SlideShare une entreprise Scribd logo
1  sur  70
Télécharger pour lire hors ligne
Introduction to DNSSEC

DNSSEC Tutorial
Objectives
• Understand DNSSEC terminology
• Understand the threat models that
DNSSEC is intended to address
• Appreciate the benefits of DNSSEC to
sensitive applications
• Understand some of the operational and
legal implications of DNSSEC
DNS Refresher
DNS Overview
• What is the DNS?
• What applications depend on the stable and
secure operation of the DNS?
• What are the implications of a failure in
DNS operations?
As ISP
As ‘friend’
As DNS provider
DNS Architecture
Registry DB
primary
secondary
Cache server
Registrars/
Registrants
client
DNS ProtocolProvisioning
secondary
DNS Data Flow
DNS Vulnerabilities
DNS Vulnerabilities
DNS Vulnerabilities
Registry DB
Server compromise
Registrars
Registrants
DNS ProtocolProvisioning
Inter-server
communication
Cache Poisoning
Cache-Stub resolver
communication
DNS Vulnerabilities
• Cache-poisoning
• DNS interception
• Confidentiality
• Reliability
• Integrity
• Reflection attacks
Which of these
does DNSSEC
address?
Astrophysics
Mail Server
Example:
Unauthorized mail
scanning
DNS
Central Admin
Mail Server
Where?
There!
Subject: tenure
Astrophysics
Mail Server
Example:
Unauthorized mail
scanning
DNS
Central Admin
Mail Server
Where?
Elsewhere
Bad Guy
Subject: tenure
Reflection Attacks
• DNS servers can act as very efficient
packet amplifiers
• Use of UDP, small queries, large
responses
• DNSSEC makes DNS servers better packet
amplifiers
• Still lots of UDP, larger responses
Reliability
• In the grand scheme of things, DNSSEC
does not help make your DNS more
reliable
• in fact it makes the DNS more brittle,
and makes it harder to maintain reliable
service
Confidentiality
• DNSSEC does not address confidentiality
of queries or responses
• anybody who can intercept a secure
response can still see the details
• there is no encryption here
Integrity, Authenticity
• DNSSEC provides a mechanism for data
published in the DNS to carry
cryptographic signatures
• secure responses include signatures
• clients receiving a secure response can
tell whether it is authentic
Benefits of DNSSEC
Why DNSSEC
• Good security is multi-layered
– Multiple defense rings in physical secured systems
– Multiple ‘layers’ in the networking world
•  DNS infrastructure
– Providing DNSSEC to raise the barrier for DNS based
attacks
– Provides a security ‘ring’ around many systems and
applications
DNSSEC secondary
benefits
• DNSSEC provides an “independent” trust path
– The person administering “https” is most probably a
different from person from the one that does “DNSSEC”
– The chains of trust are most probably different
– See acmqueue.org article: “Is Hierarchical Public-Key
Certification the Next Target for Hackers?”
More benefits?
• With reasonable confidence perform opportunistic
key exchanges
– SSHFP and IPSECKEY Resource Records
•  With DNSSEC one could use the DNS for a priori negotiation
of security requirements.
– “You can only access this service over a secure channel”
More benefits?
• DNS-based Authentication of Named Entities WG
http://tools.ietf.org/wg/dane/
Objective:
Specify mechanisms and techniques that allow Internet
applications to establish cryptographically secured
communications by using information distributed through
DNSSEC for discovering and authenticating public keys which
are associated with a service located at a domain name.
Attacks against PKI
Attacks against PKI(cont.)
Benefits to End-Users
• Users who validate will not see answers
from the DNS that fail validation
• might increase helpdesk load, but the
alternative is infected computers, stolen
bank details, etc
• Ongoing work to improve SSL security
using DNSSEC-signed certificates
• IETF “dane” working group
Benefits to Content
Providers
• Reduce the risk that your content is being
intercepted by unknown third parties
• for end-users that validate, at least
• Demonstrate technical proficiency and
security awareness
Three Slides about
Cryptography
Cryptography
• Public Key Cryptography
• X.509, PGP, ssh, DNSSEC
• (Public, Private) Key Pairs
• use the private key to sign data
• use the public key to verify signature
Private Key
• The private key needs to be kept private
and secure
• the degree of security depends on what
the key is used for
• a compromised key means you can no
longer expect people to trust signatures
• a signature from a compromised key is
more dangerous than no signature at all
Public Key
• The public key needs to be widely-
distributed
• it also needs to be accurate
• In DNSSEC, public keys are published as
DNSKEY RRSets in the zone they are used
to sign
• Trust anchors are published in the parent
zone as DS RRSets
DNSSEC Protocol
DNS Considerations
• When using the DNS to distribute keys, we
need to remember a few things
• the DNS is widely-distributed
• information does not update
instantaneously
• we need to think hard about TTLs and
caches when constructing a suitable
policy
Public Keys in the DNS
• In DNSSEC, we distribute public keys in
the DNS itself
• use the DNSKEY RRSet
• supports different key sizes,
cryptographic algorithms
RR Signing in DNSSEC
• Each Resource Record Set (RRSet) can
carry zero or more signatures
• signatures appear in an RRSIG RRSet
with the same owner name
• signatures have an inception and expiry
time
• we need to re-sign regularly
Chain of Trust
• If we can trust the public key which
corresponds to the private key that made a
signature, we can trust a signature
• If we can trust a signature, we can trust the
data that is signed
• How do we trust the public key?
Delegation Signer
• DS is the Delegation Signer Resource
Record
• it carries a hash of a public key
• it is signed
• this is how we extend trust across
