SlideShare a Scribd company logo
1 of 28
Download to read offline
Key pieces of the Cyber Security Puzzle
Scorecard!
DNS & Routing !
Overview of the problem!
Exhibit A: The Great YouTube Blackout of ā€˜08 	
Mukom Akong T. | @perfexcellence |! Slide 3!
Exhibit A: The Great YouTube Blackout of ā€˜08 	
Mukom Akong T. | @perfexcellence |! Slide 4!
1 billion (non)views per day!
Date: 24th February 2008
Extent: Two thirds of Internet
Damage: Inaccessible for 2 hours
Exhibit B: Great Firewall of China extends abroad	
Mukom Akong T. | @perfexcellence |! Slide 5!
Exhibit B: Great Firewall of China extends overseas	
Mukom Akong T. | @perfexcellence |! Slide 6!
Date: 24 March 2010
Extent: Some networks in USA & Chile
Damage: US & Chilean citizens became
subject to the online policies of
the Chinese govā€™t
Oh God, how
did we get
here?
Identifying computers on the Internet	
Mukom Akong T. | @perfexcellence |! Slide 8!
192.0.2.1
2001:db8:dead::a1d
learn.afrinic.net
IP addresses are ineffective for human use on a large scale
How this can happen to you	
ā‘ ā€Æ You type your bankā€™s address: www.yourbank.com
ā‘”ā€Æ Your PC asks your ISPā€™s DNS servers for the matching IP address
ā‘¢ā€Æ The DNS server goes through a hierarchy to get the answer:
Ā§ļ‚§ā€Æ Asks the root DNS servers which points it to .com servers
Ā§ļ‚§ā€Æ The .com servers direct it to .yourbank.com DNS server
Ā§ļ‚§ā€Æ The .yourbank.com DNS server sends the answer (an IP address)
Ā§ļ‚§ā€Æ The server passes the response to your PC which makes the connection
ā‘£ā€Æ An attacker can inject a fake answer during any of the above steps
ā‘¤ā€Æ The response that comes to you
Ā§ļ‚§ā€Æ Is NOT the same IP address of you bank (which you donā€™t know)
Ā§ļ‚§ā€Æ The website LOOKS exactly like the one you often use
ā‘„ā€Æ You type in your credentials, then you get a error e.g. page cannot be
displayed
ā‘¦ā€Æ 3 weeks later, you scream: ā€œWhereā€™s my money??!!"
Mukom Akong T. | @perfexcellence |! Slide 9!
Identifying organisations on the Internet	
ā˜€ā€ÆDomain name e.g
afrinic.net
ā˜€ā€ÆA block of IP addresses
Ā§ļ‚§ā€Æ 196.1.0.0/24
Ā§ļ‚§ā€Æ 2001:4290::/32
ā˜€ā€ÆAutonomous System
Number e.g.
Mukom Akong T. | @perfexcellence |! Slide 10!
For the Internet to work ..	
Mukom Akong T. | @perfexcellence |! Slide 11!
2001:db8:dead::a1dlearn.afrinic.net
For the Internet to work ..	
Mukom Akong T. | @perfexcellence |! Slide 12!
How do I send
information to
the computer
with address B?
The Problem: Breakdown of TRUST	
Mukom Akong T. | @perfexcellence |! Slide 13!
I AM ā€¦
www.google.com
www.yourbank.com
www.statehouse.gov.ng
www.prc.cm
www.cto.int
www.afrinic.net
I AM ā€¦
2c0f:face:b00c::/48
197.253.0.0/16
65.25.0/24
It is possible to impersonate any entity by name or address
The Problem: Breakdown of TRUST	
ā˜€ā€ÆIt is possible for one computer to
impersonate another node by name.
ā˜€ā€ÆThereā€™s no real way of knowing if the
answer your computer got to ā€œwhat is
the IP address of www.yourbank.comā€ is
legitimate or not
Mukom Akong T. | @perfexcellence |! Slide 14!
The Problem: Breakdown of TRUST	
ā˜€ā€ÆIt is possible for one entity (e.g an ISP)
to impersonate a whole network by IP
address
ā˜€ā€ÆThereā€™s been no way verify if that entity
owns that IP address itā€™s claiming
Mukom Akong T. | @perfexcellence |! Slide 15!
A Fix: Certify & authenticate Internet identity	
ā˜€ā€ÆSign DNS records
ā˜€ā€ÆEstablish a chain of trust
