SlideShare a Scribd company logo
1 of 49
Download to read offline
Dane?
Enough said?
No?
The Longer Version…	

https://www.flickr.com/photos/hyper7/7287993694
A CertificateAuthority!
A CertificateAuthority!
A Bankrupt
Certificate
Authority!
International Herald Tribune 	

Sep 13, 2011 Front Page	

Front-Page
News!
What wentwrong?!
http://www.diginotar.nl/Portals/7/Persberichten/
Operation%20Black%20Tulip%20v1.0a.pdf
OnlineCertificationAuthority!
Server
Compromise!
Multiple
hacker tools
on the servers!
Specialized
PKI scripts!
Fake certificate
issued for
*.google.com! Fake certificate
private key
published!
Iran users of
gmail are
compromised by a
mitm attack!
Fake certificate
issued for
*.google.com!
Fake certificate
private key
published!
Any attacker-in-the-middle	

can intercept a connection
request for mail.google.com,	

and initiate a “secure” connection	

using the fake certificate, and	

your browser could be fooled
into believing that this was the
genuine server!	

+	

 =
Fake certificate
issued for
*.google.com!
Fake certificate
private key
published!
Any attacker-in-the-middle	

can intercept a connection
request for mail.google.com,	

and initiate a “secure” connection	

using the fake certificate, and	

your browser could be fooled
into believing that this was the
genuine server!	

+	

 =	

Was this a one-
off?!
Or are thereimplications for thelarger issue of oursecurity framework onthe Internet?!
So much of the
Internet relies on
trust in security
offered by domain
name certs!
So much of the
Internet relies on
trust in security
offered by domain
name certs!
So much of the
Internet relies on
trust in security
offered by domain
name certs!
But this is just not
good enough!
Two problems:	

1. I may not have landed up where I wanted to be:	

DNS cache poisoning	

DNS resolver compromise	

Local host compromise	

Routing compromise	

	

2. The domain name certificate may be fake	

	

The combination of the two implies that I, and the
browser I use, may not even notice that we have
been mislead. This is bad.
The 2011 mitm attack was evidently performed by a
state-based organisation in Iran, with direct access to
national infrastructure, exploiting a fake cert issued by a
compromised CA	

	

You don’t need to be the NSA or its equivalent to play
this game – this form of attack would work at any scale.	

	

Either the attacker is already on path to the intended
site, or the attacker can use access to routing to inject
routes that direct the data flows to the attack point 	

How could it happen?
Why could it happen?	

The TLS session cannot
say WHICH CA is to be
used to validate the servercertificate!
Your browser will allow ANY CA
to be used to validate a digital
signature !
Compromised CAs imperil theentire framework of security!!
This is broken!	

Domain Name certification should use trust and integrity of operation as a
differentiator	

If you pay more money you would expect to use a service that operates
with greater levels of care and data protection of your data and users of
your service would be “more secure” – right?	

	

But a compromised CA can issue a domain name certificate for ANY domain
name	

If you trust this compromised CA then you are going to trust its products	

	

The entire Domain Name CA operation is only as good as the worst CA!	

It does not matter what CA service you use, because any compromised
CA can compromise users of your service
Lets take a
step back!
The role of a
CA:!
Subject!Requests!
RA performs
checks!
RA tells CA tosign!
Browser trusts
CA signed
certificates!
And therefore!~1500 Subordinate CAs!(~651 organizations)!
See the EFF SSL observatory!http://www.eff.org/files/DefconSSLiverse.pdf!
Sustainable!
Trusted!
Open!
what succeeds in the market?	

Cheap!!Secure!
In a commercial world...
An important motivation for using digital certificates with SSL was to add trust to online
transactions by requiring website operators to undergo vetting with a certificate authority
(CA) in order to get an SSL certificate. However, commercial pressures have led some CAs
to introduce "domain validation only" SSL certificates for which minimal verification is
performed of the details in the certificate.	

	

Most browsers' user interfaces did not clearly differentiate between low-validation
certificates and those that have undergone more rigorous vetting. Since any successful SSL
connection causes the padlock icon to appear, users are not likely to be aware of whether
the website owner has been validated or not.As a result, fraudsters (including phishing
websites) have started to use SSL to add perceived credibility to their websites.	

