SlideShare a Scribd company logo
1 of 28
Download to read offline
Key pieces of the Cyber Security Puzzle
Scorecard!
DNS & Routing !
Overview of the problem!
Exhibit A: The Great YouTube Blackout of ‘08 	
Mukom Akong T. | @perfexcellence |! Slide 3!
Exhibit A: The Great YouTube Blackout of ‘08 	
Mukom Akong T. | @perfexcellence |! Slide 4!
1 billion (non)views per day!
Date: 24th February 2008
Extent: Two thirds of Internet
Damage: Inaccessible for 2 hours
Exhibit B: Great Firewall of China extends abroad	
Mukom Akong T. | @perfexcellence |! Slide 5!
Exhibit B: Great Firewall of China extends overseas	
Mukom Akong T. | @perfexcellence |! Slide 6!
Date: 24 March 2010
Extent: Some networks in USA & Chile
Damage: US & Chilean citizens became
subject to the online policies of
the Chinese gov’t
Oh God, how
did we get
here?
Identifying computers on the Internet	
Mukom Akong T. | @perfexcellence |! Slide 8!
192.0.2.1
2001:db8:dead::a1d
learn.afrinic.net
IP addresses are ineffective for human use on a large scale
How this can happen to you	
①  You type your bank’s address: www.yourbank.com
②  Your PC asks your ISP’s DNS servers for the matching IP address
③  The DNS server goes through a hierarchy to get the answer:
§  Asks the root DNS servers which points it to .com servers
§  The .com servers direct it to .yourbank.com DNS server
§  The .yourbank.com DNS server sends the answer (an IP address)
§  The server passes the response to your PC which makes the connection
④  An attacker can inject a fake answer during any of the above steps
⑤  The response that comes to you
§  Is NOT the same IP address of you bank (which you don’t know)
§  The website LOOKS exactly like the one you often use
⑥  You type in your credentials, then you get a error e.g. page cannot be
displayed
⑦  3 weeks later, you scream: “Where’s my money??!!"
Mukom Akong T. | @perfexcellence |! Slide 9!
Identifying organisations on the Internet	
☀ Domain name e.g
afrinic.net
☀ A block of IP addresses
§  196.1.0.0/24
§  2001:4290::/32
☀ Autonomous System
Number e.g.
Mukom Akong T. | @perfexcellence |! Slide 10!
For the Internet to work ..	
Mukom Akong T. | @perfexcellence |! Slide 11!
2001:db8:dead::a1dlearn.afrinic.net
For the Internet to work ..	
Mukom Akong T. | @perfexcellence |! Slide 12!
How do I send
information to
the computer
with address B?
The Problem: Breakdown of TRUST	
Mukom Akong T. | @perfexcellence |! Slide 13!
I AM …
www.google.com
www.yourbank.com
www.statehouse.gov.ng
www.prc.cm
www.cto.int
www.afrinic.net
I AM …
2c0f:face:b00c::/48
197.253.0.0/16
65.25.0/24
It is possible to impersonate any entity by name or address
The Problem: Breakdown of TRUST	
☀ It is possible for one computer to
impersonate another node by name.
☀ There’s no real way of knowing if the
answer your computer got to “what is
the IP address of www.yourbank.com” is
legitimate or not
Mukom Akong T. | @perfexcellence |! Slide 14!
The Problem: Breakdown of TRUST	
☀ It is possible for one entity (e.g an ISP)
to impersonate a whole network by IP
address
☀ There’s been no way verify if that entity
owns that IP address it’s claiming
Mukom Akong T. | @perfexcellence |! Slide 15!
A Fix: Certify & authenticate Internet identity	
☀ Sign DNS records