ā˜€ā€ÆEstablish ā€˜ownershipā€™ of
address space
Mukom Akong T. | @perfexcellence |! Slide 16!
Digital certiļ¬cates & public
key infrastructure
How DNSSEC solves the problem	
ā‘ ā€Æ Digitally sign DNS (name to IP address)
records using public keys
ā‘”ā€Æ Establishes a chain of trust where parent
domains authenticate child domains
ā‘¢ā€Æ Ensures responses have not been
tampered with in transit
Does NOT provide confidentiality (encryption)
Mukom Akong T. | @perfexcellence |! Slide 17!
DNSSEC ā€“ What It Solves	
ā˜€ā€ÆUse public keys to authenticate
Ā§ļ‚§ā€Æ The original name to address mapping
Ā§ļ‚§ā€Æ That queries were not tampered with
ā˜€ā€ÆPrevents impersonation by domain name
ā˜€ā€ÆCompletely backwards compatible with
existing DNS infrastructure
ā˜€ā€ÆIt would prevent the extension of the Great
Firewall of China outside China
Mukom Akong T. | @perfexcellence |! Slide 18!
Bene"ts of DNSSEC	
ā‘ ā€Æ The Internet community: Improved security in
the zones that are signed.
ā‘”ā€Æ Registrars: Offer domain signing services to
their customers.
ā‘¢ā€Æ ISPs: Increasing the security of the data
returned to their customers.
ā‘£ā€Æ Users: Protection from DNS vulnerabilities
such as cache poisoning and man-in-the-
middle attacks.
Mukom Akong T. | @perfexcellence |! Slide 19!
RPKI ā€“ What It Solves	
ā˜€ā€ÆTies an organization's IP address
range(s) to its ASN
ā˜€ā€ÆSolves the ā€œdoes this address block
belong to this organizationā€
ā˜€ā€ÆBlocks impersonation by IP address
(number)
ā˜€ā€ÆRPKI would have prevented the Youtube
Blackout of ā€˜08
Mukom Akong T. | @perfexcellence |! Slide 20!
How RPKI Works	
ā˜€ā€ÆDigitally certify that a resource has been allocated
to a specific entity.
ā˜€ā€ÆUsage rights for resources is proven by digital
certificate.
ā˜€ā€ÆConnect resources (ASNs, IP addresses) to a trust
anchor, thus forming a chain of trust.
ā˜€ā€ÆControl authority to originate a routing
announcement by a certificate via ROAs
ā˜€ā€ÆCertificates are used to verify that a network has
the authority to announce a given block of
addresses.
Mukom Akong T. | @perfexcellence |! Slide 21!
Implications for National Infrastructure	
ā‘ ā€Æ Is the ccTLD DNSSEC enabled?
ā‘”ā€Æ Government network
ā˜€ā€ÆSupport DNSSEC on all govā€™t networks
ā˜€ā€ÆIs govā€™t IP space RPKI-protected?
ā‘¢ā€Æ Key network operators (ideally Everyone)
ā˜€ā€ÆSecure your names domain with DNSSEC
ā˜€ā€ÆSecure your number domains with RPKI
Because Cyber Crime is an industry that will
only grow (to the chagrin of us all) and extend
to Cyber War & Terrorism
Mukom Akong T. | @perfexcellence |! Slide 22!
Source: http://www.dnssec-deployment.org
Consequences: think of the e#ect	
ā‘ ā€Æ We consolidate governance around
technology ā€¦then the e-govā€™t portal is
inaccessible due to attack
ā‘”ā€Æ We consolidate education around
hosted content and that platform was
inaccessible
ā‘¢ā€Æ Our bank websites get hijacked
Mukom Akong T. | @perfexcellence |! Slide 24!
Our digital way of life is under threat	
Mukom Akong T. | @perfexcellence |! Slide 25!
e-Banking E-Govā€™t E-Commerce
The Problem: Breakdown of TRUST
Call to Action	
Mukom Akong T. | @perfexcellence |! Slide 27!
RPKI & DNSSEC are not Silver Bullets but are a core part of the solution.
Fix up your own part of this mess! RPKI & DNSSEC on govā€™t infrastructure
Na Gode! Thank You ! Shā€™kran
mukom@afrinic.net | Twitter: @perfexcellent

