Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002...

89
Copyright © 2002 Nominum, Inc. 1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION: Q.1/2 SOURCE: TSB TITLE: INTRODUCTION TO SECURE DNS (by Jim Reid) The purpose of this document is to provide some basic introductory material on security features of the Domain Name System (DNS)

Transcript of Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002...

Page 1: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 1

Information Document 17-E

ITU-T Study Group 2May 2002

QUESTION: Q.1/2

SOURCE: TSB

TITLE: INTRODUCTION TO SECURE DNS (by Jim Reid)

The purpose of this document is to provide some basic introductory material on security features of the Domain Name System (DNS)

Page 2: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Introduction to Secure DNS

Page 3: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 3

Introduction

• Explaining the problem• Weaknesses in the DNS resolution process• Attacks on the name servers

- Consequences of those attacks- Spoofing, mangled DNS answers

• Solutions to the problem- Transaction Signatures (TSIG)- DNS Security Extensions (DNSSEC)

Page 4: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 4

What’s the IP address of

www.nominum.com?

The Resolution Process• The workstation annie asks its configured

name server, dakota, for www.nominum.com’s address

ping www.nominum.com.annie.west.sprockets.com

dakota.west.sprockets.com

Page 5: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 5

ping www.nominum.com.

The Resolution Process

• Let’s look at the resolution process step-by-step:

annie.west.sprockets.com

Page 6: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 6

The Resolution Process

• The name server dakota asks a root name server, m, for www.nominum.com’s address

ping www.nominum.com.annie.west.sprockets.com

m.root-servers.net

dakota.west.sprockets.com

What’s the IP address of

www.nominum.com?

Page 7: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 7

The Resolution Process• The root server m refers dakota to the com name

servers

• This type of response is called a “referral”

ping www.nominum.com.annie.west.sprockets.com

m.root-servers.net

dakota.west.sprockets.com Here’s a list of the com name servers.

Ask one of them.

Page 8: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 8

The Resolution Process

• The name server dakota asks a com name server, f, for www.nominum.com’s address

ping www.nominum.com.annie.west.sprockets.com

m.root-servers.net

dakota.west.sprockets.com

What’s the IP address of

www.nominum.com?

f.gtld-servers.net

Page 9: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 9

The Resolution Process

• The com name server f refers dakota to the nominum.com name servers

ping www.nominum.com.annie.west.sprockets.com

f.gtld-servers.net

m.root-servers.net

dakota.west.sprockets.com

Here’s a list of the nominum.com name servers.

Ask one of them.

Page 10: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 10

The Resolution Process

• The name server dakota asks an nominum.com name server, ns1.sanjose, for www.nominum.com’s address

ping www.nominum.com.annie.west.sprockets.com

f.gtld-servers.net

m.root-servers.net

dakota.west.sprockets.com

ns1.sanjose.nominum.net

What’s the IP address of

www.nominum.com?

Page 11: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 11

The Resolution Process

• The nominum.com name server ns1.sanjose responds with www.nominum.com’s address

ping www.nominum.com.annie.west.sprockets.com

f.gtld-servers.net

m.root-servers.net

dakota.west.sprockets.com

ns1.sanjose.nominum.netHere’s the IP address for

www.nominum.com

Page 12: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 12

Here’s the IP address for

www.nominum.com

The Resolution Process

• The name server dakota responds to annie with www.nominum.com’s address

ping www.nominum.com.annie.west.sprockets.com

f.gtld-servers.net

m.root-servers.net

dakota.west.sprockets.com

ns1.sanjose.nominum.net

Page 13: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 13

What’s Wrong With That?

• Nothing: it all works fine…..• BUT there’s no authentication at all!• A client can’t tell:

- Where an answer really came from- If the server that replied is telling the truth or not- If it received exactly what the server sent

Page 14: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 14

Cracking the DNS

• Bombard client with bogus answers- Guess what the answer might be

• Intercept an answer packet & modify it- Only works well if adjacent to client or server

• Set up a fake server for some zone- Trick other servers into querying the fake one

• Evil routing/peering tricks & hi-jack traffic- Inject bogus routes for the root servers (or the

servers for any other “interesting” zone)

Page 15: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 15

What Does This Mean?

• A DNS client can’t be sure of anything:- Did a lookup for www.nominum.com really get answered

by the nominum.com name servers?- Did it get what a real nominum.com name server

actually sent?- Is the server that answered telling the truth?