☀ Establish a chain of trust
☀ Establish ‘ownership’ of
address space
Mukom Akong T. | @perfexcellence |! Slide 16!
Digital certificates & public
key infrastructure
How DNSSEC solves the problem	
①  Digitally sign DNS (name to IP address)
records using public keys
②  Establishes a chain of trust where parent
domains authenticate child domains
③  Ensures responses have not been
tampered with in transit
Does NOT provide confidentiality (encryption)
Mukom Akong T. | @perfexcellence |! Slide 17!
DNSSEC – What It Solves	
☀ Use public keys to authenticate
§  The original name to address mapping
§  That queries were not tampered with
☀ Prevents impersonation by domain name
☀ Completely backwards compatible with
existing DNS infrastructure
☀ It would prevent the extension of the Great
Firewall of China outside China
Mukom Akong T. | @perfexcellence |! Slide 18!
Bene"ts of DNSSEC	
①  The Internet community: Improved security in
the zones that are signed.
②  Registrars: Offer domain signing services to
their customers.
③  ISPs: Increasing the security of the data
returned to their customers.
④  Users: Protection from DNS vulnerabilities
such as cache poisoning and man-in-the-
middle attacks.
Mukom Akong T. | @perfexcellence |! Slide 19!
RPKI – What It Solves	
☀ Ties an organization's IP address
range(s) to its ASN
☀ Solves the “does this address block
belong to this organization”
☀ Blocks impersonation by IP address
(number)
☀ RPKI would have prevented the Youtube
Blackout of ‘08
Mukom Akong T. | @perfexcellence |! Slide 20!
How RPKI Works	
☀ Digitally certify that a resource has been allocated
to a specific entity.
☀ Usage rights for resources is proven by digital
certificate.
☀ Connect resources (ASNs, IP addresses) to a trust
anchor, thus forming a chain of trust.
☀ Control authority to originate a routing
announcement by a certificate via ROAs
☀ Certificates are used to verify that a network has
the authority to announce a given block of
addresses.
Mukom Akong T. | @perfexcellence |! Slide 21!
Implications for National Infrastructure	
①  Is the ccTLD DNSSEC enabled?
②  Government network
☀ Support DNSSEC on all gov’t networks
☀ Is gov’t IP space RPKI-protected?
③  Key network operators (ideally Everyone)
☀ Secure your names domain with DNSSEC
☀ Secure your number domains with RPKI
Because Cyber Crime is an industry that will
only grow (to the chagrin of us all) and extend
to Cyber War & Terrorism
Mukom Akong T. | @perfexcellence |! Slide 22!
Source: http://www.dnssec-deployment.org
Consequences: think of the e#ect	
①  We consolidate governance around
technology …then the e-gov’t portal is
inaccessible due to attack
②  We consolidate education around
hosted content and that platform was
inaccessible
③  Our bank websites get hijacked
Mukom Akong T. | @perfexcellence |! Slide 24!
Our digital way of life is under threat	
Mukom Akong T. | @perfexcellence |! Slide 25!
e-Banking E-Gov’t E-Commerce
The Problem: Breakdown of TRUST
Call to Action	
Mukom Akong T. | @perfexcellence |! Slide 27!
RPKI & DNSSEC are not Silver Bullets but are a core part of the solution.
Fix up your own part of this mess! RPKI & DNSSEC on gov’t infrastructure
Na Gode! Thank You ! Sh’kran
mukom@afrinic.net | Twitter: @perfexcellent

More Related Content

What's hot

CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018PKF Francis Clark
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIAcharitha garimella
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram communityMohammed Adam
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
 

What's hot (20)

Internet security
Internet securityInternet security
Internet security
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
internet security
internet securityinternet security
internet security
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram community
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 

Similar to High Level Overview of RPKI & DNSSEC

Philippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsPhilippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsAPNIC
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityRob Dudley
 
How to prevent cyber terrorism taragana
How to prevent cyber terrorism  taraganaHow to prevent cyber terrorism  taragana
How to prevent cyber terrorism taraganaGilles Sgro
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerBlockstrap.com
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityPrateek Panda
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDebra Baker, CISSP CSSP
 
Upsc science AND technology
Upsc   science AND technologyUpsc   science AND technology
Upsc science AND technologyGautam Kumar
 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackPriyanka Aash
 
FFMUC presents #ffmeet - #virtualUKNOF
FFMUC presents #ffmeet - #virtualUKNOFFFMUC presents #ffmeet - #virtualUKNOF
FFMUC presents #ffmeet - #virtualUKNOFAnnika Wickert
 
How Internet Peering Improves Security
How Internet Peering Improves SecurityHow Internet Peering Improves Security
How Internet Peering Improves SecurityWilliam Norton
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTsWeb 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTsAurora Consulting
 
Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...ITCamp
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Andrew Hammond
 
Superfast Business - Technology Trends for Business
Superfast Business - Technology Trends for BusinessSuperfast Business - Technology Trends for Business
Superfast Business - Technology Trends for BusinessSuperfast Business
 
Scot Cloud 2017
Scot Cloud 2017Scot Cloud 2017
Scot Cloud 2017Ray Bugg
 
Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101Mayank Jain
 

Similar to High Level Overview of RPKI & DNSSEC (20)

ION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSECION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSEC
 
Philippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsPhilippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTs
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application Security
 
How to prevent cyber terrorism taragana
How to prevent cyber terrorism  taraganaHow to prevent cyber terrorism  taragana
How to prevent cyber terrorism taragana
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primer
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
Upsc science AND technology
Upsc   science AND technologyUpsc   science AND technology
Upsc science AND technology
 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation Track
 
FFMUC presents #ffmeet - #virtualUKNOF
FFMUC presents #ffmeet - #virtualUKNOFFFMUC presents #ffmeet - #virtualUKNOF
FFMUC presents #ffmeet - #virtualUKNOF
 
How Internet Peering Improves Security
How Internet Peering Improves SecurityHow Internet Peering Improves Security
How Internet Peering Improves Security
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTsWeb 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTs
 
Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
 
Superfast Business - Technology Trends for Business
Superfast Business - Technology Trends for BusinessSuperfast Business - Technology Trends for Business
Superfast Business - Technology Trends for Business
 
Scot Cloud 2017
Scot Cloud 2017Scot Cloud 2017
Scot Cloud 2017
 
Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101
 

More from Mukom Akong Tamon

Cracking the Enigma of Innovation in Established Companies
Cracking the Enigma of Innovation in Established CompaniesCracking the Enigma of Innovation in Established Companies
Cracking the Enigma of Innovation in Established CompaniesMukom Akong Tamon
 
Deploying #IPv6 Amidst Competing Priorities
Deploying #IPv6 Amidst Competing Priorities Deploying #IPv6 Amidst Competing Priorities
Deploying #IPv6 Amidst Competing Priorities Mukom Akong Tamon
 
How to Love Your Email Again: Inbox-Zero via GTD
How to Love Your Email Again: Inbox-Zero via GTDHow to Love Your Email Again: Inbox-Zero via GTD
How to Love Your Email Again: Inbox-Zero via GTDMukom Akong Tamon
 
How to Effectively Integrate ICTs in Education in Africa
How to Effectively Integrate ICTs in Education in Africa How to Effectively Integrate ICTs in Education in Africa
How to Effectively Integrate ICTs in Education in Africa Mukom Akong Tamon
 
Importance of IP Resource Planning in ICT Strategies
Importance of IP Resource Planning in ICT StrategiesImportance of IP Resource Planning in ICT Strategies
Importance of IP Resource Planning in ICT StrategiesMukom Akong Tamon
 
Effective Student Management (EduERP)
Effective Student Management (EduERP)Effective Student Management (EduERP)
Effective Student Management (EduERP)Mukom Akong Tamon
 

More from Mukom Akong Tamon (6)

Cracking the Enigma of Innovation in Established Companies
Cracking the Enigma of Innovation in Established CompaniesCracking the Enigma of Innovation in Established Companies
Cracking the Enigma of Innovation in Established Companies
 
Deploying #IPv6 Amidst Competing Priorities
Deploying #IPv6 Amidst Competing Priorities Deploying #IPv6 Amidst Competing Priorities
Deploying #IPv6 Amidst Competing Priorities
 
