SlideShare a Scribd company logo
| 1
Rolling the Root Zone DNSSEC
Key Signing Key
Edward Lewis | APNIC 42 | October 3. 2016
edward.lewis@icann.org
| 2| 2
Motivation for this talk
β€’ ICANN is about to change an important
configuration parameter in DNSSEC
β€’ For a network operator, this may create a need for
action
β€’ This discussion is meant to inform: Why this is
happening, what is happening, and when
β€’ Highlighting: the availability of project plan documents
| 3| 3
Trust	Anchors	
&	Root	KSK
Root	Zone
DNSSEC
KSK	Roll	
Project
1 2 3
| 4| 4
DNS	for	Those	Who	Don't	Like	Protocols
What	is	the	IPv6	address
for	www.example.com.?
www.example.com.	is	2001:db8::
| 5| 5
DNSSEC	for	Those	Who	Don't	Like	Protocols
Digital	signature	by	example.com.	
What	is	the	IPv6	address
for	www.example.com.?
www.example.com.	is	2001:db8::
| 6| 6
What is DNSSEC Validation?
β€’ Validation includes the process of inspecting the
digital signature and the data to verify the answer is
the appropriate one
β€’ The signature and data need a public key, a chain of
keys, and a trust anchor
β€’ Software tools today can do this when configured
β€’ Validation is more than a cryptographic check
β€’ Is the answer related to the question?
β€’ Is the answer "fresh", replayed, and so on?
| 7| 7
Why Bother?
β€’ Why bother?
β€’ The DNS protocol is gullible, easily fooled
β€’ Forged answers in DNS can result in misdirected traffic
β€’ Protect your DNS service, protect customers
β€’ Validation is "self-protection"
β€’ With DNSSEC as a base
β€’ Extensions to secure email transfer (stop spam)
β€’ Supplement to X.509 Certificate operations
| 8| 8
Roles of Keys in DNSSEC
β€’ DNSSEC has three kinds of records that, in some
loose definition, hold cryptographic key data. The
records exist because of the use of the data or
"role"/"job"
β€’ KSK – Key Signing Key, produce signatures of keys
β€’ ZSK – Zone Signing Key, produces all other signatures
β€’ DS – Delegation Signer, a "pointer" to a key
β€’ This was supposed to simplify DNS operations!
| 9| 9
Crypto-checking	a	Signature
example.com.	ZSK
?
βœ”
βœ–
OR
Digital	signature	by	
example.com.	
www.example.com.	is	
2001:db8::
| 10| 10
Trusting	a	Key
The	Root
.COM
example
example.com.	KSK
example.com.	DS
com.	ZSK
com.	KSK
com.	DS
root	ZSK
root	KSK
example.com.	ZSK
| 11| 11
Over	1300	DNS	- DNSSEC	TLDs
The	Root
.COM
root	ZSK
root	KSK
.NET .NL.INFO
.UK .BR
.SE
.δΈ­ε›½
com.	DS
.LK
.ORG
net.	DS
org.	DS
lk.	DS
uk.	DS
Over	1300	DS	sets!
+Over	500K	in	com...
| 12| 12
Anchor	of	the	Chain	of	Trust
The	Root
.COM
example
example.com.	KSK
example.com.	DS
com.	ZSK
com.	KSK
com.	DS
root	ZSK
root	KSK
example.com.	ZSK
| 13| 13
What is a Trust Anchor?
β€’ Besides being the "top" of any DNSSEC validation
process?
β€’ A trust anchor is a key that an operator places full
faith and trust into for the purposes of verifying
responses
β€’ It could be implicitly trusted because it came
with the software
β€’ It could be explicitly trusted via due diligence
examination
| 14| 14
Is the Root Zone KSK the Trust Anchor?
