assessing and improving the quality of dnssec deployment
play

Assessing and Improving the Quality of DNSSEC Deployment - PowerPoint PPT Presentation

Assessing and Improving the Quality of DNSSEC Deployment Deployment Casey Deccio, Ph.D. Sandia National Laboratories AIMS-4 CAIDA, SDSC, San Diego, CA Feb 9, 2012 Sandia is a multiprogram laboratory operated by Sandia Corporation, a


  1. Assessing and Improving the Quality of DNSSEC Deployment Deployment Casey Deccio, Ph.D. Sandia National Laboratories AIMS-4 CAIDA, SDSC, San Diego, CA Feb 9, 2012 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear Security Administration under contract DE-AC04- 94AL85000.

  2. O tli Outline  DNSSEC protocol review DNSSEC protocol review  DNSSEC maintenance and misconfiguration  DNSSEC survey and results  Conclusions and solutions 2

  3. DNS Security Extensions (DNSSEC) (DNSSEC)  RRsets signed with zone’s private key(s)  Signatures covering RRsets returned by server as RRSIGs g g y  Public keys published in zone data as DNSKEYs  Resolver validates response If authentic: Authenticated data (AD) bit is set ( )  If bogus: SERVFAIL message is returned  Query: www.bar.com/A ? Query: www bar com/A ? Query: www.bar.com/A ? Answer: 192.0.2.16 RRSIG Query: bar.com/DNSKEY ? RRSIG Answer: DNSKEY… validate bar.com Answer: 192.0.2.16 AD authoritative server recursive/validating stub resolver resolver 3

  4. Scalable authentication via a chain of trust h i f t t Resolver R l trust anchor DNSKEY  DNSKEY must be  DNSKEY must be authenticated Zone data DS  Resolver must have  Resolver must have . some notion of trust DNSKEY  Trust extends through ancestry to a trust Zone data DS com anchor at resolver  DS resource record – DS d DNSKEY provides digest of Zone data DNSKEY in child zone DNSKEY in child zone bar.com 4

  5. Backwards compatibility… kind of ki d f Resolver trust anchor  If no secure link exists  If no secure link exists between parent and child, referring (parent) DNSKEY server must prove non- server must prove non Zone data existence of DS RRs DS .  NSEC/NSEC3 resource records provide records provide DNSKEY authenticated denial of existence Zone data  Child zones of insecure  Child zones of insecure NSEC/DS / net delegations may be unsigned or signed Zone data (“islands of security”) ( islands of security ) baz.net 5

  6. DNSSEC validation status lid ti t t  Secure  Secure – unbroken unbroken chain from anchor to RRset RRset (I (Image from http://dnsviz.net/) f htt //d i t/) 6

  7. DNSSEC validation status lid ti t t  Insecure – chain that securely terminates (i e (i.e., insecure insecure delegation) Secure chain termination (Image from http://dnsviz.net/) (Image from http://dnsviz.net/) 7

  8. 8 Break in chain validation status t/) (Image from http://dnsviz.net/) t t  Bogus – broken broken i htt //d DNSSEC lid ti  Bogus chain f (I

  9. O tli Outline  DNSSEC protocol review DNSSEC protocol review  DNSSEC maintenance and misconfiguration  DNSSEC survey and results  Conclusions and solutions 9

  10. DNSSEC M i t DNSSEC Maintenance  RRSIG refresh RRSIG refresh  DNSKEY rollovers  ZSK rollovers – non-SEP (secure entry point), ZSK ll SEP ( i ) self-contained  KSK rollovers  KSK rollovers – SEP requires interaction with SEP requires interaction with parent or trust anchor  Algorithm changes  Algorithm changes 10

  11. DNSSEC Mi DNSSEC Misconfiguration fi ti  DS Mismatch  DS Mismatch – No DNSKEY matching DS in parent No DNSKEY matching DS in parent zone  DNSKEY Missing – DNSKEY not available to validate RRSIG  NSEC Missing – NSEC RRs not returned by authoritative server authoritative server  RRSIG Missing – RRSIGs not returned by some servers  RRSIG Bogus – Signature in RRSIG does not validate  RRSIG Bogus Signature in RRSIG does not validate  RRSIG Dates – Expired or premature RRSIG dates 11

  12. 12 DNSSEC is hard. d DNSSEC i h

  13. Jan 10, 2012 – Comcast turned on DNSSEC validation for all on DNSSEC validation for all its residential customers. http://blog comcast com/2012/01/comcast-completes-dnssec-deployment html http://blog.comcast.com/2012/01/comcast-completes-dnssec-deployment.html 13

  14. Jan 18 2012 – Comcast Jan 18, 2012 Comcast customers could not access nasa.gov. http://forums.comcast.com/t5/Connectivity-and-Modem-Help/NASA-gov-blocked/td-p/1169657 http://nasawatch.com/archives/2012/01/comcast-blocks.html 14

  15. Jan 22 2012 – Comcast Jan 22, 2012 Comcast customers could not access bi bitcoinica.com. i i http://www.reddit.com/r/Bitcoin/comments/orzpq/attention_comcast_users_we_have_been_censored/ 15

  16. Comcast is clearly “ censoring” these sites. But why? these sites. But why? Enter DNSViz… 16

  17. DNSVi DNSViz  Actively monitors domains from single Actively monitors domains from single vantage point  Makes results available for visual analysis at M k lt il bl f i l l i t http://dnsviz.net/ com foo.com DNSViz server bar.com 17 17

  18. 18

  19. 19

  20. 20 But, they “fixed” it… y ,

  21. O tli Outline  DNSSEC protocol review DNSSEC protocol review  DNSSEC maintenance and misconfiguration  DNSSEC survey and results  Conclusions and solutions 21

  22. DNSSEC d DNSSEC deployment survey l t  Polled ~2,700 production signed zones over Polled 2 700 production signed zones over a year time frame (May 2010 – July 2011)  Validation of SOA RR analyzed several times V lid ti f SOA RR l d l ti daily, anchored at ISC DLV or root zone (after July 2010 root signing) (after July 2010 root signing)  Identified maintenance and misconfigurations 22

  23. S Survey breakdown by TLD b kd b TLD 900 900 Zones 800 700 Zones with 600 600 misconfiguration Zones 500 400 300 200 100 0 TLD 23

  24. RRSIG lif ti RRSIG lifetimes 1 1 0.9 0.8 0.7 0 7 RRSIG(DNSKEY) all 0.6 zones CDF 0.5 C 0 4 0.4 RRSIG(DNSKEY) 0.3 zones with expired RRSIG 0.2 0 1 0.1 0 0 30 60 90 120 150 180 210 240 270 300 330 360 Days Days 24

  25. DNSKEY DNSKEY rollovers ll Key role Key role Zones that did Zones that did Zones that rolled Zones that rolled Zones that rolled Zones that rolled not roll key (0) key once (1) key more than once (>1) ZSK 37% 11% 52% KSK 72% 17% 10% 25

  26. DNSKEY lifetime DNSKEY lif ti 1 1 0.9 0.8 0 7 0.7 0.6 CDF KSK lifetime 0.5 0.4 0 4 ZSK lifetime 0.3 0.2 KSK lifetime (zones w/ 0.1 bad rollover) 0 0 30 60 90 120 150 180 210 240 270 300 330 360 390 Days Days 26

  27. Mi Misconfigurations by type fi ti b t 3000 Incremental Partial 2500 Complete 2000 2000 1500 1000 500 500 0 DS DS DNSKEY DNSKEY NSEC NSEC RRSIG RRSIG RRSIG RRSIG RRSIG RRSIG Mismatch Missing Missing Missing Bogus Dates 27

  28. E Event duration t d ti 1 1 0.9 0.8 0.7 0.6 DS Mismatch 0.5 DNSKEY Missing g 0.4 NSEC Missing 0.3 RRSIG Missing RRSIG Bogus RRSIG Bogus 0.2 0 2 RRSIG Dates 0.1 0 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 28

  29. R Repeat offense rate t ff t 0 6 0.6 0.5 0.4 0.3 0.2 0.1 0 DS DNSKEY NSEC RRSIG RRSIG RRSIG Mi Mismatch t h Mi Missing i Mi Missing i Mi Missing i B Bogus D t Dates 29

  30. 30 IPv6 analysis

  31. 31 IPv6 inconsistencies

  32. O tli Outline  DNSSEC protocol review DNSSEC protocol review  DNSSEC maintenance and misconfiguration  DNSSEC survey and results  Conclusions and solutions 32

  33. S Summary of Observations f Ob ti  Resolver operators are learning about third- Resolver operators are learning about third party DNSSEC misconfigurations from their customers customers.  Administrators aren’t detecting and correcting their DNSSEC problems in a timely fashion their DNSSEC problems in a timely fashion.  Administrators aren’t learning from past mistakes mistakes. 33

  34. S l ti Solutions  Tools for DNSSEC comprehensive analysis  Tools for DNSSEC comprehensive analysis  Hierarchical analysis (chain of trust)  Dependency analysis (CNAME MX NS etc)  Dependency analysis (CNAME, MX, NS, etc)  Server consistency analysis  Pointers to specification p  Resources for corrective action  Tools/resources for detection/notification of misconfiguration  Individual monitoring and alerts  Global monitoring and alerts 34

  35. DNSVi DNSViz – future plans f t l  Expansion of detailed analysis  Expansion of detailed analysis  Passive monitoring, in addition to active monitoring Diverse backend support  e.g., ISC Security Information Exchange (SIE)  Prioritized active probing  Alerts of misconfiguration Alerts of misconfiguration   RESTful API for programmatic third-party monitoring  Cache analysis/local perspective  Availability of software for diverse uses 35

  36. 36

  37. 37 ctdecci@sandia gov  ctdecci@sandia.gov ? Questions? ti Q

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend