SlideShare a Scribd company logo
DNSSEC Deployment Introduction
2016-07
OUTLINE
DNSSEC Deployment
Introduction
1、Brief Introduction
2、Preparation
3、Process
4、Strategy
5、Influence
OUTLINE
DNSSEC Deployment
Introduction
1、Brief Introduction
2、Preparation
3、Process
4、Strategy
5、Influence
1.1. DNSSEC
• DNS Security Extensions
• A system to verify the authenticity of DNS “Data”
• Detecting cache poisoning, MITM…
• Data origin authentication and data integrity
• Authenticating name and type non-existence
1.2. Progress
• 1378 TLDs in the root zone in total
• 1223 TLDs are signed
• 1213 TLDs have trust anchors
published as DS records in the root
zone
• 5 TLDs have trust anchors
published in the ISC DLV
Repository
1.3. Timeline
Experimental
Announced
Partial
DS in Root
Operational
Internal
experimentation
Public
commitment
to deploy
Zone is signed
but not in
operation
Zone is signed
and its DS has
been published
Accepting signed
delegations and
DS in root
1.3. Timeline
• 2010-12~
2013-03
Experimental
• 2013-04
Announced
• 2013-08
Partial
• 2013-09
DS in Root
• 2013-12
Operational
Experimental:
 Software development
 Risk analysis
Announced:
 Hardware & software deployment
 Training and drills
Partial:
 Signed & roller
 Observation & verification
DS in Root:
 Generation & submission
 Observation & verification
Operational:
 Development and upgrades
 Debugging
OUTLINE
DNSSEC Deployment
Introduction
1、Brief Introduction
2、Preparation
3、Process
4、Strategy
5、Influence
2.1. Test-bed
1. Simulate the real
environment
2. DNS system
3. EPP
4. Sign zone
5. Key rotation
6. Emergency
response
7. …
HSM
FW
FW
USER REGISTRAR RT
FW
LB
SW
SW
DB SERVER
SERVERs
2.2. Upgrading & Survey
1. Data packet increase
2. Insufficient memory
3. Network bandwidth
4. EDNS0
5. TCP
6. …
1. DNS server
2. Router
3. Firewall
4. Switch
5. Load-balance
6. …
2.3. Documents & Training
1. Deployment scheme
a) Make technical details clear
b) Arrange every task to people
c) Promote the work by time
2. Emergency plan
3. DPS
4. …
1. Basic knowledges about
DNSSEC
2. Operational skills
3. Emergency response
4. …
AnnouncedExperimental
OUTLINE
DNSSEC Deployment
Introduction
1、Brief Introduction
2、Preparation
3、Process
4、Strategy
5、Influence
3.1. Keys
• Key type, algorithm and lens
Key Type Function Algorithm Lens NSEC/NSEC3
ZSK Sign RRSET
RSA-SHA256
1024
NSEC3
KSK Sign DNSKEY RRSET 2048
• Key rollover cycle and RRSIG period
Key Type Period Roll Overlap RRSIG Period
ZSK 100 day 90 day 10 day
30 day
KSK 13 month 12 month 30 day
• Different types of zones use different key pairs
3.2. DNSSEC Environment
HSM
FW
FW
RT
FW
LB
SW
SW
DB SERVER
SITEs
SERVERs
SERVERs
3.3. Switching Scheme
1. Several sites using anycast
2. On-line switching
3. Immediate verification
a) Part of servers received DNSSEC
zone data
b) Verify data
c) Online
d) No-dnssec off-line
e) Repeat
3.4. Emergency Response Strategy
1. Emergency response strategy for every step;
2. Anycast ensure the availability of service;
3. If DNSSEC service in the main operation center is
down, secondary operation center can take over the
service shortly;
4. If DNSSEC service in sites is down, DNS service
(without DNSSEC) can take over the service in 10
minute;
5. Comprehensive checking mechanism.
3.5. Submit DS in Root
1. Email
2. Online system
3. Check, check, check…
4. Validation
Partial DS in Root
3.6. Commands
• Recursive • Authority
options {
dnssec-enable yes;
