SlideShare a Scribd company logo
A	
  Tutorial	
  Introduction	
  
to	
  DANE
Jan	
  Zorz /	
  ISOC
Carlos	
  Martinez	
  /	
  LACNIC
Mechanics	
  of	
  Web	
  Browsing
• Security?
1. DNS	
  query	
  for	
  
www.google.com
2. TCP	
  connection	
  to	
  IP	
  
obtained	
  in	
  (1)
3. Data	
  flows	
  in	
  plain	
  text
Data	
  flowing	
  in	
  plain	
  text?	
  That	
  can	
  be	
  
solved	
  by	
  encrypting	
  the	
  connection,	
  right	
  
?	
  
Enter	
  TLS,	
  Transport	
  Layer	
  Security
Securing	
  and	
  Authenticating	
  
Endpoints
Application
TLS	
  
Handshake
TLS	
  Record	
  Protocol
TCP
IP
Link	
  and	
  Physical	
  Layers
Application
TLS	
  
Handshake
TLS	
  Record	
  Protocol
TCP
IP
Link	
  and	
  Physical	
  Layers
TLS	
  Handshake
ClientHello
ServerHello
ServerCertificate
ServerKeyExchange
ServerHelloDone
[ClientCertificate]
ClientKeyExchange
ChangeCipherSpec
ChangeCipherSpec
Client Server
Digital	
  Certificates
• A	
  Public	
  Key	
  Certificate	
  is	
  a	
  digital	
  document	
  that	
  binds	
  
a	
  set	
  of	
  information	
  (fields)	
  with	
  a	
  public	
  key	
  and	
  is	
  
digitally	
  signed.
• Signatures	
  can	
  be	
  either	
  be	
  performed	
  by	
  a	
  third	
  party	
  
or	
  by	
  the	
  issuer	
  itself	
  (self-­‐signed	
  certificates)
• Validation
• Observers	
  can	
  verify	
  the	
  digital	
  signature	
  of	
  the	
  certificate
• Trust
• Certificate	
  Authority	
  model
• Signature	
  verification	
  is	
  followed	
  up	
  a	
  chain	
  until	
  reaching	
  a	
  
commonly	
  agreed	
  trust	
  anchor
Digital	
  Certificates	
  (2)
• Fields	
  and	
  flags	
  in	
  a	
  certificate	
  define	
  how,	
  where	
  and	
  
when	
  the	
  certificate	
  can	
  be	
  used	
  and	
  define	
  	
  is	
  valid	
  to	
  
be	
  used
• Valid-­‐from,	
  Valid-­‐until	
  times
• Express	
  constraints	
  on	
  usage
• Extensions
• Lists	
  of	
  [type-­‐value-­‐critical_flag]
• Examples
• Key	
  usage
• Extended	
  key	
  usage	
  (clientAuth,	
  serverAuth,	
  emailProtection,	
  
...	
  )
• RFC	
  3779	
  (Internet	
  number	
  resources)
Trust	
  Chain
I’m	
  Carlos S4
I’m	
  LACNIC S3 Kpriv3
I’m	
  the	
  CA2 S2 Kpriv2
I’m	
  the	
  
United	
  
Nations
S1 Kpriv1
I’m	
  Jan S7
I’m	
  Go6Labs S6 Kpriv6
I’m	
  the	
  ISOC S5 Kpriv5
● Certs	
  are	
  public
● Private	
  keys	
  are	
  not	
  
published,	
  but	
  held	
  by	
  their	
  
owners	
  and	
  used	
  for	
  signing	
  
when	
  needed
● A	
  common	
  root	
  serves	
  as	
  
the	
  agreed	
  trust	
  anchor
Drawbacks	
  of	
  the	
  CA-­‐Based	
  Chain
• Trust	
  anchors	
  can	
  (and	
  have	
  been)	
  successfully	
  attacked	
  
