• No results found

DNSSEC: Where We Are (and how we get to where we want to be) APNIC 34, Phnom Penh, Cambodia August 2012

N/A
N/A
Protected

Academic year: 2021

Share "DNSSEC: Where We Are (and how we get to where we want to be) APNIC 34, Phnom Penh, Cambodia August 2012"

Copied!
29
0
0

Loading.... (view fulltext now)

Full text

(1)

DNSSEC:    Where  We  Are  (and  how  

we  get  to  where  we  want  to  be)  

 APNIC  34,  Phnom  Penh,  Cambodia     21-­‐31  August  2012  

(2)

DNSSEC:  We  have  passed  the  point  of  

no  return  

•  Fast  pace  of  deployment  at  the  TLD  level    

•  Deployed  at  root  

•  Supported  by  soIware  

•  Growing  support  by  ISPs  

•  Required  by  new  gTLDs  

 

à  Inevitable  widespread  deployment  across  

(3)

The  Problem:    

DNS  Cache  Poisoning  ABack  

www.majorbank.se=? DNS Resolver www.majorbank.se = 1.2.3.4 DNS Server 5.6.7.8

Get page Attacker

webserver www @ 5.6.7.8 Username / Password Error Attacker www.majorbank.se = 5.6.7.8 Login page Password database                   ISP  /   ENTERPRISE  /   END  NODE                                                              ENTERPRISE   Animated  slide  

(4)

www.majorbank.se=? DNS Resolver www.majorbank.se = 1.2.3.4 DNS Server 5.6.7.8

Get page Attacker

webserver www @ 5.6.7.8 Username / Password Error Login page Password database

Argghh!  Now  all  ISP  customers  get  

sent  to  aBacker.  

(5)

Securing  The  Phone  Book  -­‐  DNS  

Security  Extensions  (DNSSEC)  

www.majorbank.se=? DNS Resolver with DNSSEC www.majorbank.se = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page webserver www @ 1.2.3.4 Username / Password Account Data Login page Attacker www.majorbank.se = 5.6.7.8 Attacker’s record does not validate – drop it

(6)

Resolver  only  caches  validated  records  

www.majorbank.se=? DNS Resolver with DNSSEC www.majorbank.se = 1.2.3.4 DNS Server with DNSSEC 1.2.3.4 Get page webserver www @ 1.2.3.4 Username / Password Account Data Login page                   ENTERPRISE                     ISP  /   ENTERPRISE  /   END  NODE   Animated  slide  

(7)

DNSSEC:  Plenty  of  MoOvaOon  

•  DNSChanger  (Nov  2011),  calls  for  deployment  by  

government,  etc…  

•  DANE  

–  Improved  Web  TLS  and  certs  for  all  

–  Email  S/MIME  for  all  

•  …and  

–  SSH,  IPSEC,  VoIP  

–  Digital  idenWty  

–  Other  content  (e.g.  configuraWons,  XML,  app  updates)  

–  Smart  Grid  

–  A  global  PKI  

(8)

The  BAD:  DNSChanger  -­‐  ‘Biggest  

Cybercriminal  Takedown  in  History’  –  

4M  machines,  100  countries,  $14M

 

Nov  2011  hBp://krebsonsecurity.com/2011/11/malware-­‐click-­‐fraud-­‐kingpins-­‐arrested-­‐in-­‐estonia/                                                          End-­‐2-­‐end  DNSSEC  validaOon  would  have  avoided  the  problems  

(9)

The  BAD:  Brazilian  ISP  fall  vicOm  to  a  

series  of  DNS  aBacks    

7  Nov  2011  hBp://www.securelist.com/en/blog/208193214/Massive_DNS_poisoning_aBacks_in_Brazil  

(10)

The  BAD:  Other  DNS  hijacks*  

•  25  Dec  2010  -­‐  Russian  e-­‐Payment  Giant  ChronoPay  Hacked  

•  18  Dec  2009  –  TwiBer  –  “Iranian  cyber  army”  

•  13  Aug  2010  -­‐  Chinese  gmail  phishing  aBack  

•  25  Dec  2010  Tunisia  DNS  Hijack  

•  2009-­‐2012  google.*  

–  April  28  2009  Google  Puerto  Rico  sites  redirected  in  DNS  aBack  

–  May  9  2009  Morocco  temporarily  seize  Google  domain  name  

•  9  Sep  2011  -­‐  Diginotar  cerOficate  compromise  for  Iranian  users    

•  SSL  /  TLS  doesn't  tell  you  if  you've  been  sent  to  the  correct  site,  it  only  

tells  you  if  the  DNS  matches  the  name  in  the  cerOficate.  Unfortunately,   majority  of  Web  site  cerOficates  rely  on  DNS  to  validate  idenOty.  

