dnssec for the root zonednssec for the root zone nznog hamilton, nz january 2010 joe abley, icann...

65
DNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley y, ICANN Thursday 28 January 2010

Upload: others

Post on 15-Mar-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

DNSSECfor the Root Zone

NZNOG Hamilton, NZJanuary 2010

Joe Abley, ICANNJoe Abley, ICANN

Thursday 28 January 2010

Page 2: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

This design is the result of a cooperation between ICANN & VeriSign withsupport from the U.S. DoC NTIA

Thursday 28 January 2010

Page 3: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Design

Thursday 28 January 2010

Page 4: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Design RequirementsKeywords

Thursday 28 January 2010

Page 5: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Transparency Processes and procedures should

be as open as possible for the Internetcommunity to trust the signed root

Thursday 28 January 2010

Page 6: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Audited Processes and procedures should

be audited against industry standards,e.g. ISO/IEC 27002:2005

Thursday 28 January 2010

Page 7: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

High SecurityRoot system should meet all NIST

SP 800-53 technical security controls required by a HIGH IMPACT system

Thursday 28 January 2010

Page 8: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Roles and Responsibilities

Thursday 28 January 2010

Page 9: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

ICANNIANA Functions Operator

• Manages the Key Signing Key (KSK)

• Accepts DS records from TLD operators

• Verifies and processes request

• Sends update requests to DoC for authorization and to VeriSign for implementation

Thursday 28 January 2010

Page 10: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

DoC NTIAU.S. Department of Commerce

National Telecommunications and Information Administration

• Authorizes changes to the root zone

‣ DS records

‣ Key Signing Keys

‣ DNSSEC update requests follow the same process as other changes

• Checks that ICANN has followed their agreed upon verification/processing policies and procedures

Thursday 28 January 2010

Page 11: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

VeriSignRoot Zone Maintainer

• Manages the Zone Signing Key (ZSK)

• Incorporates NTIA-authorized changes

• Signs the root zone with the ZSK

• Distributes the signed zone to the root server operators

Thursday 28 January 2010

Page 12: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

ICANN VeriSign

DoCRZM SignerTLDOperator Signed root

KSK Management

DNS records sent fromTLD operator to ICANN

Verified datasent to DoC

Authorized datasent to VeriSign

ZSK sent from VeriSign to ICANN

Root Zonedistributed toroot servers

ZSK Management

Root Servers

KSK publishedby ICANN

Keyset is signed by KSK and sent back from ICANN to VeriSign

Unsigned root

Thursday 28 January 2010

Page 13: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Approach to Protecting the KSK

Thursday 28 January 2010

Page 14: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Facility – Tier 1 – Access control by Data Center

Facility – Tier 2 – Access control by Data Center

Facility – Tier 3 – Access control by Data Center

Cage – Tier 4 – Access control by Data Center

Safe Room – Tier 5 – Access control by ICANN

Safe #1 – Tier 6

HSM – Tier 7

Private Keys Key Ceremony Computer

Safe #2 – Tier 6

Safe Deposit Box – Tier 7

Crypto Officers' Credentials

Physical Security

Thursday 28 January 2010

Page 15: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

DPSDNSSEC Practice Statement

• States the practices and provisions that are employed in root zone signing and zone distribution services

‣ Issuing, managing, changing and distributing DNS keys in accordance with the specific requirements of the U.S. DoC NTIA

• Comparable to a certification practice statement (CPS) from an X.509 certification authority (CA)

Thursday 28 January 2010

Page 16: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Key Signing Key Management

Generate

Publish

Use

Destroy

ICANN Staff

ExternalTrusted Persons

Global Internet Community 3rd Party Auditors

Policy & Practice Statement

Zone Signing Key Management

Generate

Publish

Use

Destroy

VeriSign Staff

3rd Party Auditors

Policy & Practice Statement

Other Witnesses

Thursday 28 January 2010

Page 17: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Community Trust

• Proposal that Community Trusted Representatives (TCR) have an active roll in management of the KSK

