SlideShare a Scribd company logo
1 of 22
Download to read offline
What We are Learning
About DNS Security
DNSSEC and Much More

7/27/2011




Edward Lewis
Director, Member of Technical Staff




1                   © Neustar Inc. / Proprietary and Confidential
8/1/2011




Joseph is unhappy about my talk
» This is the first day since
  my son was born that I
  have not been home
» He's 6 1/2 months old
» When I told him I'd be
  away July 27, he had
  this frown
                              » This talk is dedicated to
» Still, it is an honor to be
                                little Joe
  invited to speak here
  today

2                   © Neustar Inc. / Proprietary and Confidential
8/1/2011




Agenda
»The significance of DNSSEC


»What you should be doing about DDoS


»What you need to do




3                © Neustar Inc. / Proprietary and Confidential
8/1/2011




In the Wake of DNSSEC
» The protocol and code has been strengthened
» We've improved the state of operations
» Cooperation has become very important




4                 © Neustar Inc. / Proprietary and Confidential
8/1/2011




Briefly, What is DNSSEC?
»DNSSEC is an add-on to the DNS protocol
»It adds information to DNS answers that provide
 proof that the data is genuine
    » DNSSEC   is like automobile safety belts for DNS
»The greatest benefit is preventing ISP caches from
 accepting forged answers, misdirecting customers




5                       © Neustar Inc. / Proprietary and Confidential
8/1/2011




Protocol Strengthening
» The DNS protocol, as specified, is a very weak
  base to secure

» One of the benefits of DNSSEC is that is made us
  take a critical look at the protocol



                                         DNSSEC




6                 © Neustar Inc. / Proprietary and Confidential
8/1/2011




Why securing DNS is so hard
»DNS goals are
    » global   scale, fast response, high availability
»It's a crowd, not one person




7                           © Neustar Inc. / Proprietary and Confidential
8/1/2011




...and...
»The original specifications are informal, incomplete
    » Leading  to a wide range of interpretations
    » And thus a wide range of different implementations
    » Rely on the memories of the "old guys"




8                       © Neustar Inc. / Proprietary and Confidential
8/1/2011




Updates to DNS
»Security throughout the DNS
    » Data Loading (EPP & WhoIs-related too)
    » Data Replication (zone transfers)
    » Queries and Responses (e.g., DNSSEC, TSIG, wild card)




»New code, new code everywhere
»And new ways to operate


9                      © Neustar Inc. / Proprietary and Confidential
8/1/2011




What DNSSEC got right
»DNSSEC is a technical success
»DNSSEC was designed with adoption by transition
 in mind
     » This   is what IPv6 lacks
»But adoption by slow transition is not easy and
 requires patience, it's a good plan and a lot of
 execution
     » Slow   adoption is a beneficial thing, a feature, really!
»And the path to DNSSEC's completion can teach
 us much about security improvements

10                          © Neustar Inc. / Proprietary and Confidential
8/1/2011




Strengthening Cooperation
»When teaching the ISO seven layer protocol
 model I came across this in an old textbook
     » There are times when it is necessary to handle an error in
      the layer above the one you are designing
»Translating this into DNS and security events
     » Duringtimes of attack, out-of-band coordination must
      have already been established




11                       © Neustar Inc. / Proprietary and Confidential
8/1/2011




Coordinate?
»Who?: Anyone that teams in a defense
     » Government    and Private Industry
     » Competitors
     » Across   borders and oceans
»When?
     » Strategicand tactical
     » Frequently, openly
     » During exercises, events

»Where?
     » Conferences,  workshops
     » In-person meetings at offices
     » And don't forget - happy hours!
12                         © Neustar Inc. / Proprietary and Confidential
8/1/2011




Government - Industry cooperation
»Government and Industry relationship is important
»Government learns from experts in industry
»Government always maintains legal authority
»Government provides leadership in mandates and
 funding
»Industry provides innovation and takes the risk




13                 © Neustar Inc. / Proprietary and Confidential
8/1/2011




DDoS
»You can be a target of a DDoS
     » Solutions   include capacity, reserves, and traffic scrubbing
»You can be used to launch a DDoS
     » Open   recursive servers can reflect and amplify an attack
»(You could also be the attacker...;))




14                          © Neustar Inc. / Proprietary and Confidential
8/1/2011




Anti-DDOS
»Expertise is needed to defend against these
 attacks
     » Target   owners, ISPs and other security entities have this
»This is why cooperation, set up ahead of time, is
 critical




»If you need to "click here" ... it is too late for you!

15                          © Neustar Inc. / Proprietary and Confidential
8/1/2011




Failure to set up cooperation
»There are two possible outcomes
»"Fail closed" and not respond adequately
     » Examples are one person having a password and being
      on vacation when the attack happens
»"Fail open" and be open to be fooled (social
 engineered) by an attacker
     » Examples  are attackers causing a diversion and then
      acting as "first responders"/emergency workers to monitor
      damage and adjust attacks




16                      © Neustar Inc. / Proprietary and Confidential
8/1/2011




Securing the DNS system
»The DNS is spread amongst many elements
     » Registries,registrars, web hosters, dns operators
     » ISPs, open/remote recursive servers
     » Policy elements, law enforcement

»Each element can self-secure, but end-to-end
 security is also needed
»This is one final push to form cooperative groups!




17                       © Neustar Inc. / Proprietary and Confidential
8/1/2011




Better DNS & cooperation is not enough
»Attacks will happen
»Defenses will not stop all damage
     » If   a defense stops all attacks, it is probably too tight!
»This makes logging or tracing activity an important
 element




18                            © Neustar Inc. / Proprietary and Confidential
8/1/2011




What do we learn from logging events
»The information left behind by an attack is valuable
»We learn the techniques
»We learn the level of sophistication
»We learn the weaknesses of the attack
»We learn how the attackers are learning
»We learn who the attackers are


»We might even be able to convict and punish them

19                 © Neustar Inc. / Proprietary and Confidential
8/1/2011




A stronger system
»DNS is becoming a stronger system
»We know it takes more than a good protocol,
 because "good" depends on the way you measure
»We know it takes world-wide cooperation and in-
 depth cooperation to run a network that opens
 communication without letting it be overrun with
 abuse
»We want citizens to have access to government
 services to help their lives, not gangs like
 ANONYMOUS to disrupt lives

20                © Neustar Inc. / Proprietary and Confidential
8/1/2011




What You Need to Do to Prepare
»Learn about DNSSEC
     » It's like getting used to
       seatbelts
     » It's not scary but it takes work




»And begin to get to know
 others in the Industry &
 Government
     » Help   defend the network



21                         © Neustar Inc. / Proprietary and Confidential
Thank you!




22

More Related Content

Viewers also liked

The Future of the Internet: Open Research Topics
The Future of the Internet: Open Research TopicsThe Future of the Internet: Open Research Topics
The Future of the Internet: Open Research TopicsNeustar, Inc.
 
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the SmokeA Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the SmokeNeustar, Inc.
 
The Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & MillennialsThe Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & MillennialsNeustar, Inc.
 
Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Neustar, Inc.
 
Vacation Traveler Insights
Vacation Traveler InsightsVacation Traveler Insights
Vacation Traveler InsightsNeustar, Inc.
 
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comEigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comRishabh Dangwal
 

Viewers also liked (8)

The Future of the Internet: Open Research Topics
The Future of the Internet: Open Research TopicsThe Future of the Internet: Open Research Topics
The Future of the Internet: Open Research Topics
 
Adweek and Neustar
Adweek and NeustarAdweek and Neustar
Adweek and Neustar
 
Hi-Def Marketing
Hi-Def MarketingHi-Def Marketing
Hi-Def Marketing
 
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the SmokeA Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
 
The Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & MillennialsThe Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & Millennials
 
Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014
 
Vacation Traveler Insights
Vacation Traveler InsightsVacation Traveler Insights
Vacation Traveler Insights
 
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comEigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
 

Similar to What We are Learning About DNS Security: DNSSEC and Much More..

FOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedFOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedNeustar, Inc.
 
GWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave WilkesGWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave WilkesGWAVA
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
 
Webinar: How To Achieve Total File Security in the Cloud
Webinar: How To Achieve Total File Security in the CloudWebinar: How To Achieve Total File Security in the Cloud
Webinar: How To Achieve Total File Security in the CloudStorage Switzerland
 
HIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the EnterpriseHIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the EnterpriseAdaCore
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter packKim Jensen
 
Archiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWiseArchiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWiseNovell
 
Guard time connect_estonia 21.03.2012
Guard time connect_estonia 21.03.2012Guard time connect_estonia 21.03.2012
Guard time connect_estonia 21.03.2012connectestonia
 
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateDelphix
 
Fia presentatie
Fia presentatieFia presentatie
Fia presentatieictseserv
 
Hope Is Not A Strategy - Ivor Sequiera, Neustar
Hope Is Not A Strategy - Ivor Sequiera, NeustarHope Is Not A Strategy - Ivor Sequiera, Neustar
Hope Is Not A Strategy - Ivor Sequiera, NeustarResellerClub
 
GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)GWAVA
 
Knowledge Processing with Big Data and Semantic Web Technologies
Knowledge Processing with Big Data and  Semantic Web TechnologiesKnowledge Processing with Big Data and  Semantic Web Technologies
Knowledge Processing with Big Data and Semantic Web TechnologiesSyed Muhammad Ali Hasnain
 
Neuron Intellectual Property Management Presentation - October 2011
Neuron Intellectual Property Management Presentation - October 2011Neuron Intellectual Property Management Presentation - October 2011
Neuron Intellectual Property Management Presentation - October 2011HealthDocs
 
Just Keep Sending The Messages
Just Keep Sending The MessagesJust Keep Sending The Messages
Just Keep Sending The MessagesRussel Winder
 
Just Keep Sending The Messages
Just Keep Sending The MessagesJust Keep Sending The Messages
Just Keep Sending The MessagesRussel Winder
 

Similar to What We are Learning About DNS Security: DNSSEC and Much More.. (20)

FOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedFOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons Learned
 
GWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave WilkesGWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave Wilkes
 
Intersect
IntersectIntersect
Intersect
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
Webinar: How To Achieve Total File Security in the Cloud
Webinar: How To Achieve Total File Security in the CloudWebinar: How To Achieve Total File Security in the Cloud
Webinar: How To Achieve Total File Security in the Cloud
 
Proact story on Archiving
Proact story on ArchivingProact story on Archiving
Proact story on Archiving
 
HIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the EnterpriseHIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Archiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWiseArchiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWise
 
Guard time connect_estonia 21.03.2012
Guard time connect_estonia 21.03.2012Guard time connect_estonia 21.03.2012
Guard time connect_estonia 21.03.2012
 
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
 
Fia presentatie
Fia presentatieFia presentatie
Fia presentatie
 
Hope Is Not A Strategy - Ivor Sequiera, Neustar
Hope Is Not A Strategy - Ivor Sequiera, NeustarHope Is Not A Strategy - Ivor Sequiera, Neustar
Hope Is Not A Strategy - Ivor Sequiera, Neustar
 
GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)
 
Knowledge Processing with Big Data and Semantic Web Technologies
Knowledge Processing with Big Data and  Semantic Web TechnologiesKnowledge Processing with Big Data and  Semantic Web Technologies
Knowledge Processing with Big Data and Semantic Web Technologies
 
Neuron Intellectual Property Management Presentation - October 2011
Neuron Intellectual Property Management Presentation - October 2011Neuron Intellectual Property Management Presentation - October 2011
Neuron Intellectual Property Management Presentation - October 2011
 
Just Keep Sending The Messages
Just Keep Sending The MessagesJust Keep Sending The Messages
Just Keep Sending The Messages
 
Just Keep Sending The Messages
Just Keep Sending The MessagesJust Keep Sending The Messages
Just Keep Sending The Messages
 
FILR Demo
FILR DemoFILR Demo
FILR Demo
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

What We are Learning About DNS Security: DNSSEC and Much More..