delegations
Chain of Trust
RRSet
RRSIG(RRSet)
DNSKEY
DS
RRSIG(DS)
DNSKEY
Parent Zone Child Zone
Chain of Trust
Root ORG ISOC.ORG
Root Anchor
• At some point a validator needs to install a
trust anchor into its software
• root zone trust anchor
• http://www.iana.org/dnssec/
Two DNSKEY RRSets
• Common practice in 2010 is to use two
different DNSKEY RRSets per zone
• ZSK – Zone Signing Key
• used to sign the data in the zone
• KSK – Key Signing Key
• used to sign the DNSKEY RRSet
ZSK
• Since we need to re-sign the zone
regularly, the ZSK needs to be on-line
• The ZSK is the key that is used most often
by validators, so we can make it smaller
and save some CPU
• We can change the ZSK we are using
regularly without involving others
KSK
• The KSK is the key that corresponds to the
DS record in our parent zone
• We need to use the KSK to sign the ZSK,
and then we can put it away in a safe place
• no need to keep the KSK on-line
• changing the KSK involves talking to our
parent (update DS record)
KSK and ZSK
Child Zone
DNSKEY(KSK)
DNSKEY(ZSK)
RRSIG(DNSKEY)
RRSIG(DNSKEY)
RRSIG(RRSet)
RRSet
Parent Zone
DNSKEY(KSK)
DNSKEY(ZSK)
RRSIG(DNSKEY)
RRSIG(DNSKEY)
RRSIG(DS)
DS
DNS Transport
• Plain old DNS was optimised to work over
UDP with small packets (512 bytes)
• fall-back to TCP
• Modern DNS supports larger messages
over UDP (EDNS0, RFC 2671)
• DNSSEC means larger DNS messages
• beware of faulty assumptions in firewalls!
• Cisco PIXes and ASA can still cause
problems with ”fixup”
Signing Things that Are
Not There
• Verifiable deniability of existence
• you can’t sign something that’s not there
• use NSEC or NSEC3 records to cover
the gaps
• sign the NSEC and NSEC3 records
• More on this later...
DNSSEC for ISPs
Validate
• The most effective step you can take to
encourage DNSSEC uptake as an ISP is to
validate responses
• DNSSEC-signed zones are fairly new, so
expect this to cause some non-zero (but
manageable) amount of helpdesk load
• Comcast is an example of a large ISP (in
the US) who has taken this step
DNSSEC for Registries
and Hosting Providers
Sign your Zones
• All the zones you serve can be signed
• think about key rollover
• think about key compromise scenarios,
and what processes you will follow when
you detect them
• think about how you can detect
compromises, and monitor signatures
Key Management
• need to implement secure key storage,
management procedures
• need to sign your zones
• registries need to accept DS records from
users (how?)
• need to publish DS records to parents
(how?)
NSEC and NSEC3
• If you’re signing a zone, you have to use
one of these. Which one?
• Simple rule of thumb
• if you are happy for anybody in the world
to obtain a copy of your zone, and your
zone is not very big, use NSEC
• if you normally don’t allow (e.g.) zone
transfers to random people, or if you
have a large zone to sign, use NSEC3
Key Management
• DNSSEC has many parameters to consider, including:
• key rollover schedule
• signature duration
• choosing appropriate TTL for the zone data
• key size
• Those will be determined by your policy
• You must determine them for your own organisation,
via a risk and operational assessment
• Don't blindly copy the policies of another orgs!
Key Management
• How do we keep the ZSK secure?
• How do we keep the KSK secure?
• important questions
• no simple answers here
• requires risk analysis, consultation, maybe audit
• again, a matter of policy
• hybrid models possible
• HSM for KSK, software for ZSK
Communication
• Communicate with your customers
• explain benefits/risks of DNSSEC
• Communicate with end-users
• demonstrate how to validate responses
• explain operational changes (firewalls,
TCP, response sizes)
Legal Aspects
Legal Aspects
• Deployment of DNSSEC involves trust in
procedures and policies
• otherwise why trust signatures?
• DNSSEC Policy and Practice Statement
(DPS)
• a public attestation of procedures and
policies
• can be used as the basis for audits
Migration Strategies for
Registries and DNS
Hosting Companies
Migration
• For registries and hosting providers,
DNSSEC can be deployed without radically
changing your existing systems
• registries will need to deploy a means of
publishing trust anchors as DS RRSets,
however
Streamlined Operations
• Remember, DNSSEC makes you zones
more brittle and fragile than they were
before
• need to have excellent reliability in
registry and DNS operations (verification
of output, monitoring, etc...)
• need to have emergency procedures to
update DS RRSets in your zones
Resources
Open-Source Software
• NSD
• http://www.nlnetlabs.nl/
• BIND9
• http://www.isc.org/
• Unbound
• http://www.unbound.net/
• OpenDNSSEC
• http://www.opendnssec.org/
Mailing Lists
• dnssec-deployment mailing list
• http://www.dnssec-deployment.org/
• dns-operations mailing list
• http://www.dns-oarc.net/
• Ongoing protocol work
• IETF dnsop, dnsext working groups
Other ressources
• DNS visualization tool
http://dnsviz.net
• DNSSEC AFRICA
http://dnssec-africa.org
DPS
•  http://tools.ietf.org/html/rfc6841
• DPS for the Root Zone KSK Operator
•  https://www.iana.org/dnssec/
• Also review published DPS documents
from TLDs who have already deployed
DNSSEC
DPS
• .SE's DNSSEC Practice Statement
• www.iis.se/docs/se-dnssec-dps-eng.pdf
• .CL's DNSSEC Practice Statement
• http://www.nic.cl/dnssec/en/dps.html
• .NET DNSSEC Practice Statement
• http://www.verisigninc.com/assets/
20100925-NET+DPS-FINAL.pdf
Deployment
• Root zone was signed in July 2010
• Many TLDs are currently signed
• ARPA, BE, BG, BIZ, BR, CAT, CH, CL, CZ,
DK, EDU, EU, FI, FR, GOV, INFO, KG, LI,
LK, MUSEUM, NA, NL, NU, ORG, PM, PR,
PT, RE, SE, TF, TH, TM, UK,
US,UG,TZ,GN ...
• http://stats.research.icann.org/dnssec/
DNSSEC Adoption
70
www.ohmo.to/dnssec/maps Seen today