More Related Content

What's hot

Internet security
Internet securityInternet security
Internet securityMohammed Adam
Ā 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
Ā 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
Ā 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018PKF Francis Clark
Ā 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
Ā 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIAcharitha garimella
Ā 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computerFranklin Sondakh
Ā 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & SecurityUday Bhaskarwar
Ā 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
Ā 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
Ā 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
Ā 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
Ā 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
Ā 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram communityMohammed Adam
Ā 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
Ā 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
Ā 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
Ā 

What's hot (20)

Internet security
Internet securityInternet security
Internet security
Ā 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
Ā 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
Ā 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
Ā 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
Ā 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
Ā 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
Ā 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
Ā 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Ā 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
Ā 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Ā 
internet security
internet securityinternet security
internet security
Ā 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
Ā 
Internet Security
Internet SecurityInternet Security
Internet Security
Ā 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
Ā 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram community
Ā 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Ā 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
Ā 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Ā 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
Ā 

Similar to High Level Overview of RPKI & DNSSEC

Philippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsPhilippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsAPNIC
Ā 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityRob Dudley
Ā 
How to prevent cyber terrorism taragana
How to prevent cyber terrorism  taraganaHow to prevent cyber terrorism  taragana
How to prevent cyber terrorism taraganaGilles Sgro
Ā 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerBlockstrap.com
Ā 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityPrateek Panda
Ā 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDebra Baker, CISSP CSSP
Ā 
Upsc science AND technology
Upsc   science AND technologyUpsc   science AND technology
Upsc science AND technologyGautam Kumar
Ā 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackPriyanka Aash
Ā 
FFMUC presents #ffmeet - #virtualUKNOF
FFMUC presents #ffmeet - #virtualUKNOFFFMUC presents #ffmeet - #virtualUKNOF
FFMUC presents #ffmeet - #virtualUKNOFAnnika Wickert
Ā 
How Internet Peering Improves Security
How Internet Peering Improves SecurityHow Internet Peering Improves Security
How Internet Peering Improves SecurityWilliam Norton
Ā 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
Ā 
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTsWeb 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTsAurora Consulting
Ā 
Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...ITCamp
Ā 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Andrew Hammond
Ā 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto GoldAndrew Hammond
Ā 
Superfast Business - Technology Trends for Business
Superfast Business - Technology Trends for BusinessSuperfast Business - Technology Trends for Business
Superfast Business - Technology Trends for BusinessSuperfast Business
Ā 
Scot Cloud 2017
Scot Cloud 2017Scot Cloud 2017
Scot Cloud 2017Ray Bugg
Ā 
Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101Mayank Jain
Ā 

Similar to High Level Overview of RPKI & DNSSEC (20)

ION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSECION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSEC
Ā 
Philippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsPhilippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTs
Ā 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application Security
Ā 
How to prevent cyber terrorism taragana
How to prevent cyber terrorism  taraganaHow to prevent cyber terrorism  taragana
How to prevent cyber terrorism taragana
Ā 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primer
Ā 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
Ā 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
Ā 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
Ā 
Upsc science AND technology
Upsc   science AND technologyUpsc   science AND technology
Upsc science AND technology
Ā 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation Track
Ā 
FFMUC presents #ffmeet - #virtualUKNOF
FFMUC presents #ffmeet - #virtualUKNOFFFMUC presents #ffmeet - #virtualUKNOF
FFMUC presents #ffmeet - #virtualUKNOF
Ā 
How Internet Peering Improves Security
How Internet Peering Improves SecurityHow Internet Peering Improves Security
How Internet Peering Improves Security
Ā 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
Ā 
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTsWeb 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Ā 
Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...
Ā 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...
Ā 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
Ā 
Superfast Business - Technology Trends for Business
Superfast Business - Technology Trends for BusinessSuperfast Business - Technology Trends for Business
Superfast Business - Technology Trends for Business
Ā 
Scot Cloud 2017
Scot Cloud 2017Scot Cloud 2017
Scot Cloud 2017
Ā 
Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101
Ā 