• Did we get the actual address of Nominum’s web server?

• Feel free to replace nominum.com with your favourite domain name….

Page 16: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 16

Transaction Signatures

The use of Transaction Signatures, TSIG,

is explained in this section

Page 17: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 17

Transaction Signatures (TSIG)

• Defined in RFC2845• Computed on the fly

- Not in zone files- Added to Additional Section of DNS replies

• Uses a shared secret and cryptographic hash functions- Currently HMAC-MD5

• Timestamps prevent replay attacks

Page 18: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 18

TSIG Overview

• "Lightweight" digital signature• Cryptographic hash of:

- DNS query or answer- Timestamp- Shared secret

• Can be anything (within reason)• Usually generated by dnssec-keygen• Use any tool that generates a base-64 encoded string

Page 19: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 19

Cryptographic Hash Functions

• Very strong checksums• Mathematically proven to have almost no chance

of a collision:- Different inputs cannot result in the same hash value

• MD5 hash of ASCII character 1- b026324c6904b2a9cb4b88d6d61c81d1

• MD5 hash of ASCII character 2- 26ab0db90d72e28ad0ba1e22ee510510

Page 20: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 20

TSIG Validation

• Other party knows:- Contents of DNS packet- Chosen crypto hash algorithm- Time of day (UTC)- Shared Secret

• It can compute the TSIG hash value- If the calculated hash matches the TSIG hash in DNS

packet, all is well- If not, something has gone wrong:

• Wrong timestamp• Different shared secret

Page 21: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 21

TSIG Shared Secret

• An obvious vulnerability- Has to remain secret

• Systems using TSIG should be under one administrative & operational control- Authenticating zone transfers?

• Many TLDs do this already

- Dynamic DNS update requests• DHCP server, nsupdate

Page 22: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 22

Using TSIGnamed.conf key{}, server{} statements:

key examplekey { algorithm hmac-md5; secret "pRP5FapFoJ95JEL06sv4PQ==";};server 10.9.8.7 { keys { examplekey; };};

Use examplekey to send/validate TSIGDNS packets to/from 10.9.8.7

Page 23: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 23

TSIG for Access Control• The name of a TSIG key can be used in a BIND

Access Control List:

allow-transfer { examplekey; };allow-update {127.0.0.1; examplekey; };

Zone transfers must be TSIG “signed”with examplekeyAccept dynamic updates from 127.0.0.1or if they're signed by examplekey

Page 24: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 24

TSIG and named.conf

• named.conf is usually world-readable- but TSIG keys should be kept secret

• Use an include statement- put the keys in a private file and include that:

include "/not/for/public/tsig-keys";

• Watch out for keys in core dumps or name server logs!

Page 25: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 25

TSIG and Dynamic Updates

• nsupdate - BIND utility for performing Dynamic DNS (DDNS)

updates

• nsupdate understands TSIG- Allows TSIG authentication of Dynamic Update

requests• Only sane way to authenticate them• Alternative is by (easily forged) IP address

Page 26: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 26

TSIG and DHCP

• ISC DHCP server understands TSIG too- Standards for DDNS and DHCP interaction still

to be completed by IETF

• Security considerations- Name server may trust DHCP daemon

• DHCP daemon may believe untrusted clients• Could insert illegal/unwanted hostnames into DNS

- TSIG "signatures" better than nothing

Page 27: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 27

dhcpd Updates with TSIG

Add to dhcpd.conf:key examplekey { algorithm HMAC-MD5.SIG-ALG.REG.INT; secret pRP5FapFoJ95JEL06sv4PQ==;};zone EXAMPLE.ORG. { primary 127.0.0.1; key examplekey;};Send dynamic updates for example.org to127.0.0.1 signed with examplekey TSIG key

Page 28: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 28

Timestamps and TSIG

• Transaction Signatures include a timestamp- Prevents replay attacks- Fuzz factor allows clocks to be out by up to a few

minutes

• Systems using TSIG should have their clocks synchronised- Should be running NTP anyway- Run Secure NTP if you're paranoid

• Or buy an atomic clock!