β€’ Maybe
β€’ It's really up to you
β€’ By convention, there's a unique root zone, it has a
KSK, for the global public Internet operated by
ICANN
β€’ By default, DNSSEC validation tools come
configured with that KSK as the trust anchor
β€’ But a user of the tools can add other trust anchors
| 15| 15
Trust	Anchors	
&	Root	KSK
Root	Zone
DNSSEC
KSK	Roll	
Project
1 2 3
| 16| 16
DNSSEC in the Root Zone
β€’ DNSSEC in the Root Zone is managed by:
β€’ ICANN, responsible for operating the root KSK
β€’ Verisign, responsible for operating the root ZSK
β€’ Operating the KSK
β€’ KSK lifecycle management, "sign the ZSK"
β€’ Operating the ZSK
β€’ ZSK lifecycle management, "sign the root zone"
β€’ Activities are coordinated but operated separately
| 17| 17
Current Root KSK
β€’ The current root KSK was created in 2010
β€’ Stored in Hardware Security Modules in two Key
Management Facilities
β€’ The operations surrounding the key is an entirely
different talk
| 18| 18
β€’ Via	the	DNS
β€’ As	reliable	as	the	data	in	unprotected	DNS
β€’ (Works	if	you	not	subject	to	an	"attack")
β€’ Via	the	Web
β€’ https://data.iana.org/root-anchors/root-
anchors.xml
β€’ Secured	by	an	X.509	certificate	and	signature
β€’ Via	other	means
β€’ Code
β€’ Presentations,	t-shirts,	friends
β€’ Always	remember	to	check	the	legitimacy!
Getting	the	Root	KSK	(Public	portion	only!)
| 19| 19
Changing the Root KSK
β€’ There is a plan in place to change the root KSK
β€’ For the first time
β€’ This plan is precedent setting
β€’ Because it involves an uncountable roster of participants
and impacted parties
β€’ When ICANN changes the KSK on our end -
β€’ Anyone who (anonymously) relies on it has to change a
configuration on their end
β€’ No one can list all those involved – unless something
goes wrong
| 20| 20
Why (rock the boat)?
β€’ Good cryptographic hygiene
β€’ Secrets don't remain secret forever
β€’ Good operational hygiene
β€’ Have a plan, complete enough to execute
β€’ Exercise the plan under normal circumstances
β€’ Why not a private test?
β€’ The change of the KSK involves everyone doing DNSSEC
validation on the Internet, service operators, software
producers
| 21| 21
Bottom Line
β€’ Changing the root KSK will impact just about all
DNSSEC validations
β€’ If the trust anchor is "misconfigured" (i.e., the wrong key)
DNSSEC will reject legitimate responses
β€’ To anyone or any process relying on DNS, it will appear
that the desired data is unavailable, website is
unreachable, "the Internet is down"
β€’ There's a broader topic of trust anchor
maintenance, but that is for another time
| 22| 22
Trust	Anchors	
&	Root	KSK
Root	Zone
DNSSEC
KSK	Roll	
Project
1 2 3
| 23| 23
The KSK Rollover Project and Network Operators
β€’ The project is meaningful to you if you are
performing DNSSEC validation
β€’ Geoff Huston stats: steady 15% world wide
β€’ DNSSEC signing is not affected
β€’ If you are validating it's time to revisit
configurations and processes
β€’ A root KSK roll hasn't happened before, it's new to all of
us
| 24| 24
β€’ The KSK Rollover Plan Documents
β€’ Available at: https://www.icann.org/kskroll
2017 KSK Rollover Operational Implementation Plan
2017 KSK Rollover Systems Test Plan
2017 KSK Rollover Monitoring Plan
2017 KSK Rollover External Test Plan
2017 KSK Rollover Back Out Plan
β€’ We encourage interested folks to given them a read
| 25| 25
Overview of Project Plans
β€’ Plans say - On October 11, 2017 a new KSK will go
into use and the current KSK retired
β€’ On this day, if preparations haven't been made, trouble
will ensue
β€’ Plans include
β€’ Retaining the current cryptography settings
β€’ Following Automated Updates of DNSSEC Trust Anchors
β€’ Fitting the roll into normal maintenance events
