SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
DANE! 
E-Mail!Transport!Security!done!right 
and!https,!jabber,!PGP,!…! 
! 
Carsten!Strotmann!(Men!&!Mice)! 
Patrick!Koetter!(Sys4) 
1
©!Men!&!Mice!!http://menandmice.com! 
SSL/TLS!world!today 
•a!(too)!large!number!of!certification!authorities! 
•whom!do!you!trust!(ultimately)?! 
•CA!security!can!be!breached! 
•Comodo,!DigiNotar,!GlobalSign!…! 
•False/Fake!certificates!have!been!issued! 
•National!Informatics!Centre!(India),!DigiNotar,!ANSSI!… 
2
TLS!and!E-Mail!Server 
•many!mail-server!try!to!use!TLS!encryption!when! 
sending!data!to!other!mail!servers! 
•no!human!in!reach!to!decide!if!the!certificate!is!not!good! 
•mail!is!send!anyway!(un-authenticated!or!un-encrypted)! 
•DANE!is!about!fixing!this 
©!Men!&!Mice!!http://menandmice.com! 
3
©!Men!&!Mice!!http://menandmice.com! 
TLS!and!SMTP 
4
©!Men!&!Mice!!http://menandmice.com! 
TLS!and!SMTP 
5 
STARTTLS?
©!Men!&!Mice!!http://menandmice.com! 
STARTTLS! STARTTLS? 
TLS!and!SMTP 
6
©!Men!&!Mice!!http://menandmice.com! 
TLS!and!SMTP 
7 
STARTTLS? 
STARTTLS! 
wrong server
©!Men!&!Mice!!http://menandmice.com! 
TLS!and!SMTP 
8 
STARTTLS? 
STARTTLS! 
Men in the 
Middle 
STARTTLS? 
STARTTLS!
©!Men!&!Mice!!http://menandmice.com! 
TLS!and!SMTP 
9 
STARTTLS? 
No! 
Men in the 
Middle 
No! 
STARTTLS?
©!Men!&!Mice!!http://menandmice.com! 
TLS!!=!PGP 
TLS 
PGP 
10
©!Men!&!Mice!!http://menandmice.com! 
TLSA/SMTP 
•Validation!of!TLS!certificates!via!DNS(SEC)! 
•the!hash!of!an!x509!cert!(or!the!full!certificate)! 
stored!in!DNS! 
•proof:!owner!of!the!domain!==!owner!of!the! 
certificate 
11
©!Men!&!Mice!!http://menandmice.com! 
TLSA/SMTP 
•the!security-level!similar!to!domain-validated!x509! 
certificates! 
•TLSA!can!be!used!to!validate!self-signed!certificates! 
•TLSA!can!be!used!to!validate!X509!certificates!from! 
certification!authorities!(Symantec,!Comodo,!StartSSL,! 
CACert!…) 
12
©!Men!&!Mice!!http://menandmice.com! 
TLS!and!SMTP 
13 
STARTTLS? 
STARTTLS! 
SMTP 
MTA 
SMTP 
MTA 
DNS 
TLS cert 
DNS
©!Men!&!Mice!!http://menandmice.com! 
TLS!and!SMTP 
14 
STARTTLS? 
STARTTLS! 
SMTP 
MTA 
SMTP 
MTA 
DNS 
TLS cert 
DNS 
TLSA?
DNS DNS 
©!Men!&!Mice!!http://menandmice.com! 
TLS!and!SMTP 
15 
STARTTLS? 
STARTTLS! 
SMTP 
MTA 
SMTP 
MTA 
TLSA! 
DNSSEC 
check
DNS DNS 
©!Men!&!Mice!!http://menandmice.com! 
TLS!and!SMTP 
16 
STARTTLS! 
STARTTLS! 
SMTP 
MTA 
SMTP 
MTA
DNS DNS 
©!Men!&!Mice!!http://menandmice.com! 
TLS!and!SMTP 
17 
STARTTLS? 
NO! 
Man in the 
Middle 
SMTP 
MTA 
SMTP 
MTA 
TLSA?
DNS DNS 
©!Men!&!Mice!!http://menandmice.com! 
TLS!and!SMTP 
18 
STARTTLS? 
NO! 
Man in the 
Middle 
SMTP 
MTA 
SMTP 
MTA 
TLSA! 
DNSSEC 
check 
ALERT! 
MITM Attack
DNS DNS 
©!Men!&!Mice!!http://menandmice.com! 
TLS!and!SMTP 
19 
STARTTLS? 
STARTTLS! 
SMTP 
MTA 
SMTP 
MTA 
TLSA? 
Spoofed server
DNS DNS 
©!Men!&!Mice!!http://menandmice.com! 
TLS!and!SMTP 
20 
STARTTLS? 
SMTP 
MTA 
SMTP 
MTA 
TLSA! 
DNSSEC 
check 
ALERT! 
wrong 
server! 
STARTTLS! 
Spoofed server
©!Men!&!Mice!!http://menandmice.com! 
Infrastructure!DNS 
•DNSSEC!validation!(caching!DNS!resolver)!! 
•BIND!9,!Unbound,!dnsmasq,!Windows!2012! 
•DNSSEC!signed!zones!(authoritative!DNS!Server)! 
•BIND!9,!NSD,!Knots,!Y.A.D.I.F.A.,!PowerDNS,!Bundy-DNS,! 
[Windows!2012]* 
21 
*!Windows!2012R2!does!not!support!the!TLSA-Record
©!Men!&!Mice!!http://menandmice.com! 
Infrastructure!Mail 
•MTA!(Mailserver)!with!TLSA!Support!! 
•Postfix!2.11,!Exim!(in!development)! 
•TLS!certificates! 
•EV-certificate!(Extended!Validation)! 
•DV-certificate!(Domain!Validation)! 
•Self-signed!certificate 
22
©!Men!&!Mice!!http://menandmice.com! 
BIND!9!DNSSEC 
•enable!DNSSEC!validation: 
options { 
… 
dnssec-validation auto; 
dnssec-lookaside auto; 
}; 
23
manual!TLSA-Record 
•manual!creation!of!a!TLSA!record!hash: 
$ openssl x509 -in mail.example.de.crt -outform DER | openssl sha256 (stdin)= 
8cb0fc6c527506a053f4f14c8464bebbd6dede2738d11468dd953d7d6a3021f1 
•TLSA!record: 
_25._tcp.mail.example.de. 3600 IN TLSA 3 0 1 ( 
©!Men!&!Mice!!http://menandmice.com! 
8cb0fc6c527506a053f4f14c8464bebbd6dede 
2738d11468dd953d7d6a3021f1 ) 
24
TLSA-Record!creation!with!tools 
©!Men!&!Mice!!http://menandmice.com! 
•TLSA!record!using!ldns-dane: 
$ ldns-dane create www.bund.de 443 
_443._tcp.www.bund.de. 3600 IN TLSA 3 0 1 
8f28b062eaa9f917042a63d35d99e017c68d89eaa314c49a3ef94b6e770b0a49 
•test!TLSA!Record!with!ldns-dane: 
$ ldns-dane verify www.bund.de 443 
77.87.229.48 dane-validated successfully 
25
©!Men!&!Mice!!http://menandmice.com! 
test!TLSA-Record 
DNSSEC 
check OK 
shell> dig _25._tcp.mail.example.de. +dnssec +m 
; <<>> DiG 9.9.5 <<>> _25._tcp.mail.example.de TLSA +dnssec +m 
;; global options: +cmd 
;; Got answer: 
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13973 
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0 
26 
;; OPT PSEUDOSECTION: 
; EDNS: version: 0, flags: do; udp: 4096 
;; QUESTION SECTION: 
;_25._tcp.mail.example.de. IN TLSA 
;; ANSWER SECTION: 
_25._tcp.mail.example.de. 3588 IN TLSA 3 1 1 ( 
8cb0fc6c527506a053f4f14c8464bebbd6dede 
2738d11468dd953d7d6a3021f1 ) 
_25._tcp.mail.example.de. 3588 IN RRSIG TLSA 8 5 3600 ( 
20140324063111 20140317121843 4390 example.de. 
RBgAAzQx3gks0KKJHuJ7qKd61jpY8E6dwDM6inPPa6Ee 
xV8OBnAzhF4RMKSabHF0LNwRzWqE5xNfPibMQFDoDRKJ 
/QiNgux/IXti3JqtH4BkT0w7Ooi+8DZsil9BTjg6WkaX 
1FuJ4rJ2r3hXS7eIOFWtOF7pPVPdIIaRB6xp+1A= ) 
;; Query time: 9 msec 
;; SERVER: 127.0.0.1#53(127.0.0.1) 
;; WHEN: Mon Mar 17 19:29:45 CET 2014 
;; MSG SIZE rcvd: 142 
TLSA 
Record 
DNSSEC 
signature
Postfix!configuration 
Postfix!configuration!for!TLSA!validation: 
shell> postconf -e "smtpd_use_tls = yes" 
shell> postconf -e "smtp_dns_support_level = dnssec" 
shell> postconf -e "smtp_tls_security_level = dane" 
©!Men!&!Mice!!http://menandmice.com! 
27
Postfix!log!(untrusted!TLS) 
Postfix!log!TLS!without!DNSSEC!TLSA!validation! 
(DANE): 
Mar 16 19:10:55 m3 postfix/qmgr[25923]: 2B1A680337: from=<root@myinfrastructure.org>, 
size=291, nrcpt=1 (queue active) 
Mar 16 19:11:03 m3 postfix/smtp[25929]: Untrusted TLS connection established to 
mail1.example.de[2001:db8:100::25]:25: TLSv1 with cipher ECDHE-RSA-AES256-SHA 
(256/256 bits) 
Mar 16 19:11:05 m3 postfix/smtp[25929]: 2B1A680337: to=<benutzer@example.de>, 
relay=mail1.example.de[2001:db8:100::25]:25, delay=16, delays=6.2/0.01/7.9/2.1, 
dsn=2.0.0, status=sent (250 2.0.0 Ok: queued as 3fn80C2DP5zTT) 
©!Men!&!Mice!!http://menandmice.com! 
Mar 16 19:11:05 m3 postfix/qmgr[25923]: 2B1A680337: removed 
28
Postfix!log! 
(DNSSEC!secured!TLS) 
Postfix!log!TLS!with!DNSSEC!TLSA!validation! 
(DANE): 
Mar 16 19:20:01 m3 postfix/qmgr[26122]: 8FBEE80337: from=<root@myinfrastructure.org>, 
size=285, nrcpt=1 (queue active) 
Mar 16 19:20:01 m3 postfix/smtp[26131]: Verified TLS connection established to 
mail.example.de[2001:db8:100::25]:25: TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 
bits) 
Mar 16 19:20:03 m3 postfix/smtp[26131]: 8FBEE80337: to=<benutzer@example.de>, 
relay=mail.example.de[2001:db8:100::25]:25, delay=149, delays=147/0.03/0.13/1.8, 
dsn=2.0.0, status=sent (250 2.0.0 Ok: queued as 3fn8BY3ltPzTT) 
©!Men!&!Mice!!http://menandmice.com! 
Mar 16 19:20:03 m3 postfix/qmgr[26122]: 8FBEE80337: removed 
29
©!Men!&!Mice!!http://menandmice.com! 
DANE!TLSA!Benefits 
•authenticated!encrypted!connection!between!SMTP! 
server!!! 
•prevents!STARTTLS!"downgrade"!attacks! 
•secures!against!fake/spoofed!TLS/SSL!certificates! 
•no!CRL/OCSP!required!to!"revoke"!a!certificate!(just! 
replace!the!TLSA!record) 
30
Mail-ISP!deploys!DANE/SMTP 
©!Men!&!Mice!!http://menandmice.com! 
31
©!Men!&!Mice!!http://menandmice.com! 
TLSA-Info!Webseite 
32 
http://tlsa.info
DANE!-!more!than!SMTP 
Prosody!Jabber!Server 
http://bridge.grumpy-troll.org/2014/05/xmpp-dane-with-prosody/ ! 
Gajim!Jabber!Client 
https://github.com/irl/gajim 
©!Men!&!Mice!!http://menandmice.com! 
TLSA!for!HTTPS! 
OPENPGPKEY!—!PGP!keys!in!DNS! 
IPSECKEY!—!IPSEC!keys!in!DNS! 
SSHFP!—!SSH!server!fingerprints! 
S/MIME! 
SRV!—!DNS!Service!Discovery 
33 
Standards 
Implementations
www.dnssec-validator.cz 
©!Men!&!Mice!!http://menandmice.com! 
34
? 
©!Men!&!Mice!!http://menandmice.com! 35
Links!and!additional!information 
©!Men!&!Mice!!http://menandmice.com! 
DNSWorkshop 
http://dnsworkshop.org! 
Postfix!TLS!Readme! 
http://www.postfix.org/TLS_README.html! 
Wietse!Venema!"Postfix!2.11"!FOSDEM!2014! 
Video!-! 
https://fosdem.org/2014/schedule/ 
event/ 
postfix_lessons_learned_and_recent_dev 
elopments/! 
IETF!"DANE"!Workinggroup 
http://datatracker.ietf.org/wg/dane/! 
TLSA!RFC!6698 
http://datatracker.ietf.org/doc/rfc6698/! 
TLSA/SMTP!Draft 
http://datatracker.ietf.org/doc/draft-ietf-dane- 
smtp-with-dane/! 
c't!Magazin!Issue!11/2014!-!Page!194! 
"Geleitschutz"! 
c't!Magazin!Issue!18/2014!-!Page!162ff!"DANE! 
auf!Linux!Servern"!and!"DNSSEC!für!Clients!und! 
Client-Netze!einrichten"! 
TLSA!generator!webpage 
https://www.huque.com/bin/gen_tlsa! 
NLnetLabs!"ldns" 
https://www.nlnetlabs.nl/projects/ 
ldns/! 
"hash-slinger"!von!Paul!Wouters!(Red!Hat)! 
http://people.redhat.com/pwouters/ 
hash-slinger/! 
DNSSEC!Training! 
http://www.menandmice.com/support-training/ 
training/dnssec-workshop/ 
36

Contenu connexe

Tendances

第0回ワススタ!! #wasbookを読もう
第0回ワススタ!! #wasbookを読もう第0回ワススタ!! #wasbookを読もう
第0回ワススタ!! #wasbookを読もうTatsuya Tobioka
 
Буткит через СМС: оценка безопасности сети 4G
Буткит через СМС: оценка безопасности сети 4GБуткит через СМС: оценка безопасности сети 4G
Буткит через СМС: оценка безопасности сети 4GPositive Hack Days
 
Yeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the rootYeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the rootMen and Mice
 
DNSSEC signing Tutorial
DNSSEC signing Tutorial DNSSEC signing Tutorial
DNSSEC signing Tutorial Men and Mice
 
Part 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksPart 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksMen and Mice
 
Introduction to Game Network Programming
Introduction to Game Network ProgrammingIntroduction to Game Network Programming
Introduction to Game Network ProgrammingCorey Clark, Ph.D.
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSMen and Mice
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsMen and Mice
 

Tendances (10)

第0回ワススタ!! #wasbookを読もう
第0回ワススタ!! #wasbookを読もう第0回ワススタ!! #wasbookを読もう
第0回ワススタ!! #wasbookを読もう
 
Буткит через СМС: оценка безопасности сети 4G
Буткит через СМС: оценка безопасности сети 4GБуткит через СМС: оценка безопасности сети 4G
Буткит через СМС: оценка безопасности сети 4G
 
Yeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the rootYeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the root
 
DNSTap Webinar
DNSTap WebinarDNSTap Webinar
DNSTap Webinar
 
DNSSEC signing Tutorial
DNSSEC signing Tutorial DNSSEC signing Tutorial
DNSSEC signing Tutorial
 
I See You
I See YouI See You
I See You
 
Part 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksPart 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows Networks
 
Introduction to Game Network Programming
Introduction to Game Network ProgrammingIntroduction to Game Network Programming
Introduction to Game Network Programming
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing Solutions
 

En vedette

Dns wildcards demystified
Dns wildcards demystifiedDns wildcards demystified
Dns wildcards demystifiedMen and Mice
 
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...Aaron Zauner
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNSMen and Mice
 
Sheepdog内部实现机制
Sheepdog内部实现机制Sheepdog内部实现机制
Sheepdog内部实现机制Liu Yuan
 
Sysdig - Introducing a new definition of Monitoring
Sysdig - Introducing a new definition of MonitoringSysdig - Introducing a new definition of Monitoring
Sysdig - Introducing a new definition of MonitoringRamit Surana
 
Overview of Livestock Judging
Overview of Livestock JudgingOverview of Livestock Judging
Overview of Livestock JudgingCari Rincker
 
Introducing Puppet - The faster speed of Automation
Introducing Puppet - The faster speed of AutomationIntroducing Puppet - The faster speed of Automation
Introducing Puppet - The faster speed of AutomationRamit Surana
 
Exploring Openstack Swift(Object Storage) and Swiftstack
Exploring Openstack Swift(Object Storage) and Swiftstack Exploring Openstack Swift(Object Storage) and Swiftstack
Exploring Openstack Swift(Object Storage) and Swiftstack Ramit Surana
 
Introducing Chef | An IT automation for speed and awesomeness
Introducing Chef | An IT automation for speed and awesomenessIntroducing Chef | An IT automation for speed and awesomeness
Introducing Chef | An IT automation for speed and awesomenessRamit Surana
 
Growth and Development of Craniofacial Complex
Growth and Development of Craniofacial ComplexGrowth and Development of Craniofacial Complex
Growth and Development of Craniofacial ComplexIAU Dent
 

En vedette (20)

Dns wildcards demystified
Dns wildcards demystifiedDns wildcards demystified
Dns wildcards demystified
 
RIPE 68 Webinar
RIPE 68 WebinarRIPE 68 Webinar
RIPE 68 Webinar
 
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
 
Advanced Email
Advanced EmailAdvanced Email
Advanced Email
 
Health
HealthHealth
Health
 
Crabbing in Charleston SC
Crabbing in Charleston SCCrabbing in Charleston SC
Crabbing in Charleston SC
 
Pekingese
PekingesePekingese
Pekingese
 
Kuvasz
KuvaszKuvasz
Kuvasz
 
Adec8446
Adec8446Adec8446
Adec8446
 
Sheepdog内部实现机制
Sheepdog内部实现机制Sheepdog内部实现机制
Sheepdog内部实现机制
 
All Things DNS - DNS on Cloud
All Things DNS - DNS on CloudAll Things DNS - DNS on Cloud
All Things DNS - DNS on Cloud
 
Sysdig - Introducing a new definition of Monitoring
Sysdig - Introducing a new definition of MonitoringSysdig - Introducing a new definition of Monitoring
Sysdig - Introducing a new definition of Monitoring
 
Overview of Livestock Judging
Overview of Livestock JudgingOverview of Livestock Judging
Overview of Livestock Judging
 
Tools and technologies
Tools and technologiesTools and technologies
Tools and technologies
 
Introducing Puppet - The faster speed of Automation
Introducing Puppet - The faster speed of AutomationIntroducing Puppet - The faster speed of Automation
Introducing Puppet - The faster speed of Automation
 
Exploring Openstack Swift(Object Storage) and Swiftstack
Exploring Openstack Swift(Object Storage) and Swiftstack Exploring Openstack Swift(Object Storage) and Swiftstack
Exploring Openstack Swift(Object Storage) and Swiftstack
 
Introducing Chef | An IT automation for speed and awesomeness
Introducing Chef | An IT automation for speed and awesomenessIntroducing Chef | An IT automation for speed and awesomeness
Introducing Chef | An IT automation for speed and awesomeness
 
Growth and Development of Craniofacial Complex
Growth and Development of Craniofacial ComplexGrowth and Development of Craniofacial Complex
Growth and Development of Craniofacial Complex
 
"Água viva"
"Água viva""Água viva"
"Água viva"
 

Similaire à DNSSEC and DANE – E-Mail security reloaded

Dns reflection attacks webinar slides
Dns reflection attacks webinar slidesDns reflection attacks webinar slides
Dns reflection attacks webinar slidesMen and Mice
 
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...CODE BLUE
 
Linux confau 2019: Web Security 2019
Linux confau 2019: Web Security 2019Linux confau 2019: Web Security 2019
Linux confau 2019: Web Security 2019James Bromberger
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECShumon Huque
 
Alfresco Security Best Practices 2014
Alfresco Security Best Practices 2014Alfresco Security Best Practices 2014
Alfresco Security Best Practices 2014Toni de la Fuente
 
PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSECPLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSECPROIDEA
 
Bit_Bucket_x31_Final
Bit_Bucket_x31_FinalBit_Bucket_x31_Final
Bit_Bucket_x31_FinalSam Knutson
 
BSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration Disasters
BSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration DisastersBSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration Disasters
BSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration Disastersinfodox
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)Gabriella Davis
 
Threat stack aws
Threat stack awsThreat stack aws
Threat stack awsJen Andre
 
Fun With SHA2 Certificates
Fun With SHA2 CertificatesFun With SHA2 Certificates
Fun With SHA2 CertificatesGabriella Davis
 
SSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS serverSSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS serverhannob
 
Biting into the forbidden fruit. Lessons from trusting Javascript crypto.
Biting into the forbidden fruit. Lessons from trusting Javascript crypto.Biting into the forbidden fruit. Lessons from trusting Javascript crypto.
Biting into the forbidden fruit. Lessons from trusting Javascript crypto.Krzysztof Kotowicz
 

Similaire à DNSSEC and DANE – E-Mail security reloaded (20)

Dns reflection attacks webinar slides
Dns reflection attacks webinar slidesDns reflection attacks webinar slides
Dns reflection attacks webinar slides
 
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
 
ION Bucharest - DANE-DNSSEC-TLS
ION Bucharest - DANE-DNSSEC-TLSION Bucharest - DANE-DNSSEC-TLS
ION Bucharest - DANE-DNSSEC-TLS
 
ION Bangladesh - DANE, DNSSEC, and TLS Testing in the Go6lab
ION Bangladesh - DANE, DNSSEC, and TLS Testing in the Go6labION Bangladesh - DANE, DNSSEC, and TLS Testing in the Go6lab
ION Bangladesh - DANE, DNSSEC, and TLS Testing in the Go6lab
 
Checksum 101
Checksum 101Checksum 101
Checksum 101
 
Linux confau 2019: Web Security 2019
Linux confau 2019: Web Security 2019Linux confau 2019: Web Security 2019
Linux confau 2019: Web Security 2019
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSEC
 
Cryto Party at CCU
Cryto Party at CCUCryto Party at CCU
Cryto Party at CCU
 
Alfresco Security Best Practices 2014
Alfresco Security Best Practices 2014Alfresco Security Best Practices 2014
Alfresco Security Best Practices 2014
 
PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSECPLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSEC
 
DANE/DNSSEC/TLS Testing in the go6Lab - ION Cape Town
DANE/DNSSEC/TLS Testing in the go6Lab - ION Cape TownDANE/DNSSEC/TLS Testing in the go6Lab - ION Cape Town
DANE/DNSSEC/TLS Testing in the go6Lab - ION Cape Town
 
Bit_Bucket_x31_Final
Bit_Bucket_x31_FinalBit_Bucket_x31_Final
Bit_Bucket_x31_Final
 
BSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration Disasters
BSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration DisastersBSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration Disasters
BSides Edinburgh 2017 - TR-06FAIL and other CPE Configuration Disasters
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
 
ION Santiago - DNSSEC and DANE Based Security for TLS
ION Santiago - DNSSEC and DANE Based Security for TLSION Santiago - DNSSEC and DANE Based Security for TLS
ION Santiago - DNSSEC and DANE Based Security for TLS
 
Threat stack aws
Threat stack awsThreat stack aws
Threat stack aws
 
Fun With SHA2 Certificates
Fun With SHA2 CertificatesFun With SHA2 Certificates
Fun With SHA2 Certificates
 
SSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS serverSSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS server
 
Biting into the forbidden fruit. Lessons from trusting Javascript crypto.
Biting into the forbidden fruit. Lessons from trusting Javascript crypto.Biting into the forbidden fruit. Lessons from trusting Javascript crypto.
Biting into the forbidden fruit. Lessons from trusting Javascript crypto.
 
Part 6 : Internet applications
Part 6 : Internet applicationsPart 6 : Internet applications
Part 6 : Internet applications
 

Plus de Men and Mice

Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network StrategiesCisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network StrategiesMen and Mice
 
Namespaces for Local Networks
Namespaces for Local NetworksNamespaces for Local Networks
Namespaces for Local NetworksMen and Mice
 
How to send DNS over anything encrypted
How to send DNS over anything encryptedHow to send DNS over anything encrypted
How to send DNS over anything encryptedMen and Mice
 
The DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rollsThe DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rollsMen and Mice
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption securityMen and Mice
 
SMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANESMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANEMen and Mice
 
BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practicesMen and Mice
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?Men and Mice
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 WebinarMen and Mice
 
Kea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISCKea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISCMen and Mice
 
RIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarRIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarMen and Mice
 
Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitMen and Mice
 
PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2Men and Mice
 
IETF 93 Review Webinar
IETF 93 Review WebinarIETF 93 Review Webinar
IETF 93 Review WebinarMen and Mice
 
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)Men and Mice
 
IETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANEIETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANEMen and Mice
 

Plus de Men and Mice (17)

Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network StrategiesCisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
 
Namespaces for Local Networks
Namespaces for Local NetworksNamespaces for Local Networks
Namespaces for Local Networks
 
How to send DNS over anything encrypted
How to send DNS over anything encryptedHow to send DNS over anything encrypted
How to send DNS over anything encrypted
 
The DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rollsThe DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rolls
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption security
 
SMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANESMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANE
 
BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practices
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
 
Kea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISCKea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISC
 
RIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarRIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinar
 
Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runit
 
PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2
 
IETF 93 Review Webinar
IETF 93 Review WebinarIETF 93 Review Webinar
IETF 93 Review Webinar
 
IETF 92 Webinar
IETF 92 WebinarIETF 92 Webinar
IETF 92 Webinar
 
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
 
IETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANEIETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANE
 

Dernier

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Dernier (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

DNSSEC and DANE – E-Mail security reloaded