SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
Monitoring DNSSEC, not everything is perfect, yet


                                              St´phane Bortzmeyer
                                                e
                                                    AFNIC
                                              bortzmeyer@nic.fr




                                               SATIN, 4 April 2011




1   Monitoring DNSSEC, not everything is perfect, yet /
DNSSEC shakes monitoring



           1. We all know that a serious DNS zone must be monitored
              continuously and automatically...




2   Monitoring DNSSEC, not everything is perfect, yet /
DNSSEC shakes monitoring



           1. We all know that a serious DNS zone must be monitored
              continuously and automatically...
           2. Many tests were not done before the introduction of
              DNSSEC, for instance a clean path for all sizes of packets (my
              talk at the OARC workshop in Denver),




2   Monitoring DNSSEC, not everything is perfect, yet /
DNSSEC shakes monitoring



           1. We all know that a serious DNS zone must be monitored
              continuously and automatically...
           2. Many tests were not done before the introduction of
              DNSSEC, for instance a clean path for all sizes of packets (my
              talk at the OARC workshop in Denver),
           3. DNSSEC-specific tests are typically far from complete, leading
              to embarassing publications of failures on public mailing lists,




2   Monitoring DNSSEC, not everything is perfect, yet /
DNSSEC shakes monitoring



           1. We all know that a serious DNS zone must be monitored
              continuously and automatically...
           2. Many tests were not done before the introduction of
              DNSSEC, for instance a clean path for all sizes of packets (my
              talk at the OARC workshop in Denver),
           3. DNSSEC-specific tests are typically far from complete, leading
              to embarassing publications of failures on public mailing lists,
           4. Some tests detect failures only when too late (signature
              expiration).




2   Monitoring DNSSEC, not everything is perfect, yet /
Example in .FR




3   Monitoring DNSSEC, not everything is perfect, yet /
Example in .FR



           1. November 2010: key deletion issue, zone no longer signed,
              monitoring did not detect it,




3   Monitoring DNSSEC, not everything is perfect, yet /
Example in .FR



           1. November 2010: key deletion issue, zone no longer signed,
              monitoring did not detect it,
           2. 12 February 2011: “TYPE65534” bug. Invalid signature on a
              NSEC3 record. The monitoring was only done on the apex,
              which was correct. But requests for unsigned sub-domains
              failed.




3   Monitoring DNSSEC, not everything is perfect, yet /
Example in .FR



           1. November 2010: key deletion issue, zone no longer signed,
              monitoring did not detect it,
           2. 12 February 2011: “TYPE65534” bug. Invalid signature on a
              NSEC3 record. The monitoring was only done on the apex,
              which was correct. But requests for unsigned sub-domains
              failed.
           3. 13 March 2011: “Missing signature” bug. The SOA record
              was no longer signed. This time, the monitor detected it
              (good reason to monitor several types).




3   Monitoring DNSSEC, not everything is perfect, yet /
The specific case of key rollovers



        Taboo
        Do we really need to do these complicated rollovers? We break
        many things to solve a security problem which is quite far away.




4   Monitoring DNSSEC, not everything is perfect, yet /
The specific case of key rollovers



        Taboo
        Do we really need to do these complicated rollovers? We break
        many things to solve a security problem which is quite far away.

        Anyway,
        Without caching, key rollovers would be very simple. But without
        caching, would the DNS still work?




4   Monitoring DNSSEC, not everything is perfect, yet /
Rollovers need to be aware of caching

                                          TTL



                                                                                          Time
                                           Period during which
                                      the signature could have been
                                              in some caches




           Signature                                                       It is safe
           published                                                  to remove the key




5   Monitoring DNSSEC, not everything is perfect, yet /
Caching is per set, not per record

                                          TTL



                                                                                        Time
                                          Period during which
                                    and older keyset could have been
                                            in some caches




            Keyset                                                        It is safe
        published with                                                 to use the key
          a new key




6   Monitoring DNSSEC, not everything is perfect, yet /
Time-aware monitoring




        Because of caching, monitoring has to take time into account.
        The monitor needs a memory, to remember what was done and
        when.




