SlideShare a Scribd company logo
Technical and Business
Considerations for
DNSSEC Depolyment
Jim Reid
jim@rfc1035.com
Objectives
• Understanding the main technical & business impacts
• Are these helping or hindering DNSSEC deployment?
• What could or should be done to improve things?
TECHNICAL
CONSIDERATIONS
AND MYTHS
Zone size
CPU load
Traffic levels, need for rate-limiting & traffic shaping
Key rotation (rollover)
Tooling & debugging
Use cases
Zone & Cache Size
• Signed zones are typically 5-10 times larger than
unsigned ones
• Approximately 4 times as many resource records
• RRSIGs are big
• So what?
• Commodity RAM is cheap: ~$20 for 4GB of DDR3
• Disk space is cheap too: 1TB costs ~$50
• Name server’s RAM footprint might be an issue
CPU Load Considerations
• 1024-bit RSASHA1 keys, 3GHz Xeon, 1 CPU
• Signing:
• ~1800 signatures/second
• Validation:
• ~24,000 validations/second
• Off-the-shelf hardware & software should be good
enough most (or all?) of the time
Network Considerations
• DNSSEC requires EDNS0
• DO bit, larger payloads, etc.
• Want to avoid truncation in both DNS response and the
underlying MTU for packets/frames
• Lots of broken stuff assumes DNS only goes over
UDP and always has packets < 512 bytes
• DNSSEC kills these false assumptions
• Firewalls sometimes get misconfigured like this
• CPE is notorious for getting this wrong too
DDoS Exposure
• DNSSEC is a vector for DDoS amplification attacks
• 50-60 byte query typically generates 1-2KB of response
• Use Response Rate Limiting (RRL)
• Provided in BIND9.10+ source distribution
• Patches available for BIND9.9
• Also in recent versions of other DNS implementations
• Traffic shaping might also help
• Edge routers and/or kernels
Secure Hardware
• Hardware Security Modules (HSMs)
• Tamper-proof hardware for storing keys
• Expensive and concerns about managing lots of keys
• Largely a niche solution for very important security-
critical zones
• Security protocols for managing access tokens
• HSM hardware isn’t really needed most of the time
• HSM in software (OpenDNSSEC) might be good enough
for a large registrar or small TLD registry
DNSSEC SIGNING
CHOICES
The main choices and trade-offs to consider when
deploying Secure DNS include:
Which versions of DNSSEC to use
Crypto algorithms
Managing keys & signatures
Monitoring & reporting
Tools & tooling
What functionality & UIs should customers see?
Key Lengths - 1
• How large should the key signing keys (KSK) and
zone signing keys (ZSK) be?
• Obvious Goldilocks trade-offs:
• Not too big or too small; just nice
• Don’t assume large keys are “stronger” than small
ones or vice versa
• Could key size (or algorithms) be something to
discuss with stakeholders?
• Some might care (a lot), most probably won’t
Key Lengths - 2
• What’s the window for cryptanalysis of some key?
• Some rules of thumb:
• Short-lived keys don’t need to be big
• Long-lived keys should be reasonably big
• Suggestion:
• Change a small ZSK once a week/month (maybe)
• Change a large KSK once a year (maybe)
• Whatever’s done for the.tld zone or at the root
should be more than good enough for your zones
Signature Duration
• Signature expiry intervals need careful thought too
• Obvious Goldilocks trade-offs again:
• Not too short or too long; just nice
• Short expiry => more CPU cycles for validators
• Long expiry => “stale” signatures may cause validation
failures when something has to be changed in a hurry
• Potential for cryptanalysis of long lived signatures?
• Might be best to start off by following what the
parent zone does and adjust in light of experience
Key Rollover - 1
Key Rollover - 2
• This should happen at regular, planned intervals
• Might have to happen sooner in an emergency: ie when
current key(s) are considered tainted/compromised
• Hard to get the choreography right
• Too many moving parts for KSK rollovers
• Signing tools are getting a lot better at managing
key rollovers and signing policies in general
• Metadata in BIND’s K*.private files
• OpenDNSSEC
Tooling
• Early signing and validating tools were clunky
• Much improved now but could be better still
• Stronger focus on supporting local policies
• Use obvious primitives that hide icky detail:
• pdnssec secure-zone/add-zone-key in
PowerDNS
• Windows GUI-based DNS Manager
• Essentially just click “Sign My Zone”
UI Considerations
• Most end users and administrators won’t want or
need to see DNSSEC
• How best to “hide” DNSSEC operations on the control
panel or web site?
• Perhaps just add a “click here to sign” button?
• Might be the end of the road for anyone managing
DNS zone files with emacs or vi or perl
• No user serviceable parts inside...
Monitoring & Reporting
• Add DNSSEC elements to name server monitoring
and reporting systems
• Check that zones get signed when expected (or not)
• Look out for zones with close-to-expiring signatures
• Monitor key rollovers closely
• Check that zone signing behaves as expected
• Are KSK changes getting notified to the parent?
• Does the parent’s DS match the child’s KSK?
• Does the parent publish new DS records in good time?
Key Management for
Customer & End User Zones
• Who will generate/manage the keys for
example.com, you or the customer?
• Risks and benefits in both approaches
• Who gets blamed if something breaks?
• Is this an extra (chargeable?) service?
• Who has responsibility for choosing the keys, rotating
them, revoking them, etc?
• What about customer support and helpdesk staff?
Validation Challenges
• Switching on validation breaks response rewriting
• RPZ, content filtering, anti-abuse protection measures,
NXDOMAIN rewriting, parental controls, etc.
• Government and law enforcement blacklists
• IPR takedown/block requests
• Clumsy workarounds
• Forward “vanilla” queries to validating resolvers, send the
dodgy ones elsewhere
• Might be seen as needless extra complexity
What deployment barriers?
• The software and tools work reasonably well
• However it’s not always clear:
• How to put them together and use/debug things
• Define policies or understand the trade-offs
• Where are the white papers, case studies and
business justifications?
• “We switched on DNSSEC and….”
• Are experiences at the root or a TLD registry or a big ISP