More from Mukom Akong Tamon

Cracking the Enigma of Innovation in Established Companies
Cracking the Enigma of Innovation in Established CompaniesCracking the Enigma of Innovation in Established Companies
Cracking the Enigma of Innovation in Established CompaniesMukom Akong Tamon
Ā 
Deploying #IPv6 Amidst Competing Priorities
Deploying #IPv6 Amidst Competing Priorities Deploying #IPv6 Amidst Competing Priorities
Deploying #IPv6 Amidst Competing Priorities Mukom Akong Tamon
Ā 
How to Love Your Email Again: Inbox-Zero via GTD
How to Love Your Email Again: Inbox-Zero via GTDHow to Love Your Email Again: Inbox-Zero via GTD
How to Love Your Email Again: Inbox-Zero via GTDMukom Akong Tamon
Ā 
How to Effectively Integrate ICTs in Education in Africa
How to Effectively Integrate ICTs in Education in Africa How to Effectively Integrate ICTs in Education in Africa
How to Effectively Integrate ICTs in Education in Africa Mukom Akong Tamon
Ā 
Importance of IP Resource Planning in ICT Strategies
Importance of IP Resource Planning in ICT StrategiesImportance of IP Resource Planning in ICT Strategies
Importance of IP Resource Planning in ICT StrategiesMukom Akong Tamon
Ā 
Effective Student Management (EduERP)
Effective Student Management (EduERP)Effective Student Management (EduERP)
Effective Student Management (EduERP)Mukom Akong Tamon
Ā 

More from Mukom Akong Tamon (6)

Cracking the Enigma of Innovation in Established Companies
Cracking the Enigma of Innovation in Established CompaniesCracking the Enigma of Innovation in Established Companies
Cracking the Enigma of Innovation in Established Companies
Ā 
Deploying #IPv6 Amidst Competing Priorities
Deploying #IPv6 Amidst Competing Priorities Deploying #IPv6 Amidst Competing Priorities
Deploying #IPv6 Amidst Competing Priorities
Ā 
How to Love Your Email Again: Inbox-Zero via GTD
How to Love Your Email Again: Inbox-Zero via GTDHow to Love Your Email Again: Inbox-Zero via GTD
How to Love Your Email Again: Inbox-Zero via GTD
Ā 
How to Effectively Integrate ICTs in Education in Africa
How to Effectively Integrate ICTs in Education in Africa How to Effectively Integrate ICTs in Education in Africa
How to Effectively Integrate ICTs in Education in Africa
Ā 
Importance of IP Resource Planning in ICT Strategies
Importance of IP Resource Planning in ICT StrategiesImportance of IP Resource Planning in ICT Strategies
Importance of IP Resource Planning in ICT Strategies
Ā 
Effective Student Management (EduERP)
Effective Student Management (EduERP)Effective Student Management (EduERP)
Effective Student Management (EduERP)
Ā 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
Ā 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
Ā 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
Ā 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
Ā 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
Ā 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
Ā 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
Ā 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
Ā 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
Ā 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
Ā 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
Ā 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
Ā 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
Ā 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
Ā 
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...Alan Dix
Ā 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
Ā 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
Ā 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Ā 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Ā 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Ā 
Hot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort ServiceHot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort Service
Ā 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
Ā 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Ā 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Ā 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Ā 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
Ā 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Ā 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Ā 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Ā 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Ā 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Ā 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
Ā 
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Ā 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Ā 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Ā 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Ā 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Ā 

