrance/466709245/ CC BY

Page 5: ION Bucharest - Deploying DNSSEC

Email Hijacking

CERT-CC researchers have identified that someone was hijacking email by using DNS cache poisoning of MX recordsCould be prevented by DNSSEC deploymentCERT-CC (Sept 10, 2014): — https://www.cert.org/blogs/certcc/post.cfm?EntryID=206Deploy360 blog post (Sept 12, 2014): — http://wp.me/p4eijv-5jI

Page 6: ION Bucharest - Deploying DNSSEC

What Problem Is DNSSEC Trying To Solve?

DNSSEC = "DNS Security Extensions"• Defined in RFCs 4033, 4034, 4035• Operational Practices: RFC 4641Ensures that the information entered into DNS by the domain name holder is the SAME information retrieved from DNS by an end user.Let's walk through an example to explain…

6

Page 7: ION Bucharest - Deploying DNSSEC

A Normal DNS Interaction

7

Web Server

Web Browse

r

https://example.com/

web page

DNS Resolver

example.com?1

2

3

4

10.1.1.123

Resolver checks its local cache. If it has theanswer, it sends it back. example.com 10.1.1.123If not…

Page 8: ION Bucharest - Deploying DNSSEC

A Normal DNS Interaction

8

Web Server

Web Browse

r

https://example.com/

web page

DNS Resolver

10.1.1.123

1 25

6

DNS Svrexample.co

m

DNS Svr.com

DNS Svrroot

3

10.1.1.1234

example.comNS

.comNS

example.com?

Page 9: ION Bucharest - Deploying DNSSEC

DNS Works On Speed

First result received by a DNS resolver is treated as the correct answer.

Opportunity is there for an attacker to be the first one to get an answer to the DNS resolver, either by:Getting to the correct point in the network to provide faster responses;Blocking the responses from the legitimate servers (ex. executing a Denial of Service attack against the legitimate servers to slow their responses)

9

Page 10: ION Bucharest - Deploying DNSSEC

Attacking DNS

10

Web Server

Web Browse

r

https://example.com/

web page

DNS Resolver

10.1.1.123

1 25

6

DNS Svrexample.co

m

DNS Svr.com

DNS Svrroot

3

192.168.2.24 Attackin

gDNS Svr

example.com

192.168.2.2

example.comNS

.comNS

example.com?

Page 11: ION Bucharest - Deploying DNSSEC

A Poisoned Cache

11

Web Server

Web Browse

r

https://example.com/

web page

DNS Resolver1

2

3

4

192.168.2.2

Resolver cache now has wrong data: example.com 192.168.2.2

This stays in the cache until the Time-To-Live (TTL) expires!

example.com?

Page 12: ION Bucharest - Deploying DNSSEC

How Does DNSSEC Help?

DNSSEC introduces new DNS records for a domain:• RRSIG – a signature ("hash") of a set of DNS records• DNSKEY – a public key that a resolver can use to validate RRSIG

A DNSSEC-validating DNS resolver:Uses DNSKEY to perform a hash calculation on received DNS recordsCompares result with RRSIG records. If results match, records are the same as those transmitted. If the results do NOT match, they were potentially changed during the travel from the DNS server.

12

Page 13: ION Bucharest - Deploying DNSSEC

A DNSSEC Interaction

13

Web Server

Web Browse

r

https://example.com/

web page

DNS Resolver

10.1.1.123DNSKEYRRSIGs

1 25

6

DNS Svrexample.co

m

DNS Svr.com

DNS Svrroot

3

10.1.1.1234

example.com?

Page 14: ION Bucharest - Deploying DNSSEC

A DNSSEC Interaction

14

Web Server

Web Browse

r

https://example.com/

web page

DNS Resolver

10.1.1.123DNSKEYRRSIGs

1 25

6

DNS Svrexample.co

m

DNS Svr.com

DNS Svrroot

3

10.1.1.1234

example.comNSDS

.comNSDS

example.com?

Page 15: ION Bucharest - Deploying DNSSEC

The Global Chain of Trust

15

Web Server

Web Browse

r

https://example.com/

web page

DNS Resolver

10.1.1.123DNSKEYRRSIGs

1 25

6

DNS Svrexample.co

m

DNS Svr.com

DNS Svrroot

3

10.1.1.1234

example.comNSDS

.comNSDS

example.com?

Page 16: ION Bucharest - Deploying DNSSEC

Attempting to Spoof DNS

16

Web Server

Web Browse

r

https://example.com/

web page

DNS Resolver

10.1.1.123DNSKEYRRSIGs

1 25

6

DNS Svrexample.co

m

DNS Svr.com

DNS Svrroot

3Attackin

gDNS Svr

example.com

192.168.2.2DNSKEYRRSIGs

example.comNSDS

.comNSDS

example.com?