• DigiNotar,	
  GlobalSign,	
  DigiCert Malaysia	
  are	
  just	
  some	
  examples
• The	
  process	
  that	
  CAs	
  use	
  to	
  validate	
  information	
  provided	
  
by	
  customers	
  can	
  be	
  subverted
• CAs	
  are	
  slow	
  to	
  react	
  when	
  a	
  certificate	
  is	
  compromised
• The	
  revocation	
  process	
  can	
  be	
  slow	
  and	
  is	
  based	
  on	
  the	
  
concept	
  of	
  CRLs	
  that	
  have	
  to	
  be	
  downloaded	
  and	
  are	
  re-­‐
created	
  every	
  few	
  hours
• [Check	
  https://tools.ietf.org/html/draft-­‐housley-­‐web-­‐pki-­‐
problems-­‐00 ]
The	
  DigiNotar Debacle
• [https://www.enisa.europa.eu/media/news-­‐
items/operation-­‐black-­‐tulip]	
  
Shortcomings	
  of	
  the	
  Traditional	
  CA	
  
Model
• The	
  attack	
  surface	
  is	
  huge	
  and	
  growing!
• A	
  CA	
  can	
  sign	
  for	
  ANY	
  domain,	
  and	
  for	
  the	
  browser	
  it’s	
  
enough	
  to	
  find	
  one	
  CA	
  vouching	
  for	
  a	
  given	
  combination	
  
of	
  domain	
  and	
  IP	
  	
  
This	
  is	
  the	
  list	
  of	
  TAs	
  
trusted	
  by	
  default by	
  the	
  
latest	
  version	
  of	
  Firefox.	
  
And	
  there	
  is	
  one	
  hole	
  more...
• Any web	
  browsing	
  starts	
  with	
  a	
  DNS	
  query
1. DNS	
  query	
  for	
  www.google.com
2. TCP	
  connection	
  to	
  IP	
  obtained	
  in	
  
(1)
3. Hopefully,	
  SSL	
  handshake
4. Data	
  flows
Even	
  if	
  all	
  the	
  certificates	
  and	
  SSL	
  
servers	
  are	
  configured	
  perfectly,	
  
there	
  is	
  still	
  at	
  least	
  one	
  insecure	
  
DNS	
  query
Enabling DNSSEC for	
  the	
  server	
  domain	
  secures	
  
the	
  query.
Without	
  DNSSEC	
  no	
  connection	
  is	
  fully	
  secured	
  
even	
  if	
  all	
  certificates	
  look	
  fine.
Enter	
  DANE
To	
  Keep	
  in	
  Mind
• TLS	
  secures	
  communications,	
  prevents	
  
eavesdropping,	
  allows	
  server	
  identification
• When	
  a	
  client	
  (C)	
  connects	
  to	
  a	
  TLS-­‐protected	
  
server	
  (S):
• S	
  presents	
  C	
  with	
  a	
  X.509	
  certificate
• C	
  must	
  check	
  whether:
• Does	
  the	
  certificate	
  contain	
  the	
  correct	
  server	
  name?
• Does	
  the	
  certificate	
  contain	
  the	
  correct	
  IP	
  address?
• Is	
  the	
  server	
  certificate	
  signed	
  by	
  a	
  CA	
  I	
  trust	
  ?
DANE	
  – The	
  TLSA	
  DNS	
  Record
What	
  if…	
  I	
  could	
  publish	
  my	
  
digital	
  certificates	
  in	
  the	
  DNS	
  
itself	
  ?	
  
From	
  this	
  point	
  we	
  assume	
  
all	
  DNS	
  zones	
  are	
  DNSSEC-­‐
signed.	
  
DANE	
  – The	
  TLSA	
  DNS	
  Record
; Zone example.com - Signed with DNSSEC
example.com IN SOA (...)
IN NS ….
IN DNSKEY ...
www.example.com. IN A 10.0.0.1
_443._tcp.www.example.com. IN TLSA ….
From	
  this	
  point	
  we	
  
assume	
  all	
  DNS	
  zones	
  
are	
  DNSSEC-­‐signed.	
  
