Anne-Marie Eklund Löwinder Chief Information Security Officer [email protected] Twitter: amelsec ...

47
Anne-Marie Eklund Löwinder Chief Information Security Officer [email protected] Twitter: amelsec http://www.iis.se Thank’s to Fredrik Ljunggren, Kirei & Mehmet Akcin, ICANN Signing the root with DNSSEC

Transcript of Anne-Marie Eklund Löwinder Chief Information Security Officer [email protected] Twitter: amelsec ...

Page 1: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Anne-Marie Eklund LöwinderChief Information Security Officer

[email protected]: amelsechttp://www.iis.se

Thank’s to Fredrik Ljunggren, Kirei & Mehmet Akcin, ICANN

Signing the root with DNSSEC

Page 2: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

How did it all begin?Walking down Memory Lane!

Page 3: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

1983

Paul Mockapetris invents the DNS and implements the first server: Jeeves.

Page 4: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

1986

Formal IETF Internet Standard. Two RFC's describes DNS: 1034 and 1035.

Page 5: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

1990

Steven Bellovin describes cache poisoning for the first time, but the report is held back until 1995.

Page 6: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

1997

RFC2065first version of the DNSSEC standard is published.

Page 7: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

1999

RFC2535 is published, updating RFC2065.The DNSSEC protocol seems to be finally finished. BIND9 is developed to be the first DNSSEC capable implementation.

Page 8: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

1999

Sequential transaction ID:Problems persisted.Multiple name server implementations usedsequential transaction ID’s, trivial to guess. (March)

Page 9: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

2001

Experiments show that the key handling in RFC2535 is causing operational problems that would make deployment difficult, if not impossible. Redesigning is initiated.

Page 10: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

2002

Multiple queries (November):Problems persisted in multipleimplementations.An attacker could generate several outstanding queries for the same data. Enabled spoofing through the birthday attack.

Page 11: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

2002

Brains are working on it…

Page 12: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

2003

Brains are working on it…

Page 13: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

2004

Brains are working on it…

Page 14: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

2005

Eureka!

The current RFC's are published:RFC4033, RFC4034, RFC4035

Page 15: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

2005

Sweden (.SE) deploys DNSSEC..SE is the first TLD to adopt.

Page 16: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

2006

Others are *thinking* about deploying DNSSEC…

Page 17: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

2007

Others are *thinking* about deploying DNSSEC…

Page 18: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

2007

Predictable RNG (July):Problems persisted, weaknesses in the PRNG’s (pseudo-random number generators) made guessing through statistical analysis feasible.Multiple implementations.

Page 19: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

2008

Yet another flaw in the DNS protocol: The Kaminsky bug!

Targeting sibling names of a zone enabledinfinite number of retries for cache

poisoning.

Page 20: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

2009

The Domain Name System desperately needs DNSSEC!Mending and patching obviously didn't do it…Others *are* deploying DNSSEC.

Page 21: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

2010

The Root is signed since July 15, 2010!. IN DS 19036 8 2 49AAC11D7B6F6446702E54A1607371607A1A41855200FD2CE1CDDE32F24E8FB5

DNSSEC in the root ties it all together and is an enabler for so much more.

Page 22: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Approach to DNSSEC in the root zone and protection of the KSK

Page 23: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Design

The guiding principle behind the design is that the result must be trustworthy.

Page 24: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Audited

Processes and procedures should be audited against industry standards e.g. ISO/IEC 27002:2005

Page 25: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

High security

Root system should meet all NIST SP 800-53 technical security controls required by a HIGH IMPACT system.

Page 26: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Community involvement

Trusted representatives from the community are invited to take an active role in the key management process.

Page 27: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Terramark Data Center, Culpeper, VA

Page 28: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Physical security

Page 29: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Physical Security

Page 30: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Physical Security

More photos on http://dns.icann.org

Page 31: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Physical Security

• Enforced Dual Occupancy.

• Separation of Duties.

• External Monitoring.

• Video Surveillance.

• Motion, Seismic other Sensors

• …and more.

Page 32: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

ICANN staff roles related to KSK ceremonies

• Ceremony Administrator (CA) is the staff member who runs the ceremony.

• Internal Witness (IW) is the ICANN staff witnessing and recording the ceremony and exceptions if any.

• System Administrator (SA) is technical staff members responsible of IT needs.

• Safe Security Controllers (SSC) are the ICANN staff who operates the safe.