7   Monitoring DNSSEC, not everything is perfect, yet /
What do we store




        Everything is obtained from authoritative name servers, for
        freshness.

                Signatures of SOA, NS and DNSKEY (discussion welcome),
                with their TTL,
                Keys,
                Keysets, with their TTL,




8   Monitoring DNSSEC, not everything is perfect, yet /
What do we compute




        This tool focus on one thing: timing in key rollovers. Not a
        substitute for comprehensive monitoring. We check:

           1. That every “potentially in caches” signature has a published
              key,
           2. That every published signature has a key which is in the
              keyset(s) that is(are) in all the caches.




9   Monitoring DNSSEC, not everything is perfect, yet /
Example of signatures




        sqlite> SELECT first_seen,last_seen,ttl FROM Signatures
                  WHERE type=6 AND name=’192.in-addr.arpa.’
                        AND key_tag=20918 ORDER BY last_seen DESC;
        2011-03-28 17:29:30|2011-03-28 20:17:31|86400
        2011-03-28 13:22:23|2011-03-28 16:25:05|86400
        2011-03-28 09:19:59|2011-03-28 12:28:09|86400




10   Monitoring DNSSEC, not everything is perfect, yet /
Example of keysets




        sqlite> SELECT first_seen,last_seen,ttl,id FROM Keysets
                  WHERE name=’192.in-addr.arpa.’ ORDER BY last_seen DESC;
        2011-03-29 09:38:45|2011-03-31 08:30:30|14400|J/dCsFib6kxRer/O/eh1ZbI/Un
        2011-03-21 21:39:09|2011-03-29 08:38:16|14400|NgM4JKT7QacTgX+ZF7bNo2owKj




11   Monitoring DNSSEC, not everything is perfect, yet /
Example of keys




        sqlite> SELECT first_seen,last_seen,key_tag FROM Keys
                  WHERE name=’192.in-addr.arpa.’ ORDER BY last_seen DESC;
        2011-03-01 15:34:17|2011-03-31 08:30:30|39318
        2011-03-21 21:39:09|2011-03-31 08:30:30|60494
        2011-03-01 15:34:17|2011-03-29 08:38:16|20918




12   Monitoring DNSSEC, not everything is perfect, yet /
The observed domains and the results




                54 domains monitored, mostly serious domains (TLD,
                important sub-domains like isoc.org),
                In two months, seven problems detected, including two TLD,
                Six of the problems were a key retired too soon. (Only one
                was a new key used too early.)




13   Monitoring DNSSEC, not everything is perfect, yet /
An example: 192.in-addr.arpa




        % ./examine-history.py 192.in-addr.arpa
        ERROR: signature of zone 192.in-addr.arpa.
                last seen at 2011-03-28 20:17:31 (with a TTL of 86400)
                while the key 20918 was retired at 2011-03-29 09:23:54



        The key was withdrawn 11 hours before it was safe to do so.




14   Monitoring DNSSEC, not everything is perfect, yet /
An exampe: isoc.org

                                      TTL (24 h)



                                                                         Time
                                           Period during which
                                                                         (1st
                                      the signature could have been    and 2nd
                                              in some caches
                                                                      March 2011)

           Last signature with                Key 41414
          41414 done at 21:00               retired at 10:00




15   Monitoring DNSSEC, not everything is perfect, yet /
All the glitches



          Zone                             Date                  Glitch        Window
          isoc.org                       2011-03-29        retired too early    11h
          192.in-addr.arpa               2011-03-28        retired too early    14h
          my                             2011-03-26        retired too early    24h
          bg                             2011-03-19        retired too early    72h
          isoc.org                       2011-03-01        retired too early    11h
          noaa.gov                       2011-02-18         used too early      24h
          noaa.gov                       2011-02-18        retired too early    24h




16   Monitoring DNSSEC, not everything is perfect, yet /
Conclusions




                The tools for key rollovers are not stable yet,
                More monitoring would be a good idea,
                DNSSEC is a sensitive thing: handle with care. Do not put
                into the hands of children.