Contenu connexe

Tendances (20)

Dns 2
Dns 2Dns 2
Dns 2
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
DNS Record
DNS RecordDNS Record
DNS Record
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
 
Log Files
Log FilesLog Files
Log Files
 
Security of DNS
Security of DNSSecurity of DNS
Security of DNS
 
Dns
DnsDns
Dns
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM i
 
AD & LDAP
AD & LDAPAD & LDAP
AD & LDAP
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directory
 
LDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access ProtocolLDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access Protocol
 
active-directory-domain-services
active-directory-domain-servicesactive-directory-domain-services
active-directory-domain-services
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Dns2
Dns2Dns2
Dns2
 
Introduction to Cassandra Architecture
Introduction to Cassandra ArchitectureIntroduction to Cassandra Architecture
Introduction to Cassandra Architecture
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
 
Active Directory Trusts
Active Directory TrustsActive Directory Trusts
Active Directory Trusts
 
Best Practices for Monitoring DNS
Best Practices for Monitoring DNSBest Practices for Monitoring DNS
Best Practices for Monitoring DNS
 
No SQL- The Future Of Data Storage
No SQL- The Future Of Data StorageNo SQL- The Future Of Data Storage
No SQL- The Future Of Data Storage
 
DNS Presentation
DNS PresentationDNS Presentation
DNS Presentation
 

En vedette

20 Tweetable Quotes to Inspire Marketing & Design Creative Genius
20 Tweetable Quotes to Inspire Marketing & Design Creative Genius20 Tweetable Quotes to Inspire Marketing & Design Creative Genius
20 Tweetable Quotes to Inspire Marketing & Design Creative GeniusIMPACT Branding & Design LLC
 
40 Tools in 20 Minutes: Hacking your Marketing Career
40 Tools in 20 Minutes: Hacking your Marketing Career40 Tools in 20 Minutes: Hacking your Marketing Career
40 Tools in 20 Minutes: Hacking your Marketing CareerEric Leist
 
Email Marketing 101: The Welcome Email
Email Marketing 101: The Welcome EmailEmail Marketing 101: The Welcome Email
Email Marketing 101: The Welcome EmailSendGrid
 
Quick & Dirty Tips for : Better PowerPoint Presentations Faster
Quick & Dirty Tips for : Better PowerPoint Presentations FasterQuick & Dirty Tips for : Better PowerPoint Presentations Faster
Quick & Dirty Tips for : Better PowerPoint Presentations FasterEugene Cheng
 
What REALLY Differentiates The Best Content Marketers From The Rest
What REALLY Differentiates The Best Content Marketers From The RestWhat REALLY Differentiates The Best Content Marketers From The Rest
What REALLY Differentiates The Best Content Marketers From The RestRoss Simmonds
 
Digital transformation in 50 soundbites
Digital transformation in 50 soundbitesDigital transformation in 50 soundbites
Digital transformation in 50 soundbitesJulie Dodd
 
Create icons in PowerPoint
Create icons in PowerPointCreate icons in PowerPoint
Create icons in PowerPointPresentitude
 
Eco-nomics, The hidden costs of consumption
Eco-nomics, The hidden costs of consumptionEco-nomics, The hidden costs of consumption
Eco-nomics, The hidden costs of consumptionJosh Beatty
 
How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfs
How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfsHow to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfs
How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfsMarketingProfs
 
Social Proof Tips to Boost Landing Page Conversions
Social Proof Tips to Boost Landing Page ConversionsSocial Proof Tips to Boost Landing Page Conversions
Social Proof Tips to Boost Landing Page ConversionsAngie Schottmuller
 
Creating Powerful Customer Experiences
Creating Powerful Customer ExperiencesCreating Powerful Customer Experiences
Creating Powerful Customer ExperiencesDigital Surgeons
 
17 Copywriting Do's and Don'ts: How To Write Persuasive Content
17 Copywriting Do's and Don'ts: How To Write Persuasive Content17 Copywriting Do's and Don'ts: How To Write Persuasive Content
17 Copywriting Do's and Don'ts: How To Write Persuasive ContentHenneke Duistermaat
 
The Sharing Economy
The Sharing EconomyThe Sharing Economy
The Sharing EconomyLoic Le Meur
 
