ICANN Talk - State of Global DNSSEC

Transcription

ICANN Talk - State of Global DNSSEC
DNSSECUpdate
SANOG27
Kathmandu,Nepal
January2016
Richard.Lamb@icann.org
DNSBasics
• DNSconvertsnames(www.nepalbank.com.np)
tonumbers(198.1.112.132)
• ..toidentifyservicessuchaswwwande-mail
• ..thatidentifyandlinkcustomerstobusiness
andvisaversa
+1-202-709-5262
VoIP
US-NSTICeffort
DNSisapartofallITecosystems
(muchmorethanoneexpects)
lamb@xtcn.com
OECSIDeffort
SmartElectricalGrid
mydomainname.com
WhereDNSSECfitsin
• CPUandbandwidthadvancesmakelegacy
DNSvulnerabletoMITMattacks
• DNSSecurityExtensions(DNSSEC)introduces
digitalsignaturesintoDNSto
cryptographicallyprotectcontents
• WithDNSSECfullydeployedabusinesscanbe
sureacustomergetsun-modifieddata(and
visaversa)
TheBad:DNSChanger - ‘Biggest
CybercriminalTakedowninHistory’–
4Mmachines,100countries,$14M
Nov2011http://krebsonsecurity.com/2011/11/malware-click-fraud-kingpins-arrested-in-estonia/
End-2-endDNSSECvalidationwouldhaveavoidedtheproblems
TheInternet’sPhoneBook- Domain
NameSystem(DNS)
DNS
Resolver
www.majorbank.se=?
1.2.3.4
Get page
Login page
www.majorbank.se = 1.2.3.4
DNS
Server
webserver
www @
1.2.3.4
Username / Password
Account Data
ISP
DNS Hierarchy
se
root
com
majorbank.se
www.majorbank.se
Majorbank (Registrant)
CachingResponsesforEfficiency
www.majorbank.se=?
1.2.3.4
Get page
Login page
Username / Password
Account Data
DNS
Resolver
www.majorbank.se = 1.2.3.4
DNS
Server
webserver
www @
1.2.3.4
TheProblem:
DNSCachePoisoningAttack
www.majorbank.se=?
5.6.7.8
Get page
Login page
Username / Password
Error
DNS
Resolver
www.majorbank.se = 1.2.3.4
DNS
Server
Attacker
www.majorbank.se = 5.6.7.8
Attacker
webserver
www @
5.6.7.8
Password database
Argghh!NowallISPcustomersget
senttoattacker.
www.majorbank.se=?
5.6.7.8
Get page
Login page
Username / Password
Error
DNS
Resolver
www.majorbank.se = 1.2.3.4
DNS
Server
Attacker
webserver
www @
5.6.7.8
Password database
SecuringThePhoneBook- DNS
SecurityExtensions(DNSSEC)
www.majorbank.se=?
1.2.3.4
Get page
Login page
Username / Password
Account Data
DNS
Resolver
with
DNSSEC
Attacker’s record does not
validate – drop it
www.majorbank.se = 1.2.3.4
DNS
Server with
DNSSEC
Attacker
www.majorbank.se = 5.6.7.8
webserver
www @
1.2.3.4
Resolveronlycachesvalidatedrecords
www.majorbank.se=?
1.2.3.4
Get page
Login page
Username / Password
Account Data
DNS
Resolver
with
DNSSEC
www.majorbank.se = 1.2.3.4
DNS
Server with
DNSSEC
webserver
www @
1.2.3.4
Securingit
• DNSconvertsnames(www.bncr.fi.cr)to
numbers(201.220.29.26)
• Makesurewegettherightnumbers(DNSSEC)
• Verifytheidentityandencryptdata
TheBad:OtherDNShijacks*
•
•
•
•
•
•
•
•
25Dec2010- Russiane-PaymentGiantChronoPay Hacked
18Dec2009– Twitter– “Iraniancyberarmy”
13Aug2010- Chinesegmail phishingattack
25Dec2010TunisiaDNSHijack
2009-2012google.*
– April282009GooglePuertoRicositesredirectedinDNSattack
– May92009MoroccotemporarilyseizeGoogledomainname
9Sep2011- Diginotar certificatecompromiseforIranianusers
SSL/TLSdoesn'ttellyouifyou'vebeensenttothecorrectsite,itonly
tellsyouiftheDNSmatchesthenameinthecertificate.Unfortunately,
majorityofWebsitecertificatesrelyonDNStovalidateidentity.
DNSisreliedonforunexpectedthingsthoughinsecure.
*ABriefHistoryofDNSHijacking- Google
http://costarica43.icann.org/meetings/sanjose2012/presentation-dns-hijackings-marquis-boire-12mar12-en.pdf
TheBusinessCaseforDNSSEC
• Cybersecurityisbecomingagreaterconcernto
enterprises,government,andendusers.DNSSEC
isakeytoolanddifferentiator.
• DNSSECisthebiggestsecurityupgradeto
Internetinfrastructureinover20years.Itisa
platformfornewsecurityapplications(forthose
thatseetheopportunity).
• DNSSECinfrastructuredeploymenthasbeenbrisk
butrequiresexpertise.Gettingaheadofthe
curveisacompetitiveadvantage.
DNSSECinterestfromgovernments
• Sweden,Brazil,Netherlands,CzechRepublicand
othersencourageDNSSECdeploymenttovarying
degrees
• Mar2012- AT&T,CenturyLink (Qwest),Comcast,
Cox,Sprint,TimeWarner Cable,andVerizonhave
pledgedtocomplyandabidebyUSFCC[1]
recommendationsthatincludeDNSSEC..“Areportby
Gartnerfound3.6millionAmericansgettingredirectedtobogus
websitesinasingleyear,costingthem$3.2billion.,”[2].
• 2008US.gov mandate.85%operational.[3]
[1]FCC=FederalCommunicationsCommission=UScommunicationsMinistry
[2]http://securitywatch.pcmag.com/security/295722-isps-agree-to-fcc-rules-on-anti-botnet-dnssec-internet-routing
[3]http://www.whitehouse.gov/sites/default/files/omb/memoranda/fy2008/m08-23.pdf
http://fedv6-deployment.antd.nist.gov/snap-all.html
ThankyouGeoffHuston
NL
DNSSEC- Whereweare
•
•
•
•
•
•
•
•
•
Deployedon1034/1205TLDs (23Jan2016.az .in.af .tm.kg.cn
.th .id.lk .se.de.ru .рф .com.uk .nl .fr .in.jp .us.my‫ ﺎﯾﺳﯾﻠﻣ‬.asia
.tw 台灣,.kr 한국 .net,.org,.post,+ntlds,.ibm .berlin)
Rootsigned**andaudited
>85%ofdomainnamescouldhaveDNSSEC
RequiredinnewgTLDs.BasicsupportbyICANNregistrars
GrowingISPsupport*- ~16%endusers“validate”.
3rd partysigningsolutions***
GrowingS/WH/Wsupport:NLNetLabs,ISC,Microsoft,
PowerDNS,Secure64…?openssl,postfix,XMPP,mozilla:early
DANEsupport
IETFstandardonDNSSECTLScertificates(RFC6698)andothers
Growingsupportfrommajorplayers…(AppleiPhone/iPad,
Google8.8.8.8,hostingcoCloudflare DNSSECbydefault,
Germanemailproviders…)
Stats:https://rick.eng.br/dnssecstat/
*COMCAST /w20M and others; mostISPsinSE,CZ.
**Int’l bottom-up trustmodel/w21TCRsfrom:TT,BF,RU,CN,US,SE,NL,UG,BR,Benin,PT, NP,Mauritius, CZ,CA,JP,UK,NZ…
***Partiallistofregistrars:https://www.icann.org/en/news/in-focus/dnssec/deployment
But…
• Butdeployedononly~2%of2nd level
domains.Manyhaveplans.Fewhavetaken
thestep(e.g.,yandex.com,paypal.com*,
comcast.com).
• DNSChanger andotherattackshighlight
today’sneed.(e.g end-2-endDNSSECvalidation
wouldhaveavoidedtheproblems)
• Innovativesecuritysolutions(e.g.,DANE)
highlighttomorrow’svalue.
*http://fedv6-deployment.antd.nist.gov/cgi-bin/generate-com
http://www.thesecuritypractice.com/the_security_practice/2011/12/all-paypal-domains-are-now-using-dnssec.html
http://www.nacion.com/2012-03-15/Tecnologia/Sitios-web-de-bancos-ticos-podran-ser-mas-seguros.aspx
DNSSEC:Sowhat’stheproblem?
• NotenoughITdepartmentsknowaboutitorare
toobusyputtingoutothersecurityfires.
• Whentheydolookintoittheyhearoldstoriesof
FUDandlackofturnkeysolutionsandCDN
support.
• Registrars*/CDNs/DNSprovidersseenodemand
leadingto“chicken-and-egg”problems.
*butrequiredbynewICANNregistraragreement
Who Can Implement DNSSEC
•
•
•
•
•
•
Enterprises – Sign their zones and validate lookups
TLD Operators – Sign the TLD
Domain Name holders – Sign their zones
Internet Service Providers – validate DNS lookups
Hosting Provider – offer signing services to customers
Registrars – accept DNSSEC records (e.g., DS)
Whatyoucando
• ForCompanies:
– Signyourcorporatedomainnames
– JustturnonvalidationoncorporateDNSresolvers
• ForUsers:
– AskISPtoturnonvalidationontheirDNS
resolvers
• ForAll:
– TakeadvantageofICANN,ISOCandother
organizationsofferingDNSSECeducationand
training
DNSSEC:AGlobalPlatformforInnovation
or..
I*$mell opportunity!
GamechangingInternetCore
InfrastructureUpgrade
• “Morehashappenedheretodaythanmeets
theeye.Aninfrastructurehasbeencreated
forahierarchicalsecuritysystem,whichcan
bepurposedandre-purposedinanumberof
differentways...”– VintCerf(June2010)
ForTechiesandotherDreamers
ToomanyCAs.Whichonecanwe
trust?DNSSECtotherescue….
CACertificateroots~1482
Symantec,Thawte,Godaddy
DNSSECroot- 1
InternetofThings
IoT
Contentsecurity
CommercialSSL
Certificatesfor
Webande-mail
DANE andotheryettobe
discoveredsecurity
innovations,enhancements,
andsynergies
https://www.eff.org/observatory
http://royal.pingdom.com/2011/01/12/internet-2010-in-numbers/
Contentsecurity
“FreeSSL”
certificatesforWeb
ande-mailand“trust
agility”DANE
Cryptocurrencies
ande-commerce?
SecuringVoIP
DomainNames
Crossorganizationaland
trans-national
authenticationand
security
E-mailsecuritySMIME,
DKIMRFC4871
Loginsecurity
SSHFPRFC4255
Opportunity:NewSecuritySolutions
•
•
•
•
•
•
•
•
•
•
ImprovedWebSSLandcertificatesforall*
Securede-mail(SMTP+S/MIME)forall*
ValidatedremoteloginSSH,IPSEC*
SecuringVoIP
Crossorganizationalauthentication,security
Securedcontentdelivery (e.g.configurations,updates,
keys)– InternetofThings
SecuringSmartGridefforts
Increasingtrustine-commerce
Securingcryptocurrencies andothernewmodels
FirstglobalFREEPKI
Agoodrefhttp://www.internetsociety.org/deploy360/dnssec/
*IETFstandardscompleteandmorecurrentlybeingdeveloped
Athought:ScalableSecurityforIoT
root
com
google.com
security.co.za
za
DNS is already there
DNSSEC adds security
and crosses
organizational
boundaries.
co.za
electric.co.za
water.rickshome.security.co.za
car.rickshome.iotdevices.co.za
aircond.rickshome.electric.co.za
window.rickshome.security.co.za
meter.rickshome.electric.co.za
door.rickshome.security.co.za
Animatedslide
iotdevices.co.za
thermostat.rickshome.iotdevices.co.za
refrigerator.rickshome.iotdevices.co.za
DNSSEC:Internetinfrastructure
upgradetohelpaddresstoday’s
needsandcreatetomorrow’s
opportunity.
MoreTechiestuff..
Hmm…howdoItrustit?
(transparencytransparency transparency!)
ICANNDNSSECDeployment@Root
• Multi-stakeholder,bottom-uptrustmodel*/w21
cryptoofficersfromaroundtheworld
• BroadcastKeyCeremoniesandpublicdocs
• SysTrust audited
• FIPS140-2level4HSMs
*Managedbytechnicalcommunity+ICANN
RootDPS
DNSSECPracticeStatement
ICANNDNSSECDeployment@Root
(andelsewhere)
FIPS140-2level4
Next..ISO19790
DCID6/9
“SCIF”spec
http://www.flickr.com/photos/kjd/sets/72157624302045698/
Photos:KimDavies
Photos:KimDavies
DNSSEC:Internetinfrastructure
upgradetohelpaddresstoday’s
needsandcreatetomorrow’s
opportunity.
TechDetailsofaDNSSECLookup
TheInternet’sPhoneBook- Domain
NameSystem(DNS+DNSSEC)
www.bank.se=?
1.2.3.4
Get page
Login page
Username / Password
Account Data
bank.seDNSKEY+
RRSIG=?
www.bank.se=? DNS
DNS
Resolver bank.seDNSKEY+
Server
www.bank.se=1.2.3.4
RRSIG=455536
RRSIG=636345
webserver
www @
1.2.3.4
ISP/HotSpot /
Enterprise/End
Node
bank.se (Registrant)
DNS
Server
.se (Registry)
DNS
Server
Details– yuk!
Animatedslide
. (Root)