17   Monitoring DNSSEC, not everything is perfect, yet /

Mais conteúdo relacionado

Destaque

Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Afnic
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolAfnic
 
Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Afnic
 
Best Practices for Monitoring DNS
Best Practices for Monitoring DNSBest Practices for Monitoring DNS
Best Practices for Monitoring DNSThousandEyes
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Afnic
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANEAfnic
 

Destaque (7)

Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocol
 
Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)
 
Best Practices for Monitoring DNS
Best Practices for Monitoring DNSBest Practices for Monitoring DNS
Best Practices for Monitoring DNS
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)
 
Online Tutoring: Going It on Your own or Collaborating
Online Tutoring: Going It on Your own or CollaboratingOnline Tutoring: Going It on Your own or Collaborating
Online Tutoring: Going It on Your own or Collaborating
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
 

Semelhante a DNSSEC Monitoring Reveals Room for Improvement

Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC PilotShumon Huque
 
DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallGlenn McKnight
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC PilotShumon Huque
 
A Definitive Guide to DNS Time To Live
A Definitive Guide to DNS Time To LiveA Definitive Guide to DNS Time To Live
A Definitive Guide to DNS Time To LiveVaronis
 
Testing Rolling Roots
Testing Rolling RootsTesting Rolling Roots
Testing Rolling RootsAPNIC
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsAPNIC
 
CNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondCNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondSam Bowne
 
KiwiCon 2016 - Kicking Orion's Assets
KiwiCon 2016 - Kicking Orion's AssetsKiwiCon 2016 - Kicking Orion's Assets
KiwiCon 2016 - Kicking Orion's AssetsRob Fuller
 
Introduction DNSSec
Introduction DNSSecIntroduction DNSSec
Introduction DNSSecAFRINIC
 
Why Many Websites are still Insecure (and How to Fix Them)
Why Many Websites are still Insecure (and How to Fix Them)Why Many Websites are still Insecure (and How to Fix Them)
Why Many Websites are still Insecure (and How to Fix Them)Cloudflare
 
OSCON 2019 | Time to Think Different
OSCON 2019 | Time to Think DifferentOSCON 2019 | Time to Think Different
OSCON 2019 | Time to Think DifferentNATS
 
Sử dụng TLS đúng cách - Phạm Tùng Dương
Sử dụng TLS đúng cách - Phạm Tùng DươngSử dụng TLS đúng cách - Phạm Tùng Dương
Sử dụng TLS đúng cách - Phạm Tùng DươngSecurity Bootcamp
 
2017 DNSSEC KSK Rollover
2017 DNSSEC KSK Rollover2017 DNSSEC KSK Rollover
2017 DNSSEC KSK RolloverAPNIC
 
NZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSECNZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSECAPNIC
 

Semelhante a DNSSEC Monitoring Reveals Room for Improvement (20)

Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC Pilot
 
ION Bangladesh - DANE, DNSSEC, and TLS Testing in the Go6lab
ION Bangladesh - DANE, DNSSEC, and TLS Testing in the Go6labION Bangladesh - DANE, DNSSEC, and TLS Testing in the Go6lab
ION Bangladesh - DANE, DNSSEC, and TLS Testing in the Go6lab
 
DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael Casadevall
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC Pilot
 
A Definitive Guide to DNS Time To Live
A Definitive Guide to DNS Time To LiveA Definitive Guide to DNS Time To Live
A Definitive Guide to DNS Time To Live
 
Testing Rolling Roots
Testing Rolling RootsTesting Rolling Roots
Testing Rolling Roots
 