meaningful for example.com?
Advice Needed!
• DNS administrators need guidance on DNSSEC
deployment considerations and trade-offs:
• Local policy choices on: key selection, signature duration,
rollovers, negative trust anchors, etc.
• NIST report 800-81-2 is wonderful
• Tough reading for non-experts — 130+ pages!
• Need something similar (and shorter) on business
justifications
• Convince the CEO that using DNSSEC is a Good Thing
Where’s the killer app?
• Not much software uses or needs DNSSEC today
• Proof of concept web plug-ins mostly
• DANE could/should be the driver
• Lookup certificates and other crypto material from the DNS
• IETF’s ACME WG standards coming to browsers Real Soon
Now
• Let’s Encrypt certificates as an alternative to ones issued
by conventional CAs
• DANE support emerging in MTAs
Deployment Today - 1
• Most of the important TLDs are signed
• Contractual requirement for new gTLDs
• Some European ccTLDs have 70%+ signed delegations
• Registrar discounts rather than DNSSEC enthusiasm
• Very few of the busiest domain names are signed
• Just paypal.com and nih.gov of the Alexa top 100
• The number of signed zones looks OK-ish
quantitatively but not so good qualitatively
Deployment Today - 2
• Validation uptake is a lot healthier
• Around 15% of users world-wide depend on a validating
resolver
• See https://stats.labs.apnic.net/dnssec
• Much of this is attributed to just three providers:
• Comcast, google’s 8.8.8.8 and TeliaSonera
• This is great, but are they validating anything that
actually matters?
• What are the other big ISPs doing?
Externalities
• For signers:
• Why sign if almost nobody is thought to be validating?
• What's the impact when/if someone else's validator fails?
• For validators:
• Why validate if hardly anyone important signs their zones?
• When someone else's signer screws up, you end up taking
the hit(s) for their mistake(s).What will the impact(s) be?
• i.e.A rival ISP's customers have no problem getting to
badlysigned.com because that ISP doesn't validate
while your customers can't because we are validating
Customer Support
• Training & education for helpdesk/support staff
• Ditto for customers
• DNSSEC troubleshooting
• N-th level support staff will need training
• How to tell the difference between a Secure DNS
validation error SERVFAIL and a regular SERVFAIL
• How to troubleshoot validation problems and fix or
escalate them
• Expired signatures, key mismatches, etc.
Documentation
• Make sure everything gets properly documented:
• Design/architecture, deployment plans & roadmap
• Policies (e.g. key sizes, rotation, signing interval, audit, etc.)
• Write a DNSSEC Policy/Practice Statement - DPS
• RFC6841 is a good starting point
• DPS for the root zone is an excellent template:
•https://www.iana.org/dnssec/icann-dps.txt
• Document DNSSEC tools and new processes
• Produce white papers and use cases for stakeholders?
Training
• How will your staff get trained?
• Knowledge transfer from in-house and external experts
• Commercial training courses, webinars, etc.
• Not just for your DNS team
• Network operations & system administrators
• Developers & helpdesk
• Customer relations & support staff
• Upper management
The “Last Mile” Issue
• AD header bit is set by the validating resolver
• Vulnerable to spoofing by an attacker
• Can the path between some stub resolver and its
resolving server be trusted?
• Windows uses IPsec to protect this
• If the local net isn’t considered secure, run a
validating resolver on the edge device itself
• IETF’s DNS-over-TLS could be the answer
Validator Crunch Time!
• Major test is just around the corner
• First ever rollover of root zone’s KSK due Real Soon Now
• Validators which don’t support or use RFC5011 key
rollover will almost certainly break
• BIND configurations with trusted-keys{} statements
• Old/clunky/buggy DNSSEC implementations
• IANA’s giving plenty of advance warning
• Nothing important should fail
• Famous last words….
Negative Trust Anchors
• How to tell the validator that DNSSEC for some
domain(s) are broken
• Don't validate these domains for now, but carry on
validating elsewhere
• Provably insecure (and possibly bad) data might be better
than nothing
• Features in BIND and unbound to support this
• A necessary evil - unfortunately
• Workarounds for other people's mistakes
DNSSEC Troubleshooting
• Can be very painful
• Debugging vanilla DNS problems is hard enough
• DNSSEC makes things even harder
• Checking DNSSEC-related RRtypes, keeping track of key
IDs & flags, algorithm numbers, etc.
• Tools are getting better, but still far too difficult for
many DNS administrators
• Error messages should be clearer:“you forgot to re-sign”,
“that signature has the wrong hash value”,“there's no DS
record for this KSK”, etc.
drill
• The best DNSSEC debugging tool by far
• Also replicates dig’s commonly used functionality
• Open source from NLnetLabs
• Can illustrate validation in action
• Shows which keys (algorithms & key lengths) are used
• Work on a single signature or top-down from the root
• Pinpoint stale keys & signatures
• Identify DS record and KSK mismatches
• drill -TD some-domain is just awesome!
delv
• ISC's answer to drill
• Distributed in BIND9.10+
• Command-line options almost identical to dig
• Not as chatty as drill
• Use the +vtrace option to see the validations
DNSVIZ
• A web-based DNS visualisation tool
• Draws nice pictures
• Can display details of revoked keys
• Visit dnsviz.net and type in your favourite
signed domain name
• Uses the web site's validating resolver, not yours
• Doesn't check your validator's configuration
• Can't check internal-only signed domains
• Download DNSVIZ source code and run it locally?
DNSVIZ
Example
• Hover over elements to see
details of the key, algorithm,
TTL, key tags, etc
• Shaded elements are the KSKs
• Double circle around the trust
anchor: the root's KSK
A Never Ending Task?
• Keeping DNSSEC software and tools up-to-date
• Can you rely on your vendor/supplier?
• Crypto arms race
• Changing DNSSEC keys regularly
• Tweaking DNSSEC policies
• Interactions with parent zone(s)
• New operational problems and failure modes
• Customer service/support and helpdesk issues
QUESTIONS?

More Related Content

What's hot

GWAVACon 2013: Novell Service Desk Design, Deployment
GWAVACon 2013: Novell Service Desk Design, DeploymentGWAVACon 2013: Novell Service Desk Design, Deployment
GWAVACon 2013: Novell Service Desk Design, Deployment
GWAVA
 
Optimizing IT Infrastructure For Peak Database Performance
Optimizing IT Infrastructure For Peak Database Performance Optimizing IT Infrastructure For Peak Database Performance
Optimizing IT Infrastructure For Peak Database Performance
Aventis Systems, Inc.
 
Developer To Architect
Developer To ArchitectDeveloper To Architect
Developer To Architect
Anurag Yadav
 
Tpm cloud collaboration network security
Tpm   cloud collaboration network securityTpm   cloud collaboration network security
Tpm cloud collaboration network security
David Brunke
 
How Laserfiche Works For Lawyers
How Laserfiche Works For LawyersHow Laserfiche Works For Lawyers
How Laserfiche Works For Lawyers
lwrightsolutions
 
Cyber-Security Product
Cyber-Security ProductCyber-Security Product
Cyber-Security Product
Ali Hamieh
 
CD presentation march 12th, 2018
CD presentation march 12th, 2018CD presentation march 12th, 2018
CD presentation march 12th, 2018
Ran Levy
 
Transactional Streaming: If you can compute it, you can probably stream it.
Transactional Streaming: If you can compute it, you can probably stream it.Transactional Streaming: If you can compute it, you can probably stream it.
Transactional Streaming: If you can compute it, you can probably stream it.
jhugg
 
