SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
Issue paper n°12

Securing End-to-End
Internet communications
using DANE protocol
Today, the Internet is used by nearly 2.5 billion people to communicate, provide/get information. When the communication involves sensitive information such as bank details, credit card numbers, health records etc., the communication method must be secure. The exchange of information on the Internet is not secure by default, and that
leads to a variable risk of malicious attacks such as data corruption, identity theft etc.
As the Internet evolved, the need for new security mechanisms arose, either due to a new type of attack or identification of a new security hole. Solutions were proposed and deployed progressively. Such solutions include,
but are not limited to Internet Protocol Security (IPSec) for securing the network layer (aka, the IP layer), Transport
Layer Security (TLS) for securing communication between two Internet applications, such as a web server and a
web browser, Domain Name System Security Extensions (DNSSEC) for securing the DNS resolution process, etc.

1

Problem Statement

2

A solution which permits to
have end-to-end security:
DANE

3

Conclusion: DANE - the
missing piece in End-to-End
Internet security

During the few recent years, some high profile attacks, targeting the
X.509 Public Key Infrastructure (PKIX), used for securing Internet
communication has initiated an urgent need for a technology to plug
the security hole in the PKIX ecosystem. It is in this context, that
the Internet Engineering Task Force (IETF) proposed the DNS-Based
Authentication of Named Entities (DANE) protocol/mechanism.
This document explains the DANE protocol and also how DANE
could provide the required trust in the last mile with DNSSEC. This
document is intended for an audience who have some knowledge of
Internet protocols in general and Domain Name System (DNS) in particular. This document introduces the DANE protocol and explains
how DANE plugs the existing flaw in the Internet while securing endto-end communication. This document is not sufficient enough to
implement DANE for a domain administrator.

Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
Issue paper n°12

The following figure (Figure 1) depicts a typical Internet communication, browsing the Web.

Different type of
attacks possible
during this
communication
An encrypted
communicatoin

1

192.134.4.20

www.afnic.fr ?

Fig: 1
A typical
Internet
communication
with attack
possibilities
during both
operations

2
http://www.afnic.fr

This figure shows two operations:
1.	 	 ince the human brain is not capable of remembering many numbers (IP addresses) at a time, but is well equipS
ped to remember names, normally domain names are used while querying for a service in the Internet. But,
since Internet applications need IP addresses to communicate with each other, the DNS is used as a “Name
directory” to typically obtain the IP address associated to a given server identified with its name.
2.	 The obtained IP address is then used by the application (i.e. the web browser in Figure 1) to engage in an Internet communication with the remote web server.
Both the two operations mentioned previously are not implicitly secure. By default, information transmitted during
either DNS resolution or during accessing the server for data exchange, no authentication or encryption services
are applied. Thus, there are numerous possibilities during those operations wherein an attacker could provide
false information, such as rogue IP address during DNS resolution and thereby redirect the user to a fraudulent
server.
For the first operation (DNS resolution), securing the communication could be provided by DNSSEC. How DNSSEC provides security will be describer later in this article? For the second operation (connection between the
browser and the web server), the TLS protocol comes to the rescue, wherein it allows the client and the server
to authenticate each other, and to negotiate an encryption algorithm and cryptographic keys before the data is
exchanged. TLS makes sure that data cannot be read or tampered by a third-party during transit, since the data
is encrypted.

2
Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
Issue paper n°12

Encrypting and decrypting the data in the TLS protocol is done by a matching pair of cryptographic keys: public
and private key. The Data encrypted by a public key can be decrypted only by the corresponding private key,
and vice versa. This makes it possible to have secure communication with unknown users. For example, a Bank
publishes its public key for anyone to download. An account holder in the bank, Alice encrypts a message using
the public key, and sends it to the bank. Only the bank can decrypt the message using its private key. Thus Alice
is sure that her message is not read by anyone else.
In a TLS connection, the browser asks the web server to send its public key. The public key sent by the web server
to the browser is in the form of X.509 certificate, which is further explained in section-II.

1

Problem Statement
Public-Key Infrastructure X.509 (PKIX)
On the other hand, there is a possibility that an impersonator publishes his/her public key posing as Alice’s bank.
Alice will encrypt the message using the impersonator’s public key and send it to her bank, where the impersonator does a “man-in-the-middle” and copies the message. As he/she is the owner of public key, he/she also has
the private key which enables him/her to decrypt and read the message. Looking at an analogy for web browsing,
anyone can create a public-key for accessing any domain name. In security terms, this is a disaster, since any
impersonator can create a public key for domains such as www.example.com, and fool the user to access a fraudulent server.
Hence there is a necessity of a binding between the identity (e.g. the domain name) and the public key. The X.509
standard proposed by the ITU and ISO provides mechanism to bind a particular public key to a particular identity.
This binding can be autonomously done by the domain holder and in that case it is called self-signed certificate.
If the self-signed certificate is obtained from a trusted source by the application using the certificate for authentication, then it is accepted, otherwise there is no guarantee of the certificate’s authenticity.

The Certification Authorities (CAs) role
This is where the need for a trusted third party arises. It is just similar to the passport case, where the trusted third
party is the concerned government which has issued the passport. In a passport, the government attests that the
person in the photo is identified by a particular name, surname and other credentials.
In the web browsing use case, the certificate issued, is like the passport. In the PKIX ecosystem, the role of the
government is played by organizations called CAs. A certificate issued by a given CA, binds the given domain
name with information such as who has assigned the certificate, the entity which has requested the certificate, its
validity period etc.

3
Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
Issue paper n°12

Similar to wherein, a passport attested by one government, is accepted by other governments, as a validated
document for authenticating a person, browser vendors such as Firefox, Chrome, Internet explorer, Safari etc.,
accept digital certificates created only by certain CAs. The browser vendors authorize an organization to be a CA,
only after understanding that they are trustworthy, and they follow well defined principles and procedures to provide certificates only for correct domain holders. Once the browser vendors authorize an organization to be a CA,
the latter is added to the list of trusted CAs in the browser library. Thus, once a client using a browser accesses a
domain name which has a digital certificate generated by one of the CAs among its pre-installed list, the certificate
is implicitly trusted as shown in Figure 2.

Fig: 2 Communication between the browser and the web
server is secured using the PKIX ecosystem and TLS, but
still there are attack possibilities

Different type of
attacks possible
during this
communication

Obtains the web
certificate to
start the secure
communication

2

An attack possibility is
- by compromising one
of the CA in the list
and generating a certificate for the domain in
question and that certificate is send to the
client before the client
receives the original
certificate

192.134.4.20

1

www.afnic.fr ?

IP Address of
the domain
requested

1

IP adress of the
domain requested

https://www.afnic.fr

3
The browser validates the
Certificate obtained with the
CA (if it is in its default list)
mentioned in the certificate

4
A Secured encrypted
connection using TLS

4
Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
Issue paper n°12

The problem of many
At a glance, if we look at the size of the list of CAs accepted by popular browsers such as Chrome, Firefox, Internet
explorer, etc., it varies, but is in the range of hundreds. For example, a browser such as Firefox trusts 1,482 CA
Certificates (as per EFF SSL observatory1) provided by 651 organizations. Complementing the issue is that in the
CA ecosystem there is a practice of a CA providing authorization to other organizations, or its branches to create
certificates on its behalf. They are called subordinate CAs. A browser will trust the digital certificate created by the
subordinate CA also.
Even if only CA among the list of CAs, or its subordinates are compromised, it can generate a certificate for any
domain name which could be then authenticated by a browser such as Firefox, and thereby compromising a
secure web communication of an end-user who is using Firefox. For instance, two different CAs (where one is a
compromised CA) can issue two different certificates for the same domain and both of them will be trusted by
the browser. The fault here is that the owner of a domain had up to now, no way of telling the world, which CA or
certificate should be used to authenticate to connect to the server of the particular domain.

Need for a solution
The use of PKIX for securing web communication has been there for a while. Browser vendors, users, Standards
Development Organizations (SDOs) have been all aware of the issue - «Problem of many». There were some
attempts (Perspectives, Trust on First Use (ToFU), Channel Id, Certificate Transparency, etc.) to limit the issue.
But these attempts became more focused after the two high profile attacks on the CAs - Comodo and DigiNotar.
The sequence of the events was as follows. Comodo found that on March 15 2011, one of its affiliate Registration Authority2 (RA) was compromised and the attacker created a user account with the affiliate RA. Using this
account, the attacker created 9 Certificate Signing Requests for high valued web sites such as login.live.com,
mail.google.com, login.yahoo.com etc. and it is believed that the attacker got at least one X.509 certificate issued
out of their 9 requests.
Not going into the politics of this attack, an attacker who has created the fraudulent certificates as in the case of
Comodo, could do a Man-In-the-Middle, and redirect the user to a spoofed server which resembles that of the
original site (phishing). The certificates provided by the spoofed server will be accepted by the browser, since it
is generated by the CA which is trusted by the browser. Everything the user reads or writes (such as user name,
password, email etc.) can be seen and copied by the spoofing server.

1

https://www.eff.org/observatory

RAs collect and verify identity information from Direct Subscribers using certain procedures that implement the identity validation policies. The RA creates the
Certificate Signing Requests for submission to a CA. The CA signs the Certificate Signing Requests and issue public X.509 certificates to direct subscribers.
2

5
Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
Issue paper n°12

As per reports, the same hacker who intruded into Comodo was also responsible for intruding into DigiNotar
systems. Even though the attack came into notice publicly in end of August 2011, investigations reveal that the
intruder gained access to DigiNotar system as early as June 17, 2011. Similar to Comodo attack, the intruder has
created fraudulent digital certificates for high profile web sites. Investigations also reveal that, the generated certificates were used to redirect users to spoofed servers and obtain user credentials.
Both DigiNotar and Comodo were not ordinary companies. They were high profile security companies trusted by
number of organizations including governments and millions of users. Subsequent attacks on such high profile
companies demonstrated that it was not just enough in increasing the security of the infrastructure of the CAs, but
emphasized the need for reducing the attack scope in the PKIX model.

Limiting the attack surface, what are the options?
As mentioned earlier, the issue is not the security of the PKIX technology, but with such a big list of the CAs
accepted by the browsers by default, there is a higher probability of being compromised while establishing the
TLS connection, using the PKIX; rather than resolving the IP addresses, using the DNS. As mentioned earlier,
with the current PKIX model, a domain owner does not have the possibility of telling the browser that any user’s
connection to his/her domain should get validated by a certificate provided by a particular CA.
Different techniques were proposed to reduce the attack probability in the PKIX model such as Trust on First Use
(ToFU), Perspectives3, Certificate Transparency4 (CT), Certificate Authentication and Authorization (CAA)5 and
DANE
Of the different technologies proposed to limit the attack surface, ToFU is the easiest to implement because it
needs only for a browser to install the ToFU compatible browser add-on. Perspectives and CT are based on a
system of Notary service which does not completely coexist with the current PKIX model and needs additional
services acting as notary services. CAA is like a hack which does not need any modifications, and in the short term
looks a better option in limiting the attack surface. But looking at security from an end-to-end perspective and at
providing more options to the users (such as self-signed certificates), DANE happens to rank high.

3

http://perspectives-project.org/

4

http://www.certificate-transparency.org/

5

http://tools.ietf.org/html/rfc6844

6
Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
Issue paper n°12

2

A solution which permits to have end-to-end security: DANE
DANE - Augmenting the security in PKIX
This section will further elaborate on how DANE reduces the scope of an attack in the PKIX ecosystem and based
on a secure DNS infrastructure thanks to DNS Security Extensions (DNSSEC6). Using DANE protocol, a domain
owner will sign the certificate provided by the web server based on different options (explained below) and publish
it in the domain’s DNS zone (signed with DNSSEC), thus, enabling the domain owner, an option of informing the
application (e.g. browser) on how to validate the certificate obtained from the web server. For example, if the CA
for the domain www.example.com is «X», with DANE mechanism, the browser will only accept a certificate from
CA «X» for authenticating the server, thus, reducing the attack probability.
DANE was conceived and standardized at the IETF. Two RFCs relating to DANE have been published by the IETF:
1.	 DANE Use case RFC 6394
2.	 DANE Protocol RFC 6698
RFC 6698 focuses on standardizing and usage of the TLSA resource record. The basic role of this record is to be
published in a DNS zone, and to indicate the certificate information that corresponds to a specific service on a
specific port of a name in that zone.

Matching
Usage type

Port n°

Certificate for association

443._tcp.dane.rd.nic.fr. IN TLSA 3 0 1 c68ebcc998fda83222cabf2c0228ecc413566e709e5dc5cf25396a8bf4342dd3
Protocol
used

Selector

Fig: 3 TLSA Resource Record explained

As shown in Figure 3, the TLSA resource record consists of four fields: the “certificate Usage”, “a Selector”, “a
Matching type” and the “Certificate for association” data. The application must match the ‘certificate for association data field’ in the TLSA RR with the target certificate (i.e. the certificate obtained from the domain’s web server)
based on the other values (certificate usage, selector and matching type) in the TLSA resource record.
The ‘certificate Usage field’ is briefly summarized here. For further details on other parameters of the TLSA RR
please refer to RFC 6698.
•	 ‘0’ - During validation, the browser should use only the specific CA mentioned in the “Certificate for association»
field of the TLSA RR for validating the target certificate.
•	 ‘1’ - The browser should validate the target certificate only with the certificate mentioned in the «Certificate for
association» field of the TLSA RR.
There are other two values (‘2’ and ‘3’) in the “certificate Usage” field which will be explained later.

6

See mechanism description later

7
Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
Issue paper n°12

Why DNSSEC is vital for DANE?
The “certificate usage 0/1”, demonstrates how the attack surface can be reduced in the PKIX ecosystem while
validating the target certificate provided by the server. Supposing the attacker has done a Man-in- the-Middle”
attack during DNS resolution (i.e. the “first operation in Figure 4), and provided a fraudulent IP address for the
domain requested, the browser will use the IP address obtained, to access the server. With the attacker creating
a digital certificate for the spoofed server from an authorized CA, the attacker can convince the browser that a
server of the attacker’s choice legitimately represents the victim’s service.
DNSSEC7 makes it possible for a user to verify, based on a cryptographic chain of trust that the information resulting from a DNS resolution query originates from the legitimate DNS zone corresponding to the queried domain
name. In other words, when used in the end-to-end DNS resolution process, DNSSEC extensions prevent data
from being tampered while transiting down to the requesting user. Hence, in order for DANE to augment the
security in the existing PKIX model, the information obtained during DNS resolution should be validated using
DNSSEC. This is the reason why RFC 6698 (DANE protocol), states that the DNS zone which has a TLSA RR must
be signed by DNSSEC and the applications which query the domain for TLSA RR validation should use a DNSSEC
aware resolver. To simplify, DANE is not effective if it does not rely on a DNSSEC infrastructure.
Thus DANE with DNSSEC provides an end-to-end security for an Internet communication (as shown in Figure 4)
at both stages: first during the preliminary DNS resolution, then at the connection set up with the domain’s server.

Fig: 4 Probability of compromising a secured
communication greatly reduced with the help
of DANE & DNSSEC

With DNSSEC,
data forgery, data
modification will
be detected

With TLS, data
communication between
the browser and the web
server is encrypted

An attack could happen
only by modifying
the information in the
domain’s DNS zone,
AND by compromising
the parent of domain,
AND by compromising
the specific CA
of the domain and
creating a spoofed
certificate

1
IP Address and
the TLSA record
of the domain
requested using
DNSSEC

1

IP adress of the
domain requested

3
The browser uses the
information obtained from
the TLSA RR, to validate the
target Certificate

7

2
Obtains the web certificate to
start the secure communication

http://tools.ietf.org/html/rfc6698/

8
Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
Issue paper n°12

DANE - Using DNSSEC as an alternative PKI
Until now, the concentration was on a PKI based on digital certificates i.e. the PKIX model. The DNS, leveraged by
DNSSEC has become a de facto PKI. Like in the case of the PKIX model, wherein the CA key is the trust anchor,
in the case of the DNSSEC PKI, the trust anchor is the DNS root the key.
Certificate usage (‘2’/’3’) of the TLSA resource record explains how end-to-end security of web browsing could be
done without involving the CA ecosystem. That is, a domain holder creates a self-signed certificate, but can still
be authenticated by the browser vendors.
•	 	2’ - In a use case, wherein an organization has planned to create its own CA and each department in the
‘
organization creates its own certificates with the created CA as trust anchor for their respective department
web sites. During validation, the browsers will not normally trust the organization department web site, since
it does not have the organization CA in its list of trusted CA. But, when it receives the TLSA RR as part of
the response after DNSSEC validation, it is sure that the TLSA payload is not forged unless and otherwise
someone has access to the domain’s DNS zone. To validate the certificate, the browser has to make sure that
the CA of the target certificate is the same as that of the «Certificate for association» field in the TLSA RR.
•	 	 3’ - In a use case, wherein the domain administrator issues the self-signed certificate which is stored as target
‘
certificate in the web server, and a fingerprint of the certificate is added in the domain’s DNS zone as the
“Certificate for association” field in the TLSA RR. To validate the certificate, the browser has to make sure that
the target certificate matches the «Certificate for association» field in the TLSA RR.
Thus DANE technology not only reinforces the security of web browsing at the last mile using the existing PKIX
model, but also provides an alternative option i.e. only using DNS leveraged by DNSSSEC, hence completely
bypassing the mechanism of providing and managing X.509 certificates via PKIX.

Implementing and securing using DANE
The first step towards setting DANE for a domain name is to create a TLSA resource record for the domain by the
domain administrator. There are several tools available to generate a TLSA record. One of them is SWEDE8. The
generated TLSA resource record is provisioned in the DNS zone of the domain by the domain administrator and
the zone is signed using DNSSEC.
During DNS resolution, the TLSA resource record should also be queried as shown in the Figure 4. If the ‘certificate Usage’ field in the TLSA resource record has values ‘0’ or ‘1’, then the application must validate the target
certificate using the PKIX infrastructure (Refer III.1). If the certificate Usage field in the TLSA resource record has
values ‘2’ or ‘3’, then validation is done using DNSSEC (Refer III.3).

8

https://github.com/pieterlexis/swede

9
Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
Issue paper n°12

3

Conclusion: DANE - the missing piece in End-to-End Internet security
DANE is not only for web browsing
DANE was conceived to solve the issues relating to web browsing. Now, there have been efforts in the DANE
Working Group9 (WG) at the IETF, to extend its usage to securing other application such as mail (s/MIME), instant
messaging (XMPP) etc. All these works are ongoing process and if they are adopted by the IETF and published
as RFCs, there will be implementations. DNSSEC is a common prerequisite infrastructure for all these implementations.

Role of DANE in accelerating DNSSEC deployment
As explained in the beginning of this document, a typical Internet communication involves the DNS ecosystem
to resolve the address of a particular domain name. DNSSEC makes sure that the data obtained through DNS
resolution is from the legitimate zone for the domain name (i.e. data origin authentication) and the data is not
tampered in transit (i.e. data integrity). These security extensions make DNSSEC as a vital component for Internet
communications requiring a high-level of trust in the DNS infrastructure.
As in many of the important technologies (such as IPv6), the chicken and egg problem for DNSSEC exists. Many
service and network infrastructure providers are in a “wait and see” approach to join the DNSSEC bandwagon.
The reasons vary from complexity in implementing DNSSEC to unwarranted breakdowns and commercial incentives. Many of them are ready to wait until there is a scenario that will force them to deploy DNSSEC in their
network infrastructure.
Many of the discussions for slow DNSSEC adoption has been attributed to the lack of a “Killer app” using DNSSEC as the security foundation. The commercial opportunity that such an application creates may generate the
consumer pressure for DNSSEC adoption. Even though applications built on DNSSEC and DANE protocol may
not be the “Killer app” for DNSSEC, but if implemented seamlessly, it will provide security to millions of users
using Internet for secured communication. Inherent usage of these applications by millions of users which require
the DNSSEC-Secured network infrastructure will force the stakeholders to deploy DNSSEC. Thus, DANE could be
a catalyst in accelerating DNSSEC adoption.

Read all of our issues papers:
http://www.afnic.fr/en/resources/publications/issue-papers-6.html

9

https://datatracker.ietf.org/wg/dane/charter/

10
Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr

Más contenido relacionado

La actualidad más candente

DENGAROUS CYBER ATTACKS
DENGAROUS CYBER ATTACKSDENGAROUS CYBER ATTACKS
DENGAROUS CYBER ATTACKSHackingmantra
 
Ch12(revised 20071226)
Ch12(revised 20071226)Ch12(revised 20071226)
Ch12(revised 20071226)華穗 徐
 
Bots and malware
Bots and malwareBots and malware
Bots and malwareDoron Segal
 
Fast flux hosting and DNS
Fast flux hosting and DNSFast flux hosting and DNS
Fast flux hosting and DNSamiable_indian
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about BotnetNaveen Titare
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in MaySathish Kumar K
 
Analytical Study on Network Security Breach’s
Analytical Study on Network Security Breach’sAnalytical Study on Network Security Breach’s
Analytical Study on Network Security Breach’sijtsrd
 
RansomCloud O365: Pay por your Office 365 e-mail
RansomCloud O365: Pay por your Office 365 e-mailRansomCloud O365: Pay por your Office 365 e-mail
RansomCloud O365: Pay por your Office 365 e-mailTelefónica
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manualRoel Palmaers
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Nicholas Davis
 
Customer Involvement in Phishing Defence
Customer Involvement in Phishing DefenceCustomer Involvement in Phishing Defence
Customer Involvement in Phishing DefenceJordan Schroeder
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Social engineering
Social engineeringSocial engineering
Social engineeringlokenra
 

La actualidad más candente (20)

DENGAROUS CYBER ATTACKS
DENGAROUS CYBER ATTACKSDENGAROUS CYBER ATTACKS
DENGAROUS CYBER ATTACKS
 
Ch12(revised 20071226)
Ch12(revised 20071226)Ch12(revised 20071226)
Ch12(revised 20071226)
 
Bots and malware
Bots and malwareBots and malware
Bots and malware
 
Fast flux hosting and DNS
Fast flux hosting and DNSFast flux hosting and DNS
Fast flux hosting and DNS
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about Botnet
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in May
 
Analytical Study on Network Security Breach’s
Analytical Study on Network Security Breach’sAnalytical Study on Network Security Breach’s
Analytical Study on Network Security Breach’s
 
The Rise of Ransomware
The Rise of RansomwareThe Rise of Ransomware
The Rise of Ransomware
 
Internet safety
Internet safetyInternet safety
Internet safety
 
IBPS SO
IBPS SOIBPS SO
IBPS SO
 
RansomCloud O365: Pay por your Office 365 e-mail
RansomCloud O365: Pay por your Office 365 e-mailRansomCloud O365: Pay por your Office 365 e-mail
RansomCloud O365: Pay por your Office 365 e-mail
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy
 
Telephony DNS
Telephony DNSTelephony DNS
Telephony DNS
 
Customer Involvement in Phishing Defence
Customer Involvement in Phishing DefenceCustomer Involvement in Phishing Defence
Customer Involvement in Phishing Defence
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Botnet
BotnetBotnet
Botnet
 

Destacado

Moving Beyond VoIP to Cloud-Based Telephony
Moving Beyond VoIP to Cloud-Based TelephonyMoving Beyond VoIP to Cloud-Based Telephony
Moving Beyond VoIP to Cloud-Based TelephonyFonality
 
Diari del 03 de juny de 2015
Diari del 03 de juny de 2015Diari del 03 de juny de 2015
Diari del 03 de juny de 2015diarimes
 
Tema2 circuitos electricos basicos ii-
Tema2  circuitos electricos basicos ii-Tema2  circuitos electricos basicos ii-
Tema2 circuitos electricos basicos ii-Marta Gil Amat
 
Quadrilaterals & their properties(anmol)
Quadrilaterals & their properties(anmol)Quadrilaterals & their properties(anmol)
Quadrilaterals & their properties(anmol)Anmol Pant
 
Instalação fotovoltaica de autoconsumo: exemplo prático para Portugal
Instalação fotovoltaica de autoconsumo: exemplo prático para PortugalInstalação fotovoltaica de autoconsumo: exemplo prático para Portugal
Instalação fotovoltaica de autoconsumo: exemplo prático para PortugalKrannich Solar Portugal
 
JCSA 2012 02 Florent Chabaud : L'Organisation de la résilience
JCSA 2012 02 Florent Chabaud : L'Organisation de la résilienceJCSA 2012 02 Florent Chabaud : L'Organisation de la résilience
JCSA 2012 02 Florent Chabaud : L'Organisation de la résilienceAfnic
 
Explicación de la matriz web 2
Explicación de la matriz web 2Explicación de la matriz web 2
Explicación de la matriz web 2amaritza
 
0951342 Brochure Nict2009[1]
0951342 Brochure Nict2009[1]0951342 Brochure Nict2009[1]
0951342 Brochure Nict2009[1]roslanbz
 
What makes money grow on trees
What makes money grow on treesWhat makes money grow on trees
What makes money grow on treescloakadotcom
 
Catálogo mitsubishi electric aire acondicionado msz hj
Catálogo mitsubishi electric aire acondicionado msz hjCatálogo mitsubishi electric aire acondicionado msz hj
Catálogo mitsubishi electric aire acondicionado msz hjRooibos13
 

Destacado (20)

Moving Beyond VoIP to Cloud-Based Telephony
Moving Beyond VoIP to Cloud-Based TelephonyMoving Beyond VoIP to Cloud-Based Telephony
Moving Beyond VoIP to Cloud-Based Telephony
 
CPKids Menu
CPKids MenuCPKids Menu
CPKids Menu
 
Diari del 03 de juny de 2015
Diari del 03 de juny de 2015Diari del 03 de juny de 2015
Diari del 03 de juny de 2015
 
Sara b y sarac
Sara b y saracSara b y sarac
Sara b y sarac
 
Buscadores web
Buscadores webBuscadores web
Buscadores web
 
Miguel Ángel Mauleón Biografía y Pinturas
Miguel Ángel Mauleón   Biografía y PinturasMiguel Ángel Mauleón   Biografía y Pinturas
Miguel Ángel Mauleón Biografía y Pinturas
 
CV_151013_JMV_SP
CV_151013_JMV_SPCV_151013_JMV_SP
CV_151013_JMV_SP
 
"Verkaufsdaten von Veterinärantibiotika in 25 europäischen Staaten" - Klemens...
"Verkaufsdaten von Veterinärantibiotika in 25 europäischen Staaten" - Klemens..."Verkaufsdaten von Veterinärantibiotika in 25 europäischen Staaten" - Klemens...
"Verkaufsdaten von Veterinärantibiotika in 25 europäischen Staaten" - Klemens...
 
Tema2 circuitos electricos basicos ii-
Tema2  circuitos electricos basicos ii-Tema2  circuitos electricos basicos ii-
Tema2 circuitos electricos basicos ii-
 
Diabetes mellitus tipo 2
Diabetes mellitus tipo 2Diabetes mellitus tipo 2
Diabetes mellitus tipo 2
 
Pablo escobar
Pablo escobarPablo escobar
Pablo escobar
 
Quadrilaterals & their properties(anmol)
Quadrilaterals & their properties(anmol)Quadrilaterals & their properties(anmol)
Quadrilaterals & their properties(anmol)
 
Instalação fotovoltaica de autoconsumo: exemplo prático para Portugal
Instalação fotovoltaica de autoconsumo: exemplo prático para PortugalInstalação fotovoltaica de autoconsumo: exemplo prático para Portugal
Instalação fotovoltaica de autoconsumo: exemplo prático para Portugal
 
JCSA 2012 02 Florent Chabaud : L'Organisation de la résilience
JCSA 2012 02 Florent Chabaud : L'Organisation de la résilienceJCSA 2012 02 Florent Chabaud : L'Organisation de la résilience
JCSA 2012 02 Florent Chabaud : L'Organisation de la résilience
 
Sant joan
Sant joanSant joan
Sant joan
 
C2puntos
C2puntosC2puntos
C2puntos
 
Explicación de la matriz web 2
Explicación de la matriz web 2Explicación de la matriz web 2
Explicación de la matriz web 2
 
0951342 Brochure Nict2009[1]
0951342 Brochure Nict2009[1]0951342 Brochure Nict2009[1]
0951342 Brochure Nict2009[1]
 
What makes money grow on trees
What makes money grow on treesWhat makes money grow on trees
What makes money grow on trees
 
Catálogo mitsubishi electric aire acondicionado msz hj
Catálogo mitsubishi electric aire acondicionado msz hjCatálogo mitsubishi electric aire acondicionado msz hj
Catálogo mitsubishi electric aire acondicionado msz hj
 

Similar a Securing Internet communications end-to-end with the DANE protocol

Communications Technologies
Communications TechnologiesCommunications Technologies
Communications TechnologiesSarah Jimenez
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderRemmy Nweke, mNGE, mNUJ, mGOCOP
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetPunithRaj49
 
What Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika BhatiaWhat Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika Bhatiakulachihansraj
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLcscpconf
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocolcsandit
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsPalani Kumar
 
Mattias eriksson
Mattias erikssonMattias eriksson
Mattias erikssonHai Nguyen
 
Blaa white paper ver1.0.9.final(en)
Blaa white paper ver1.0.9.final(en)Blaa white paper ver1.0.9.final(en)
Blaa white paper ver1.0.9.final(en)SeungilChung2
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security andIaetsd Iaetsd
 
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxPublished on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxamrit47
 
Lecture13certaficate.pdf
Lecture13certaficate.pdfLecture13certaficate.pdf
Lecture13certaficate.pdfaminasouyah
 
Network Security
Network SecurityNetwork Security
Network SecurityBeth Hall
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTCQuobis
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC SecurityAlex Hunte
 
Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,Megha V
 

Similar a Securing Internet communications end-to-end with the DANE protocol (20)

Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Fs Ch 19
Fs Ch 19Fs Ch 19
Fs Ch 19
 
What Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika BhatiaWhat Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika Bhatia
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
Mattias eriksson
Mattias erikssonMattias eriksson
Mattias eriksson
 
Blaa white paper ver1.0.9.final(en)
Blaa white paper ver1.0.9.final(en)Blaa white paper ver1.0.9.final(en)
Blaa white paper ver1.0.9.final(en)
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
 
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxPublished on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
 
Lecture13certaficate.pdf
Lecture13certaficate.pdfLecture13certaficate.pdf
Lecture13certaficate.pdf
 
Network Security
Network SecurityNetwork Security
Network Security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
E_commerce_chap_2.pptx
E_commerce_chap_2.pptxE_commerce_chap_2.pptx
E_commerce_chap_2.pptx
 
Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,
 

Más de Afnic

Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Afnic
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Afnic
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANEAfnic
 
Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Afnic
 
Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Afnic
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle Afnic
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frAfnic
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...Afnic
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...Afnic
 
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...Afnic
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetAfnic
 
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetJCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetAfnic
 
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...Afnic
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013Afnic
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...Afnic
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesAfnic
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineAfnic
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Afnic
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic
 
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresSynthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresAfnic
 

Más de Afnic (20)

Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
 
Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?
 
Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .fr
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
 
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
 
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetJCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
 
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain names
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 characters
 
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresSynthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
 

Último

Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...Klinik kandungan
 
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call GirlsPremium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girlsmeghakumariji156
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCAMILRI
 
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024Osisko Gold Royalties Ltd
 
Teekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings ResultsTeekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings ResultsTeekay Corporation
 
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your AreaGorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Areameghakumariji156
 
Corporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdfCorporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdfProbe Gold
 
countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024Kweku Zurek
 
Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024KDDI
 
Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024Philip Rabenok
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCAMILRI
 
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubai
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In DubaiDubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubai
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubaikojalkojal131
 
Terna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results PresentationTerna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results PresentationTerna SpA
 
The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationThe Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationLeonardo
 
AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024gstubel
 
Teekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings PresentationTeekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings PresentationTeekay Tankers Ltd
 
Western Copper and Gold - May 2024 Presentation
Western Copper and Gold - May 2024 PresentationWestern Copper and Gold - May 2024 Presentation
Western Copper and Gold - May 2024 PresentationPaul West-Sells
 

Último (20)

Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
 
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call GirlsPremium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdf
 
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
 
SME IPO Opportunity and Trends of May 2024
SME IPO Opportunity and Trends of May 2024SME IPO Opportunity and Trends of May 2024
SME IPO Opportunity and Trends of May 2024
 
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdfITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
 
Teekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings ResultsTeekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings Results
 
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your AreaGorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
 
Corporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdfCorporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdf
 
countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024
 
Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024
 
Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdf
 
Osisko Gold Royalties Ltd - Q1 2024 Results
Osisko Gold Royalties Ltd - Q1 2024 ResultsOsisko Gold Royalties Ltd - Q1 2024 Results
Osisko Gold Royalties Ltd - Q1 2024 Results
 
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubai
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In DubaiDubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubai
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubai
 
Terna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results PresentationTerna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results Presentation
 
The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationThe Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results Presentation
 
AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024
 
Teekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings PresentationTeekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings Presentation
 
Western Copper and Gold - May 2024 Presentation
Western Copper and Gold - May 2024 PresentationWestern Copper and Gold - May 2024 Presentation
Western Copper and Gold - May 2024 Presentation
 

Securing Internet communications end-to-end with the DANE protocol

  • 1. Issue paper n°12 Securing End-to-End Internet communications using DANE protocol Today, the Internet is used by nearly 2.5 billion people to communicate, provide/get information. When the communication involves sensitive information such as bank details, credit card numbers, health records etc., the communication method must be secure. The exchange of information on the Internet is not secure by default, and that leads to a variable risk of malicious attacks such as data corruption, identity theft etc. As the Internet evolved, the need for new security mechanisms arose, either due to a new type of attack or identification of a new security hole. Solutions were proposed and deployed progressively. Such solutions include, but are not limited to Internet Protocol Security (IPSec) for securing the network layer (aka, the IP layer), Transport Layer Security (TLS) for securing communication between two Internet applications, such as a web server and a web browser, Domain Name System Security Extensions (DNSSEC) for securing the DNS resolution process, etc. 1 Problem Statement 2 A solution which permits to have end-to-end security: DANE 3 Conclusion: DANE - the missing piece in End-to-End Internet security During the few recent years, some high profile attacks, targeting the X.509 Public Key Infrastructure (PKIX), used for securing Internet communication has initiated an urgent need for a technology to plug the security hole in the PKIX ecosystem. It is in this context, that the Internet Engineering Task Force (IETF) proposed the DNS-Based Authentication of Named Entities (DANE) protocol/mechanism. This document explains the DANE protocol and also how DANE could provide the required trust in the last mile with DNSSEC. This document is intended for an audience who have some knowledge of Internet protocols in general and Domain Name System (DNS) in particular. This document introduces the DANE protocol and explains how DANE plugs the existing flaw in the Internet while securing endto-end communication. This document is not sufficient enough to implement DANE for a domain administrator. Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
  • 2. Issue paper n°12 The following figure (Figure 1) depicts a typical Internet communication, browsing the Web. Different type of attacks possible during this communication An encrypted communicatoin 1 192.134.4.20 www.afnic.fr ? Fig: 1 A typical Internet communication with attack possibilities during both operations 2 http://www.afnic.fr This figure shows two operations: 1. ince the human brain is not capable of remembering many numbers (IP addresses) at a time, but is well equipS ped to remember names, normally domain names are used while querying for a service in the Internet. But, since Internet applications need IP addresses to communicate with each other, the DNS is used as a “Name directory” to typically obtain the IP address associated to a given server identified with its name. 2. The obtained IP address is then used by the application (i.e. the web browser in Figure 1) to engage in an Internet communication with the remote web server. Both the two operations mentioned previously are not implicitly secure. By default, information transmitted during either DNS resolution or during accessing the server for data exchange, no authentication or encryption services are applied. Thus, there are numerous possibilities during those operations wherein an attacker could provide false information, such as rogue IP address during DNS resolution and thereby redirect the user to a fraudulent server. For the first operation (DNS resolution), securing the communication could be provided by DNSSEC. How DNSSEC provides security will be describer later in this article? For the second operation (connection between the browser and the web server), the TLS protocol comes to the rescue, wherein it allows the client and the server to authenticate each other, and to negotiate an encryption algorithm and cryptographic keys before the data is exchanged. TLS makes sure that data cannot be read or tampered by a third-party during transit, since the data is encrypted. 2 Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
  • 3. Issue paper n°12 Encrypting and decrypting the data in the TLS protocol is done by a matching pair of cryptographic keys: public and private key. The Data encrypted by a public key can be decrypted only by the corresponding private key, and vice versa. This makes it possible to have secure communication with unknown users. For example, a Bank publishes its public key for anyone to download. An account holder in the bank, Alice encrypts a message using the public key, and sends it to the bank. Only the bank can decrypt the message using its private key. Thus Alice is sure that her message is not read by anyone else. In a TLS connection, the browser asks the web server to send its public key. The public key sent by the web server to the browser is in the form of X.509 certificate, which is further explained in section-II. 1 Problem Statement Public-Key Infrastructure X.509 (PKIX) On the other hand, there is a possibility that an impersonator publishes his/her public key posing as Alice’s bank. Alice will encrypt the message using the impersonator’s public key and send it to her bank, where the impersonator does a “man-in-the-middle” and copies the message. As he/she is the owner of public key, he/she also has the private key which enables him/her to decrypt and read the message. Looking at an analogy for web browsing, anyone can create a public-key for accessing any domain name. In security terms, this is a disaster, since any impersonator can create a public key for domains such as www.example.com, and fool the user to access a fraudulent server. Hence there is a necessity of a binding between the identity (e.g. the domain name) and the public key. The X.509 standard proposed by the ITU and ISO provides mechanism to bind a particular public key to a particular identity. This binding can be autonomously done by the domain holder and in that case it is called self-signed certificate. If the self-signed certificate is obtained from a trusted source by the application using the certificate for authentication, then it is accepted, otherwise there is no guarantee of the certificate’s authenticity. The Certification Authorities (CAs) role This is where the need for a trusted third party arises. It is just similar to the passport case, where the trusted third party is the concerned government which has issued the passport. In a passport, the government attests that the person in the photo is identified by a particular name, surname and other credentials. In the web browsing use case, the certificate issued, is like the passport. In the PKIX ecosystem, the role of the government is played by organizations called CAs. A certificate issued by a given CA, binds the given domain name with information such as who has assigned the certificate, the entity which has requested the certificate, its validity period etc. 3 Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
  • 4. Issue paper n°12 Similar to wherein, a passport attested by one government, is accepted by other governments, as a validated document for authenticating a person, browser vendors such as Firefox, Chrome, Internet explorer, Safari etc., accept digital certificates created only by certain CAs. The browser vendors authorize an organization to be a CA, only after understanding that they are trustworthy, and they follow well defined principles and procedures to provide certificates only for correct domain holders. Once the browser vendors authorize an organization to be a CA, the latter is added to the list of trusted CAs in the browser library. Thus, once a client using a browser accesses a domain name which has a digital certificate generated by one of the CAs among its pre-installed list, the certificate is implicitly trusted as shown in Figure 2. Fig: 2 Communication between the browser and the web server is secured using the PKIX ecosystem and TLS, but still there are attack possibilities Different type of attacks possible during this communication Obtains the web certificate to start the secure communication 2 An attack possibility is - by compromising one of the CA in the list and generating a certificate for the domain in question and that certificate is send to the client before the client receives the original certificate 192.134.4.20 1 www.afnic.fr ? IP Address of the domain requested 1 IP adress of the domain requested https://www.afnic.fr 3 The browser validates the Certificate obtained with the CA (if it is in its default list) mentioned in the certificate 4 A Secured encrypted connection using TLS 4 Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
