DNSSEC Impact on Registries Edward Lewis, Neustar Jakob Schlyter, - - PowerPoint PPT Presentation

dnssec impact on registries
SMART_READER_LITE
LIVE PREVIEW

DNSSEC Impact on Registries Edward Lewis, Neustar Jakob Schlyter, - - PowerPoint PPT Presentation

DNSSEC Impact on Registries Edward Lewis, Neustar Jakob Schlyter, .SE February 22, 2005 APRICOT Tutorial T11-3 1 Agenda What is a Registry, how is it run? Steps Towards Internal DNSSEC Steps Towards External DNSSEC Tough


slide-1
SLIDE 1

February 22, 2005 APRICOT Tutorial T11-3 1

DNSSEC Impact on Registries

Edward Lewis, Neustar Jakob Schlyter, .SE

slide-2
SLIDE 2

February 22, 2005 APRICOT Tutorial T11-3 2

Agenda

  • What is a Registry, how is it run?
  • Steps Towards Internal DNSSEC
  • Steps Towards External DNSSEC
  • Tough Issues
slide-3
SLIDE 3

February 22, 2005 APRICOT Tutorial T11-3 3

Registries & DNSSEC

  • Why cover this topic?
  • DNSSEC needs a hierarchy of public

keys

– Root covers TLD – TLD covers next level, … – downward to data

  • Registries enable building the hierarchy
slide-4
SLIDE 4

February 22, 2005 APRICOT Tutorial T11-3 4

JPRS

DNS tree and DNSSEC

Root zone "." SOA, DNSKEY

  • jp. NS, DS

JP zone jp SOA, DNSKEY ad.jp NS, DS JP Admin Zone ad.jp SOA DNSKEY wide.ad.jp NS, DS WIDE Project zone wide.ad.jp SOA, DNSKEY DS "points to" DNSKEY

slide-5
SLIDE 5

February 22, 2005 APRICOT Tutorial T11-3 5

What is a Registry?

Registries come in many forms:

  • Name Registry, e.g., .edu, .jp, .kr, .cn, .tw
  • Number Registry, e.g., APNIC
  • Routing Registry, e.g., RADB
  • Non-Internet Registries too
  • We will stay with name registries and

number registries (“Internet registries”)

slide-6
SLIDE 6

February 22, 2005 APRICOT Tutorial T11-3 6

Others Involved

  • Registrant = Whoever gets the name or

address space

  • DNS Operator = Whoever runs the DNS

for the Registrant (sometimes the same)

  • Registrar = A “retailer” for some

Registries

slide-7
SLIDE 7

February 22, 2005 APRICOT Tutorial T11-3 7

Registry Environment

  • The job of a registry is to relate

resource (domain) to a user (registrant)

  • Registries get requests

– Directly from Registrants (and/or) – Indirectly via Registrars

  • Registries supply publication services

– WhoIs, IRIS, DNS, sometimes routing

slide-8
SLIDE 8

February 22, 2005 APRICOT Tutorial T11-3 8

Registry

Registry Context

WhoIs Registry Database Registry Functions DNS Master DNS Slave DNS Slave DNS Slave WhoIs IRIS IRIS Registry Interface Registrants - Internet - DNS Operators Registrar (or NIR) DNS Slave and/or

slide-9
SLIDE 9

February 22, 2005 APRICOT Tutorial T11-3 9

Components of a Registry

  • Registration Service
  • Information Service
  • DNS Service
  • The “unseen” Database

– “heart” of a registry

slide-10
SLIDE 10

February 22, 2005 APRICOT Tutorial T11-3 10

Registry Internals

Registry WhoIs Registry Database DNS Slave DNS Slave DNS Slave WhoIs IRIS IRIS DNS Master Registry Functions Registry Interface

slide-11
SLIDE 11

February 22, 2005 APRICOT Tutorial T11-3 11

Registration Interface

  • Getting Data Into a Registry
  • The “Front Office”
  • Important to DNSSEC

– This is how DNSSEC data will enter

slide-12
SLIDE 12

February 22, 2005 APRICOT Tutorial T11-3 12

Registry Functions

  • Registries have business rules

– Billing for actions

  • Is there money in an account?

