SlideShare a Scribd company logo
1 of 38
Securing Digital KeysHigh Quality Key GenerationHighest Level Key Protection The Importance of DNSSEC Case Study of ICAAN  Root Implementation Fadi Cotran, Ph.D. Director of Technical Business Development May2011
Who Are We and What Do We Do? Provide trusted security everywhere and secure data and voice communication regardless of device, environment or location.  	Deliver proven security architectures to organisations all over the world including governments, enterprises and carriers.  2
3
Why DNSSEC ? 4
Why DNSSEC ?
RECENT DNS ATTACKS January 2010, websites of Amazon.com and Walmart.com were brought down due to DNS Attacks. Not talked about much publicly…  Their DNS servers were compromised. DNS supplier Neustar - UltraDNS 6
Why DNSSEC ? ,[object Object]
  EU halts trading after hacking - Sydney Morning Herald
Nasdaq acknowledges hit by hackers February 7, 2011 - 12:01AM NYT
More than 400 cyber attacks have affected Australian government  networks in the past year, figures reveal.
And the latest? April 26, 2011: Sony admits that 77 million customer emails and private information compromised on PlayStation worldwide network. Network still out. 25 Million user private information published on the internet. May not be a DNS attack, but… 8
Why DNSSEC ? 9
Why DNSSEC ? 10 Dan Kaminsky
Why DNSSEC ? 2008 Black Hat Conference Dan Kaminsky demonstrated live how you can exploit a critical flaw in DNS and hijack a website. He is credited for developing DNSSEC as the solution to prevent DNS exploits. The US Government mandated that all Federal websites implement DNSSEC by end of 2009. 11
12
What are DNSSEC benefits? DNS lookup can be modified in transit to redirect an end user to an imposter or malicious site for password collection.  Modification attacks carried out en masse at ISP/enterprise = cache poisoning. A lookup secured with DNSSEC is protected against modification = primary benefit. Greatest benefits may be yet to come. Why not securely distribute more than just DNS info? Other keys? Identification info? DNSSEC deployment at root and TLDs set the stage 13
ICANN DNSSEC Implementation 14
July 16, 2010 ICANN goes live with  AEP & ISC DNSSEC solution
Los Angeles Datacenter 16
Washington DC Datacenter 17
Secure Cage in Datacenter 18
Physical Security 19
20
21
Root Key Generation 22
Algorithm / Key Length  • Cryptanalysis from NIST: 2048 bit RSA SHA256  http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_PART3_key-management_Dec2009.pdf
ICANN PARAMETERS Split KSK and ZSK KSK is 2048-bit RSA Rolled as required RFC 5011 for automatic key rollovers Signatures made using SHA-256 ZSK is 1024-bit RSA Rolled once a quarter (four times per year) Zone signed with NSEC Signatures made using SHA-256 25
Crypto Officer (CO)  • Have physical keys to safe deposit boxes holding smartcards that activate the HSM  • ICANN cannot generate new key or sign ZSK without 3-of-7 COs  • Able to travel up to 4 times a year to US.
Recovery Key Shareholder (RKSH)  • Have smartcards holding pieces (M-of-N) of the key used to encrypt the KSK inside the HSM  • If both key management facilities fall into the ocean, 5- of-7 RKSH smartcards and an encrypted KSK smartcard can reconstitute KSK in a new HSM  • Backup KSK encrypted on smartcard held by ICANN  • Able to travel on relatively short notice to US. Hopefully never. Annual inventory.
CO  CO BCK  RKSH  Bevil Wooding, TT Dan Kaminsky, US Jiankang Yao, CN Moussa Guebre, BF Norm Ritchie, CA Ondřej Surý, CZ  Christopher Griffiths, US Fabian Arbogast, TZ  Alain Aina, BJ Anne-Marie  EklundLöwinder, SE FredericoNeves, BR GaurabUpadhaya, NP Olaf Kolkman, NL  John Curran, US  Nicolas Antoniello, UY Rudolph Daniel, UK Sarmad Hussain, PK  Paul Kane, UK  Robert Seastrom, US Vinton Cerf, US  Ólafur Guðmundsson, IS  BCK  Andy Linton, NZ Carlos Martinez, UY Dmitry Burkov, RU Edward Lewis, US  David Lawrence, US Dileepa Lathsara, LK Jorge Etges, BR  Kristian Ørmen, DK Ralf Weber, DE  João Luis Silva Damas, PT Masato Minda, JP  Warren Kumari, US  Subramanian Moonesamy, MU
DNSSEC Status 2010 Signed root published 15 July, 2010 51 TLDs: asia. be. bg. biz. br. bz. cat. ch. cz. dk. edu. eu. fi. Fr. gi. gov. hn. in. info. lc. li. lk. mn. museum. na. nl. nu. org. pm. pr. pt. re. sc. se. tf. th. tm. uk. us. yt.  8 out of 16 gTLD registries are signed or in the process to be signed.  (e.g. .net 2010, .com 2011) Biggest change to Internet in 20+ years Security applications built on DNSSEC 29
30 ICANN’s HSM Crypto requirements:  ,[object Object]
Highest level of security (FIPS 140-2 Level 4) required
Never been compromised
High quality RNG
Keys can be backed up
Track record and customer credibility

More Related Content

Viewers also liked

DNSSEC - Domain Name System Security Extensions
DNSSEC - Domain Name System Security ExtensionsDNSSEC - Domain Name System Security Extensions
DNSSEC - Domain Name System Security ExtensionsPeter R. Egli
 
DNSSEC: What a Registrar Needs to Know
DNSSEC:  What a Registrar Needs to KnowDNSSEC:  What a Registrar Needs to Know
DNSSEC: What a Registrar Needs to Knowlaurenrprice
 
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Dan York
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC PilotShumon Huque
 
CNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondCNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondSam Bowne
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECShumon Huque
 

Viewers also liked (11)

ION Toronto - Why Implement DNSSEC?
ION Toronto - Why Implement DNSSEC? ION Toronto - Why Implement DNSSEC?
ION Toronto - Why Implement DNSSEC?
 
DNSSEC FIRST
DNSSEC FIRSTDNSSEC FIRST
DNSSEC FIRST
 
DNSSEC - Domain Name System Security Extensions
DNSSEC - Domain Name System Security ExtensionsDNSSEC - Domain Name System Security Extensions
DNSSEC - Domain Name System Security Extensions
 
DNSSEC: What a Registrar Needs to Know
DNSSEC:  What a Registrar Needs to KnowDNSSEC:  What a Registrar Needs to Know
DNSSEC: What a Registrar Needs to Know
 
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC Pilot
 
ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?
 
CNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondCNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyond
 
DNSSEC at Penn
DNSSEC at PennDNSSEC at Penn
DNSSEC at Penn
 
MCSA 70-412 Chapter 01
MCSA 70-412 Chapter 01MCSA 70-412 Chapter 01
MCSA 70-412 Chapter 01
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSEC
 

Similar to AEP Netwrorks Keyper HSM & ICANN DNSSEC

DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSKDefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSKPunky Duero
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]APNIC
 
A modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsAlane Moran
 
How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP VideoVideoguy
 
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdfLilminow
 
DDN and Intel: Partnered for Exascale
DDN and Intel: Partnered for ExascaleDDN and Intel: Partnered for Exascale
DDN and Intel: Partnered for ExascaleIntel IT Center
 
Gathering of State Networks
Gathering of State NetworksGathering of State Networks
Gathering of State NetworksVideoguy
 
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMCómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMMundo Contact
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]APNIC
 
RIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarRIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarMen and Mice
 
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...DevOpsDays Riga
 
PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSECPLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSECPROIDEA
 
F5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructureF5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructureDSorensenCPR
 
Intels presentation at blue line industrial computer seminar
Intels presentation at blue line industrial computer seminarIntels presentation at blue line industrial computer seminar
Intels presentation at blue line industrial computer seminarBlue Line
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...Michelle Holley
 
Rutgers - RUNet Networking Issues
Rutgers - RUNet Networking IssuesRutgers - RUNet Networking Issues
Rutgers - RUNet Networking IssuesMichael Dobe, Ph.D.
 
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Positive Hack Days
 

Similar to AEP Netwrorks Keyper HSM & ICANN DNSSEC (20)

ION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSECION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSEC
 
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSKDefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
 
A modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systems
 
How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP Video
 
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
 
DDN and Intel: Partnered for Exascale
DDN and Intel: Partnered for ExascaleDDN and Intel: Partnered for Exascale
DDN and Intel: Partnered for Exascale
 
Gathering of State Networks
Gathering of State NetworksGathering of State Networks
Gathering of State Networks
 
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMCómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
 
RIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarRIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinar
 
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
 
PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSECPLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSEC
 
F5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructureF5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructure
 
8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 
Intels presentation at blue line industrial computer seminar
Intels presentation at blue line industrial computer seminarIntels presentation at blue line industrial computer seminar
Intels presentation at blue line industrial computer seminar
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
 
Rutgers - RUNet Networking Issues
Rutgers - RUNet Networking IssuesRutgers - RUNet Networking Issues
Rutgers - RUNet Networking Issues
 
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
 

More from Chin Wan Lim

SecureMetric's SecureMAG Volume 8
SecureMetric's SecureMAG Volume 8SecureMetric's SecureMAG Volume 8
SecureMetric's SecureMAG Volume 8Chin Wan Lim
 
Enhancing System Security Using PKI
Enhancing System Security Using PKIEnhancing System Security Using PKI
Enhancing System Security Using PKIChin Wan Lim
 
How To Rob A Bank In The 21st Century - PKI Version
How To Rob A Bank In The 21st Century - PKI VersionHow To Rob A Bank In The 21st Century - PKI Version
How To Rob A Bank In The 21st Century - PKI VersionChin Wan Lim
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7Chin Wan Lim
 
What Miss World 2013 Can Teach A Bank About PKI
What Miss World 2013 Can Teach A Bank About PKIWhat Miss World 2013 Can Teach A Bank About PKI
What Miss World 2013 Can Teach A Bank About PKIChin Wan Lim
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014Chin Wan Lim
 
SecureMAG Vol. 5 2012
SecureMAG Vol. 5 2012SecureMAG Vol. 5 2012
SecureMAG Vol. 5 2012Chin Wan Lim
 
Utilizing PKI to Reduce Risk & Cost
Utilizing PKI to Reduce Risk & CostUtilizing PKI to Reduce Risk & Cost
Utilizing PKI to Reduce Risk & CostChin Wan Lim
 
SecureMetric Newsletter: SecureMag Volume 2
SecureMetric Newsletter: SecureMag Volume 2SecureMetric Newsletter: SecureMag Volume 2
SecureMetric Newsletter: SecureMag Volume 2Chin Wan Lim
 
Future of Public Key Infrastructure
Future of Public Key InfrastructureFuture of Public Key Infrastructure
Future of Public Key InfrastructureChin Wan Lim
 

More from Chin Wan Lim (13)

SecureMetric's SecureMAG Volume 8
SecureMetric's SecureMAG Volume 8SecureMetric's SecureMAG Volume 8
SecureMetric's SecureMAG Volume 8
 
Enhancing System Security Using PKI
Enhancing System Security Using PKIEnhancing System Security Using PKI
Enhancing System Security Using PKI
 
How To Rob A Bank In The 21st Century - PKI Version
How To Rob A Bank In The 21st Century - PKI VersionHow To Rob A Bank In The 21st Century - PKI Version
How To Rob A Bank In The 21st Century - PKI Version
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7
 
What Miss World 2013 Can Teach A Bank About PKI
What Miss World 2013 Can Teach A Bank About PKIWhat Miss World 2013 Can Teach A Bank About PKI
What Miss World 2013 Can Teach A Bank About PKI
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
PKI-In-A-Box
PKI-In-A-BoxPKI-In-A-Box
PKI-In-A-Box
 
SecureMAG Vol. 5 2012
SecureMAG Vol. 5 2012SecureMAG Vol. 5 2012
SecureMAG Vol. 5 2012
 
SecureMAG Vol 4.
SecureMAG Vol 4.SecureMAG Vol 4.
SecureMAG Vol 4.
 
