SlideShare a Scribd company logo
Technical and Business
Considerations for
DNSSEC Depolyment
Jim Reid
jim@rfc1035.com
Objectives
• Understanding the main technical & business impacts
• Are these helping or hindering DNSSEC deployment?
• What could or should be done to improve things?
TECHNICAL
CONSIDERATIONS
AND MYTHS
Zone size
CPU load
Traffic levels, need for rate-limiting & traffic shaping
Key rotation (rollover)
Tooling & debugging
Use cases
Zone & Cache Size
• Signed zones are typically 5-10 times larger than
unsigned ones
• Approximately 4 times as many resource records
• RRSIGs are big
• So what?
• Commodity RAM is cheap: ~$20 for 4GB of DDR3
• Disk space is cheap too: 1TB costs ~$50
• Name server’s RAM footprint might be an issue
CPU Load Considerations
• 1024-bit RSASHA1 keys, 3GHz Xeon, 1 CPU
• Signing:
• ~1800 signatures/second
• Validation:
• ~24,000 validations/second
• Off-the-shelf hardware & software should be good
enough most (or all?) of the time
Network Considerations
• DNSSEC requires EDNS0
• DO bit, larger payloads, etc.
• Want to avoid truncation in both DNS response and the
underlying MTU for packets/frames
• Lots of broken stuff assumes DNS only goes over
UDP and always has packets < 512 bytes
• DNSSEC kills these false assumptions
• Firewalls sometimes get misconfigured like this
• CPE is notorious for getting this wrong too
DDoS Exposure
• DNSSEC is a vector for DDoS amplification attacks
• 50-60 byte query typically generates 1-2KB of response
• Use Response Rate Limiting (RRL)
• Provided in BIND9.10+ source distribution
• Patches available for BIND9.9
• Also in recent versions of other DNS implementations
• Traffic shaping might also help
• Edge routers and/or kernels
Secure Hardware
• Hardware Security Modules (HSMs)
• Tamper-proof hardware for storing keys
• Expensive and concerns about managing lots of keys
• Largely a niche solution for very important security-
critical zones
• Security protocols for managing access tokens
• HSM hardware isn’t really needed most of the time
• HSM in software (OpenDNSSEC) might be good enough
for a large registrar or small TLD registry
DNSSEC SIGNING
CHOICES
The main choices and trade-offs to consider when
deploying Secure DNS include:
Which versions of DNSSEC to use
Crypto algorithms
Managing keys & signatures
Monitoring & reporting
Tools & tooling
What functionality & UIs should customers see?
Key Lengths - 1
• How large should the key signing keys (KSK) and
zone signing keys (ZSK) be?
• Obvious Goldilocks trade-offs:
• Not too big or too small; just nice
• Don’t assume large keys are “stronger” than small
ones or vice versa
• Could key size (or algorithms) be something to
discuss with stakeholders?
• Some might care (a lot), most probably won’t
Key Lengths - 2
• What’s the window for cryptanalysis of some key?
• Some rules of thumb:
• Short-lived keys don’t need to be big
• Long-lived keys should be reasonably big
• Suggestion:
• Change a small ZSK once a week/month (maybe)
• Change a large KSK once a year (maybe)
• Whatever’s done for the.tld zone or at the root
should be more than good enough for your zones
Signature Duration
• Signature expiry intervals need careful thought too
• Obvious Goldilocks trade-offs again:
• Not too short or too long; just nice
• Short expiry => more CPU cycles for validators
• Long expiry => “stale” signatures may cause validation
failures when something has to be changed in a hurry
• Potential for cryptanalysis of long lived signatures?
• Might be best to start off by following what the
parent zone does and adjust in light of experience
Key Rollover - 1
Key Rollover - 2
• This should happen at regular, planned intervals
• Might have to happen sooner in an emergency: ie when
current key(s) are considered tainted/compromised
• Hard to get the choreography right
• Too many moving parts for KSK rollovers
• Signing tools are getting a lot better at managing
key rollovers and signing policies in general
• Metadata in BIND’s K*.private files
• OpenDNSSEC
Tooling
• Early signing and validating tools were clunky
• Much improved now but could be better still
• Stronger focus on supporting local policies
• Use obvious primitives that hide icky detail:
• pdnssec secure-zone/add-zone-key in
PowerDNS
• Windows GUI-based DNS Manager
• Essentially just click “Sign My Zone”
UI Considerations
• Most end users and administrators won’t want or
need to see DNSSEC
• How best to “hide” DNSSEC operations on the control
panel or web site?
