SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
A Business Case for DNSSECA Business Case for DNSSEC
By
Mark Elkins
June 2014
What DNSSEC Gives UsWhat DNSSEC Gives Us
Validation of Data lookups published in the DNS
very simple to activate on a recursive Nameserver
Bind: addition to named.conf
managed-keys {
. initial-key 257 3 8
"AwEAAagAIKlVZrpC6Ia7g....
QxA+Uk1ihz0=";
};
If you use Chrome or Firefox, install the
"DNSSEC Validator" Add-on.
Search for "DNSSEC Validator"
- Signed and Validates, Chain of Trust is intact.
- Signed, but Chain of Trust is broken.
- Signed, but does not Validate, Chain of Trust is intact.
- Not Signed.
What DNSSEC Gives UsWhat DNSSEC Gives Us
ftth.posix.co.za AAAA ??? → 2001:42a0:1:208::13
A Trusted Reply!
_443._tcp.ftth.posix.co.za TLSA ??? → 3 0 1
B635D5DECFF4C30F7DC6606EB12D9CC8C5C05E3F89221FE74
23AA2D5 AC8CAADA
A Trusted DANE/TLSA Record!
(Created by hash-slinger, Thanks Dan)
What DNSSEC Gives UsWhat DNSSEC Gives Us
●Is the art of deception
●This is not the droid computer you are looking for
●Mission: to be one with your computer
Back to business - PhishingBack to business - Phishing
We need HTTPS (Mission: HTTP on everything)
● Identifies the site we are connect to
● Padlock is there
Except there are over a hundred Certificate Authorities...
I use StartCom/StartSSL - but how would you know?
Back to business - PhishingBack to business - Phishing
●With DNSSEC securing a TLSA Signature
●With a TLSA Signature covering the SSL Certificate
●With Padlocks, Keys - almost covered!
Back to business - PhishingBack to business - Phishing
It talks to my X509 Certificate
Back to StartCOMBack to StartCOM
● Signing (and keeping it signed)
● Interaction with Parents
Deployment ChallengesDeployment Challenges
Signing can be simple
There are Scripts (eg. mine) (http://posixafrica.com)
and black box solutions (eg. OpenDNSSEC)
This can be done in just three commands....
(Assuming you have a zone called 'web.za')
# dnssec-keygen -a RSASHA256 -b 1024 web.za
# dnssec-keygen -a RSASHA256 -b 2048 -f KSK web.za
# dnssec-signzone -S web.za
Signing and keeping it signedSigning and keeping it signed
'web.za' is now signed and the new zone is called 'web.za.signed'
There is also a file called 'dsset-web.za.' (discussed next slide)
Edit your 'named.conf' to use the new 'signed' version of the zone.
In reality - one should at some regular determined frequency,
generate new keys and roll out the old keys....
Signing and keeping it signedSigning and keeping it signed
The contents of the file 'dsset-web.za.' needs to be
securely installed into the parent zone of 'za'.
web.za. IN DS 52867 8 1 921AFBC6DF6....
web.za. IN DS 52867 8 2 9FBC5FBC6B9....
1 - Encrypted e-mail (How I talk to Tanzania or Namibia)
2 - Via a web front-end (AFRINIC, Root)
3 - Via the Registries EPP system (COZA/dotAfrica)
Signing and keeping it signedSigning and keeping it signed
Dealing with parentsDealing with parents
Uncooperative Parents?
The Deployment of DNSSEC is a way to make the
Internet a Safer place.
It is not a Silver Bullet, but combined with other
security features gets us pointed in the right
direction.
ConclusionsConclusions
Questions?
mje@posix.co.za
A Business Case for DNSSECA Business Case for DNSSEC

Mais conteúdo relacionado

Mais de Deploy360 Programme (Internet Society)

Mais de Deploy360 Programme (Internet Society) (20)

ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success StoriesION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
 
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter PresentationION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
 
ION Belgrade - IETF Update
ION Belgrade - IETF UpdateION Belgrade - IETF Update
ION Belgrade - IETF Update
 
ION Belgrade - Opening Slides
ION Belgrade - Opening SlidesION Belgrade - Opening Slides
ION Belgrade - Opening Slides
 
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
 
ION Belgrade - Closing Slides
ION Belgrade - Closing SlidesION Belgrade - Closing Slides
ION Belgrade - Closing Slides
 
AusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRSAusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRS
 
ION Malta - IETF Update
ION Malta - IETF UpdateION Malta - IETF Update
ION Malta - IETF Update
 
ION Malta - MANRS Introduction
ION Malta - MANRS IntroductionION Malta - MANRS Introduction
ION Malta - MANRS Introduction
 
ION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSECION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSEC
 
ION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLSION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLS
 