– Checks on registered data

  • Is the registration authentic? Authorized?
  • Are there 2-13 name servers?
  • Is the requested name appropriate?
slide-13
SLIDE 13

February 22, 2005 APRICOT Tutorial T11-3 13

Registration Database

  • Tracks all data registered

– Besides names, there is billing information, contact information, DNS servers, and more – Will need to store DNSSEC data too

slide-14
SLIDE 14

February 22, 2005 APRICOT Tutorial T11-3 14

Information Service

  • WhoIs (now), IRIS coming/may come
  • Displays information about a registration

– Gives the contact for a domain name – Gives the contact for an IP address

  • Might display DNSSEC data
slide-15
SLIDE 15

February 22, 2005 APRICOT Tutorial T11-3 15

Domain Name Service

  • For a “name registry” this is the most

vital operational service

  • Usually - hidden master, publicly

accessible slave servers

  • DNSSEC will add new record types

– DNSKEY, RRSIG, NSEC, and DS

slide-16
SLIDE 16

February 22, 2005 APRICOT Tutorial T11-3 16

Modes of Operation

  • Direct or Indirect Relationships

– Registrars?

  • Registration Style and Protocol

– Interactive or batch?

  • DNS Update Frequency

– Immediate or, say, daily updates?

slide-17
SLIDE 17

February 22, 2005 APRICOT Tutorial T11-3 17

Environment

  • Registries may interact with the public

directly (for registrations)

  • Some registries follow a “shared registry

model”

– Registrars provide interface

  • RIRs and NIRs are a mixture of both
slide-18
SLIDE 18

February 22, 2005 APRICOT Tutorial T11-3 18

Direct Interface

  • A registrant (“buyer of a name”) will

contact the registry

  • This is an “open to all” arrangement
  • This is the original style of Internet

registries

  • Impact to DNSSEC

– Direct contact between registry and registrant

slide-19
SLIDE 19

February 22, 2005 APRICOT Tutorial T11-3 19

Registrars

  • “Retailers” of domain names
  • Registrars will handle DNSSEC data

– Need to add DNSSEC to registration requests – Will increase number of requests

  • Registrars may bundle services,

including DNS operations

slide-20
SLIDE 20

February 22, 2005 APRICOT Tutorial T11-3 20

Registration Interface

  • How is it transferred?
  • What is "it"?

– DNSKEY appears in Registrant's zone – DS appears in Registry – What gets passed?

slide-21
SLIDE 21

February 22, 2005 APRICOT Tutorial T11-3 21

DNSKEY vs DS

  • A DS RR is made from a DNSKEY

– DS RR holds a hash of the DNSKEY

  • Who performs the hash function?

– Registrant/Registrar? – Registry?

  • This is a significant design choice

– Will address this on EPP slide

slide-22
SLIDE 22

February 22, 2005 APRICOT Tutorial T11-3 22

Asynchronous (Email)

  • Some registries use formal template

messages sent via SMTP

  • Work flow is managed in mail folders
  • Interface is "store and forward" not

interactive

  • This kind of interface is hindered by

spam volume

slide-23
SLIDE 23

February 22, 2005 APRICOT Tutorial T11-3 23

Client-Server

  • These interfaces consist of client

software to send messages to a server

  • Registries using this need to distribute

software to registrants or registrars (more common)