10 Disruptive Quotes for Entrepreneurs
10 Disruptive Quotes for Entrepreneurs10 Disruptive Quotes for Entrepreneurs
10 Disruptive Quotes for EntrepreneursGuy Kawasaki
 
26 Top Crowdfunding Sites (Infographic)
26 Top Crowdfunding Sites (Infographic)26 Top Crowdfunding Sites (Infographic)
26 Top Crowdfunding Sites (Infographic)Wrike
 
How To Assemble a High Converting eBook
How To Assemble a High Converting eBookHow To Assemble a High Converting eBook
How To Assemble a High Converting eBookUberflip
 

En vedette (20)

20 Tweetable Quotes to Inspire Marketing & Design Creative Genius
20 Tweetable Quotes to Inspire Marketing & Design Creative Genius20 Tweetable Quotes to Inspire Marketing & Design Creative Genius
20 Tweetable Quotes to Inspire Marketing & Design Creative Genius
 
2015 Travel Trends
2015 Travel Trends 2015 Travel Trends
2015 Travel Trends
 
Brand New World
Brand New WorldBrand New World
Brand New World
 
40 Tools in 20 Minutes: Hacking your Marketing Career
40 Tools in 20 Minutes: Hacking your Marketing Career40 Tools in 20 Minutes: Hacking your Marketing Career
40 Tools in 20 Minutes: Hacking your Marketing Career
 
Email Marketing 101: The Welcome Email
Email Marketing 101: The Welcome EmailEmail Marketing 101: The Welcome Email
Email Marketing 101: The Welcome Email
 
Quick & Dirty Tips for : Better PowerPoint Presentations Faster
Quick & Dirty Tips for : Better PowerPoint Presentations FasterQuick & Dirty Tips for : Better PowerPoint Presentations Faster
Quick & Dirty Tips for : Better PowerPoint Presentations Faster
 
What REALLY Differentiates The Best Content Marketers From The Rest
What REALLY Differentiates The Best Content Marketers From The RestWhat REALLY Differentiates The Best Content Marketers From The Rest
What REALLY Differentiates The Best Content Marketers From The Rest
 
Digital transformation in 50 soundbites
Digital transformation in 50 soundbitesDigital transformation in 50 soundbites
Digital transformation in 50 soundbites
 
Create icons in PowerPoint
Create icons in PowerPointCreate icons in PowerPoint
Create icons in PowerPoint
 
Eco-nomics, The hidden costs of consumption
Eco-nomics, The hidden costs of consumptionEco-nomics, The hidden costs of consumption
Eco-nomics, The hidden costs of consumption
 
How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfs
How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfsHow to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfs
How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfs
 
Social Proof Tips to Boost Landing Page Conversions
Social Proof Tips to Boost Landing Page ConversionsSocial Proof Tips to Boost Landing Page Conversions
Social Proof Tips to Boost Landing Page Conversions
 
Creating Powerful Customer Experiences
Creating Powerful Customer ExperiencesCreating Powerful Customer Experiences
Creating Powerful Customer Experiences
 
17 Copywriting Do's and Don'ts: How To Write Persuasive Content
17 Copywriting Do's and Don'ts: How To Write Persuasive Content17 Copywriting Do's and Don'ts: How To Write Persuasive Content
17 Copywriting Do's and Don'ts: How To Write Persuasive Content
 
The Sharing Economy
The Sharing EconomyThe Sharing Economy
The Sharing Economy
 
Your Sales Pitch Sucks!
Your Sales Pitch Sucks!Your Sales Pitch Sucks!
Your Sales Pitch Sucks!
 
The Ultimate Freebies Guide for Presentations by @damonify
The Ultimate Freebies Guide for Presentations by @damonifyThe Ultimate Freebies Guide for Presentations by @damonify
The Ultimate Freebies Guide for Presentations by @damonify
 
10 Disruptive Quotes for Entrepreneurs
10 Disruptive Quotes for Entrepreneurs10 Disruptive Quotes for Entrepreneurs
10 Disruptive Quotes for Entrepreneurs
 
26 Top Crowdfunding Sites (Infographic)
26 Top Crowdfunding Sites (Infographic)26 Top Crowdfunding Sites (Infographic)
26 Top Crowdfunding Sites (Infographic)
 
How To Assemble a High Converting eBook
How To Assemble a High Converting eBookHow To Assemble a High Converting eBook
How To Assemble a High Converting eBook
 

Similaire à Introduction DNSSec

RIPE 82: DNS Evolution
RIPE 82: DNS EvolutionRIPE 82: DNS Evolution
RIPE 82: DNS EvolutionAPNIC
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsAPNIC
 
Technical and Business Considerations for DNSSEC Deployment
Technical and Business Considerations for DNSSEC DeploymentTechnical and Business Considerations for DNSSEC Deployment
Technical and Business Considerations for DNSSEC DeploymentAPNIC
 
NZNOG 2020: DOH
NZNOG 2020: DOHNZNOG 2020: DOH
NZNOG 2020: DOHAPNIC
 
NANOG 82: DNS Evolution
NANOG 82: DNS EvolutionNANOG 82: DNS Evolution
NANOG 82: DNS EvolutionAPNIC
 
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
2nd ICANN APAC-TWNIC Engagement Forum: DNS OblivionAPNIC
 
RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?APNIC
 
CNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondCNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondSam Bowne
 
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionCNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionSam Bowne
 
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionCNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionSam Bowne
 