  • 5. Issue paper n°12 The problem of many At a glance, if we look at the size of the list of CAs accepted by popular browsers such as Chrome, Firefox, Internet explorer, etc., it varies, but is in the range of hundreds. For example, a browser such as Firefox trusts 1,482 CA Certificates (as per EFF SSL observatory1) provided by 651 organizations. Complementing the issue is that in the CA ecosystem there is a practice of a CA providing authorization to other organizations, or its branches to create certificates on its behalf. They are called subordinate CAs. A browser will trust the digital certificate created by the subordinate CA also. Even if only CA among the list of CAs, or its subordinates are compromised, it can generate a certificate for any domain name which could be then authenticated by a browser such as Firefox, and thereby compromising a secure web communication of an end-user who is using Firefox. For instance, two different CAs (where one is a compromised CA) can issue two different certificates for the same domain and both of them will be trusted by the browser. The fault here is that the owner of a domain had up to now, no way of telling the world, which CA or certificate should be used to authenticate to connect to the server of the particular domain. Need for a solution The use of PKIX for securing web communication has been there for a while. Browser vendors, users, Standards Development Organizations (SDOs) have been all aware of the issue - «Problem of many». There were some attempts (Perspectives, Trust on First Use (ToFU), Channel Id, Certificate Transparency, etc.) to limit the issue. But these attempts became more focused after the two high profile attacks on the CAs - Comodo and DigiNotar. The sequence of the events was as follows. Comodo found that on March 15 2011, one of its affiliate Registration Authority2 (RA) was compromised and the attacker created a user account with the affiliate RA. Using this account, the attacker created 9 Certificate Signing Requests for high valued web sites such as login.live.com, mail.google.com, login.yahoo.com etc. and it is believed that the attacker got at least one X.509 certificate issued out of their 9 requests. Not going into the politics of this attack, an attacker who has created the fraudulent certificates as in the case of Comodo, could do a Man-In-the-Middle, and redirect the user to a spoofed server which resembles that of the original site (phishing). The certificates provided by the spoofed server will be accepted by the browser, since it is generated by the CA which is trusted by the browser. Everything the user reads or writes (such as user name, password, email etc.) can be seen and copied by the spoofing server. 1 https://www.eff.org/observatory RAs collect and verify identity information from Direct Subscribers using certain procedures that implement the identity validation policies. The RA creates the Certificate Signing Requests for submission to a CA. The CA signs the Certificate Signing Requests and issue public X.509 certificates to direct subscribers. 2 5 Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
  • 6. Issue paper n°12 As per reports, the same hacker who intruded into Comodo was also responsible for intruding into DigiNotar systems. Even though the attack came into notice publicly in end of August 2011, investigations reveal that the intruder gained access to DigiNotar system as early as June 17, 2011. Similar to Comodo attack, the intruder has created fraudulent digital certificates for high profile web sites. Investigations also reveal that, the generated certificates were used to redirect users to spoofed servers and obtain user credentials. Both DigiNotar and Comodo were not ordinary companies. They were high profile security companies trusted by number of organizations including governments and millions of users. Subsequent attacks on such high profile companies demonstrated that it was not just enough in increasing the security of the infrastructure of the CAs, but emphasized the need for reducing the attack scope in the PKIX model. Limiting the attack surface, what are the options? As mentioned earlier, the issue is not the security of the PKIX technology, but with such a big list of the CAs accepted by the browsers by default, there is a higher probability of being compromised while establishing the TLS connection, using the PKIX; rather than resolving the IP addresses, using the DNS. As mentioned earlier, with the current PKIX model, a domain owner does not have the possibility of telling the browser that any user’s connection to his/her domain should get validated by a certificate provided by a particular CA. Different techniques were proposed to reduce the attack probability in the PKIX model such as Trust on First Use (ToFU), Perspectives3, Certificate Transparency4 (CT), Certificate Authentication and Authorization (CAA)5 and DANE Of the different technologies proposed to limit the attack surface, ToFU is the easiest to implement because it needs only for a browser to install the ToFU compatible browser add-on. Perspectives and CT are based on a system of Notary service which does not completely coexist with the current PKIX model and needs additional services acting as notary services. CAA is like a hack which does not need any modifications, and in the short term looks a better option in limiting the attack surface. But looking at security from an end-to-end perspective and at providing more options to the users (such as self-signed certificates), DANE happens to rank high. 3 http://perspectives-project.org/ 4 http://www.certificate-transparency.org/ 5 http://tools.ietf.org/html/rfc6844 6 Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
  • 7. Issue paper n°12 2 A solution which permits to have end-to-end security: DANE DANE - Augmenting the security in PKIX This section will further elaborate on how DANE reduces the scope of an attack in the PKIX ecosystem and based on a secure DNS infrastructure thanks to DNS Security Extensions (DNSSEC6). Using DANE protocol, a domain owner will sign the certificate provided by the web server based on different options (explained below) and publish it in the domain’s DNS zone (signed with DNSSEC), thus, enabling the domain owner, an option of informing the application (e.g. browser) on how to validate the certificate obtained from the web server. For example, if the CA for the domain www.example.com is «X», with DANE mechanism, the browser will only accept a certificate from CA «X» for authenticating the server, thus, reducing the attack probability. DANE was conceived and standardized at the IETF. Two RFCs relating to DANE have been published by the IETF: 1. DANE Use case RFC 6394 2. DANE Protocol RFC 6698 RFC 6698 focuses on standardizing and usage of the TLSA resource record. The basic role of this record is to be published in a DNS zone, and to indicate the certificate information that corresponds to a specific service on a specific port of a name in that zone. Matching Usage type Port n° Certificate for association 443._tcp.dane.rd.nic.fr. IN TLSA 3 0 1 c68ebcc998fda83222cabf2c0228ecc413566e709e5dc5cf25396a8bf4342dd3 Protocol used Selector Fig: 3 TLSA Resource Record explained As shown in Figure 3, the TLSA resource record consists of four fields: the “certificate Usage”, “a Selector”, “a Matching type” and the “Certificate for association” data. The application must match the ‘certificate for association data field’ in the TLSA RR with the target certificate (i.e. the certificate obtained from the domain’s web server) based on the other values (certificate usage, selector and matching type) in the TLSA resource record. The ‘certificate Usage field’ is briefly summarized here. For further details on other parameters of the TLSA RR please refer to RFC 6698. • ‘0’ - During validation, the browser should use only the specific CA mentioned in the “Certificate for association» field of the TLSA RR for validating the target certificate. • ‘1’ - The browser should validate the target certificate only with the certificate mentioned in the «Certificate for association» field of the TLSA RR. There are other two values (‘2’ and ‘3’) in the “certificate Usage” field which will be explained later. 6 See mechanism description later 7 Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