• Perhaps just add a “click here to sign” button?
• Might be the end of the road for anyone managing
DNS zone files with emacs or vi or perl
• No user serviceable parts inside...
Monitoring & Reporting
• Add DNSSEC elements to name server monitoring
and reporting systems
• Check that zones get signed when expected (or not)
• Look out for zones with close-to-expiring signatures
• Monitor key rollovers closely
• Check that zone signing behaves as expected
• Are KSK changes getting notified to the parent?
• Does the parent’s DS match the child’s KSK?
• Does the parent publish new DS records in good time?
Key Management for
Customer & End User Zones
• Who will generate/manage the keys for
example.com, you or the customer?
• Risks and benefits in both approaches
• Who gets blamed if something breaks?
• Is this an extra (chargeable?) service?
• Who has responsibility for choosing the keys, rotating
them, revoking them, etc?
• What about customer support and helpdesk staff?
Validation Challenges
• Switching on validation breaks response rewriting
• RPZ, content filtering, anti-abuse protection measures,
NXDOMAIN rewriting, parental controls, etc.
• Government and law enforcement blacklists
• IPR takedown/block requests
• Clumsy workarounds
• Forward “vanilla” queries to validating resolvers, send the
dodgy ones elsewhere
• Might be seen as needless extra complexity
What deployment barriers?
• The software and tools work reasonably well
• However it’s not always clear:
• How to put them together and use/debug things
• Define policies or understand the trade-offs
• Where are the white papers, case studies and
business justifications?
• “We switched on DNSSEC and….”
• Are experiences at the root or a TLD registry or a big ISP
meaningful for example.com?
Advice Needed!
• DNS administrators need guidance on DNSSEC
deployment considerations and trade-offs:
• Local policy choices on: key selection, signature duration,
rollovers, negative trust anchors, etc.
• NIST report 800-81-2 is wonderful
• Tough reading for non-experts — 130+ pages!
• Need something similar (and shorter) on business
justifications
• Convince the CEO that using DNSSEC is a Good Thing
Where’s the killer app?
• Not much software uses or needs DNSSEC today
• Proof of concept web plug-ins mostly
• DANE could/should be the driver
• Lookup certificates and other crypto material from the DNS
• IETF’s ACME WG standards coming to browsers Real Soon
Now
• Let’s Encrypt certificates as an alternative to ones issued
by conventional CAs
• DANE support emerging in MTAs
Deployment Today - 1
• Most of the important TLDs are signed
• Contractual requirement for new gTLDs
• Some European ccTLDs have 70%+ signed delegations
• Registrar discounts rather than DNSSEC enthusiasm
• Very few of the busiest domain names are signed
• Just paypal.com and nih.gov of the Alexa top 100
• The number of signed zones looks OK-ish
quantitatively but not so good qualitatively
Deployment Today - 2
• Validation uptake is a lot healthier
• Around 15% of users world-wide depend on a validating
resolver
• See https://stats.labs.apnic.net/dnssec
• Much of this is attributed to just three providers:
• Comcast, google’s 8.8.8.8 and TeliaSonera
• This is great, but are they validating anything that
actually matters?
• What are the other big ISPs doing?
Externalities
• For signers:
• Why sign if almost nobody is thought to be validating?
• What's the impact when/if someone else's validator fails?
• For validators:
• Why validate if hardly anyone important signs their zones?
• When someone else's signer screws up, you end up taking
the hit(s) for their mistake(s).What will the impact(s) be?