  • Security arrangements are usually pre-

determined (certificates)

slide-24
SLIDE 24

February 22, 2005 APRICOT Tutorial T11-3 24

RRP, others

  • Registry-Registrar Protocol
  • Developed by Verisign
  • Used in .com and .net
  • Led to the development of the IETF

standard EPP

  • Other protocols are in use, not as

widespread (e.g., Payload 2.0 SRS)

slide-25
SLIDE 25

February 22, 2005 APRICOT Tutorial T11-3 25

Web-based

  • Like mail, sometimes layered on mail
  • Because web clients are anonymous

these make use of certificates for identification and authentication

  • This makes them behave less like mail

interfaces and more like client-server

– There is a prearranged agreement in place

slide-26
SLIDE 26

February 22, 2005 APRICOT Tutorial T11-3 26

EPP

  • Extensible Provisioning Protocol
  • IETF Proposed Standard, documented

in 2004

– RFC numbers 3730 thru 3735

  • XML based, runs over TLS
  • Written in context of a shared registry

model (registrars)

slide-27
SLIDE 27

February 22, 2005 APRICOT Tutorial T11-3 27

EPP and DNSSEC

  • EPP is extensible
  • IETF draft document for inclusion of

DNSSEC

– draft-hollenbeck-epp-secdns-06.txt – http://www.ietf.org/internet-drafts/ – "-06" will increment from time to time

  • Tests are being conducted with this

definition

slide-28
SLIDE 28

February 22, 2005 APRICOT Tutorial T11-3 28

EPP on "DNSKEY vs DS"

  • EPP is leaning towards the transmission
  • f the DS as the primary means of

registering DNSSEC data

  • The rationale is

– Simplifies the registry, core functions

  • DNSKEY is an optional feature of DS

– In case a registry wants to collect it

slide-29
SLIDE 29

February 22, 2005 APRICOT Tutorial T11-3 29

EPP-SECDNS Field Test

  • A short-term trial conducted in

November 2004

  • Registrar-Registry

– Alice's Registry <-> NeuStar – dnssectrial.us was the test zone

  • Worked, comments supplied were fed

into the current draft

slide-30
SLIDE 30

February 22, 2005 APRICOT Tutorial T11-3 30

Frequency of DNS Updates

  • DNSSEC is defined to allow the signing

process to be off-line

  • This was done when updates were

done once or twice a day

– Time enough to transfer files over "air-gap"

  • Modern registries update DNS in

minutes of a name's registration

slide-31
SLIDE 31

February 22, 2005 APRICOT Tutorial T11-3 31

Batch Updates

  • If a zone is updated only a few times a

day

– "Dump" the zone file from the database – Sign the zone file, off-line – Push the zone file to DNS servers

  • The major decision is whether the whole

zone is signed or are signatures "recycled"

slide-32
SLIDE 32

February 22, 2005 APRICOT Tutorial T11-3 32

Off-line, batch signing

Registry Database DNS Slave DNS Slave DNS Slave DNS Master DNS Signer

Private Key

AXFR

slide-33
SLIDE 33

February 22, 2005 APRICOT Tutorial T11-3 33

Incremental Updates

  • Quickly-refreshed, large zones need to

make use of incremental updates

– If one name is added to a million name zone, you'd rather ship the new name around, not the million + one names

  • DNS has two incremental updates

– Dynamic Update – Incremental Zone Transfer

slide-34
SLIDE 34

February 22, 2005 APRICOT Tutorial T11-3 34

Dynamic Signing

Registry Database DNS Slave DNS Slave DNS Slave DNS Master

Private Key

IXFR

slide-35
SLIDE 35

February 22, 2005 APRICOT Tutorial T11-3 35

Steps Towards DNSSEC

  • Internal Deployment

– Setting up key management procedures – Signing the zone like a registrant would

  • Opening for Registration

– Accept DS or DNSKEY records – Sign those into the zone – A new "service"

slide-36
SLIDE 36

February 22, 2005 APRICOT Tutorial T11-3 36

Signing the Registry Zone File

  • Steps

– Key Management plan – Signing the zone – "Recycling" signatures and incremental signing – Securely transferring the zone from master servers to slave servers

slide-37
SLIDE 37

February 22, 2005 APRICOT Tutorial T11-3 37

Key Management

  • Public key cryptography works on key-

pairs

– Private key, held secret and signs data – Public key, distributed and verifies data