Page 33: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

DPS – DNSSEC Practice Statement• States the practices and provisions that are

employed in root zone signing and zone distribution services.• Issuing, managing, changing and distributing DNS keys in

accordance with the specific requirements of the U.S. DoC NTIA.

• Comparable to a certificate practice statement (CPS) from an X.509 certification authority (CA).

• Compliant with http://tools.ietf.org/html/rfc6841 (as a number of other TLD’s are).

Page 34: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Auditing & Transparency

• Third-party auditors check that ICANN operates as described in the DPS.

• Other external witness may also attend the key ceremonies.

• Systrust audit performed annualy.

Page 35: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Trusted Community Representatives (TCR)• Have an active role in the management of the

KSK:• as Crypto Officers needed to activate the KSK.

• as Recovery Key Share Holders protecting shares of the symmetric key that encrypts the backup copy of the KSK.

Page 36: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Crypto Officer (CO)

• Have physical keys to safe deposit boxes holding smartcards that activate the HSM.

• ICANN cannot generate new keys or sign ZSK without 3-of-7 COs.

• Able to travel up to 4 times a year to US.

• So far the same people as from the start.

http://www.root-dnssec.org/tcr/selection-2010/

Page 37: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Recovery Key Share Holder (RKSH)• Have smartcards holding pieces (M-of-N) of the

key used to encrypt the KSK inside the HSM.

• If both key management facilities fall into the ocean, 5-of-7 RKSH smartcards and an encrypted KSK smartcard can reconstitute KSK in a new HSM.

• Backup KSK encrypted on smartcard held by ICANN.

• Able to travel on relatively short notice to US. Hopefully never. Annual inventory.

Page 38: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Community Representatives

• CO – East Coast• Alain Aina, BJ

• Anne-Marie Eklund Löwinder, SE

• Frederico Neves, BR

• Gaurab Upadhaya, NP

• Olaf Kolkman, NL

• Robert Seastrom, US

• Vinton Cerf, US

• CO – West Coast• Andy Linton, NZ

• Carlos Martinez, UY

• Dmitry Burkov, RU

• Edward Lewis, US

• João Luis Silva Damas, PT

• Masato Minda, JP

• Subramanian Moonesamy, MU

• CO Backup• Christopher Griffiths, US

• Fabian Arbogast, TZ

• John Curran, US

• Nicolas Antoniello, UY

• Rudolph Daniel, UK

• Sarmad Hussain, PK

• Ólafur Guðmundsson, IS

• RKSH• Bevil Wooding, TT

• Dan Kaminsky, US

• Jiankang Yao, CN

• Moussa Guebre, BF

• Norm Ritchie, CA

• Ondřej Surý, CZ

• Paul Kane, UK

• (6 BKP)

Page 40: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Split keys

• Zone Signing Key (ZSK) used to sign the zone.

• Key Signing Key (KSK) used to sign the ZSK.

• Not required by the protocol

Page 41: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Key Signing Key (KSK)

• KSK is 2048-bit RSA.• Rolled as required.

• RFC 5011 for automatic key rollovers.

• Signatures made using SHA-256.

Page 42: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Zone Signing Key (ZSK)

• ZSK is 1024-bit RSA.• Rolled once a quarter (four times per year).

• Zone signed with NSEC.

• Signatures made using SHA-256.

Page 43: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Key Ceremonies

• Key Generation.• Generation of new KSK.

• Processing of ZSK Signing Request (KSR).• Signing ZSK for the next upcoming quarter.

• Quarterly.

Page 44: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

DNSSEC is now part of standard operations.

Page 45: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Next key ceremony XI

• The next ceremony will take place in Culpeper, VA on 2013 May 2-3.• Detailed schedule can be found at

http://dns.icann.org/ksk/upcoming-ceremonies/cer13/

• Watch the HD Live Stream at http://dns.icann.org/ksk/stream/

Page 46: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.

Stats

• 317 TLD’s in the root zone in total.

• 111 TLD’s are signed.

• 102 TLD’s have trust anchors published as DS records in the root zone.

• 2 TLD’s have trust anchors published in the ISC DLV Repository.

http://stats.research.icann.org/dns/tld_report/index.html

Page 47: Anne-Marie Eklund Löwinder Chief Information Security Officer amel@iis.se Twitter: amelsec  Thank’s to Fredrik Ljunggren, Kirei & Mehmet.