Top Banner
June 3rd 2010 DNSSEC at an NREN: resolving DNSSEC side meeting, TNC2010, Vilnius, Lithuania Roland van Rijswijk roland.vanrijswijk [at] surfnet.nl woensdag 2 juni 2010
13

DNSSEC at an NREN: resolving · SURFnet. We make innovation work The ARIN incident - chia.arin.net was the culprit - It has both an IPv4 as well as an IPv6 address - IPv4 (A) could

Aug 08, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: DNSSEC at an NREN: resolving · SURFnet. We make innovation work The ARIN incident - chia.arin.net was the culprit - It has both an IPv4 as well as an IPv6 address - IPv4 (A) could

June 3rd 2010

DNSSEC at an NREN: resolvingDNSSEC side meeting, TNC2010, Vilnius, Lithuania

Roland van Rijswijkroland.vanrijswijk [at] surfnet.nl

woensdag 2 juni 2010

Page 2: DNSSEC at an NREN: resolving · SURFnet. We make innovation work The ARIN incident - chia.arin.net was the culprit - It has both an IPv4 as well as an IPv6 address - IPv4 (A) could

SURFnet. We make innovation work

Introduction

- SURFnet has DNSSEC validation enabled on all its resolvers since last year

- About 99% of validatable queries are succesful

- We use Unbound from NLnet Labshttp://www.unbound.net

2

woensdag 2 juni 2010

Page 3: DNSSEC at an NREN: resolving · SURFnet. We make innovation work The ARIN incident - chia.arin.net was the culprit - It has both an IPv4 as well as an IPv6 address - IPv4 (A) could

SURFnet. We make innovation work

Current validation rates

- Validation rates are around 1-2%:

3

woensdag 2 juni 2010

Page 4: DNSSEC at an NREN: resolving · SURFnet. We make innovation work The ARIN incident - chia.arin.net was the culprit - It has both an IPv4 as well as an IPv6 address - IPv4 (A) could

- Strange validation failures:

- We’re in constant contact with NLnetLabs to solve these issues

Validation running amok

4

Feb 4 14:28:25 ns0 unbound: [18112:0] info: validation failure <time-a.nist.gov. A IN>: no signatures from 132.163.4.9 for key nist.gov. while building chain of trustFeb 4 14:30:32 ns0 unbound: [18112:0] info: validation failure <time.nist.gov. A IN>: no signatures from 129.6.13.2 for key nist.gov. while building chain of trust

woensdag 2 juni 2010

Page 5: DNSSEC at an NREN: resolving · SURFnet. We make innovation work The ARIN incident - chia.arin.net was the culprit - It has both an IPv4 as well as an IPv6 address - IPv4 (A) could

SURFnet. We make innovation work

The ARIN incident

- Around September 4th ’09 we noticed that lot’s of reverse lookups (PTR) suddenly failed to validate

- At first we thought it was an Unbound issue

- We worked with the guys from NLnetLabs for 5 days in a row

- We analysed over 500MB of DNS queries (packets are usually just 512 bytes!)

- It was not a bug in Unbound...

5

woensdag 2 juni 2010

Page 6: DNSSEC at an NREN: resolving · SURFnet. We make innovation work The ARIN incident - chia.arin.net was the culprit - It has both an IPv4 as well as an IPv6 address - IPv4 (A) could

SURFnet. We make innovation work

The ARIN incident

- chia.arin.net was the culprit- It has both an IPv4 as well as an IPv6 address- IPv4 (A) could be queried for- IPv6 (AAAA) could not be queried for- But the glue for arin.net contained an AAAA record- Once that AAAA record was cached, IPv6 is also used to

access this server- The server gave DNSSEC answers on IPv4 but not on IPv6

- Made about 1 in 12 reverse validations fail

- At first, ARIN’s hostmaster ignored our message... but pulling some strings helped

- Issue was quietly solved on Sep. 15th ’09

6

woensdag 2 juni 2010

Page 7: DNSSEC at an NREN: resolving · SURFnet. We make innovation work The ARIN incident - chia.arin.net was the culprit - It has both an IPv4 as well as an IPv6 address - IPv4 (A) could

SURFnet. We make innovation work

Common validation failures

7

Feb 10 04:16:43 ns0 unbound: [5973:1] info: validation failure <USPTO.GOV. MX IN>: no signatures from 151.207.246.51 for key USPTO.GOV. while building chain of trustFeb 10 04:53:00 ns0 unbound: [5973:0] info: validation failure <gk-w-mail.srvs.usps.gov. A IN>: no signatures over NSEC3s from 56.0.141.25 for DS gk-w-mail.srvs.usps.gov. while...Feb 10 14:21:48 ns0 unbound: [5973:1] info: validation failure <www.hud.gov. A IN>: no DS...

Feb 10 13:47:35 ns0 unbound: [5973:0] info: validation failure <www.atol.bg. A IN>: No DNSK...Feb 10 13:37:17 ns0 unbound: [5973:0] info: validation failure <ns.unicycle.cz. A IN>: no k...

- Some US government agencies seem unable to get DNSSEC right:

- Others include .cz and .bg domains:

- There were some problems in Portugal

Feb 15 19:10:25 ns0 unbound: [5973:1] info: validation failure <FM.UL.PT. MX IN>: no NSEC3 records from 2001:690:21c0:b::150 for DS FM.UL.PT. while building chain of trust

woensdag 2 juni 2010

Page 8: DNSSEC at an NREN: resolving · SURFnet. We make innovation work The ARIN incident - chia.arin.net was the culprit - It has both an IPv4 as well as an IPv6 address - IPv4 (A) could

SURFnet. We make innovation work

Getting rid of interim solutions

- Currently most people that validate use either ITAR or DLV to obtain trust anchors

- Stock distributions have pre-packaged configurations for common resolvers that contain trust anchors

- Unfortunately, these are not kept up-to-date!http://www.potaroo.net/ispcol/2010-02/rollover.pdf

- Lesson learned:When the root gets signed, make sure you purge old trust anchors!

8

woensdag 2 juni 2010

Page 9: DNSSEC at an NREN: resolving · SURFnet. We make innovation work The ARIN incident - chia.arin.net was the culprit - It has both an IPv4 as well as an IPv6 address - IPv4 (A) could

SURFnet. We make innovation work

Firewalls and other M-i-t-M (1)

- DNSSEC uses the EDNS0 extension (RFC 2671)- For larger messages (signature RRs!)- For the DO-bit (DNSSEC OK)

- Some network hardware blocks DNSSEC traffic

- Firewalls stop UDP packets:- Over 512 bytes in size on port 53- Blocking fragmented UDP packets

9

woensdag 2 juni 2010

Page 10: DNSSEC at an NREN: resolving · SURFnet. We make innovation work The ARIN incident - chia.arin.net was the culprit - It has both an IPv4 as well as an IPv6 address - IPv4 (A) could

SURFnet. We make innovation work

Firewalls and other M-i-t-M (2)

- People block TCP on port 53 on their firewall

- SOHO routers interfere with DNS traffic- Many broken DNS implementations- Read the Nominet report: http://download.nominet.org.uk/

dnssec-cpe/DNSSEC-CPE-Report.pdf

- Red Hat Enterprise Linux 5.x has a seriously broken IPv6 implementation- IPv6 firewall (ip6tables) contains a few nasty bugs- Enabling ip6tables causes the packet MTU on IPv6 to drop

drastically- This causes fragmentation, and it turns out that it also drops

fragments

10

woensdag 2 juni 2010

Page 11: DNSSEC at an NREN: resolving · SURFnet. We make innovation work The ARIN incident - chia.arin.net was the culprit - It has both an IPv4 as well as an IPv6 address - IPv4 (A) could

SURFnet. We make innovation work

DLV is dangerous in production

- If DLV is untrusted, all uncached queries fail!

11

> 1500 SERVFAILs/second!

woensdag 2 juni 2010

Page 12: DNSSEC at an NREN: resolving · SURFnet. We make innovation work The ARIN incident - chia.arin.net was the culprit - It has both an IPv4 as well as an IPv6 address - IPv4 (A) could

SURFnet. We make innovation work

What you can do?

- The DNS root zone will be signed this summer

- Prepare your resolvers for validation- Upgrade software if necessary- Check if your software supports DNSSEC

- Inform your constituencies

- Build knowledge on DNSSEC

- Form a strategy on signing your own domains

- Participate in a DNSSEC activity, either atTF-MNM or elsewhere

12

woensdag 2 juni 2010

Page 13: DNSSEC at an NREN: resolving · SURFnet. We make innovation work The ARIN incident - chia.arin.net was the culprit - It has both an IPv4 as well as an IPv6 address - IPv4 (A) could

SURFnet. We make innovation work

That’s all folks... Questions?

?Thank you for your attention!

Roland van Rijswijk

roland.vanrijswijk [at] surfnet.nl

Presentation released under Creative Commons(http://creativecommons.org/licenses/by-nc-sa/3.0/nl/deed.en)

13

woensdag 2 juni 2010