Page 29: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 29

Windows 2000

• Windows 2000 uses Dynamic DNS updates- Active Directory

• Does not use TSIG• Uses a proprietary mechanism, GSS-TSIG

- Based on “mangled” Kerberos tickets- GSS-TSIG proposed as IETF standard

• No second implementation (yet)

Page 30: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 30

Summary

• Transaction Signatures (TSIG) have been explained in this section:- How to use them for authentication

• clients, name servers, dynamic update requests

- Using them in BIND Access Control Lists- Timestamps mean clocks should be

synchronised- Windows 2000 issues

Page 31: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 31

Secure DNS (DNSSEC)

This section explains DNSSEC: Secure DNS- Rationale for DNSSEC

• What problems DNSSEC solves• What problems it does not solve• What problems DNSSEC creates

- KEY, SIG and NXT records- BIND9's DNSSEC utilities- Signing a zone

Page 32: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 32

Why Secure DNS?

• The DNS is not secure!!!• Servers could be lying

- Cache poisoning attacks

• Servers could be spoofed• Answers could be tampered with• UDP makes these attacks simple• This is what Secure DNS is designed to

solve

Page 33: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 33

What DNSSEC Does Not Do

• Prevent/thwart denial-of-service attacks• Stop name server compromises

- Buffer overflows• Run BIND9 to stop that!

- Environment variable leakages

• Confidentiality of DNS data- The DNS is public after all...

Page 34: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 34

What Secure DNS Proves

• Data authenticity- What was received was what the server sent

• Non-repudiation- Who/what signed the data

• Name server authenticity (in theory anyway)- An answer for foo.example.com comes from

the genuine name servers for example.com- Should be a chain of trust to the root

Page 35: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 35

The Chain of Trust

• Public key for nominum.com is signed with the private key for .com- .com “trusts” the nominum.com key

• Public key for .com is signed with the private key for the root- Root zone “trusts” the .com key

• Everyone trusts the root zone’s public key- Openly published- Built in to every name server?

Page 36: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 36

Validation Model

• Answer for ww.nominum.com is provably correct- It’s been signed with the nominum.com key- Nobody could have tampered with the data- The nominum.com key was signed by the key

for .com so the nominum.com key is OK- The .com key was signed by the root key so the

delegation to com can be trusted too- The root key is known and trusted by everyone

Page 37: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 37

Secure DNS Overview

• Defined in RFC2535 (DNSSEC)- Raft of enhancements & extensions since then:

• RFC2536, RFC2537, RFC2931, RFC3007, RFC3008, RFC3090, RFC3110, etc

• Three new resource records:- KEY, SIG and NXT

• Digital signatures of DNS data• Industrial-strength crypto:

- DSA, RSA, Diffie-Helman

Page 38: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 38

Public Key Cryptography

• Asymmetric encryption:- RSA, DSA- Public key and private key pairs

• Data encoded with public key can only be decoded with the corresponding private key and vice versa

- Digital signatures- Non-repudiation- Confidentiality

• Not used in DNSSEC!• DNS is supposed to be public after all

Page 39: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 39

DNSSEC Signatures

• Don't explicitly sign the actual DNS data- Sign a hash of the data instead (SHA1)- Less data to sign

• Names must be normalised to a canonical form:- All in lower-case- Fully qualified domain names- Handled automatically by the zone signing tool

Page 40: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 40

The KEY Record

• The public key component• Format:

name KEY flags proto algorithm pubkey

Page 41: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 41

- flags• What the key can be used for: authentication, zone,

user, etc

- proto• Protocol identifier: DNSSEC, IPsec, TLS, etc

- algorithm• Crypto algorithm: RSA, DSA

- pubkey • Base-64 public key

Page 42: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 42

An Example KEY Record

example.com. IN KEY 256 3 1 AQPOz/KyZAsaXxv8hbx+7lfgv4iP5twIQtyNGVnpBAMTbOykxKMJNrBdg41AufR4hItZIi76vbd0R1emEXvPpBAZ

• Public RSA zone key for DNSSEC called example.com

Page 43: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 43

The SIG Record

• A digital signature for some RRset- RRset: resource records with same name, class,

type and TTL

• Horribly complicated• Format:

name SIG type alg labels ottl sig-exp sig-inc key-tag signer sig

Page 44: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 44

- type • the RRset type that the SIG record signs• A, MX, SOA, etc

- alg• crypto algorithm• as in the KEY record

- labels• number of labels in the name that are signed• kludge for wildcards:

*.example.com

Page 45: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 45

- ottl• original TTL of signed RRset

- sig-exp• time when the signature expires

- sig-inc• time when the signature is valid from

Page 46: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 46

- key-tag• short-cut to identify the key• helps when there are 2 or more keys

- signer• name of the public key to validate the signature

- sig• base-64 encoding of signature

Page 47: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 47

An Example SIG Record

• example.com. 86400 SIG SOA ( 1 2 86400 2001072720082 20010627200820 42000 example.com. pGsWdt8qpm58kXDqkM8DLLKxjT8qqgTny9nY8jBHEiUAxGTV+i53fsIpVJOnWalUxbkP260OAR0bTHve4voN9g== )

• A SIG record for example.com's SOA record signed with the key for example.com

Page 48: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 48

The NXT Record

• For proving a name or RR type does not exist- Can't just sign NULL string!

• Format: name NXT next-name types- next-name

• Name of alphabetically next record in the zone• Last name points back to zone's SOA record

- types• Resource record types that exist for the name

Page 49: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 49

An Example NXT Record

• jim.example.com. NXT \ ns0.example.com A SIG NXT

- Next name in zone after jim.example.com is ns0.example.com.

- A, SIG and NXT records exist for jim.example.com

Page 50: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 50

Signing a Zone

• 4 steps:- Generate a key- Get parent to sign zone key- Incorporate parent's signature of zone key- Sign the zone

• Can self-sign when the parent zone is not DNSSEC-aware- e.g. self-sign example.com if com is not signed

Page 51: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 51

Stage 1: generate a key

• dnssec-keygenBIND utility for generating keys

can generate RSA, DSA, HMAC-MD5 keys

Uses entropy from operating system to generate random keys: large prime numbers

Page 52: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 52

Stage 2 - Make a Key Set• Use dnssec-makekeyset• Options:

- -s YYYYMMDDHHMMSS | +offset• SIG start time (absolute or relative)

- -e YYYYMMDDHHMMSS | +offset | "now" + offset• SIG end time (absolute or relative)

- -t ttl• TTL of generated RRs

• Arguments:- name of key file

Page 53: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 53

Stage 3 - Parent Zone Signs Child Zone’s Key

• Uses dnssec-signkey• Options:

- -s YYYYMMDDHHMMSS | +offset• SIG start time (absolute or relative)

- -e YYYYMMDDHHMMSS | +offset | "now" + offset

• SIG end time (absolute or relative)

Page 54: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 54

Stage 4 - Signing The Zone

• Add public key & parent’s signature of that key to the unsigned zone file

• Run dnssec-signzone

Page 55: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 55

Example Unsigned Zone

$TTL 86400;example.com. IN SOA ns0.example.com. ( hostmaster.example.com.

2001062400 ; serial number 10800 ; refresh 3600 ; retry 2592000 ; expire 86400 ; time to live

)example.com. IN TXT "$Id: example.com,v 1.2 2001/06/24 22:53:39 jim Exp $"

Page 56: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 56

example.com. IN NS ns0.example.com.example.com. IN MX 10 jim.example.com.

jim.example.com. IN A 10.11.12.13ns0.example.com. IN A 10.9.8.7

Page 57: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 57

dnssec-signzone

# dnssec-signzone example.com \ Kexample.com.+001+42000

example.com.signed

• Original (unsigned) zone file left intact• zonename.signed contains signed zone file

- example.com.signed

• It's not pretty.....

Page 58: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 58

Example Signed Zone File; File written on Wed Jun 27 21:08:20 2001; dnssec_signzone version 9.2.0a2example.com. 86400 IN SOA ns0.example.com.

( hostmaster.example.com. 2001062400 ; serial 10800 ; refresh (3 hours) 3600 ; retry (1 hour) 2592000 ; expire (4 weeks 2 days) 86400 ; minimum (1 day) ) 86400 SIG SOA 1 2 86400 20010727200820 ( 20010627200820 42000 example.com. pGsWdt8qpm58kXDqkM8DLLKxjT8qqgTny9nY8jBHEiUAx GTV+i53fsIpVJOnWalUxbkP260OAR0bTHve4voN9g== )

Page 59: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 59

86400 NS ns0.example.com. 86400 SIG NS 1 2 86400 20010727200820 ( 20010627200820 42000 example.com. nyFlzAYSM/CPqDjpsHPNTqKlSwniotFqM6KH BcloIBlFOR6Tx6nCiV2Qk4VawPrRIeOAG+uc ZaV6jwrHl+Aujg== ) 86400 MX 10 jim.example.com. 86400 SIG MX 1 2 86400 20010727200820 ( 20010627200820 42000 example.com. elYsn8kCaO42JuGKgvt7Api+Uj8wr09Dj3WM Grll2GYXFq4yeneRlq+UmiXqEZjSJXiwipKk vMn7pr2qv0T9IQ== )