SecureMAG Vol 3
SecureMAG Vol 3SecureMAG Vol 3
SecureMAG Vol 3
 
Utilizing PKI to Reduce Risk & Cost
Utilizing PKI to Reduce Risk & CostUtilizing PKI to Reduce Risk & Cost
Utilizing PKI to Reduce Risk & Cost
 
SecureMetric Newsletter: SecureMag Volume 2
SecureMetric Newsletter: SecureMag Volume 2SecureMetric Newsletter: SecureMag Volume 2
SecureMetric Newsletter: SecureMag Volume 2
 
Future of Public Key Infrastructure
Future of Public Key InfrastructureFuture of Public Key Infrastructure
Future of Public Key Infrastructure
 

Recently uploaded

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Recently uploaded (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

AEP Netwrorks Keyper HSM & ICANN DNSSEC

  • 1. Securing Digital KeysHigh Quality Key GenerationHighest Level Key Protection The Importance of DNSSEC Case Study of ICAAN Root Implementation Fadi Cotran, Ph.D. Director of Technical Business Development May2011
  • 2. Who Are We and What Do We Do? Provide trusted security everywhere and secure data and voice communication regardless of device, environment or location. Deliver proven security architectures to organisations all over the world including governments, enterprises and carriers. 2
  • 3. 3
  • 6. RECENT DNS ATTACKS January 2010, websites of Amazon.com and Walmart.com were brought down due to DNS Attacks. Not talked about much publicly… Their DNS servers were compromised. DNS supplier Neustar - UltraDNS 6
  • 7.
  • 8. EU halts trading after hacking - Sydney Morning Herald
  • 9. Nasdaq acknowledges hit by hackers February 7, 2011 - 12:01AM NYT
  • 10. More than 400 cyber attacks have affected Australian government networks in the past year, figures reveal.
  • 11. And the latest? April 26, 2011: Sony admits that 77 million customer emails and private information compromised on PlayStation worldwide network. Network still out. 25 Million user private information published on the internet. May not be a DNS attack, but… 8
  • 13. Why DNSSEC ? 10 Dan Kaminsky
  • 14. Why DNSSEC ? 2008 Black Hat Conference Dan Kaminsky demonstrated live how you can exploit a critical flaw in DNS and hijack a website. He is credited for developing DNSSEC as the solution to prevent DNS exploits. The US Government mandated that all Federal websites implement DNSSEC by end of 2009. 11
  • 15. 12
  • 16. What are DNSSEC benefits? DNS lookup can be modified in transit to redirect an end user to an imposter or malicious site for password collection. Modification attacks carried out en masse at ISP/enterprise = cache poisoning. A lookup secured with DNSSEC is protected against modification = primary benefit. Greatest benefits may be yet to come. Why not securely distribute more than just DNS info? Other keys? Identification info? DNSSEC deployment at root and TLDs set the stage 13
  • 18. July 16, 2010 ICANN goes live with AEP & ISC DNSSEC solution
  • 21. Secure Cage in Datacenter 18
  • 23. 20
  • 24. 21
  • 26.
  • 27. Algorithm / Key Length • Cryptanalysis from NIST: 2048 bit RSA SHA256 http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_PART3_key-management_Dec2009.pdf
  • 28. ICANN PARAMETERS Split KSK and ZSK KSK is 2048-bit RSA Rolled as required RFC 5011 for automatic key rollovers Signatures made using SHA-256 ZSK is 1024-bit RSA Rolled once a quarter (four times per year) Zone signed with NSEC Signatures made using SHA-256 25
  • 29. Crypto Officer (CO) • Have physical keys to safe deposit boxes holding smartcards that activate the HSM • ICANN cannot generate new key or sign ZSK without 3-of-7 COs • Able to travel up to 4 times a year to US.