TLSA	
  Record	
  Overview
• The	
  TLSA	
  DNS	
  record	
  is	
  our	
  friend!
• Contains	
  information	
  binding	
  keys	
  or	
  certificates	
  to	
  
domain	
  names	
  and	
  DNS	
  zones
• Four	
  fields:
• Certificate	
  usage	
  field
• Selector	
  field
• Matching	
  type	
  field
• DATA
_443._tcp.www.example.com IN TLSA
3 1 1 DATA
“3” - Certificate usage field
“1” - Selector field
“1” - Matching type field
DATA - Depends on the values of
the above
DANE	
  Use	
  Cases
• Now	
  the	
  operator	
  of	
  a	
  TLS-­‐enabled	
  server	
  can:
• publish	
  a	
  complete	
  certificate	
  on	
  the	
  DNS
• refer	
  in	
  the	
  DNS	
  to	
  a	
  CA	
  that	
  can	
  validate	
  the	
  certs	
  
within	
  that	
  domain
1-­‐Slide	
  DANE	
  HOW-­‐TO
• Sign	
  your	
  zone	
  with	
  DNSSEC
• Configure	
  ‘HTTPS’	
  in	
  your	
  web	
  server
• Create	
  a	
  digital	
  certificate	
  yourself	
  using	
  OpenSSL
• Configure	
  Apache	
  or	
  your	
  web	
  server	
  of	
  choice
• Create	
  TLSA	
  records	
  using	
  ldns-­‐dane
• http://www.nlnetlabs.nl/projects/ldns/
• There	
  are	
  other	
  tools	
  out	
  there,	
  I	
  just	
  found	
  this	
  one	
  to	
  
be	
  easy	
  to	
  use
• Add	
  the	
  TLSA	
  records	
  to	
  your	
  DNS	
  zone	
  and	
  re-­‐sign
• Wait	
  for	
  TTLs	
  to	
  expire….	
  et	
  voilá!
Browser	
  Support	
  Via	
  Plugins
• CZ.NIC	
  has	
  implemented	
  a	
  nice	
  set	
  of	
  plugins	
  for	
  
validating	
  https	
  connections	
  with	
  DANE	
  and	
  for	
  
validating	
  DNSSEC
LACNICLabs Site	
  Before	
  DANE
• Certificate	
  is	
  not	
  
trusted
• It’s	
  not	
  signed	
  by	
  
any	
  known	
  CA
LACNICLabs After	
  DANE
• Validated!
Drawbacks	
  ?	
  Sure…
• There	
  is	
  a	
  bit	
  of	
  a	
  learning	
  curve
• Browser	
  support,	
  still	
  in	
  its	
  infancy
• Application	
  support	
  in	
  general
• Dependent	
  on	
  DNSSEC	
  adoption
Thanks!

More Related Content

PDF
getdns PyCon presentation
PPTX
Hack Proof: Software Design for a Hostile Internet
PPTX
ION Hangzhou - How to Deploy DNSSEC
PDF
Sullivan randomness-infiltrate 2014
PDF
Monitoring for DNS Security
PPTX
ION Bucharest - DANE-DNSSEC-TLS
PDF
DANE and Application Uses of DNSSEC
PPTX
OpenSSL
getdns PyCon presentation
Hack Proof: Software Design for a Hostile Internet
ION Hangzhou - How to Deploy DNSSEC
Sullivan randomness-infiltrate 2014
Monitoring for DNS Security
ION Bucharest - DANE-DNSSEC-TLS
DANE and Application Uses of DNSSEC
OpenSSL

What's hot (20)

PDF
BlueHat v17 || 28 Registrations Later: Measuring the Exploitation of Residual...
PDF
Sullivan white boxcrypto-baythreat-2013
PDF
Sullivan handshake proxying-ieee-sp_2014
PDF
Sullivan red october-oscon-2014
PPTX
ION Sri Lanka - DANE: The Future of TLS
PDF
Carlos García - Pentesting Active Directory Forests [rooted2019]
PDF
RSA APJ Velociraptor Lab
PDF
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
PPTX
OWASP Atlanta 2018: Forensics as a Service
PPTX
ION Tokyo: The Business Case for DNSSEC and DANE, Dan York
PDF
Secure Redis Cluster At Box: Vova Galchenko, Ravitej Sistla
PDF
DNS-OARC-36: Measurement of DNSSEC Validation with RSA-4096
PDF
Running Secure Server Software on Insecure Hardware Without Parachute
PDF
F5 TLS & SSL Practices
PDF
Webinar SSL English
PPTX
Detecting Malicious SSL Certificates Using Bro
PPT
Sniffing SSL Traffic
PDF
TLS/SSL Protocol Design
PPTX
DNS Security, is it enough?
PDF
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
BlueHat v17 || 28 Registrations Later: Measuring the Exploitation of Residual...
Sullivan white boxcrypto-baythreat-2013
Sullivan handshake proxying-ieee-sp_2014
Sullivan red october-oscon-2014
ION Sri Lanka - DANE: The Future of TLS
Carlos García - Pentesting Active Directory Forests [rooted2019]
RSA APJ Velociraptor Lab
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
OWASP Atlanta 2018: Forensics as a Service
ION Tokyo: The Business Case for DNSSEC and DANE, Dan York
Secure Redis Cluster At Box: Vova Galchenko, Ravitej Sistla
DNS-OARC-36: Measurement of DNSSEC Validation with RSA-4096
Running Secure Server Software on Insecure Hardware Without Parachute
F5 TLS & SSL Practices
Webinar SSL English
Detecting Malicious SSL Certificates Using Bro
Sniffing SSL Traffic
TLS/SSL Protocol Design
DNS Security, is it enough?
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
Ad