•  DNS  is  relied  on  for  unexpected  things  though  insecure.   *A  Brief  History  of  DNS  Hijacking  -­‐  Google  

(11)

DNSSEC  support  from  government  

•  Sweden,  Brazil,  and  others  encourage  DNSSEC  

deployment  

•  Mar  2012  -­‐  AT&T,  CenturyLink  (Qwest),  

Comcast,  Cox,  Sprint,  TimeWarner  Cable,  and   Verizon  have  pledged  to  comply  and  abide  by   US  FCC  [1]  recommendaWons  that  include  

DNSSEC..  “A  report  by  Gartner  found  3.6  million  Americans   gegng  redirected  to  bogus  websites  in  a  single  year,  cosWng   them  $3.2  billion.,”[2].  

•  2008  US  .gov  mandate.    >60%  operaWonal.  [3]  

[1]  FCC=Federal  CommunicaOons  Commission=US  communicaOons  Ministry    

[2]  hBp://securitywatch.pcmag.com/security/295722-­‐isps-­‐agree-­‐to-­‐fcc-­‐rules-­‐on-­‐anO-­‐botnet-­‐dnssec-­‐internet-­‐rouOng       [3]  hBp://www.whitehouse.gov/sites/default/files/omb/memoranda/fy2008/m08-­‐23.pdf  

(12)

DNSSEC  =  Global  PKI  

CA  CerWficate  roots  ~1482  

Login  security   SSHFP  RFC4255   Yet  to  be  discovered  

security  innovaWons,   enhancements,  and   synergies   Content  security   Commercial  SSL   CerWficates  for   Web  and  e-­‐mail  

Content  security   “Free  SSL”  

cerWficates  for  Web   and  e-­‐mail  and  “trust   agility”  (DANE)   Network  security   IPSECKEY  RFC4025   Cross-­‐ organizaWonal  and   trans-­‐naWonal   idenWty  and   authenWcaWon   E-­‐mail  security    DKIM  RFC4871   DNSSEC  root  -­‐  1   Domain  Names   Securing  VoIP   hqps://www.eff.org/observatory   hqp://royal.pingdom.com/2011/01/12/internet-­‐2010-­‐in-­‐numbers/  

(13)

DNSSEC:  Where  we  are  

*COMCAST  Internet  (18M),  TeliaSonera  SE,  Sprint,Vodafone  CZ,Telefonica  CZ,  T-­‐ mobile  NL,  SurfNet  NL,  SANYO  InformaWon  Technology  SoluWons  JP,  others..    

•   Deployed  on  92/315  TLDs  (.asia,  .tw  台灣 台

湾,  .kr  

국,  .jp,  .in,  .lk,  .kg,  .tm,  .am,  .mm,  .ua,  .cr,  .cz,  .br,  

.se,  .uk,  .fr,  .com,  .q,  …post)  

•  Root  signed**  and  audited  

•  >84%  of  domain  names  could  have  DNSSEC  

•  Growing  ISP  support*  

•  3rd  party  signing  soluWons  are  appearing  (e.g.,  

GoDaddy,  VeriSign,  Binero,…)  

•  Unbound,  BIND,  DNSSEC-­‐trigger,  vsResolver  and  

other  s/w  support  and  secure  last-­‐mile  

•  IETF  DANE  CerWficate  support  RFC  almost  out  

**21  TCRs  from:  TT,  BF,  RU,  CN,  US,  SE,  NL,  UG,  BR,  Benin,  PT,  NP,  MauriWus,  CZ,  CA,  JP,  UK,   NZ  

(14)

But…  

•  But  deployed  on  <  1%  of  2nd  level  domains.    

Many  have  plans.  Few  have  taken  the  step   (e.g.,  yandex.com,  paypal.com*,  comcast.com).  

