SlideShare una empresa de Scribd logo
1 de 110
Descargar para leer sin conexión
Welcome to the


             DNSSEC
    RIPE NCC Training Course




                                                                                   1
DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Why DNSSEC?
• DNS is not secure
  – Known vulnerabilities
  – People depend more and more on DNS


• DNSSEC protects against data spoofing and corruption

• Why this course:
  – To raise awareness on DNSSEC
  – To provide handles for deployment
     • Reverse delegation

                                                                                             2
        DNSSEC   .     RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Why RIPE NCC?
• Maintaining in-addr.arpa for several /8 blocks

• Involved in other DNS issues:
  – K-root name server
  – ENUM


• Interested in Internet-wide security technologies
  – http://www.ripe.net/disi/



                                                                                          3
      DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Who are we?
• Trainers:
  – Know about DNSSEC
  – Not DNS server operators!


• Audience:
  – Know about DNS and want to know about DNSSEC




     • please fill in the “expectations” in the questionnaire

                                                                                              4
      DNSSEC   .      RIPE NCC Training Course   .     http://www.ripe.net/training/dnssec/
Course Outline
• Introduction
• DNSSEC mechanisms
  – to authenticate communication between hosts
     • TSIG / SIG0
  – to establish authenticity and integrity of data
     •   New RRs
     •   Signing a single zone
     •   Building chains of trust
     •   Key exchange and key rollovers
• Operational concerns
• Conclusions
                                                                                           5
     DNSSEC   .      RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
DNS: Known Concepts
• Known DNS concepts:
  – Delegation, Referral, Zone, RRs, label, RDATA,
    authoritative server, caching forwarder, stub and full
    resolver, SOA parameters, etc
  – Don’t know? Do ask!



• Operational knowledge with BIND
  – BIND 8 or 9 named.conf, writing zone files
  – All examples based on IPv4

                                                                                          6
      DNSSEC    .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Reminder: DNS Resolving
Question:
www.ripe.net A
            1                                   2   www.ripe.net A ?                 root-server
                                                                       3     “go ask net server @ X.gtld-servers.net”
           www.ripe.net A ?
                                                                              (+ glue)
Resolver                         Caching
            193.0.0.203
                                forwarder             4       www.ripe.net A ?
                      8
                               (recursive)                                           gtld-server
                                                          5     “go ask ripe server @ ns.ripe.net”
                                                                 (+ glue)
                            9
                          Add to cache
                                                                   6       www.ripe.net A ?

                          10   TTL
                                               “193.0.0.203”       7
                                                                                    ripe-server

                                                                                                                           7
                DNSSEC     .         RIPE NCC Training Course                .      http://www.ripe.net/training/dnssec/
DNS: Data Flow
Zone administrator
                         1
                                                                4
 Zone file                       master                                 Caching forwarder

                     2
                                       3                                                             5
 Dynamic
 updates
                                 slaves                                                         resolver




                                                                                                                    8
                DNSSEC       .       RIPE NCC Training Course       .        http://www.ripe.net/training/dnssec/
DNS Vulnerabilities
Corrupting data                    Impersonating master
                                                                                             Cache impersonation
 Zone administrator
                          1
                                                                  4
  Zone file                        master                                       Caching forwarder

                      2
                                         3                                                                   5
  Dynamic
  updates
                                   slaves                                                               resolver
                                                                      Cache pollution by
                                                                        Data spoofing
       Unauthorized updates
                                                              Altered zone data


                Server protection                                               Data protection
                                                                                                                            9
                 DNSSEC       .        RIPE NCC Training Course             .        http://www.ripe.net/training/dnssec/
DNS Protocol Vulnerability
• DNS data can be spoofed and corrupted between
  master server and resolver or forwarder
• The DNS protocol does not allow you to check the
  validity of DNS data
     • Exploited by bugs in resolver implementation (predictable
       transaction ID)
     • Polluted caching forwarders can cause harm for quite some
       time (TTL)
     • Corrupted DNS data might end up in caches and stay there for
       a long time
• How does a slave (secondary) knows it is talking
  to the proper master (primary)?

                                                                                           10
      DNSSEC   .     RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
DNSSEC protects..
DNSSEC protects against data spoofing and corruption
• TSIG/SIG0: provides mechanisms to authenticate
  communication between servers
• DNSKEY/RRSIG/NSEC: provides mechanisms to
  establish authenticity and integrity of data
• DS: provides a mechanism to delegate trust to public
  keys of third parties

• A secure DNS will be used as an infrastructure with
  public keys
  – However it is NOT a PKI
                                                                                             11
       DNSSEC   .      RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
DNSSEC Current State
• RFC 4033
  – DNS Security Introduction and Requirements
• RFC 4034
  – Resource Records for the DNS Security Extensions
• RFC 4035
  – Protocol Modifications for the DNS Security Extensions


• March 2005
• Obsoletes RFC 2535

                                                                                         12
     DNSSEC    .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Configuration & Installation
             BIND’s named
• BIND 9.3 or later supports current DNSSEC
  – ftp://ftp.isc.org/isc/bind9/
• TSIG requires servers to sync time (time zone!)
  – ntpdate -b
  – xntpd
• Openssl libraries required for crypto parts
  – http://www.openssl.org/
• Compile the source using openssl libraries:
  ./configure --with-openssl


                                                                                         13
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Bind DNSSEC Tools
• Named
• dnssec-keygen
  – Generate keys of various types
• dnssec-signzone
  – Sign a zone
• dig
  – Troubleshoot:               Usage: dig +dnssec @…
• named-checkzone & named-checkconf
  – syntax check for zonefiles and named.conf
                                                                                           14
        DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Server/Named Configuration
• The configuration file is called “named.conf”
• Documentation in <src>/doc/arm/Bv9ARM.html

• Turn on DNSSEC in “options” statement
  – dnssec-enable yes;


• Turn on logging for troubleshooting
  – Several categories
  – Categories are processed in one or more channels
  – Channels specify where the output goes

                                                                                         15
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Relevant Logging Categories

• dnssec
  – Processing DNSSEC signed responses

• security
  – Request that are approved or not

• notify
  – Zone change notification (relevant for dynamic update
    environments)

• update
  – Dynamic update events
                                                                                         16
     DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Logging Configuration Example
logging {
        channel query_channel {
                file "log/querylog" versions 3;
                print-time yes;
        };
        channel dnssec_log {
                file "log/dnssec" versions 2;
                print-time yes;      // add timestamp the entries
                print-category yes; // add category name
                print-severity yes; // add severity level
                severity debug 3;    // print debug messages
        };
        channel everything_else {
                file "log/runlog" versions 3;
                print-time yes;
                print-severity yes;
                print-category yes;
        };
        category dnssec   { dnssec_log; };
        category security { dnssec_log; everything_else; };
        category queries { query_channel; };
        category default { everything_else; };
};
                                                                                             17
        DNSSEC   .     RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Questions?




                                                                                   18
DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Securing Host-Host
   Communication



                                                                                   19
DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
TSIG Protected Vulnerabilities
                               Impersonating master

 Zone administrator


  Zone file                   master                              Caching forwarder



Dynamic
updates                       slaves

                                                                                          resolver
       Unauthorized updates




                                                                                                              20
                 DNSSEC   .        RIPE NCC Training Course   .        http://www.ripe.net/training/dnssec/
Transaction Signature: TSIG
• TSIG (RFC 2845)
  – authorizing dynamic updates & zone transfers
  – authentication of caching forwarders
  – can be used without deploying other features of
    DNSSEC
• One-way hash function
  – DNS question or answer & timestamp
• Traffic signed with “shared secret” key
• Used in configuration, NOT in zone file
                                                                                        21
     DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
TSIG example
                                             Query: AXFR

                          AXFR                                           AXFR

                                                                                              verification
                          Sig ...                                         Sig ...



        Slave                                                               Master
        KEY:                                                                 KEY:
     %sgs!f23fv                                                           %sgs!f23fv


      SOA                                                             SOA
      …                                                               …
      SOA                                                             SOA
       Sig ...                                                         Sig ...

verification

                                            Response: Zone

                                                                                                          22
                 DNSSEC    .        RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
TSIG for Zone Transfers

1. Generate secret

2. Communicate secret

3. Configure servers

4. Test
                                                                                       23
    DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Generate TSIG Secret
dnssec-keygen -a <alg> -b <bits> -n <type> [options] <keyname>


•   algorithm: HMAC-MD5
•   ‘-r /dev/urandom’ might be needed
•   Bits:       256 or larger
•   type:       host
•   Name:       unique identifier
        • Suggested: master-slave.zone.name.
        • “me-friend.” used as example because it is short


• TSIG secret can be generated differently (base64
  encoding)
                                                                                            24
         DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
TSIG dnssec-keygen Output
    dnssec-keygen -a HMAC-MD5 -b 256 -n host me-friend.
                        algorithm             keytag

  Kme-friend.+157+51197.private
  Kme-friend.+157+51197.key
• Private and Public Key contain the same key
• TSIG should never be put in zone files!!!
  – might be confusing because it looks like RR:
     me-friend. IN KEY 512 3 157 nEfRX9…bbPn7lyQtE=



                                                                                          25
      DNSSEC   .   RIPE NCC Training Course   .    http://www.ripe.net/training/dnssec/
Master Server: named.conf
• "Key" statement to configure key
key ”me-friend." {
      algorithm hmac-md5;
      secret “nEfRX9jxOmzsby8VKRgDWEJorhyNbjt1ebbPn7lyQtE=";
    };
•   "allow-transfer" option in zone statement indicates which
    keys are allowed transfer
    – Can be combined with IP based restrictions

    zone ”example.net" {
         type master;
         file "zones/example.net.";
         allow-transfer { key me-friend.; };
         notify yes;
    };
                                                                                                26
           DNSSEC   .     RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Slave Servers: named.conf
• "key" statement to configure the key

   key ”me-friend." {
           algorithm hmac-md5;
           secret
     “nEfRX9jxOmzsby8VKRgDWEJorhyNbjt1ebbPn7lyQtE=";
   };


• "server" statement to indicate key used
   – Zone configuration doesn’t change on slave server

   server 192.168.10.1 {
          keys {me-friend.; };
   };
                                                                                                27
          DNSSEC   .     RIPE NCC Training Course   .    http://www.ripe.net/training/dnssec/
Testing & Troubleshooting: dig

• You can use dig to check TSIG configuration
  – dig    @<server> <zone> AXFR -k <TSIG keyfile>


$ dig @10.0.53.204 example.net AXFR 
     -k Kme-friend.+157+51197.key


• Wrong key will give “Transfer failed” and on the
  server the security-category will log:

  security: error: client 193.0.0.182#1228: zone
  transfer ’example.net/IN' denied
                                                                                         28
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Importance of the Time Stamp
• TSIG/SIG0 signs a complete DNS request /
  response with time stamp
  – to prevent replay attacks
  – currently hardcoded at 5 minutes

• Operational problems when comparing times
  – Make sure your local time zone is properly defined
  – date -u will give UTC time, easy to compare between
    the two systems


• Use NTP synchronization!!!
                                                                                        29
     DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Authenticating Servers Using SIG0
• Alternatively its possible to use SIG0
  – Not widely used yet
  – Works well in dynamic update environment


• Public key algorithm
  – Authentication against a public key published in the DNS


• SIG0 specified in RFC 2931

                                                                                         30
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Questions?