‣ as Crypto Officers needed to activate the KSK

‣ as Recovery Key Share Holders protecting shares of the symmetric key that encrypts the backup copy of the KSK

Thursday 28 January 2010

Page 18: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Crypto Officers

Keys to safe deposit boxesheld by Crypto Officers

Crypto officer credentials storedon-site in safe deposit boxes

7 Crypto Officercards generated atHSM initialization

CO Card #1

CO Card #2

CO Card #3

CO Card #4

CO Card #5

CO Card #6

CO Card #7

Crypto Officer #1

Crypto Officer #2

Crypto Officer #3

Crypto Officer #4

Crypto Officer #5

Crypto Officer #6

Crypto Officer #7

Authorisation Key – AAK

≥ 3 Crypto Officer cardsneeded for key use

Thursday 28 January 2010

Page 19: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Key Backup

Keys to safe deposit boxesheld by trusted persons

Key shares stored off-sitein safe deposit boxes in

separate locations

RK split into7 key shares at

HSM initialization

Key Share #1

Key Share #2

Key Share #3

Key Share #4

Key Share #5

Key Share #6

Key Share #7

Share Holder #1

Share Holder #2

Share Holder #3

Share Holder #4

Share Holder #5

Share Holder #6

Share Holder #7

≥ 5 key shares neededto restore RK in case

of HSM failure

Recovery key is used to encryptthe KSK before backup

Root KSK

Recover Key (RK)

ICANN on-site backup

ICANN on-site backup

KSK Encrypted by RK

Thursday 28 January 2010

Page 20: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Auditing & Transparency

• Third-party auditors check that ICANN operates as described in the DPS

• Other external witness may also attend the key ceremonies

Thursday 28 January 2010

Page 21: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

DNSSECProtocol Parameters

Thursday 28 January 2010

Page 22: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Key Signing Key

• KSK is 2048-bit RSA

‣ Rolled every 2-5 years

‣ RFC 5011 for automatic key rollovers

• Propose using signatures based on SHA-256

Thursday 28 January 2010

Page 23: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Zone Signing Key

• ZSK is 1024-bit RSA

‣ Rolled once a quarter (four times per year)

• Zone signed with NSEC

• Propose using signatures based on SHA-256

Thursday 28 January 2010

Page 24: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Signature Validity

• DNSKEY-covering RRSIG (by KSK) validity 15 days

‣ new signatures published every 10 days

• Other RRSIG (by ZSK) validity 7 days

‣ zone generated and resigned twice per day

Thursday 28 January 2010

Page 25: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Key Ceremonies

• Key Generation

‣ Generation of new KSK

‣ Every 2-5 years

• Processing of ZSK Signing Request (KSR)