• i.e.A rival ISP's customers have no problem getting to
badlysigned.com because that ISP doesn't validate
while your customers can't because we are validating
Customer Support
• Training & education for helpdesk/support staff
• Ditto for customers
• DNSSEC troubleshooting
• N-th level support staff will need training
• How to tell the difference between a Secure DNS
validation error SERVFAIL and a regular SERVFAIL
• How to troubleshoot validation problems and fix or
escalate them
• Expired signatures, key mismatches, etc.
Documentation
• Make sure everything gets properly documented:
• Design/architecture, deployment plans & roadmap
• Policies (e.g. key sizes, rotation, signing interval, audit, etc.)
• Write a DNSSEC Policy/Practice Statement - DPS
• RFC6841 is a good starting point
• DPS for the root zone is an excellent template:
•https://www.iana.org/dnssec/icann-dps.txt
• Document DNSSEC tools and new processes
• Produce white papers and use cases for stakeholders?
Training
• How will your staff get trained?
• Knowledge transfer from in-house and external experts
• Commercial training courses, webinars, etc.
• Not just for your DNS team
• Network operations & system administrators
• Developers & helpdesk
• Customer relations & support staff
• Upper management
The “Last Mile” Issue
• AD header bit is set by the validating resolver
• Vulnerable to spoofing by an attacker
• Can the path between some stub resolver and its
resolving server be trusted?
• Windows uses IPsec to protect this
• If the local net isn’t considered secure, run a
validating resolver on the edge device itself
• IETF’s DNS-over-TLS could be the answer
Validator Crunch Time!
• Major test is just around the corner
• First ever rollover of root zone’s KSK due Real Soon Now
• Validators which don’t support or use RFC5011 key
rollover will almost certainly break
• BIND configurations with trusted-keys{} statements
• Old/clunky/buggy DNSSEC implementations
• IANA’s giving plenty of advance warning
• Nothing important should fail
• Famous last words….
Negative Trust Anchors
• How to tell the validator that DNSSEC for some
domain(s) are broken
• Don't validate these domains for now, but carry on
validating elsewhere
• Provably insecure (and possibly bad) data might be better
than nothing
• Features in BIND and unbound to support this
• A necessary evil - unfortunately
• Workarounds for other people's mistakes
DNSSEC Troubleshooting
• Can be very painful
• Debugging vanilla DNS problems is hard enough
• DNSSEC makes things even harder
• Checking DNSSEC-related RRtypes, keeping track of key
IDs & flags, algorithm numbers, etc.
• Tools are getting better, but still far too difficult for
many DNS administrators
• Error messages should be clearer:“you forgot to re-sign”,
“that signature has the wrong hash value”,“there's no DS
record for this KSK”, etc.
drill
• The best DNSSEC debugging tool by far
• Also replicates dig’s commonly used functionality
• Open source from NLnetLabs
• Can illustrate validation in action
• Shows which keys (algorithms & key lengths) are used
• Work on a single signature or top-down from the root
• Pinpoint stale keys & signatures
• Identify DS record and KSK mismatches
• drill -TD some-domain is just awesome!
delv
• ISC's answer to drill
• Distributed in BIND9.10+
• Command-line options almost identical to dig
• Not as chatty as drill
• Use the +vtrace option to see the validations
DNSVIZ
• A web-based DNS visualisation tool
• Draws nice pictures
• Can display details of revoked keys
• Visit dnsviz.net and type in your favourite
signed domain name
• Uses the web site's validating resolver, not yours
• Doesn't check your validator's configuration
• Can't check internal-only signed domains
• Download DNSVIZ source code and run it locally?
DNSVIZ
Example
• Hover over elements to see
details of the key, algorithm,
TTL, key tags, etc
• Shaded elements are the KSKs
• Double circle around the trust
anchor: the root's KSK
A Never Ending Task?
• Keeping DNSSEC software and tools up-to-date
• Can you rely on your vendor/supplier?
• Crypto arms race
• Changing DNSSEC keys regularly
• Tweaking DNSSEC policies
• Interactions with parent zone(s)
• New operational problems and failure modes
• Customer service/support and helpdesk issues
QUESTIONS?

More Related Content

PPTX
Disaster recovery. prepare.plan.perform.