  • 1. What We are Learning About DNS Security DNSSEC and Much More 7/27/2011 Edward Lewis Director, Member of Technical Staff 1 © Neustar Inc. / Proprietary and Confidential
  • 2. 8/1/2011 Joseph is unhappy about my talk » This is the first day since my son was born that I have not been home » He's 6 1/2 months old » When I told him I'd be away July 27, he had this frown » This talk is dedicated to » Still, it is an honor to be little Joe invited to speak here today 2 © Neustar Inc. / Proprietary and Confidential
  • 3. 8/1/2011 Agenda »The significance of DNSSEC »What you should be doing about DDoS »What you need to do 3 © Neustar Inc. / Proprietary and Confidential
  • 4. 8/1/2011 In the Wake of DNSSEC » The protocol and code has been strengthened » We've improved the state of operations » Cooperation has become very important 4 © Neustar Inc. / Proprietary and Confidential
  • 5. 8/1/2011 Briefly, What is DNSSEC? »DNSSEC is an add-on to the DNS protocol »It adds information to DNS answers that provide proof that the data is genuine » DNSSEC is like automobile safety belts for DNS »The greatest benefit is preventing ISP caches from accepting forged answers, misdirecting customers 5 © Neustar Inc. / Proprietary and Confidential
  • 6. 8/1/2011 Protocol Strengthening » The DNS protocol, as specified, is a very weak base to secure » One of the benefits of DNSSEC is that is made us take a critical look at the protocol DNSSEC 6 © Neustar Inc. / Proprietary and Confidential
  • 7. 8/1/2011 Why securing DNS is so hard »DNS goals are » global scale, fast response, high availability »It's a crowd, not one person 7 © Neustar Inc. / Proprietary and Confidential
  • 8. 8/1/2011 ...and... »The original specifications are informal, incomplete » Leading to a wide range of interpretations » And thus a wide range of different implementations » Rely on the memories of the "old guys" 8 © Neustar Inc. / Proprietary and Confidential
  • 9. 8/1/2011 Updates to DNS »Security throughout the DNS » Data Loading (EPP & WhoIs-related too) » Data Replication (zone transfers) » Queries and Responses (e.g., DNSSEC, TSIG, wild card) »New code, new code everywhere »And new ways to operate 9 © Neustar Inc. / Proprietary and Confidential
  • 10. 8/1/2011 What DNSSEC got right »DNSSEC is a technical success »DNSSEC was designed with adoption by transition in mind » This is what IPv6 lacks »But adoption by slow transition is not easy and requires patience, it's a good plan and a lot of execution » Slow adoption is a beneficial thing, a feature, really! »And the path to DNSSEC's completion can teach us much about security improvements 10 © Neustar Inc. / Proprietary and Confidential
  • 11. 8/1/2011 Strengthening Cooperation »When teaching the ISO seven layer protocol model I came across this in an old textbook » There are times when it is necessary to handle an error in the layer above the one you are designing »Translating this into DNS and security events » Duringtimes of attack, out-of-band coordination must have already been established 11 © Neustar Inc. / Proprietary and Confidential
  • 12. 8/1/2011 Coordinate? »Who?: Anyone that teams in a defense » Government and Private Industry » Competitors » Across borders and oceans »When? » Strategicand tactical » Frequently, openly » During exercises, events »Where? » Conferences, workshops » In-person meetings at offices » And don't forget - happy hours! 12 © Neustar Inc. / Proprietary and Confidential
  • 13. 8/1/2011 Government - Industry cooperation »Government and Industry relationship is important »Government learns from experts in industry »Government always maintains legal authority »Government provides leadership in mandates and funding »Industry provides innovation and takes the risk 13 © Neustar Inc. / Proprietary and Confidential
  • 14. 8/1/2011 DDoS »You can be a target of a DDoS » Solutions include capacity, reserves, and traffic scrubbing »You can be used to launch a DDoS » Open recursive servers can reflect and amplify an attack »(You could also be the attacker...;)) 14 © Neustar Inc. / Proprietary and Confidential
  • 15. 8/1/2011 Anti-DDOS »Expertise is needed to defend against these attacks » Target owners, ISPs and other security entities have this »This is why cooperation, set up ahead of time, is critical »If you need to "click here" ... it is too late for you! 15 © Neustar Inc. / Proprietary and Confidential
  • 16. 8/1/2011 Failure to set up cooperation »There are two possible outcomes »"Fail closed" and not respond adequately » Examples are one person having a password and being on vacation when the attack happens »"Fail open" and be open to be fooled (social engineered) by an attacker » Examples are attackers causing a diversion and then acting as "first responders"/emergency workers to monitor damage and adjust attacks 16 © Neustar Inc. / Proprietary and Confidential
  • 17. 8/1/2011 Securing the DNS system »The DNS is spread amongst many elements » Registries,registrars, web hosters, dns operators » ISPs, open/remote recursive servers » Policy elements, law enforcement »Each element can self-secure, but end-to-end security is also needed »This is one final push to form cooperative groups! 17 © Neustar Inc. / Proprietary and Confidential
  • 18. 8/1/2011 Better DNS & cooperation is not enough »Attacks will happen »Defenses will not stop all damage » If a defense stops all attacks, it is probably too tight! »This makes logging or tracing activity an important element 18 © Neustar Inc. / Proprietary and Confidential
  • 19. 8/1/2011 What do we learn from logging events »The information left behind by an attack is valuable »We learn the techniques »We learn the level of sophistication »We learn the weaknesses of the attack »We learn how the attackers are learning »We learn who the attackers are »We might even be able to convict and punish them 19 © Neustar Inc. / Proprietary and Confidential
  • 20. 8/1/2011 A stronger system »DNS is becoming a stronger system »We know it takes more than a good protocol, because "good" depends on the way you measure »We know it takes world-wide cooperation and in- depth cooperation to run a network that opens communication without letting it be overrun with abuse »We want citizens to have access to government services to help their lives, not gangs like ANONYMOUS to disrupt lives 20 © Neustar Inc. / Proprietary and Confidential
  • 21. 8/1/2011 What You Need to Do to Prepare »Learn about DNSSEC » It's like getting used to seatbelts » It's not scary but it takes work »And begin to get to know others in the Industry & Government » Help defend the network 21 © Neustar Inc. / Proprietary and Confidential