DNS Openness
DNS OpennessDNS Openness
DNS OpennessAPNIC
 
DNSSEC: What a Registrar Needs to Know
DNSSEC:  What a Registrar Needs to KnowDNSSEC:  What a Registrar Needs to Know
DNSSEC: What a Registrar Needs to Knowlaurenrprice
 
NANOG 74: That KSK Roll
NANOG 74: That KSK RollNANOG 74: That KSK Roll
NANOG 74: That KSK RollAPNIC
 
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)Internet Society
 
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)Deploy360 Programme (Internet Society)
 
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
Presentation on 'The Path to Resolverless DNS'  by Geoff HustonPresentation on 'The Path to Resolverless DNS'  by Geoff Huston
Presentation on 'The Path to Resolverless DNS' by Geoff HustonAPNIC
 
23rd PITA AGM and Conference: DNS Security - A holistic view
23rd PITA AGM and Conference: DNS Security - A holistic view 23rd PITA AGM and Conference: DNS Security - A holistic view
23rd PITA AGM and Conference: DNS Security - A holistic view APNIC
 
NANOG 84: DNS Openness
NANOG 84: DNS OpennessNANOG 84: DNS Openness
NANOG 84: DNS OpennessAPNIC
 

Similaire à Introduction DNSSec (20)

RIPE 82: DNS Evolution
RIPE 82: DNS EvolutionRIPE 82: DNS Evolution
RIPE 82: DNS Evolution
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutions
 
Technical and Business Considerations for DNSSEC Deployment
Technical and Business Considerations for DNSSEC DeploymentTechnical and Business Considerations for DNSSEC Deployment
Technical and Business Considerations for DNSSEC Deployment
 
NZNOG 2020: DOH
NZNOG 2020: DOHNZNOG 2020: DOH
NZNOG 2020: DOH
 
NANOG 82: DNS Evolution
NANOG 82: DNS EvolutionNANOG 82: DNS Evolution
NANOG 82: DNS Evolution
 
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
 
RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?
 
CNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondCNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyond
 
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionCNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
 
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionCNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
 
Session 4.1 Roy Arends
Session 4.1 Roy ArendsSession 4.1 Roy Arends
Session 4.1 Roy Arends
 
DNS Openness
DNS OpennessDNS Openness
DNS Openness
 
DNSSEC: What a Registrar Needs to Know
DNSSEC:  What a Registrar Needs to KnowDNSSEC:  What a Registrar Needs to Know
DNSSEC: What a Registrar Needs to Know
 
8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 
NANOG 74: That KSK Roll
NANOG 74: That KSK RollNANOG 74: That KSK Roll
NANOG 74: That KSK Roll
 
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
 
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
 
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
Presentation on 'The Path to Resolverless DNS'  by Geoff HustonPresentation on 'The Path to Resolverless DNS'  by Geoff Huston
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
 
23rd PITA AGM and Conference: DNS Security - A holistic view
23rd PITA AGM and Conference: DNS Security - A holistic view 23rd PITA AGM and Conference: DNS Security - A holistic view
23rd PITA AGM and Conference: DNS Security - A holistic view
 
NANOG 84: DNS Openness
NANOG 84: DNS OpennessNANOG 84: DNS Openness
NANOG 84: DNS Openness
 

Plus de AFRINIC

AIS19 - Policies under discussion
AIS19 - Policies under discussionAIS19 - Policies under discussion
AIS19 - Policies under discussionAFRINIC
 
AIS19 Newcomers Session (EN)
AIS19 Newcomers Session (EN)AIS19 Newcomers Session (EN)
AIS19 Newcomers Session (EN)AFRINIC
 
AFRINIC 101 2017
AFRINIC 101 2017AFRINIC 101 2017
AFRINIC 101 2017AFRINIC
 
AFRINIC 101 2016 (Fr)
AFRINIC 101 2016 (Fr)AFRINIC 101 2016 (Fr)
AFRINIC 101 2016 (Fr)AFRINIC
 
Internet development in Africa: a content use, hosting and distribution persp...
Internet development in Africa: a content use, hosting and distribution persp...Internet development in Africa: a content use, hosting and distribution persp...
Internet development in Africa: a content use, hosting and distribution persp...AFRINIC
 
Insight Into Africa’s Country-level Latencies
Insight Into Africa’s Country-level LatenciesInsight Into Africa’s Country-level Latencies
Insight Into Africa’s Country-level LatenciesAFRINIC
 
Deep Diving into Africa’s Inter-Country Latencies
Deep Diving into Africa’s Inter-Country LatenciesDeep Diving into Africa’s Inter-Country Latencies
Deep Diving into Africa’s Inter-Country LatenciesAFRINIC
 
Studying performance barriers to cloud services in Africa's public sector
Studying performance barriers to cloud services in Africa's public sectorStudying performance barriers to cloud services in Africa's public sector
Studying performance barriers to cloud services in Africa's public sectorAFRINIC
 
Routing security and implications for NRENs
Routing security and implications for NRENsRouting security and implications for NRENs
Routing security and implications for NRENsAFRINIC
 
APRICOT Latency Clustering
APRICOT Latency ClusteringAPRICOT Latency Clustering
APRICOT Latency ClusteringAFRINIC
 
Latency clustering AfPIF2017
Latency clustering AfPIF2017Latency clustering AfPIF2017
Latency clustering AfPIF2017AFRINIC
 