Similar to An Introduction to DANE - Securing TLS using DNSSEC (20)

PPTX
ION Cape Town - DANE: The Future of Transport Layer Security (TLS)
PDF
ION Santiago - DNSSEC and DANE Based Security for TLS
PPTX
PDF
Introduction To The DANE Protocol (DNSSEC)
PDF
Geoff Huston's presentation on DANE (Keys in the DNS) at the New Zealand Inte...
PDF
SSL State of the Union
PPTX
Certificate pinning in android applications
PDF
Some tales about TLS
PDF
Computer network (4)
PDF
DNS based Authentication of Named Entities (DANE)
PPT
PDF
Certificate Management on pfSense 2.4 - pfSense Hangout September 2017
ODP
SSL certificates
PDF
SSL and TLS Theory and Practice 3rd Edition Rolf Oppliger
PPTX
ION Bucharest - Deploying DNSSEC
PDF
SSL, X.509, HTTPS - How to configure your HTTPS server
PPT
Ch12 Cryptographic Protocols and Public Key Infrastructure
PPTX
Demystfying secure certs
ION Cape Town - DANE: The Future of Transport Layer Security (TLS)
ION Santiago - DNSSEC and DANE Based Security for TLS
Introduction To The DANE Protocol (DNSSEC)
Geoff Huston's presentation on DANE (Keys in the DNS) at the New Zealand Inte...
SSL State of the Union
Certificate pinning in android applications
Some tales about TLS
Computer network (4)
DNS based Authentication of Named Entities (DANE)
Certificate Management on pfSense 2.4 - pfSense Hangout September 2017
SSL certificates
SSL and TLS Theory and Practice 3rd Edition Rolf Oppliger
ION Bucharest - Deploying DNSSEC
SSL, X.509, HTTPS - How to configure your HTTPS server
Ch12 Cryptographic Protocols and Public Key Infrastructure
Demystfying secure certs
Ad

More from Carlos Martinez Cagnazzo (20)

PDF
¿Como continuar y escalar la operación de un ISP sin IPv4?
PDF
Como brindar servicio de Internet (casi) sin IPv4
PDF
Evolución del stack de protocolos de Internet - IPv6 y QUIC
PDF
RPKI en America Latina y el Caribe
PDF
The End of IPv4: What It Means for Incident Responders
PDF
Evolución de Protocolos de Internet 2017
PDF
Actualización sobre DNS en el IETF para LACNIC 28
PPTX
IPv6 Routing Table Prefix Size Analysis
PPT
Internet of Things en el Dia de Internet
PDF
Monitoreo de Red para Peering
PPTX
An IPv6 Primer
PPTX
Introduccion a RPKI - Certificacion de Recursos de Internet
PPTX
Enabling IPv6 Services Transparently
PPTX
LACNOG - Logging in the Post-IPv4 World
PPTX
Seguridad de la Información para Traductores
PPTX
Mitigación de denegaciones de servicio en DNS con RRL
PDF
An Overview of DNSSEC
PDF
An Overview of RPKI
PDF
IPv6 Transition Considerations for ISPs
PPTX
Una introduccion a IPv6
¿Como continuar y escalar la operación de un ISP sin IPv4?
Como brindar servicio de Internet (casi) sin IPv4
Evolución del stack de protocolos de Internet - IPv6 y QUIC
RPKI en America Latina y el Caribe
The End of IPv4: What It Means for Incident Responders
Evolución de Protocolos de Internet 2017
Actualización sobre DNS en el IETF para LACNIC 28
IPv6 Routing Table Prefix Size Analysis
Internet of Things en el Dia de Internet
Monitoreo de Red para Peering
An IPv6 Primer
Introduccion a RPKI - Certificacion de Recursos de Internet
Enabling IPv6 Services Transparently
LACNOG - Logging in the Post-IPv4 World
Seguridad de la Información para Traductores
Mitigación de denegaciones de servicio en DNS con RRL
An Overview of DNSSEC
An Overview of RPKI
IPv6 Transition Considerations for ISPs
Una introduccion a IPv6