PPTX
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
PPTX
Is Your Data Secure
PPTX
Big Data for Security - DNS Analytics
PPTX
Talking LANDESK to Upper Management and Your Peers
PPTX
Big Data for Security
PDF
Http 2: Should I care?
PPTX
System Revolution- How We Did It
Disaster recovery. prepare.plan.perform.
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
Is Your Data Secure
Big Data for Security - DNS Analytics
Talking LANDESK to Upper Management and Your Peers
Big Data for Security
Http 2: Should I care?
System Revolution- How We Did It

What's hot (12)

PPTX
GWAVACon 2013: Novell Service Desk Design, Deployment
PDF
Optimizing IT Infrastructure For Peak Database Performance
PPTX
Developer To Architect
PPTX
Tpm cloud collaboration network security
PDF
How Laserfiche Works For Lawyers
PPTX
Cyber-Security Product
PPTX
CD presentation march 12th, 2018
PDF
Transactional Streaming: If you can compute it, you can probably stream it.
PDF
The road to clustered data ontap.
PPTX
Selling Disaster Recovery as a Service
PPTX
MWLUG 2017 SA110
PDF
Survivor - Disaster Recovery Edition
GWAVACon 2013: Novell Service Desk Design, Deployment
Optimizing IT Infrastructure For Peak Database Performance
Developer To Architect
Tpm cloud collaboration network security
How Laserfiche Works For Lawyers
Cyber-Security Product
CD presentation march 12th, 2018
Transactional Streaming: If you can compute it, you can probably stream it.
The road to clustered data ontap.
Selling Disaster Recovery as a Service
MWLUG 2017 SA110
Survivor - Disaster Recovery Edition
Ad

Viewers also liked (20)

PDF
Case Studies: TakNet
PDF
DNSSEC/DANE/TLS Testing in Go6Lab
PDF
Community Networks: An Alternative Paradigm for Developing Network Infrastruc...
PDF
Korea IPv6 Measurement
PDF
Japan IPv6 Measurement
PDF
APNIC Update - MMNOG 2017
PDF
APIX Update
PDF
Network Automation: Ansible 101
PDF
Evolving the network for 5G
PDF
LPWA – Giving a Voice to Things
PDF
Network Automation: Ansible 102
PDF
20 years of the Internet in Vietnam: Think about the I in the Internet
PDF
Improve your supply chain with Acctivate & B2BGateway | B2BGateway co-hosted ...
PDF
BCOP BoF
PDF
The Death of Transit and Beyond
PDF
Running a Local Copy of the DNS Root Zone
PDF
Addressing 2016
PDF
Trafficshifting: Avoiding Disasters & Improving Performance at Scale
PDF
prop-117: Returned IPv4 address management and Final /8 exhaustion
PDF
Minimum Viable FIB
Case Studies: TakNet
DNSSEC/DANE/TLS Testing in Go6Lab
Community Networks: An Alternative Paradigm for Developing Network Infrastruc...
Korea IPv6 Measurement
Japan IPv6 Measurement
APNIC Update - MMNOG 2017
APIX Update
Network Automation: Ansible 101
Evolving the network for 5G
LPWA – Giving a Voice to Things
Network Automation: Ansible 102
20 years of the Internet in Vietnam: Think about the I in the Internet
Improve your supply chain with Acctivate & B2BGateway | B2BGateway co-hosted ...
BCOP BoF
The Death of Transit and Beyond
Running a Local Copy of the DNS Root Zone
Addressing 2016
Trafficshifting: Avoiding Disasters & Improving Performance at Scale
prop-117: Returned IPv4 address management and Final /8 exhaustion
Minimum Viable FIB
Ad

Similar to Technical and Business Considerations for DNSSEC Deployment (20)

PDF
Introduction DNSSec
PDF
DNSSEC-Worth adding to your cybersecurity strategy by Champika Wijayatunga (I...
PDF
DNSSEC-Worth adding to your cybersecurity strategy by Champika Wijayatunga (I...