Page 17: ION Bucharest - Deploying DNSSEC

Attempting to Spoof DNS

17

Web Server

Web Browse

r

https://example.com/

web page

DNS Resolver

10.1.1.123DNSKEYRRSIGs

1 25

6

DNS Svrexample.co

m

DNS Svr.com

DNS Svrroot

3

SERVFAIL4 Attackin

gDNS Svr

example.com

192.168.2.2DNSKEYRRSIGs

example.comNSDS

.comNSDS

example.com?

Page 18: ION Bucharest - Deploying DNSSEC

What DNSSEC Proves:

• "These ARE the IP addresses you are looking for."(or they are not)

• Ensures that information entered into DNS by the domain name holder (or the operator of the DNS hosting service for the domain) is the SAME information that is received by the end user.

1805/01/2023

Page 19: ION Bucharest - Deploying DNSSEC

The Two Parts of DNSSEC

19

Signing Validating

ISPs

Enterprises

Applications

DNS Hosting

Registrars

Registries

Page 20: ION Bucharest - Deploying DNSSEC

What DNSSEC Proves:

• "These ARE the IP addresses you are looking for."(or they are not)

• Ensures that information entered into DNS by the domain name holder (or the operator of the DNS hosting service for the domain) is the SAME information that is received by the end user.

2005/01/2023

Page 21: ION Bucharest - Deploying DNSSEC

DNSSEC Validation – Current State

• About 15% of all global DNS queries validated

• ~20% of all European DNS queries validated

• All major DNS resolvers support DNSSEC validation – often with a simple config change

21

http://stats.labs.apnic.net/dnssec

Page 22: ION Bucharest - Deploying DNSSEC

DNSSEC Validation – Romania

22http://stats.labs.apnic.net/dnssec

Page 23: ION Bucharest - Deploying DNSSEC

DNSSEC Validation – Romania

23http://stats.labs.apnic.net/dnssec

Page 24: ION Bucharest - Deploying DNSSEC

DNSSEC Signing - The Individual Steps

24

Registry

Registrar

DNS Operator(or ”DNS Hosting Provider”)

Domain Name Registrant

• Signs TLD• Accepts DS records• Publishes/signs records• Accepts DS records• Sends DS to registry• Provides UI for mgmt• Signs zones• Publishes all records• Provides UI for mgmt

• Enables DNSSEC (unless automatic)

Page 25: ION Bucharest - Deploying DNSSEC

DNSSEC Signing – Current State

• Most TLDs now signed• including “new gTLDs”

• Common DNS servers all support DNSSEC

• Second-level domain support ranges from 100% in .BANK and 89% in .GOVdown to < 1% in .COM

• Still small % overall.

25

https://www.internetsociety.org/deploy360/dnssec/maps/

Page 26: ION Bucharest - Deploying DNSSEC

DNSSEC Signing – Second-level domains

26https://rick.eng.br/dnssecstat/

Page 27: ION Bucharest - Deploying DNSSEC

DNSSEC and TLS/SSL

27

Page 28: ION Bucharest - Deploying DNSSEC

Why Do I Need DNSSEC If I Have TLS?

• A common question: why do I need DNSSEC if I already have a SSL certificate? (or an "EV-SSL" certificate?)

• Transport Layer Security (TLS), sometimes called by its older name of “SSL”, solves a different issue – it provides encryption and protection of the communication between the browser and the web server

28

Page 29: ION Bucharest - Deploying DNSSEC

The Typical TLS Web Interaction

Web Server

Web Browse

r

https://example.com/

TLS-encryptedweb page

DNS Resolver

example.com?

10.1.1.1231

2

5

6DNS Svrexample.co

m

DNS Svr.com

DNS Svrroot

3

10.1.1.1234

Page 30: ION Bucharest - Deploying DNSSEC

The Typical TLS Web Interaction

Web Server

Web Browse

r

https://example.com/

TLS-encryptedweb page

DNS Resolver

10.1.1.1231

2

5

6DNS Svrexample.co

m

DNS Svr.com

DNS Svrroot

3

10.1.1.1234

Is this encrypted with the CORRECT

certificate?

example.com?

Page 31: ION Bucharest - Deploying DNSSEC

What About This?

31

Web Server

Web Browse

r

https://www.example.com/TLS-encrypted web pagewith CORRECT certificate

DNS Server

www.example.com?

1.2.3.41

2

Firewall(or

attacker)

https://www.example.com/

TLS-encrypted web pagewith NEW certificate(re-signed by firewall)

Page 32: ION Bucharest - Deploying DNSSEC

Problems?

32

Web Server

Web Browse

r

https://www.example.com/TLS-encrypted web pagewith CORRECT certificate

DNS Server

www.example.com?

1.2.3.41

2

Firewall

https://www.example.com/

TLS-encrypted web pagewith NEW certificate(re-signed by firewall)

Page 33: ION Bucharest - Deploying DNSSEC

Problems?

33

Web Server

Web Browse

r

https://www.example.com/TLS-encrypted web pagewith CORRECT certificate

DNS Server

www.example.com?