How to Love Your Email Again: Inbox-Zero via GTD
How to Love Your Email Again: Inbox-Zero via GTDHow to Love Your Email Again: Inbox-Zero via GTD
How to Love Your Email Again: Inbox-Zero via GTD
 
How to Effectively Integrate ICTs in Education in Africa
How to Effectively Integrate ICTs in Education in Africa How to Effectively Integrate ICTs in Education in Africa
How to Effectively Integrate ICTs in Education in Africa
 
Importance of IP Resource Planning in ICT Strategies
Importance of IP Resource Planning in ICT StrategiesImportance of IP Resource Planning in ICT Strategies
Importance of IP Resource Planning in ICT Strategies
 
Effective Student Management (EduERP)
Effective Student Management (EduERP)Effective Student Management (EduERP)
Effective Student Management (EduERP)
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

High Level Overview of RPKI & DNSSEC

  • 1. Key pieces of the Cyber Security Puzzle
  • 2. Scorecard! DNS & Routing ! Overview of the problem!
  • 3. Exhibit A: The Great YouTube Blackout of ‘08 Mukom Akong T. | @perfexcellence |! Slide 3!
  • 4. Exhibit A: The Great YouTube Blackout of ‘08 Mukom Akong T. | @perfexcellence |! Slide 4! 1 billion (non)views per day! Date: 24th February 2008 Extent: Two thirds of Internet Damage: Inaccessible for 2 hours
  • 5. Exhibit B: Great Firewall of China extends abroad Mukom Akong T. | @perfexcellence |! Slide 5!
  • 6. Exhibit B: Great Firewall of China extends overseas Mukom Akong T. | @perfexcellence |! Slide 6! Date: 24 March 2010 Extent: Some networks in USA & Chile Damage: US & Chilean citizens became subject to the online policies of the Chinese gov’t
  • 7. Oh God, how did we get here?
  • 8. Identifying computers on the Internet Mukom Akong T. | @perfexcellence |! Slide 8! 192.0.2.1 2001:db8:dead::a1d learn.afrinic.net IP addresses are ineffective for human use on a large scale
  • 9. How this can happen to you ①  You type your bank’s address: www.yourbank.com ②  Your PC asks your ISP’s DNS servers for the matching IP address ③  The DNS server goes through a hierarchy to get the answer: §  Asks the root DNS servers which points it to .com servers §  The .com servers direct it to .yourbank.com DNS server §  The .yourbank.com DNS server sends the answer (an IP address) §  The server passes the response to your PC which makes the connection ④  An attacker can inject a fake answer during any of the above steps ⑤  The response that comes to you §  Is NOT the same IP address of you bank (which you don’t know) §  The website LOOKS exactly like the one you often use ⑥  You type in your credentials, then you get a error e.g. page cannot be displayed ⑦  3 weeks later, you scream: “Where’s my money??!!" Mukom Akong T. | @perfexcellence |! Slide 9!
  • 10. Identifying organisations on the Internet ☀ Domain name e.g afrinic.net ☀ A block of IP addresses §  196.1.0.0/24 §  2001:4290::/32 ☀ Autonomous System Number e.g. Mukom Akong T. | @perfexcellence |! Slide 10!
  • 11. For the Internet to work .. Mukom Akong T. | @perfexcellence |! Slide 11! 2001:db8:dead::a1dlearn.afrinic.net
  • 12. For the Internet to work .. Mukom Akong T. | @perfexcellence |! Slide 12! How do I send information to the computer with address B?
  • 13. The Problem: Breakdown of TRUST Mukom Akong T. | @perfexcellence |! Slide 13! I AM … www.google.com www.yourbank.com www.statehouse.gov.ng www.prc.cm www.cto.int www.afrinic.net I AM … 2c0f:face:b00c::/48 197.253.0.0/16 65.25.0/24 It is possible to impersonate any entity by name or address
  • 14. The Problem: Breakdown of TRUST ☀ It is possible for one computer to impersonate another node by name. ☀ There’s no real way of knowing if the answer your computer got to “what is the IP address of www.yourbank.com” is legitimate or not Mukom Akong T. | @perfexcellence |! Slide 14!