Bh eu 05-kaminsky
Bh eu 05-kaminskyBh eu 05-kaminsky
Bh eu 05-kaminsky
 
Bh eu 05-kaminsky
Bh eu 05-kaminskyBh eu 05-kaminsky
Bh eu 05-kaminsky
 
ION Hangzhou - How to Deploy DNSSEC
ION Hangzhou - How to Deploy DNSSECION Hangzhou - How to Deploy DNSSEC
ION Hangzhou - How to Deploy DNSSEC
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutions
 
CNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondCNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyond
 
KiwiCon 2016 - Kicking Orion's Assets
KiwiCon 2016 - Kicking Orion's AssetsKiwiCon 2016 - Kicking Orion's Assets
KiwiCon 2016 - Kicking Orion's Assets
 
Introduction DNSSec
Introduction DNSSecIntroduction DNSSec
Introduction DNSSec
 
Why Many Websites are still Insecure (and How to Fix Them)
Why Many Websites are still Insecure (and How to Fix Them)Why Many Websites are still Insecure (and How to Fix Them)
Why Many Websites are still Insecure (and How to Fix Them)
 
OSCON 2019 | Time to Think Different
OSCON 2019 | Time to Think DifferentOSCON 2019 | Time to Think Different
OSCON 2019 | Time to Think Different
 
Sử dụng TLS đúng cách - Phạm Tùng Dương
Sử dụng TLS đúng cách - Phạm Tùng DươngSử dụng TLS đúng cách - Phạm Tùng Dương
Sử dụng TLS đúng cách - Phạm Tùng Dương
 
DANE/DNSSEC/TLS Testing in the go6Lab - ION Cape Town
DANE/DNSSEC/TLS Testing in the go6Lab - ION Cape TownDANE/DNSSEC/TLS Testing in the go6Lab - ION Cape Town
DANE/DNSSEC/TLS Testing in the go6Lab - ION Cape Town
 
2017 DNSSEC KSK Rollover
2017 DNSSEC KSK Rollover2017 DNSSEC KSK Rollover
2017 DNSSEC KSK Rollover
 
RP11_XaviertTorrentGorjon
RP11_XaviertTorrentGorjonRP11_XaviertTorrentGorjon
RP11_XaviertTorrentGorjon
 
NZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSECNZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSEC
 

Mais de Afnic

Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Afnic
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle Afnic
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frAfnic
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...Afnic
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...Afnic
 
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...Afnic
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetAfnic
 
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetJCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetAfnic
 
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...Afnic
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013Afnic
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...Afnic
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesAfnic
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineAfnic
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Afnic
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic
 
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresSynthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresAfnic
 
Afnic Rapport d'activite 2012
Afnic Rapport d'activite 2012Afnic Rapport d'activite 2012
Afnic Rapport d'activite 2012Afnic
 
Afnic Annual Report 2012
Afnic Annual Report 2012Afnic Annual Report 2012
Afnic Annual Report 2012Afnic
 
Afnic Public Consultation on EXPERTS WIPO ADR overview
Afnic Public Consultation on EXPERTS WIPO ADR overviewAfnic Public Consultation on EXPERTS WIPO ADR overview
Afnic Public Consultation on EXPERTS WIPO ADR overviewAfnic
 
Afnic synthese consultation publique experts PARL OMPI
Afnic synthese consultation publique experts PARL OMPIAfnic synthese consultation publique experts PARL OMPI
Afnic synthese consultation publique experts PARL OMPIAfnic
 

Mais de Afnic (20)

Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .fr
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
 
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
 
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetJCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
 
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain names
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 characters
 
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresSynthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
 
Afnic Rapport d'activite 2012
Afnic Rapport d'activite 2012Afnic Rapport d'activite 2012
Afnic Rapport d'activite 2012
 
Afnic Annual Report 2012
Afnic Annual Report 2012Afnic Annual Report 2012
Afnic Annual Report 2012
 
Afnic Public Consultation on EXPERTS WIPO ADR overview
Afnic Public Consultation on EXPERTS WIPO ADR overviewAfnic Public Consultation on EXPERTS WIPO ADR overview
Afnic Public Consultation on EXPERTS WIPO ADR overview
 