Recently uploaded (20)

PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Well-logging-methods_new................
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPT
Project quality management in manufacturing
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Well-logging-methods_new................
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Operating System & Kernel Study Guide-1 - converted.pdf
Structs to JSON How Go Powers REST APIs.pdf
UNIT 4 Total Quality Management .pptx
Lecture Notes Electrical Wiring System Components
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
bas. eng. economics group 4 presentation 1.pptx
Project quality management in manufacturing
Embodied AI: Ushering in the Next Era of Intelligent Systems
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Lesson 3_Tessellation.pptx finite Mathematics

An Introduction to DANE - Securing TLS using DNSSEC

  • 1. A  Tutorial  Introduction   to  DANE Jan  Zorz /  ISOC Carlos  Martinez  /  LACNIC
  • 2. Mechanics  of  Web  Browsing • Security? 1. DNS  query  for   www.google.com 2. TCP  connection  to  IP   obtained  in  (1) 3. Data  flows  in  plain  text Data  flowing  in  plain  text?  That  can  be   solved  by  encrypting  the  connection,  right   ?   Enter  TLS,  Transport  Layer  Security
  • 3. Securing  and  Authenticating   Endpoints Application TLS   Handshake TLS  Record  Protocol TCP IP Link  and  Physical  Layers Application TLS   Handshake TLS  Record  Protocol TCP IP Link  and  Physical  Layers
  • 5. Digital  Certificates • A  Public  Key  Certificate  is  a  digital  document  that  binds   a  set  of  information  (fields)  with  a  public  key  and  is   digitally  signed. • Signatures  can  be  either  be  performed  by  a  third  party   or  by  the  issuer  itself  (self-­‐signed  certificates) • Validation • Observers  can  verify  the  digital  signature  of  the  certificate • Trust • Certificate  Authority  model • Signature  verification  is  followed  up  a  chain  until  reaching  a   commonly  agreed  trust  anchor
  • 6. Digital  Certificates  (2) • Fields  and  flags  in  a  certificate  define  how,  where  and   when  the  certificate  can  be  used  and  define    is  valid  to   be  used • Valid-­‐from,  Valid-­‐until  times • Express  constraints  on  usage • Extensions • Lists  of  [type-­‐value-­‐critical_flag] • Examples • Key  usage • Extended  key  usage  (clientAuth,  serverAuth,  emailProtection,   ...  ) • RFC  3779  (Internet  number  resources)
  • 7. Trust  Chain I’m  Carlos S4 I’m  LACNIC S3 Kpriv3 I’m  the  CA2 S2 Kpriv2 I’m  the   United   Nations S1 Kpriv1 I’m  Jan S7 I’m  Go6Labs S6 Kpriv6 I’m  the  ISOC S5 Kpriv5 ● Certs  are  public ● Private  keys  are  not   published,  but  held  by  their   owners  and  used  for  signing   when  needed ● A  common  root  serves  as   the  agreed  trust  anchor
  • 8. Drawbacks  of  the  CA-­‐Based  Chain • Trust  anchors  can  (and  have  been)  successfully  attacked   • DigiNotar,  GlobalSign,  DigiCert Malaysia  are  just  some  examples • The  process  that  CAs  use  to  validate  information  provided   by  customers  can  be  subverted • CAs  are  slow  to  react  when  a  certificate  is  compromised • The  revocation  process  can  be  slow  and  is  based  on  the   concept  of  CRLs  that  have  to  be  downloaded  and  are  re-­‐ created  every  few  hours • [Check  https://tools.ietf.org/html/draft-­‐housley-­‐web-­‐pki-­‐ problems-­‐00 ]