β€’ Testing and monitoring
| 26| 26
The Project's DNS Response Size Concerns
β€’ Significant DNS responses will grow to 1425 bytes
during the project
β€’ Experimentation, especially in IPv6, suggests this
might be a concern despite empirical evidence to
the contrary
β€’ How to avoid potential problems
β€’ Where UDP is allowed to port 53, also allow TCP
β€’ Refrain from filtering DNS messages based on size
| 27| 27
IPv6 fragmentation and DNS
β€’ IPv6 fragmentation is done by the sender with
intermediate nodes using ICMP to indicate a
fragment as being "too big"
β€’ By the time the DNS sender gets the ICMP, DNS has
forgotten what it had sent
β€’ From Geoff Huston experiments and analysis
β€’ http://www.potaroo.net/ispcol/2016-05/v6frags.html
β€’ TCP	over	IPv6	use	an	MTU	of	1,280 bytes
β€’ UDP	has	marginal	advantages	with	using	larger MTU,	"but"
| 28| 28
Dates to Watch
β€’ September	19,	2017
β€’ The	root	zone	DNSKEY	set	will	increase	to	1414	bytes	for	
20	days,	prior	to	that	date	1139	bytes	has	been	the	high	
water	mark
β€’ October	11,	2017
β€’ On	this	date	the	root	zone	DNSKEY	set	will	be	signed	only	
by	the	new	KSK
β€’ January	11,	2018
β€’ The	root	zone	DNSKEY	set	will	increase	to	1425	bytes	for	
20	days
| 29| 29
Trust Anchor Management
β€’ How do you trust and configure?
β€’ Are trust anchors subject to configuration control?
β€’ Rely on embedded data in software?
β€’ Are DNSSEC validation failures monitored?
β€’ Automated Updates of DNSSEC Trust Anchors
β€’ Most direct, reliable means for getting the key
β€’ Negative Trust Anchor management – RFC 7646
β€’ Protects against errors made by others
| 30| 30
Tools & Testbeds
β€’ We are working with DNS software and tool
developers and distributors
β€’ Management/troubleshooting aids
β€’ Updates of bundled keys
β€’ Testbeds for Code Developers
β€’ Automated updates: http://keyroll.systems/
β€’ Root zone model: https://www.toot-servers.net/
β€’ Testbeds for Service Operators
β€’ I.e., using "off-the-shelf" parameters
β€’ Planned for end-of-2016
| 31| 31
β€’ Join the ksk-rollover@icann.org mailing
list:
β€’ https://mm.icann.org/listinfo/ksk-rollover
β€’ Follow on Twitter
β€’ @ICANN
β€’ Hashtag: #KeyRoll
β€’ Visit the web page:
β€’ https://www.icann.org/kskroll
For More Information
| 32| 32
Reach me at:
Email: ksk-rollover@icann.org
Website: icann.org/kskroll
Thank You and Questions
gplus.to/icann
weibo.com/ICANNorg
flickr.com/photos/icann
slideshare.net/icannpresentations
twitter.com/icann
facebook.com/icannorg
linkedin.com/company/icann
youtube.com/user/icannnews
Engage with ICANN

More Related Content

PPTX
IPv6 and the DNS, RIPE 73
Β 
PDF
Testing Rolling Roots
Β 
PDF
Thoughts about DNS for DDoS
Β 
PDF
28th TWNIC OPM and TWNOG 2017: Security best practices for network operators
Β 
PDF
BSides: BGP Hijacking and Secure Internet Routing
Β 
PDF
Measuring the end user
Β 
PDF
npNOG 2: APNIC IPv6 deployment
Β 
PDF
Route Hijaking and the role of RPKI
Β 
IPv6 and the DNS, RIPE 73
Β 
Testing Rolling Roots
Β 
Thoughts about DNS for DDoS
Β 
28th TWNIC OPM and TWNOG 2017: Security best practices for network operators
Β 
BSides: BGP Hijacking and Secure Internet Routing
Β 
Measuring the end user
Β 
npNOG 2: APNIC IPv6 deployment
Β 
Route Hijaking and the role of RPKI
Β 

What's hot (20)

PDF
Measuring the End User
Β 
PDF
VNIX-NOG 2021: IPv6 Deployment Update
Β 
PDF
The Next Generation Internet Number Registry Services
Β 
PDF
IETF 112: Internet centrality and its impact on routing
Β 
PDF
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
Β 
PPTX
APNIC IPv6 Deployment
Β 
PDF
APNIC Updates
Β 
PDF
IPv6 Deployment Case on a Korean Governmental Website
Β 
PDF
RPKI (Resource Public Key Infrastructure)
PDF
DNS Openness