AFRINIC RIA MoU
AFRINIC RIA MoUAFRINIC RIA MoU
AFRINIC RIA MoUAFRINIC
 
DNS Measurements
DNS MeasurementsDNS Measurements
DNS MeasurementsAFRINIC
 
AFRINIC DNSSEC Infrastructure and Signer Migration
AFRINIC DNSSEC Infrastructure and Signer MigrationAFRINIC DNSSEC Infrastructure and Signer Migration
AFRINIC DNSSEC Infrastructure and Signer MigrationAFRINIC
 
Tampering With the Open Internet: Experiences From Africa
Tampering With the Open Internet: Experiences From AfricaTampering With the Open Internet: Experiences From Africa
Tampering With the Open Internet: Experiences From AfricaAFRINIC
 
Assessing Internet Freedom and the Digital Resilience
Assessing Internet Freedom and the Digital ResilienceAssessing Internet Freedom and the Digital Resilience
Assessing Internet Freedom and the Digital ResilienceAFRINIC
 
Measuring quality of Internet links in NRENs
Measuring quality of Internet links in NRENsMeasuring quality of Internet links in NRENs
Measuring quality of Internet links in NRENsAFRINIC
 
State of Internet measurement Infrastructure/tools in Africa
State of Internet measurement Infrastructure/tools in AfricaState of Internet measurement Infrastructure/tools in Africa
State of Internet measurement Infrastructure/tools in AfricaAFRINIC
 
TraceMON - a new RIPE Atlas tool
 TraceMON - a new RIPE Atlas tool TraceMON - a new RIPE Atlas tool
TraceMON - a new RIPE Atlas toolAFRINIC
 
Measuring the complexity of the Internet: indexes and indicators
Measuring the complexity of the Internet: indexes and indicatorsMeasuring the complexity of the Internet: indexes and indicators
Measuring the complexity of the Internet: indexes and indicatorsAFRINIC
 

Plus de AFRINIC (20)

AIS19 - Policies under discussion
AIS19 - Policies under discussionAIS19 - Policies under discussion
AIS19 - Policies under discussion
 
AIS19 Newcomers Session (EN)
AIS19 Newcomers Session (EN)AIS19 Newcomers Session (EN)
AIS19 Newcomers Session (EN)
 
AFRINIC 101 2017
AFRINIC 101 2017AFRINIC 101 2017
AFRINIC 101 2017
 
AFRINIC 101 2016 (Fr)
AFRINIC 101 2016 (Fr)AFRINIC 101 2016 (Fr)
AFRINIC 101 2016 (Fr)
 
Internet development in Africa: a content use, hosting and distribution persp...
Internet development in Africa: a content use, hosting and distribution persp...Internet development in Africa: a content use, hosting and distribution persp...
Internet development in Africa: a content use, hosting and distribution persp...
 
Insight Into Africa’s Country-level Latencies
Insight Into Africa’s Country-level LatenciesInsight Into Africa’s Country-level Latencies
Insight Into Africa’s Country-level Latencies
 
Deep Diving into Africa’s Inter-Country Latencies
Deep Diving into Africa’s Inter-Country LatenciesDeep Diving into Africa’s Inter-Country Latencies
Deep Diving into Africa’s Inter-Country Latencies
 
Studying performance barriers to cloud services in Africa's public sector
Studying performance barriers to cloud services in Africa's public sectorStudying performance barriers to cloud services in Africa's public sector
Studying performance barriers to cloud services in Africa's public sector
 
Routing security and implications for NRENs
Routing security and implications for NRENsRouting security and implications for NRENs
Routing security and implications for NRENs
 
APRICOT Latency Clustering
APRICOT Latency ClusteringAPRICOT Latency Clustering
APRICOT Latency Clustering
 
Latency clustering AfPIF2017
Latency clustering AfPIF2017Latency clustering AfPIF2017
Latency clustering AfPIF2017
 
AFRINIC RIA MoU
AFRINIC RIA MoUAFRINIC RIA MoU
AFRINIC RIA MoU
 
DNS Measurements
DNS MeasurementsDNS Measurements
DNS Measurements
 
AFRINIC DNSSEC Infrastructure and Signer Migration
AFRINIC DNSSEC Infrastructure and Signer MigrationAFRINIC DNSSEC Infrastructure and Signer Migration
AFRINIC DNSSEC Infrastructure and Signer Migration
 
Tampering With the Open Internet: Experiences From Africa
Tampering With the Open Internet: Experiences From AfricaTampering With the Open Internet: Experiences From Africa
Tampering With the Open Internet: Experiences From Africa
 
Assessing Internet Freedom and the Digital Resilience
Assessing Internet Freedom and the Digital ResilienceAssessing Internet Freedom and the Digital Resilience
Assessing Internet Freedom and the Digital Resilience
 
Measuring quality of Internet links in NRENs
Measuring quality of Internet links in NRENsMeasuring quality of Internet links in NRENs
Measuring quality of Internet links in NRENs
 
State of Internet measurement Infrastructure/tools in Africa
State of Internet measurement Infrastructure/tools in AfricaState of Internet measurement Infrastructure/tools in Africa
State of Internet measurement Infrastructure/tools in Africa
 
TraceMON - a new RIPE Atlas tool
 TraceMON - a new RIPE Atlas tool TraceMON - a new RIPE Atlas tool
TraceMON - a new RIPE Atlas tool
 
Measuring the complexity of the Internet: indexes and indicators
Measuring the complexity of the Internet: indexes and indicatorsMeasuring the complexity of the Internet: indexes and indicators
Measuring the complexity of the Internet: indexes and indicators
 