The road to clustered data ontap.
The road to clustered data ontap.The road to clustered data ontap.
The road to clustered data ontap.
Scalar Decisions
 
Selling Disaster Recovery as a Service
Selling Disaster Recovery as a ServiceSelling Disaster Recovery as a Service
Selling Disaster Recovery as a Service
ServerCentral
 
MWLUG 2017 SA110
MWLUG 2017 SA110MWLUG 2017 SA110
MWLUG 2017 SA110
Douglas Robinson
 
Survivor - Disaster Recovery Edition
Survivor - Disaster Recovery EditionSurvivor - Disaster Recovery Edition
Survivor - Disaster Recovery Edition
Velocity Technology Solutions
 

What's hot (12)

GWAVACon 2013: Novell Service Desk Design, Deployment
GWAVACon 2013: Novell Service Desk Design, DeploymentGWAVACon 2013: Novell Service Desk Design, Deployment
GWAVACon 2013: Novell Service Desk Design, Deployment
 
Optimizing IT Infrastructure For Peak Database Performance
Optimizing IT Infrastructure For Peak Database Performance Optimizing IT Infrastructure For Peak Database Performance
Optimizing IT Infrastructure For Peak Database Performance
 
Developer To Architect
Developer To ArchitectDeveloper To Architect
Developer To Architect
 
Tpm cloud collaboration network security
Tpm   cloud collaboration network securityTpm   cloud collaboration network security
Tpm cloud collaboration network security
 
How Laserfiche Works For Lawyers
How Laserfiche Works For LawyersHow Laserfiche Works For Lawyers
How Laserfiche Works For Lawyers
 
Cyber-Security Product
Cyber-Security ProductCyber-Security Product
Cyber-Security Product
 
CD presentation march 12th, 2018
CD presentation march 12th, 2018CD presentation march 12th, 2018
CD presentation march 12th, 2018
 
Transactional Streaming: If you can compute it, you can probably stream it.
Transactional Streaming: If you can compute it, you can probably stream it.Transactional Streaming: If you can compute it, you can probably stream it.
Transactional Streaming: If you can compute it, you can probably stream it.
 
The road to clustered data ontap.
The road to clustered data ontap.The road to clustered data ontap.
The road to clustered data ontap.
 
Selling Disaster Recovery as a Service
Selling Disaster Recovery as a ServiceSelling Disaster Recovery as a Service
Selling Disaster Recovery as a Service
 
MWLUG 2017 SA110
MWLUG 2017 SA110MWLUG 2017 SA110
MWLUG 2017 SA110
 
Survivor - Disaster Recovery Edition
Survivor - Disaster Recovery EditionSurvivor - Disaster Recovery Edition
Survivor - Disaster Recovery Edition
 

Viewers also liked

Case Studies: TakNet
Case Studies: TakNetCase Studies: TakNet
Case Studies: TakNet
APNIC
 
DNSSEC/DANE/TLS Testing in Go6Lab
DNSSEC/DANE/TLS Testing in Go6LabDNSSEC/DANE/TLS Testing in Go6Lab
DNSSEC/DANE/TLS Testing in Go6Lab
APNIC
 
Community Networks: An Alternative Paradigm for Developing Network Infrastruc...
Community Networks: An Alternative Paradigm for Developing Network Infrastruc...Community Networks: An Alternative Paradigm for Developing Network Infrastruc...
Community Networks: An Alternative Paradigm for Developing Network Infrastruc...
APNIC
 
Korea IPv6 Measurement
Korea IPv6 MeasurementKorea IPv6 Measurement
Korea IPv6 Measurement
APNIC
 
Japan IPv6 Measurement
Japan IPv6 MeasurementJapan IPv6 Measurement
Japan IPv6 Measurement
APNIC
 
APNIC Update - MMNOG 2017
APNIC Update - MMNOG 2017APNIC Update - MMNOG 2017
APNIC Update - MMNOG 2017
APNIC
 
APIX Update
APIX UpdateAPIX Update
APIX Update
APNIC
 
Network Automation: Ansible 101
Network Automation: Ansible 101Network Automation: Ansible 101
Network Automation: Ansible 101
APNIC
 
Evolving the network for 5G
Evolving the network for 5GEvolving the network for 5G
Evolving the network for 5G
APNIC
 
LPWA – Giving a Voice to Things
LPWA – Giving a Voice to ThingsLPWA – Giving a Voice to Things
LPWA – Giving a Voice to Things
APNIC
 