  • 15. The Problem: Breakdown of TRUST ☀ It is possible for one entity (e.g an ISP) to impersonate a whole network by IP address ☀ There’s been no way verify if that entity owns that IP address it’s claiming Mukom Akong T. | @perfexcellence |! Slide 15!
  • 16. A Fix: Certify & authenticate Internet identity ☀ Sign DNS records ☀ Establish a chain of trust ☀ Establish ‘ownership’ of address space Mukom Akong T. | @perfexcellence |! Slide 16! Digital certificates & public key infrastructure
  • 17. How DNSSEC solves the problem ①  Digitally sign DNS (name to IP address) records using public keys ②  Establishes a chain of trust where parent domains authenticate child domains ③  Ensures responses have not been tampered with in transit Does NOT provide confidentiality (encryption) Mukom Akong T. | @perfexcellence |! Slide 17!
  • 18. DNSSEC – What It Solves ☀ Use public keys to authenticate §  The original name to address mapping §  That queries were not tampered with ☀ Prevents impersonation by domain name ☀ Completely backwards compatible with existing DNS infrastructure ☀ It would prevent the extension of the Great Firewall of China outside China Mukom Akong T. | @perfexcellence |! Slide 18!
  • 19. Bene"ts of DNSSEC ①  The Internet community: Improved security in the zones that are signed. ②  Registrars: Offer domain signing services to their customers. ③  ISPs: Increasing the security of the data returned to their customers. ④  Users: Protection from DNS vulnerabilities such as cache poisoning and man-in-the- middle attacks. Mukom Akong T. | @perfexcellence |! Slide 19!
  • 20. RPKI – What It Solves ☀ Ties an organization's IP address range(s) to its ASN ☀ Solves the “does this address block belong to this organization” ☀ Blocks impersonation by IP address (number) ☀ RPKI would have prevented the Youtube Blackout of ‘08 Mukom Akong T. | @perfexcellence |! Slide 20!
  • 21. How RPKI Works ☀ Digitally certify that a resource has been allocated to a specific entity. ☀ Usage rights for resources is proven by digital certificate. ☀ Connect resources (ASNs, IP addresses) to a trust anchor, thus forming a chain of trust. ☀ Control authority to originate a routing announcement by a certificate via ROAs ☀ Certificates are used to verify that a network has the authority to announce a given block of addresses. Mukom Akong T. | @perfexcellence |! Slide 21!
  • 22. Implications for National Infrastructure ①  Is the ccTLD DNSSEC enabled? ②  Government network ☀ Support DNSSEC on all gov’t networks ☀ Is gov’t IP space RPKI-protected? ③  Key network operators (ideally Everyone) ☀ Secure your names domain with DNSSEC ☀ Secure your number domains with RPKI Because Cyber Crime is an industry that will only grow (to the chagrin of us all) and extend to Cyber War & Terrorism Mukom Akong T. | @perfexcellence |! Slide 22!
  • 24. Consequences: think of the e#ect ①  We consolidate governance around technology …then the e-gov’t portal is inaccessible due to attack ②  We consolidate education around hosted content and that platform was inaccessible ③  Our bank websites get hijacked Mukom Akong T. | @perfexcellence |! Slide 24!
  • 25. Our digital way of life is under threat Mukom Akong T. | @perfexcellence |! Slide 25! e-Banking E-Gov’t E-Commerce
  • 27. Call to Action Mukom Akong T. | @perfexcellence |! Slide 27! RPKI & DNSSEC are not Silver Bullets but are a core part of the solution. Fix up your own part of this mess! RPKI & DNSSEC on gov’t infrastructure
  • 28. Na Gode! Thank You ! Sh’kran mukom@afrinic.net | Twitter: @perfexcellent