PDF
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
PPTX
ION Hangzhou - How to Deploy DNSSEC
PDF
8 technical-dns-workshop-day4
PDF
Signing DNSSEC answers on the fly at the edge: challenges and solutions
PDF
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
PDF
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
PDF
DNS & DNSSEC
PDF
ION Islamabad - Deploying DNSSEC
PDF
Hardening the Core of the Internet
PPTX
ION Malta - Introduction to DNSSEC
PDF
RIPE 86: DNSSEC — Yes or No?
PDF
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
PDF
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
PDF
Testing Rolling Roots
PDF
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
PDF
Rolling the Root KSK
PDF
NZNOG 2013 - Experiments in DNSSEC
Introduction DNSSec
DNSSEC-Worth adding to your cybersecurity strategy by Champika Wijayatunga (I...
DNSSEC-Worth adding to your cybersecurity strategy by Champika Wijayatunga (I...
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
ION Hangzhou - How to Deploy DNSSEC
8 technical-dns-workshop-day4
Signing DNSSEC answers on the fly at the edge: challenges and solutions
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
DNSSEC: How to deploy it, and why you should bother (ION Toronto 2011)
DNS & DNSSEC
ION Islamabad - Deploying DNSSEC
Hardening the Core of the Internet
ION Malta - Introduction to DNSSEC
RIPE 86: DNSSEC — Yes or No?
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
Testing Rolling Roots
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
Rolling the Root KSK
NZNOG 2013 - Experiments in DNSSEC

More from APNIC (20)

PPTX
APNIC Report, presented at APAN 60 by Thy Boskovic
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
DNSSEC Made Easy, presented at PHNOG 2025
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
PDF
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
PDF
IPv6 Deployment and Best Practices, presented by Makito Lay
PDF
Cleaning up your RPKI invalids, presented at PacNOG 35
PDF
The Internet - By the numbers, presented at npNOG 11
PDF
Transmission Control Protocol (TCP) and Starlink
PDF
DDoS in India, presented at INNOG 8 by Dave Phelan
PDF
Global Networking Trends, presented at the India ISP Conclave 2025
PDF
Make DDoS expensive for the threat actors
PDF
Fast Reroute in SR-MPLS, presented at bdNOG 19
PDF
DDos Mitigation Strategie, presented at bdNOG 19
PDF
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
PDF
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
PDF
Measuring Starlink Protocol Performance, presented at LACNIC 43
APNIC Report, presented at APAN 60 by Thy Boskovic
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
RPKI Status Update, presented by Makito Lay at IDNOG 10
The Internet -By the Numbers, Sri Lanka Edition
Triggering QUIC, presented by Geoff Huston at IETF 123
DNSSEC Made Easy, presented at PHNOG 2025
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
IPv6 Deployment and Best Practices, presented by Makito Lay
Cleaning up your RPKI invalids, presented at PacNOG 35
The Internet - By the numbers, presented at npNOG 11
Transmission Control Protocol (TCP) and Starlink
DDoS in India, presented at INNOG 8 by Dave Phelan
Global Networking Trends, presented at the India ISP Conclave 2025
Make DDoS expensive for the threat actors
Fast Reroute in SR-MPLS, presented at bdNOG 19
DDos Mitigation Strategie, presented at bdNOG 19
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
Measuring Starlink Protocol Performance, presented at LACNIC 43

Recently uploaded (20)

PPTX
E -tech empowerment technologies PowerPoint
PPTX
Internet___Basics___Styled_ presentation
PPTX
artificial intelligence overview of it and more
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
Funds Management Learning Material for Beg
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
innovation process that make everything different.pptx
PPT
tcp ip networks nd ip layering assotred slides
PDF
Introduction to the IoT system, how the IoT system works
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
Introduction to Information and Communication Technology
E -tech empowerment technologies PowerPoint
Internet___Basics___Styled_ presentation
artificial intelligence overview of it and more
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Job_Card_System_Styled_lorem_ipsum_.pptx
Funds Management Learning Material for Beg
Introuction about ICD -10 and ICD-11 PPT.pptx
innovation process that make everything different.pptx
tcp ip networks nd ip layering assotred slides
Introduction to the IoT system, how the IoT system works
WebRTC in SignalWire - troubleshooting media negotiation
Design_with_Watersergyerge45hrbgre4top (1).ppt
introduction about ICD -10 & ICD-11 ppt.pptx
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
SASE Traffic Flow - ZTNA Connector-1.pdf
522797556-Unit-2-Temperature-measurement-1-1.pptx
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
SAP Ariba Sourcing PPT for learning material
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Introduction to Information and Communication Technology

Technical and Business Considerations for DNSSEC Deployment

  • 1. Technical and Business Considerations for DNSSEC Depolyment Jim Reid jim@rfc1035.com
  • 2. Objectives • Understanding the main technical & business impacts • Are these helping or hindering DNSSEC deployment? • What could or should be done to improve things?
