dns and security dns and security dns and security dns
play

DNS and Security DNS and Security DNS and Security DNS and - PowerPoint PPT Presentation

DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and


  1. DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security DNS and Security Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto RMLL Security Track July 5th, 2016

  2. whois whois whois whois whois whois whois whois whois whois whois whois whois whois whois whois whois Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto Julien Pivotto • Sysadmin at inuits .eu Sysadmin at inuits .eu Sysadmin at inuits .eu Sysadmin at inuits .eu Sysadmin at inuits .eu Sysadmin at inuits .eu Sysadmin at inuits .eu Sysadmin at inuits .eu Sysadmin at inuits .eu Sysadmin at inuits .eu Sysadmin at inuits .eu Sysadmin at inuits .eu Sysadmin at inuits .eu Sysadmin at inuits .eu Sysadmin at inuits .eu Sysadmin at inuits .eu Sysadmin at inuits .eu • From small to large scale orgs From small to large scale orgs From small to large scale orgs From small to large scale orgs From small to large scale orgs From small to large scale orgs From small to large scale orgs From small to large scale orgs From small to large scale orgs From small to large scale orgs From small to large scale orgs From small to large scale orgs From small to large scale orgs From small to large scale orgs From small to large scale orgs From small to large scale orgs From small to large scale orgs • Automation & Monitoring Automation & Monitoring Automation & Monitoring Automation & Monitoring Automation & Monitoring Automation & Monitoring Automation & Monitoring Automation & Monitoring Automation & Monitoring Automation & Monitoring Automation & Monitoring Automation & Monitoring Automation & Monitoring Automation & Monitoring Automation & Monitoring Automation & Monitoring Automation & Monitoring • @roidelapluie @roidelapluie @roidelapluie on irc/twitter/github @roidelapluie on irc/twitter/github on irc/twitter/github @roidelapluie @roidelapluie @roidelapluie @roidelapluie @roidelapluie @roidelapluie @roidelapluie @roidelapluie @roidelapluie @roidelapluie @roidelapluie @roidelapluie @roidelapluie on irc/twitter/github on irc/twitter/github on irc/twitter/github on irc/twitter/github on irc/twitter/github on irc/twitter/github on irc/twitter/github on irc/twitter/github on irc/twitter/github on irc/twitter/github on irc/twitter/github on irc/twitter/github on irc/twitter/github on irc/twitter/github

  3. inuits .eu

  4. DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS

  5. What is DNS? What is DNS? What is DNS? What is DNS? What is DNS? What is DNS? What is DNS? What is DNS? What is DNS? What is DNS? What is DNS? What is DNS? What is DNS? What is DNS? What is DNS? What is DNS? What is DNS? • T T T T T T T T TL;DR Translates domain name to IP T T T T T T T T • I I I I I I In facto, stores much more data than IP I I I I I I I I I I

  6. How it works How it works Licensed under a Creative Commons Attribution-ShareAlike 2.0 License How it works How it works How it works How it works How it works How it works How it works How it works How it works How it works How it works How it works How it works How it works How it works https://www.flickr.com/photos/frans16611/6139595092

  7. Licensed under a Creative Commons Attribution-ShareAlike 2.0 License Inspired by @jpmens - Icons by http://jcartier.net/spip.php?aticle39

  8. Licensed under a Creative Commons Attribution-ShareAlike 2.0 License Inspired by @jpmens - Icons by http://jcartier.net/spip.php?aticle39

  9. Licensed under a Creative Commons Attribution-ShareAlike 2.0 License Inspired by @jpmens - Icons by http://jcartier.net/spip.php?aticle39

  10. Licensed under a Creative Commons Attribution-ShareAlike 2.0 License Inspired by @jpmens - Icons by http://jcartier.net/spip.php?aticle39

  11. Licensed under a Creative Commons Attribution-ShareAlike 2.0 License Inspired by @jpmens - Icons by http://jcartier.net/spip.php?aticle39