1.2.3.41

2

Firewall

https://www.example.com/

Log files or other

serversPotentially including personal information

TLS-encrypted web pagewith NEW certificate(re-signed by firewall)

Page 34: ION Bucharest - Deploying DNSSEC

Issues

• A Certificate Authority (CA) can sign ANY domain.• Now over 1,500 CAs – there have been compromises where valid

certs were issued for domains.• Middle-boxes such as firewalls can re-sign sessions.

34

Page 35: ION Bucharest - Deploying DNSSEC

DNS-Based Authentication of Named Entities (DANE)

Q: How do you know if the TLS (SSL) certificate is the correct one the site wants you to use?A: Store the certificate (or fingerprint) in DNS (new TLSA record) and sign them with DNSSEC.

An application that understand DNSSEC and DANE will then know when the required certificate is NOT being used.Certificate stored in DNS is controlled by the domain name holder. It could be a certificate signed by a CA – or a self-signed certificate.

35

Page 36: ION Bucharest - Deploying DNSSEC

A Powerful Combination

• TLS = encryption + limited integrity protection• DNSSEC = strong integrity protection

• How to get encryption + strong integrity protection?

• TLS + DNSSEC = DANE

36

Page 37: ION Bucharest - Deploying DNSSEC

DANE

37

Web Server

Web Browse

rw/DANE

https://example.com/TLS-encrypted web pagewith CORRECT certificate

DNS Server

10.1.1.123DNSKEYRRSIGsTLSA

12Firewall

(or attacker)

https://example.com/

TLS-encrypted web pagewith NEW certificate(re-signed by firewall)

Log files or other

servers DANE-equipped browsercompares TLS certificatewith what DNS / DNSSECsays it should be.

example.com?

Page 38: ION Bucharest - Deploying DNSSEC

DANE Success – Not Just For The Web

SMTP1000+ SMTP servers with TLSA recordshttp://dane.sys4.de/ - testing service

XMPP (Jabber)400+ serversclient-to-server & server-to-serverhttps://xmpp.net/reports.php#dnssecdane

38

Page 39: ION Bucharest - Deploying DNSSEC

DANE Resources

DANE Overview and Resources: http://www.internetsociety.org/deploy360/resources/dane/IETF Journal article explaining DANE: http://bit.ly/dane-dnssecRFC 6394 - DANE Use Cases: http://tools.ietf.org/html/rfc6394RFC 6698 – DANE Protocol: http://tools.ietf.org/html/rfc6698

39

Page 40: ION Bucharest - Deploying DNSSEC

DNS Privacy

40

Page 41: ION Bucharest - Deploying DNSSEC

DNS Privacy

• Issue - Queries from local DNS “stub resolver” (in PC, laptop, smartphone) to local DNS resolver are sent in clear

• Surveillance of those queries can be revealing

• Solution – Encrypt the connection

Page 42: ION Bucharest - Deploying DNSSEC

DNS Privacy

42

Web Server

Web Browse

r

https://example.com/

web page

DNS Resolver

10.1.1.123

1 25

6

DNS Svrexample.co

m

DNS Svr.com

DNS Svrroot

3

10.1.1.1234

example.comNS

.comNS

example.com?

Page 43: ION Bucharest - Deploying DNSSEC

DNS Privacy – Work Underway Now

• IETF “DPRIVE” Working Group

• New standards emerging– DNS queries over TLS

• Expect to see implementations in software and operating systems in the future

Page 44: ION Bucharest - Deploying DNSSEC

Business Reasons For Deploying DNSSEC

• TRUST – You can be sure your customers are reaching your sites – and that you are communicating with their servers.

• SECURITY – You can be sure you are communicating with the correct sites and not sharing business information with attackers, ex. email hijacking.

• INNOVATION – Services such as DANE built on top of DNSSEC enable innovative uses of TLS certificates.

• CONFIDENTIALITY – DANE enables easier use of encryption for applications and services that communicate across the Internet.

44

Page 45: ION Bucharest - Deploying DNSSEC

Three Requests For Attendees

1. Deploy DNSSEC validation (or ask your IT team / network operator)

2. Sign your domains• Work with your registrar and/or DNS hosting provider to make this happen.

3. Help promote support of DANE protocol• Let browser vendors and others know you want to use DANE. If you use

SSL, deploy a TLSA record if you are able to do so. Help raise awareness of how DANE and DNSSEC can make the Internet more secure.

Page 46: ION Bucharest - Deploying DNSSEC

Visit us atwww.internetsociety.orgFollow us@internetsociety

Galerie Jean-Malbuisson 15, CH-1204 Geneva, Switzerland.+41 22 807 1444

1775 Wiehle Avenue, Suite 201, Reston, VA 20190-5108 USA. +1 703 439 2120

Thank you.

46

Dan YorkSenior Content Strategist – [email protected]