Dernier

Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Onlineanilsa9823
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 

Dernier (20)

Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 

Introduction DNSSec

  • 2. Objectives • Understand DNSSEC terminology • Understand the threat models that DNSSEC is intended to address • Appreciate the benefits of DNSSEC to sensitive applications • Understand some of the operational and legal implications of DNSSEC
  • 4. DNS Overview • What is the DNS? • What applications depend on the stable and secure operation of the DNS? • What are the implications of a failure in DNS operations?
  • 5. As ISP As ‘friend’ As DNS provider DNS Architecture Registry DB primary secondary Cache server Registrars/ Registrants client DNS ProtocolProvisioning secondary
  • 9. DNS Vulnerabilities Registry DB Server compromise Registrars Registrants DNS ProtocolProvisioning Inter-server communication Cache Poisoning Cache-Stub resolver communication
  • 11.
  • 12.
  • 13. Astrophysics Mail Server Example: Unauthorized mail scanning DNS Central Admin Mail Server Where? There! Subject: tenure
  • 14. Astrophysics Mail Server Example: Unauthorized mail scanning DNS Central Admin Mail Server Where? Elsewhere Bad Guy Subject: tenure
  • 15. Reflection Attacks • DNS servers can act as very efficient packet amplifiers • Use of UDP, small queries, large responses • DNSSEC makes DNS servers better packet amplifiers • Still lots of UDP, larger responses
  • 16. Reliability • In the grand scheme of things, DNSSEC does not help make your DNS more reliable • in fact it makes the DNS more brittle, and makes it harder to maintain reliable service
  • 17. Confidentiality • DNSSEC does not address confidentiality of queries or responses • anybody who can intercept a secure response can still see the details • there is no encryption here
  • 18. Integrity, Authenticity • DNSSEC provides a mechanism for data published in the DNS to carry cryptographic signatures • secure responses include signatures • clients receiving a secure response can tell whether it is authentic
  • 20. Why DNSSEC • Good security is multi-layered – Multiple defense rings in physical secured systems – Multiple ‘layers’ in the networking world •  DNS infrastructure – Providing DNSSEC to raise the barrier for DNS based attacks – Provides a security ‘ring’ around many systems and applications
  • 21. DNSSEC secondary benefits • DNSSEC provides an “independent” trust path – The person administering “https” is most probably a different from person from the one that does “DNSSEC” – The chains of trust are most probably different – See acmqueue.org article: “Is Hierarchical Public-Key Certification the Next Target for Hackers?”
  • 22. More benefits? • With reasonable confidence perform opportunistic key exchanges – SSHFP and IPSECKEY Resource Records •  With DNSSEC one could use the DNS for a priori negotiation of security requirements. – “You can only access this service over a secure channel”
  • 23. More benefits? • DNS-based Authentication of Named Entities WG http://tools.ietf.org/wg/dane/ Objective: Specify mechanisms and techniques that allow Internet applications to establish cryptographically secured communications by using information distributed through DNSSEC for discovering and authenticating public keys which are associated with a service located at a domain name.
  • 26. Benefits to End-Users • Users who validate will not see answers from the DNS that fail validation • might increase helpdesk load, but the alternative is infected computers, stolen bank details, etc • Ongoing work to improve SSL security using DNSSEC-signed certificates • IETF “dane” working group
  • 27. Benefits to Content Providers • Reduce the risk that your content is being intercepted by unknown third parties • for end-users that validate, at least • Demonstrate technical proficiency and security awareness
  • 29. Cryptography • Public Key Cryptography • X.509, PGP, ssh, DNSSEC • (Public, Private) Key Pairs • use the private key to sign data • use the public key to verify signature
  • 30. Private Key • The private key needs to be kept private and secure • the degree of security depends on what the key is used for • a compromised key means you can no longer expect people to trust signatures • a signature from a compromised key is more dangerous than no signature at all
  • 31. Public Key • The public key needs to be widely- distributed • it also needs to be accurate • In DNSSEC, public keys are published as DNSKEY RRSets in the zone they are used to sign • Trust anchors are published in the parent zone as DS RRSets
  • 33. DNS Considerations • When using the DNS to distribute keys, we need to remember a few things • the DNS is widely-distributed • information does not update instantaneously • we need to think hard about TTLs and caches when constructing a suitable policy
  • 34. Public Keys in the DNS • In DNSSEC, we distribute public keys in the DNS itself • use the DNSKEY RRSet • supports different key sizes, cryptographic algorithms
  • 35. RR Signing in DNSSEC • Each Resource Record Set (RRSet) can carry zero or more signatures • signatures appear in an RRSIG RRSet with the same owner name • signatures have an inception and expiry time • we need to re-sign regularly
  • 36. Chain of Trust • If we can trust the public key which corresponds to the private key that made a signature, we can trust a signature • If we can trust a signature, we can trust the data that is signed • How do we trust the public key?
  • 37. Delegation Signer • DS is the Delegation Signer Resource Record • it carries a hash of a public key • it is signed • this is how we extend trust across delegations