‣ Signing ZSK for the next upcoming quarter

‣ Every quarter

Thursday 28 January 2010

Page 26: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

KSR Processing

KSR transport protected using TLS with client-side authentication

ZSK signs DNSKEYsinside KSR

KSK signs DNSKEYsinside SKR

KSK ZSK

ICANNCertificate Authority

VeriSignCertificate Authority

Key Signing Request

Signed Key Response Signer

RootZone

Ceremony Administrator

ZSKAdministrator

ICANN CA issuescert for TLS

VeriSign CA issuescert for TLS

Out-of-band integrity verification of KSRat the key ceremony

VeriSign publish thesigned root via root servers

Thursday 28 January 2010

Page 27: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

KSR Processing

KSR transport protected using TLS with client-side authentication

ZSK signs DNSKEYsinside KSR

KSK signs DNSKEYsinside SKR

KSK ZSK

ICANNCertificate Authority

VeriSignCertificate Authority

Key Signing Request

Signed Key Response Signer

RootZone

Ceremony Administrator

ZSKAdministrator

ICANN CA issuescert for TLS

VeriSign CA issuescert for TLS

Out-of-band integrity verification of KSRat the key ceremony

VeriSign publish thesigned root via root servers

Thursday 28 January 2010

Page 28: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

KSR Processing

KSR transport protected using TLS with client-side authentication

ZSK signs DNSKEYsinside KSR

KSK signs DNSKEYsinside SKR

KSK ZSK

ICANNCertificate Authority

VeriSignCertificate Authority

Key Signing Request

Signed Key Response Signer

RootZone

Ceremony Administrator

ZSKAdministrator

ICANN CA issuescert for TLS

VeriSign CA issuescert for TLS

Out-of-band integrity verification of KSRat the key ceremony

VeriSign publish thesigned root via root servers

Thursday 28 January 2010

Page 29: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

KSR Processing

KSR transport protected using TLS with client-side authentication

ZSK signs DNSKEYsinside KSR

KSK signs DNSKEYsinside SKR

KSK ZSK

ICANNCertificate Authority

VeriSignCertificate Authority

Key Signing Request

Signed Key Response Signer

RootZone

Ceremony Administrator

ZSKAdministrator

ICANN CA issuescert for TLS

VeriSign CA issuescert for TLS

Out-of-band integrity verification of KSRat the key ceremony

VeriSign publish thesigned root via root servers

Thursday 28 January 2010

Page 30: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

KSR Processing

KSR transport protected using TLS with client-side authentication

ZSK signs DNSKEYsinside KSR

KSK signs DNSKEYsinside SKR

KSK ZSK

ICANNCertificate Authority

VeriSignCertificate Authority

Key Signing Request

Signed Key Response Signer

RootZone

Ceremony Administrator

ZSKAdministrator

ICANN CA issuescert for TLS

VeriSign CA issuescert for TLS

Out-of-band integrity verification of KSRat the key ceremony

VeriSign publish thesigned root via root servers

Thursday 28 January 2010

Page 31: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Key Schedule

Thursday 28 January 2010

Page 32: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Key Schedule

T+90T+80T+70T+60T+50T+40T+30T+20T+10T+0T-10

Quarterly time cycle is ~ 90 days

Thursday 28 January 2010

Page 33: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Key Schedule

T+90T+80T+70T+60T+50T+40T+30T+20T+10T+0T-10

Quarterly time cycle is ~ 90 days

ZSK rollover

ZSKpre-publish ZSK

ZSKZSKZSKZSKpre-publish ZSK ZSK ZSKZSK ZSK ZSK

post-publishZSK

ZSKpost-publishZSK

Thursday 28 January 2010

Page 34: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Key Schedule

T+90T+80T+70T+60T+50T+40T+30T+20T+10T+0T-10

Quarterly time cycle is ~ 90 days

ZSK rollover

ZSKpre-publish ZSK

ZSKZSKZSKZSKpre-publish ZSK ZSK ZSKZSK ZSK ZSK

post-publishZSK

ZSKpost-publishZSK

Optional KSK rollover

KSKpublish

KSKpublish

KSKpublish

KSKpublish

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish

KSK revoke+sign

KSK revoke+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

Thursday 28 January 2010

Page 35: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Key Schedule

T+90T+80T+70T+60T+50T+40T+30T+20T+10T+0T-10

Quarterly time cycle is ~ 90 days

ZSK rollover

ZSKpre-publish ZSK

ZSKZSKZSKZSKpre-publish ZSK ZSK ZSKZSK ZSK ZSK

post-publishZSK

ZSKpost-publishZSK

Optional KSK rollover

KSKpublish

KSKpublish

KSKpublish

KSKpublish

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish

KSK revoke+sign

KSK revoke+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

Thursday 28 January 2010

Page 36: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Key Schedule

T+90T+80T+70T+60T+50T+40T+30T+20T+10T+0T-10

Quarterly time cycle is ~ 90 days

ZSK rollover

ZSKpre-publish ZSK