                                                                                   31
DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
DNSSEC Mechanisms

• New Resource Records
• Setting up a Secure Zone
• Delegating Signing Authority
• Key Rollovers

                                                                                   32
DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Vulnerabilities protected by
                      DNSKEY / RRSIG / NSEC
                                                                                     Cache impersonation
 Zone administrator


  Zone file                   master                                    Caching forwarder



Dynamic
updates                       slaves

                                                                                                resolver
                                                              Cache pollution by
                                                                Data spoofing

                                  Altered zone data


                                                                                                                    33
                 DNSSEC   .        RIPE NCC Training Course         .        http://www.ripe.net/training/dnssec/
DNSSEC hypersummary
• Data authenticity and integrity by signing the
  Resource Records Sets with private key

• Public DNSKEYs used to verify the RRSIGs

• Children sign their zones with their private key
   – Authenticity of that key established by
     signature/checksum by the parent (DS)


• Ideal case: one public DNSKEY distributed
                                                                                          34
      DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
The DNS is not a Public Key
          Infrastructure (PKI)
• All key procedures are based on local policy

• A PKI is as strong as its weakest link
  – Certificate Authorities control this by SLAs


• The DNS does not have Certificate Revocation
  Lists

• If the domain is under one administrative control
  you might be able to enforce policy

                                                                                          35
      DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Public Key Crypto
• Key pair: a private (secret) key and a corresponding
  public key

• Simplified:
  – If you know the public key, you can verify a signature
    created with the private key
  – If you know the public key, you can encrypt data that can
    only be decrypted with the private key

• DNSSEC only uses signatures
  – PGP uses both methods

                                                                                           36
      DNSSEC   .     RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Authenticity and Integrity of Data
• Authenticity: Is the data published by the entity we
  think is authoritative?

• Integrity: Is the data received the same as what was
  published?

• Public Key cryptography helps to answer these
  questions
  – signatures to check both integrity and authenticity of data
  – verifies the authenticity of signatures

                                                                                         37
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Zone status terminology (RFC3090)
• Verifiably Secure
  – RRset and its RRSIG can be verified with a DNSKEY
    that can be chased back to a trusted key, the parent has
    a DS record
• Verifiably Insecure
  – RRset sits in a zone that is not signed and for which the
    parent has no DS record
• BAD
  – RRset and its RRSIG can not be verified (somebody
    messed with the sig, the RRset, or the RRSIG expired)
  – A zone and its subzones are BAD when the parent’s
    signature over the Child’s key (DS) is BAD

                                                                                         38
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
New Resource Records




                                                                                    39
 DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
New Resource Records
• 3 Public key crypto related RRs
  – RRSIG           Signature over RRset made using private key
  – DNSKEY          Public key, needed for verifying a RRSIG
  – DS              Delegation Signer; ‘Pointer’ for building chains
                           of authentication


• One RR for internal consistency
  – NSEC            Indicates which name is the next one in the
                    zone and which typecodes are available for the
                    current name
     • authenticated non-existence of data

                                                                                             40
       DNSSEC   .      RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Other Keys in the DNS
• DNSKEY RR should only be used for DNSSEC
  – keys for other applications should use other RR types


• CERT
  – For X.509 certificates


• Application keys under discussion/development
  – IPSECKEY
  – SSHFP


                                                                                          41
      DNSSEC    .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
RR’s and RRsets
• Resource Record:
  – name                       TTL             class type rdata
     www.ripe.net.             7200            IN   A       192.168.10.3



• RRset: RRs with same name, class and type:
     www.ripe.net.             7200            IN   A       192.168.10.3
                                                    A       10.0.0.3
                                                    A       172.25.215.2


• RRsets are signed, not the individual RRs
                                                                                                42
     DNSSEC   .     RIPE NCC Training Course         .   http://www.ripe.net/training/dnssec/
DNSKEY RDATA
–   16 bits: FLAGS
–   8 bits: protocol
–   8 bits: algorithm
–   N*32 bits: public key

Example:
ripe.net. 3600 IN DNSKEY   256 3 5 (
           AQOvhvXXU61Pr8sCwELcqqq1g4JJ
           CALG4C9EtraBKVd+vGIF/unwigfLOA
           O3nHp/cgGrG6gJYe8OWKYNgq3kDChN)


                                                                                         43
     DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
RRSIG RDATA
•   16 bits - type covered
•   8 bits - algorithm
•   8 bits - nr. labels covered
•   32 bits - original TTL
              ripe.net. 3600 IN RRSIG A 5 2 3600 (
                       20031104144523 20031004144523 3112 ripe.net.
                       VJ+8ijXvbrTLeoAiEk/qMrdudRnYZM1VlqhN
                       vhYuAcYKe2X/jqYfMfjfSUrmhPo+0/GOZjW
                       66DJubZPmNSYXw== ) signature field
•   32 bit - signature expiration
•   32 bit - signature inception
•   16 bit - key tag
•   signers name
                                                                                                 44
             DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Delegation Signer (DS)
• Delegation Signer (DS) RR indicates that:
  – delegated zone is digitally signed
  – indicated key is used for the delegated zone


• Parent is authorative for the DS of the childs zone
  – Not for the NS record delegating the childs zone!
  – DS should not be in the childs zone




                                                                                          45
      DNSSEC    .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
DS RDATA
•    16 bits: key tag
•    8 bits: algorithm
•    8 bits: digest type
•    20 bytes: SHA-1 Digest
    $ORIGIN ripe.net.
    disi.ripe.net.   3600 IN              NS     ns.disi.ripe.net
    disi.ripe.net.   3600 IN              DS     3112 5 1 (
                                                 239af98b923c023371b52
                                                 1g23b92da12f42162b1a9
                                                 )



                                                                                               46
         DNSSEC   .   RIPE NCC Training Course      .   http://www.ripe.net/training/dnssec/
NSEC RDATA
• Points to the next domain name in the zone
  – also lists what are all the existing RRs for “name”
  – NSEC record for last name “wraps around” to first name
    in zone
• N*32 bit type bit map
• Used for authenticated denial-of-existence of data
  – authenticated non-existence of TYPEs and labels

• Example:

  www.ripe.net. 3600 IN              NSEC ripe.net. A RRSIG NSEC

                                                                                         47
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
NSEC Record example
                     (RRSIG records removed for brevity)
          $ORIGIN ripe.net.
          @    SOA          …..
                         NS          NS.ripe.net.
                         DNSKEY            …..
                         NSEC        mailbox.ripe.net. SOA NS NSEC DNSKEY RRSIG
          mailbox        A           192.168.10.2
                         NSEC        www.ripe.net. A NSEC RRSIG
          WWW            A           192.168.10.3
                         TXT         Public RIPE & RIPE NCC webserver
                         NSEC         ripe.net. A NSEC RRSIG TXT
     ‘popserver’ is missing

• Query for “popserver.ripe.net” would return:
      aa bit set   RCODE=NXDOMAIN
      authority: mailbox.ripe.net.                   NSEC www.ripe.net.        A NSEC RRSIG
• Query for “www.ripe.net MX” would return: an empty
  answer section and the “www NSEC” record in the authority
  section
                                                                                                         48
       DNSSEC    .        RIPE NCC Training Course           .    http://www.ripe.net/training/dnssec/
NSEC records
• If your query for data does not exist in a zone, the
  NSEC RR provides proof of non-existence

• If after a query the response is:
   – NXDOMAIN: One or more NSEC RRs indicate that the
     name or a wildcard expansion does not exist
   – NOERROR and empty answer section: The NSEC
     TYPE array proves that the QTYPE did not exist
• More than 1 NSEC may be required in response
   – wildcards
• NSEC records are generated by tools
   – they also lexicographically order the zone
                                                                                          49
      DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Questions?




                                                                                   50
DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Setting up a secure Zone




                                                                                    51
 DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Securing a Zone
1. Generate keypair
   – include public key (DNSKEY) in zone file


2. Sign your zone; signing will:
   – sort the zone
   – Insert:
      • NSEC records
      • RRSIG records (signature over each RRset)
      • DS records (optional)
   – generate key-set file (can be used later)


                                                                                           52
       DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Securing a Zone - continued
3. Publish Signed Zone

4. Configure Forwarding Resolver

5. Test

6. Distribute your public key (DNSKEY) to those that
  need to be able to trust your zone
  – Key-set or DS-set for Parent

                                                                                         53
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Setting up a secure Zone

              Generating keys



                                                                                      54
 DNSSEC   .     RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Toolbag: dnssec-keygen
• dnssec-keygen to generate keys
     dnssec-keygen -a alg -b bits -n type [options] name


•   algorithm:    RSASHA1 (or RSA or DSA)
•   Bitsize:      depends on algorithm, key function, paranoia level
•   type:         zone
•   Name:         zone you want to sign

• ‘-r /dev/urandom’ might be needed



                                                                                               55
         DNSSEC    .     RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Creating keys
$dnssec-keygen -a RSASHA1 -b 1024 -n zone example.net.
Kexample.net.+005+20704
$
• 2 files are created:

   – Kexample.net.+005+20704.key
      • contains the public key
      • should go into the zone file

   – Kexample.net.+005+20704.private
      • contains the private key
      • should be kept secret!!!

                                                                                             56
      DNSSEC   .       RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Setting up a secure Zone

     Signing & publishing



                                                                                    57
 DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Only authoritative records
               are signed
• NS records for the zone itself are signed

• NS records for delegations are not signed
  – DS RRs are signed!


• Glue is not signed



                                                                                        58
     DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Preparing the zonefile

• include the public keys in the zonefile:
  – cat Kexample.net.+005+20704.key >> example.net




• Use named-checkzone

• Increase the SOA serial number
  – Always increase the SOA serial before
    signing!
                                                                                        59
     DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Sign the zone
 dnssec-signzone [options] zonefile [ZSK’s]


• If zonefile name is not zone name:
  – use –o <origin> option
• Signed zonefile is called “zonefilename.signed”
• Keyset is created as a bonus…
  – ready to go to parent
• To create DS records from keyset files:
  – use -g option
                                                                                        60
     DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Publishing the signed zone
• Edit named.conf:
  zone ”example.net" {
            type master;
            file "zones/example.net.signed";
            allow-transfer { 10.1.2.3 ;
                           key mstr-slave.example.net.; };
            notify yes;
  };


• Use named-checkconf
• Reload zone
• Test
                                                                                         61
     DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Setting up a secure Zone

   Resolver configuration



                                                                                    62
 DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Setting up a
    verifying resolving name server
• To verify the content of a zone:
  – Get the public (key signing) key and check that this
    key belongs to the zone owner

• Configure the keys you trust as secure entry
  points in named.conf

  trusted-keys {
          "example.net." 256 3 1 "AQ…QQ==";
          };

                                                                                        63
     DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Setting up a secure Zone

 Testing the secure zone



                                                                                    64
 DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Testing a verifying forwarder
 dig +dnssec [@server] record [TYPE]
 • Answer Flags are relevant
 • Example query to an authoritative nameserver


      ; <<>> DiG 9.1.1 <<>> +dnssec @193.0.0.202 www.example.net
      ;; global options: printcmd
      ;; Got answer:
      ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1947
      ;; flags: qr aa rd; QUERY: 1, ANSWER: 4, AUTHORITY: 3,
        ADDITIONAL: 4
authoritative answer
                            Recursion desired (but not available, RA is not set)
 Not authenticated!
                                                                                                       65
            DNSSEC     .   RIPE NCC Training Course      .      http://www.ripe.net/training/dnssec/
Testing a verifying forwarder
             dig: an example
; <<>> DiG 9.3.0s20020122 <<>> +dnssec @127.0.0.1 example.net NS
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 31630
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 3, AUTHORITY: 0,
   ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version:    0, udp=            4096     “use DNSSEC, if you can”
;; QUESTION SECTION:
;example.net. IN NS
;; ANSWER SECTION:
example.net.       600 IN NS ns1.example.net.
example.net.       600 IN NS ns2.example.net.
example.net.       600 IN SIG NS 1 2 600 20020314134313
                      20020212134313 47783 example.net.
     DVC/ACejHtZylifpS6VSSqLa15xPH6p33HHmr3hC7eE6/QodM6fBi5z3
     fsLhbQuuJ3pCEdi2bu+A0duuQlQMiHPvrkYia4bKmoyyvWHwB3jcyFhW
     lV4YOzX/fgkLUmu8ysGOiD9C0CkSvNSE6rBCzUa3hfkksHt4FBsuA1oQ
     yoc=
                               Authenticated Data
                                                                                                66
       DNSSEC   .    RIPE NCC Training Course       .    http://www.ripe.net/training/dnssec/
Troubleshooting
                      client side
• Dig returns status: SERVFAIL

• First try without +dnssec

• Also try with +dnssec +cdflag
  – Checking is disabled. Data directly forwarded



• Be ready for some interesting troubleshooting
                                                                                          67
      DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Troubleshooting
                     Server side
• Turn on logging. Category “dnssec” with severity
  debug 3 gives you appropriate hints

• Debug output is a little detailed
   – On the next page is an example where we corrupted the
     trusted-key
   – It is not directly obvious what the problem is
   – We edited the output a little so that it fits on a slide




                                                                                          68
      DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Example Debugging Output (partial)
validating sub.tld KEY: in dsvalidated
validating sub.tld KEY: dsset with trust 7
validating sub.tld KEY: verify rdataset: success
validating sub.tld KEY: marking as secure
validator @0x81b53d0: dns_validator_destroy
validating b1.sub.tld A: in fetch_callback_validator
validating b1.sub.tld A: keyset with trust 7
validating b1.sub.tld A: resuming validate
validating b1.sub.tld A: verify rdataset: success
validating b1.sub.tld A: marking as secure
validator @0x81b9e70: dns_validator_destroy
                                                                                             69
        DNSSEC   .     RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Questions?




                                                                                   70
DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Delegating Signing
       Authority

             chains of trust

                                                                                    71
DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Locally Secured Zones
• Key distribution does not scale!
                               .

                                                  com.
                    net.

       money.net.                                 os.net.
                      kids.net.
                                                                         Secure entry points
      corp         dop                           mac     unix         nt
                           marnick
dev    market dilbert
                                                   Out of band key-exchanges
                                                                                                       72
      DNSSEC   .      RIPE NCC Training Course           .      http://www.ripe.net/training/dnssec/
Using the DNS to Distribute Keys
• Secured islands make key distribution problematic

• Distributing keys through DNS:
  – Use one trusted key to establish authenticity of other keys
  – Building chains of trust from the root down
  – Parents need to sign the keys of their children


• Ideal world:
  – only the root key needs to be configured
  – parents always delegate security to child
                                                                                         73
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
DS RRs for delegation
• Parent is authoritative for the DS record
  – It should not appear in the child's zonefile

• DS resource records are used for Delegation of
  Security

• DS is not backwards compatible with RFC2535

• Eases resigning
  – parent can sign often => short signature lifetime =>
    shorter impact time when key gets compromised
                                                                                          74
      DNSSEC    .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Key problem
• Interaction with parent administratively expensive
  – Should only be done when needed
  – Bigger keys are better


• Signing zones should be fast
  – Memory restrictions
  – Space and time concerns
  – Smaller keys with short lifetimes are better




                                                                                          75
      DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Key functions
• Large keys are more secure
  – Can be used longer ☺
  – Large signatures => large zonefiles
  – Signing and verifying computationally expensive


• Small keys are fast
  – Small signatures ☺
  – Signing and verifying less expensive ☺
  – Short lifetime


                                                                                         76
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Key solution: more than one key
• RRsets are signed, not RR’s
• DS points to specific key
  – Signature from that key over DNSKEY RRset transfers
    trust to all keys in DNSKEY RRset


• Key that DS points to only signs DNSKEY RRset
  – Key Signing Key (KSK)
• Other keys in DNSKEY RRset sign entire zone
  – Zone Signing Key (ZSK)


                                                                                        77
     DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Initial Key Exchange
• Child needs to:
  – Send key signing keyset to parent


• Parent needs to:
  – Check childs zone
    • for DNSKEY & RRSIGs
  – Verify if key can be trusted
  – Generate DS RR
                                                                                         78
     DNSSEC    .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Delegating Signing Authority
   • Parent signs the DS record pointing to
     the key signing key
                                                                                    Key signing key
                                                      $ORIGIN kids.net.

  $ORIGIN net.                                        @ NS   ns1
                                                        RRSIG NS (…) kids.net.
  kids NS   ns1.kids                                    DNSKEY (…) (1234)
       DS (…) 1234                                      DNSKEY (…) (3456)
       RRSIG DS (…)net.                                 RRSIG dnskey … 1234 kids.net. …
                                                        RRSIG dnskey … 3456 kids.net. …
  money NS   ns1.money
        DS   (…)             Zone signing key beth          A 127.0.10.1
        RRSIG DS (…)net.                                    RRSIG A (…) 3456 kids.net. …
                                                      ns1   A 127.0.10.3
                                                            RRSIG A (…) 3456 kids.net. …


• The parent is authoritative for the DS RR of its children
                                                                                                        79
           DNSSEC   .      RIPE NCC Training Course         .    http://www.ripe.net/training/dnssec/
Chain of Trust Verification, Summary
• Data in zone can be trusted if signed by a
  Zone-Signing-Key
• Zone-Signing-Keys can be trusted if signed by
  a Key-Signing-Key
• Key-Signing-Key can be trusted if pointed to by
  trusted DS record
• DS record can be trusted
  – if signed by the parents Zone-Signing-Key
  or
  – DS or DNSKEY records can be trusted if exchanged
     out-of-band and locally stored (Secure entry point)

                                                                                         80
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Walking the Chain of Trust
                Locally configured
                Trusted key: . 8907
1                        $ORIGIN .
         .    DNSKEY (…) 5TQ3s… (8907) ; KSK
 2            DNSKEY (…) lasE5… (2983) ; ZSK                    4
             RRSIG DNSKEY (…) 8907 . 69Hw9..                                                     $ORIGIN net.
                                                          net. DNSKEY (…) q3dEw… (7834) ; KSK
               net. DS 7834 3 1ab15…
     3                                                         DNSKEY (…) 5TQ3s… (5612) ; ZSK
                    RRSIG DS (…) . 2983                 5
                                                              RRSIG DNSKEY (…) 7834 net. cMas...


                                               7              ripe.net. DS 4252 3 1ab15…                            6
                   $ORIGIN ripe.net.                                    RRSIG DS (…) net. 5612

ripe.net. DNSKEY (…) rwx002… (4252) ; KSK
          DNSKEY (…) sovP42… (1111) ; ZSK
8         RRSIG DNSKEY (…) 4252 ripe.net. 5t...

www.ripe.net. A 193.0.0.202                                     9
              RRSIG A (…) 1111 ripe.net. a3...


                                                                                                                        81
                 DNSSEC   .        RIPE NCC Training Course            .     http://www.ripe.net/training/dnssec/
Signing the zonefile - with KSK
• Sign the zone:
                                                                        Key signing key




  dnssec-signzone -k   Kexample.net.+001+20704 
           example.net Kexample.net.+001+16748

     Zone signing key



• Choose ZSK and KSK
• Other options not changed

                                                                                              82
     DNSSEC   .         RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Questions?




                                                                                   83
DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Key Considerations




                                                                                   84
DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Private Key Compromise
• You have to keep your private key secret
• Private key can be stolen
  – Put the key on stand alone machines or on bastion
    hosts behind firewalls and strong access control
• Private key reconstruction (crypto analysis)
  – random number not random
  – Leakage of key material (DSA)
  – Brute force attacks




                                                                                         85
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Key Rollovers
• Try to minimize impact
  – Short validity of signatures
  – Regular key-rollover


• Remember: DNSKEYs do not have timestamps
  – the RRSIG over the DNSKEY has the timestamp


• Key rollover involves 2nd party or parties:
  – State to be maintained during rollover
  – operationally expensive
                                                                                          86
      DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Key Rollover (part 1)
• Scheduled rollover of the child’s Key Signing Key
• Child replaces key-1 with key-2 and wants parent to sign it
                                                        $ORIGIN kids.net.
                                                        @ NS    ns1
                                                           DNSKEY (…) (1)
                                                     a)     DNSKEY (…) (2)
                                                           DNSKEY (…) (5)
 $ORIGIN net.                                              RRSIG KEY (…) kids.net. 1
                                                     b)    RRSIG KEY (…) kids.net. 2
 kids NS   ns1.kids                                        RRSIG KEY (…) kids.net. 5
      DS (…) 1
                                                        ns1    A 127.0.10.3
      RRSIG DS (…)net.
                                                            RRSIG A (…) kids.net. 5



  parent zone
                                              a) Create key 2
                                              b) Sign key-set with key 1 and 2
                                                      and send key 2 to parent
                                                                                                       87
          DNSSEC   .      RIPE NCC Training Course        .     http://www.ripe.net/training/dnssec/
Key Rollover (part 2)
c) Parent generates and signs DS record
d) Child signs his zone with only key 2, once parent
  updated his zone
                                                   $ORIGIN kids.net.
$ORIGIN net.
                                                   @ NS   ns1
kids NS   ns1.kids                                   DNSKEY (…) 2
     DS (…) 2                                        DNSKEY (…) 5
     RRSIG DS (…)net.                                RRSIG KEY (…) kids.net. 2
                                                     RRSIG KEY (…) kids.net. 5
                                                   ns1   A 127.0.10.3
                                                     RRSIG A   (…) kids.net. 5




                                                                                                88
       DNSSEC   .       RIPE NCC Training Course     .   http://www.ripe.net/training/dnssec/
Timing of the Scheduled Key Rollover
• Child should not remove the old key while there
  are still servers handing out the old DS RR.
• The new DS will need to be distributed to the slave
  servers
  – max time set by the SOA expiration time
• The old DS will need to have expired from caching
  servers.
  – Set by the TTL of the original DS RR.
• You (or your tool) can check if the master and
  slave have picked up the change
                                                                                         89
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Unscheduled Rollover Problems
• Needs out of band communication
  – with parent and pre-configured resolvers
• The parent needs to establish your identity again
• How to protect child delegations?
  – unsecured?
• There will be a period that the stolen key can be
  used to generate data useful on the Internet
  – There is no ‘revoke key’ mechanism


• Emergency procedure must be on the shelf
                                                                                         90
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Key Rollover - Summary
1. Generate new KSK
2. Sign with old and new KSKs
3. Inform any resolvers that have you as a trusted entry point
   of the new key
   – trusted-keys configuration
4. Query for the parental DS and remember the TTL
   – you will need it later
5. Upload the new KSK to the parent
   – The parent will generate a new DS RR.
6. Check if *all* parental servers (slaves and masters)
   picked up the change
7. Wait another TTL before removing the old key

                                                                                              91
       DNSSEC   .       RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Questions?




                                                                                   92
DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Operational Concerns




                                                                                   93
DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
.nl trial 2003
• ~800.000 delegations
• 40 MB unsigned, 350+ MB signed
  – .com grows to 10 Gigabyte!
  – unsigned .se ~9 MB, signed .se ~32 MB

• Daily signing: ~1.5 hours
• Loading: ~15 minutes

• Very few NXT (NSEC) walks (rate limiting)
                                                                                        94
     DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Tips…
• Sort zone before signing
  – speeds up the signing process

• If signed zone > 3 Gigabytes: 64 bit architecture

• DNSSEC Deployment Working Group
  – http://www.sdl.sri.com/other/dnssec/


• DNSSEC deployment in .nl
  – http://www.nlnetlabs.nl/dnssec/

                                                                                            95
      DNSSEC   .      RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Signing the Root
• 3 Organisations check root zone; who signs?
  – IANA/ICANN
  – Department of Commerce
  – Verisign


• How many keys?
  – N of M system for trust?




