progress of the dns security extensions nanog 22 may 21-22, 2001 edward lewis [email protected]

24
Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis [email protected]

Upload: jeffrey-campbell

Post on 27-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

Progress Of the DNS Security Extensions

NANOG 22May 21-22, 2001

Edward [email protected]

Page 2: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Purpose of this talk DNS Security is a set of extensions to DNS to make

attacking it harder and using it to attack other applications harder

Over the course of the past two years, hands-on workshops have been held to help accelerate standards development

This presentation will cover lessons learned, open issues, and the progress being made

Page 3: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Background DNS Security presentation at NANOG 19

http://www.nanog.org/mtg-0006/lewis.html Workshops are fairly unique in the IETF process

Only one available source of s/w, so no bake-off's Multi-day events in which a mini-DNS world is built

Objective of Workshops Education Testing Specification & Software Examination of inter-administration issues

Page 4: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Recent Workshops APRICOT 2001 - Kuala Lumpur, February 49th IETF - San Diego, December NANOG 20 - Washington, DC, October RIPE 37 - Amsterdam, September 2nd DNSSEC workshop - Vasby (SE), September RSSAC workshop - Pittsburgh, July

Page 5: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Highlights Realization that DNS Security isn't one piece

Components advancing at different rates Some parts are ready to pay off now

Progress is being made on the inter-zone interface Defining this is a prime goal of the workshops Active discussions happening, consensus is forming Good news is the frequency and dispersion of dialog

Page 6: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Workshop Configuration Workshop consists of about a half-dozen

"experts" and about 2 dozen students set up includes an "augmented" DNS root, a

workshop top-level domain, other services (ftp, http) Students set up zones as delegated from a TLD

created for the workshop Students also set up secondary relationships Initial round of keys and signatures, then a key

change

Page 7: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Highlights of Vasby Workshop The second workshop held in Sweden Invitation-only 2-day workshop, very organized,

knowledgeable DNS students Keys were set up, validation done via a

simplistic HTML set-up The workshop keys were changed causing

problems "Lateral" signing requirement formalized

Page 8: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Highlights of NANOG 20 Wkshp One day workshop, with "homework

assignments" Different HTML interface used to exchange keys

Not as successful The interface should not be under estimated

Lateral signing still not implemented

Page 9: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Highlights of 49th IETF Workshop Mixture of IPv6 and DNS Security Trying to teach/understand both concepts in one

event is difficult Impact of DNS Security on A6 chains

multiplied by length of chain Until name server resolvers can handle A6

chains and/or AAAA, IPv6-only infrastructure is not possible

Desire to run a longer-term experiment

Page 10: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Highlight of APRICOT 2001 Wkshp Rapid maturation of TSIG mechanism Re-organization of material into "easy" and "hard"

TSIG easy KEY/SIG hard

Use of TSIG configuration language extended to other services e.g., BIND's remote name server daemon control

(rndc)

Page 11: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Result: Shared secret Clearer TSIG has become mature Zone transfers can be protected Lays the ground work for authorized dynamic update Same language reused to secure non-TSIG

services, e.g., rndc Perhaps time to revisit TKEY and SIG (0) now that

TSIG has come of age

Page 12: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Result: Operational Experience Well, "initial operational experience" More and more operators are now participating Recent discussions have involved a wide

spread of people and organizations still mostly in Europe

Many past decisions are being revisited now that more experts are available

Page 13: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Result: Value of Key Distribution The feature of publishing keys in DNS has

grown in importance Putting application keys in DNS

Could be a big driver behind DNS Security

Page 14: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Result: Better Implementation With each workshop, software bugs have

lessened DNS Security code is still bleeding edge

Specifications aren't always clear and are being reviewed

Page 15: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Issue: Parent holding of signature When a parent zone's key changes, all child

zone key( set)s need to be validated again Parent needs child key sets to do this Parent has to make new signature known

Original thought was to have this happen with the child being responsible for publishing data

But this means child has to be aware of key change - or suffer the consequences

Proposal now to have parent publish data

Page 16: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Issue: Application keys With parent signing and holding keys, what is the

impact on application keys? Some zones use the apex as a host (A record, etc.) IPSEC, SSH, et.al. host keys would be co-located

with the zone keys Should parent zone be signing host key data for child?

Other issues: subtyping, message size

Page 17: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Issue: Persistent Testing vs. Fake Roots

The parent-child interface in DNS Security is evident in time-related SIG RR's One-time set up of KEY's and SIG's is easy, it is the

"roll over" that is the headache The only way to test this is to allow time to pass DNS Security testing has depended on a

workshop root What's the difference between a persistent test root

server and an "alternate" root server

Page 18: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Issue: Another Angle on Persistence

One other need for a persistent test infrastructure Strict "on-tree" zone signing depends on an

entirely available DNS There are proposals to make DNS Security more

robust in the face of downed servers Collaborative signing experiments need time to

develop

Page 19: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Issue: lwresd vs stub-resolver lwresd is a BIND creation, a name server running

locally, replacing the old stub resolver Perhaps lwresd runs as a caching forwarder

How does this impact the use of TSIG to secure queries and responses, as opposed to configuring public keys? Original issue was the protection of the TSIG secret on a

multi-user machine for general lookups /etc/resolv.conf is a natural place for secret, but "world"

readable (using UNIX as an example)

Page 20: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Issue: Multiple Implementations For the DNS Security documents to progress in the

IETF, multiple interoperable implementations are needed

Besides BIND, there are some other implementations in the works Will they implement all of DNS Security? Will they be made available for testing?

Page 21: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Issue: Legal Attention For better or worse, lawyers have taken notice Impact of contract law on key distribution

service Work is bring pioneered in Sweden, with contact

with the Netherlands and Germany Interesting twist

Laws are national things, the Internet is defined across boundaries

IETF avoids technology that is law-specific What is the legal view of a server in .se and a

resolver in .de?

Page 22: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Unstudied How "joint" administrations of a zone will work Issues that are cryptographic in nature

Impacts of key lengths on security Life span of a key

Issue was raised during the RSSAC workshop

Page 23: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Document Status A new round of documents is being prepared

Same standards level A reorganization to include the current base plus the

clarification RFCs

Page 24: Progress Of the DNS Security Extensions NANOG 22 May 21-22, 2001 Edward Lewis lewis@tislabs.com

[email protected]

Current Discussion Forums [email protected]

A mailing list that has been around a while, recently has become quite active

[email protected] [email protected]