ZSKZSKZSKZSKpre-publish ZSK ZSK ZSKZSK ZSK ZSK

post-publishZSK

ZSKpost-publishZSK

Optional KSK rollover

KSKpublish

KSKpublish

KSKpublish

KSKpublish

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish

KSK revoke+sign

KSK revoke+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

Thursday 28 January 2010

Page 37: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Key Schedule

T+90T+80T+70T+60T+50T+40T+30T+20T+10T+0T-10

Quarterly time cycle is ~ 90 days

ZSK rollover

ZSKpre-publish ZSK

ZSKZSKZSKZSKpre-publish ZSK ZSK ZSKZSK ZSK ZSK

post-publishZSK

ZSKpost-publishZSK

Optional KSK rollover

KSKpublish

KSKpublish

KSKpublish

KSKpublish

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish

KSK revoke+sign

KSK revoke+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

KSKpublish+sign

Thursday 28 January 2010

Page 38: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Key Schedule

T+90T+80T+70T+60T+50T+40T+30T+20T+10T+0T-10

Quarterly time cycle is ~ 90 days

ZSK rollover

ZSKpre-publish ZSK

ZSKZSKZSKZSKpre-publish ZSK ZSK ZSKZSK ZSK ZSK

post-publishZSK

ZSKpost-publishZSK

KSK revoke+sign

KSK revoke+sign

KSK revoke+sign

KSK revoke+sign

KSK revoke+sign

KSK revoke+sign

KSK revoke+sign

KSK revoke+sign

KSKpublish+sign

KSKpublish+sign

KSK removal

Thursday 28 January 2010

Page 39: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Root Trust Anchor

• Published on a web site by ICANN as

‣ XML-wrapped and plain DS record

• to facilitate automatic processing

‣ PKCS #10 certificate signing request (CSR)

• as self-signed public key

• Allows third-party CAs to sign the KSK

• ICANN will sign the CSR producing a CERT

Thursday 28 January 2010

Page 40: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Deployment

Thursday 28 January 2010

Page 41: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Goals

• Deploy a signed root zone

‣ Transparent processes

‣ Audited procedures

‣ DNSSEC deployment

• validators, registries, registrars, name server operators

• Communicate early and often!

Thursday 28 January 2010

Page 42: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Anticipated Issues

Thursday 28 January 2010

Page 43: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

DO=1

• A significant proportion of DNS clients send queries with EDNS0 and DO=1

• Some (largely unquantified, but potentially significant) population of such clients are unable to receive large responses

• Serving signed responses might break those clients

Thursday 28 January 2010

Page 44: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Rollback

• If we sign the root, there will be some early validator deployment

• There is the potential for some clients to break, perhaps badly enough that we need to un-sign the root (e.g., see previous slide)

• Un-signing the root will break the DNS for validators

Thursday 28 January 2010

Page 45: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Staged Deployment

Thursday 28 January 2010

Page 46: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Deploy Incrementally• Serve a signed zone from just L-Root,

initially

• Follow up with A-Root

• Then other root servers

‣ M, I

‣ D, K E,

‣ B, H, C, G, F

• Last, J-Root

Thursday 28 January 2010

Page 47: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Deploy Incrementally

• The goal is to leave the client population with some root servers not offering large responses until the impact of those large responses is better understood

• Relies upon resolvers not always choosing a single server

Thursday 28 January 2010

Page 48: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

DURZ

• “Deliberately Unvalidatable Root Zone”

• Sign RRSets with keys that are not published in the zone (but with matching keytag…)

• Publish keys in the zone which are not used, and which additionally contain advice for operators (see next slide)

• Swap in actual signing keys (which enables validation) at the end of the deployment process

Thursday 28 January 2010

Page 49: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

DURZ

.       3600    IN     DNSKEY  257  3  5 (                       AwEAAa++++++++++++++++++++++++++++++                       ++THIS/KEY/AN/INVALID/KEY/AND/SHOULD                       /NOT/BE/USED/CONTACT/ROOTSIGN/AT/ICA                       NN/DOT/ORG/FOR/MORE/INFORMATION+++++                       ++++++++++++++++++++++++++++++++++++                       ++++++++++++++++++++++++++++++++++++                       ++++++++++++++++++++++++++++++++++++                       ++++++++++++++++++++++++++++++++++++                       ++++++++++++++++++++++++++++++++++++                       ++++++++++++++++++++++/=                       ) ; Key ID = 6477