•  DNSChanger  and  other  aqacks  highlight  

today’s  need.  (e.g  end-­‐2-­‐end  DNSSEC  validaWon  

would  have  avoided  the  problems)  

•  InnovaWve  security  soluWons  (e.g.,  DANE)  

highlight  tomorrow’s  value.    

 *  hBp://fedv6-­‐deployment.antd.nist.gov/cgi-­‐bin/generate-­‐com  hBp://www.thesecuritypracOce.com/ the_security_pracOce/2011/12/all-­‐paypal-­‐domains-­‐are-­‐now-­‐using-­‐dnssec.html  

(15)

DNSSEC:  So  what’s  the  problem?

 

•  Not  enough  enterprise  IT  departments  know  

about  it  or  are  busy  pugng  out  other  fires.  

•  When  they  do  look  into  it  they  hear  FUD  and  

lack  of  turnkey  soluWons.  

•   Registrars/DNS  providers  see  no  demand  

   

(16)

Barriers  to  success  

•  Lack  of  Awareness  at  enterprise  and  customer  level  (e.g.,  security   implicaWons)  

•  Lack  of  Registrar  support*  and/or  experWse  or  turn-­‐key  soluWons  

–  Chicken  and  egg  

–  JusWfying  cost  

•  ImplementaWon  F.U.D.  

–  Security/crypto/key  management/complexity  

–  Effect  on  exisWng  enterprise  operaWons:  e.g.  expiry,  LB,  CDN,  etc..  

•  Un-­‐trustworthy  deployment  

–  Yet  another  security  thing  to  manage:  “email  the  keys  to  everyone”  

–  Insecure  pracWces  and  processes  

–  Garbage  in,  garbage  out  -­‐  what  does  signing  my  zone  buy  me?    

*ParOal  list  of  Registrars  supporOng  DNSSEC    

(17)

"What  You  Can  Do"    

•  Raise  Awareness  of  DNSSEC  and  its  security  

value  in  your  enterprises.  Deploy  on  your   domain  names  –  it  is  “a  feature”.  

•  Start  DNSSEC  implementaWon  early,  combine  

with  other  upgrades.    Later,  offer  hosWng  as  a   service.  

•  At  minimum  ensure  network  and  resolvers  

pass  DNSSEC  responses  to  end  users  

(18)

SoluOons  

•  Raise  awareness  of  domain  holders,  end  users,  h/w+s/w  vendors  [1]  

–  Point  to  improved  security  as  differenWator  and  the  disadvantage  of  not  adopWng  

–  New  opportuniWes  for  O/S  (mobile  and  desktop)  and  browser  vendors  

–  Added  security  for  hardware  products  (e.g.,  validator  in  CPE)  

–  Meet  with  Registrars  and  DNS  providers  

•  Ease  ImplementaWon:    

–  Take  advantage  of  DNSSEC  training[2]  and  learn  from  exisWng  implementaWons  

–  Automate  key  management  and  monitoring  

–  Crypto:  HSM?  Smartcard?  TPM  chip?  SoI  keys?  -­‐  all  good  

–  Seek  “click  and  sign”  interface  simplicity  

–  Start  implementaWon  early  since  to  get  ahead  in  learning  curve  

–  For  ISPs,  at  minimum  ensure  validaWon  can  occur  downstream  to  support  end2end  security  

•  Make  it  trustworthy:    

–  Transparent  and  secure  processes  and  pracWces  

–  WriWng  a  DPS  creates  the  right  mindset  for:  

•  SeparaWon  of  duWes  

•  Documented  procedures  

•  Audit  logging  

–  Opportunity  to  improve  overall  operaWons  using  DNSSEC  as  an  excuse  [3]  

[1]  DNSSEC.jp  and  other  groups  are  excellent  examples   [2]  APNIC,  NSRC,  ISOC,  ICANN  offer  training  

(19)
(20)

Building  in  security  

•  Gegng  the  machinery  for  DNSSEC  is  easy  

(BIND,  NSD/Unbound,  OpenDNSSEC,  etc..).    