	

By establishing stricter issuing criteria and requiring consistent application of those criteria
by all participating CAs, EV SSL certificates are intended to restore confidence among users
that a website operator is a legally established business or organization with a verifiable
identity. 	


http://en.wikipedia.org/wiki/Extended_Validation_Certificate	

	

Some CAs don’t apply rigorous
identity checks to issued domain
name validation certificates!
All these CA worker
bees and all these
manual checks are a
tad expensive!
And the certificate
market is
undifferentiated!
Reduce CA costs
through automation
of the process!
RA sends a mail to
well known address!
@example.com!
When mailreturned CA will
sign!
RA sends a mail to
well known address!
@example.com!
When mailreturned CA will
sign!
All these checks are
based on information
fetched from the DNS!
Hold that thought!!
An important motivation for using digital certificates with SSL was to add trust to online
transactions by requiring website operators to undergo vetting with a certificate authority
(CA) in order to get an SSL certificate. However, commercial pressures have led some CAs
to introduce domain validation only SSL certificates for which minimal verification is
performed of the details in the certificate.	

	

Most browsers' user interfaces did not clearly differentiate between low-validation
certificates and those that have undergone more rigorous vetting. Since any successful SSL
connection causes the padlock icon to appear, users are not likely to be aware of whether
the website owner has been validated or not.As a result, fraudsters (including phishing
websites) have started to use SSL to add perceived credibility to their websites.	

	

By establishing stricter issuing criteria and requiring consistent application of those criteria
by all participating CAs, EV SSL certificates are intended to restore confidence among users
that a website operator is a legally established business or organization with a verifiable
identity. 	


http://en.wikipedia.org/wiki/Extended_Validation_Certificate
Rogue Certificate
Counter Measures!
Blacklisting!
Whitelisting!!
CRL! OCSP!
Doesn’t scale well!
Only available when compromise is
known to have happened!
Relies on OCSP use!!
ExtendedValidity!
DV-EV distinction cannot be
made reliably without
external knowledge!
HSTS!
Leap of Faith!
Or use an
alternative
infrastructure!
What if you know before
starting the TLS/SSL
session that a certain
certificate is to be expected?!
Whitelisting!
Domain Name
System!
Independent HierarchicalRegistration!
One root!
Scalable andGlobal!
Namespace maps 1:1 to PKIUse!
DANE
DNS-Based Authentication of Named Entities	

How to represent and
authenticate “named
entities” in the DNS,using DNSSEC!
Web Sites!
Email
addresses!Jabber IDs!
RFC 6394!
RFC 6698!
CA Cert!
EE Cert!
Trust Anchor!
RFC6394:TLSA RR
Valid CERTs and/or CAs are
stored in the the DNS!
If DANE provides the CA’s
identity, then DANE offers the
protection that you are looking
at a valid EV Certificate issued
by the CA that performed the EV
validation checks in the firstplace!
CA compromise then has
limited liability to those
certificates issued by the
compromised CA!
i.e. your service is compromised only if
your chosen CA is compromised!!
Valid CERTs and/or CAs are
stored in the the DNS!
If the DNS provides the EE cert,
then DANE offers the protection
that you are looking at a valid
Certificate issued by the entity
that holds the domain name in
the first place!
Name Certificate
publication is controlled
by the zone authority – no
CA intermediary is needed!
!
Security is “free”!
How does
DNSSEC get
into the picture?!
How does
DNSSEC get
into the picture?!
DANE assumes a
DNS that operates
with integrity!
Is the certificate
provided in a TLSA
response genuine? !
To answer that you
need to be able to
validate the DNS
response! And to do that you
need DNSSEC!
All these checks are
based on information
fetched from the DNS!
Did you keep this
thought?!
0wn the DNS and
the DV is yours
Obtaining Rogue (DV)
Certificates!
DANE has the potential to
solve important PKI/TLS
problems in securing
access to named entities!
And for DANE to work
then DNSSEC is
necessary!
How are we
going with
DNSSEC?..!
High levels of DNSSEC!
Use seen in Africa,!
Eastern and Northern!
Europe!
11% of users send their
DNS queries to DNSSEC-
validating resolvers
Why invest in
DNSSEC?!
Because the DNS represents amajor point of vulnerability intoday’s networks!
Cyber attacks are no longer just
a teenage hobby or even petty
crime!
Attacks on the DNS are
highly effective for all
kinds of reasons!!
this is just not good
enough any more!
What needs to happen?	

•  The local name management infrastructure should
support the use of DNSSEC in all aspects of name
management
What needs to happen?	

•  The local name management infrastructure should
support the use of DNSSEC in all aspects of name
management	

•  ISPs should add DNSSEC validation to their forwarding
resolvers
What needs to happen?	

•  The local name management infrastructure should
support the use of DNSSEC in all aspects of name
management	

•  ISPs should add DNSSEC validation to their forwarding
resolvers	

•  And if you want to push it a bit in the right direction...	