  • 30. Recovery Key Shareholder (RKSH) • Have smartcards holding pieces (M-of-N) of the key used to encrypt the KSK inside the HSM • If both key management facilities fall into the ocean, 5- of-7 RKSH smartcards and an encrypted KSK smartcard can reconstitute KSK in a new HSM • Backup KSK encrypted on smartcard held by ICANN • Able to travel on relatively short notice to US. Hopefully never. Annual inventory.
  • 31. CO CO BCK RKSH Bevil Wooding, TT Dan Kaminsky, US Jiankang Yao, CN Moussa Guebre, BF Norm Ritchie, CA Ondřej Surý, CZ Christopher Griffiths, US Fabian Arbogast, TZ Alain Aina, BJ Anne-Marie EklundLöwinder, SE FredericoNeves, BR GaurabUpadhaya, NP Olaf Kolkman, NL John Curran, US Nicolas Antoniello, UY Rudolph Daniel, UK Sarmad Hussain, PK Paul Kane, UK Robert Seastrom, US Vinton Cerf, US Ólafur Guðmundsson, IS BCK Andy Linton, NZ Carlos Martinez, UY Dmitry Burkov, RU Edward Lewis, US David Lawrence, US Dileepa Lathsara, LK Jorge Etges, BR Kristian Ørmen, DK Ralf Weber, DE João Luis Silva Damas, PT Masato Minda, JP Warren Kumari, US Subramanian Moonesamy, MU
  • 32. DNSSEC Status 2010 Signed root published 15 July, 2010 51 TLDs: asia. be. bg. biz. br. bz. cat. ch. cz. dk. edu. eu. fi. Fr. gi. gov. hn. in. info. lc. li. lk. mn. museum. na. nl. nu. org. pm. pr. pt. re. sc. se. tf. th. tm. uk. us. yt. 8 out of 16 gTLD registries are signed or in the process to be signed. (e.g. .net 2010, .com 2011) Biggest change to Internet in 20+ years Security applications built on DNSSEC 29
  • 33.
  • 34. Highest level of security (FIPS 140-2 Level 4) required
  • 37. Keys can be backed up
  • 38. Track record and customer credibility
  • 39.
  • 40. Erase pinhole 10/100 Ethernet V24 compatible diagnostics port 2x16 LCD FIPS 140-2 L4 module inside Status LEDS Key switch Fold up keypad LAN LEDs *10 yr battery life *External PSU *Rack mount option ISO 7816 smart card reader Restart button Keyper Hardware
  • 41. Why Choose AEP Series K HSM? 33
  • 42. Why Choose Series K HSM? 34
  • 43. HA + Disaster Recovery
  • 44. Keyper Enterprise Performance 1200 Signing Transactions per Second (1024-bit RSA) 500 TPS (2048-bit RSA) 100 Million Signing Transactions per Day 42 Million TPD (2048-bit RSA) Clustering up to 16 Load Balanced Keypers 1.6 Billion Signing Transactions per Day 700 Million TPD (2048-bit RSA) Verisign signs 96 Million Domains under .com and 6 Million domains under .net with AEP Keypers. 36
  • 45. Series K Secures Internet DNS Root Zone 37  “Security is a critical factor for ICANN’s DNSSEC deployment, so Keyper and FIPS Level 4 was an easy choice,” – Richard Lamb, ICANN
  • 46. If you want to be as secure as the Root of the Internet, then deploy what ICANN implemented for security, AEP Keyper

Editor's Notes

  1. ICANN: Internet Corporation for Assigned Names and NumbersResponsible for top level domain names (root zone)Another core requirement was access to top-notch engineering support. ICANN/Richard Lamb needed to be sure before deploying an HSM that ICANN completely understood how the technology worked. Support contributions from AEP included advice on security policy, architectural guidance, and providing sample PKCS#11 code that Lamb could modify to meet his requirements. Hands-off maintenance reinforced ICANN’s purchasing decision. Though Lamb evaluated a competitor’s product that was priced lower than AEP Keyper, he passed on it because, “it looked clunky to operate and maintain.” Keyper is simple to deploy and manage, and can be used to completely automate the key generation and rollover process.