Thursday 28 January 2010

Page 50: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

DURZ

• Deploy conservatively

‣ It is the root zone, after all

• Prevent a community of validators from forming

‣ This allows us to unsign the root zone during the deployment phase (if we have) to without collateral damage

Thursday 28 January 2010

Page 51: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Measurement

• For those root servers that are instrumented, full packet captures and subsequent analysis around signing events

• Ongoing dialogue with operator communities to assess real-world impact of changes

Thursday 28 January 2010

Page 52: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Testing

• A prerequisite for this proposal is a captive test of the deployment

‣ Test widely-deployed resolvers, with validation enabled and disabled, against the DURZ

‣ Test with clients behind broken networks that drop large responses

Thursday 28 January 2010

Page 53: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Interaction with TLDs

Thursday 28 January 2010

Page 54: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

DS Change Requests

• Approach likely to be based on existing methods for TLD managers to request changes in root zone

• Anticipate being able to accept DS requests 1-2 months before the validatable signed root zone is in production

• Current topic of discussion within Root DNSSEC Design Team

Thursday 28 January 2010

Page 55: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Communication

Thursday 28 January 2010

Page 56: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Project Web Page

• http://www.root-dnssec.org

‣ Status updates

‣ Documents

‣ Presentation Archive

‣ Small collection of links to relevant tools

‣ Contact information

‣ RSS

Thursday 28 January 2010

Page 57: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Communicationwith non-technical audiences

• Will reach the non-technical and semi-technical audiences with press releases and other means.

• PR departments with people who know how to do this will be engaged.

Thursday 28 January 2010

Page 58: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Communicationwith technical audiences

• Reaching the technical audiences via mailing lists and other means

‣ IETF DNS lists (e.g. DNSOP)

‣ non-IETF DNS lists (e.g. DNS-OARC)

‣ General operator lists (e.g. NANOG)

‣ …

Thursday 28 January 2010

Page 59: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Draft Timeline• December 1, 2009

‣ Root zone signed

• Initially signed zone stays internal to ICANN and VeriSign

‣ ICANN and VeriSign begin KSR processing

• ZSK and KSK rolls

• January - July 2010

‣ Incremental roll out of signed root

• July 1, 2010

‣ KSK rolled and trust anchor published

‣ Signed root fully deployed

Thursday 28 January 2010

Page 60: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Deployment Status25 January 2010

Thursday 28 January 2010

Page 61: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Documentation

• Requirements document posted

• High-Level Architecture, Policy and Practice Statements, Trust Anchor Publication, Deployment documents posted in draft form

• Ceremony, KSK Facility Requirements, Testing documents expected to be posted soon

http://www.root-dnssec.org

Thursday 28 January 2010

Page 62: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Testing

• Several rounds of data collection testing by Root Server Operators complete

• Several KSR/SKR exchanges complete

• DURZ vs. Resolver testing complete

Thursday 28 January 2010

Page 63: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

DURZ Roll-Out

• L-Root scheduled to start serving the root zone during the posted maintenance window 2010-01-27 1800-2000 UTC

Thursday 28 January 2010

Page 64: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Thoughts?

• Feedback on this proposal would be extremely welcome

‣ Email to [email protected]

Thursday 28 January 2010

Page 65: DNSSEC for the Root ZoneDNSSEC for the Root Zone NZNOG Hamilton, NZ January 2010 Joe Abley, ICANN ... SP 800-53 technical security controls required by a HIGH IMPACT system Thursday

Root DNSSEC Design Team

Joe AbleyMehmet AkcinDavid BlackaDavid ConradRichard LambMatt Larson

Fredrik LjunggrenDavid Knight

Tomofumi OkuboJakob Schlyter

Thursday 28 January 2010