SlideShare a Scribd company logo
1 of 8
Download to read offline
DNSSEC Deployment




Lessons Learned
Rodney Joffe
SVP and Senior Technologist
07/20/2011
Neustar DNSSEC:
Three Key Areas of Experience

    » 1) Signed TLD zones for registries we operate - .us, .biz,
      .co
    » 2) Hosted (secondary) signed ccTLDs – .uk, .jp, .fi, .nu
    » 3) Implemented a managed DNSSEC service using a code
      base entirely separate from BIND




                 © Neustar Inc. / Proprietary and Confidential
2
Neustar Experience
    Signing TLD Zones
    » Our three signed zones have 1-2 million names each
    » We use NSEC negative answers and different DNSSEC
      key algorithms
    » We used a fairly straightforward deployment plan which
      requires care but is not scary




                 © Neustar Inc. / Proprietary and Confidential
3
Neustar Experience:
    Hosting other signed TLDs
    » We have seen the impact of transferring signed zones

    » Different registries have used different approaches to DNSSEC
      which has an impact on zone distribution

    » Zones are larger

    » Zones are changed more often

    » Coordinating computing resources to handle the increased
      pressure of the updates was harder than anticipated



                  © Neustar Inc. / Proprietary and Confidential
4
Neustar Experience:
    Managed DNSSEC Implementation
» Neustar has nearly 10 years of experience in DNSSEC development and operations
    »   US and BIZ registries are DNSSEC signed, 7 years after our first test beds
    »   Participation in specification development
    »   Active participation in global network operations fora
» Other credentials relating to DNS
    »   Pioneered anycast techniques
    »   DDoS mitigation work
» Experience in secure distributed database operations and operating Managed DNS
        services
» Neustar’s fully managed DNS and DNSSEC solution provides:
    »   Resiliency and reliability thanks to a multi node footprint
    »   Automated, customizable key management
    »   Optional FIPS Level 3




                         © Neustar Inc. / Proprietary and Confidential
5
Lessons Learned from Neustar
    Registry Deployment
» Upfront effort to begin DNSSEC
     »   Upgrade (renovate) DNS infrastructure to support DNSSEC

» Institute key management functions. DNSSEC relies on solid key management
     »   Creating a key poorly may lead to someone guessing it
     »   Allowing keys to be seen by operators risks the secret
     »   Choice of algorithms and key size
     »   Timing of key operations, Signature lifetime, Key effectivity, and Key
         supersession

» Ongoing effort to maintain DNSSEC
     »   Keep data "fresh", DNSSEC data can go stale
     »   Participation in more public meetings and mail lists


                      © Neustar Inc. / Proprietary and Confidential
6
Thank You!




    © Neustar Inc. / Proprietary and Confidential
7
DNSSEC
Chain of Trust

            Root DNS




    Authoritative DNS    .com.                .gov.               .biz.
                 (TLD)


    Authoritative DNS            domain.biz           site.biz.           ultradns.biz
                 (SLD)



           Recursive
               DNS



Client / stub resolver

More Related Content

What's hot

Securing Data in Transit -
Securing Data in Transit - Securing Data in Transit -
Securing Data in Transit -
wolfSSL
 

What's hot (14)

Windows most important server questions for l1 level
Windows  most important server questions for l1 levelWindows  most important server questions for l1 level
Windows most important server questions for l1 level
 
Securing MySQL with a Focus on SSL
Securing MySQL with a Focus on SSLSecuring MySQL with a Focus on SSL
Securing MySQL with a Focus on SSL
 
Sia report
Sia reportSia report
Sia report
 
OpenStack Backup, Restore, DR (Freezer)
OpenStack Backup, Restore, DR (Freezer)OpenStack Backup, Restore, DR (Freezer)
OpenStack Backup, Restore, DR (Freezer)
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC Pilot
 
23rd PITA AGM and Conference: DNS Security - A holistic view
23rd PITA AGM and Conference: DNS Security - A holistic view 23rd PITA AGM and Conference: DNS Security - A holistic view
23rd PITA AGM and Conference: DNS Security - A holistic view
 
Securing memcache
Securing memcacheSecuring memcache
Securing memcache
 
Puzzle Lock
Puzzle LockPuzzle Lock
Puzzle Lock
 
Securing Data in Transit -
Securing Data in Transit - Securing Data in Transit -
Securing Data in Transit -
 
Implementing Active Security with Sysdig Falco - Barcelona Software Crafters
Implementing Active Security with Sysdig Falco - Barcelona Software CraftersImplementing Active Security with Sysdig Falco - Barcelona Software Crafters
Implementing Active Security with Sysdig Falco - Barcelona Software Crafters
 
DDoS Mitigation on the Front Line with RedShield
DDoS Mitigation on the Front Line with RedShieldDDoS Mitigation on the Front Line with RedShield
DDoS Mitigation on the Front Line with RedShield
 
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS SupportWebinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
 
Securing your Kubernetes applications
Securing your Kubernetes applicationsSecuring your Kubernetes applications
Securing your Kubernetes applications
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC Pilot
 

Viewers also liked (7)

perl
perlperl
perl
 
PCCNews0609
PCCNews0609PCCNews0609
PCCNews0609
 
IntroTestMore
IntroTestMoreIntroTestMore
IntroTestMore
 
perl_tk_tutorial
perl_tk_tutorialperl_tk_tutorial
perl_tk_tutorial
 
Presentatie alpe d_huzes_twinfield
Presentatie alpe d_huzes_twinfieldPresentatie alpe d_huzes_twinfield
Presentatie alpe d_huzes_twinfield
 
perltut
perltutperltut
perltut
 
My Presentacion Oral.Pptx
My Presentacion Oral.PptxMy Presentacion Oral.Pptx
My Presentacion Oral.Pptx
 

Similar to FOSE 2011: DNSSEC and the Government, Lessons Learned

Dnssec proposal-09oct08-en
Dnssec proposal-09oct08-enDnssec proposal-09oct08-en
Dnssec proposal-09oct08-en
guest3131f85
 
Dnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 EnDnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 En
Erol Dizdar
 

Similar to FOSE 2011: DNSSEC and the Government, Lessons Learned (20)

8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 
DNSSEC: What a Registrar Needs to Know
DNSSEC:  What a Registrar Needs to KnowDNSSEC:  What a Registrar Needs to Know
DNSSEC: What a Registrar Needs to Know
 
Introduction DNSSec
Introduction DNSSecIntroduction DNSSec
Introduction DNSSec
 
Best Practices for Monitoring DNS
Best Practices for Monitoring DNSBest Practices for Monitoring DNS
Best Practices for Monitoring DNS
 
ION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSECION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSEC
 
ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?
 
ION Belfast - Why Implement DNSSEC? - Jim Galvin
ION Belfast - Why Implement DNSSEC? - Jim GalvinION Belfast - Why Implement DNSSEC? - Jim Galvin
ION Belfast - Why Implement DNSSEC? - Jim Galvin
 
F5's Dynamic DNS Services
F5's Dynamic DNS ServicesF5's Dynamic DNS Services
F5's Dynamic DNS Services
 
DNS Security Strategy
DNS Security StrategyDNS Security Strategy
DNS Security Strategy
 
DNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & AfiliasDNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & Afilias
 
Dnssec proposal-09oct08-en
Dnssec proposal-09oct08-enDnssec proposal-09oct08-en
Dnssec proposal-09oct08-en
 
Dnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 EnDnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 En
 
CNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondCNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyond
 
ION Toronto - Why Implement DNSSEC?
ION Toronto - Why Implement DNSSEC? ION Toronto - Why Implement DNSSEC?
ION Toronto - Why Implement DNSSEC?
 
ION Mumbai - Shailesh Gupta: Business Case for IPv6 and DNSSEC
ION Mumbai - Shailesh Gupta: Business Case for IPv6 and DNSSECION Mumbai - Shailesh Gupta: Business Case for IPv6 and DNSSEC
ION Mumbai - Shailesh Gupta: Business Case for IPv6 and DNSSEC
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutions
 
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionCNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
 
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionCNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
 

More from Neustar, Inc.

Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014
Neustar, Inc.
 
Neustar Cassandra Experience
Neustar Cassandra ExperienceNeustar Cassandra Experience
Neustar Cassandra Experience
Neustar, Inc.
 

More from Neustar, Inc. (11)

Vacation Traveler Insights
Vacation Traveler InsightsVacation Traveler Insights
Vacation Traveler Insights
 
Game of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experienceGame of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experience
 
The Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & MillennialsThe Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & Millennials
 
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the SmokeA Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
 
Hi-Def Marketing
Hi-Def MarketingHi-Def Marketing
Hi-Def Marketing
 
Adweek and Neustar
Adweek and NeustarAdweek and Neustar
Adweek and Neustar
 
Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014
 
Neustar Cassandra Experience
Neustar Cassandra ExperienceNeustar Cassandra Experience
Neustar Cassandra Experience
 
What We are Learning About DNS Security: DNSSEC and Much More..
What We are Learning About DNS Security:  DNSSEC and Much More..What We are Learning About DNS Security:  DNSSEC and Much More..
What We are Learning About DNS Security: DNSSEC and Much More..
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The Cloud
 
The Future of the Internet: Open Research Topics
The Future of the Internet: Open Research TopicsThe Future of the Internet: Open Research Topics
The Future of the Internet: Open Research Topics
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Recently uploaded (20)

FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 

FOSE 2011: DNSSEC and the Government, Lessons Learned

  • 1. DNSSEC Deployment Lessons Learned Rodney Joffe SVP and Senior Technologist 07/20/2011
  • 2. Neustar DNSSEC: Three Key Areas of Experience » 1) Signed TLD zones for registries we operate - .us, .biz, .co » 2) Hosted (secondary) signed ccTLDs – .uk, .jp, .fi, .nu » 3) Implemented a managed DNSSEC service using a code base entirely separate from BIND © Neustar Inc. / Proprietary and Confidential 2
  • 3. Neustar Experience Signing TLD Zones » Our three signed zones have 1-2 million names each » We use NSEC negative answers and different DNSSEC key algorithms » We used a fairly straightforward deployment plan which requires care but is not scary © Neustar Inc. / Proprietary and Confidential 3
  • 4. Neustar Experience: Hosting other signed TLDs » We have seen the impact of transferring signed zones » Different registries have used different approaches to DNSSEC which has an impact on zone distribution » Zones are larger » Zones are changed more often » Coordinating computing resources to handle the increased pressure of the updates was harder than anticipated © Neustar Inc. / Proprietary and Confidential 4
  • 5. Neustar Experience: Managed DNSSEC Implementation » Neustar has nearly 10 years of experience in DNSSEC development and operations » US and BIZ registries are DNSSEC signed, 7 years after our first test beds » Participation in specification development » Active participation in global network operations fora » Other credentials relating to DNS » Pioneered anycast techniques » DDoS mitigation work » Experience in secure distributed database operations and operating Managed DNS services » Neustar’s fully managed DNS and DNSSEC solution provides: » Resiliency and reliability thanks to a multi node footprint » Automated, customizable key management » Optional FIPS Level 3 © Neustar Inc. / Proprietary and Confidential 5
  • 6. Lessons Learned from Neustar Registry Deployment » Upfront effort to begin DNSSEC » Upgrade (renovate) DNS infrastructure to support DNSSEC » Institute key management functions. DNSSEC relies on solid key management » Creating a key poorly may lead to someone guessing it » Allowing keys to be seen by operators risks the secret » Choice of algorithms and key size » Timing of key operations, Signature lifetime, Key effectivity, and Key supersession » Ongoing effort to maintain DNSSEC » Keep data "fresh", DNSSEC data can go stale » Participation in more public meetings and mail lists © Neustar Inc. / Proprietary and Confidential 6
  • 7. Thank You! © Neustar Inc. / Proprietary and Confidential 7
  • 8. DNSSEC Chain of Trust Root DNS Authoritative DNS .com. .gov. .biz. (TLD) Authoritative DNS domain.biz site.biz. ultradns.biz (SLD) Recursive DNS Client / stub resolver