  • Private keys need to be protected and

"the wear out"

  • Public keys need to be published
slide-38
SLIDE 38

February 22, 2005 APRICOT Tutorial T11-3 38

Private Keys

  • Protection is important

– Anything verified by the public key is tied back to this key

  • Lifetime

– The more often a key is used, the easier someone can "guess" it – A guessed (or exposed/stolen) key is "worse than worthless"

slide-39
SLIDE 39

February 22, 2005 APRICOT Tutorial T11-3 39

Public keys

  • Needs to be available to all who verify

signatures

  • Widespread distribution

– Where ever it is needed, on-demand

  • Reliable distribution

– Make it harder for "false" public keys

slide-40
SLIDE 40

February 22, 2005 APRICOT Tutorial T11-3 40

ZSK and KSK

  • Operational tests have lead to ZSK and

KSK names for keys

  • ZSK = Zone Signing Keys

– Often used, discarded frequently

  • KSK = Key Signing Keys

– Rarely used, passed up to parent

  • KSK's are what DS records point to
slide-41
SLIDE 41

February 22, 2005 APRICOT Tutorial T11-3 41

Zone Signing

  • Starts with key management plan and a

zone signer

  • Need to distribute signed zone securely
  • Other considerations

– Use of dynamic update – Incremental zone updates

slide-42
SLIDE 42

February 22, 2005 APRICOT Tutorial T11-3 42

Zone Signer Application

  • Functions

– Sign RRSets

  • Cryptographic operations

– Add NSEC (authenticated denial) records – Include DS RRSets for registrants

slide-43
SLIDE 43

February 22, 2005 APRICOT Tutorial T11-3 43

Hardware Assist for Signing

  • Protects private key

– Key memory isn't accessible

  • Speeds processing

– Processor built for cryptography

slide-44
SLIDE 44

February 22, 2005 APRICOT Tutorial T11-3 44

Recycling Signatures

  • Reuse of previous signatures

– E.g., sign daily, with weekly expiration

  • To do this, the output of the signer has

to be fed back to the database, or

  • therwise used as input for the next

signing operation

slide-45
SLIDE 45

February 22, 2005 APRICOT Tutorial T11-3 45

Zone Transfer Security

  • Plain zone transfers are not secure
  • Management VPN

– Firewall or VPN client/server encrypts all traffic

  • TSIG

– DNS protocol (application level) protection

slide-46
SLIDE 46

February 22, 2005 APRICOT Tutorial T11-3 46

Opening Service to Registrants

  • Chief service is signing delegation

information

  • For large zones, incremental signing is

needed

  • Dynamic update and incremental zone

transfers are needed too

slide-47
SLIDE 47

February 22, 2005 APRICOT Tutorial T11-3 47

Signing Delegation Information

  • Currently a registry has an NS RRSet

for a domain name or names for networks

  • Delegations will now feature a DS

RRSet

– Registry is authoritative source (unlike for the NS RRSet)

slide-48
SLIDE 48

February 22, 2005 APRICOT Tutorial T11-3 48

Incrementally Signing a Zone

  • Completely signing a large zone will

take a long time

– One or two signatures per name

  • Sign only what is new, what has expired

– Means retaining old(er) signatures

slide-49
SLIDE 49

February 22, 2005 APRICOT Tutorial T11-3 49

Signing Dynamic Updates

  • Dynamic Update can be used to push

changes into DNS

– Ought to be done securely

  • Private key is needed on the "true"

master server

– Protection is an issue, workload

  • Also need incremental zone update
slide-50
SLIDE 50

February 22, 2005 APRICOT Tutorial T11-3 50

DNSSEC Data Flows

  • Registration
  • Database
  • Information Services
  • DNS
  • DNS Monitoring
slide-51
SLIDE 51

