SlideShare a Scribd company logo
1 of 35
Download to read offline
EDU DNSSEC Testbed
Shumon Huque, University of Pennsylvania
Larry Blunk, MERIT Network
Internet2 Joint Techs Conference
Salt Lake City, Utah
February 2nd 2010
1
DNSSEC
• “DNS Security Extensions”
• A system to verify the authenticity of DNS “data”
using public key signatures
• Protocol specs: RFC 4033, 4034, 4035, 5155
2
EDU Top Level Domain
• Operation of .EDU is managed by
EDUCAUSE under a co-operative
agreement with the US Dept of Commerce
• VeriSign is the current DNS operator
for .EDU (the “registry”)
3
Registry
Registrar
Registrant
VeriSign
Operator of EDU DNS zone
EDUCAUSE
Manages zone, registers entries
EDU domain holders
(upenn, berkeley, merit, etc ..)
Terminology
4
Announcement
• September 3rd 2009
EDUCAUSE and VeriSign announced today the initiation of a
project to enhance Internet reliability and stability. [.....]
The project will deploy a security system known as Domain Name
Security Extensions (DNSSEC) within the .edu portion of the
Internet, which EDUCAUSE manages under a cooperative
agreement with the U.S. Department of Commerce. When the
project is completed, institutions whose domain names end
in .edu will be able to incorporate a digital signature into those
names to limit a variety of security vulnerabilities.
5
Related change
• March 1st:VeriSign will be making
modifications to .com/.net/.edu DNS
servers specifically to support DNSSEC
• Involving referral and glue behavior
• https://lists.dns-oarc.net/pipermail/dns-
operations/2010-January/004838.html
6
Feature summary
• NSEC3 with Opt-Out (RFC 5155)
• Signing algorithms
• Testbed used 2048/1024 bit NSEC3 RSASHA1.
• Production may use newer (RSASHA256 etc)
• Any standardized DS hash algorithm supported
(SHA-1, SHA-256, ...)
• DNSSEC function integrated into Educause’s web
domain management application
7
DNSSEC Testbed
• Testbed planning discussion - March
through August 2009
• Testbed operation: mid September through
mid December 2009
• Multiple phases, gradually including more
participants
8
DNSSEC FAQ
• (Answers to) Frequently Asked Questions
• http://net.educause.edu/edudnssecfaq
9
DNSSEC FAQ
• When will .edu be signed?
• Final deployment of DNSSEC for .edu will
build on the previously announced US Dept
of Commerce project to deploy DNSSEC
at the authoritative root zone of the
Internet.We anticipate .edu will be signed
in the first half of 2010.
10
DNSSEC FAQ
• Do I have to do something with my
domain?
• No.At launch, DNSSEC will be optional
for .edu domain holders.
11
DNSSEC FAQ
• Will DNSSEC increase fees for .edu
domain names?
• No.There will be no extra charges for .edu
domain names.
12
Another doc
• Another recent publication by EDUCAUSE:
• “7 ThingsYou Should Know About
DNSSEC”
• http://www.educause.edu/library/EST1001
• Hard copies at JT Info Desk
13
5 Signed EDU
subdomains (SLD)
berkeley.edu University of California, Berkeley
merit.edu MERIT Network
penn.edu University of Pennsylvania
psc.edu Pittsburgh Supercomputing Ctr
upenn.edu University of Pennsylvania
* All NSEC
* as of January 2010
14
Looking further down ..
• SecSpider (http://secspider.cs.ucla.edu/)
reports 58 domains inside EDU signed
• Nearly half are 3rd level domains under
Berkeley
• Quite a few are subdomains for CS, EECS,
etc departments at universities (MIT, Kent
State, Georgia Tech, RPI,Wisc) and DNS
researchers (UCLA, Colorado State)
(as of January 2010)
15
Speaker change ..
16
DNSSEC Testbed