Β 
PDF
Internet Noise (A Story About Two Little Subnets - Tom Paseka
Β 
PPTX
IPv4 transfer presentation, SGNOG4
Β 
PPTX
Apnic IPv6 Deployment
Β 
PDF
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
Β 
PDF
CDN_Netflix_analysis
PDF
BGP filtering best practice
PDF
Resource Public Key Infrastructure (RPKI)
PDF
mnNOG 1: Securing internet Routing
Β 
PDF
Next-gen Network Telemetry is Within Your Packets: In-band OAM
PPT
Big data in the energy sector
Measuring the End User
Β 
VNIX-NOG 2021: IPv6 Deployment Update
Β 
The Next Generation Internet Number Registry Services
Β 
IETF 112: Internet centrality and its impact on routing
Β 
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
Β 
APNIC IPv6 Deployment
Β 
APNIC Updates
Β 
IPv6 Deployment Case on a Korean Governmental Website
Β 
RPKI (Resource Public Key Infrastructure)
DNS Openness
Β 
Internet Noise (A Story About Two Little Subnets - Tom Paseka
Β 
IPv4 transfer presentation, SGNOG4
Β 
Apnic IPv6 Deployment
Β 
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
Β 
CDN_Netflix_analysis
BGP filtering best practice
Resource Public Key Infrastructure (RPKI)
mnNOG 1: Securing internet Routing
Β 
Next-gen Network Telemetry is Within Your Packets: In-band OAM
Big data in the energy sector
Ad

Similar to Rolling the Root Zone DNSSEC Key Signing Key (20)

PDF
2017 DNSSEC KSK Rollover
Β 
PDF
The New Root Zone DNSSEC KSK
Β 
PDF
2017 DNSSEC KSK Rollover
Β 
PPTX
ICANN Presentation - iWeek2017
PDF
NANOG 74: That KSK Roll
Β 
PDF
The DNSSEC KSK of the root rolls
PDF
DNSSEC Validation Tutorial
Β 
PDF
Introduction DNSSec
PDF
ICANN Update
Β 
PDF
Hardening the Core of the Internet
PDF
Rolling the Root KSK
Β 
PPTX
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
PDF
KSK Rollover 2015-2019
Β 
PDF
Technical and Business Considerations for DNSSEC Deployment
Β 
PPTX
ION Hangzhou - How to Deploy DNSSEC
PDF
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
PDF
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
PDF
2010 za con_todor_genov
PDF
DNS & DNSSEC
Β 
PPTX
DNS Root Zone KSK Rollover Planning
Β 
2017 DNSSEC KSK Rollover
Β 
The New Root Zone DNSSEC KSK
Β 
2017 DNSSEC KSK Rollover
Β 
ICANN Presentation - iWeek2017
NANOG 74: That KSK Roll
Β 
The DNSSEC KSK of the root rolls
DNSSEC Validation Tutorial
Β 
Introduction DNSSec
ICANN Update
Β 
Hardening the Core of the Internet
Rolling the Root KSK
Β 
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
KSK Rollover 2015-2019
Β 
Technical and Business Considerations for DNSSEC Deployment
Β 
ION Hangzhou - How to Deploy DNSSEC
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
2010 za con_todor_genov
DNS & DNSSEC
Β 
DNS Root Zone KSK Rollover Planning
Β 
Ad

More from APNIC (20)

PPTX
APNIC Report, presented at APAN 60 by Thy Boskovic
Β 
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Β 
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
Β 
PDF
The Internet -By the Numbers, Sri Lanka Edition
Β 
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
Β 
PDF
DNSSEC Made Easy, presented at PHNOG 2025
Β 
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
Β 
PDF
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
Β 
PDF
IPv6 Deployment and Best Practices, presented by Makito Lay
Β 
PDF
Cleaning up your RPKI invalids, presented at PacNOG 35
Β 
PDF
The Internet - By the numbers, presented at npNOG 11
Β 
PDF
Transmission Control Protocol (TCP) and Starlink
Β 
PDF
DDoS in India, presented at INNOG 8 by Dave Phelan
Β 
PDF
Global Networking Trends, presented at the India ISP Conclave 2025
Β 
PDF
Make DDoS expensive for the threat actors
Β 
PDF
Fast Reroute in SR-MPLS, presented at bdNOG 19
Β 
PDF
DDos Mitigation Strategie, presented at bdNOG 19
Β 