(21)

•  The  good:  

–  The  people  

–  The  mindset  

–  The  pracWces  

–  The  legal  framework  

–  The  audit  against  internaWonal  accounWng  and  technical   standards  

•  The  bad:  

–  Diluted  trust  with  a  race  to  the  boqom  (>1400  CA’s)  

–   DigiNotar  

•  Weak  and  inconsistent  polices  and  controls  

•  Lack  of  compromise  noWficaWon  (non-­‐transparent)  

•  Audits  don’t  solve  everything  (ETSI  audit)  

Learn  from  CA  successes    

(and  mistakes)  

(22)
(23)

+

…or  this            

(24)

..or  this    (CR  NIC)  

Offline  Laptop  

with  TPM   DNSSEC  Signer  Online/off-­‐net   with  TPM  

Generate  ZSKs   Transport  

public  half  of   ZSKs   Generate  KSK   Sign  ZSKs  with   KSK   Transport  KSK   signed  DNSKEY  

RRsets   Sign  zones   with  ZSK   signed   zone   unsigned   zone   ZSKs   KSK   Secure  Off-­‐line   Environment   Animated  slide  

(25)

KSK  on  FD   RNG   laptop   Live  O/S  DVD   SAFE   RACK   CAGE   DATA  CENTER  

All  in  tamper   evident  bags   RACK   CAGE   DATA  CENTER   signer   firewall   zonefile   ZSKs   FD  with   public   ZSKs   FD  with   KSK   signed   DNSKEY   RRsets   hidden   master  

…or  even  this  

Off-­‐line  

(26)

But  all  must  have:  

•  Published  pracWce  statement  

–  Overview  of  operaWons  

–  Segng  expectaWons  

•  Normal  

•  Emergency  

–  LimiWng  liability  

•  Documented  procedures  

•  MulW  person  access  requirements  

•  Audit  logs  

•  Monitoring  (e.g.,  for  signature  expiry)  

•  Good  Random  Number  Generators  

DRBGs   FIPS  140   Intel  RdRand  

Useful  IETF  RFCs:  

DNSSEC  OperaOonal  PracOces    hBp://tools.iey.org/html/draz-­‐iey-­‐dnsop-­‐rfc4641bis  

(27)

Summary  

•  DNSSEC  has  leI  the  starWng  gate  but  without  

greater  support  by  Registrars,  demand  from   domain  name  holders  and  trustworthy  

deployment  by  operators,  it  will  die  on  the  vine  

•  Building  awareness  amongst  a  larger  audience  

based  on  recent  aqacks  and  increased  interest  in   cyber  security  may  be  one  soluWon  

•  Drawing  on  lessons  learned  from  cerWficate  

authoriWes  and  other  exisWng  sources  of  trust  on   the  Internet  can  make  DNSSEC  a  source  of  

(28)
(29)

The  Internet’s  Phone  Book  -­‐  Domain  

Name  System  (DNS+DNSSEC)  

www.majorbank.se=? Get page webserver www @ 1.2.3.4 Username / Password Account Data DNS Resolver www.majorbank.se = 1.2.3.4 DNS Server 1.2.3.4 Login page ISP/  HotSpot  /   Enterprise/  End   Node   Majorbank.se (Registrant)   DNS Server .se (Registry)   DNS Server . (Root)   Animated  slide  

References

Related documents

Our findings showed that the HLS made a large number of contextually inappropriate substitutions by using direct evidentials in places where an indirect evidential would

Based on the preliminary study conducted by the researcher, it was found that the syllabus of learning essay-writing material still used the handbook entitled

In retrospect, Elinor Ostrom will be remembered for the seminal contribution she made to the study of institutions, rational choice theory and her applied work

We consider a discrete version of this problem in which competing suppliers each choose a reservation price and an execution price for blocks of capacity, and the buyer, facing a

Ø According to Sports Business Daily, in the month of January alone (in 2014), the Yahoo Sports website had 55 million visitors, while 38.6 million visited the Fox Sports

The Sailing Cup is already one of the biggest competitions of the Sailing of Cruise of the Peninsula Iberica and there have been five editions in the north of Portugal,

Using those behavioural and spatial cognitive tests, we found that Eurasian harvest mice behaved constantly and that personality traits formed a behavioural syndrome in the

` Having our own Regional Internet Number Registry, we have the opportunity to define policies and plans that will allow a smooth management of IPv4 exhaustion and help IPv6