dnssec-validation auto;
dnssec-lookaside auto;
};
trusted-keys {
. 257 3 8 “AwEAAag……1ihz0=”;
};
options {
dnssec-enable yes;
};
dnssec-keygen ……
dnssec-signzone ……
>***.zone.signed
zone “example.com” {
type master;
file “zones/example.com/***.zone.signed”;
key-directory “keys/”;
};
OUTLINE
DNSSEC Deployment
Introduction
1、Brief Introduction
2、Preparation
3、Process
4、Strategy
5、Influence
• Zone signing is recommended to be executed in the HSM, the
basic procedures are as follows:
a) The primary master obtains RR from the registration database and
generates the original zone file;
b) The hidden primary master sends the original zone file to HSM;
c) HSM read the right keys;
d) HSM sign zone using keys;
e) HSM sends the signed
zone back to the hidden
primary master;
f) The signed zone are loaded onto
hidden primary master, which will
update to secondary
master servers.
4.1. Zone Signing
4.2. Key Rollover
ZSK
• To prevent the keys from being cracked or
leaked out, ZSK should be replaced and
rotated on a regular basis;
• The ZSK roll-over policy is to adopt a pre-
publish mechanism (RFC4641);
• The validity period of each ZSK generated is
100 days and the roll-over cycle is 90 days.
KSK
• To prevent the keys from being cracked or
leaked out, ZSK should be replaced and
rotated on a regular basis;
• The ZSK roll-over policy is to adopt a pre-
publish mechanism (RFC4641);
• The validity period of each ZSK generated is
100 days and the roll-over cycle is 90 days.
4.2. Key Rollover
• Steps (KSK)
• New KSK generation, resigning the zone with ZSK, KSK_old and
KSK_new
• Submit new DS to root & delete old DS
• KSK_old Revoke
• KSK_old delete
KSK_1
KSK_old
KSK_new Active
KSK_old Revoke
KSK_new
KSK_old Delete
KSK_new
300
days
KSK_new
KSK_new_2 Active
35
days
30
days
1 2 3
4.3. Key management
1. Key pairs generation offline
2. Key pairs backup online/offline
3. Private key protection
4. Key pairs management document/system
4.4. Security consideration
1. Physical Controls
 Electromagnetic shielding
 Physical access management
 Different roles for different tasks
 Teamwork
 Procedural Controls
2. Technical Controls
 Certifications
 Network controls: FW, ACL, VLAN
 Software controls: Versions, Bugs, documents
OUTLINE
DNSSEC Deployment
Introduction
1、Brief Introduction
2、Preparation
3、Process
4、Strategy
5、Influence
5.1. Size
• Zone Size
− Opt-out
− Increased a little (7%)
• Packet Size
− RRSIG
− 2.5 times larger in average
Zone Size
No DNSSEC 700
DNSSEC 750
1
201
401
601
No DNSSEC DNSSEC
Mb
Packet size
No DNSSEC 170
DNSSEC 423
1
201
401
601
No DNSSEC DNSSEC
Byte• 73% DNSSEC query in usual
• After sub-domain and recursive nameservers
implemented DNSSEC, bandwidth costs will
be much larger
5.2. Challenge
DDoS Attack
• QpS increased to 2.4 times larger
• Packet size increased to 700 Byte
average (1.65 times)
• Bandwidth reach 4 (2.4*1.65) times
larger than usual
Packet size
Usual 423
Attack 700
423
700
1
101
201
301
401
501
601
701
Usual Attack
Byte
Sharing
• http://www.internetsociety.org/deploy360/dnssec/
• http://www.nlnetlabs.nl/publications/dnssec_howto/
• http://stats.research.icann.org/dns/tld_report/
• http://www.nlnetlabs.nl/projects/dnssec/
• http://www.dnssec-deployment.org/
• https://www.iana.org/dnssec/
• http://dnssec-debugger.verisignlabs.com/
• https://www.opendnssec.org/
• zhaoqi@cnnic.cn
Information Sharing
Thank you!
Questions?
北京市海淀区中关村南四街四号中科院软件园 邮编: 100190
www.cnnic.cn