Network Automation: Ansible 102
Network Automation: Ansible 102Network Automation: Ansible 102
Network Automation: Ansible 102
APNIC
 
20 years of the Internet in Vietnam: Think about the I in the Internet
20 years of the Internet in Vietnam: Think about the I in the Internet20 years of the Internet in Vietnam: Think about the I in the Internet
20 years of the Internet in Vietnam: Think about the I in the Internet
APNIC
 
Improve your supply chain with Acctivate & B2BGateway | B2BGateway co-hosted ...
Improve your supply chain with Acctivate & B2BGateway | B2BGateway co-hosted ...Improve your supply chain with Acctivate & B2BGateway | B2BGateway co-hosted ...
Improve your supply chain with Acctivate & B2BGateway | B2BGateway co-hosted ...
Agnieszka (Aggie) Grabowska
 
BCOP BoF
BCOP BoFBCOP BoF
BCOP BoF
APNIC
 
The Death of Transit and Beyond
The Death of Transit and BeyondThe Death of Transit and Beyond
The Death of Transit and Beyond
APNIC
 
Running a Local Copy of the DNS Root Zone
Running a Local Copy of the DNS Root ZoneRunning a Local Copy of the DNS Root Zone
Running a Local Copy of the DNS Root Zone
APNIC
 
Addressing 2016
Addressing 2016Addressing 2016
Addressing 2016
APNIC
 
Trafficshifting: Avoiding Disasters & Improving Performance at Scale
Trafficshifting: Avoiding Disasters & Improving Performance at ScaleTrafficshifting: Avoiding Disasters & Improving Performance at Scale
Trafficshifting: Avoiding Disasters & Improving Performance at Scale
APNIC
 
prop-117: Returned IPv4 address management and Final /8 exhaustion
prop-117: Returned IPv4 address management and Final /8 exhaustionprop-117: Returned IPv4 address management and Final /8 exhaustion
prop-117: Returned IPv4 address management and Final /8 exhaustion
APNIC
 
Minimum Viable FIB
Minimum Viable FIBMinimum Viable FIB
Minimum Viable FIB
APNIC
 

Viewers also liked (20)

Case Studies: TakNet
Case Studies: TakNetCase Studies: TakNet
Case Studies: TakNet
 
DNSSEC/DANE/TLS Testing in Go6Lab
DNSSEC/DANE/TLS Testing in Go6LabDNSSEC/DANE/TLS Testing in Go6Lab
DNSSEC/DANE/TLS Testing in Go6Lab
 
Community Networks: An Alternative Paradigm for Developing Network Infrastruc...
Community Networks: An Alternative Paradigm for Developing Network Infrastruc...Community Networks: An Alternative Paradigm for Developing Network Infrastruc...
Community Networks: An Alternative Paradigm for Developing Network Infrastruc...
 
Korea IPv6 Measurement
Korea IPv6 MeasurementKorea IPv6 Measurement
Korea IPv6 Measurement
 
Japan IPv6 Measurement
Japan IPv6 MeasurementJapan IPv6 Measurement
Japan IPv6 Measurement
 
APNIC Update - MMNOG 2017
APNIC Update - MMNOG 2017APNIC Update - MMNOG 2017
APNIC Update - MMNOG 2017
 
APIX Update
APIX UpdateAPIX Update
APIX Update
 
Network Automation: Ansible 101
Network Automation: Ansible 101Network Automation: Ansible 101
Network Automation: Ansible 101
 
Evolving the network for 5G
Evolving the network for 5GEvolving the network for 5G
Evolving the network for 5G
 
LPWA – Giving a Voice to Things
LPWA – Giving a Voice to ThingsLPWA – Giving a Voice to Things
LPWA – Giving a Voice to Things
 
Network Automation: Ansible 102
Network Automation: Ansible 102Network Automation: Ansible 102
Network Automation: Ansible 102
 
20 years of the Internet in Vietnam: Think about the I in the Internet
20 years of the Internet in Vietnam: Think about the I in the Internet20 years of the Internet in Vietnam: Think about the I in the Internet
20 years of the Internet in Vietnam: Think about the I in the Internet
 
Improve your supply chain with Acctivate & B2BGateway | B2BGateway co-hosted ...
Improve your supply chain with Acctivate & B2BGateway | B2BGateway co-hosted ...Improve your supply chain with Acctivate & B2BGateway | B2BGateway co-hosted ...
Improve your supply chain with Acctivate & B2BGateway | B2BGateway co-hosted ...
 