  • 9. The  DigiNotar Debacle • [https://www.enisa.europa.eu/media/news-­‐ items/operation-­‐black-­‐tulip]  
  • 10. Shortcomings  of  the  Traditional  CA   Model • The  attack  surface  is  huge  and  growing! • A  CA  can  sign  for  ANY  domain,  and  for  the  browser  it’s   enough  to  find  one  CA  vouching  for  a  given  combination   of  domain  and  IP     This  is  the  list  of  TAs   trusted  by  default by  the   latest  version  of  Firefox.  
  • 11. And  there  is  one  hole  more... • Any web  browsing  starts  with  a  DNS  query 1. DNS  query  for  www.google.com 2. TCP  connection  to  IP  obtained  in   (1) 3. Hopefully,  SSL  handshake 4. Data  flows Even  if  all  the  certificates  and  SSL   servers  are  configured  perfectly,   there  is  still  at  least  one  insecure   DNS  query Enabling DNSSEC for  the  server  domain  secures   the  query. Without  DNSSEC  no  connection  is  fully  secured   even  if  all  certificates  look  fine.
  • 13. To  Keep  in  Mind • TLS  secures  communications,  prevents   eavesdropping,  allows  server  identification • When  a  client  (C)  connects  to  a  TLS-­‐protected   server  (S): • S  presents  C  with  a  X.509  certificate • C  must  check  whether: • Does  the  certificate  contain  the  correct  server  name? • Does  the  certificate  contain  the  correct  IP  address? • Is  the  server  certificate  signed  by  a  CA  I  trust  ?
  • 14. DANE  – The  TLSA  DNS  Record What  if…  I  could  publish  my   digital  certificates  in  the  DNS   itself  ?   From  this  point  we  assume   all  DNS  zones  are  DNSSEC-­‐ signed.  
  • 15. DANE  – The  TLSA  DNS  Record ; Zone example.com - Signed with DNSSEC example.com IN SOA (...) IN NS …. IN DNSKEY ... www.example.com. IN A 10.0.0.1 _443._tcp.www.example.com. IN TLSA …. From  this  point  we   assume  all  DNS  zones   are  DNSSEC-­‐signed.  
  • 16. TLSA  Record  Overview • The  TLSA  DNS  record  is  our  friend! • Contains  information  binding  keys  or  certificates  to   domain  names  and  DNS  zones • Four  fields: • Certificate  usage  field • Selector  field • Matching  type  field • DATA _443._tcp.www.example.com IN TLSA 3 1 1 DATA “3” - Certificate usage field “1” - Selector field “1” - Matching type field DATA - Depends on the values of the above
  • 17. DANE  Use  Cases • Now  the  operator  of  a  TLS-­‐enabled  server  can: • publish  a  complete  certificate  on  the  DNS • refer  in  the  DNS  to  a  CA  that  can  validate  the  certs   within  that  domain
  • 18. 1-­‐Slide  DANE  HOW-­‐TO • Sign  your  zone  with  DNSSEC • Configure  ‘HTTPS’  in  your  web  server • Create  a  digital  certificate  yourself  using  OpenSSL • Configure  Apache  or  your  web  server  of  choice • Create  TLSA  records  using  ldns-­‐dane • http://www.nlnetlabs.nl/projects/ldns/ • There  are  other  tools  out  there,  I  just  found  this  one  to   be  easy  to  use • Add  the  TLSA  records  to  your  DNS  zone  and  re-­‐sign • Wait  for  TTLs  to  expire….  et  voilá!
  • 19. Browser  Support  Via  Plugins • CZ.NIC  has  implemented  a  nice  set  of  plugins  for   validating  https  connections  with  DANE  and  for   validating  DNSSEC
  • 20. LACNICLabs Site  Before  DANE • Certificate  is  not   trusted • It’s  not  signed  by   any  known  CA
  • 22. Drawbacks  ?  Sure… • There  is  a  bit  of  a  learning  curve • Browser  support,  still  in  its  infancy • Application  support  in  general • Dependent  on  DNSSEC  adoption