For secure named services using a domain name
certificate, add the Issuer’s public CA cert as a DANE
record into your DNSSEC-signed zone
Geoff Huston's presentation on DANE (Keys in the DNS) at the New Zealand Internet Technical Architecture conference (InTAC)

More Related Content

What's hot

Four years of breaking HTTPS with BGP hijacking
Four years of breaking HTTPS with BGP hijackingFour years of breaking HTTPS with BGP hijacking
Four years of breaking HTTPS with BGP hijackingAPNIC
 
Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4skimil
 
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksJeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksMedia Perspectives
 
Lior rotkovitch ASM WAF unified learning – building policy with asm v12
Lior rotkovitch   ASM WAF  unified learning – building policy with asm v12Lior rotkovitch   ASM WAF  unified learning – building policy with asm v12
Lior rotkovitch ASM WAF unified learning – building policy with asm v12Lior Rotkovitch
 
Evolution of WAF - Stop Worrying About Vulnerabilities
Evolution of WAF - Stop Worrying About VulnerabilitiesEvolution of WAF - Stop Worrying About Vulnerabilities
Evolution of WAF - Stop Worrying About VulnerabilitiesBrian A. McHenry
 
Alternatives to Certificate Authorities for a Secure Web
Alternatives to Certificate Authorities for a Secure WebAlternatives to Certificate Authorities for a Secure Web
Alternatives to Certificate Authorities for a Secure WebCASCouncil
 

What's hot (6)

Four years of breaking HTTPS with BGP hijacking
Four years of breaking HTTPS with BGP hijackingFour years of breaking HTTPS with BGP hijacking
Four years of breaking HTTPS with BGP hijacking
 
Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4
 
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksJeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
 
Lior rotkovitch ASM WAF unified learning – building policy with asm v12
Lior rotkovitch   ASM WAF  unified learning – building policy with asm v12Lior rotkovitch   ASM WAF  unified learning – building policy with asm v12
Lior rotkovitch ASM WAF unified learning – building policy with asm v12
 
Evolution of WAF - Stop Worrying About Vulnerabilities
Evolution of WAF - Stop Worrying About VulnerabilitiesEvolution of WAF - Stop Worrying About Vulnerabilities
Evolution of WAF - Stop Worrying About Vulnerabilities
 
Alternatives to Certificate Authorities for a Secure Web
Alternatives to Certificate Authorities for a Secure WebAlternatives to Certificate Authorities for a Secure Web
Alternatives to Certificate Authorities for a Secure Web
 

Viewers also liked

Clean Habits - Keep Naturally Clean
Clean Habits - Keep Naturally CleanClean Habits - Keep Naturally Clean
Clean Habits - Keep Naturally CleanSeth McNeely
 
Mark Earls - COPY, COPY, COPY
Mark Earls - COPY, COPY, COPYMark Earls - COPY, COPY, COPY
Mark Earls - COPY, COPY, COPYRay Poynter
 
How to improve your professional future in 20 minutes a day
How to improve your professional future in 20 minutes a dayHow to improve your professional future in 20 minutes a day
How to improve your professional future in 20 minutes a dayTrevor Young
 
Vierde spreker Ben Barratt 15de horta infoavond ademloos straten-generaal okt...
Vierde spreker Ben Barratt 15de horta infoavond ademloos straten-generaal okt...Vierde spreker Ben Barratt 15de horta infoavond ademloos straten-generaal okt...
Vierde spreker Ben Barratt 15de horta infoavond ademloos straten-generaal okt...Koen van Hees
 
03 meridiani. libro 3^ ed religione p. 2
03 meridiani. libro 3^ ed   religione p. 203 meridiani. libro 3^ ed   religione p. 2
03 meridiani. libro 3^ ed religione p. 2Raimondo Villano
 
Werbeplanung.at SUMMIT 16 – Wie LinkedIn Personalprofis überzeugt – Florian H...
Werbeplanung.at SUMMIT 16 – Wie LinkedIn Personalprofis überzeugt – Florian H...Werbeplanung.at SUMMIT 16 – Wie LinkedIn Personalprofis überzeugt – Florian H...
Werbeplanung.at SUMMIT 16 – Wie LinkedIn Personalprofis überzeugt – Florian H...Werbeplanung.at Summit
 
Système de concepts pour une médecine moderne
Système de concepts pour une médecine moderneSystème de concepts pour une médecine moderne
Système de concepts pour une médecine modernePhilippe AMELINE
 
The Pareto Principle (Project 2)
The Pareto Principle (Project 2)The Pareto Principle (Project 2)
The Pareto Principle (Project 2)Kameron Garcia
 
La innovación como modelo de negocio en la Industria Farmacéutica
La innovación como modelo de negocio en la Industria FarmacéuticaLa innovación como modelo de negocio en la Industria Farmacéutica
La innovación como modelo de negocio en la Industria FarmacéuticaAlejandro Borges
 
10 Marketing Hacks To Boost Your Startup
10 Marketing Hacks To Boost Your Startup10 Marketing Hacks To Boost Your Startup
10 Marketing Hacks To Boost Your StartupBen Lang
 
Making Biomedical Research More Like Airbnb
Making Biomedical Research More Like AirbnbMaking Biomedical Research More Like Airbnb
Making Biomedical Research More Like AirbnbPhilip Bourne
 
Introduccion Logistica modulo 1
Introduccion Logistica modulo 1Introduccion Logistica modulo 1
Introduccion Logistica modulo 1kariitoperea
 
Digijulkaisut (KATSO KUVAUKSESTA UUDEN VERSION LINKKI)
Digijulkaisut (KATSO KUVAUKSESTA UUDEN VERSION LINKKI)Digijulkaisut (KATSO KUVAUKSESTA UUDEN VERSION LINKKI)
Digijulkaisut (KATSO KUVAUKSESTA UUDEN VERSION LINKKI)Matleena Laakso
 
How to design new growth ventures.
How to design new growth ventures.How to design new growth ventures.
How to design new growth ventures.Dr. Marc Sniukas
 
Rob Mac Sweeney vs Paul Marik - Predicting Fluid Responsiveness is a Waste of...
Rob Mac Sweeney vs Paul Marik - Predicting Fluid Responsiveness is a Waste of...Rob Mac Sweeney vs Paul Marik - Predicting Fluid Responsiveness is a Waste of...
Rob Mac Sweeney vs Paul Marik - Predicting Fluid Responsiveness is a Waste of...SMACC Conference
 
Redes sociales para transformar la Administración pública
Redes sociales para transformar la Administración públicaRedes sociales para transformar la Administración pública
Redes sociales para transformar la Administración públicaJordi Graells
 

Viewers also liked (20)

Clean Habits - Keep Naturally Clean
Clean Habits - Keep Naturally CleanClean Habits - Keep Naturally Clean
Clean Habits - Keep Naturally Clean
 
Mark Earls - COPY, COPY, COPY
Mark Earls - COPY, COPY, COPYMark Earls - COPY, COPY, COPY
Mark Earls - COPY, COPY, COPY
 
Mighty Guides- Data Disruption
Mighty Guides- Data DisruptionMighty Guides- Data Disruption
Mighty Guides- Data Disruption
 
LawFirmKowalik- criminal.
LawFirmKowalik- criminal.LawFirmKowalik- criminal.
LawFirmKowalik- criminal.
 
How to improve your professional future in 20 minutes a day
How to improve your professional future in 20 minutes a dayHow to improve your professional future in 20 minutes a day
How to improve your professional future in 20 minutes a day
 
Vierde spreker Ben Barratt 15de horta infoavond ademloos straten-generaal okt...
Vierde spreker Ben Barratt 15de horta infoavond ademloos straten-generaal okt...Vierde spreker Ben Barratt 15de horta infoavond ademloos straten-generaal okt...
Vierde spreker Ben Barratt 15de horta infoavond ademloos straten-generaal okt...
 
03 meridiani. libro 3^ ed religione p. 2
03 meridiani. libro 3^ ed   religione p. 203 meridiani. libro 3^ ed   religione p. 2
03 meridiani. libro 3^ ed religione p. 2
 
Werbeplanung.at SUMMIT 16 – Wie LinkedIn Personalprofis überzeugt – Florian H...
Werbeplanung.at SUMMIT 16 – Wie LinkedIn Personalprofis überzeugt – Florian H...Werbeplanung.at SUMMIT 16 – Wie LinkedIn Personalprofis überzeugt – Florian H...
Werbeplanung.at SUMMIT 16 – Wie LinkedIn Personalprofis überzeugt – Florian H...
 
Gamification 101 session 1
Gamification 101 session 1Gamification 101 session 1
Gamification 101 session 1
 
Système de concepts pour une médecine moderne
Système de concepts pour une médecine moderneSystème de concepts pour une médecine moderne
Système de concepts pour une médecine moderne
 
The Pareto Principle (Project 2)
The Pareto Principle (Project 2)The Pareto Principle (Project 2)
The Pareto Principle (Project 2)
 
La innovación como modelo de negocio en la Industria Farmacéutica
La innovación como modelo de negocio en la Industria FarmacéuticaLa innovación como modelo de negocio en la Industria Farmacéutica
La innovación como modelo de negocio en la Industria Farmacéutica
 
10 Marketing Hacks To Boost Your Startup
10 Marketing Hacks To Boost Your Startup10 Marketing Hacks To Boost Your Startup
10 Marketing Hacks To Boost Your Startup
 
Making Biomedical Research More Like Airbnb
Making Biomedical Research More Like AirbnbMaking Biomedical Research More Like Airbnb
Making Biomedical Research More Like Airbnb
 
コーダー白書2016
コーダー白書2016コーダー白書2016
コーダー白書2016
 
Introduccion Logistica modulo 1
Introduccion Logistica modulo 1Introduccion Logistica modulo 1
Introduccion Logistica modulo 1
 
Digijulkaisut (KATSO KUVAUKSESTA UUDEN VERSION LINKKI)
Digijulkaisut (KATSO KUVAUKSESTA UUDEN VERSION LINKKI)Digijulkaisut (KATSO KUVAUKSESTA UUDEN VERSION LINKKI)
Digijulkaisut (KATSO KUVAUKSESTA UUDEN VERSION LINKKI)
 
How to design new growth ventures.
How to design new growth ventures.How to design new growth ventures.
How to design new growth ventures.
 
Rob Mac Sweeney vs Paul Marik - Predicting Fluid Responsiveness is a Waste of...
Rob Mac Sweeney vs Paul Marik - Predicting Fluid Responsiveness is a Waste of...Rob Mac Sweeney vs Paul Marik - Predicting Fluid Responsiveness is a Waste of...
Rob Mac Sweeney vs Paul Marik - Predicting Fluid Responsiveness is a Waste of...
 
Redes sociales para transformar la Administración pública
Redes sociales para transformar la Administración públicaRedes sociales para transformar la Administración pública
Redes sociales para transformar la Administración pública
 

Similar to Geoff Huston's presentation on DANE (Keys in the DNS) at the New Zealand Internet Technical Architecture conference (InTAC)

Thawte EV SSL: A New Revolution for Trust
Thawte EV SSL: A New Revolution for TrustThawte EV SSL: A New Revolution for Trust
Thawte EV SSL: A New Revolution for TrustRapidSSLOnline.com
 
Extended Validation SSL Certificates, A new standard to inspire trust, improv...
Extended Validation SSL Certificates, A new standard to inspire trust, improv...Extended Validation SSL Certificates, A new standard to inspire trust, improv...
Extended Validation SSL Certificates, A new standard to inspire trust, improv...CheapSSLsecurity
 
A Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL CertificateA Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL CertificateRapidSSLOnline.com
 
Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...
Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...
Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...CheapSSLsecurity
 
Paid vs Free SSL Certificates: Which One Should You Pick in 2021?
Paid vs Free SSL Certificates: Which One Should You Pick in 2021?Paid vs Free SSL Certificates: Which One Should You Pick in 2021?
Paid vs Free SSL Certificates: Which One Should You Pick in 2021?RonanMarco1
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applicationsArash Ramez
 
Types of SSL Certificates for Every Business Need
Types of SSL Certificates for Every Business NeedTypes of SSL Certificates for Every Business Need
Types of SSL Certificates for Every Business Needawakish
 
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017CASCouncil
 
Improve your site’s credibility on SERPs with an SSL certificate.pdf
Improve your site’s credibility on SERPs with an SSL certificate.pdfImprove your site’s credibility on SERPs with an SSL certificate.pdf
Improve your site’s credibility on SERPs with an SSL certificate.pdfDigital Marketing
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfJUSTSTYLISH3B2MOHALI
 
SSL Certificate: Stamp of Web Security
SSL Certificate: Stamp of Web SecuritySSL Certificate: Stamp of Web Security
SSL Certificate: Stamp of Web SecurityHTS Hosting
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layerBU
 
Tips for safe purchasing on the web
Tips for safe purchasing on the webTips for safe purchasing on the web
Tips for safe purchasing on the webKeynectis
 
Offer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteOffer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteKeynectis
 

Similar to Geoff Huston's presentation on DANE (Keys in the DNS) at the New Zealand Internet Technical Architecture conference (InTAC) (20)

Thawte EV SSL: A New Revolution for Trust
Thawte EV SSL: A New Revolution for TrustThawte EV SSL: A New Revolution for Trust
Thawte EV SSL: A New Revolution for Trust
 
How does ssl work
How does ssl workHow does ssl work
How does ssl work
 
Extended Validation SSL Certificates, A new standard to inspire trust, improv...
Extended Validation SSL Certificates, A new standard to inspire trust, improv...Extended Validation SSL Certificates, A new standard to inspire trust, improv...
Extended Validation SSL Certificates, A new standard to inspire trust, improv...
 
Thawte beginners guide_ssl_uk_(1)
Thawte beginners guide_ssl_uk_(1)Thawte beginners guide_ssl_uk_(1)
Thawte beginners guide_ssl_uk_(1)
 
A Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL CertificateA Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL Certificate
 
Vps server 14
Vps server 14Vps server 14
Vps server 14
 
Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...
Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...
Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...
 
Paid vs Free SSL Certificates: Which One Should You Pick in 2021?
Paid vs Free SSL Certificates: Which One Should You Pick in 2021?Paid vs Free SSL Certificates: Which One Should You Pick in 2021?
Paid vs Free SSL Certificates: Which One Should You Pick in 2021?
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
All About SSL/TLS
All About SSL/TLSAll About SSL/TLS
All About SSL/TLS
 
Types of SSL Certificates for Every Business Need
Types of SSL Certificates for Every Business NeedTypes of SSL Certificates for Every Business Need
Types of SSL Certificates for Every Business Need
 
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
 
Improve your site’s credibility on SERPs with an SSL certificate.pdf
Improve your site’s credibility on SERPs with an SSL certificate.pdfImprove your site’s credibility on SERPs with an SSL certificate.pdf
Improve your site’s credibility on SERPs with an SSL certificate.pdf
 
3441355 ln motileng_ssl_report
3441355 ln motileng_ssl_report3441355 ln motileng_ssl_report
3441355 ln motileng_ssl_report
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
SSL Certificate: Stamp of Web Security
SSL Certificate: Stamp of Web SecuritySSL Certificate: Stamp of Web Security
SSL Certificate: Stamp of Web Security
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Tips for safe purchasing on the web
Tips for safe purchasing on the webTips for safe purchasing on the web
Tips for safe purchasing on the web
 
Offer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteOffer a trustworthy environment on your web site
Offer a trustworthy environment on your web site
 

More from Siena Perry

APNIC Hackathon Poke Prefix
APNIC Hackathon Poke PrefixAPNIC Hackathon Poke Prefix
APNIC Hackathon Poke PrefixSiena Perry
 
APNIC Hackathon Tunnel Vision
APNIC Hackathon Tunnel VisionAPNIC Hackathon Tunnel Vision
APNIC Hackathon Tunnel VisionSiena Perry
 
APNIC Hackathon The Lord of IPv6
APNIC Hackathon The Lord of IPv6APNIC Hackathon The Lord of IPv6
APNIC Hackathon The Lord of IPv6Siena Perry
 
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsSiena Perry
 
APNIC Hackathon CDN Ranking
APNIC Hackathon CDN Ranking APNIC Hackathon CDN Ranking
APNIC Hackathon CDN Ranking Siena Perry
 
APNIC APIX Industry Benchmarking
APNIC APIX Industry Benchmarking  APNIC APIX Industry Benchmarking
APNIC APIX Industry Benchmarking Siena Perry
 
DNSSEC Measurement APTLD 71
DNSSEC Measurement APTLD 71DNSSEC Measurement APTLD 71
DNSSEC Measurement APTLD 71Siena Perry
 
Y4 it 2016- Hermoso
Y4 it 2016- HermosoY4 it 2016- Hermoso
Y4 it 2016- HermosoSiena Perry
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOGSiena Perry
 
APNIC Policy Webinar
APNIC Policy Webinar APNIC Policy Webinar
APNIC Policy Webinar Siena Perry
 

More from Siena Perry (11)

APNIC Hackathon Poke Prefix
APNIC Hackathon Poke PrefixAPNIC Hackathon Poke Prefix
APNIC Hackathon Poke Prefix
 
APNIC Hackathon Tunnel Vision
APNIC Hackathon Tunnel VisionAPNIC Hackathon Tunnel Vision
APNIC Hackathon Tunnel Vision
 
APNIC Hackathon The Lord of IPv6
APNIC Hackathon The Lord of IPv6APNIC Hackathon The Lord of IPv6
APNIC Hackathon The Lord of IPv6
 
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
 
APNIC Hackathon CDN Ranking
APNIC Hackathon CDN Ranking APNIC Hackathon CDN Ranking
APNIC Hackathon CDN Ranking
 
APNIC APIX Industry Benchmarking
APNIC APIX Industry Benchmarking  APNIC APIX Industry Benchmarking
APNIC APIX Industry Benchmarking
 
DNSSEC Measurement APTLD 71
DNSSEC Measurement APTLD 71DNSSEC Measurement APTLD 71
DNSSEC Measurement APTLD 71
 
Y4 it 2016- Hermoso
Y4 it 2016- HermosoY4 it 2016- Hermoso
Y4 it 2016- Hermoso
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOG
 
IPv6 Update
IPv6 UpdateIPv6 Update
IPv6 Update
 
APNIC Policy Webinar
APNIC Policy Webinar APNIC Policy Webinar
APNIC Policy Webinar
 

Recently uploaded

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 

Recently uploaded (20)

Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 

Geoff Huston's presentation on DANE (Keys in the DNS) at the New Zealand Internet Technical Architecture conference (InTAC)

  • 2.
  • 4. No?
  • 8. International Herald Tribune Sep 13, 2011 Front Page Front-Page News!
  • 10. OnlineCertificationAuthority! Server Compromise! Multiple hacker tools on the servers! Specialized PKI scripts! Fake certificate issued for *.google.com! Fake certificate private key published! Iran users of gmail are compromised by a mitm attack!
  • 11. Fake certificate issued for *.google.com! Fake certificate private key published! Any attacker-in-the-middle can intercept a connection request for mail.google.com, and initiate a “secure” connection using the fake certificate, and your browser could be fooled into believing that this was the genuine server! + =
  • 12. Fake certificate issued for *.google.com! Fake certificate private key published! Any attacker-in-the-middle can intercept a connection request for mail.google.com, and initiate a “secure” connection using the fake certificate, and your browser could be fooled into believing that this was the genuine server! + = Was this a one- off?! Or are thereimplications for thelarger issue of oursecurity framework onthe Internet?!
  • 13. So much of the Internet relies on trust in security offered by domain name certs!
  • 14. So much of the Internet relies on trust in security offered by domain name certs!
  • 15. So much of the Internet relies on trust in security offered by domain name certs! But this is just not good enough!
  • 16. Two problems: 1. I may not have landed up where I wanted to be: DNS cache poisoning DNS resolver compromise Local host compromise Routing compromise 2. The domain name certificate may be fake The combination of the two implies that I, and the browser I use, may not even notice that we have been mislead. This is bad.
  • 17. The 2011 mitm attack was evidently performed by a state-based organisation in Iran, with direct access to national infrastructure, exploiting a fake cert issued by a compromised CA You don’t need to be the NSA or its equivalent to play this game – this form of attack would work at any scale. Either the attacker is already on path to the intended site, or the attacker can use access to routing to inject routes that direct the data flows to the attack point How could it happen?
  • 18. Why could it happen? The TLS session cannot say WHICH CA is to be used to validate the servercertificate! Your browser will allow ANY CA to be used to validate a digital signature ! Compromised CAs imperil theentire framework of security!!
  • 19. This is broken! Domain Name certification should use trust and integrity of operation as a differentiator If you pay more money you would expect to use a service that operates with greater levels of care and data protection of your data and users of your service would be “more secure” – right? But a compromised CA can issue a domain name certificate for ANY domain name If you trust this compromised CA then you are going to trust its products The entire Domain Name CA operation is only as good as the worst CA! It does not matter what CA service you use, because any compromised CA can compromise users of your service
  • 21. The role of a CA:! Subject!Requests! RA performs checks! RA tells CA tosign! Browser trusts CA signed certificates!
  • 22. And therefore!~1500 Subordinate CAs!(~651 organizations)! See the EFF SSL observatory!http://www.eff.org/files/DefconSSLiverse.pdf!
  • 23. Sustainable! Trusted! Open! what succeeds in the market? Cheap!!Secure! In a commercial world...
  • 24. An important motivation for using digital certificates with SSL was to add trust to online transactions by requiring website operators to undergo vetting with a certificate authority (CA) in order to get an SSL certificate. However, commercial pressures have led some CAs to introduce "domain validation only" SSL certificates for which minimal verification is performed of the details in the certificate. Most browsers' user interfaces did not clearly differentiate between low-validation certificates and those that have undergone more rigorous vetting. Since any successful SSL connection causes the padlock icon to appear, users are not likely to be aware of whether the website owner has been validated or not.As a result, fraudsters (including phishing websites) have started to use SSL to add perceived credibility to their websites. By establishing stricter issuing criteria and requiring consistent application of those criteria by all participating CAs, EV SSL certificates are intended to restore confidence among users that a website operator is a legally established business or organization with a verifiable identity. http://en.wikipedia.org/wiki/Extended_Validation_Certificate Some CAs don’t apply rigorous identity checks to issued domain name validation certificates!
  • 25. All these CA worker bees and all these manual checks are a tad expensive! And the certificate market is undifferentiated! Reduce CA costs through automation of the process!
  • 26. RA sends a mail to well known address! @example.com! When mailreturned CA will sign!
  • 27. RA sends a mail to well known address! @example.com! When mailreturned CA will sign! All these checks are based on information fetched from the DNS! Hold that thought!!
  • 28. An important motivation for using digital certificates with SSL was to add trust to online transactions by requiring website operators to undergo vetting with a certificate authority (CA) in order to get an SSL certificate. However, commercial pressures have led some CAs to introduce domain validation only SSL certificates for which minimal verification is performed of the details in the certificate. Most browsers' user interfaces did not clearly differentiate between low-validation certificates and those that have undergone more rigorous vetting. Since any successful SSL connection causes the padlock icon to appear, users are not likely to be aware of whether the website owner has been validated or not.As a result, fraudsters (including phishing websites) have started to use SSL to add perceived credibility to their websites. By establishing stricter issuing criteria and requiring consistent application of those criteria by all participating CAs, EV SSL certificates are intended to restore confidence among users that a website operator is a legally established business or organization with a verifiable identity. http://en.wikipedia.org/wiki/Extended_Validation_Certificate
  • 29. Rogue Certificate Counter Measures! Blacklisting! Whitelisting!! CRL! OCSP! Doesn’t scale well! Only available when compromise is known to have happened! Relies on OCSP use!! ExtendedValidity! DV-EV distinction cannot be made reliably without external knowledge!
  • 30. HSTS! Leap of Faith! Or use an alternative infrastructure! What if you know before starting the TLS/SSL session that a certain certificate is to be expected?! Whitelisting!
  • 31. Domain Name System! Independent HierarchicalRegistration! One root! Scalable andGlobal! Namespace maps 1:1 to PKIUse!
  • 32. DANE DNS-Based Authentication of Named Entities How to represent and authenticate “named entities” in the DNS,using DNSSEC! Web Sites! Email addresses!Jabber IDs! RFC 6394! RFC 6698!
  • 33. CA Cert! EE Cert! Trust Anchor! RFC6394:TLSA RR
  • 34. Valid CERTs and/or CAs are stored in the the DNS! If DANE provides the CA’s identity, then DANE offers the protection that you are looking at a valid EV Certificate issued by the CA that performed the EV validation checks in the firstplace! CA compromise then has limited liability to those certificates issued by the compromised CA! i.e. your service is compromised only if your chosen CA is compromised!!
  • 35. Valid CERTs and/or CAs are stored in the the DNS! If the DNS provides the EE cert, then DANE offers the protection that you are looking at a valid Certificate issued by the entity that holds the domain name in the first place! Name Certificate publication is controlled by the zone authority – no CA intermediary is needed! ! Security is “free”!
  • 36. How does DNSSEC get into the picture?!
  • 37. How does DNSSEC get into the picture?! DANE assumes a DNS that operates with integrity! Is the certificate provided in a TLSA response genuine? ! To answer that you need to be able to validate the DNS response! And to do that you need DNSSEC!
  • 38. All these checks are based on information fetched from the DNS! Did you keep this thought?! 0wn the DNS and the DV is yours Obtaining Rogue (DV) Certificates!
  • 39. DANE has the potential to solve important PKI/TLS problems in securing access to named entities! And for DANE to work then DNSSEC is necessary!
  • 40. How are we going with DNSSEC?..! High levels of DNSSEC! Use seen in Africa,! Eastern and Northern! Europe! 11% of users send their DNS queries to DNSSEC- validating resolvers
  • 41. Why invest in DNSSEC?! Because the DNS represents amajor point of vulnerability intoday’s networks! Cyber attacks are no longer just a teenage hobby or even petty crime! Attacks on the DNS are highly effective for all kinds of reasons!!
  • 42. this is just not good enough any more!
  • 43. What needs to happen? •  The local name management infrastructure should support the use of DNSSEC in all aspects of name management
  • 44. What needs to happen? •  The local name management infrastructure should support the use of DNSSEC in all aspects of name management •  ISPs should add DNSSEC validation to their forwarding resolvers
  • 45.
  • 46.
  • 47.
  • 48. What needs to happen? •  The local name management infrastructure should support the use of DNSSEC in all aspects of name management •  ISPs should add DNSSEC validation to their forwarding resolvers •  And if you want to push it a bit in the right direction... For secure named services using a domain name certificate, add the Issuer’s public CA cert as a DANE record into your DNSSEC-signed zone