Page 60: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 60

86400 TXT "$Id: example.com,v 1.2 2001/06/24 22:53:39 jim Exp $"

86400 SIG TXT 1 2 86400 20010727200820 ( 20010627200820 42000 example.com. aKqz7FiIL1FSnFBWyVuyqgLr2p/GjBQVljTX XfqtKFCQWTSytMNVyn52buyydy80Fup5ZonN YkNfEBzQvlDViQ== ) 86400 KEY 256 3 1 ( AQPOz/KyZAsaXxv8hbx+7lfgv4iP5twIQtyN GVnpBAMTbOykxKMJNrBdg41AufR4hItZIi76 vbd0R1emEXvPpBAZ ) ; key id = 42000

Page 61: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 61

86400 NXT jim.example.com. NS SOA MX TXT SIG KEY NXT

86400 SIG NXT 1 2 86400 20010727200820 (

20010627200820 42000 example.com.

jhBUcRSzoMCwzc1FVgOKrl+mSgv7f/Ri8/mb

Q1dtGz/+0KKXa0u4s+T1SygG8wHs3Y/IOPq+

qn5YSbMtAmSajQ== )

Page 62: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 62

jim.example.com. 86400 IN A 10.11.12.13 86400 SIG A 1 3 86400 20010727200820 ( 20010627200820 42000 example.com. ZpD/YrrFQzeFJWENIe4U1Z2xpVmRxzBabYKw xe61bqrLsg2EuOv7CRdNwxWvEbZPN4Rf64GG oaGV97him2C10Q== ) 86400 NXT ns0.example.com. A SIG NXT 86400 SIG NXT 1 3 86400 20010727200820 ( 20010627200820 42000 example.com. dub7z+Gq4ZnJqRB1ucJfsgIsMv8WepkzrvyY +kn3NfTOGBC51tJgcyW8HMxQz/D9ig39KO8G wl6Wc7upvReUMA== )

Page 63: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 63

ns0.example.com. 86400 IN A 10.9.8.7 86400 SIG A 1 3 86400 20010727200820 ( 20010627200820 42000 example.com. Ks14BB6UVciyfxgJ4R5eXFZrRUmnuPhTgfjQ 0r3FCyvdOr6Uu5iLSTbzgulY+qZXaXF9tCTK +65y5VxUk3WtBQ== ) 86400 NXT example.com. A SIG NXT 86400 SIG NXT 1 3 86400 20010727200820 ( 20010627200820 42000 example.com. ro1TRC7idXJw/MpLBLY/sXBlNAoLcSjKKR7t mD91i7hhW9OF4R8Ql01QU+MYrjui9kOw2isU /8BY63MCfbqlnw== )

Page 64: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 64

Comments on Signed Zone

• Original ordering is lost- So are any comments in the unsigned zone file

• Signed zone files are not human-readable- "No user servicable parts inside"

• Zone file is approximately 4 times bigger:- Each RR has a SIG record

• And an NXT record which also has a SIG record

Page 65: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 65

Verifying with dig

% dig example.com soa; <<>> DiG 9.2.0a2 <<>> example.com soa;; global options: printcmd;; Got answer:;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id:

58191;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY:

1, ADDITIONAL: 1;; QUESTION SECTION:;example.com. IN SOA;; ANSWER SECTION:example.com. IN SOA ns0.example.com.

hostmaster.example.com. 2001062400 10800 3600 2592000 86400

Page 66: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 66

;; AUTHORITY SECTION:

example.com. IN NS ns0.example.com.

