Top Banner
DNS Root Zone DNSSEC Operations - Ed Lewis| FIRST-TC Auckland, NZ | February 21, 2016 [email protected]
27

DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

Apr 25, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

DNS Root Zone DNSSEC Operations - KSK Ed Lewis| FIRST-TC Auckland, NZ | February 21, 2016 [email protected]

Page 2: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

MyMo%va%on

•  ICANNistaskedwithchangingacrucialconfigura%onparameterofDNSsecurity– Weneedtodevelopaplan(workingonit)– Wedon'thaveafixeddateforthechange

•  Inprepara%onforthetask– Weareengagingwithvariousgroupswhomightbeimpactedbytheworkand/ormighthelpusimproveuponourplanningwork

2

Page 3: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

Agenda

•  BackgroundonDomainNameSystem(DNS)andDNSSecurityExtensions(DNSSEC)

•  InternetCorpora%onforAssignedNamesandNumbers(ICANN)roleinDNSSEC

•  TheprocessofDNSSECValida%on•  ManagingTrustAnchors-ImpactofaKeyRoll

3

Page 4: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

ForEngineersWhoDon'tLikeProtocols

4

WhatistheIPv4addressforwww.nic.tld.?

TheIPv4addressforwww.nic.tld.isW.X.Y.Z

Page 5: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

Informa%onSource

Informa%onSource

Informa%onSource

Informa%onSource

IntermediaryIntermediaryIntermediary

WhyisthereDNSSEC?

•  DNSisnot"client-server"– Noend-to-endsessiontoprotect

5

RelyingClient Intermediary Informa%on

Source

•  SeeksandAggregatesInforma%on

•  HighlyGullible

Page 6: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

DNSSECDesignApproach

•  DigitalSignatures– Acryptographicallyencryptedchecksumissentalongsidethedata

– Asystemofpublickeysisusedtoverify

6

Page 7: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

DNSSECforThoseWhoDon'tLikeProtocols

WhatistheIPv4addressforwww.nic.tld.?

TheIPv4addressforwww.nic.tld.isW.X.Y.Z

Digitalsignaturebynic.tldcoveringanswer

7

Page 8: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

Crypto-checkingaSignature

TheIPv4addressforwww.nic.tld.isW.X.Y.Z

Digitalsignaturebynic.tldcoveringanswer

nic.tldKEYZSK

?✔

✖OR

8

Page 9: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

HowthisWorks(DNS)

TheRoot

TLDOtherTLDs

NIC.TLDOthers.TLD

9

TopLevelDomain

Page 10: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

HowthisWorks(Scaling)

TheRoot

TLDOtherTLDs

NIC.TLDOthers.TLD

10

KeySet

KeySet

KeySet

Page 11: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

HowthisWorks(DNSSEC)

TheRoot

TLDOtherTLDs

NIC.TLDOthers.TLD

nic.tldKEYZSKnic.tldKEYKSK

nic.tldDStldKEYZSKtldKEYKSK

tldDSrootKEYZSKrootKEYKSK

11

Page 12: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

RolesofDNSSECKeys

•  KSK–key-signingkey,signsinternallymanagedkeys–  Internalreferstowhatanadministratormanages

•  ZSK–zone-signingkey,signsotherinternallymanageddata

•  DS–hashofexternalKSK"onelayerdown"– Externalreferstowhomtheadministratordelegatesauthority

12

Page 13: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

ChainofTrustinOpera%ons

•  TheInternet'sDNSsystemhasaDNSSECsignedRootZone– Since2010– TheKSKsignstheZSK,ZSKsignsDSforTLDs– KSKandZSKoperatorsareseparateorganiza%ons

•  Trustisamagerfortheconsumers,notproducers,todefine– GoalistoreducereliancetojustoneKSK(set)–  Iftheconsumerwantsto"trustjustone"

13

Page 14: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

RootZoneKSKandZSKOperators

•  ICANNperformsthemanagementoftheRootZoneKSKaspartoffulfillingtheIANAFunc%onsContract–  ThatcontractismanagedbytheUSDepartmentofCommerce'sNa%onalTelecommunica%onsandInforma%onAdministra%on(NTIA)

•  VerisignperformsthemanagementoftheRootZoneZSKaspartoftheirroleastheRootZoneMaintainer

14

Page 15: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

ICANN'srole,inbrief

•  ICANNmanagestheKSKlifecycle–  CreatetheKSK(hashappenedonce)–  SignwiththeKSK(quarterly)–  ProtecttheKSK(constantly)– DisposeoftheKSK(hasn'thappenedyet)–  andPublicizetheKSK(constantly)

•  Objec%ve:operateinamannertoenabletrust–  SOC3/SysTrust,auditedbythird-party–  (US)FIPS140-2level4cryptographicdevices(HSM)

15

Page 16: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

ReturningFocustoDNSSEC

•  WithinDNSSECthereis– SigningtheData

•  Addingdigitalsignatures•  Cryptographickeylife%memanagement•  Thisisnotthesubjectofthistalk

– Valida%ngtheData•  Protec%ngtheconsumeroftheanswer•  Assemblingthechainoftrust•  Managing"whoistrusted"

16

Page 17: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

WhatisValida%on?

•  Whenaresponseisreceived– Checkthedigitalsignature,cryptographicandotherwise(%me,authority,andsoon)

– Checkallsignatures"upthechain"– Onceananswerisvalidated,itcanbecached,used,forwarded

•  Whatisneeded– Atrustanchorisneeded,a"pinned"KSK

17

Page 18: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

Informa%onSource

Informa%onSource

Informa%onSource

Informa%onSource

IntermediaryIntermediaryIntermediary

WhereisValida%onDone?

•  DNSisnot"client-server"– Noend-to-endsessiontoprotect

18

RelyingClient

Inter-mediary

Informa%onSource

•  SeeksandAggregatesInforma%on

•  Validates

Validator

•  MightValidate

Validator

Page 19: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

Whyandwhodoes?

•  Whyvalidate?– Lessensthegullibilityoftheintermediaryelements

– Providesatrustablebaseforopera%ons•  Whynot?

– Valida%onimposessomecostonopera%ng– Valida%oncouldraisefalsealarms

•  Haveoperatorsturnedonvalida%on?– Somehave,a"significantminority"

19

Page 20: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

TrustAnchorManagement

•  Func%onofthevalida%onengine– Keysthatare"pinned"– RootZoneKSKoughttobeoneofthem– TheremaybeotherKSKsets

•  Theremayalsobe"nega%vetrustanchors"– ExperiencesayssomeDNSoperatorsbotchKSKmanagement

20

Page 21: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

GelngtheRootZoneKSK

•  ThereareafewwaystogetacopyoftheRootZoneKSK– ViaDNS– ViaWeb– ViaDistributedCode– Viaanythingelse–T-shirts,talks,askingsomeone

21

Page 22: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

GelngtheRootZoneKSKfromDNS

•  '[email protected]'andpulloutthekeywithflags=257

•  Asanonlymethod,thisisn'tverysecure– Convenientbutnotsecure

22

Page 23: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

AutomatedUpdatesviaDNS

•  "AutomatedSecureUpdatesofDNSSECTrustAnchors"(RFC5011)– Describesaseriesofopera%onalstepstohaveonetrustanchorsafelyintroducethenext

– Lacksneededmanagementhooks

•  Butifconfigura%onsarepushedbyaconfigura%onmanagementtool,thisapproachwon'twork

23

Page 24: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

GelngtheRootZoneKSKfromWeb

•  Fromhgps://www.iana.org/dnssec– hgps://data.iana.org/root-anchors/root-anchors.xml– OpenPGPsignatureandPKCS7signature

•  Validateviaappropriatepublickeysonthatsite•  Inplacesince2010

– Examiningwaystoimprovewhat'sthere(whilemaintainingbackwardscompa%bility)

24

Page 25: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

FutureConsidera%ons

•  Anopenworkitem–– What'sthebestwaytopublicizeakeytoawideaudience?

•  Wearerevisi%ngourapproachtopublica%ontoenabletrusttobebuiltonthekey

25

Page 26: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

RootZoneKSKinToolDistribu%ons

•  Sopwaremaycomewithacopyofthekeyembedded– Configura%onfile

•  ICANNisworkingwithsopwaredevelopersanddistributorstomakesurethisisreliable

•  S%ll,cau%onthatembeddedkeysmaybe"stale"oncekeysarerolled

26

Page 27: DNS Root Zone DNSSEC Operations - KSK...– The KSK signs the ZSK, ZSK signs DS for TLDs – KSK and ZSK operators are separate organizaons • Trust is a maer for the consumers, not

Formoreinforma%on

•  Jointhemailinglist– hgps://mm.icann.org/mailman/lis%nfo/root-dnssec-announce

•  FollowonTwiger– Hashtag:#KeyRollover– Follow@ICANNtechforthemostuptodatenews

27