                                                                                          96
     DNSSEC   .     RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Resolver Issues
• DNSSEC is not in POSIX yet
  – e.g. gethostbyname()or getnameinfo()
• SIG verification is (only) done by caching
  forwarders
• To test DNSSEC setups, you have to work with
  dig, or use the BIND lwresolver library
• Alternatively: write some tools in PERL
  – (Net::DNS and Net::DNS::SEC)



                                                                                         97
     DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
End User Side
• Local verifying/recursive server trusted?
  – TSIG for queries?
  – IPSec?
  – Enhance stub resolver functionality?


• How much information needed?
  – AD bit enough?
  – Verifier built in to programs?




                                                                                          98
      DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Wish List
• Public and private key management tools
• Provisioning tools
• Secure Islands public keys distribution

• API & protocol to communicate validation results
• Killer App that relies on DNSSEC

• Documentation/training/tools in order to reduce
  costs

                                                                                         99
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Conclusions




                                                                                    100
DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
What Did We Cover
• DNSSEC provides a mechanism to protect DNS
• DNSSEC implementation:
  – TSIG for communication between servers
  – RRSIG, DNSKEY and NSEC for data
  – DS for delegating trust
• DNSSEC main difficulties:
  – Key distribution
  – Chicken & Egg



                                                                                         101
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Back at the ranch

•   Design a secure architecture
•   Design a key exchange procedure
•   Resign your zone regularly
•   Automate the process (cron and Makefiles)
•   Have an emergency procedure in place




                                                                                            102
       DNSSEC   .     RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Thank You!
• Please
  – Fill out questionnaire
  – Return badges for recycling
  – Pick up your certificate


• Slides and other DNSSEC material at:
  www.ripe.net/training/dnssec/

• Feedback on this tutorial.
  – Suggestions: training@ripe.net
                                                                                         103
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Resources
Reference:
• <sourcedir>/doc /arm/Bv9ARM.html
• DNS and BIND, Albitz & Liu, O’ Reilly & Associates
• FAQ: http://www.nominum.com/resources/faqs/bind-faqs.html
RFCs:
• <sourcedir>/doc/rfc/
• http://www.ietf.org
• ftp://ftp.ripe.net/rfc/
Drafts:
• http://www.ietf.org
• ftp://ftp.ripe.net/internet-drafts/

                                                                                         104
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
Additional Resources
•   http://www.nlnetlabs.nl/dnssec/
•   http://www.dnssec.net/
•   http://www.ripe.net/disi/
•   Papers from the 5th USENIX UNIX Security
    Symposium, Salt Lake City, Utah, June 1995
    – P. Vixie: DNS and BIND Security Issues
       • http://www.usenix.org/publications/library/proceedings/security95/vixie.html

    – S. Bellovin: Using the DNS for Break-ins
       • http://www.usenix.org/publications/library/proceedings/security95/bellovin.html




                                                                                                         105
       DNSSEC     .         RIPE NCC Training Course       .      http://www.ripe.net/training/dnssec/
Related mailing lists
• dnssec@cafax.se
  – operators and developers working on dnssec
• namedroppers@ops.ietf.org
  – DNSEXT IETF working group (DNS protocol
    development)
• dnsop@cafax.se
  – DNSOP IETF working group (operational DNS issues)
• techsec@ripe.net
  – RIPE Technical Security working group
• dns-wg@ripe.net
  – RIPE DNS working group

                                                                                        106
     DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
TSIG for dynamic updates
• You can use TSIG or SIG0 to protect your
  dynamic updates
• Detailed howto at: http://ops.ietf.org
  – title: “Secure dynamic DNS howto”


• Steps for TSIG dynamic update of forward tree:
  – Configure your TSIG key into /etc/dhclient.conf and
    specify the FQDN

  – Configure named.conf to allow updates using the key

                                                                                         107
      DNSSEC   .   RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
TSIG for dynamic updates:
                    client side
•   /etc/dhclient.conf

send fqdn.fqdn “laptop.example.net.";
send fqdn.encoded on;      # send in dns wire format
send fqdn.server-update off;
                    # tell dhcp server not to update A

key me-friend. {
    algorithm HMAC-MD5;
    secret "ic…==";
    }

zone example.net. {
    primary 193.0.0.4;
    key me-friend.;
    }

                                                                                               108
          DNSSEC   .     RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
TSIG for dynamic updates:
                  server side
•   /etc/named.conf:

key me-friend. {
    algorithm HMAC-MD5;
    secret "ic…==";
    };

zone “example.net" {
      type master;
      file "zones/example.net.signed";
      notify yes;
      allow-transfer { key tsig.example.net.; };
      update-policy {
      grant me-friend. name laptop.example.net ;
      };
};

                                                                                             109
         DNSSEC   .    RIPE NCC Training Course   .   http://www.ripe.net/training/dnssec/
• Author:                              Arno Meulenkamp (arno@ripe.net)

•   Additions and editing by:          Vesna Manojlovic (BECHA@ripe.net)
                                       Filiz Yilmaz (filiz@ripe.net)
                                       Tim McGinnis (mctim@ripe.net)

•   Based on material by:              Olaf M. Kolkman (okolkman@ripe.net)

•   Material available at: http://www.ripe.net/training/dnssec/


                                                            © 2005 RIPE NCC, Amsterdam, The Netherlands

                               All rights reserved. All requests for reproduction rights should be addressed to:

                                                                                                RIPE NCC
                                                                                                Singel 258
                                                                                   NL-1016 AB AMSTERDAM

                                                                                                                     110
          DNSSEC   .        RIPE NCC Training Course                 .        http://www.ripe.net/training/dnssec/

Más contenido relacionado

La actualidad más candente

Solaris linux-administrator-resume-nj
Solaris linux-administrator-resume-njSolaris linux-administrator-resume-nj
Solaris linux-administrator-resume-njVikas Pandey
 
EMC Deduplication Fundamentals
EMC Deduplication FundamentalsEMC Deduplication Fundamentals
EMC Deduplication Fundamentalsemcbaltics
 
Presentation data domain advanced features and functions
Presentation   data domain advanced features and functionsPresentation   data domain advanced features and functions
Presentation data domain advanced features and functionsxKinAnx
 
Haresh_Mehta_SA_ATT-lnx-12516
Haresh_Mehta_SA_ATT-lnx-12516Haresh_Mehta_SA_ATT-lnx-12516
Haresh_Mehta_SA_ATT-lnx-12516Haresh Mehta
 
Managing troubleshooting cluster_360dgrees
Managing troubleshooting cluster_360dgreesManaging troubleshooting cluster_360dgrees
Managing troubleshooting cluster_360dgreesSyed Hussain
 
Presentation deduplication backup software and system
Presentation   deduplication backup software and systemPresentation   deduplication backup software and system
Presentation deduplication backup software and systemxKinAnx
 
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure  to Enable Data Analysis CollaborationThe Efficient Use of Cyberinfrastructure  to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure to Enable Data Analysis CollaborationCybera Inc.
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...ljaquet
 
Scaling Out Tier Based Applications
Scaling Out Tier Based ApplicationsScaling Out Tier Based Applications
Scaling Out Tier Based ApplicationsYury Kaliaha
 
Resume_of_Pramod_Kumar
Resume_of_Pramod_KumarResume_of_Pramod_Kumar
Resume_of_Pramod_KumarPramod Kumar
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guideArvind Varade
 
Strata + Hadoop World 2012: HDFS: Now and Future
Strata + Hadoop World 2012: HDFS: Now and FutureStrata + Hadoop World 2012: HDFS: Now and Future
Strata + Hadoop World 2012: HDFS: Now and FutureCloudera, Inc.
 
Performance Whack-a-Mole Tutorial (pgCon 2009)
Performance Whack-a-Mole Tutorial (pgCon 2009) Performance Whack-a-Mole Tutorial (pgCon 2009)
Performance Whack-a-Mole Tutorial (pgCon 2009) PostgreSQL Experts, Inc.
 
Storage-Backup-Resume
Storage-Backup-ResumeStorage-Backup-Resume
Storage-Backup-ResumeManu Mohan
 
Best Practices for Deploying Enterprise Applications on UNIX
Best Practices for Deploying Enterprise Applications on UNIXBest Practices for Deploying Enterprise Applications on UNIX
Best Practices for Deploying Enterprise Applications on UNIXNoel McKeown
 
EMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC
 
Comparing Dell Compellent network-attached storage to an industry-leading NAS...
Comparing Dell Compellent network-attached storage to an industry-leading NAS...Comparing Dell Compellent network-attached storage to an industry-leading NAS...
Comparing Dell Compellent network-attached storage to an industry-leading NAS...Principled Technologies
 
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementNovell
 
Resume_Storage Admin L2
Resume_Storage Admin L2Resume_Storage Admin L2
Resume_Storage Admin L2Midhun PS
 

La actualidad más candente (20)

Solaris linux-administrator-resume-nj
Solaris linux-administrator-resume-njSolaris linux-administrator-resume-nj
Solaris linux-administrator-resume-nj
 
EMC Deduplication Fundamentals
EMC Deduplication FundamentalsEMC Deduplication Fundamentals
EMC Deduplication Fundamentals
 
Presentation data domain advanced features and functions
Presentation   data domain advanced features and functionsPresentation   data domain advanced features and functions
Presentation data domain advanced features and functions
 
Haresh_Mehta_SA_ATT-lnx-12516
Haresh_Mehta_SA_ATT-lnx-12516Haresh_Mehta_SA_ATT-lnx-12516
Haresh_Mehta_SA_ATT-lnx-12516
 
PONNUPANDI-CV
PONNUPANDI-CVPONNUPANDI-CV
PONNUPANDI-CV
 
Managing troubleshooting cluster_360dgrees
Managing troubleshooting cluster_360dgreesManaging troubleshooting cluster_360dgrees
Managing troubleshooting cluster_360dgrees
 
Presentation deduplication backup software and system
Presentation   deduplication backup software and systemPresentation   deduplication backup software and system
Presentation deduplication backup software and system
 
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure  to Enable Data Analysis CollaborationThe Efficient Use of Cyberinfrastructure  to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
 
Scaling Out Tier Based Applications
Scaling Out Tier Based ApplicationsScaling Out Tier Based Applications
Scaling Out Tier Based Applications
 
Resume_of_Pramod_Kumar
Resume_of_Pramod_KumarResume_of_Pramod_Kumar
Resume_of_Pramod_Kumar
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guide
 
Strata + Hadoop World 2012: HDFS: Now and Future
Strata + Hadoop World 2012: HDFS: Now and FutureStrata + Hadoop World 2012: HDFS: Now and Future
Strata + Hadoop World 2012: HDFS: Now and Future
 
Performance Whack-a-Mole Tutorial (pgCon 2009)
Performance Whack-a-Mole Tutorial (pgCon 2009) Performance Whack-a-Mole Tutorial (pgCon 2009)
Performance Whack-a-Mole Tutorial (pgCon 2009)
 
Storage-Backup-Resume
Storage-Backup-ResumeStorage-Backup-Resume
Storage-Backup-Resume
 
Best Practices for Deploying Enterprise Applications on UNIX
Best Practices for Deploying Enterprise Applications on UNIXBest Practices for Deploying Enterprise Applications on UNIX
Best Practices for Deploying Enterprise Applications on UNIX
 
EMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed Review
 
Comparing Dell Compellent network-attached storage to an industry-leading NAS...
Comparing Dell Compellent network-attached storage to an industry-leading NAS...Comparing Dell Compellent network-attached storage to an industry-leading NAS...
Comparing Dell Compellent network-attached storage to an industry-leading NAS...
 
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
 
Resume_Storage Admin L2
Resume_Storage Admin L2Resume_Storage Admin L2
Resume_Storage Admin L2
 

Destacado

Who guidelines on_pandemic_influenza_and_blood_supply
Who guidelines on_pandemic_influenza_and_blood_supplyWho guidelines on_pandemic_influenza_and_blood_supply
Who guidelines on_pandemic_influenza_and_blood_supplyrtibloodinfo
 
Australia
AustraliaAustralia
Australiay3ehps
 
Managing The Three Types of IT
Managing The Three Types of ITManaging The Three Types of IT
Managing The Three Types of ITallen.lin
 
Social Media Seven North Web
Social Media Seven North WebSocial Media Seven North Web
Social Media Seven North WebJames cournoyer
 

Destacado (6)

ambassadeursprogramma
 ambassadeursprogramma ambassadeursprogramma
ambassadeursprogramma
 
Who guidelines on_pandemic_influenza_and_blood_supply
Who guidelines on_pandemic_influenza_and_blood_supplyWho guidelines on_pandemic_influenza_and_blood_supply
Who guidelines on_pandemic_influenza_and_blood_supply
 
Australia
AustraliaAustralia
Australia
 
Innov@mic mini 24112011
Innov@mic mini 24112011Innov@mic mini 24112011
Innov@mic mini 24112011
 
Managing The Three Types of IT
Managing The Three Types of ITManaging The Three Types of IT
Managing The Three Types of IT
 
Social Media Seven North Web
Social Media Seven North WebSocial Media Seven North Web
Social Media Seven North Web
 

Similar a RIPE NCC DNSSEC Training Course

Implementing High Availability Caching with Memcached
Implementing High Availability Caching with MemcachedImplementing High Availability Caching with Memcached
Implementing High Availability Caching with MemcachedGear6
 
F5's Dynamic DNS Services
F5's Dynamic DNS ServicesF5's Dynamic DNS Services
F5's Dynamic DNS ServicesF5 Networks
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]APNIC
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 WebinarMen and Mice
 
Hdfs 2016-hadoop-summit-dublin-v1
Hdfs 2016-hadoop-summit-dublin-v1Hdfs 2016-hadoop-summit-dublin-v1
Hdfs 2016-hadoop-summit-dublin-v1Chris Nauroth
 
Whalebone-UKNOF44security992_new_impl.pptx
Whalebone-UKNOF44security992_new_impl.pptxWhalebone-UKNOF44security992_new_impl.pptx
Whalebone-UKNOF44security992_new_impl.pptxAns Sembiring
 
Facebook's HBase Backups - StampedeCon 2012
Facebook's HBase Backups - StampedeCon 2012Facebook's HBase Backups - StampedeCon 2012
Facebook's HBase Backups - StampedeCon 2012StampedeCon
 
Scale your Alfresco Solutions
Scale your Alfresco Solutions Scale your Alfresco Solutions
Scale your Alfresco Solutions Alfresco Software
 
Putting Wings on the Elephant
Putting Wings on the ElephantPutting Wings on the Elephant
Putting Wings on the ElephantDataWorks Summit
 
Caching Methodology & Strategies
Caching Methodology & StrategiesCaching Methodology & Strategies
Caching Methodology & StrategiesTiệp Vũ
 
Caching methodology and strategies
Caching methodology and strategiesCaching methodology and strategies
Caching methodology and strategiesTiep Vu
 
The latest news in the DNS resolution: DNSSEC
The latest news in the DNS resolution: DNSSECThe latest news in the DNS resolution: DNSSEC
The latest news in the DNS resolution: DNSSECWhalebone, s.r.o.
 

Similar a RIPE NCC DNSSEC Training Course (20)

8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 
ION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSECION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSEC
 
Implementing High Availability Caching with Memcached
Implementing High Availability Caching with MemcachedImplementing High Availability Caching with Memcached
Implementing High Availability Caching with Memcached
 
F5's Dynamic DNS Services
F5's Dynamic DNS ServicesF5's Dynamic DNS Services
F5's Dynamic DNS Services
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
 
ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
 
HDFS: Optimization, Stabilization and Supportability
HDFS: Optimization, Stabilization and SupportabilityHDFS: Optimization, Stabilization and Supportability
HDFS: Optimization, Stabilization and Supportability
 
Hdfs 2016-hadoop-summit-dublin-v1
Hdfs 2016-hadoop-summit-dublin-v1Hdfs 2016-hadoop-summit-dublin-v1
Hdfs 2016-hadoop-summit-dublin-v1
 
Whalebone-UKNOF44security992_new_impl.pptx
Whalebone-UKNOF44security992_new_impl.pptxWhalebone-UKNOF44security992_new_impl.pptx
Whalebone-UKNOF44security992_new_impl.pptx
 
Facebook's HBase Backups - StampedeCon 2012
Facebook's HBase Backups - StampedeCon 2012Facebook's HBase Backups - StampedeCon 2012
Facebook's HBase Backups - StampedeCon 2012
 
Scale your Alfresco Solutions
Scale your Alfresco Solutions Scale your Alfresco Solutions
Scale your Alfresco Solutions
 
Day CRX Introduction
Day CRX IntroductionDay CRX Introduction
Day CRX Introduction
 
Putting Wings on the Elephant
Putting Wings on the ElephantPutting Wings on the Elephant
Putting Wings on the Elephant
 
Caching Methodology & Strategies
Caching Methodology & StrategiesCaching Methodology & Strategies
Caching Methodology & Strategies
 
Caching methodology and strategies
Caching methodology and strategiesCaching methodology and strategies
Caching methodology and strategies
 
RP11_XaviertTorrentGorjon
RP11_XaviertTorrentGorjonRP11_XaviertTorrentGorjon
RP11_XaviertTorrentGorjon
 
Cl116
Cl116Cl116
Cl116
 
DNSTap Webinar
DNSTap WebinarDNSTap Webinar
DNSTap Webinar
 
The latest news in the DNS resolution: DNSSEC
The latest news in the DNS resolution: DNSSECThe latest news in the DNS resolution: DNSSEC
The latest news in the DNS resolution: DNSSEC
 

Más de Erol Dizdar

Kardiyovasküler Sistem Terminolojisi
Kardiyovasküler Sistem TerminolojisiKardiyovasküler Sistem Terminolojisi
Kardiyovasküler Sistem TerminolojisiErol Dizdar
 
ENDOKRİN SİSTEME AİT TERİMLER
ENDOKRİN SİSTEME AİT TERİMLERENDOKRİN SİSTEME AİT TERİMLER
ENDOKRİN SİSTEME AİT TERİMLERErol Dizdar
 
KAN TERMİMOLOJİSİ
KAN TERMİMOLOJİSİKAN TERMİMOLOJİSİ
KAN TERMİMOLOJİSİErol Dizdar
 
SİNDİRİM SİSTEMİ TERMİNOLOJİSİ
SİNDİRİM SİSTEMİ TERMİNOLOJİSİSİNDİRİM SİSTEMİ TERMİNOLOJİSİ
SİNDİRİM SİSTEMİ TERMİNOLOJİSİErol Dizdar
 
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİ
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİSİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİ
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİErol Dizdar
 
ÜrinerSistem Terminolojisi
ÜrinerSistem TerminolojisiÜrinerSistem Terminolojisi
ÜrinerSistem TerminolojisiErol Dizdar
 
TIBBİ TERMİNOLOJİ
TIBBİ TERMİNOLOJİTIBBİ TERMİNOLOJİ
TIBBİ TERMİNOLOJİErol Dizdar
 
Anksiyete(Kaygı) Bozuklukları
Anksiyete(Kaygı) BozukluklarıAnksiyete(Kaygı) Bozuklukları
Anksiyete(Kaygı) BozukluklarıErol Dizdar
 
Akılcı İlaç Kullanımı Ne Demektir?
Akılcı İlaç Kullanımı Ne Demektir?Akılcı İlaç Kullanımı Ne Demektir?
Akılcı İlaç Kullanımı Ne Demektir?Erol Dizdar
 
Yaşlı Hastada İlaç Kullanımı
Yaşlı Hastada İlaç KullanımıYaşlı Hastada İlaç Kullanımı
Yaşlı Hastada İlaç KullanımıErol Dizdar
 
GEBELİKTE AKILCI İLAÇ KULLANIMI
GEBELİKTE AKILCI İLAÇ KULLANIMIGEBELİKTE AKILCI İLAÇ KULLANIMI
GEBELİKTE AKILCI İLAÇ KULLANIMIErol Dizdar
 
Akılcı İlaç Kullanımı (AİK) nedir?
Akılcı İlaç Kullanımı (AİK) nedir?Akılcı İlaç Kullanımı (AİK) nedir?
Akılcı İlaç Kullanımı (AİK) nedir?Erol Dizdar
 
AKILCI ANTİBİYOTİK KULLANIMI 2
AKILCI ANTİBİYOTİK KULLANIMI 2AKILCI ANTİBİYOTİK KULLANIMI 2
AKILCI ANTİBİYOTİK KULLANIMI 2Erol Dizdar
 
AKILCI ANTİBİYOTİK KULLANIMI
AKILCI ANTİBİYOTİK KULLANIMIAKILCI ANTİBİYOTİK KULLANIMI
AKILCI ANTİBİYOTİK KULLANIMIErol Dizdar
 
COVID-19 Salgın Yönetimi ve Çalışma Rehberi
COVID-19 Salgın Yönetimi ve Çalışma RehberiCOVID-19 Salgın Yönetimi ve Çalışma Rehberi
COVID-19 Salgın Yönetimi ve Çalışma RehberiErol Dizdar
 
Kendi vpn sunucunuzu kurmak
Kendi vpn sunucunuzu kurmakKendi vpn sunucunuzu kurmak
Kendi vpn sunucunuzu kurmakErol Dizdar
 
Bilgisayar İlk Yardım
Bilgisayar İlk YardımBilgisayar İlk Yardım
Bilgisayar İlk YardımErol Dizdar
 
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...Erol Dizdar
 
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...Erol Dizdar
 
Mazeretleri yıkarak başarılı olmak
Mazeretleri yıkarak başarılı olmakMazeretleri yıkarak başarılı olmak
Mazeretleri yıkarak başarılı olmakErol Dizdar
 

Más de Erol Dizdar (20)

Kardiyovasküler Sistem Terminolojisi
Kardiyovasküler Sistem TerminolojisiKardiyovasküler Sistem Terminolojisi
Kardiyovasküler Sistem Terminolojisi
 
ENDOKRİN SİSTEME AİT TERİMLER
ENDOKRİN SİSTEME AİT TERİMLERENDOKRİN SİSTEME AİT TERİMLER
ENDOKRİN SİSTEME AİT TERİMLER
 
KAN TERMİMOLOJİSİ
KAN TERMİMOLOJİSİKAN TERMİMOLOJİSİ
KAN TERMİMOLOJİSİ
 
SİNDİRİM SİSTEMİ TERMİNOLOJİSİ
SİNDİRİM SİSTEMİ TERMİNOLOJİSİSİNDİRİM SİSTEMİ TERMİNOLOJİSİ
SİNDİRİM SİSTEMİ TERMİNOLOJİSİ
 
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİ
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİSİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİ
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİ
 
ÜrinerSistem Terminolojisi
ÜrinerSistem TerminolojisiÜrinerSistem Terminolojisi
ÜrinerSistem Terminolojisi
 
TIBBİ TERMİNOLOJİ
TIBBİ TERMİNOLOJİTIBBİ TERMİNOLOJİ
TIBBİ TERMİNOLOJİ
 
Anksiyete(Kaygı) Bozuklukları
Anksiyete(Kaygı) BozukluklarıAnksiyete(Kaygı) Bozuklukları
Anksiyete(Kaygı) Bozuklukları
 
Akılcı İlaç Kullanımı Ne Demektir?
Akılcı İlaç Kullanımı Ne Demektir?Akılcı İlaç Kullanımı Ne Demektir?
Akılcı İlaç Kullanımı Ne Demektir?
 
Yaşlı Hastada İlaç Kullanımı
Yaşlı Hastada İlaç KullanımıYaşlı Hastada İlaç Kullanımı
Yaşlı Hastada İlaç Kullanımı
 
GEBELİKTE AKILCI İLAÇ KULLANIMI
GEBELİKTE AKILCI İLAÇ KULLANIMIGEBELİKTE AKILCI İLAÇ KULLANIMI
GEBELİKTE AKILCI İLAÇ KULLANIMI
 
Akılcı İlaç Kullanımı (AİK) nedir?
Akılcı İlaç Kullanımı (AİK) nedir?Akılcı İlaç Kullanımı (AİK) nedir?
Akılcı İlaç Kullanımı (AİK) nedir?
 
AKILCI ANTİBİYOTİK KULLANIMI 2
AKILCI ANTİBİYOTİK KULLANIMI 2AKILCI ANTİBİYOTİK KULLANIMI 2
AKILCI ANTİBİYOTİK KULLANIMI 2
 
AKILCI ANTİBİYOTİK KULLANIMI
AKILCI ANTİBİYOTİK KULLANIMIAKILCI ANTİBİYOTİK KULLANIMI
AKILCI ANTİBİYOTİK KULLANIMI
 
COVID-19 Salgın Yönetimi ve Çalışma Rehberi
COVID-19 Salgın Yönetimi ve Çalışma RehberiCOVID-19 Salgın Yönetimi ve Çalışma Rehberi
COVID-19 Salgın Yönetimi ve Çalışma Rehberi
 
Kendi vpn sunucunuzu kurmak
Kendi vpn sunucunuzu kurmakKendi vpn sunucunuzu kurmak
Kendi vpn sunucunuzu kurmak
 
Bilgisayar İlk Yardım
Bilgisayar İlk YardımBilgisayar İlk Yardım
Bilgisayar İlk Yardım
 
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...
 
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...
 
Mazeretleri yıkarak başarılı olmak
Mazeretleri yıkarak başarılı olmakMazeretleri yıkarak başarılı olmak
Mazeretleri yıkarak başarılı olmak
 

Último

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 

Último (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 

RIPE NCC DNSSEC Training Course

  • 1. Welcome to the DNSSEC RIPE NCC Training Course 1 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 2. Why DNSSEC? • DNS is not secure – Known vulnerabilities – People depend more and more on DNS • DNSSEC protects against data spoofing and corruption • Why this course: – To raise awareness on DNSSEC – To provide handles for deployment • Reverse delegation 2 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 3. Why RIPE NCC? • Maintaining in-addr.arpa for several /8 blocks • Involved in other DNS issues: – K-root name server – ENUM • Interested in Internet-wide security technologies – http://www.ripe.net/disi/ 3 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 4. Who are we? • Trainers: – Know about DNSSEC – Not DNS server operators! • Audience: – Know about DNS and want to know about DNSSEC • please fill in the “expectations” in the questionnaire 4 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 5. Course Outline • Introduction • DNSSEC mechanisms – to authenticate communication between hosts • TSIG / SIG0 – to establish authenticity and integrity of data • New RRs • Signing a single zone • Building chains of trust • Key exchange and key rollovers • Operational concerns • Conclusions 5 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 6. DNS: Known Concepts • Known DNS concepts: – Delegation, Referral, Zone, RRs, label, RDATA, authoritative server, caching forwarder, stub and full resolver, SOA parameters, etc – Don’t know? Do ask! • Operational knowledge with BIND – BIND 8 or 9 named.conf, writing zone files – All examples based on IPv4 6 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 7. Reminder: DNS Resolving Question: www.ripe.net A 1 2 www.ripe.net A ? root-server 3 “go ask net server @ X.gtld-servers.net” www.ripe.net A ? (+ glue) Resolver Caching 193.0.0.203 forwarder 4 www.ripe.net A ? 8 (recursive) gtld-server 5 “go ask ripe server @ ns.ripe.net” (+ glue) 9 Add to cache 6 www.ripe.net A ? 10 TTL “193.0.0.203” 7 ripe-server 7 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 8. DNS: Data Flow Zone administrator 1 4 Zone file master Caching forwarder 2 3 5 Dynamic updates slaves resolver 8 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 9. DNS Vulnerabilities Corrupting data Impersonating master Cache impersonation Zone administrator 1 4 Zone file master Caching forwarder 2 3 5 Dynamic updates slaves resolver Cache pollution by Data spoofing Unauthorized updates Altered zone data Server protection Data protection 9 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 10. DNS Protocol Vulnerability • DNS data can be spoofed and corrupted between master server and resolver or forwarder • The DNS protocol does not allow you to check the validity of DNS data • Exploited by bugs in resolver implementation (predictable transaction ID) • Polluted caching forwarders can cause harm for quite some time (TTL) • Corrupted DNS data might end up in caches and stay there for a long time • How does a slave (secondary) knows it is talking to the proper master (primary)? 10 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 11. DNSSEC protects.. DNSSEC protects against data spoofing and corruption • TSIG/SIG0: provides mechanisms to authenticate communication between servers • DNSKEY/RRSIG/NSEC: provides mechanisms to establish authenticity and integrity of data • DS: provides a mechanism to delegate trust to public keys of third parties • A secure DNS will be used as an infrastructure with public keys – However it is NOT a PKI 11 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 12. DNSSEC Current State • RFC 4033 – DNS Security Introduction and Requirements • RFC 4034 – Resource Records for the DNS Security Extensions • RFC 4035 – Protocol Modifications for the DNS Security Extensions • March 2005 • Obsoletes RFC 2535 12 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 13. Configuration & Installation BIND’s named • BIND 9.3 or later supports current DNSSEC – ftp://ftp.isc.org/isc/bind9/ • TSIG requires servers to sync time (time zone!) – ntpdate -b – xntpd • Openssl libraries required for crypto parts – http://www.openssl.org/ • Compile the source using openssl libraries: ./configure --with-openssl 13 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 14. Bind DNSSEC Tools • Named • dnssec-keygen – Generate keys of various types • dnssec-signzone – Sign a zone • dig – Troubleshoot: Usage: dig +dnssec @… • named-checkzone & named-checkconf – syntax check for zonefiles and named.conf 14 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 15. Server/Named Configuration • The configuration file is called “named.conf” • Documentation in <src>/doc/arm/Bv9ARM.html • Turn on DNSSEC in “options” statement – dnssec-enable yes; • Turn on logging for troubleshooting – Several categories – Categories are processed in one or more channels – Channels specify where the output goes 15 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 16. Relevant Logging Categories • dnssec – Processing DNSSEC signed responses • security – Request that are approved or not • notify – Zone change notification (relevant for dynamic update environments) • update – Dynamic update events 16 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 17. Logging Configuration Example logging { channel query_channel { file "log/querylog" versions 3; print-time yes; }; channel dnssec_log { file "log/dnssec" versions 2; print-time yes; // add timestamp the entries print-category yes; // add category name print-severity yes; // add severity level severity debug 3; // print debug messages }; channel everything_else { file "log/runlog" versions 3; print-time yes; print-severity yes; print-category yes; }; category dnssec { dnssec_log; }; category security { dnssec_log; everything_else; }; category queries { query_channel; }; category default { everything_else; }; }; 17 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 18. Questions? 18 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 19. Securing Host-Host Communication 19 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 20. TSIG Protected Vulnerabilities Impersonating master Zone administrator Zone file master Caching forwarder Dynamic updates slaves resolver Unauthorized updates 20 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 21. Transaction Signature: TSIG • TSIG (RFC 2845) – authorizing dynamic updates & zone transfers – authentication of caching forwarders – can be used without deploying other features of DNSSEC • One-way hash function – DNS question or answer & timestamp • Traffic signed with “shared secret” key • Used in configuration, NOT in zone file 21 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 22. TSIG example Query: AXFR AXFR AXFR verification Sig ... Sig ... Slave Master KEY: KEY: %sgs!f23fv %sgs!f23fv SOA SOA … … SOA SOA Sig ... Sig ... verification Response: Zone 22 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 23. TSIG for Zone Transfers 1. Generate secret 2. Communicate secret 3. Configure servers 4. Test 23 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 24. Generate TSIG Secret dnssec-keygen -a <alg> -b <bits> -n <type> [options] <keyname> • algorithm: HMAC-MD5 • ‘-r /dev/urandom’ might be needed • Bits: 256 or larger • type: host • Name: unique identifier • Suggested: master-slave.zone.name. • “me-friend.” used as example because it is short • TSIG secret can be generated differently (base64 encoding) 24 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 25. TSIG dnssec-keygen Output dnssec-keygen -a HMAC-MD5 -b 256 -n host me-friend. algorithm keytag Kme-friend.+157+51197.private Kme-friend.+157+51197.key • Private and Public Key contain the same key • TSIG should never be put in zone files!!! – might be confusing because it looks like RR: me-friend. IN KEY 512 3 157 nEfRX9…bbPn7lyQtE= 25 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 26. Master Server: named.conf • "Key" statement to configure key key ”me-friend." { algorithm hmac-md5; secret “nEfRX9jxOmzsby8VKRgDWEJorhyNbjt1ebbPn7lyQtE="; }; • "allow-transfer" option in zone statement indicates which keys are allowed transfer – Can be combined with IP based restrictions zone ”example.net" { type master; file "zones/example.net."; allow-transfer { key me-friend.; }; notify yes; }; 26 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 27. Slave Servers: named.conf • "key" statement to configure the key key ”me-friend." { algorithm hmac-md5; secret “nEfRX9jxOmzsby8VKRgDWEJorhyNbjt1ebbPn7lyQtE="; }; • "server" statement to indicate key used – Zone configuration doesn’t change on slave server server 192.168.10.1 { keys {me-friend.; }; }; 27 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 28. Testing & Troubleshooting: dig • You can use dig to check TSIG configuration – dig @<server> <zone> AXFR -k <TSIG keyfile> $ dig @10.0.53.204 example.net AXFR -k Kme-friend.+157+51197.key • Wrong key will give “Transfer failed” and on the server the security-category will log: security: error: client 193.0.0.182#1228: zone transfer ’example.net/IN' denied 28 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 29. Importance of the Time Stamp • TSIG/SIG0 signs a complete DNS request / response with time stamp – to prevent replay attacks – currently hardcoded at 5 minutes • Operational problems when comparing times – Make sure your local time zone is properly defined – date -u will give UTC time, easy to compare between the two systems • Use NTP synchronization!!! 29 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 30. Authenticating Servers Using SIG0 • Alternatively its possible to use SIG0 – Not widely used yet – Works well in dynamic update environment • Public key algorithm – Authentication against a public key published in the DNS • SIG0 specified in RFC 2931 30 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 31. Questions? 31 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 32. DNSSEC Mechanisms • New Resource Records • Setting up a Secure Zone • Delegating Signing Authority • Key Rollovers 32 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 33. Vulnerabilities protected by DNSKEY / RRSIG / NSEC Cache impersonation Zone administrator Zone file master Caching forwarder Dynamic updates slaves resolver Cache pollution by Data spoofing Altered zone data 33 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 34. DNSSEC hypersummary • Data authenticity and integrity by signing the Resource Records Sets with private key • Public DNSKEYs used to verify the RRSIGs • Children sign their zones with their private key – Authenticity of that key established by signature/checksum by the parent (DS) • Ideal case: one public DNSKEY distributed 34 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 35. The DNS is not a Public Key Infrastructure (PKI) • All key procedures are based on local policy • A PKI is as strong as its weakest link – Certificate Authorities control this by SLAs • The DNS does not have Certificate Revocation Lists • If the domain is under one administrative control you might be able to enforce policy 35 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 36. Public Key Crypto • Key pair: a private (secret) key and a corresponding public key • Simplified: – If you know the public key, you can verify a signature created with the private key – If you know the public key, you can encrypt data that can only be decrypted with the private key • DNSSEC only uses signatures – PGP uses both methods 36 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 37. Authenticity and Integrity of Data • Authenticity: Is the data published by the entity we think is authoritative? • Integrity: Is the data received the same as what was published? • Public Key cryptography helps to answer these questions – signatures to check both integrity and authenticity of data – verifies the authenticity of signatures 37 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 38. Zone status terminology (RFC3090) • Verifiably Secure – RRset and its RRSIG can be verified with a DNSKEY that can be chased back to a trusted key, the parent has a DS record • Verifiably Insecure – RRset sits in a zone that is not signed and for which the parent has no DS record • BAD – RRset and its RRSIG can not be verified (somebody messed with the sig, the RRset, or the RRSIG expired) – A zone and its subzones are BAD when the parent’s signature over the Child’s key (DS) is BAD 38 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 39. New Resource Records 39 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 40. New Resource Records • 3 Public key crypto related RRs – RRSIG Signature over RRset made using private key – DNSKEY Public key, needed for verifying a RRSIG – DS Delegation Signer; ‘Pointer’ for building chains of authentication • One RR for internal consistency – NSEC Indicates which name is the next one in the zone and which typecodes are available for the current name • authenticated non-existence of data 40 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 41. Other Keys in the DNS • DNSKEY RR should only be used for DNSSEC – keys for other applications should use other RR types • CERT – For X.509 certificates • Application keys under discussion/development – IPSECKEY – SSHFP 41 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 42. RR’s and RRsets • Resource Record: – name TTL class type rdata www.ripe.net. 7200 IN A 192.168.10.3 • RRset: RRs with same name, class and type: www.ripe.net. 7200 IN A 192.168.10.3 A 10.0.0.3 A 172.25.215.2 • RRsets are signed, not the individual RRs 42 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 43. DNSKEY RDATA – 16 bits: FLAGS – 8 bits: protocol – 8 bits: algorithm – N*32 bits: public key Example: ripe.net. 3600 IN DNSKEY 256 3 5 ( AQOvhvXXU61Pr8sCwELcqqq1g4JJ CALG4C9EtraBKVd+vGIF/unwigfLOA O3nHp/cgGrG6gJYe8OWKYNgq3kDChN) 43 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 44. RRSIG RDATA • 16 bits - type covered • 8 bits - algorithm • 8 bits - nr. labels covered • 32 bits - original TTL ripe.net. 3600 IN RRSIG A 5 2 3600 ( 20031104144523 20031004144523 3112 ripe.net. VJ+8ijXvbrTLeoAiEk/qMrdudRnYZM1VlqhN vhYuAcYKe2X/jqYfMfjfSUrmhPo+0/GOZjW 66DJubZPmNSYXw== ) signature field • 32 bit - signature expiration • 32 bit - signature inception • 16 bit - key tag • signers name 44 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 45. Delegation Signer (DS) • Delegation Signer (DS) RR indicates that: – delegated zone is digitally signed – indicated key is used for the delegated zone • Parent is authorative for the DS of the childs zone – Not for the NS record delegating the childs zone! – DS should not be in the childs zone 45 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 46. DS RDATA • 16 bits: key tag • 8 bits: algorithm • 8 bits: digest type • 20 bytes: SHA-1 Digest $ORIGIN ripe.net. disi.ripe.net. 3600 IN NS ns.disi.ripe.net disi.ripe.net. 3600 IN DS 3112 5 1 ( 239af98b923c023371b52 1g23b92da12f42162b1a9 ) 46 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 47. NSEC RDATA • Points to the next domain name in the zone – also lists what are all the existing RRs for “name” – NSEC record for last name “wraps around” to first name in zone • N*32 bit type bit map • Used for authenticated denial-of-existence of data – authenticated non-existence of TYPEs and labels • Example: www.ripe.net. 3600 IN NSEC ripe.net. A RRSIG NSEC 47 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 48. NSEC Record example (RRSIG records removed for brevity) $ORIGIN ripe.net. @ SOA ….. NS NS.ripe.net. DNSKEY ….. NSEC mailbox.ripe.net. SOA NS NSEC DNSKEY RRSIG mailbox A 192.168.10.2 NSEC www.ripe.net. A NSEC RRSIG WWW A 192.168.10.3 TXT Public RIPE & RIPE NCC webserver NSEC ripe.net. A NSEC RRSIG TXT ‘popserver’ is missing • Query for “popserver.ripe.net” would return: aa bit set RCODE=NXDOMAIN authority: mailbox.ripe.net. NSEC www.ripe.net. A NSEC RRSIG • Query for “www.ripe.net MX” would return: an empty answer section and the “www NSEC” record in the authority section 48 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 49. NSEC records • If your query for data does not exist in a zone, the NSEC RR provides proof of non-existence • If after a query the response is: – NXDOMAIN: One or more NSEC RRs indicate that the name or a wildcard expansion does not exist – NOERROR and empty answer section: The NSEC TYPE array proves that the QTYPE did not exist • More than 1 NSEC may be required in response – wildcards • NSEC records are generated by tools – they also lexicographically order the zone 49 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 50. Questions? 50 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 51. Setting up a secure Zone 51 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 52. Securing a Zone 1. Generate keypair – include public key (DNSKEY) in zone file 2. Sign your zone; signing will: – sort the zone – Insert: • NSEC records • RRSIG records (signature over each RRset) • DS records (optional) – generate key-set file (can be used later) 52 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 53. Securing a Zone - continued 3. Publish Signed Zone 4. Configure Forwarding Resolver 5. Test 6. Distribute your public key (DNSKEY) to those that need to be able to trust your zone – Key-set or DS-set for Parent 53 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 54. Setting up a secure Zone Generating keys 54 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 55. Toolbag: dnssec-keygen • dnssec-keygen to generate keys dnssec-keygen -a alg -b bits -n type [options] name • algorithm: RSASHA1 (or RSA or DSA) • Bitsize: depends on algorithm, key function, paranoia level • type: zone • Name: zone you want to sign • ‘-r /dev/urandom’ might be needed 55 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 56. Creating keys $dnssec-keygen -a RSASHA1 -b 1024 -n zone example.net. Kexample.net.+005+20704 $ • 2 files are created: – Kexample.net.+005+20704.key • contains the public key • should go into the zone file – Kexample.net.+005+20704.private • contains the private key • should be kept secret!!! 56 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 57. Setting up a secure Zone Signing & publishing 57 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 58. Only authoritative records are signed • NS records for the zone itself are signed • NS records for delegations are not signed – DS RRs are signed! • Glue is not signed 58 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 59. Preparing the zonefile • include the public keys in the zonefile: – cat Kexample.net.+005+20704.key >> example.net • Use named-checkzone • Increase the SOA serial number – Always increase the SOA serial before signing! 59 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 60. Sign the zone dnssec-signzone [options] zonefile [ZSK’s] • If zonefile name is not zone name: – use –o <origin> option • Signed zonefile is called “zonefilename.signed” • Keyset is created as a bonus… – ready to go to parent • To create DS records from keyset files: – use -g option 60 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 61. Publishing the signed zone • Edit named.conf: zone ”example.net" { type master; file "zones/example.net.signed"; allow-transfer { 10.1.2.3 ; key mstr-slave.example.net.; }; notify yes; }; • Use named-checkconf • Reload zone • Test 61 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 62. Setting up a secure Zone Resolver configuration 62 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 63. Setting up a verifying resolving name server • To verify the content of a zone: – Get the public (key signing) key and check that this key belongs to the zone owner • Configure the keys you trust as secure entry points in named.conf trusted-keys { "example.net." 256 3 1 "AQ…QQ=="; }; 63 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 64. Setting up a secure Zone Testing the secure zone 64 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 65. Testing a verifying forwarder dig +dnssec [@server] record [TYPE] • Answer Flags are relevant • Example query to an authoritative nameserver ; <<>> DiG 9.1.1 <<>> +dnssec @193.0.0.202 www.example.net ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1947 ;; flags: qr aa rd; QUERY: 1, ANSWER: 4, AUTHORITY: 3, ADDITIONAL: 4 authoritative answer Recursion desired (but not available, RA is not set) Not authenticated! 65 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 66. Testing a verifying forwarder dig: an example ; <<>> DiG 9.3.0s20020122 <<>> +dnssec @127.0.0.1 example.net NS ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 31630 ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, udp= 4096 “use DNSSEC, if you can” ;; QUESTION SECTION: ;example.net. IN NS ;; ANSWER SECTION: example.net. 600 IN NS ns1.example.net. example.net. 600 IN NS ns2.example.net. example.net. 600 IN SIG NS 1 2 600 20020314134313 20020212134313 47783 example.net. DVC/ACejHtZylifpS6VSSqLa15xPH6p33HHmr3hC7eE6/QodM6fBi5z3 fsLhbQuuJ3pCEdi2bu+A0duuQlQMiHPvrkYia4bKmoyyvWHwB3jcyFhW lV4YOzX/fgkLUmu8ysGOiD9C0CkSvNSE6rBCzUa3hfkksHt4FBsuA1oQ yoc= Authenticated Data 66 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 67. Troubleshooting client side • Dig returns status: SERVFAIL • First try without +dnssec • Also try with +dnssec +cdflag – Checking is disabled. Data directly forwarded • Be ready for some interesting troubleshooting 67 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 68. Troubleshooting Server side • Turn on logging. Category “dnssec” with severity debug 3 gives you appropriate hints • Debug output is a little detailed – On the next page is an example where we corrupted the trusted-key – It is not directly obvious what the problem is – We edited the output a little so that it fits on a slide 68 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 69. Example Debugging Output (partial) validating sub.tld KEY: in dsvalidated validating sub.tld KEY: dsset with trust 7 validating sub.tld KEY: verify rdataset: success validating sub.tld KEY: marking as secure validator @0x81b53d0: dns_validator_destroy validating b1.sub.tld A: in fetch_callback_validator validating b1.sub.tld A: keyset with trust 7 validating b1.sub.tld A: resuming validate validating b1.sub.tld A: verify rdataset: success validating b1.sub.tld A: marking as secure validator @0x81b9e70: dns_validator_destroy 69 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 70. Questions? 70 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 71. Delegating Signing Authority chains of trust 71 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 72. Locally Secured Zones • Key distribution does not scale! . com. net. money.net. os.net. kids.net. Secure entry points corp dop mac unix nt marnick dev market dilbert Out of band key-exchanges 72 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 73. Using the DNS to Distribute Keys • Secured islands make key distribution problematic • Distributing keys through DNS: – Use one trusted key to establish authenticity of other keys – Building chains of trust from the root down – Parents need to sign the keys of their children • Ideal world: – only the root key needs to be configured – parents always delegate security to child 73 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 74. DS RRs for delegation • Parent is authoritative for the DS record – It should not appear in the child's zonefile • DS resource records are used for Delegation of Security • DS is not backwards compatible with RFC2535 • Eases resigning – parent can sign often => short signature lifetime => shorter impact time when key gets compromised 74 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 75. Key problem • Interaction with parent administratively expensive – Should only be done when needed – Bigger keys are better • Signing zones should be fast – Memory restrictions – Space and time concerns – Smaller keys with short lifetimes are better 75 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 76. Key functions • Large keys are more secure – Can be used longer ☺ – Large signatures => large zonefiles – Signing and verifying computationally expensive • Small keys are fast – Small signatures ☺ – Signing and verifying less expensive ☺ – Short lifetime 76 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 77. Key solution: more than one key • RRsets are signed, not RR’s • DS points to specific key – Signature from that key over DNSKEY RRset transfers trust to all keys in DNSKEY RRset • Key that DS points to only signs DNSKEY RRset – Key Signing Key (KSK) • Other keys in DNSKEY RRset sign entire zone – Zone Signing Key (ZSK) 77 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 78. Initial Key Exchange • Child needs to: – Send key signing keyset to parent • Parent needs to: – Check childs zone • for DNSKEY & RRSIGs – Verify if key can be trusted – Generate DS RR 78 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 79. Delegating Signing Authority • Parent signs the DS record pointing to the key signing key Key signing key $ORIGIN kids.net. $ORIGIN net. @ NS ns1 RRSIG NS (…) kids.net. kids NS ns1.kids DNSKEY (…) (1234) DS (…) 1234 DNSKEY (…) (3456) RRSIG DS (…)net. RRSIG dnskey … 1234 kids.net. … RRSIG dnskey … 3456 kids.net. … money NS ns1.money DS (…) Zone signing key beth A 127.0.10.1 RRSIG DS (…)net. RRSIG A (…) 3456 kids.net. … ns1 A 127.0.10.3 RRSIG A (…) 3456 kids.net. … • The parent is authoritative for the DS RR of its children 79 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 80. Chain of Trust Verification, Summary • Data in zone can be trusted if signed by a Zone-Signing-Key • Zone-Signing-Keys can be trusted if signed by a Key-Signing-Key • Key-Signing-Key can be trusted if pointed to by trusted DS record • DS record can be trusted – if signed by the parents Zone-Signing-Key or – DS or DNSKEY records can be trusted if exchanged out-of-band and locally stored (Secure entry point) 80 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 81. Walking the Chain of Trust Locally configured Trusted key: . 8907 1 $ORIGIN . . DNSKEY (…) 5TQ3s… (8907) ; KSK 2 DNSKEY (…) lasE5… (2983) ; ZSK 4 RRSIG DNSKEY (…) 8907 . 69Hw9.. $ORIGIN net. net. DNSKEY (…) q3dEw… (7834) ; KSK net. DS 7834 3 1ab15… 3 DNSKEY (…) 5TQ3s… (5612) ; ZSK RRSIG DS (…) . 2983 5 RRSIG DNSKEY (…) 7834 net. cMas... 7 ripe.net. DS 4252 3 1ab15… 6 $ORIGIN ripe.net. RRSIG DS (…) net. 5612 ripe.net. DNSKEY (…) rwx002… (4252) ; KSK DNSKEY (…) sovP42… (1111) ; ZSK 8 RRSIG DNSKEY (…) 4252 ripe.net. 5t... www.ripe.net. A 193.0.0.202 9 RRSIG A (…) 1111 ripe.net. a3... 81 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 82. Signing the zonefile - with KSK • Sign the zone: Key signing key dnssec-signzone -k Kexample.net.+001+20704 example.net Kexample.net.+001+16748 Zone signing key • Choose ZSK and KSK • Other options not changed 82 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 83. Questions? 83 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 84. Key Considerations 84 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 85. Private Key Compromise • You have to keep your private key secret • Private key can be stolen – Put the key on stand alone machines or on bastion hosts behind firewalls and strong access control • Private key reconstruction (crypto analysis) – random number not random – Leakage of key material (DSA) – Brute force attacks 85 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 86. Key Rollovers • Try to minimize impact – Short validity of signatures – Regular key-rollover • Remember: DNSKEYs do not have timestamps – the RRSIG over the DNSKEY has the timestamp • Key rollover involves 2nd party or parties: – State to be maintained during rollover – operationally expensive 86 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 87. Key Rollover (part 1) • Scheduled rollover of the child’s Key Signing Key • Child replaces key-1 with key-2 and wants parent to sign it $ORIGIN kids.net. @ NS ns1 DNSKEY (…) (1) a) DNSKEY (…) (2) DNSKEY (…) (5) $ORIGIN net. RRSIG KEY (…) kids.net. 1 b) RRSIG KEY (…) kids.net. 2 kids NS ns1.kids RRSIG KEY (…) kids.net. 5 DS (…) 1 ns1 A 127.0.10.3 RRSIG DS (…)net. RRSIG A (…) kids.net. 5 parent zone a) Create key 2 b) Sign key-set with key 1 and 2 and send key 2 to parent 87 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 88. Key Rollover (part 2) c) Parent generates and signs DS record d) Child signs his zone with only key 2, once parent updated his zone $ORIGIN kids.net. $ORIGIN net. @ NS ns1 kids NS ns1.kids DNSKEY (…) 2 DS (…) 2 DNSKEY (…) 5 RRSIG DS (…)net. RRSIG KEY (…) kids.net. 2 RRSIG KEY (…) kids.net. 5 ns1 A 127.0.10.3 RRSIG A (…) kids.net. 5 88 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 89. Timing of the Scheduled Key Rollover • Child should not remove the old key while there are still servers handing out the old DS RR. • The new DS will need to be distributed to the slave servers – max time set by the SOA expiration time • The old DS will need to have expired from caching servers. – Set by the TTL of the original DS RR. • You (or your tool) can check if the master and slave have picked up the change 89 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 90. Unscheduled Rollover Problems • Needs out of band communication – with parent and pre-configured resolvers • The parent needs to establish your identity again • How to protect child delegations? – unsecured? • There will be a period that the stolen key can be used to generate data useful on the Internet – There is no ‘revoke key’ mechanism • Emergency procedure must be on the shelf 90 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 91. Key Rollover - Summary 1. Generate new KSK 2. Sign with old and new KSKs 3. Inform any resolvers that have you as a trusted entry point of the new key – trusted-keys configuration 4. Query for the parental DS and remember the TTL – you will need it later 5. Upload the new KSK to the parent – The parent will generate a new DS RR. 6. Check if *all* parental servers (slaves and masters) picked up the change 7. Wait another TTL before removing the old key 91 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 92. Questions? 92 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 93. Operational Concerns 93 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 94. .nl trial 2003 • ~800.000 delegations • 40 MB unsigned, 350+ MB signed – .com grows to 10 Gigabyte! – unsigned .se ~9 MB, signed .se ~32 MB • Daily signing: ~1.5 hours • Loading: ~15 minutes • Very few NXT (NSEC) walks (rate limiting) 94 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 95. Tips… • Sort zone before signing – speeds up the signing process • If signed zone > 3 Gigabytes: 64 bit architecture • DNSSEC Deployment Working Group – http://www.sdl.sri.com/other/dnssec/ • DNSSEC deployment in .nl – http://www.nlnetlabs.nl/dnssec/ 95 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 96. Signing the Root • 3 Organisations check root zone; who signs? – IANA/ICANN – Department of Commerce – Verisign • How many keys? – N of M system for trust? 96 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 97. Resolver Issues • DNSSEC is not in POSIX yet – e.g. gethostbyname()or getnameinfo() • SIG verification is (only) done by caching forwarders • To test DNSSEC setups, you have to work with dig, or use the BIND lwresolver library • Alternatively: write some tools in PERL – (Net::DNS and Net::DNS::SEC) 97 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 98. End User Side • Local verifying/recursive server trusted? – TSIG for queries? – IPSec? – Enhance stub resolver functionality? • How much information needed? – AD bit enough? – Verifier built in to programs? 98 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 99. Wish List • Public and private key management tools • Provisioning tools • Secure Islands public keys distribution • API & protocol to communicate validation results • Killer App that relies on DNSSEC • Documentation/training/tools in order to reduce costs 99 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 100. Conclusions 100 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 101. What Did We Cover • DNSSEC provides a mechanism to protect DNS • DNSSEC implementation: – TSIG for communication between servers – RRSIG, DNSKEY and NSEC for data – DS for delegating trust • DNSSEC main difficulties: – Key distribution – Chicken & Egg 101 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 102. Back at the ranch • Design a secure architecture • Design a key exchange procedure • Resign your zone regularly • Automate the process (cron and Makefiles) • Have an emergency procedure in place 102 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 103. Thank You! • Please – Fill out questionnaire – Return badges for recycling – Pick up your certificate • Slides and other DNSSEC material at: www.ripe.net/training/dnssec/ • Feedback on this tutorial. – Suggestions: training@ripe.net 103 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 104. Resources Reference: • <sourcedir>/doc /arm/Bv9ARM.html • DNS and BIND, Albitz & Liu, O’ Reilly & Associates • FAQ: http://www.nominum.com/resources/faqs/bind-faqs.html RFCs: • <sourcedir>/doc/rfc/ • http://www.ietf.org • ftp://ftp.ripe.net/rfc/ Drafts: • http://www.ietf.org • ftp://ftp.ripe.net/internet-drafts/ 104 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 105. Additional Resources • http://www.nlnetlabs.nl/dnssec/ • http://www.dnssec.net/ • http://www.ripe.net/disi/ • Papers from the 5th USENIX UNIX Security Symposium, Salt Lake City, Utah, June 1995 – P. Vixie: DNS and BIND Security Issues • http://www.usenix.org/publications/library/proceedings/security95/vixie.html – S. Bellovin: Using the DNS for Break-ins • http://www.usenix.org/publications/library/proceedings/security95/bellovin.html 105 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 106. Related mailing lists • dnssec@cafax.se – operators and developers working on dnssec • namedroppers@ops.ietf.org – DNSEXT IETF working group (DNS protocol development) • dnsop@cafax.se – DNSOP IETF working group (operational DNS issues) • techsec@ripe.net – RIPE Technical Security working group • dns-wg@ripe.net – RIPE DNS working group 106 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 107. TSIG for dynamic updates • You can use TSIG or SIG0 to protect your dynamic updates • Detailed howto at: http://ops.ietf.org – title: “Secure dynamic DNS howto” • Steps for TSIG dynamic update of forward tree: – Configure your TSIG key into /etc/dhclient.conf and specify the FQDN – Configure named.conf to allow updates using the key 107 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 108. TSIG for dynamic updates: client side • /etc/dhclient.conf send fqdn.fqdn “laptop.example.net."; send fqdn.encoded on; # send in dns wire format send fqdn.server-update off; # tell dhcp server not to update A key me-friend. { algorithm HMAC-MD5; secret "ic…=="; } zone example.net. { primary 193.0.0.4; key me-friend.; } 108 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 109. TSIG for dynamic updates: server side • /etc/named.conf: key me-friend. { algorithm HMAC-MD5; secret "ic…=="; }; zone “example.net" { type master; file "zones/example.net.signed"; notify yes; allow-transfer { key tsig.example.net.; }; update-policy { grant me-friend. name laptop.example.net ; }; }; 109 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/
  • 110. • Author: Arno Meulenkamp (arno@ripe.net) • Additions and editing by: Vesna Manojlovic (BECHA@ripe.net) Filiz Yilmaz (filiz@ripe.net) Tim McGinnis (mctim@ripe.net) • Based on material by: Olaf M. Kolkman (okolkman@ripe.net) • Material available at: http://www.ripe.net/training/dnssec/ © 2005 RIPE NCC, Amsterdam, The Netherlands All rights reserved. All requests for reproduction rights should be addressed to: RIPE NCC Singel 258 NL-1016 AB AMSTERDAM 110 DNSSEC . RIPE NCC Training Course . http://www.ripe.net/training/dnssec/