ION Malta - IANA Transition Roles & Accountability
ION Malta - IANA Transition Roles & AccountabilityION Malta - IANA Transition Roles & Accountability
ION Malta - IANA Transition Roles & Accountability
 
ION Malta - IPv6 Case Study: Finland
ION Malta - IPv6 Case Study: FinlandION Malta - IPv6 Case Study: Finland
ION Malta - IPv6 Case Study: Finland
 
ION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 TransitionION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 Transition
 
ION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for youION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for you
 
ION Malta - Opening Slides
ION Malta - Opening SlidesION Malta - Opening Slides
ION Malta - Opening Slides
 
ION Malta - Closing Slides
ION Malta - Closing SlidesION Malta - Closing Slides
ION Malta - Closing Slides
 
ION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internetION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internet
 
ION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng ChapterION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng Chapter
 
ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?
 

Último

2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 

Último (20)

2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 

ION Djibouti: A Business Case for DNSSEC - Mark Elkins

  • 1. A Business Case for DNSSECA Business Case for DNSSEC By Mark Elkins June 2014
  • 2. What DNSSEC Gives UsWhat DNSSEC Gives Us Validation of Data lookups published in the DNS very simple to activate on a recursive Nameserver Bind: addition to named.conf managed-keys { . initial-key 257 3 8 "AwEAAagAIKlVZrpC6Ia7g.... QxA+Uk1ihz0="; };
  • 3. If you use Chrome or Firefox, install the "DNSSEC Validator" Add-on. Search for "DNSSEC Validator" - Signed and Validates, Chain of Trust is intact. - Signed, but Chain of Trust is broken. - Signed, but does not Validate, Chain of Trust is intact. - Not Signed. What DNSSEC Gives UsWhat DNSSEC Gives Us
  • 4. ftth.posix.co.za AAAA ??? → 2001:42a0:1:208::13 A Trusted Reply! _443._tcp.ftth.posix.co.za TLSA ??? → 3 0 1 B635D5DECFF4C30F7DC6606EB12D9CC8C5C05E3F89221FE74 23AA2D5 AC8CAADA A Trusted DANE/TLSA Record! (Created by hash-slinger, Thanks Dan) What DNSSEC Gives UsWhat DNSSEC Gives Us
  • 5. ●Is the art of deception ●This is not the droid computer you are looking for ●Mission: to be one with your computer Back to business - PhishingBack to business - Phishing
  • 6. We need HTTPS (Mission: HTTP on everything) ● Identifies the site we are connect to ● Padlock is there Except there are over a hundred Certificate Authorities... I use StartCom/StartSSL - but how would you know? Back to business - PhishingBack to business - Phishing
  • 7. ●With DNSSEC securing a TLSA Signature ●With a TLSA Signature covering the SSL Certificate ●With Padlocks, Keys - almost covered! Back to business - PhishingBack to business - Phishing
  • 8. It talks to my X509 Certificate Back to StartCOMBack to StartCOM
  • 9. ● Signing (and keeping it signed) ● Interaction with Parents Deployment ChallengesDeployment Challenges
  • 10. Signing can be simple There are Scripts (eg. mine) (http://posixafrica.com) and black box solutions (eg. OpenDNSSEC) This can be done in just three commands.... (Assuming you have a zone called 'web.za') # dnssec-keygen -a RSASHA256 -b 1024 web.za # dnssec-keygen -a RSASHA256 -b 2048 -f KSK web.za # dnssec-signzone -S web.za Signing and keeping it signedSigning and keeping it signed
  • 11. 'web.za' is now signed and the new zone is called 'web.za.signed' There is also a file called 'dsset-web.za.' (discussed next slide) Edit your 'named.conf' to use the new 'signed' version of the zone. In reality - one should at some regular determined frequency, generate new keys and roll out the old keys.... Signing and keeping it signedSigning and keeping it signed
  • 12. The contents of the file 'dsset-web.za.' needs to be securely installed into the parent zone of 'za'. web.za. IN DS 52867 8 1 921AFBC6DF6.... web.za. IN DS 52867 8 2 9FBC5FBC6B9.... 1 - Encrypted e-mail (How I talk to Tanzania or Namibia) 2 - Via a web front-end (AFRINIC, Root) 3 - Via the Registries EPP system (COZA/dotAfrica) Signing and keeping it signedSigning and keeping it signed
  • 13. Dealing with parentsDealing with parents Uncooperative Parents?
  • 14. The Deployment of DNSSEC is a way to make the Internet a Safer place. It is not a Silver Bullet, but combined with other security features gets us pointed in the right direction. ConclusionsConclusions
  • 15. Questions? mje@posix.co.za A Business Case for DNSSECA Business Case for DNSSEC