High Level Overview of RPKI & DNSSEC

  • 1. Key pieces of the Cyber Security Puzzle
  • 2. Scorecard! DNS & Routing ! Overview of the problem!
  • 3. Exhibit A: The Great YouTube Blackout of ā€˜08 Mukom Akong T. | @perfexcellence |! Slide 3!
  • 4. Exhibit A: The Great YouTube Blackout of ā€˜08 Mukom Akong T. | @perfexcellence |! Slide 4! 1 billion (non)views per day! Date: 24th February 2008 Extent: Two thirds of Internet Damage: Inaccessible for 2 hours
  • 5. Exhibit B: Great Firewall of China extends abroad Mukom Akong T. | @perfexcellence |! Slide 5!
  • 6. Exhibit B: Great Firewall of China extends overseas Mukom Akong T. | @perfexcellence |! Slide 6! Date: 24 March 2010 Extent: Some networks in USA & Chile Damage: US & Chilean citizens became subject to the online policies of the Chinese govā€™t
  • 7. Oh God, how did we get here?
  • 8. Identifying computers on the Internet Mukom Akong T. | @perfexcellence |! Slide 8! 192.0.2.1 2001:db8:dead::a1d learn.afrinic.net IP addresses are ineffective for human use on a large scale
  • 9. How this can happen to you ā‘ ā€Æ You type your bankā€™s address: www.yourbank.com ā‘”ā€Æ Your PC asks your ISPā€™s DNS servers for the matching IP address ā‘¢ā€Æ The DNS server goes through a hierarchy to get the answer: Ā§ļ‚§ā€Æ Asks the root DNS servers which points it to .com servers Ā§ļ‚§ā€Æ The .com servers direct it to .yourbank.com DNS server Ā§ļ‚§ā€Æ The .yourbank.com DNS server sends the answer (an IP address) Ā§ļ‚§ā€Æ The server passes the response to your PC which makes the connection ā‘£ā€Æ An attacker can inject a fake answer during any of the above steps ā‘¤ā€Æ The response that comes to you Ā§ļ‚§ā€Æ Is NOT the same IP address of you bank (which you donā€™t know) Ā§ļ‚§ā€Æ The website LOOKS exactly like the one you often use ā‘„ā€Æ You type in your credentials, then you get a error e.g. page cannot be displayed ā‘¦ā€Æ 3 weeks later, you scream: ā€œWhereā€™s my money??!!" Mukom Akong T. | @perfexcellence |! Slide 9!
  • 10. Identifying organisations on the Internet ā˜€ā€ÆDomain name e.g afrinic.net ā˜€ā€ÆA block of IP addresses Ā§ļ‚§ā€Æ 196.1.0.0/24 Ā§ļ‚§ā€Æ 2001:4290::/32 ā˜€ā€ÆAutonomous System Number e.g. Mukom Akong T. | @perfexcellence |! Slide 10!
  • 11. For the Internet to work .. Mukom Akong T. | @perfexcellence |! Slide 11! 2001:db8:dead::a1dlearn.afrinic.net
  • 12. For the Internet to work .. Mukom Akong T. | @perfexcellence |! Slide 12! How do I send information to the computer with address B?
  • 13. The Problem: Breakdown of TRUST Mukom Akong T. | @perfexcellence |! Slide 13! I AM ā€¦ www.google.com www.yourbank.com www.statehouse.gov.ng www.prc.cm www.cto.int www.afrinic.net I AM ā€¦ 2c0f:face:b00c::/48 197.253.0.0/16 65.25.0/24 It is possible to impersonate any entity by name or address
  • 14. The Problem: Breakdown of TRUST ā˜€ā€ÆIt is possible for one computer to impersonate another node by name. ā˜€ā€ÆThereā€™s no real way of knowing if the answer your computer got to ā€œwhat is the IP address of www.yourbank.comā€ is legitimate or not Mukom Akong T. | @perfexcellence |! Slide 14!
  • 15. The Problem: Breakdown of TRUST ā˜€ā€ÆIt is possible for one entity (e.g an ISP) to impersonate a whole network by IP address ā˜€ā€ÆThereā€™s been no way verify if that entity owns that IP address itā€™s claiming Mukom Akong T. | @perfexcellence |! Slide 15!