More Related Content

PDF
IPv6 Threat Presentation
PDF
ION Hangzhou - Why Deploy DNSSEC?
PDF
DNS Security
PPTX
DNS Security Presentation ISSA
PDF
DNSSEC Validation Tutorial
PDF
Monitoring for DNS Security
PPTX
DNS Security, is it enough?
PPT
DNS Security Threats and Solutions
IPv6 Threat Presentation
ION Hangzhou - Why Deploy DNSSEC?
DNS Security
DNS Security Presentation ISSA
DNSSEC Validation Tutorial
Monitoring for DNS Security
DNS Security, is it enough?
DNS Security Threats and Solutions

What's hot (20)

PPTX
ION Bucharest - Deploying DNSSEC
PDF
ION Islamabad - Deploying DNSSEC
PPTX
Dns security threats and solutions
PPTX
Advanced DNS Protection
PPTX
ION Bucharest - DANE-DNSSEC-TLS
PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PDF
An Overview of DNSSEC
PDF
An Introduction to DANE - Securing TLS using DNSSEC
PDF
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
PPTX
Infoblox Secure DNS Solution
PPTX
Next generation storage: eliminating the guesswork and avoiding forklift upgrade
PDF
Infoblox Cloud Solutions - Cisco Mid-Atlantic User Group
PDF
getdns PyCon presentation
PDF
RSA APJ Velociraptor Lab
PDF
Introduction To The DANE Protocol (DNSSEC)
PDF
ION Islamabad - DANE/DNSSEC/TLS Testing in the go6lab
PPTX
ION Sri Lanka - DANE: The Future of TLS
PDF
PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSEC
PPTX
ION Sri Lanka - Why Implement DNSSEC?
PPTX
ION Sri Lanka - DNSSEC at LK Domain Registry
ION Bucharest - Deploying DNSSEC
ION Islamabad - Deploying DNSSEC
Dns security threats and solutions
Advanced DNS Protection
ION Bucharest - DANE-DNSSEC-TLS
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
An Overview of DNSSEC
An Introduction to DANE - Securing TLS using DNSSEC
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
Infoblox Secure DNS Solution
Next generation storage: eliminating the guesswork and avoiding forklift upgrade
Infoblox Cloud Solutions - Cisco Mid-Atlantic User Group
getdns PyCon presentation
RSA APJ Velociraptor Lab
Introduction To The DANE Protocol (DNSSEC)
ION Islamabad - DANE/DNSSEC/TLS Testing in the go6lab
ION Sri Lanka - DANE: The Future of TLS
PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSEC
ION Sri Lanka - Why Implement DNSSEC?
ION Sri Lanka - DNSSEC at LK Domain Registry
Ad

Similar to ION Hangzhou - How to Deploy DNSSEC (20)