  • 3. TECHNICAL CONSIDERATIONS AND MYTHS Zone size CPU load Traffic levels, need for rate-limiting & traffic shaping Key rotation (rollover) Tooling & debugging Use cases
  • 4. Zone & Cache Size • Signed zones are typically 5-10 times larger than unsigned ones • Approximately 4 times as many resource records • RRSIGs are big • So what? • Commodity RAM is cheap: ~$20 for 4GB of DDR3 • Disk space is cheap too: 1TB costs ~$50 • Name server’s RAM footprint might be an issue
  • 5. CPU Load Considerations • 1024-bit RSASHA1 keys, 3GHz Xeon, 1 CPU • Signing: • ~1800 signatures/second • Validation: • ~24,000 validations/second • Off-the-shelf hardware & software should be good enough most (or all?) of the time
  • 6. Network Considerations • DNSSEC requires EDNS0 • DO bit, larger payloads, etc. • Want to avoid truncation in both DNS response and the underlying MTU for packets/frames • Lots of broken stuff assumes DNS only goes over UDP and always has packets < 512 bytes • DNSSEC kills these false assumptions • Firewalls sometimes get misconfigured like this • CPE is notorious for getting this wrong too
  • 7. DDoS Exposure • DNSSEC is a vector for DDoS amplification attacks • 50-60 byte query typically generates 1-2KB of response • Use Response Rate Limiting (RRL) • Provided in BIND9.10+ source distribution • Patches available for BIND9.9 • Also in recent versions of other DNS implementations • Traffic shaping might also help • Edge routers and/or kernels
  • 8. Secure Hardware • Hardware Security Modules (HSMs) • Tamper-proof hardware for storing keys • Expensive and concerns about managing lots of keys • Largely a niche solution for very important security- critical zones • Security protocols for managing access tokens • HSM hardware isn’t really needed most of the time • HSM in software (OpenDNSSEC) might be good enough for a large registrar or small TLD registry
  • 9. DNSSEC SIGNING CHOICES The main choices and trade-offs to consider when deploying Secure DNS include: Which versions of DNSSEC to use Crypto algorithms Managing keys & signatures Monitoring & reporting Tools & tooling What functionality & UIs should customers see?
  • 10. Key Lengths - 1 • How large should the key signing keys (KSK) and zone signing keys (ZSK) be? • Obvious Goldilocks trade-offs: • Not too big or too small; just nice • Don’t assume large keys are “stronger” than small ones or vice versa • Could key size (or algorithms) be something to discuss with stakeholders? • Some might care (a lot), most probably won’t
  • 11. Key Lengths - 2 • What’s the window for cryptanalysis of some key? • Some rules of thumb: • Short-lived keys don’t need to be big • Long-lived keys should be reasonably big • Suggestion: • Change a small ZSK once a week/month (maybe) • Change a large KSK once a year (maybe) • Whatever’s done for the.tld zone or at the root should be more than good enough for your zones
  • 12. Signature Duration • Signature expiry intervals need careful thought too • Obvious Goldilocks trade-offs again: • Not too short or too long; just nice • Short expiry => more CPU cycles for validators • Long expiry => “stale” signatures may cause validation failures when something has to be changed in a hurry • Potential for cryptanalysis of long lived signatures? • Might be best to start off by following what the parent zone does and adjust in light of experience
  • 14. Key Rollover - 2 • This should happen at regular, planned intervals • Might have to happen sooner in an emergency: ie when current key(s) are considered tainted/compromised • Hard to get the choreography right • Too many moving parts for KSK rollovers • Signing tools are getting a lot better at managing key rollovers and signing policies in general • Metadata in BIND’s K*.private files • OpenDNSSEC
  • 15. Tooling • Early signing and validating tools were clunky • Much improved now but could be better still • Stronger focus on supporting local policies • Use obvious primitives that hide icky detail: • pdnssec secure-zone/add-zone-key in PowerDNS • Windows GUI-based DNS Manager • Essentially just click “Sign My Zone”
  • 16. UI Considerations • Most end users and administrators won’t want or need to see DNSSEC • How best to “hide” DNSSEC operations on the control panel or web site? • Perhaps just add a “click here to sign” button? • Might be the end of the road for anyone managing DNS zone files with emacs or vi or perl • No user serviceable parts inside...