BCOP BoF
BCOP BoFBCOP BoF
BCOP BoF
 
The Death of Transit and Beyond
The Death of Transit and BeyondThe Death of Transit and Beyond
The Death of Transit and Beyond
 
Running a Local Copy of the DNS Root Zone
Running a Local Copy of the DNS Root ZoneRunning a Local Copy of the DNS Root Zone
Running a Local Copy of the DNS Root Zone
 
Addressing 2016
Addressing 2016Addressing 2016
Addressing 2016
 
Trafficshifting: Avoiding Disasters & Improving Performance at Scale
Trafficshifting: Avoiding Disasters & Improving Performance at ScaleTrafficshifting: Avoiding Disasters & Improving Performance at Scale
Trafficshifting: Avoiding Disasters & Improving Performance at Scale
 
prop-117: Returned IPv4 address management and Final /8 exhaustion
prop-117: Returned IPv4 address management and Final /8 exhaustionprop-117: Returned IPv4 address management and Final /8 exhaustion
prop-117: Returned IPv4 address management and Final /8 exhaustion
 
Minimum Viable FIB
Minimum Viable FIBMinimum Viable FIB
Minimum Viable FIB
 

Similar to Technical and Business Considerations for DNSSEC Deployment

Introduction DNSSec
Introduction DNSSecIntroduction DNSSec
Introduction DNSSec
AFRINIC
 
RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?
APNIC
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutions
APNIC
 
NANOG 82: DNS Evolution
NANOG 82: DNS EvolutionNANOG 82: DNS Evolution
NANOG 82: DNS Evolution
APNIC
 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Response
pm123008
 
Challenges To Deploying New DNSSEC Cryptographic Algorithms
Challenges To Deploying New DNSSEC Cryptographic AlgorithmsChallenges To Deploying New DNSSEC Cryptographic Algorithms
Challenges To Deploying New DNSSEC Cryptographic Algorithms
Deploy360 Programme (Internet Society)
 
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
APNIC
 
Design Reviews for Operations - Velocity Europe 2014
Design Reviews for Operations - Velocity Europe 2014Design Reviews for Operations - Velocity Europe 2014
Design Reviews for Operations - Velocity Europe 2014
Mandi Walls
 
Moving Oracle Applications to the Cloud - Which Cloud is Right for Me?
 Moving Oracle Applications to the Cloud - Which Cloud is Right for Me? Moving Oracle Applications to the Cloud - Which Cloud is Right for Me?
Moving Oracle Applications to the Cloud - Which Cloud is Right for Me?
Datavail
 
Scaling apps for the big time
Scaling apps for the big timeScaling apps for the big time
Scaling apps for the big time
proitconsult
 
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision ProblemUsing ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
APNIC
 
Design Review Best Practices - SREcon 2014
Design Review Best Practices - SREcon 2014Design Review Best Practices - SREcon 2014
Design Review Best Practices - SREcon 2014
Mandi Walls
 
Global Software Development powered by Perforce
Global Software Development powered by PerforceGlobal Software Development powered by Perforce
Global Software Development powered by Perforce
Perforce
 
An Introduction to DANE - Securing TLS using DNSSEC
An Introduction to DANE - Securing TLS using DNSSECAn Introduction to DANE - Securing TLS using DNSSEC
An Introduction to DANE - Securing TLS using DNSSEC
Carlos Martinez Cagnazzo
 
RIPE 82: DNS Evolution
RIPE 82: DNS EvolutionRIPE 82: DNS Evolution
RIPE 82: DNS Evolution
APNIC
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
Paul Morse
 
Kafka Summit SF 2017 - Running Kafka for Maximum Pain
Kafka Summit SF 2017 - Running Kafka for Maximum PainKafka Summit SF 2017 - Running Kafka for Maximum Pain
Kafka Summit SF 2017 - Running Kafka for Maximum Pain
confluent
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
MuhammadFarhan571648
 
8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
DNS Entrepreneurship Center
 
Dbops, DevOps & Ops, by Eduardo Piairo
Dbops, DevOps & Ops, by Eduardo PiairoDbops, DevOps & Ops, by Eduardo Piairo
Dbops, DevOps & Ops, by Eduardo Piairo
Agile Connect®
 

Similar to Technical and Business Considerations for DNSSEC Deployment (20)

Introduction DNSSec
Introduction DNSSecIntroduction DNSSec
Introduction DNSSec
 
RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutions
 
NANOG 82: DNS Evolution
NANOG 82: DNS EvolutionNANOG 82: DNS Evolution
NANOG 82: DNS Evolution
 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Response
 