PDF
Technical and Business Considerations for DNSSEC Deployment
PDF
Introduction DNSSec
PDF
2017 DNSSEC KSK Rollover
PDF
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
PDF
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
PDF
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
PDF
MENOG6 Root Signing
PDF
Rootsign menog6-overview
PDF
8 technical-dns-workshop-day4
PDF
DNS & DNSSEC
PDF
Hardening the Core of the Internet
PDF
Understanding DNSSEC in Windows DNS Server
PPTX
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
PDF
DNSSEC in Windows DNS Server
PDF
NANOG 74: That KSK Roll
PDF
Signing DNSSEC answers on the fly at the edge: challenges and solutions
PDF
Rolling the Root Zone DNSSEC Key Signing Key
PDF
2017 DNSSEC KSK Rollover
PDF
Building Trust into DNS: Key Strategies
PDF
Dnssec root-lacnog
Technical and Business Considerations for DNSSEC Deployment
Introduction DNSSec
2017 DNSSEC KSK Rollover
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
MENOG6 Root Signing
Rootsign menog6-overview
8 technical-dns-workshop-day4
DNS & DNSSEC
Hardening the Core of the Internet
Understanding DNSSEC in Windows DNS Server
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
DNSSEC in Windows DNS Server
NANOG 74: That KSK Roll
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Rolling the Root Zone DNSSEC Key Signing Key
2017 DNSSEC KSK Rollover
Building Trust into DNS: Key Strategies
Dnssec root-lacnog
Ad

More from Deploy360 Programme (Internet Society) (20)

PDF
ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
PPTX
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
PPTX
ION Belgrade - IETF Update
PPTX
ION Belgrade - Opening Slides
PPTX
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
PPTX
ION Belgrade - Closing Slides
PDF
AusNOG - Two Years of Good MANRS
PPTX
PPTX
ION Malta - MANRS Introduction
PPTX
ION Malta - Introduction to DNSSEC
PPTX
ION Malta - DANE: The Future of TLS
PPTX
ION Malta - IANA Transition Roles & Accountability
PDF
ION Malta - IPv6 Case Study: Finland
PDF
ION Malta - Seeweb Thoughts on IPv6 Transition
PDF
ION Malta - Seeweb Why MANRS is good for you
PPTX
ION Malta - Opening Slides
PPTX
ION Malta - Closing Slides
PPTX
ION Durban - How peering behaviour affects growth of the internet
PPTX
ION Durban - Introduction to ISOC Gauteng Chapter
PPTX
ION Durban - What's Happening at the IETF?
ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - IETF Update
ION Belgrade - Opening Slides
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - Closing Slides
AusNOG - Two Years of Good MANRS
ION Malta - MANRS Introduction
ION Malta - Introduction to DNSSEC
ION Malta - DANE: The Future of TLS
ION Malta - IANA Transition Roles & Accountability
ION Malta - IPv6 Case Study: Finland
ION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Why MANRS is good for you
ION Malta - Opening Slides
ION Malta - Closing Slides
ION Durban - How peering behaviour affects growth of the internet
ION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - What's Happening at the IETF?

Recently uploaded (20)

PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
cuic standard and advanced reporting.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Weekly Chronicles - August'25 Week I
Unlocking AI with Model Context Protocol (MCP)
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectral efficient network and resource selection model in 5G networks
cuic standard and advanced reporting.pdf
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation_ Review paper, used for researhc scholars
Diabetes mellitus diagnosis method based random forest with bat algorithm
sap open course for s4hana steps from ECC to s4
MYSQL Presentation for SQL database connectivity
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