;; ADDITIONAL SECTION:

ns0.example.com. IN A 10.9.8.7

;; Query time: 5 msec

;; SERVER: 127.0.0.1#53(127.0.0.1)

;; WHEN: Mon Jun 25 22:45:07 2001

;; MSG SIZE rcvd: 110

Page 67: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 67

• DNSSEC-aware query:% dig example.com soa +dnssec; <<>> DiG 9.2.0a2 <<>> example.com soa +dnssec;; global options: printcmd;; Got answer:;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id:

44988;; flags: qr aa rd ra; QUERY: 1, ANSWER: 2, AUTHORITY:

2, ADDITIONAL: 5;; OPT PSEUDOSECTION:; EDNS: version: 0, udp= 4096;; QUESTION SECTION:;example.com. IN SOA

Page 68: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 68

;; ANSWER SECTION:example.com. IN SOA ns0.example.com.

hostmaster.example.com. 2001062400 10800 3600 2592000 86400

example.com. IN SIG SOA 1 2 86400 20010725213738 20010625213738 2499 example.com. eAZ54DURplbBQEy+tuTJWuldooHEKoDB+nbKW1LL7pN2yGAI9UdsrZURnuJSgVQehT7AWTyqV8ldAhxBKUFoyQ==

;; AUTHORITY SECTION:example.com. IN NS ns0.example.com.example.com. IN SIG NS 1 2 3600 20010725213738

20010625213738 2499 example.com.

vR28oF6X+6rswIV7X5OM9Va9XW9Kqf+hCaDzamcnMp4OT7KDpikwDdLy620Uia+VWglC0Tva5XcXVDL54VnwlQ==

Page 69: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 69

;; ADDITIONAL SECTION:

ns0.example.com. IN A 10.9.8.7

example.com. IN KEY 256 3 1 AQPR/qMZ4euseKDELUcPQ9G8AoO8Qkv3M7jmFwUUXZDtWx6vZRJ

ib0lrbVcwUMOzWu1c/lAkDb8Iv6ruhabGCcMp

example.com. IN SIG KEY 3 2 3600 20010725053856 20010625053856 5945 com. CAylEF0FQFYZOkzCquLtg9wYxFLsIb+qwVYgf+KuXBEG9txRByxC4Ug=

Page 70: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 70

ns0.example.com. IN SIG A 1 3 3600 20010725213738 20010625213738 2499 example.com. TeRV2qIiXROf60KLnrwgDNaDdSYJgX4IySAjrRkeoDujXv91NU0rWnAC inLTmGVX+hrryUFwIz0BYrdhZyvIaQ==

;; Query time: 5 msec

;; SERVER: 127.0.0.1#53(127.0.0.1)

;; WHEN: Mon Jun 25 22:45:15 2001

;; MSG SIZE rcvd: 600

Page 71: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 71

DNSSEC-aware queries

• Note use of EDNS0 protocol- Bigger DNS payloads/buffers- Standard DNS query only has 512 byte payload

• Prevents truncated responses and TCP retries

• DNSSEC-aware answer is much bigger- All the crypto stuff: SIGs, KEY- Exceeds standard 512-byte limit

• Trivial example with small key size

Page 72: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 72

Setting Up Islands of Trust

• Root and top-level zones are not signed (yet)- How to verify another DNSSEC-aware zone?

• trusted-keys statement in named.conf- Add another "trusted" zone's public key to server- Zone's public key sent by some out-of-band

means to another DNSSEC-aware name server• eg business partner, supplier, ASP

Page 73: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 73

Example trusted-keys Statement

trusted-keys {example.net. 256 3 3 "AMNOZhb05QlfBNuXTj VV+wsXwqAn6yhaw71smL0qTU/pWRXqom7eYFVdNUGu 4jGPWMBOXT6CRY089c1RezLhu9vj4PsF4GRrJHfwbx L/B/jyCu4x8RITdvj9eCrYIF0DWbN4TzUhOOFYSLbw 8KwfcwRFigXDPLDwAcawdLaT7dpuqzNvHXZWsuSvxb GxBX0uKOG1o4JHhBpCAUcARX/r9Z7DGCgrq2NuCqre +yRdNFPt2fgqXZOix3DeGkAYFgySFbNzIrEFG8yunk FSix7XC8XJA1Ou";};

Public RSA key for example.net is trusted- Verify anything signed with its private key

Page 74: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 74

Algorithms

• Implementations must support DSA• RSA will become mandatory too

- No patent issues any more

• DSA is faster than RSA at signing- Takes longer to verify DSA signatures though

• Using >1 algorithm doesn't provide stronger authenticity or "security"- DNS data will be insecure if either key is

compromised

Page 75: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 75

Sample Zone Signing Times

• Very modest hardware: 300 Mhz Pentium- 100 Resource Records: 7.6 seconds- 100,000 Resource Records: 7445 seconds