Challenges To Deploying New DNSSEC Cryptographic Algorithms
Challenges To Deploying New DNSSEC Cryptographic AlgorithmsChallenges To Deploying New DNSSEC Cryptographic Algorithms
Challenges To Deploying New DNSSEC Cryptographic Algorithms
 
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
 
Design Reviews for Operations - Velocity Europe 2014
Design Reviews for Operations - Velocity Europe 2014Design Reviews for Operations - Velocity Europe 2014
Design Reviews for Operations - Velocity Europe 2014
 
Moving Oracle Applications to the Cloud - Which Cloud is Right for Me?
 Moving Oracle Applications to the Cloud - Which Cloud is Right for Me? Moving Oracle Applications to the Cloud - Which Cloud is Right for Me?
Moving Oracle Applications to the Cloud - Which Cloud is Right for Me?
 
Scaling apps for the big time
Scaling apps for the big timeScaling apps for the big time
Scaling apps for the big time
 
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision ProblemUsing ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
 
Design Review Best Practices - SREcon 2014
Design Review Best Practices - SREcon 2014Design Review Best Practices - SREcon 2014
Design Review Best Practices - SREcon 2014
 
Global Software Development powered by Perforce
Global Software Development powered by PerforceGlobal Software Development powered by Perforce
Global Software Development powered by Perforce
 
An Introduction to DANE - Securing TLS using DNSSEC
An Introduction to DANE - Securing TLS using DNSSECAn Introduction to DANE - Securing TLS using DNSSEC
An Introduction to DANE - Securing TLS using DNSSEC
 
RIPE 82: DNS Evolution
RIPE 82: DNS EvolutionRIPE 82: DNS Evolution
RIPE 82: DNS Evolution
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
 
Kafka Summit SF 2017 - Running Kafka for Maximum Pain
Kafka Summit SF 2017 - Running Kafka for Maximum PainKafka Summit SF 2017 - Running Kafka for Maximum Pain
Kafka Summit SF 2017 - Running Kafka for Maximum Pain
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
 
8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 
Dbops, DevOps & Ops, by Eduardo Piairo
Dbops, DevOps & Ops, by Eduardo PiairoDbops, DevOps & Ops, by Eduardo Piairo
Dbops, DevOps & Ops, by Eduardo Piairo
 

More from APNIC

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
APNIC
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
APNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
APNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
APNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APNIC
 

More from APNIC (20)

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 

Recently uploaded

办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 

Recently uploaded (19)