  12. DNS is mission-critical DNS is mission-critical DNS is mission-critical DNS is mission-critical DNS is mission-critical DNS is mission-critical DNS is mission-critical DNS is mission-critical DNS is mission-critical DNS is mission-critical DNS is mission-critical DNS is mission-critical DNS is mission-critical DNS is mission-critical DNS is mission-critical DNS is mission-critical DNS is mission-critical • H H H H H H H H H H H H H H H H Holds IP addresses • H H H H H H H H H H H H H H H H Holds service definitions • H H H H H H H H H H H H H H H H Holds hostnames, TXT records

  13. DNS practices DNS practices DNS practices DNS practices DNS practices DNS practices DNS practices DNS practices DNS practices DNS practices DNS practices DNS practices DNS practices DNS practices DNS practices DNS practices DNS practices • D D D D D D D D Do not mix Authoritative and Recursive D D D D D D D D servers • M M M M M M M Mix your DNS server `brand' M M M M M M M M M • H H H H H H Hide your DNS masters H H H H H H H H H H • D D D D D D D D D D D D D D D D Do not invent new TLD

  14. Data stored in DNS Data stored in DNS Data stored in DNS Data stored in DNS Data stored in DNS Data stored in DNS Data stored in DNS Data stored in DNS Data stored in DNS Data stored in DNS Data stored in DNS Data stored in DNS Data stored in DNS Data stored in DNS Data stored in DNS Data stored in DNS Data stored in DNS • A A A A A A A A A A records: IP addresses A A A A A A A • C C C C C C C C C C C C C C C C CNAME: Cannonical names • S S S S S S S S S S S S S S S S SRV: Service record • M M M M M M M M M M MX: Mail servers M M M M M M • T T T T T TXT: Text record T T T T T T T T T T T

  15. 0 5 5222 xmpp.inuits.eu. SRV SRV records SRV records SRV records SRV records SRV records SRV records SRV records SRV records SRV records SRV records SRV records SRV records SRV records SRV records SRV records SRV records SRV records _xmpp − client._tcp.inuits.eu. IN

  16. TXT Records TXT Records TXT Records TXT Records TXT Records TXT Records TXT Records TXT Records TXT Records TXT Records TXT Records TXT Records TXT Records TXT Records TXT Records TXT Records TXT Records • S S S S S S SPF record: Sender Policy Framework S S S S S S S S S S • D D D D D D DKIM D D D D D D D D D D • K K K K K K K K K Keybase.io K K K K K K K • L L L L L L L L L L L L L L L L Let's Encrypt DNS challenge

  17. Not secure by design Not secure by design Not secure by design Not secure by design Not secure by design Not secure by design Not secure by design Not secure by design Not secure by design Not secure by design Not secure by design Not secure by design Not secure by design Not secure by design Not secure by design Not secure by design Not secure by design • 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1983 • D D D D D D D D D D D D D D D D Designed for scale, not security • E E E E E E E E E E E E E E E E Early 2000: birth of DNSSec

  18. DNSSec DNSSec DNSSec DNSSec DNSSec DNSSec DNSSec DNSSec DNSSec DNSSec DNSSec DNSSec DNSSec DNSSec DNSSec DNSSec DNSSec • 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2000's DNSSec RFC • D D D D D D D D D DNSSec hit DNS root in 2010 D D D D D D D • M M M M M M M M M Multiple iteration of RFC M M M M M M M

  19. The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. RFC 4033

  20. What is DNS Sec? What is DNS Sec? What is DNS Sec? What is DNS Sec? What is DNS Sec? What is DNS Sec? What is DNS Sec? What is DNS Sec? What is DNS Sec? What is DNS Sec? What is DNS Sec? What is DNS Sec? What is DNS Sec? What is DNS Sec? What is DNS Sec? What is DNS Sec? What is DNS Sec? • P P P P P P P P P P P P P P P P Proof of origin and integrity • Z Z Z Z Z Z Z Z Z Zones and records signing Z Z Z Z Z Z Z • P P P P P P P P P Proof of non-existence P P P P P P P

  21. Two types of keys Two types of keys Two types of keys Two types of keys Two types of keys Two types of keys Two types of keys Two types of keys Two types of keys Two types of keys Two types of keys Two types of keys Two types of keys Two types of keys Two types of keys Two types of keys Two types of keys • Z Z Z Z Z Z Z Z ZSK: Zone Signing Key Z Z Z Z Z Z Z Z • K K K K K K KSK: Key Signing Key K K K K K K K K K K

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend