+ All Categories
Home > Documents > DNS Security Extensions

DNS Security Extensions

Date post: 19-Mar-2016
Category:
Upload: ciel
View: 33 times
Download: 0 times
Share this document with a friend
Description:
DNS Security Extensions. Presentation to 19th NANOG meeting Albuquerque, NM Edward Lewis [email protected] NAI Labs June 11-13, 2000. Changes are coming to DNS. DNS is undergoing a number of changes DNSSEC - my topic Dynamic Update RFC 2136 (see bibliography for URL) - PowerPoint PPT Presentation
37
Who’s watching your network DNS Security Extensions Presentation to 19th NANOG meeting Albuquerque, NM Edward Lewis [email protected] NAI Labs June 11-13, 2000
Transcript
Page 1: DNS Security Extensions

Who

’s w

atch

ing

your

net

wor

k

DNS SecurityExtensions

Presentation to 19th NANOG meetingAlbuquerque, NM

Edward [email protected]

NAI LabsJune 11-13, 2000

Page 2: DNS Security Extensions

#2 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

Changes are coming to DNS

• DNS is undergoing a number of changes– DNSSEC - my topic– Dynamic Update

• RFC 2136 (see bibliography for URL)– IPv6 - new A6 records and reverse map

• http://www.ietf.org/internet-drafts/draft-ietf-ipngwg-dns-lookups-08.txt

– Various other improvements• EDNS0 - ftp://ftp.isi.edu/in-notes/rfc2671.txt• Software boosts

Page 3: DNS Security Extensions

#3 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

DNSSEC Ingredients

• DNS Security Extensions– KEY and SIG resource records– NXT resource records

• Query-Response Security– TSIG and SIG(0) meta records– TKEY meta record

• Serving Security Data– CERT(ificate) resource record

• Dynamic Update Security– Update authorization

Page 4: DNS Security Extensions

#4 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

Features

• Protection of Internet-scale DNS data transfers– Data is signed using scaleable public keys– Absent data notices (e.g. NXDOMAIN) secured

• Protection of local DNS transfers– Entire message secured (header and data)

• Public Key Infrastructure– Look up keys instead of trusting “what is heard” or

manually entered• Secured dynamic updates to zones

– Authorized changes to zone data can be made

Page 5: DNS Security Extensions

#5 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

Specification, Software Status

• DNSSEC is defined in RFC 2535 & others– IETF proposed standard (proposed,draft,full)– See bibliography for more docs

• Internet Software Consortium’s BIND– Version 8.2 (March 1999) was the beginning

• Not a full implementation of DNSSEC• Current version 8.2.2-P5

– Third Beta of Version 9 has been released• Partial build of what will be the first full

implementation of DNSSEC

Page 6: DNS Security Extensions

#6 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

State of the Protocol

• Work is progressing to refine protocol– IETF WG on DNS Extensions (DNSEXT)– Much work remains to progress to "Full Standard"– Internet Drafts document the work in progress

• Operational experience is very limited– IETF WG on DNS Operations (DNSOP)– Three workshops have been held with BINDv8– “How to operate” and “policy” questions abound

Page 7: DNS Security Extensions

#7 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

Deployment Plans• Major push in Europe

– Three ccTLD's plan to have signed zones by first quarter next year, one as soon as 1/1/2001

– CENTR has a DNSSEC WG in action• Root Servers

– Looking into adoption, sooner rather than later– Need BIND 9 to be out & stable first

• U.S.– Nothing firm, just some "interest"

• Deployment experience is needed to evaluate the current protocol definition

Page 8: DNS Security Extensions

#8 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

DNS Terminology

Secondary

“Other”Server

RecursiveServerCacheCache

Root Server

Secondary

AuthoritativeServerPrimary

Resolver

Name Servers

Thingsto keepin mind

Page 9: DNS Security Extensions

#9 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

DNS RRs and RR sets

• <owner> <ttl> <class> <type> <rdatalen> <rdata>– myname.xy. 14400 IN A 123.123.123.123– myname.xy. 14400 IN A 203.123.245.123

• In DNS today– Records with common owner, type, class are treated

together, but still are singular entities• For DNSSEC

– The RR set is formalized– No longer are records singular, always treated as a set

So, I will be talking about “sets” of data

Thingsto keepin mind

Page 10: DNS Security Extensions

#10 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

Zones vs. Servers

• Zone is an administrative cut of the name space• Name server is a host dispensing information• Relationship

– A zone is served by name servers (1 or more)– A name server may serve many zones (0 or more)– Authoritative servers have the original zone data– Primary master server has the data in a source text file

DNSSEC secures on the basis of zones Query/Response secures between a resolver and a server

– Or, in the case of zone transfers, between two servers

Thingsto keepin mind

Page 11: DNS Security Extensions

#11 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k Cryptography• Symmetric keys (aka shared secret)

– One key, encrypts and decrypts/signs and verifies– Problem: distributing the secret secretly, storing the secret

secretly

• Asymmetric keys (aka public key)– Pair of keys, one encrypts/signs, other decrypts/verifies– Problem: slower than symmetric

• Optimization– Use asymmetric keys to agree upon a symmetric key

• Other issues: patents and export control

Thingsto keepin mind

Page 12: DNS Security Extensions

#12 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

DNS Security Extensions

• Protecting data transfers in which scalability is critical– I.e., inter-server queries

• Resource records introduced– SIG holds a digital signature (asym. keys)– KEY holds a public key– NXT indicates data present and next name

Start of "details"

Page 13: DNS Security Extensions

#13 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

The KEY RR

<o-t-c> KEY 0x4101 3 1 AQOp5t...d68o6r

Flags

Protocol Algorithm(Crypto)

Key bits

Page 14: DNS Security Extensions

#14 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

The SIG RR

<o-t-c> SOA 1 4 600 19990528183511 19990430183511 2094 39.171.199.in-addr.arpa. (sig)

AlgorithmOriginal TTL

Expiration

Start TimeSignerKey Footprintand Domain Name

SignatureType Covered

Label count

Squint

Page 15: DNS Security Extensions

#15 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

The NXT RR

<o-t-c> 1.39.171.199.in-addr.arpa. NS SOA TXT SIG KEY NXT

Next name

Type Bit Map

Page 16: DNS Security Extensions

#16 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

A quirk of NXT

• The NXT record indicates the data sets present at the owner's name

• It also indicates the next name in the zone• There is one NXT for most names, but

delegation names have two– A delegation name appears both above and below

the cut point– One NXT belongs to the "upper" zone– The other to the "lower" zone

• NXT's are not generally "loved"

Page 17: DNS Security Extensions

#17 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

A signed zone, page 1

• This example shows the KEY, SIG, and NXT RRs; Generated by dns_signer dated October 18, 1999$ORIGIN tise.cairn.net.@ 14400 IN SOA test.netsec.tislabs.com. lewis.tislabs.com. 2000020701 1D 1H 1W 4H 14400 IN SIG SOA 3 3 14400 20000306184745 20000207184745 48320 tise.cairn.net. ( AIrF9Hb/BzoZ3xir1K81xLzprIEVBFZLEE6Sqy8HlaU5r3ux VfBbcTA= ) 14400 IN KEY 0x4100 3 3 ( ALb/qZQ/oVHyotuSbBWI1N+OYwRLv5RMc7XXb0wYE/tY02qF Uf+9czS0B7pU2jYppF7RwL8b/OcWG3iAzaztzq6S0ZoQIh8J M5LummzJiNl3aqxDxUZH6pwmPNuiMbGl++2tUks+MAallpUz 4tEJPeBF+Zj8boYwWhQDaV6nwDY6kIrqRqhvAmOZHqtqzFT6 SdA07usEZEzZkXXS6PIg6JcN7mNhUa0qkDSNTIkrHWNCh++G 56dtKNxk4qn3ESreg/S2BRGWQ2/7X0PjMyBkDefvdIsw ) 14400 IN SIG KEY 3 3 14400 20000225145656 20000128145656 48320 tise.cairn.net. ( AKM6fdJmcV3Wec7sYKR5ktX2C3kWTLTcITD4iBP2rJVSF1Kx nsi3bRI= )

...continues on next slide...

Squint

Page 18: DNS Security Extensions

#18 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

A signed zone, page 2@ 14400 IN NS buddy.netsec.tislabs.com. 14400 IN NS active.netsec.tislabs.com. 14400 IN NS test.netsec.tislabs.com. 14400 IN SIG NS 3 3 14400 20000225145656 20000128145656 48320 tise.cairn.net. ( AKqbf3kRV1P63jDVS96dq9dMB/OXjLw0FDtdUuyVIq2Q3Z23Ep5835k= ) 14400 IN NXT active.tise.cairn.net. NS SOA SIG KEY NXT 14400 IN SIG NXT 3 3 14400 20000225145656 20000128145656 48320 tise.cairn.net. ( AHZaL7BjH0l2VULlQJb6gXIsXjRhICsWvMapVfP2qBrGMGYl3c7yIk8= )active 14400 IN CNAME active.netsec.tislabs.com. 14400 IN SIG CNAME 3 4 14400 20000225145656 20000128145656 48320 tise.cairn.net. ( ACqtgIY8TkwTw83rQmt3f0P0x+TmpcCtCz1+EsFmYybcSY0lhP2Nht4= )active 14400 IN NXT amp.tise.cairn.net. CNAME SIG NXT 14400 IN SIG NXT 3 4 14400 20000225145656 20000128145656 48320 tise.cairn.net. ( AC75idNrAm5O1YUS1ZBD9ecDgEDdFWlWN+etN74AqVoDlhtYW8dmWeo= )amp 14400 IN NS test.netsec.tislabs.com. 14400 IN NS active.netsec.tislabs.com. 14400 IN NS buddy.netsec.tislabs.com.amp 14400 IN NXT buddy.tise.cairn.net. NS SIG KEY NXT 14400 IN SIG NXT 3 4 14400 20000225145656 20000128145656 48320 tise.cairn.net. ( ADg3LFw5GvcFHgC7UaCZrK/rn5IVOg8ddTgkWz9PK9Z1KvToQbNZ3NQ= )

....and there's still more to the zone, not shown

Squint

Page 19: DNS Security Extensions

#19 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k DNSSEC Queries

Request A for host.example.xy.

Client Local Name Server Remote Name Serverroot name serverexample.xy. name serverxy. name serverRequest A for host.example.xy.

Request A for host.example.xy.

Request KEY for xy.

Referred to example.xy. server

host.example.xy. A & SIG by example.xy.example.xy. KEY & SIG by xy.

xy. KEY & SIG by root's keyLocal server verifieschain of SIGsusing locally heldroot public key

host.example.xy. A & SIG by example.xy.example.xy. KEY & SIG by xy.

Query- Response Security

DNSSEC Security

Squint

Page 20: DNS Security Extensions

#20 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

Going secure

• Preparation (not necessarily in order)– A "secured" zone begins with an "unsecured" zone– Zone key pair generated and validated by parent– SIG records generated for each set in zone– NXT and SIG(NXT) are generated and added

• Running– Response to query includes the desired set(s), the

SIG (set), and possibly KEY and SIG(KEY)'s that will help the resolver evaluate the answer

– There are many variations on this, this is the general theme

Page 21: DNS Security Extensions

#21 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

Query/Response Security

• Processing power is a greater issue than scalability– This includes lightweight resolver queries to a "preferred"

server– Zone transfers (AXFR)– A basis for securing dynamic update

• (Meta-) Resource records introduced– TSIG/SIG(0)– TKEY

Page 22: DNS Security Extensions

#22 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

TSIG

DNS Header

Question

Answer

Authority

Additional &TSIG data

• A “keyed hash” covering entire DNS message– Uses a shared secret,

shared between resolver and server

• Messages covered – query - response– zone transfer– dynamic updates

DNS’Original Message Format

Page 23: DNS Security Extensions

#23 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

TSIG Notes

• Storage of shared secret is an issue– No problem for named.conf, it can be protected– Problem for resolv.conf– TKEY is a proposed method for creating TSIGs

• Early use of TSIG– Zone transfers– “Special” clients (e.g., DHCP updaters)

• Widespread use later– Once overhead of sharing secrets is reduced

Page 24: DNS Security Extensions

#24 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

TSIG in configuration files

• Primary serveroptions {...;};key "test" {

algorithm hmac-md5;secret "ThePlaceToBe";

};server 10.33.40.35 {

keys {test;};};

• Secondary serveroptions {...;};

key "test" {algorithm hmac-md5;secret "ThePlaceToBe";

};server 10.33.40.46 { keys {test;};};

Page 25: DNS Security Extensions

#25 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

SIG(0)

DNS Header

Question

Answer

Authority

Additional &SIG (0) data

• Functionally equivalent to TSIG– Uses asymmetric keys

instead of shared secret

• Messages covered – query - response– zone transfer– dynamic updates

DNS’Original Message Format

Page 26: DNS Security Extensions

#26 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

SIG (0) Notes

• Defined in RFC 2535 w/KEY, SIG, and NXT– A current Internet Draft fixes the specification

• SIG(0) requires a public key to be in a zone• Suffers performance hit of public key cryptography

– Useful where performance hit isn't as bad as overhead managing shared secrets

• Requires client to have a private key available to the resolver

Page 27: DNS Security Extensions

#27 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

TKEY

DNS Header

Question

Answer

Authority

Additional &TKEY,KEY,...