ION Hangzhou - How to Deploy DNSSEC

Editor's Notes

  • #2: Project Planning and Design Group Responsible for the DNSSEC deployment of “.CN” and “.中国” Hope we have a great time
  • #3: Seminar Now, let me introduce the OUTLINE of this seminar First,
  • #4: Seminar Now, let me introduce the OUTLINE of this seminar First,
  • #9: Seminar Now, let me introduce the OUTLINE of this seminar First,
  • #13: Seminar Now, let me introduce the OUTLINE of this seminar First,
  • #14: All pairs of keys (ZSK and KSK) in use are generated in the HSM in a secure way. The cryptographic module meets the standard of Chinese authorities and relevant international standards. Five key administrators account are generated during the HSM initialization process, and only more than half of them have passed identity authentication can the HSM be accessed. Generation of keys is performed by well-trained key administrators. At least three key administrators (Appointing at least two system administrators and at least one System operator is allowed in an emergency situation) will be involved in the entire process of key generation and designated auditing personnel will be present to supervise and record the process.
  • #15: All pairs of keys (ZSK and KSK) in use are generated in the HSM in a secure way. The cryptographic module meets the standard of Chinese authorities and relevant international standards. Five key administrators account are generated during the HSM initialization process, and only more than half of them have passed identity authentication can the HSM be accessed. Generation of keys is performed by well-trained key administrators. At least three key administrators (Appointing at least two system administrators and at least one System operator is allowed in an emergency situation) will be involved in the entire process of key generation and designated auditing personnel will be present to supervise and record the process.
  • #19: All pairs of keys (ZSK and KSK) in use are generated in the HSM in a secure way. The cryptographic module meets the standard of Chinese authorities and relevant international standards. Five key administrators account are generated during the HSM initialization process, and only more than half of them have passed identity authentication can the HSM be accessed. Generation of keys is performed by well-trained key administrators. At least three key administrators (Appointing at least two system administrators and at least one System operator is allowed in an emergency situation) will be involved in the entire process of key generation and designated auditing personnel will be present to supervise and record the process.
  • #20: Seminar Now, let me introduce the OUTLINE of this seminar First,
  • #21: The hidden primary master obtains resource records from the “.CN” registration database and generates the original zone file; The hidden primary master securely sends the original zone file to HSM; HSM reads the configuration files for zone signing and generates the keys needed, including KSK and ZSK; HSM executes zone signing using ZSK and KSK; When zone signing is completed, HSM sends the files that have been signed back to the hidden primary master; The zone files that have been signed are loaded onto the hidden primary master, which will then update data to the secondary master servers.
  • #24: All pairs of keys (ZSK and KSK) in use are generated in the HSM in a secure way. The cryptographic module meets the standard of Chinese authorities and relevant international standards. Five key administrators account are generated during the HSM initialization process, and only more than half of them have passed identity authentication can the HSM be accessed. Generation of keys is performed by well-trained key administrators. At least three key administrators (Appointing at least two system administrators and at least one System operator is allowed in an emergency situation) will be involved in the entire process of key generation and designated auditing personnel will be present to supervise and record the process.
  • #25: All pairs of keys (ZSK and KSK) in use are generated in the HSM in a secure way. The cryptographic module meets the standard of Chinese authorities and relevant international standards. Five key administrators account are generated during the HSM initialization process, and only more than half of them have passed identity authentication can the HSM be accessed. Generation of keys is performed by well-trained key administrators. At least three key administrators (Appointing at least two system administrators and at least one System operator is allowed in an emergency situation) will be involved in the entire process of key generation and designated auditing personnel will be present to supervise and record the process.
  • #26: Seminar Now, let me introduce the OUTLINE of this seminar First,
  • #27: this slide shows the real change which occurred in .cn. DNSSEC bring us bigger zone size and packet size. luckly we use opt-out to reduce the zone size increase in the begging of deployment of .cn, it shows in picture1 that it only increase 50 Megabits; But because the rrsig of the record, the response packet size increased to 2.5 times than noDNSSEC! In order to make further inferences[ˈinfərənsiz] , we analysis the real traffic in CN, that there are already 68% dnssec query in usual! It’s the reason that the packet size increased to much larger than before! It can be deduced that After sub-domain and recursive nameservers having been implemented DNSSEC, bandwidth costs will be much larger But why there is so much dnssec query now? it requires us to do further research…
  • #28: The last slide shows a small size ddos attack Recently The qps increased to 2.4 times larger than usual, and Packet size increased to 700 Byte average (which is 1.65 times larger than usual), so the Bandwidth reach 4 (2.4*1.65) times. It shows that After sub-domain and recursive nameservers having been implemented DNSSEC, the ddos attack Will cause a greater threat to cn. So there is 3 challenges that we must faced, How to push Second-tld open DNSSEC? How to push Recursive open DNSSEC? And How to face the pressure after 1) and 2)? We have much more work to do…