PDF
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
Β 
PDF
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
Β 
PDF
Measuring Starlink Protocol Performance, presented at LACNIC 43
Β 
APNIC Report, presented at APAN 60 by Thy Boskovic
Β 
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Β 
RPKI Status Update, presented by Makito Lay at IDNOG 10
Β 
The Internet -By the Numbers, Sri Lanka Edition
Β 
Triggering QUIC, presented by Geoff Huston at IETF 123
Β 
DNSSEC Made Easy, presented at PHNOG 2025
Β 
BGP Security Best Practices that Matter, presented at PHNOG 2025
Β 
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
Β 
IPv6 Deployment and Best Practices, presented by Makito Lay
Β 
Cleaning up your RPKI invalids, presented at PacNOG 35
Β 
The Internet - By the numbers, presented at npNOG 11
Β 
Transmission Control Protocol (TCP) and Starlink
Β 
DDoS in India, presented at INNOG 8 by Dave Phelan
Β 
Global Networking Trends, presented at the India ISP Conclave 2025
Β 
Make DDoS expensive for the threat actors
Β 
Fast Reroute in SR-MPLS, presented at bdNOG 19
Β 
DDos Mitigation Strategie, presented at bdNOG 19
Β 
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
Β 
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
Β 
Measuring Starlink Protocol Performance, presented at LACNIC 43
Β 

Recently uploaded (20)

PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Internet___Basics___Styled_ presentation
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
Introduction to the IoT system, how the IoT system works
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
innovation process that make everything different.pptx
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
Funds Management Learning Material for Beg
PPTX
artificial intelligence overview of it and more
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
An introduction to the IFRS (ISSB) Stndards.pdf
Internet___Basics___Styled_ presentation
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
Introduction to the IoT system, how the IoT system works
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Tenda Login Guide: Access Your Router in 5 Easy Steps
innovation process that make everything different.pptx
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Job_Card_System_Styled_lorem_ipsum_.pptx
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Cloud-Scale Log Monitoring _ Datadog.pdf
Funds Management Learning Material for Beg
artificial intelligence overview of it and more
international classification of diseases ICD-10 review PPT.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Design_with_Watersergyerge45hrbgre4top (1).ppt
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Introduction about ICD -10 and ICD11 on 5.8.25.pptx

Rolling the Root Zone DNSSEC Key Signing Key

  • 1. | 1 Rolling the Root Zone DNSSEC Key Signing Key Edward Lewis | APNIC 42 | October 3. 2016 edward.lewis@icann.org
  • 2. | 2| 2 Motivation for this talk β€’ ICANN is about to change an important configuration parameter in DNSSEC β€’ For a network operator, this may create a need for action β€’ This discussion is meant to inform: Why this is happening, what is happening, and when β€’ Highlighting: the availability of project plan documents
  • 6. | 6| 6 What is DNSSEC Validation? β€’ Validation includes the process of inspecting the digital signature and the data to verify the answer is the appropriate one β€’ The signature and data need a public key, a chain of keys, and a trust anchor β€’ Software tools today can do this when configured β€’ Validation is more than a cryptographic check β€’ Is the answer related to the question? β€’ Is the answer "fresh", replayed, and so on?