Afnic synthese consultation publique experts PARL OMPI
Afnic synthese consultation publique experts PARL OMPIAfnic synthese consultation publique experts PARL OMPI
Afnic synthese consultation publique experts PARL OMPI
 

DNSSEC Monitoring Reveals Room for Improvement

  • 1. Monitoring DNSSEC, not everything is perfect, yet St´phane Bortzmeyer e AFNIC bortzmeyer@nic.fr SATIN, 4 April 2011 1 Monitoring DNSSEC, not everything is perfect, yet /
  • 2. DNSSEC shakes monitoring 1. We all know that a serious DNS zone must be monitored continuously and automatically... 2 Monitoring DNSSEC, not everything is perfect, yet /
  • 3. DNSSEC shakes monitoring 1. We all know that a serious DNS zone must be monitored continuously and automatically... 2. Many tests were not done before the introduction of DNSSEC, for instance a clean path for all sizes of packets (my talk at the OARC workshop in Denver), 2 Monitoring DNSSEC, not everything is perfect, yet /
  • 4. DNSSEC shakes monitoring 1. We all know that a serious DNS zone must be monitored continuously and automatically... 2. Many tests were not done before the introduction of DNSSEC, for instance a clean path for all sizes of packets (my talk at the OARC workshop in Denver), 3. DNSSEC-specific tests are typically far from complete, leading to embarassing publications of failures on public mailing lists, 2 Monitoring DNSSEC, not everything is perfect, yet /
  • 5. DNSSEC shakes monitoring 1. We all know that a serious DNS zone must be monitored continuously and automatically... 2. Many tests were not done before the introduction of DNSSEC, for instance a clean path for all sizes of packets (my talk at the OARC workshop in Denver), 3. DNSSEC-specific tests are typically far from complete, leading to embarassing publications of failures on public mailing lists, 4. Some tests detect failures only when too late (signature expiration). 2 Monitoring DNSSEC, not everything is perfect, yet /
  • 6. Example in .FR 3 Monitoring DNSSEC, not everything is perfect, yet /
  • 7. Example in .FR 1. November 2010: key deletion issue, zone no longer signed, monitoring did not detect it, 3 Monitoring DNSSEC, not everything is perfect, yet /
  • 8. Example in .FR 1. November 2010: key deletion issue, zone no longer signed, monitoring did not detect it, 2. 12 February 2011: “TYPE65534” bug. Invalid signature on a NSEC3 record. The monitoring was only done on the apex, which was correct. But requests for unsigned sub-domains failed. 3 Monitoring DNSSEC, not everything is perfect, yet /
  • 9. Example in .FR 1. November 2010: key deletion issue, zone no longer signed, monitoring did not detect it, 2. 12 February 2011: “TYPE65534” bug. Invalid signature on a NSEC3 record. The monitoring was only done on the apex, which was correct. But requests for unsigned sub-domains failed. 3. 13 March 2011: “Missing signature” bug. The SOA record was no longer signed. This time, the monitor detected it (good reason to monitor several types). 3 Monitoring DNSSEC, not everything is perfect, yet /
  • 10. The specific case of key rollovers Taboo Do we really need to do these complicated rollovers? We break many things to solve a security problem which is quite far away. 4 Monitoring DNSSEC, not everything is perfect, yet /
  • 11. The specific case of key rollovers Taboo Do we really need to do these complicated rollovers? We break many things to solve a security problem which is quite far away. Anyway, Without caching, key rollovers would be very simple. But without caching, would the DNS still work? 4 Monitoring DNSSEC, not everything is perfect, yet /
  • 12. Rollovers need to be aware of caching TTL Time Period during which the signature could have been in some caches Signature It is safe published to remove the key 5 Monitoring DNSSEC, not everything is perfect, yet /