  • 17. Monitoring & Reporting • Add DNSSEC elements to name server monitoring and reporting systems • Check that zones get signed when expected (or not) • Look out for zones with close-to-expiring signatures • Monitor key rollovers closely • Check that zone signing behaves as expected • Are KSK changes getting notified to the parent? • Does the parent’s DS match the child’s KSK? • Does the parent publish new DS records in good time?
  • 18. Key Management for Customer & End User Zones • Who will generate/manage the keys for example.com, you or the customer? • Risks and benefits in both approaches • Who gets blamed if something breaks? • Is this an extra (chargeable?) service? • Who has responsibility for choosing the keys, rotating them, revoking them, etc? • What about customer support and helpdesk staff?
  • 19. Validation Challenges • Switching on validation breaks response rewriting • RPZ, content filtering, anti-abuse protection measures, NXDOMAIN rewriting, parental controls, etc. • Government and law enforcement blacklists • IPR takedown/block requests • Clumsy workarounds • Forward “vanilla” queries to validating resolvers, send the dodgy ones elsewhere • Might be seen as needless extra complexity
  • 20. What deployment barriers? • The software and tools work reasonably well • However it’s not always clear: • How to put them together and use/debug things • Define policies or understand the trade-offs • Where are the white papers, case studies and business justifications? • “We switched on DNSSEC and….” • Are experiences at the root or a TLD registry or a big ISP meaningful for example.com?
  • 21. Advice Needed! • DNS administrators need guidance on DNSSEC deployment considerations and trade-offs: • Local policy choices on: key selection, signature duration, rollovers, negative trust anchors, etc. • NIST report 800-81-2 is wonderful • Tough reading for non-experts — 130+ pages! • Need something similar (and shorter) on business justifications • Convince the CEO that using DNSSEC is a Good Thing
  • 22. Where’s the killer app? • Not much software uses or needs DNSSEC today • Proof of concept web plug-ins mostly • DANE could/should be the driver • Lookup certificates and other crypto material from the DNS • IETF’s ACME WG standards coming to browsers Real Soon Now • Let’s Encrypt certificates as an alternative to ones issued by conventional CAs • DANE support emerging in MTAs
  • 23. Deployment Today - 1 • Most of the important TLDs are signed • Contractual requirement for new gTLDs • Some European ccTLDs have 70%+ signed delegations • Registrar discounts rather than DNSSEC enthusiasm • Very few of the busiest domain names are signed • Just paypal.com and nih.gov of the Alexa top 100 • The number of signed zones looks OK-ish quantitatively but not so good qualitatively
  • 24. Deployment Today - 2 • Validation uptake is a lot healthier • Around 15% of users world-wide depend on a validating resolver • See https://stats.labs.apnic.net/dnssec • Much of this is attributed to just three providers: • Comcast, google’s 8.8.8.8 and TeliaSonera • This is great, but are they validating anything that actually matters? • What are the other big ISPs doing?