• Mid September through mid December 2009
• Test Registrar Tool (web application)
• Test EDU DNS server
• Participating EDU institutions:
• Signed authoritative zones (test or production)
• Validating resolvers
17
Participant phases
• 1. UPenn, UC Berkeley, MERIT
• 2. Harvard, Internet2, LSU, JHU, PSU
• 3.ARSC, CMU
• 4.Webster,Wichita State
18
What a DNSSEC signed
delegation in EDU
will look like ...
19
$ dig @x.x.x.x +norecurse +dnssec +multi www.merit.edu
;; QUESTION SECTION:
;www.merit.edu. IN A
;; AUTHORITY SECTION:
merit.edu. 86400 IN NS dns1.merit.net.
merit.edu. 86400 IN NS dns2.merit.net.
merit.edu. 86400 IN NS dns3.merit.net.
merit.edu. 86400 IN DS 14556 5 1 (
982113D08B4C6A1D9F6AEE1E2237AEF69F3F9759 )
merit.edu. 86400 IN DS 14556 5 2 (
F1E184C0E1D615D20EB3C223ACED3B03C773DD952D5F
0EB5C777586DE18DA6B5 )
merit.edu. 86400 IN RRSIG DS 7 2 86400 20100208154501 (
20100125144501 4774 edu.
KI33EqBmlCqLmQiLdLGbfFYtnI931lz2v9bsi2FFdvH
53lttgMKK3044ToH65xGCwDYS23xUDq1bwu0VLNGnAfl
V1GaIvEAAqVeMucfSE0sUzxgaNGtYyum2qMnQeo7bIgM
UPizsh5ZImfyWw9If/LsWm7QToe6xcHZT5unnhc= )
Cryptographically Secure Delegations are indicated
by “DS” records and their signature (RRSIG).
NS
DS
RRSIG
DS
20
$ dig @198.108.1.43 merit.edu dnskey
;; QUESTION SECTION:
;merit.edu. IN DNSKEY
;; ANSWER SECTION:
merit.edu. 7200 IN DNSKEY 257 3 7 (
AwEAAc6Z4l2Ne7mGyBWZDGegov2/LSJQgWOanV+UoTfe
AEWFGWa5yXKIKM9s+EeAHwORpGznNJIaGgxiOJ00H4IF
Cml6Z0tZeUvWadRzhtUKXEZqMtvuB+NM8WrrZs/1kSi2
jrf9jDctmPZDSHAjPhB4FQmeoLN+JJVbTZJ38iFHjdU+
hysTnIm4RYjAP/hLWXLeNLqtcbXwalu/ZTzXtt4lHVA/
C2/RqX1Xe/1VMe5/cYiW2bqLbUy9wUxiCVg6gOGBMVEO
JZwx/hcJG4n6CZXrdRJH0C8/EVg67DcW6BFfxfdLrLcd
WtnDxgYOC2noMP2U4CFiGmBNpTmgxVCuNx7Ct/M=
) ; key id = 14556
The parent DS record is a cryptographic hash of the
entry point DNSKEY in the delegated zone
[Note: only secure entry point DNSKEY shown]
21
Registration System
• Screenshots of the (planned) DNSSEC
enabled registration system ..
• Slightly barebones. Final version will be
enhanced with more helpful documentation
and additional verbiage.
22
23
24
25
26
27
28
Participant
requirements
• Authoritative DNS servers running signed
zones (test servers ok)
• Validating resolvers, configured to use EDU
testbed servers as authority (eg. via the
“stub zone” feature in BIND, Unbound)
29
Overview of Tests
• [set of tests between registrar & registry]
30
Overview of Tests
• confirm connectivity to testbed
• Add DS records of various algorithms & digest types
• Add additional DS record(s)
• Remove DS record(s)
• Add incorrect DS record(s)
• View DS record history report
• Perform key rollover operations and DS updates
31
Overview of Tests
• At each test stage perform verification tests with an
appropriately configured validating resolver
• edu trust anchor
• stub zone for edu pointing to testbed servers
• Attempt to validate records in the zones of other
participants also
32
Summary Results
• For the most part, everything worked as expected
• A few small bugs were fixed
• A few accidental key expirations and incorrect
participant zone signings happened (hey, it’s a testbed!)
• Support for registering multiple DS records was added
• Debate about submitting DNSKEY vs DS records to
registrar
33
References
• http://net.educause.edu/edudnssecfaq
• http://www.educause.edu/library/EST1001
• https://www.dnssec-deployment.org/index.php/
deployment-case-studies/internet-2/
34
Questions/Comments?
• Shumon Huque, shuque [at] upenn.edu
• Larry Blunk, ljb [at] merit.edu
35

More Related Content

Similar to .EDU DNSSEC Testbed

A survey of DNSSEC Deployment in the US R&E Community
A survey of DNSSEC Deployment in the US R&E CommunityA survey of DNSSEC Deployment in the US R&E Community
A survey of DNSSEC Deployment in the US R&E CommunityShumon Huque
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]APNIC
 
Building and Extensible Storage Ecosystem with WOS
Building and Extensible Storage Ecosystem with WOSBuilding and Extensible Storage Ecosystem with WOS
Building and Extensible Storage Ecosystem with WOSinside-BigData.com
 
DNSSec: Internet achter de schermen
DNSSec: Internet achter de schermenDNSSec: Internet achter de schermen
DNSSec: Internet achter de schermenDevnology
 
Dnssec proposal-09oct08-en
Dnssec proposal-09oct08-enDnssec proposal-09oct08-en
Dnssec proposal-09oct08-enguest3131f85
 
Dnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 EnDnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 EnErol Dizdar
 
Uniface 9.7 en PostgreSQL
Uniface 9.7 en PostgreSQLUniface 9.7 en PostgreSQL
Uniface 9.7 en PostgreSQLArjen van Vliet
 
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataIRJET Journal
 
Eric J Geer Resume 05-20-2015
Eric J Geer Resume 05-20-2015Eric J Geer Resume 05-20-2015
Eric J Geer Resume 05-20-2015Eric Geer
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECShumon Huque
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]APNIC
 

Similar to .EDU DNSSEC Testbed (20)

DNSSEC and DANE Deployment: Trends, Tools and Challenges
DNSSEC and DANE Deployment: Trends, Tools and ChallengesDNSSEC and DANE Deployment: Trends, Tools and Challenges
DNSSEC and DANE Deployment: Trends, Tools and Challenges
 
A survey of DNSSEC Deployment in the US R&E Community
A survey of DNSSEC Deployment in the US R&E CommunityA survey of DNSSEC Deployment in the US R&E Community
A survey of DNSSEC Deployment in the US R&E Community
 
DNSSEC at Penn
DNSSEC at PennDNSSEC at Penn
DNSSEC at Penn
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
 
Building and Extensible Storage Ecosystem with WOS
Building and Extensible Storage Ecosystem with WOSBuilding and Extensible Storage Ecosystem with WOS
Building and Extensible Storage Ecosystem with WOS
 
8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 
Introduction To The DANE Protocol (DNSSEC)
Introduction To The DANE Protocol  (DNSSEC)Introduction To The DANE Protocol  (DNSSEC)
Introduction To The DANE Protocol (DNSSEC)
 
DNSSec: Internet achter de schermen
DNSSec: Internet achter de schermenDNSSec: Internet achter de schermen
DNSSec: Internet achter de schermen
 
Dnssec proposal-09oct08-en
Dnssec proposal-09oct08-enDnssec proposal-09oct08-en
Dnssec proposal-09oct08-en
 
Dnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 EnDnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 En
 
Uniface 9.7 en PostgreSQL
Uniface 9.7 en PostgreSQLUniface 9.7 en PostgreSQL
Uniface 9.7 en PostgreSQL
 
Alex Velasquez resume 2016
Alex Velasquez resume 2016Alex Velasquez resume 2016
Alex Velasquez resume 2016
 
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted Data
 
ION Krakow - DNSSEC Panel Introduction
ION Krakow -  DNSSEC Panel IntroductionION Krakow -  DNSSEC Panel Introduction
ION Krakow - DNSSEC Panel Introduction
 
Jagadish-New
Jagadish-NewJagadish-New
Jagadish-New
 
Eric J Geer Resume 05-20-2015
Eric J Geer Resume 05-20-2015Eric J Geer Resume 05-20-2015
Eric J Geer Resume 05-20-2015
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSEC
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
 
Let's Encrypt + DANE
Let's Encrypt + DANELet's Encrypt + DANE
Let's Encrypt + DANE
 
ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
 

More from Shumon Huque

DANE and DNSSEC Authentication Chain Extension for TLS
DANE and DNSSEC Authentication Chain Extension for TLSDANE and DNSSEC Authentication Chain Extension for TLS
DANE and DNSSEC Authentication Chain Extension for TLSShumon Huque
 
Client Certificates in DANE TLSA Records
Client Certificates in DANE TLSA RecordsClient Certificates in DANE TLSA Records
Client Certificates in DANE TLSA RecordsShumon Huque
 
Query-name Minimization and Authoritative Server Behavior
Query-name Minimization and Authoritative Server BehaviorQuery-name Minimization and Authoritative Server Behavior
Query-name Minimization and Authoritative Server BehaviorShumon Huque
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECShumon Huque
 
Hands-on getdns Tutorial
Hands-on getdns TutorialHands-on getdns Tutorial
Hands-on getdns TutorialShumon Huque
 
IPv6 Tutorial; USENIX LISA 2013
IPv6 Tutorial; USENIX LISA 2013IPv6 Tutorial; USENIX LISA 2013
IPv6 Tutorial; USENIX LISA 2013Shumon Huque
 
DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013Shumon Huque
 
IPv6 Transition in Research & Education
IPv6 Transition in Research & EducationIPv6 Transition in Research & Education
IPv6 Transition in Research & EducationShumon Huque
 
Authorization at Penn
Authorization at PennAuthorization at Penn
Authorization at PennShumon Huque
 
IPv6 Deployment Panel
IPv6 Deployment PanelIPv6 Deployment Panel
IPv6 Deployment PanelShumon Huque
 
World IPv6 Launch at Penn
World IPv6 Launch at PennWorld IPv6 Launch at Penn
World IPv6 Launch at PennShumon Huque
 
IPv6 Security Panel (U of Penn)
IPv6 Security Panel (U of Penn)IPv6 Security Panel (U of Penn)
IPv6 Security Panel (U of Penn)Shumon Huque
 
Open Source VoIP at Penn
Open Source VoIP at PennOpen Source VoIP at Penn
Open Source VoIP at PennShumon Huque
 
Kerberos at Penn (MIT Kerberos Consortium)
Kerberos at Penn (MIT Kerberos Consortium)Kerberos at Penn (MIT Kerberos Consortium)
Kerberos at Penn (MIT Kerberos Consortium)Shumon Huque
 
.EDU DNSSEC Testbed - Lessons Learned
.EDU DNSSEC Testbed - Lessons Learned.EDU DNSSEC Testbed - Lessons Learned
.EDU DNSSEC Testbed - Lessons LearnedShumon Huque
 
IPv6 Campus Deployment Panel
IPv6 Campus Deployment PanelIPv6 Campus Deployment Panel
IPv6 Campus Deployment PanelShumon Huque
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC PilotShumon Huque
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC PilotShumon Huque
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC PilotShumon Huque
 

More from Shumon Huque (20)

DANE and DNSSEC Authentication Chain Extension for TLS
DANE and DNSSEC Authentication Chain Extension for TLSDANE and DNSSEC Authentication Chain Extension for TLS
DANE and DNSSEC Authentication Chain Extension for TLS
 
Client Certificates in DANE TLSA Records
Client Certificates in DANE TLSA RecordsClient Certificates in DANE TLSA Records
Client Certificates in DANE TLSA Records
 
Query-name Minimization and Authoritative Server Behavior
Query-name Minimization and Authoritative Server BehaviorQuery-name Minimization and Authoritative Server Behavior
Query-name Minimization and Authoritative Server Behavior
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSEC
 
Hands-on getdns Tutorial
Hands-on getdns TutorialHands-on getdns Tutorial
Hands-on getdns Tutorial
 
IPv6 Tutorial; USENIX LISA 2013
IPv6 Tutorial; USENIX LISA 2013IPv6 Tutorial; USENIX LISA 2013
IPv6 Tutorial; USENIX LISA 2013
 
DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013
 
IPv6 Transition in Research & Education
IPv6 Transition in Research & EducationIPv6 Transition in Research & Education
IPv6 Transition in Research & Education
 
Authorization at Penn
Authorization at PennAuthorization at Penn
Authorization at Penn
 
IPv6 Deployment Panel
IPv6 Deployment PanelIPv6 Deployment Panel
IPv6 Deployment Panel
 
World IPv6 Launch at Penn
World IPv6 Launch at PennWorld IPv6 Launch at Penn
World IPv6 Launch at Penn
 
IPv6 Security Panel (U of Penn)
IPv6 Security Panel (U of Penn)IPv6 Security Panel (U of Penn)
IPv6 Security Panel (U of Penn)
 
Open Source VoIP at Penn
Open Source VoIP at PennOpen Source VoIP at Penn
Open Source VoIP at Penn
 
Kerberos at Penn (MIT Kerberos Consortium)
Kerberos at Penn (MIT Kerberos Consortium)Kerberos at Penn (MIT Kerberos Consortium)
Kerberos at Penn (MIT Kerberos Consortium)
 
.EDU DNSSEC Testbed - Lessons Learned
.EDU DNSSEC Testbed - Lessons Learned.EDU DNSSEC Testbed - Lessons Learned
.EDU DNSSEC Testbed - Lessons Learned
 
IPv6 Campus Deployment Panel
IPv6 Campus Deployment PanelIPv6 Campus Deployment Panel
IPv6 Campus Deployment Panel
 
PennNet and MAGPI
PennNet and MAGPIPennNet and MAGPI
PennNet and MAGPI
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC Pilot
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC Pilot
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC Pilot
 

Recently uploaded

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 

Recently uploaded (20)

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 

.EDU DNSSEC Testbed

  • 1. EDU DNSSEC Testbed Shumon Huque, University of Pennsylvania Larry Blunk, MERIT Network Internet2 Joint Techs Conference Salt Lake City, Utah February 2nd 2010 1
  • 2. DNSSEC • “DNS Security Extensions” • A system to verify the authenticity of DNS “data” using public key signatures • Protocol specs: RFC 4033, 4034, 4035, 5155 2
  • 3. EDU Top Level Domain • Operation of .EDU is managed by EDUCAUSE under a co-operative agreement with the US Dept of Commerce • VeriSign is the current DNS operator for .EDU (the “registry”) 3
  • 4. Registry Registrar Registrant VeriSign Operator of EDU DNS zone EDUCAUSE Manages zone, registers entries EDU domain holders (upenn, berkeley, merit, etc ..) Terminology 4
  • 5. Announcement • September 3rd 2009 EDUCAUSE and VeriSign announced today the initiation of a project to enhance Internet reliability and stability. [.....] The project will deploy a security system known as Domain Name Security Extensions (DNSSEC) within the .edu portion of the Internet, which EDUCAUSE manages under a cooperative agreement with the U.S. Department of Commerce. When the project is completed, institutions whose domain names end in .edu will be able to incorporate a digital signature into those names to limit a variety of security vulnerabilities. 5
  • 6. Related change • March 1st:VeriSign will be making modifications to .com/.net/.edu DNS servers specifically to support DNSSEC • Involving referral and glue behavior • https://lists.dns-oarc.net/pipermail/dns- operations/2010-January/004838.html 6
  • 7. Feature summary • NSEC3 with Opt-Out (RFC 5155) • Signing algorithms • Testbed used 2048/1024 bit NSEC3 RSASHA1. • Production may use newer (RSASHA256 etc) • Any standardized DS hash algorithm supported (SHA-1, SHA-256, ...) • DNSSEC function integrated into Educause’s web domain management application 7
  • 8. DNSSEC Testbed • Testbed planning discussion - March through August 2009 • Testbed operation: mid September through mid December 2009 • Multiple phases, gradually including more participants 8
  • 9. DNSSEC FAQ • (Answers to) Frequently Asked Questions • http://net.educause.edu/edudnssecfaq 9
  • 10. DNSSEC FAQ • When will .edu be signed? • Final deployment of DNSSEC for .edu will build on the previously announced US Dept of Commerce project to deploy DNSSEC at the authoritative root zone of the Internet.We anticipate .edu will be signed in the first half of 2010. 10
  • 11. DNSSEC FAQ • Do I have to do something with my domain? • No.At launch, DNSSEC will be optional for .edu domain holders. 11
  • 12. DNSSEC FAQ • Will DNSSEC increase fees for .edu domain names? • No.There will be no extra charges for .edu domain names. 12
  • 13. Another doc • Another recent publication by EDUCAUSE: • “7 ThingsYou Should Know About DNSSEC” • http://www.educause.edu/library/EST1001 • Hard copies at JT Info Desk 13
  • 14. 5 Signed EDU subdomains (SLD) berkeley.edu University of California, Berkeley merit.edu MERIT Network penn.edu University of Pennsylvania psc.edu Pittsburgh Supercomputing Ctr upenn.edu University of Pennsylvania * All NSEC * as of January 2010 14
  • 15. Looking further down .. • SecSpider (http://secspider.cs.ucla.edu/) reports 58 domains inside EDU signed • Nearly half are 3rd level domains under Berkeley • Quite a few are subdomains for CS, EECS, etc departments at universities (MIT, Kent State, Georgia Tech, RPI,Wisc) and DNS researchers (UCLA, Colorado State) (as of January 2010) 15
  • 17. DNSSEC Testbed • Mid September through mid December 2009 • Test Registrar Tool (web application) • Test EDU DNS server • Participating EDU institutions: • Signed authoritative zones (test or production) • Validating resolvers 17
  • 18. Participant phases • 1. UPenn, UC Berkeley, MERIT • 2. Harvard, Internet2, LSU, JHU, PSU • 3.ARSC, CMU • 4.Webster,Wichita State 18
  • 19. What a DNSSEC signed delegation in EDU will look like ... 19
  • 20. $ dig @x.x.x.x +norecurse +dnssec +multi www.merit.edu ;; QUESTION SECTION: ;www.merit.edu. IN A ;; AUTHORITY SECTION: merit.edu. 86400 IN NS dns1.merit.net. merit.edu. 86400 IN NS dns2.merit.net. merit.edu. 86400 IN NS dns3.merit.net. merit.edu. 86400 IN DS 14556 5 1 ( 982113D08B4C6A1D9F6AEE1E2237AEF69F3F9759 ) merit.edu. 86400 IN DS 14556 5 2 ( F1E184C0E1D615D20EB3C223ACED3B03C773DD952D5F 0EB5C777586DE18DA6B5 ) merit.edu. 86400 IN RRSIG DS 7 2 86400 20100208154501 ( 20100125144501 4774 edu. KI33EqBmlCqLmQiLdLGbfFYtnI931lz2v9bsi2FFdvH 53lttgMKK3044ToH65xGCwDYS23xUDq1bwu0VLNGnAfl V1GaIvEAAqVeMucfSE0sUzxgaNGtYyum2qMnQeo7bIgM UPizsh5ZImfyWw9If/LsWm7QToe6xcHZT5unnhc= ) Cryptographically Secure Delegations are indicated by “DS” records and their signature (RRSIG). NS DS RRSIG DS 20
  • 21. $ dig @198.108.1.43 merit.edu dnskey ;; QUESTION SECTION: ;merit.edu. IN DNSKEY ;; ANSWER SECTION: merit.edu. 7200 IN DNSKEY 257 3 7 ( AwEAAc6Z4l2Ne7mGyBWZDGegov2/LSJQgWOanV+UoTfe AEWFGWa5yXKIKM9s+EeAHwORpGznNJIaGgxiOJ00H4IF Cml6Z0tZeUvWadRzhtUKXEZqMtvuB+NM8WrrZs/1kSi2 jrf9jDctmPZDSHAjPhB4FQmeoLN+JJVbTZJ38iFHjdU+ hysTnIm4RYjAP/hLWXLeNLqtcbXwalu/ZTzXtt4lHVA/ C2/RqX1Xe/1VMe5/cYiW2bqLbUy9wUxiCVg6gOGBMVEO JZwx/hcJG4n6CZXrdRJH0C8/EVg67DcW6BFfxfdLrLcd WtnDxgYOC2noMP2U4CFiGmBNpTmgxVCuNx7Ct/M= ) ; key id = 14556 The parent DS record is a cryptographic hash of the entry point DNSKEY in the delegated zone [Note: only secure entry point DNSKEY shown] 21
  • 22. Registration System • Screenshots of the (planned) DNSSEC enabled registration system .. • Slightly barebones. Final version will be enhanced with more helpful documentation and additional verbiage. 22
  • 23. 23
  • 24. 24
  • 25. 25
  • 26. 26
  • 27. 27
  • 28. 28
  • 29. Participant requirements • Authoritative DNS servers running signed zones (test servers ok) • Validating resolvers, configured to use EDU testbed servers as authority (eg. via the “stub zone” feature in BIND, Unbound) 29
  • 30. Overview of Tests • [set of tests between registrar & registry] 30
  • 31. Overview of Tests • confirm connectivity to testbed • Add DS records of various algorithms & digest types • Add additional DS record(s) • Remove DS record(s) • Add incorrect DS record(s) • View DS record history report • Perform key rollover operations and DS updates 31
  • 32. Overview of Tests • At each test stage perform verification tests with an appropriately configured validating resolver • edu trust anchor • stub zone for edu pointing to testbed servers • Attempt to validate records in the zones of other participants also 32
  • 33. Summary Results • For the most part, everything worked as expected • A few small bugs were fixed • A few accidental key expirations and incorrect participant zone signings happened (hey, it’s a testbed!) • Support for registering multiple DS records was added • Debate about submitting DNSKEY vs DS records to registrar 33
  • 34. References • http://net.educause.edu/edudnssecfaq • http://www.educause.edu/library/EST1001 • https://www.dnssec-deployment.org/index.php/ deployment-case-studies/internet-2/ 34
  • 35. Questions/Comments? • Shumon Huque, shuque [at] upenn.edu • Larry Blunk, ljb [at] merit.edu 35