  • 13. Caching is per set, not per record TTL Time Period during which and older keyset could have been in some caches Keyset It is safe published with to use the key a new key 6 Monitoring DNSSEC, not everything is perfect, yet /
  • 14. Time-aware monitoring Because of caching, monitoring has to take time into account. The monitor needs a memory, to remember what was done and when. 7 Monitoring DNSSEC, not everything is perfect, yet /
  • 15. What do we store Everything is obtained from authoritative name servers, for freshness. Signatures of SOA, NS and DNSKEY (discussion welcome), with their TTL, Keys, Keysets, with their TTL, 8 Monitoring DNSSEC, not everything is perfect, yet /
  • 16. What do we compute This tool focus on one thing: timing in key rollovers. Not a substitute for comprehensive monitoring. We check: 1. That every “potentially in caches” signature has a published key, 2. That every published signature has a key which is in the keyset(s) that is(are) in all the caches. 9 Monitoring DNSSEC, not everything is perfect, yet /
  • 17. Example of signatures sqlite> SELECT first_seen,last_seen,ttl FROM Signatures WHERE type=6 AND name=’192.in-addr.arpa.’ AND key_tag=20918 ORDER BY last_seen DESC; 2011-03-28 17:29:30|2011-03-28 20:17:31|86400 2011-03-28 13:22:23|2011-03-28 16:25:05|86400 2011-03-28 09:19:59|2011-03-28 12:28:09|86400 10 Monitoring DNSSEC, not everything is perfect, yet /
  • 18. Example of keysets sqlite> SELECT first_seen,last_seen,ttl,id FROM Keysets WHERE name=’192.in-addr.arpa.’ ORDER BY last_seen DESC; 2011-03-29 09:38:45|2011-03-31 08:30:30|14400|J/dCsFib6kxRer/O/eh1ZbI/Un 2011-03-21 21:39:09|2011-03-29 08:38:16|14400|NgM4JKT7QacTgX+ZF7bNo2owKj 11 Monitoring DNSSEC, not everything is perfect, yet /
  • 19. Example of keys sqlite> SELECT first_seen,last_seen,key_tag FROM Keys WHERE name=’192.in-addr.arpa.’ ORDER BY last_seen DESC; 2011-03-01 15:34:17|2011-03-31 08:30:30|39318 2011-03-21 21:39:09|2011-03-31 08:30:30|60494 2011-03-01 15:34:17|2011-03-29 08:38:16|20918 12 Monitoring DNSSEC, not everything is perfect, yet /
  • 20. The observed domains and the results 54 domains monitored, mostly serious domains (TLD, important sub-domains like isoc.org), In two months, seven problems detected, including two TLD, Six of the problems were a key retired too soon. (Only one was a new key used too early.) 13 Monitoring DNSSEC, not everything is perfect, yet /
  • 21. An example: 192.in-addr.arpa % ./examine-history.py 192.in-addr.arpa ERROR: signature of zone 192.in-addr.arpa. last seen at 2011-03-28 20:17:31 (with a TTL of 86400) while the key 20918 was retired at 2011-03-29 09:23:54 The key was withdrawn 11 hours before it was safe to do so. 14 Monitoring DNSSEC, not everything is perfect, yet /
  • 22. An exampe: isoc.org TTL (24 h) Time Period during which (1st the signature could have been and 2nd in some caches March 2011) Last signature with Key 41414 41414 done at 21:00 retired at 10:00 15 Monitoring DNSSEC, not everything is perfect, yet /
  • 23. All the glitches Zone Date Glitch Window isoc.org 2011-03-29 retired too early 11h 192.in-addr.arpa 2011-03-28 retired too early 14h my 2011-03-26 retired too early 24h bg 2011-03-19 retired too early 72h isoc.org 2011-03-01 retired too early 11h noaa.gov 2011-02-18 used too early 24h noaa.gov 2011-02-18 retired too early 24h 16 Monitoring DNSSEC, not everything is perfect, yet /
  • 24. Conclusions The tools for key rollovers are not stable yet, More monitoring would be a good idea, DNSSEC is a sensitive thing: handle with care. Do not put into the hands of children. 17 Monitoring DNSSEC, not everything is perfect, yet /