  • 39. Chain of Trust Root ORG ISOC.ORG
  • 40. Root Anchor • At some point a validator needs to install a trust anchor into its software • root zone trust anchor • http://www.iana.org/dnssec/
  • 41. Two DNSKEY RRSets • Common practice in 2010 is to use two different DNSKEY RRSets per zone • ZSK – Zone Signing Key • used to sign the data in the zone • KSK – Key Signing Key • used to sign the DNSKEY RRSet
  • 42. ZSK • Since we need to re-sign the zone regularly, the ZSK needs to be on-line • The ZSK is the key that is used most often by validators, so we can make it smaller and save some CPU • We can change the ZSK we are using regularly without involving others
  • 43. KSK • The KSK is the key that corresponds to the DS record in our parent zone • We need to use the KSK to sign the ZSK, and then we can put it away in a safe place • no need to keep the KSK on-line • changing the KSK involves talking to our parent (update DS record)
  • 44. KSK and ZSK Child Zone DNSKEY(KSK) DNSKEY(ZSK) RRSIG(DNSKEY) RRSIG(DNSKEY) RRSIG(RRSet) RRSet Parent Zone DNSKEY(KSK) DNSKEY(ZSK) RRSIG(DNSKEY) RRSIG(DNSKEY) RRSIG(DS) DS
  • 45. DNS Transport • Plain old DNS was optimised to work over UDP with small packets (512 bytes) • fall-back to TCP • Modern DNS supports larger messages over UDP (EDNS0, RFC 2671) • DNSSEC means larger DNS messages • beware of faulty assumptions in firewalls! • Cisco PIXes and ASA can still cause problems with ”fixup”
  • 46. Signing Things that Are Not There • Verifiable deniability of existence • you can’t sign something that’s not there • use NSEC or NSEC3 records to cover the gaps • sign the NSEC and NSEC3 records • More on this later...
  • 48. Validate • The most effective step you can take to encourage DNSSEC uptake as an ISP is to validate responses • DNSSEC-signed zones are fairly new, so expect this to cause some non-zero (but manageable) amount of helpdesk load • Comcast is an example of a large ISP (in the US) who has taken this step
  • 49. DNSSEC for Registries and Hosting Providers
  • 50. Sign your Zones • All the zones you serve can be signed • think about key rollover • think about key compromise scenarios, and what processes you will follow when you detect them • think about how you can detect compromises, and monitor signatures
  • 51. Key Management • need to implement secure key storage, management procedures • need to sign your zones • registries need to accept DS records from users (how?) • need to publish DS records to parents (how?)
  • 52. NSEC and NSEC3 • If you’re signing a zone, you have to use one of these. Which one? • Simple rule of thumb • if you are happy for anybody in the world to obtain a copy of your zone, and your zone is not very big, use NSEC • if you normally don’t allow (e.g.) zone transfers to random people, or if you have a large zone to sign, use NSEC3
  • 53. Key Management • DNSSEC has many parameters to consider, including: • key rollover schedule • signature duration • choosing appropriate TTL for the zone data • key size • Those will be determined by your policy • You must determine them for your own organisation, via a risk and operational assessment • Don't blindly copy the policies of another orgs!
  • 54. Key Management • How do we keep the ZSK secure? • How do we keep the KSK secure? • important questions • no simple answers here • requires risk analysis, consultation, maybe audit • again, a matter of policy • hybrid models possible • HSM for KSK, software for ZSK
  • 55. Communication • Communicate with your customers • explain benefits/risks of DNSSEC • Communicate with end-users • demonstrate how to validate responses • explain operational changes (firewalls, TCP, response sizes)
  • 57. Legal Aspects • Deployment of DNSSEC involves trust in procedures and policies • otherwise why trust signatures? • DNSSEC Policy and Practice Statement (DPS) • a public attestation of procedures and policies • can be used as the basis for audits
  • 58. Migration Strategies for Registries and DNS Hosting Companies
  • 59. Migration • For registries and hosting providers, DNSSEC can be deployed without radically changing your existing systems • registries will need to deploy a means of publishing trust anchors as DS RRSets, however
  • 60.
  • 61.
  • 62. Streamlined Operations • Remember, DNSSEC makes you zones more brittle and fragile than they were before • need to have excellent reliability in registry and DNS operations (verification of output, monitoring, etc...) • need to have emergency procedures to update DS RRSets in your zones
  • 65. Mailing Lists • dnssec-deployment mailing list • http://www.dnssec-deployment.org/ • dns-operations mailing list • http://www.dns-oarc.net/ • Ongoing protocol work • IETF dnsop, dnsext working groups
  • 66. Other ressources • DNS visualization tool http://dnsviz.net • DNSSEC AFRICA http://dnssec-africa.org
  • 67. DPS •  http://tools.ietf.org/html/rfc6841 • DPS for the Root Zone KSK Operator •  https://www.iana.org/dnssec/ • Also review published DPS documents from TLDs who have already deployed DNSSEC
  • 68. DPS • .SE's DNSSEC Practice Statement • www.iis.se/docs/se-dnssec-dps-eng.pdf • .CL's DNSSEC Practice Statement • http://www.nic.cl/dnssec/en/dps.html • .NET DNSSEC Practice Statement • http://www.verisigninc.com/assets/ 20100925-NET+DPS-FINAL.pdf
  • 69. Deployment • Root zone was signed in July 2010 • Many TLDs are currently signed • ARPA, BE, BG, BIZ, BR, CAT, CH, CL, CZ, DK, EDU, EU, FI, FR, GOV, INFO, KG, LI, LK, MUSEUM, NA, NL, NU, ORG, PM, PR, PT, RE, SE, TF, TH, TM, UK, US,UG,TZ,GN ... • http://stats.research.icann.org/dnssec/