• Sent in a request to create a TSIG shared secret

• Request is accompanied by a KEY from which to generate the shared secret

• This is an example of the optimization on the "Cryptography" slide (#11)

DNS’Original Message Format

Page 28: DNS Security Extensions

#28 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

TKEY Notes

• TKEY is sent by resolver to set up a TSIG with server– Diffie-Hellman mode– GSSAPI - in Windows 2000– Server or Client assigned (no implementations)

• A TSIG is set up and used in subsequent queries and responses

• Unsigned DH TKEY requests can pose a denial of service threat– Allowing "anonymous" TKEY is dangerous

because of the CPU load induced

Page 29: DNS Security Extensions

#29 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

Security Data Server

• DNS can provide a public, scaleable, redundant mechanism to pass public security data– Certificates & Public Keys

• DNSSEC validation of data has limits– DNSSEC provides that "what you see is what I sent"– DNSSEC does not provide assurance that the

contents were entered correctly• Resource record introduced

– CERT(ificate)

Page 30: DNS Security Extensions

#30 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

The CERT RR

• Certificates are a means to bind a public key to an identity with conditions

• DNS CERT RR’s can store different kinds of certificates (X.509, SPKI, PGP)

• Software to make the RR’s is still lacking

<o-t-c> 3 10000 3 0123456789abcdef...

Key Footprint Key Algorithm CertificateCert Type

Page 31: DNS Security Extensions

#31 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

Securing Dynamic Update

• Still in definition• BINDv9 will implement "Simple Secure Update"

– TSIG or SIG(0) covered messages identify the requestor

– The name server holds an authorization matrix indicating whether the requestor is allowed to make the requested change

– Granularity of the policy is being defined, some defaults are being identified, rest is up to admin

Page 32: DNS Security Extensions

#32 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

Impact

• DNSSEC will increase attention paid to DNS– Data (SIG) "expires" from the authoritative server

• No more "load & forget"– Delegations have a recurring relationship– Administrators have to manage keys

• NOC procedures needed for this– Need more resources (CPU) to run

Start of "wrap-up"

Page 33: DNS Security Extensions

#33 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

Validating Delegations

• Validation of a zone's keys by its parent is important– Provides "proof" of zone delegation– Relationship between delegations be interactive

• Work is progressing on automating this• Will this help keep registry info current?

Page 34: DNS Security Extensions

#34 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

Off-line Signing

Key Generator&

Zone Signer

Air Gapor

Firewall

DNSServer(s)

Company/PublicNetwork

Admin/ProtectedNetwork

Reason: Protect the Private Key(s)Secure Dynamic Update complicates this

Issue: Will this be done?

The DNSSEC specification refers to "off-line signing"

Page 35: DNS Security Extensions

#35 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

Performance Hits

• Resource consumption– Increase data held and transferred– Increase in use of TCP– Increase in CPU cycles

• Verifying keys (up to the root) will require more queries– Requires a lot of computation, message latency

Page 36: DNS Security Extensions

#36 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

Bibliography - IETF Documents• IETF Standards Documents

– RFC 2535-2539 and 2541• http://www.ietf.org/rfc/rfc2535.txt and others• http://www.ietf.org/rfc/rfc2136.txt -- Dynamic Update• ftp://ftp.isi.edu/in-notes/rfc2845.txt -- TSIG

– DNSEXT, DNSOP WG pages• http://www.ietf.org/html.charters/dnsext-charter.html• http://www.ietf.org/html.charters/dnsop-charter.html

– Internet Drafts (relevant to DNS security)• TKEY• http://www.ietf.org/internet-drafts/draft-ietf-dnsext-tkey-02.txt

• SIG(0)• http://www.ietf.org/internet-drafts/draft-ietf-dnsext-sig-zero-01.txt

• Simple Secure Update• http://www.ietf.org/internet-drafts/draft-ietf-dnsext-simple-secure-update-00.txt

• Other documents• http://www.ietf.org/internet-drafts/draft-ietf-dnsext-zone-status-01.txt• http://www.ietf.org/internet-drafts/draft-ietf-dnsext-signing-auth-00.txt

Page 37: DNS Security Extensions

#37 11-13 June 2000 [email protected]

Who

’s w

atch

ing

your

net

wor

k

Bibliography - Other Documents• Technical Presentations

– NAI Labs paper• http://www.nai.com/nai_labs/asp_set/network_security/dns_secure_paper.asp

• Some of its references are out of date– NIC-SE Workshop, May, 1999• http://www.nic-se.se/dnssec/– CAIRN Workshop, September, 1999• http://www.cairn.net/DNSSEC/— NLnet Labs• http://www.nlnetlabs.nl./dnssec/

• DNS & BIND– Cricket Liu is working on explaining DNSSEC

• http://www.hp.dk/kursus/dns (in Danish) - PDF files are at the bottom of the page, in English

– BIND• http://www.isc.org/products/BIND/• ftp://ftp.isc.org/isc/bind9/

• URLs checked May. 31, 2000


Recommended