February 22, 2005 APRICOT Tutorial T11-3 51

Registration of DNSSEC Information

  • Registration today -

– Name, Contact Information, Name Servers

  • DNSSEC

– DS or DNSKEY – Could also include "data lifetime"

slide-52
SLIDE 52

February 22, 2005 APRICOT Tutorial T11-3 52

DNSSEC in the Database

  • For name registries

– DS or DNSKEY for each registration – May be multiple keys

  • For number registries

– DS or DNSKEY set for each reverse-map zone, not just each network

slide-53
SLIDE 53

February 22, 2005 APRICOT Tutorial T11-3 53

DNSSEC in Information Services

  • Optional to DNSSEC
  • Useful for debugging and checking

registered data

  • Could show any DNSKEY records

collected, with just DS in zone

  • Also could show any "time based" data
slide-54
SLIDE 54

February 22, 2005 APRICOT Tutorial T11-3 54

DNSSEC in DNS Zone File

  • DNSSEC will add

– RRSIG for top of zone RRSets (SOA, etc) – NSEC and RRSIG for all names in zone – DS and RRSIG for all names with DNSSEC in zone

  • Zone file gets bigger
  • Bandwidth needed gets bigger
slide-55
SLIDE 55

February 22, 2005 APRICOT Tutorial T11-3 55

DNSSEC “Health” Checks

  • Some registries automate cleaning the

DNS, e.g., lame delegation checking

  • What is needed for DNSSEC?

– Verify that each DS RR refers to an available DNSKEY, with correct hash – Verify that all DNSKEYs that are supposed to have DS records do so

  • "Fixes" ought not be automatic
slide-56
SLIDE 56

February 22, 2005 APRICOT Tutorial T11-3 56

Protection of DNSSEC Flows

  • Assuming Internal Security

– Integrity of the internal components of a registry is important, but assumed here

  • Securing Input

– Is registration authentic and authorized?

  • Securing Output

– Is published data protected?

slide-57
SLIDE 57

February 22, 2005 APRICOT Tutorial T11-3 57

Securing the Registration Interface

  • Authentication

– Verify that the registration request is from the entity that is named in the request – Is the registrant really the registrant?

  • Authorization

– Is the registration request to be allowed?

slide-58
SLIDE 58

February 22, 2005 APRICOT Tutorial T11-3 58

Securing the DNS Zone File

  • Database to Hidden master

– Done on a protected network – Incremental updates can be protected with Secure Dynamic Update

  • Hidden master to slave servers

– VPN, encrypted tunnels – TSIG protection of AXFR and IXFR

slide-59
SLIDE 59

February 22, 2005 APRICOT Tutorial T11-3 59

Performance Burden of DNSSEC

  • Data Held and Produced

– This will impact the interface to registrants and registrars – Also internal data capacity

  • Data Transferred

– This will impact the data published by a registry to the general Internet

slide-60
SLIDE 60

February 22, 2005 APRICOT Tutorial T11-3 60

Demand on a Registry

  • Sources of demand

– Registration requests

  • DNSSEC key refreshes will raise this

– Amount of data held

  • DS records will add to this, DNSKEYs ever

more so

– Internet traffic

  • Internet activity is not related to registrations
slide-61
SLIDE 61

February 22, 2005 APRICOT Tutorial T11-3 61

Volume of Data Held in Database

  • Per object transactions increase as

keys are refreshed

– Change more than name servers

  • Data stored also increases

– Maybe 100's-1000's of bytes per object – But multiply that times number of objects