  • 16. A Fix: Certify & authenticate Internet identity ā˜€ā€ÆSign DNS records ā˜€ā€ÆEstablish a chain of trust ā˜€ā€ÆEstablish ā€˜ownershipā€™ of address space Mukom Akong T. | @perfexcellence |! Slide 16! Digital certiļ¬cates & public key infrastructure
  • 17. How DNSSEC solves the problem ā‘ ā€Æ Digitally sign DNS (name to IP address) records using public keys ā‘”ā€Æ Establishes a chain of trust where parent domains authenticate child domains ā‘¢ā€Æ Ensures responses have not been tampered with in transit Does NOT provide confidentiality (encryption) Mukom Akong T. | @perfexcellence |! Slide 17!
  • 18. DNSSEC ā€“ What It Solves ā˜€ā€ÆUse public keys to authenticate Ā§ļ‚§ā€Æ The original name to address mapping Ā§ļ‚§ā€Æ That queries were not tampered with ā˜€ā€ÆPrevents impersonation by domain name ā˜€ā€ÆCompletely backwards compatible with existing DNS infrastructure ā˜€ā€ÆIt would prevent the extension of the Great Firewall of China outside China Mukom Akong T. | @perfexcellence |! Slide 18!
  • 19. Bene"ts of DNSSEC ā‘ ā€Æ The Internet community: Improved security in the zones that are signed. ā‘”ā€Æ Registrars: Offer domain signing services to their customers. ā‘¢ā€Æ ISPs: Increasing the security of the data returned to their customers. ā‘£ā€Æ Users: Protection from DNS vulnerabilities such as cache poisoning and man-in-the- middle attacks. Mukom Akong T. | @perfexcellence |! Slide 19!
  • 20. RPKI ā€“ What It Solves ā˜€ā€ÆTies an organization's IP address range(s) to its ASN ā˜€ā€ÆSolves the ā€œdoes this address block belong to this organizationā€ ā˜€ā€ÆBlocks impersonation by IP address (number) ā˜€ā€ÆRPKI would have prevented the Youtube Blackout of ā€˜08 Mukom Akong T. | @perfexcellence |! Slide 20!
  • 21. How RPKI Works ā˜€ā€ÆDigitally certify that a resource has been allocated to a specific entity. ā˜€ā€ÆUsage rights for resources is proven by digital certificate. ā˜€ā€ÆConnect resources (ASNs, IP addresses) to a trust anchor, thus forming a chain of trust. ā˜€ā€ÆControl authority to originate a routing announcement by a certificate via ROAs ā˜€ā€ÆCertificates are used to verify that a network has the authority to announce a given block of addresses. Mukom Akong T. | @perfexcellence |! Slide 21!
  • 22. Implications for National Infrastructure ā‘ ā€Æ Is the ccTLD DNSSEC enabled? ā‘”ā€Æ Government network ā˜€ā€ÆSupport DNSSEC on all govā€™t networks ā˜€ā€ÆIs govā€™t IP space RPKI-protected? ā‘¢ā€Æ Key network operators (ideally Everyone) ā˜€ā€ÆSecure your names domain with DNSSEC ā˜€ā€ÆSecure your number domains with RPKI Because Cyber Crime is an industry that will only grow (to the chagrin of us all) and extend to Cyber War & Terrorism Mukom Akong T. | @perfexcellence |! Slide 22!
  • 24. Consequences: think of the e#ect ā‘ ā€Æ We consolidate governance around technology ā€¦then the e-govā€™t portal is inaccessible due to attack ā‘”ā€Æ We consolidate education around hosted content and that platform was inaccessible ā‘¢ā€Æ Our bank websites get hijacked Mukom Akong T. | @perfexcellence |! Slide 24!
  • 25. Our digital way of life is under threat Mukom Akong T. | @perfexcellence |! Slide 25! e-Banking E-Govā€™t E-Commerce
  • 27. Call to Action Mukom Akong T. | @perfexcellence |! Slide 27! RPKI & DNSSEC are not Silver Bullets but are a core part of the solution. Fix up your own part of this mess! RPKI & DNSSEC on govā€™t infrastructure
  • 28. Na Gode! Thank You ! Shā€™kran mukom@afrinic.net | Twitter: @perfexcellent