  • 8. Issue paper n°12 Why DNSSEC is vital for DANE? The “certificate usage 0/1”, demonstrates how the attack surface can be reduced in the PKIX ecosystem while validating the target certificate provided by the server. Supposing the attacker has done a Man-in- the-Middle” attack during DNS resolution (i.e. the “first operation in Figure 4), and provided a fraudulent IP address for the domain requested, the browser will use the IP address obtained, to access the server. With the attacker creating a digital certificate for the spoofed server from an authorized CA, the attacker can convince the browser that a server of the attacker’s choice legitimately represents the victim’s service. DNSSEC7 makes it possible for a user to verify, based on a cryptographic chain of trust that the information resulting from a DNS resolution query originates from the legitimate DNS zone corresponding to the queried domain name. In other words, when used in the end-to-end DNS resolution process, DNSSEC extensions prevent data from being tampered while transiting down to the requesting user. Hence, in order for DANE to augment the security in the existing PKIX model, the information obtained during DNS resolution should be validated using DNSSEC. This is the reason why RFC 6698 (DANE protocol), states that the DNS zone which has a TLSA RR must be signed by DNSSEC and the applications which query the domain for TLSA RR validation should use a DNSSEC aware resolver. To simplify, DANE is not effective if it does not rely on a DNSSEC infrastructure. Thus DANE with DNSSEC provides an end-to-end security for an Internet communication (as shown in Figure 4) at both stages: first during the preliminary DNS resolution, then at the connection set up with the domain’s server. Fig: 4 Probability of compromising a secured communication greatly reduced with the help of DANE & DNSSEC With DNSSEC, data forgery, data modification will be detected With TLS, data communication between the browser and the web server is encrypted An attack could happen only by modifying the information in the domain’s DNS zone, AND by compromising the parent of domain, AND by compromising the specific CA of the domain and creating a spoofed certificate 1 IP Address and the TLSA record of the domain requested using DNSSEC 1 IP adress of the domain requested 3 The browser uses the information obtained from the TLSA RR, to validate the target Certificate 7 2 Obtains the web certificate to start the secure communication http://tools.ietf.org/html/rfc6698/ 8 Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
  • 9. Issue paper n°12 DANE - Using DNSSEC as an alternative PKI Until now, the concentration was on a PKI based on digital certificates i.e. the PKIX model. The DNS, leveraged by DNSSEC has become a de facto PKI. Like in the case of the PKIX model, wherein the CA key is the trust anchor, in the case of the DNSSEC PKI, the trust anchor is the DNS root the key. Certificate usage (‘2’/’3’) of the TLSA resource record explains how end-to-end security of web browsing could be done without involving the CA ecosystem. That is, a domain holder creates a self-signed certificate, but can still be authenticated by the browser vendors. • 2’ - In a use case, wherein an organization has planned to create its own CA and each department in the ‘ organization creates its own certificates with the created CA as trust anchor for their respective department web sites. During validation, the browsers will not normally trust the organization department web site, since it does not have the organization CA in its list of trusted CA. But, when it receives the TLSA RR as part of the response after DNSSEC validation, it is sure that the TLSA payload is not forged unless and otherwise someone has access to the domain’s DNS zone. To validate the certificate, the browser has to make sure that the CA of the target certificate is the same as that of the «Certificate for association» field in the TLSA RR. • 3’ - In a use case, wherein the domain administrator issues the self-signed certificate which is stored as target ‘ certificate in the web server, and a fingerprint of the certificate is added in the domain’s DNS zone as the “Certificate for association” field in the TLSA RR. To validate the certificate, the browser has to make sure that the target certificate matches the «Certificate for association» field in the TLSA RR. Thus DANE technology not only reinforces the security of web browsing at the last mile using the existing PKIX model, but also provides an alternative option i.e. only using DNS leveraged by DNSSSEC, hence completely bypassing the mechanism of providing and managing X.509 certificates via PKIX. Implementing and securing using DANE The first step towards setting DANE for a domain name is to create a TLSA resource record for the domain by the domain administrator. There are several tools available to generate a TLSA record. One of them is SWEDE8. The generated TLSA resource record is provisioned in the DNS zone of the domain by the domain administrator and the zone is signed using DNSSEC. During DNS resolution, the TLSA resource record should also be queried as shown in the Figure 4. If the ‘certificate Usage’ field in the TLSA resource record has values ‘0’ or ‘1’, then the application must validate the target certificate using the PKIX infrastructure (Refer III.1). If the certificate Usage field in the TLSA resource record has values ‘2’ or ‘3’, then validation is done using DNSSEC (Refer III.3). 8 https://github.com/pieterlexis/swede 9 Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr
  • 10. Issue paper n°12 3 Conclusion: DANE - the missing piece in End-to-End Internet security DANE is not only for web browsing DANE was conceived to solve the issues relating to web browsing. Now, there have been efforts in the DANE Working Group9 (WG) at the IETF, to extend its usage to securing other application such as mail (s/MIME), instant messaging (XMPP) etc. All these works are ongoing process and if they are adopted by the IETF and published as RFCs, there will be implementations. DNSSEC is a common prerequisite infrastructure for all these implementations. Role of DANE in accelerating DNSSEC deployment As explained in the beginning of this document, a typical Internet communication involves the DNS ecosystem to resolve the address of a particular domain name. DNSSEC makes sure that the data obtained through DNS resolution is from the legitimate zone for the domain name (i.e. data origin authentication) and the data is not tampered in transit (i.e. data integrity). These security extensions make DNSSEC as a vital component for Internet communications requiring a high-level of trust in the DNS infrastructure. As in many of the important technologies (such as IPv6), the chicken and egg problem for DNSSEC exists. Many service and network infrastructure providers are in a “wait and see” approach to join the DNSSEC bandwagon. The reasons vary from complexity in implementing DNSSEC to unwarranted breakdowns and commercial incentives. Many of them are ready to wait until there is a scenario that will force them to deploy DNSSEC in their network infrastructure. Many of the discussions for slow DNSSEC adoption has been attributed to the lack of a “Killer app” using DNSSEC as the security foundation. The commercial opportunity that such an application creates may generate the consumer pressure for DNSSEC adoption. Even though applications built on DNSSEC and DANE protocol may not be the “Killer app” for DNSSEC, but if implemented seamlessly, it will provide security to millions of users using Internet for secured communication. Inherent usage of these applications by millions of users which require the DNSSEC-Secured network infrastructure will force the stakeholders to deploy DNSSEC. Thus, DANE could be a catalyst in accelerating DNSSEC adoption. Read all of our issues papers: http://www.afnic.fr/en/resources/publications/issue-papers-6.html 9 https://datatracker.ietf.org/wg/dane/charter/ 10 Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook : afnic.fr