  • 7. | 7| 7 Why Bother? β€’ Why bother? β€’ The DNS protocol is gullible, easily fooled β€’ Forged answers in DNS can result in misdirected traffic β€’ Protect your DNS service, protect customers β€’ Validation is "self-protection" β€’ With DNSSEC as a base β€’ Extensions to secure email transfer (stop spam) β€’ Supplement to X.509 Certificate operations
  • 8. | 8| 8 Roles of Keys in DNSSEC β€’ DNSSEC has three kinds of records that, in some loose definition, hold cryptographic key data. The records exist because of the use of the data or "role"/"job" β€’ KSK – Key Signing Key, produce signatures of keys β€’ ZSK – Zone Signing Key, produces all other signatures β€’ DS – Delegation Signer, a "pointer" to a key β€’ This was supposed to simplify DNS operations!
  • 11. | 11| 11 Over 1300 DNS - DNSSEC TLDs The Root .COM root ZSK root KSK .NET .NL.INFO .UK .BR .SE .δΈ­ε›½ com. DS .LK .ORG net. DS org. DS lk. DS uk. DS Over 1300 DS sets! +Over 500K in com...
  • 13. | 13| 13 What is a Trust Anchor? β€’ Besides being the "top" of any DNSSEC validation process? β€’ A trust anchor is a key that an operator places full faith and trust into for the purposes of verifying responses β€’ It could be implicitly trusted because it came with the software β€’ It could be explicitly trusted via due diligence examination
  • 14. | 14| 14 Is the Root Zone KSK the Trust Anchor? β€’ Maybe β€’ It's really up to you β€’ By convention, there's a unique root zone, it has a KSK, for the global public Internet operated by ICANN β€’ By default, DNSSEC validation tools come configured with that KSK as the trust anchor β€’ But a user of the tools can add other trust anchors
  • 16. | 16| 16 DNSSEC in the Root Zone β€’ DNSSEC in the Root Zone is managed by: β€’ ICANN, responsible for operating the root KSK β€’ Verisign, responsible for operating the root ZSK β€’ Operating the KSK β€’ KSK lifecycle management, "sign the ZSK" β€’ Operating the ZSK β€’ ZSK lifecycle management, "sign the root zone" β€’ Activities are coordinated but operated separately
  • 17. | 17| 17 Current Root KSK β€’ The current root KSK was created in 2010 β€’ Stored in Hardware Security Modules in two Key Management Facilities β€’ The operations surrounding the key is an entirely different talk
  • 18. | 18| 18 β€’ Via the DNS β€’ As reliable as the data in unprotected DNS β€’ (Works if you not subject to an "attack") β€’ Via the Web β€’ https://data.iana.org/root-anchors/root- anchors.xml β€’ Secured by an X.509 certificate and signature β€’ Via other means β€’ Code β€’ Presentations, t-shirts, friends β€’ Always remember to check the legitimacy! Getting the Root KSK (Public portion only!)