  • 25. Externalities • For signers: • Why sign if almost nobody is thought to be validating? • What's the impact when/if someone else's validator fails? • For validators: • Why validate if hardly anyone important signs their zones? • When someone else's signer screws up, you end up taking the hit(s) for their mistake(s).What will the impact(s) be? • i.e.A rival ISP's customers have no problem getting to badlysigned.com because that ISP doesn't validate while your customers can't because we are validating
  • 26. Customer Support • Training & education for helpdesk/support staff • Ditto for customers • DNSSEC troubleshooting • N-th level support staff will need training • How to tell the difference between a Secure DNS validation error SERVFAIL and a regular SERVFAIL • How to troubleshoot validation problems and fix or escalate them • Expired signatures, key mismatches, etc.
  • 27. Documentation • Make sure everything gets properly documented: • Design/architecture, deployment plans & roadmap • Policies (e.g. key sizes, rotation, signing interval, audit, etc.) • Write a DNSSEC Policy/Practice Statement - DPS • RFC6841 is a good starting point • DPS for the root zone is an excellent template: •https://www.iana.org/dnssec/icann-dps.txt • Document DNSSEC tools and new processes • Produce white papers and use cases for stakeholders?
  • 28. Training • How will your staff get trained? • Knowledge transfer from in-house and external experts • Commercial training courses, webinars, etc. • Not just for your DNS team • Network operations & system administrators • Developers & helpdesk • Customer relations & support staff • Upper management
  • 29. The “Last Mile” Issue • AD header bit is set by the validating resolver • Vulnerable to spoofing by an attacker • Can the path between some stub resolver and its resolving server be trusted? • Windows uses IPsec to protect this • If the local net isn’t considered secure, run a validating resolver on the edge device itself • IETF’s DNS-over-TLS could be the answer
  • 30. Validator Crunch Time! • Major test is just around the corner • First ever rollover of root zone’s KSK due Real Soon Now • Validators which don’t support or use RFC5011 key rollover will almost certainly break • BIND configurations with trusted-keys{} statements • Old/clunky/buggy DNSSEC implementations • IANA’s giving plenty of advance warning • Nothing important should fail • Famous last words….
  • 31. Negative Trust Anchors • How to tell the validator that DNSSEC for some domain(s) are broken • Don't validate these domains for now, but carry on validating elsewhere • Provably insecure (and possibly bad) data might be better than nothing • Features in BIND and unbound to support this • A necessary evil - unfortunately • Workarounds for other people's mistakes
  • 32. DNSSEC Troubleshooting • Can be very painful • Debugging vanilla DNS problems is hard enough • DNSSEC makes things even harder • Checking DNSSEC-related RRtypes, keeping track of key IDs & flags, algorithm numbers, etc. • Tools are getting better, but still far too difficult for many DNS administrators • Error messages should be clearer:“you forgot to re-sign”, “that signature has the wrong hash value”,“there's no DS record for this KSK”, etc.
  • 33. drill • The best DNSSEC debugging tool by far • Also replicates dig’s commonly used functionality • Open source from NLnetLabs • Can illustrate validation in action • Shows which keys (algorithms & key lengths) are used • Work on a single signature or top-down from the root • Pinpoint stale keys & signatures • Identify DS record and KSK mismatches • drill -TD some-domain is just awesome!
  • 34. delv • ISC's answer to drill • Distributed in BIND9.10+ • Command-line options almost identical to dig • Not as chatty as drill • Use the +vtrace option to see the validations
  • 35. DNSVIZ • A web-based DNS visualisation tool • Draws nice pictures • Can display details of revoked keys • Visit dnsviz.net and type in your favourite signed domain name • Uses the web site's validating resolver, not yours • Doesn't check your validator's configuration • Can't check internal-only signed domains • Download DNSVIZ source code and run it locally?
  • 36. DNSVIZ Example • Hover over elements to see details of the key, algorithm, TTL, key tags, etc • Shaded elements are the KSKs • Double circle around the trust anchor: the root's KSK
  • 37. A Never Ending Task? • Keeping DNSSEC software and tools up-to-date • Can you rely on your vendor/supplier? • Crypto arms race • Changing DNSSEC keys regularly • Tweaking DNSSEC policies • Interactions with parent zone(s) • New operational problems and failure modes • Customer service/support and helpdesk issues