  • More data to backup, transfer, etc.
slide-62
SLIDE 62

February 22, 2005 APRICOT Tutorial T11-3 62

Volume of Data Held in Zone File

  • Zone files grow considerably
  • Incremental updating is needed
  • Memory use by (some) name servers is

a limitation

slide-63
SLIDE 63

February 22, 2005 APRICOT Tutorial T11-3 63

Bandwidth Impacts

  • DNSSEC messages are larger than

DNS messages

– Must use EDNS0

  • Also more frequent if verification data is

needed

slide-64
SLIDE 64

February 22, 2005 APRICOT Tutorial T11-3 64

Tough Issues for Registries

  • Non-technical considerations
  • Deploy? When?
  • Making it payoff
slide-65
SLIDE 65

February 22, 2005 APRICOT Tutorial T11-3 65

Balance Stability & Innovation

  • Registries play key role in Internet

– Rocking the boat has large ripple effects – For operations "as expected" is better than "an adventure"

  • But innovations in Internet need

improvements at registries

– Internet is not "done" – Needs security, other features

slide-66
SLIDE 66

February 22, 2005 APRICOT Tutorial T11-3 66

Need for Stability

  • Stability is important

– With a solid foundation, other components can innovate – Protocols are sensitive to changes in timing - TCP congestion management

  • Cost efficiency is also important

– Limits testing though

slide-67
SLIDE 67

February 22, 2005 APRICOT Tutorial T11-3 67

Need to Innovate

  • DNSSEC is one innovation

– Supplements overall security – Payoff if the top of the tree is signed, i.e., the root, TLDs, second level domains

  • Other innovations

– IPSEC, Internationalized (non-ASCII) Domain Names

slide-68
SLIDE 68

February 22, 2005 APRICOT Tutorial T11-3 68

What to do?

  • Registries need to participate in

workshops, test environments

– Not alone and not just other registries, but in collaboration with community

  • Registries need to carefully manage

innovation

– It is just a hard job

slide-69
SLIDE 69

February 22, 2005 APRICOT Tutorial T11-3 69

DNSSEC Payoff

  • Chicken-and-Egg problem
  • Enabling Registration
slide-70
SLIDE 70

February 22, 2005 APRICOT Tutorial T11-3 70

Chicken-and-Egg

  • Which came first, chicken or the egg?
  • Which comes first, a DNSSEC registry
  • r a DNSSEC application?
  • DNSSEC applications are in the works

– IPSEC Key and SSH Keys – But no substantial payoff until there are DNSSEC registries

slide-71
SLIDE 71

February 22, 2005 APRICOT Tutorial T11-3 71

Enabling Registrants

  • The reason for registries to pursue

DNSSEC now

– Shapes the protocol for operational efficiency – Enables registrants to make use of DNSSEC applications – Fosters development of other applications

  • Balanced against stability, of course
slide-72
SLIDE 72

February 22, 2005 APRICOT Tutorial T11-3 72

Conclusion

  • Status of the DNSSEC Specification
  • Testing Plans
  • EPP work
slide-73
SLIDE 73

February 22, 2005 APRICOT Tutorial T11-3 73

DNSSEC Document Status

  • In RFC Editor Queue as of Feb 4:

– http://www.ietf.org/internet-drafts/

  • draft-ietf-dnsext-dnssec-intro-13.txt
  • draft-ietf-dnsext-dnssec-records-11.txt
  • draft-ietf-dnsext-dnssec-protocol-09.txt
  • Waiting for Proposed Standard

publication

slide-74
SLIDE 74

February 22, 2005 APRICOT Tutorial T11-3 74

DNSSEC Resources

  • http://dnssec.net/

– Links to many resources, deployment plans

  • http://dnssec-deployment.org/

– New website, group pushing for DNSSEC adoption

slide-75
SLIDE 75

February 22, 2005 APRICOT Tutorial T11-3 75

Presenters

  • Edward Lewis

– ed.lewis @ neustar.biz

  • Jakob Schlyter

– jakob @ rfc.se

slide-76
SLIDE 76

February 22, 2005 APRICOT Tutorial T11-3 76

Questions?

  • We are open for discussion…