  • 19. | 19| 19 Changing the Root KSK β€’ There is a plan in place to change the root KSK β€’ For the first time β€’ This plan is precedent setting β€’ Because it involves an uncountable roster of participants and impacted parties β€’ When ICANN changes the KSK on our end - β€’ Anyone who (anonymously) relies on it has to change a configuration on their end β€’ No one can list all those involved – unless something goes wrong
  • 20. | 20| 20 Why (rock the boat)? β€’ Good cryptographic hygiene β€’ Secrets don't remain secret forever β€’ Good operational hygiene β€’ Have a plan, complete enough to execute β€’ Exercise the plan under normal circumstances β€’ Why not a private test? β€’ The change of the KSK involves everyone doing DNSSEC validation on the Internet, service operators, software producers
  • 21. | 21| 21 Bottom Line β€’ Changing the root KSK will impact just about all DNSSEC validations β€’ If the trust anchor is "misconfigured" (i.e., the wrong key) DNSSEC will reject legitimate responses β€’ To anyone or any process relying on DNS, it will appear that the desired data is unavailable, website is unreachable, "the Internet is down" β€’ There's a broader topic of trust anchor maintenance, but that is for another time
  • 23. | 23| 23 The KSK Rollover Project and Network Operators β€’ The project is meaningful to you if you are performing DNSSEC validation β€’ Geoff Huston stats: steady 15% world wide β€’ DNSSEC signing is not affected β€’ If you are validating it's time to revisit configurations and processes β€’ A root KSK roll hasn't happened before, it's new to all of us
  • 24. | 24| 24 β€’ The KSK Rollover Plan Documents β€’ Available at: https://www.icann.org/kskroll 2017 KSK Rollover Operational Implementation Plan 2017 KSK Rollover Systems Test Plan 2017 KSK Rollover Monitoring Plan 2017 KSK Rollover External Test Plan 2017 KSK Rollover Back Out Plan β€’ We encourage interested folks to given them a read
  • 25. | 25| 25 Overview of Project Plans β€’ Plans say - On October 11, 2017 a new KSK will go into use and the current KSK retired β€’ On this day, if preparations haven't been made, trouble will ensue β€’ Plans include β€’ Retaining the current cryptography settings β€’ Following Automated Updates of DNSSEC Trust Anchors β€’ Fitting the roll into normal maintenance events β€’ Testing and monitoring
  • 26. | 26| 26 The Project's DNS Response Size Concerns β€’ Significant DNS responses will grow to 1425 bytes during the project β€’ Experimentation, especially in IPv6, suggests this might be a concern despite empirical evidence to the contrary β€’ How to avoid potential problems β€’ Where UDP is allowed to port 53, also allow TCP β€’ Refrain from filtering DNS messages based on size
  • 27. | 27| 27 IPv6 fragmentation and DNS β€’ IPv6 fragmentation is done by the sender with intermediate nodes using ICMP to indicate a fragment as being "too big" β€’ By the time the DNS sender gets the ICMP, DNS has forgotten what it had sent β€’ From Geoff Huston experiments and analysis β€’ http://www.potaroo.net/ispcol/2016-05/v6frags.html β€’ TCP over IPv6 use an MTU of 1,280 bytes β€’ UDP has marginal advantages with using larger MTU, "but"
  • 28. | 28| 28 Dates to Watch β€’ September 19, 2017 β€’ The root zone DNSKEY set will increase to 1414 bytes for 20 days, prior to that date 1139 bytes has been the high water mark β€’ October 11, 2017 β€’ On this date the root zone DNSKEY set will be signed only by the new KSK β€’ January 11, 2018 β€’ The root zone DNSKEY set will increase to 1425 bytes for 20 days
  • 29. | 29| 29 Trust Anchor Management β€’ How do you trust and configure? β€’ Are trust anchors subject to configuration control? β€’ Rely on embedded data in software? β€’ Are DNSSEC validation failures monitored? β€’ Automated Updates of DNSSEC Trust Anchors β€’ Most direct, reliable means for getting the key β€’ Negative Trust Anchor management – RFC 7646 β€’ Protects against errors made by others
  • 30. | 30| 30 Tools & Testbeds β€’ We are working with DNS software and tool developers and distributors β€’ Management/troubleshooting aids β€’ Updates of bundled keys β€’ Testbeds for Code Developers β€’ Automated updates: http://keyroll.systems/ β€’ Root zone model: https://www.toot-servers.net/ β€’ Testbeds for Service Operators β€’ I.e., using "off-the-shelf" parameters β€’ Planned for end-of-2016
  • 31. | 31| 31 β€’ Join the ksk-rollover@icann.org mailing list: β€’ https://mm.icann.org/listinfo/ksk-rollover β€’ Follow on Twitter β€’ @ICANN β€’ Hashtag: #KeyRoll β€’ Visit the web page: β€’ https://www.icann.org/kskroll For More Information
  • 32. | 32| 32 Reach me at: Email: ksk-rollover@icann.org Website: icann.org/kskroll Thank You and Questions gplus.to/icann weibo.com/ICANNorg flickr.com/photos/icann slideshare.net/icannpresentations twitter.com/icann facebook.com/icannorg linkedin.com/company/icann youtube.com/user/icannnews Engage with ICANN