SlideShare a Scribd company logo
1 of 30
Download to read offline
That KSK Roll
Geoff Huston
APNIC Labs
The DNS may look simple
But with the DNS, looks are very deceiving
So lets talk DNSSEC
• DNSSEC introduces digital signatures into the DNS
• It allows a DNS resolver to validate the information it receives to
ensure that however it got to learn it, the information is:
• Valid
• Up to Date
• It can prevent various forms of attack on the DNS
• But more importantly it can allow us to publish information in the
DNS and have clients authenticate that the information has not been
tampered with in any way
Why DNSSEC?
• To improve the robustness of the DNS
Because we can inject false information into the DNS and mislead users
• We could improve the robustness of a secured web
Because authentic information in the DNS can help in propping up the WebPKI
model with CA pinning information
• To improve access to robust security
Because we’d like to make some progress towards an environment where
accessible, robust security in accessing services can be provided
Who uses DNSSEC?
Today around 1 in 7 users will not resolve a DNSSEC-signed domain
name if the signature cannot be validated
% of users in each country who
perform DNSSEC validation
Who uses DNSSEC?
Today around 1 in 7 users will not resolve a DNSSEC-signed domain
name if the signature cannot be validated
Trust in DNSSEC
DNSSEC uses a single point of trust – the Key Signing Key of the root zone
• The DNSKEY for the root zone is signed by the KSK for the root zone
• This key signs a DNSKEY entry that includes a Zone Signing Key – ZSK - that is used to sign
every entry in the root zone
• The zone includes a DS entry signed by the root zone ZSK for the .net delegation that is the
hash of the KSK for .net
• The DNSKEY for .net is signed by the KSK for .net
• The DNSKEY entry for .net includes a ZSK used to sign every entry in the .net zone
• The zone includes a DS entry signed by the .net zone ZSK for the potaroo.net delegation that is the hash
of the KSK for .potaroo.net
• The DNSKEY for potaroo.net is signed by the KSK for potaroo.net
• The DNSKEY entry for potaroo .net includes a ZSK used to sign every entry in the potaroo.net zone
• The entry for www.potaroo.net is signed by the ZSK for potaroo.net
Rolling keys in DNSSEC
• Rolling a key can be easy in DNSSEC for most keys:
• Tell your ”parent” about the new key
- wait -
• Sign the products with the new key
- wait -
• Withdraw the old key
Rolling keys in DNSSEC
• Rolling a key can be easy in DNSSEC for most keys:
• Tell your ”parent” about the new key
- wait -
• Sign the products with the new key
- wait -
• Withdraw the old key
But the Root Zone has no parent, so this approach doesn’t
work for the KSK
Rolling Keys
• No key is eternal:
• Digital cryptography is based on difficult problems, not impossible problems!
As computing capabilities change, what is unfeasible to solve changes
• The best crafted plans can fail – key compromise is always a possibility
• Key storage systems can fail – inability to access the key makes the key useless
• If we need to instil a discipline of changing keys in relying party
systems then we need to change the key from time to time
• Is it better to gain experience in regularly scheduled key rolls than
react with ad hoc measures when it’s forced upon us?
The Mechanics of Rolling the KSK
1. ”Introduce” the new KSK to the world
2. Use the Root Zone DNSKEY record to publish a new KSK
- wait -
3. Sign the Root Zone DNSKEY record with the new KSK
4. Remove the old KSK from the Root Zone DNSKEY record
- wait -
5. Revoke the old KSK in the Root Zone DNSKEY record
See RFC 5011 – wait for at least 30 days
The Mechanics of Rolling the KSK
1. ”Introduce” the new KSK to the world
2. Use the Root Zone DNSKEY record to publish a new KSK
- wait -
3. Sign the Root Zone DNSKEY record with the new KSK
4. Remove the old KSK from the Root Zone DNSKEY record
- wait -
5. Revoke the old KSK in the Root Zone DNSKEY record
We are here
October 11
Will this work?
We don’t really know!
• If everyone built code strictly according to current specs
And
• All specs were clear, unambiguous and functional
And
• We could build robust accurate code
And
• The Internet worked all of the time
And
• The stars are aligned in our favour
Then everything will be fine!
But
We really don’t know!
Is there a way we might peek into the DNS and see just how ready we
are for a KSK roll?
Measuring Resolvers via RFC8145 Signaling
Getting resolvers to report on their local trusted key state
• A change to resolver behavior that requires deployment of new
resolver code
• Resolvers that support the RFC 8145 signal mechanism periodically
include the key tag of their locally trusted keys into a query
directed towards the root servers
What did we see at (some) roots?
Duane Wessels VeriSign RFC 8145 Signaling Trust Anchor Knowledge In DNS Security Extensions
Presentation to DNSSEC Workshop @ ICANN 60 – 1 Nov 2017
https://schd.ws/hosted_files/icann60abudhabi2017/ea/Duane%20Wessels-VeriSign-RFC%208145-Signaling%20Trust%20Anchor%20Knowledge%20in%20DNS%20Security%20Extensions.pdf
What is RFC 8145 saying?
• Its clear that there is some residual set of resolvers that are signalling
that they have not yet learned to trust the new KSK key
• But it’s not all that helpful as a signal
• Is this is an accurate signal about the state of this resolver?
• Is this is an accurate signal about the identity of this resolver?
• How many users sit ‘behind’ this resolver?
• Whether these uses rely solely on this resolver, or if they also have alternate
resolvers that they can use?
• What proportion of all users are affected?
Why?
• Because the DNS does not do tracequery
• Forwarding a query onward in the DNS contains no ‘sticky’ information about
the original query
• At no time is the user exposed in the referred query
• Because caching
• If A and B both forward their queries via C, then it may be that one or both of
these queries may be answered from C’s cache
• In this case the signal is being suppressed
• Because its actually measuring a cause, not the outcome
• Its measuring resolvers’ uptake of the new KSK, but is not able to measure the
user impact of this
User-Side Measurement
Can we devise a DNS query that could reveal the state of the trusted
keys of the resolvers back to the user?
• Not within the current parameters of DNSSEC and/or resolver behaviour
User-Side Measurement
Can we devise a DNS query that could reveal the state of the trusted
keys of the resolvers back to the user?
• What if we could change resolver behaviour?
User-Side Measurement
Can we devise a DNS query that could reveal the state of the trusted
keys of the resolvers back to the user?
• What about a change to the resolver’s reporting of validation outcome
depending on the resolver’s local trusted key state?
• If a query contains the label “root-key-sentinel-is-ta-<key-tag>” then a
validating resolver will report validation failure if the key is NOT in the
local trusted key store
• If a query contains the label “root-key-sentinel-not-ta-<key-tag>” then a
validating resolver will report validation failure if the key IS in the local
trusted key store
User-Side Resolver Measurement
Three DNS queries:
1. root-key-sentinel-is-ta-20326.<unique-label>.<some.signed.domain>
2. root-key-sentinel-not-ta-20236.<unique-label>.<some.signed.domain>
3. <badly-signed>. <unique-label>.<some.signed.domain>
Analysis:
Resolver Behaviour Type
Loaded KSK-2017
NOT Loaded KSK-2017
Mechanism not supported
Not validating
Query 1 Query 2 Query 3
A SERVFAIL SERVFAIL
SERVFAIL A SERVFAIL
A A SERVFAIL
A A A
Measuring User Impact
• Load these DNS tests into an online ad campaign and use the ad to
perform this measurement with at least hundred million users across
the Internet before the key rolls
Are we ready?
The KSK rolls on 11 October 2018
And we’ve been measuring for the past week
Results so far
16% of users use DNSSEC-
validating resolvers
15% of users do not report
their KSK trust-state
0.5% of users report KSK-2017
loaded
0.005% of users report KSK-2017
NOT loaded
Possibly Affected Users
Between 0.1% to 0.2% of users are
reporting that their resolvers have not
loaded KSK-2017 as a trust anchor
The measurement has many
uncertainties and many sources of noise
so this is an upper bound of the pool of
users who may encounter DNS failure
due to to the KSK roll
There is still uncertainty in this measurement
• This is a recent change to resolver behaviour – only a few resolvers
respond to the key test queries!
• Not all resolvers will pre-provision KSK-2017 using RFC 5011
automated trust mechanisms – they may elect to load the new trust
anchor at the time of the roll
• And we cannot measure the difference between a resolver that has a broken
implementation of RFC5011 and a resolver that is being managed manually
• We cannot readily measure the properties of individual resolvers
• We can derive an estimate of users that may be impacted, but it’s not so easy
to figure out which resolvers are responsible
What to expect with the KSK roll
• To the extent that the DNS is able to be measured, it appears that
most users will be unaffected by the planned roll of the KSK on
October 11
• But your helpdesk should be aware that we a user reports that their
Internet is dead in the 48 hours after October 11 then a DNSSEC
trusted key failure for the user is a possible cause.
Thanks!

More Related Content

What's hot

NANOG 82: DNS Evolution
NANOG 82: DNS EvolutionNANOG 82: DNS Evolution
NANOG 82: DNS EvolutionAPNIC
 
ICANN DNS Symposium 2021: Measuring Recursive Resolver Centrality
ICANN DNS Symposium 2021: Measuring Recursive Resolver CentralityICANN DNS Symposium 2021: Measuring Recursive Resolver Centrality
ICANN DNS Symposium 2021: Measuring Recursive Resolver CentralityAPNIC
 
RIPE 82: An Update on Fragmentation Loss Rates in IPv6
RIPE 82: An Update on Fragmentation Loss Rates in IPv6RIPE 82: An Update on Fragmentation Loss Rates in IPv6
RIPE 82: An Update on Fragmentation Loss Rates in IPv6APNIC
 
RIPE 82: Measuring Recursive Resolver Centrality
RIPE 82: Measuring Recursive Resolver CentralityRIPE 82: Measuring Recursive Resolver Centrality
RIPE 82: Measuring Recursive Resolver CentralityAPNIC
 
HDInsight Interactive Query
HDInsight Interactive QueryHDInsight Interactive Query
HDInsight Interactive QueryAshish Thapliyal
 
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache ServersNANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache ServersChika Yoshimura
 
RedisConf18 - 2,000 Instances and Beyond
RedisConf18 - 2,000 Instances and BeyondRedisConf18 - 2,000 Instances and Beyond
RedisConf18 - 2,000 Instances and BeyondRedis Labs
 
Future Architecture of Streaming Analytics: Capitalizing on the Analytics of ...
Future Architecture of Streaming Analytics: Capitalizing on the Analytics of ...Future Architecture of Streaming Analytics: Capitalizing on the Analytics of ...
Future Architecture of Streaming Analytics: Capitalizing on the Analytics of ...DataWorks Summit
 
GoSF: Decoupling Services from IP networks with NATS
GoSF: Decoupling Services from IP networks with NATSGoSF: Decoupling Services from IP networks with NATS
GoSF: Decoupling Services from IP networks with NATSwallyqs
 
getdns PyCon presentation
getdns PyCon presentationgetdns PyCon presentation
getdns PyCon presentationMelinda Shore
 
Upgrade ipa to rhel 7
Upgrade ipa to rhel 7Upgrade ipa to rhel 7
Upgrade ipa to rhel 7Amjad Yaseen
 
‘fsck’ for Openstack
‘fsck’ for Openstack‘fsck’ for Openstack
‘fsck’ for OpenstackWei Tian
 
OSCON: Building Cloud Native Apps with NATS
OSCON:  Building Cloud Native Apps with NATSOSCON:  Building Cloud Native Apps with NATS
OSCON: Building Cloud Native Apps with NATSwallyqs
 
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision ProblemUsing ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision ProblemAPNIC
 
KubeCon NA 2018 - NATS Deep Dive: The Evolution of NATS
KubeCon NA 2018 - NATS Deep Dive: The Evolution of NATSKubeCon NA 2018 - NATS Deep Dive: The Evolution of NATS
KubeCon NA 2018 - NATS Deep Dive: The Evolution of NATSwallyqs
 
Cassandra Day Atlanta 2015: Troubleshooting with Apache Cassandra
Cassandra Day Atlanta 2015: Troubleshooting with Apache CassandraCassandra Day Atlanta 2015: Troubleshooting with Apache Cassandra
Cassandra Day Atlanta 2015: Troubleshooting with Apache CassandraDataStax Academy
 
Bryan Heden - Agile Networks - Using Nagios XI as the platform for Monitoring...
Bryan Heden - Agile Networks - Using Nagios XI as the platform for Monitoring...Bryan Heden - Agile Networks - Using Nagios XI as the platform for Monitoring...
Bryan Heden - Agile Networks - Using Nagios XI as the platform for Monitoring...Nagios
 

What's hot (20)

NANOG 82: DNS Evolution
NANOG 82: DNS EvolutionNANOG 82: DNS Evolution
NANOG 82: DNS Evolution
 
ICANN DNS Symposium 2021: Measuring Recursive Resolver Centrality
ICANN DNS Symposium 2021: Measuring Recursive Resolver CentralityICANN DNS Symposium 2021: Measuring Recursive Resolver Centrality
ICANN DNS Symposium 2021: Measuring Recursive Resolver Centrality
 
RIPE 82: An Update on Fragmentation Loss Rates in IPv6
RIPE 82: An Update on Fragmentation Loss Rates in IPv6RIPE 82: An Update on Fragmentation Loss Rates in IPv6
RIPE 82: An Update on Fragmentation Loss Rates in IPv6
 
RIPE 82: Measuring Recursive Resolver Centrality
RIPE 82: Measuring Recursive Resolver CentralityRIPE 82: Measuring Recursive Resolver Centrality
RIPE 82: Measuring Recursive Resolver Centrality
 
HDInsight Interactive Query
HDInsight Interactive QueryHDInsight Interactive Query
HDInsight Interactive Query
 
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache ServersNANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
 
RedisConf18 - 2,000 Instances and Beyond
RedisConf18 - 2,000 Instances and BeyondRedisConf18 - 2,000 Instances and Beyond
RedisConf18 - 2,000 Instances and Beyond
 
Future Architecture of Streaming Analytics: Capitalizing on the Analytics of ...
Future Architecture of Streaming Analytics: Capitalizing on the Analytics of ...Future Architecture of Streaming Analytics: Capitalizing on the Analytics of ...
Future Architecture of Streaming Analytics: Capitalizing on the Analytics of ...
 
GoSF: Decoupling Services from IP networks with NATS
GoSF: Decoupling Services from IP networks with NATSGoSF: Decoupling Services from IP networks with NATS
GoSF: Decoupling Services from IP networks with NATS
 
getdns PyCon presentation
getdns PyCon presentationgetdns PyCon presentation
getdns PyCon presentation
 
Network Security Best Practice (BCP38 & 140)
Network Security Best Practice (BCP38 & 140) Network Security Best Practice (BCP38 & 140)
Network Security Best Practice (BCP38 & 140)
 
Upgrade ipa to rhel 7
Upgrade ipa to rhel 7Upgrade ipa to rhel 7
Upgrade ipa to rhel 7
 
‘fsck’ for Openstack
‘fsck’ for Openstack‘fsck’ for Openstack
‘fsck’ for Openstack
 
OSCON: Building Cloud Native Apps with NATS
OSCON:  Building Cloud Native Apps with NATSOSCON:  Building Cloud Native Apps with NATS
OSCON: Building Cloud Native Apps with NATS
 
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision ProblemUsing ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
 
Erlang containers
Erlang containersErlang containers
Erlang containers
 
ION Durban - DNSSEC, and Why We Can't Avoid It
ION Durban - DNSSEC, and Why We Can't Avoid ItION Durban - DNSSEC, and Why We Can't Avoid It
ION Durban - DNSSEC, and Why We Can't Avoid It
 
KubeCon NA 2018 - NATS Deep Dive: The Evolution of NATS
KubeCon NA 2018 - NATS Deep Dive: The Evolution of NATSKubeCon NA 2018 - NATS Deep Dive: The Evolution of NATS
KubeCon NA 2018 - NATS Deep Dive: The Evolution of NATS
 
Cassandra Day Atlanta 2015: Troubleshooting with Apache Cassandra
Cassandra Day Atlanta 2015: Troubleshooting with Apache CassandraCassandra Day Atlanta 2015: Troubleshooting with Apache Cassandra
Cassandra Day Atlanta 2015: Troubleshooting with Apache Cassandra
 
Bryan Heden - Agile Networks - Using Nagios XI as the platform for Monitoring...
Bryan Heden - Agile Networks - Using Nagios XI as the platform for Monitoring...Bryan Heden - Agile Networks - Using Nagios XI as the platform for Monitoring...
Bryan Heden - Agile Networks - Using Nagios XI as the platform for Monitoring...
 

Similar to KSK Roll Measurement Results

Testing Rolling Roots
Testing Rolling RootsTesting Rolling Roots
Testing Rolling RootsAPNIC
 
NZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSECNZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSECAPNIC
 
RIPE 78: A review of the KSK Roll
RIPE 78: A review of the KSK RollRIPE 78: A review of the KSK Roll
RIPE 78: A review of the KSK RollAPNIC
 
Introduction DNSSec
Introduction DNSSecIntroduction DNSSec
Introduction DNSSecAFRINIC
 
The New Root Zone DNSSEC KSK
The New Root Zone DNSSEC KSKThe New Root Zone DNSSEC KSK
The New Root Zone DNSSEC KSKAPNIC
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsAPNIC
 
RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?APNIC
 
IETF 100: A signalling mechanism for trusted keys in the DNS
IETF 100: A signalling mechanism for trusted keys in the DNSIETF 100: A signalling mechanism for trusted keys in the DNS
IETF 100: A signalling mechanism for trusted keys in the DNSAPNIC
 
Hardening the Core of the Internet
Hardening the Core of the InternetHardening the Core of the Internet
Hardening the Core of the InternetRIPE NCC
 
Rolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing KeyRolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing KeyAPNIC
 
DNSSEC: What a Registrar Needs to Know
DNSSEC:  What a Registrar Needs to KnowDNSSEC:  What a Registrar Needs to Know
DNSSEC: What a Registrar Needs to Knowlaurenrprice
 
OARC 31: NSEC Caching Revisited
OARC 31: NSEC Caching RevisitedOARC 31: NSEC Caching Revisited
OARC 31: NSEC Caching RevisitedAPNIC
 
What if everyone did it?, by Geoff Huston [APNIC 38 / APOPS 1]
What if everyone did it?, by Geoff Huston [APNIC 38 / APOPS 1]What if everyone did it?, by Geoff Huston [APNIC 38 / APOPS 1]
What if everyone did it?, by Geoff Huston [APNIC 38 / APOPS 1]APNIC
 
Technical and Business Considerations for DNSSEC Deployment
Technical and Business Considerations for DNSSEC DeploymentTechnical and Business Considerations for DNSSEC Deployment
Technical and Business Considerations for DNSSEC DeploymentAPNIC
 
bdNOG 7 - Re-engineering the DNS - one resolver at a time
bdNOG 7 - Re-engineering the DNS - one resolver at a timebdNOG 7 - Re-engineering the DNS - one resolver at a time
bdNOG 7 - Re-engineering the DNS - one resolver at a timeAPNIC
 
Dnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 EnDnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 EnErol Dizdar
 

Similar to KSK Roll Measurement Results (20)

Testing Rolling Roots
Testing Rolling RootsTesting Rolling Roots
Testing Rolling Roots
 
NZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSECNZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSEC
 
RIPE 78: A review of the KSK Roll
RIPE 78: A review of the KSK RollRIPE 78: A review of the KSK Roll
RIPE 78: A review of the KSK Roll
 
Introduction DNSSec
Introduction DNSSecIntroduction DNSSec
Introduction DNSSec
 
The New Root Zone DNSSEC KSK
The New Root Zone DNSSEC KSKThe New Root Zone DNSSEC KSK
The New Root Zone DNSSEC KSK
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutions
 
RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?
 
IETF 100: A signalling mechanism for trusted keys in the DNS
IETF 100: A signalling mechanism for trusted keys in the DNSIETF 100: A signalling mechanism for trusted keys in the DNS
IETF 100: A signalling mechanism for trusted keys in the DNS
 
ION Hangzhou - How to Deploy DNSSEC
ION Hangzhou - How to Deploy DNSSECION Hangzhou - How to Deploy DNSSEC
ION Hangzhou - How to Deploy DNSSEC
 
Hardening the Core of the Internet
Hardening the Core of the InternetHardening the Core of the Internet
Hardening the Core of the Internet
 
Rolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing KeyRolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing Key
 
DNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & AfiliasDNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & Afilias
 
DNSSEC: What a Registrar Needs to Know
DNSSEC:  What a Registrar Needs to KnowDNSSEC:  What a Registrar Needs to Know
DNSSEC: What a Registrar Needs to Know
 
OARC 31: NSEC Caching Revisited
OARC 31: NSEC Caching RevisitedOARC 31: NSEC Caching Revisited
OARC 31: NSEC Caching Revisited
 
8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 
What if everyone did it?, by Geoff Huston [APNIC 38 / APOPS 1]
What if everyone did it?, by Geoff Huston [APNIC 38 / APOPS 1]What if everyone did it?, by Geoff Huston [APNIC 38 / APOPS 1]
What if everyone did it?, by Geoff Huston [APNIC 38 / APOPS 1]
 
Technical and Business Considerations for DNSSEC Deployment
Technical and Business Considerations for DNSSEC DeploymentTechnical and Business Considerations for DNSSEC Deployment
Technical and Business Considerations for DNSSEC Deployment
 
bdNOG 7 - Re-engineering the DNS - one resolver at a time
bdNOG 7 - Re-engineering the DNS - one resolver at a timebdNOG 7 - Re-engineering the DNS - one resolver at a time
bdNOG 7 - Re-engineering the DNS - one resolver at a time
 
Re-Engineering the DNS – One Resolver at a Time
Re-Engineering the DNS – One Resolver at a Time Re-Engineering the DNS – One Resolver at a Time
Re-Engineering the DNS – One Resolver at a Time
 
Dnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 EnDnssec Proposal 09oct08 En
Dnssec Proposal 09oct08 En
 

More from APNIC

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAPNIC
 

More from APNIC (20)

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & Development
 

Recently uploaded

Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 

KSK Roll Measurement Results

  • 1. That KSK Roll Geoff Huston APNIC Labs
  • 2. The DNS may look simple
  • 3. But with the DNS, looks are very deceiving
  • 4. So lets talk DNSSEC • DNSSEC introduces digital signatures into the DNS • It allows a DNS resolver to validate the information it receives to ensure that however it got to learn it, the information is: • Valid • Up to Date • It can prevent various forms of attack on the DNS • But more importantly it can allow us to publish information in the DNS and have clients authenticate that the information has not been tampered with in any way
  • 5. Why DNSSEC? • To improve the robustness of the DNS Because we can inject false information into the DNS and mislead users • We could improve the robustness of a secured web Because authentic information in the DNS can help in propping up the WebPKI model with CA pinning information • To improve access to robust security Because we’d like to make some progress towards an environment where accessible, robust security in accessing services can be provided
  • 6. Who uses DNSSEC? Today around 1 in 7 users will not resolve a DNSSEC-signed domain name if the signature cannot be validated % of users in each country who perform DNSSEC validation
  • 7. Who uses DNSSEC? Today around 1 in 7 users will not resolve a DNSSEC-signed domain name if the signature cannot be validated
  • 8. Trust in DNSSEC DNSSEC uses a single point of trust – the Key Signing Key of the root zone • The DNSKEY for the root zone is signed by the KSK for the root zone • This key signs a DNSKEY entry that includes a Zone Signing Key – ZSK - that is used to sign every entry in the root zone • The zone includes a DS entry signed by the root zone ZSK for the .net delegation that is the hash of the KSK for .net • The DNSKEY for .net is signed by the KSK for .net • The DNSKEY entry for .net includes a ZSK used to sign every entry in the .net zone • The zone includes a DS entry signed by the .net zone ZSK for the potaroo.net delegation that is the hash of the KSK for .potaroo.net • The DNSKEY for potaroo.net is signed by the KSK for potaroo.net • The DNSKEY entry for potaroo .net includes a ZSK used to sign every entry in the potaroo.net zone • The entry for www.potaroo.net is signed by the ZSK for potaroo.net
  • 9. Rolling keys in DNSSEC • Rolling a key can be easy in DNSSEC for most keys: • Tell your ”parent” about the new key - wait - • Sign the products with the new key - wait - • Withdraw the old key
  • 10. Rolling keys in DNSSEC • Rolling a key can be easy in DNSSEC for most keys: • Tell your ”parent” about the new key - wait - • Sign the products with the new key - wait - • Withdraw the old key But the Root Zone has no parent, so this approach doesn’t work for the KSK
  • 11. Rolling Keys • No key is eternal: • Digital cryptography is based on difficult problems, not impossible problems! As computing capabilities change, what is unfeasible to solve changes • The best crafted plans can fail – key compromise is always a possibility • Key storage systems can fail – inability to access the key makes the key useless • If we need to instil a discipline of changing keys in relying party systems then we need to change the key from time to time • Is it better to gain experience in regularly scheduled key rolls than react with ad hoc measures when it’s forced upon us?
  • 12. The Mechanics of Rolling the KSK 1. ”Introduce” the new KSK to the world 2. Use the Root Zone DNSKEY record to publish a new KSK - wait - 3. Sign the Root Zone DNSKEY record with the new KSK 4. Remove the old KSK from the Root Zone DNSKEY record - wait - 5. Revoke the old KSK in the Root Zone DNSKEY record See RFC 5011 – wait for at least 30 days
  • 13. The Mechanics of Rolling the KSK 1. ”Introduce” the new KSK to the world 2. Use the Root Zone DNSKEY record to publish a new KSK - wait - 3. Sign the Root Zone DNSKEY record with the new KSK 4. Remove the old KSK from the Root Zone DNSKEY record - wait - 5. Revoke the old KSK in the Root Zone DNSKEY record We are here October 11
  • 14. Will this work? We don’t really know! • If everyone built code strictly according to current specs And • All specs were clear, unambiguous and functional And • We could build robust accurate code And • The Internet worked all of the time And • The stars are aligned in our favour Then everything will be fine!
  • 15. But We really don’t know! Is there a way we might peek into the DNS and see just how ready we are for a KSK roll?
  • 16. Measuring Resolvers via RFC8145 Signaling Getting resolvers to report on their local trusted key state • A change to resolver behavior that requires deployment of new resolver code • Resolvers that support the RFC 8145 signal mechanism periodically include the key tag of their locally trusted keys into a query directed towards the root servers
  • 17. What did we see at (some) roots? Duane Wessels VeriSign RFC 8145 Signaling Trust Anchor Knowledge In DNS Security Extensions Presentation to DNSSEC Workshop @ ICANN 60 – 1 Nov 2017 https://schd.ws/hosted_files/icann60abudhabi2017/ea/Duane%20Wessels-VeriSign-RFC%208145-Signaling%20Trust%20Anchor%20Knowledge%20in%20DNS%20Security%20Extensions.pdf
  • 18. What is RFC 8145 saying? • Its clear that there is some residual set of resolvers that are signalling that they have not yet learned to trust the new KSK key • But it’s not all that helpful as a signal • Is this is an accurate signal about the state of this resolver? • Is this is an accurate signal about the identity of this resolver? • How many users sit ‘behind’ this resolver? • Whether these uses rely solely on this resolver, or if they also have alternate resolvers that they can use? • What proportion of all users are affected?
  • 19. Why? • Because the DNS does not do tracequery • Forwarding a query onward in the DNS contains no ‘sticky’ information about the original query • At no time is the user exposed in the referred query • Because caching • If A and B both forward their queries via C, then it may be that one or both of these queries may be answered from C’s cache • In this case the signal is being suppressed • Because its actually measuring a cause, not the outcome • Its measuring resolvers’ uptake of the new KSK, but is not able to measure the user impact of this
  • 20. User-Side Measurement Can we devise a DNS query that could reveal the state of the trusted keys of the resolvers back to the user? • Not within the current parameters of DNSSEC and/or resolver behaviour
  • 21. User-Side Measurement Can we devise a DNS query that could reveal the state of the trusted keys of the resolvers back to the user? • What if we could change resolver behaviour?
  • 22. User-Side Measurement Can we devise a DNS query that could reveal the state of the trusted keys of the resolvers back to the user? • What about a change to the resolver’s reporting of validation outcome depending on the resolver’s local trusted key state? • If a query contains the label “root-key-sentinel-is-ta-<key-tag>” then a validating resolver will report validation failure if the key is NOT in the local trusted key store • If a query contains the label “root-key-sentinel-not-ta-<key-tag>” then a validating resolver will report validation failure if the key IS in the local trusted key store
  • 23. User-Side Resolver Measurement Three DNS queries: 1. root-key-sentinel-is-ta-20326.<unique-label>.<some.signed.domain> 2. root-key-sentinel-not-ta-20236.<unique-label>.<some.signed.domain> 3. <badly-signed>. <unique-label>.<some.signed.domain> Analysis: Resolver Behaviour Type Loaded KSK-2017 NOT Loaded KSK-2017 Mechanism not supported Not validating Query 1 Query 2 Query 3 A SERVFAIL SERVFAIL SERVFAIL A SERVFAIL A A SERVFAIL A A A
  • 24. Measuring User Impact • Load these DNS tests into an online ad campaign and use the ad to perform this measurement with at least hundred million users across the Internet before the key rolls
  • 25. Are we ready? The KSK rolls on 11 October 2018 And we’ve been measuring for the past week
  • 26. Results so far 16% of users use DNSSEC- validating resolvers 15% of users do not report their KSK trust-state 0.5% of users report KSK-2017 loaded 0.005% of users report KSK-2017 NOT loaded
  • 27. Possibly Affected Users Between 0.1% to 0.2% of users are reporting that their resolvers have not loaded KSK-2017 as a trust anchor The measurement has many uncertainties and many sources of noise so this is an upper bound of the pool of users who may encounter DNS failure due to to the KSK roll
  • 28. There is still uncertainty in this measurement • This is a recent change to resolver behaviour – only a few resolvers respond to the key test queries! • Not all resolvers will pre-provision KSK-2017 using RFC 5011 automated trust mechanisms – they may elect to load the new trust anchor at the time of the roll • And we cannot measure the difference between a resolver that has a broken implementation of RFC5011 and a resolver that is being managed manually • We cannot readily measure the properties of individual resolvers • We can derive an estimate of users that may be impacted, but it’s not so easy to figure out which resolvers are responsible
  • 29. What to expect with the KSK roll • To the extent that the DNS is able to be measured, it appears that most users will be unaffected by the planned roll of the KSK on October 11 • But your helpdesk should be aware that we a user reports that their Internet is dead in the 48 hours after October 11 then a DNSSEC trusted key failure for the user is a possible cause.