• Clearly linear• Faster processors mean quicker signing

- Moore’s Law is a big help here- Crypto hardware makes it even faster

• Zone signing is inherently parallelisable- Multi-processor systems, clusters

Page 76: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 76

SIG Verification Times

• Same modest hardware:• Verifying 1 RRset, 1 SIG record

- DSA-512: 108 ms- DSA-1024: 346 ms- RSA-512: 20 ms- RSA-1024: 110ms

• Same linear speed-up with faster CPUs and/or special crypto hardware (RSA chips)

• Validating a single SIG record can’t easily be done in parallel

Page 77: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 77

Choosing Key Lengths

• Keys should be no bigger than parent zone's key- No point making them larger- Parent's key "strength" defines child's "strength"

• Use larger key sizes for long-lived SIGs - Beware of cryptanalysis

• Shorter key lengths make sense for short-lived signatures- Typically valid for less than a week

Page 78: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 78

Good Crypto Policy

• Don't use one key for everything• Maybe:

- RSA to sign zone data- DSA to sign child keys

• or:- 768-bit keys for signing zone data- 1024-bit keys for signing child keys

• Change the keys "often enough"

Page 79: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 79

Secure Dynamic Update

• Defined in RFC3007- But not well explained in BIND9 documentation yet

• On-line signing- BIND9 computes SIG and NXT records on the fly- Dynamic update requests on signed zones

• Name server needs to read the file containing the private key

• Storing private keys on-line is maybe not a good idea

Page 80: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 80

DNSSEC Problems• Bigger DNS packets

- Typically break 512-byte payload limit- Need EDNS0 to allow bigger packets

• And prevent truncated responses => TCP retries

• Zone files are bigger and unreadable• Signed zones can't be altered by hand• Signing means changes to admin procedures

- check-out, modify, check, check-in, sign zone- Add/remove/change keys

Page 81: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 81

• Parent zone should sign child zone's keys- Implies close coupling of parent and child zones- No bad thing, but too many broken/lame

delegations• ~25% in tightly controlled registries• ??% in .com

- High levels of DNS cluelessness

• No top-level domains are signed yet

Page 82: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 82

• Awkward registry/registrar relationships- Who signs what and how?

• NXT records allow the whole zone to be traversed

• Key rollover is hard (and recursive!)• Root zone key is a weakness

Page 83: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 83

Key Rollover

• Keys should changed regularly - Good cryptographic practice

• When a parent's key changes, it has to re-sign the keys of its secure child zones- Child zones then need to be re-signed- And so on......

• SIG record "valid from/to" timestamps help - New keys and SIGs introduced in advance- Period of dual-running

Page 84: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 84

The Root Zone Key

• Integrity of root key is critical- Compromise cannot be allowed (or suspected)

• Break it and reboot the internet• Obvious magnet for attackers

- Massive single point of failure

• Root key must change from time to time- Prevent cryptanalysis- Implies eventually re-signing everything

Page 85: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 85

DNSSEC Applications

• DNS as a PKI?- DNS is ubiquitous and works!- DNSSEC means answers can be validated

• Use the DNS for storing & distributing IPsec, SSL & SSH keys, etc.- Fetching keys becomes a (Secure) DNS lookup

• PGP & GPG keys?• X.509 Certificates

- CERT record

Page 86: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 86

DNSSEC Future

• Some registries are planning to sign their TLDs for real- Projects under way in Netherlands, Sweden &

Germany- RIPE's in-addr.arpa tree- Verisign/NSI's plans for .com

• Further protocol extensions- The DS (Delegation Signer) record - Opt-in

• Alterations to NXT record

Page 87: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 87

The DS Record

• Another new record type: Delegation Signer- Here is the name of a meta-key that I’ve signed

• Parent signs child zone’s meta key• Child’s meta key signs child’s zone key

- Child can pick a new zone key without needing the parent to sign it

- Simplifies parent/child zone relationship

• Almost through IETF standarisation process

Page 88: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 88

Opt-In

• Changed semantics for the NXT record- Points to next signed name in a zone- Probably a delegation

• Big win for .com- 99.9% of names there may never be signed

• Makes signed zones smaller- not everything needs to be signed

• IETF standarisation just about complete

Page 89: Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.

Copyright © 2002 Nominum, Inc. 89

Summary

• This section has covered:Secure DNS (DNSSEC)

Resource records for DNSSEC

Some of the problems in deploying DNSSEC

Potential uses of Secure DNS