办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 

Technical and Business Considerations for DNSSEC Deployment

  • 1. Technical and Business Considerations for DNSSEC Depolyment Jim Reid jim@rfc1035.com
  • 2. Objectives • Understanding the main technical & business impacts • Are these helping or hindering DNSSEC deployment? • What could or should be done to improve things?
  • 3. TECHNICAL CONSIDERATIONS AND MYTHS Zone size CPU load Traffic levels, need for rate-limiting & traffic shaping Key rotation (rollover) Tooling & debugging Use cases
  • 4. Zone & Cache Size • Signed zones are typically 5-10 times larger than unsigned ones • Approximately 4 times as many resource records • RRSIGs are big • So what? • Commodity RAM is cheap: ~$20 for 4GB of DDR3 • Disk space is cheap too: 1TB costs ~$50 • Name server’s RAM footprint might be an issue
  • 5. CPU Load Considerations • 1024-bit RSASHA1 keys, 3GHz Xeon, 1 CPU • Signing: • ~1800 signatures/second • Validation: • ~24,000 validations/second • Off-the-shelf hardware & software should be good enough most (or all?) of the time
  • 6. Network Considerations • DNSSEC requires EDNS0 • DO bit, larger payloads, etc. • Want to avoid truncation in both DNS response and the underlying MTU for packets/frames • Lots of broken stuff assumes DNS only goes over UDP and always has packets < 512 bytes • DNSSEC kills these false assumptions • Firewalls sometimes get misconfigured like this • CPE is notorious for getting this wrong too
  • 7. DDoS Exposure • DNSSEC is a vector for DDoS amplification attacks • 50-60 byte query typically generates 1-2KB of response • Use Response Rate Limiting (RRL) • Provided in BIND9.10+ source distribution • Patches available for BIND9.9 • Also in recent versions of other DNS implementations • Traffic shaping might also help • Edge routers and/or kernels
  • 8. Secure Hardware • Hardware Security Modules (HSMs) • Tamper-proof hardware for storing keys • Expensive and concerns about managing lots of keys • Largely a niche solution for very important security- critical zones • Security protocols for managing access tokens • HSM hardware isn’t really needed most of the time • HSM in software (OpenDNSSEC) might be good enough for a large registrar or small TLD registry
  • 9. DNSSEC SIGNING CHOICES The main choices and trade-offs to consider when deploying Secure DNS include: Which versions of DNSSEC to use Crypto algorithms Managing keys & signatures Monitoring & reporting Tools & tooling What functionality & UIs should customers see?
  • 10. Key Lengths - 1 • How large should the key signing keys (KSK) and zone signing keys (ZSK) be? • Obvious Goldilocks trade-offs: • Not too big or too small; just nice • Don’t assume large keys are “stronger” than small ones or vice versa • Could key size (or algorithms) be something to discuss with stakeholders? • Some might care (a lot), most probably won’t
  • 11. Key Lengths - 2 • What’s the window for cryptanalysis of some key? • Some rules of thumb: • Short-lived keys don’t need to be big • Long-lived keys should be reasonably big • Suggestion: • Change a small ZSK once a week/month (maybe) • Change a large KSK once a year (maybe) • Whatever’s done for the.tld zone or at the root should be more than good enough for your zones
  • 12. Signature Duration • Signature expiry intervals need careful thought too • Obvious Goldilocks trade-offs again: • Not too short or too long; just nice • Short expiry => more CPU cycles for validators • Long expiry => “stale” signatures may cause validation failures when something has to be changed in a hurry • Potential for cryptanalysis of long lived signatures? • Might be best to start off by following what the parent zone does and adjust in light of experience
  • 14. Key Rollover - 2 • This should happen at regular, planned intervals • Might have to happen sooner in an emergency: ie when current key(s) are considered tainted/compromised • Hard to get the choreography right • Too many moving parts for KSK rollovers • Signing tools are getting a lot better at managing key rollovers and signing policies in general • Metadata in BIND’s K*.private files • OpenDNSSEC
  • 15. Tooling • Early signing and validating tools were clunky • Much improved now but could be better still • Stronger focus on supporting local policies • Use obvious primitives that hide icky detail: • pdnssec secure-zone/add-zone-key in PowerDNS • Windows GUI-based DNS Manager • Essentially just click “Sign My Zone”
  • 16. UI Considerations • Most end users and administrators won’t want or need to see DNSSEC • How best to “hide” DNSSEC operations on the control panel or web site? • Perhaps just add a “click here to sign” button? • Might be the end of the road for anyone managing DNS zone files with emacs or vi or perl • No user serviceable parts inside...
  • 17. Monitoring & Reporting • Add DNSSEC elements to name server monitoring and reporting systems • Check that zones get signed when expected (or not) • Look out for zones with close-to-expiring signatures • Monitor key rollovers closely • Check that zone signing behaves as expected • Are KSK changes getting notified to the parent? • Does the parent’s DS match the child’s KSK? • Does the parent publish new DS records in good time?
  • 18. Key Management for Customer & End User Zones • Who will generate/manage the keys for example.com, you or the customer? • Risks and benefits in both approaches • Who gets blamed if something breaks? • Is this an extra (chargeable?) service? • Who has responsibility for choosing the keys, rotating them, revoking them, etc? • What about customer support and helpdesk staff?
  • 19. Validation Challenges • Switching on validation breaks response rewriting • RPZ, content filtering, anti-abuse protection measures, NXDOMAIN rewriting, parental controls, etc. • Government and law enforcement blacklists • IPR takedown/block requests • Clumsy workarounds • Forward “vanilla” queries to validating resolvers, send the dodgy ones elsewhere • Might be seen as needless extra complexity
  • 20. What deployment barriers? • The software and tools work reasonably well • However it’s not always clear: • How to put them together and use/debug things • Define policies or understand the trade-offs • Where are the white papers, case studies and business justifications? • “We switched on DNSSEC and….” • Are experiences at the root or a TLD registry or a big ISP meaningful for example.com?
  • 21. Advice Needed! • DNS administrators need guidance on DNSSEC deployment considerations and trade-offs: • Local policy choices on: key selection, signature duration, rollovers, negative trust anchors, etc. • NIST report 800-81-2 is wonderful • Tough reading for non-experts — 130+ pages! • Need something similar (and shorter) on business justifications • Convince the CEO that using DNSSEC is a Good Thing
  • 22. Where’s the killer app? • Not much software uses or needs DNSSEC today • Proof of concept web plug-ins mostly • DANE could/should be the driver • Lookup certificates and other crypto material from the DNS • IETF’s ACME WG standards coming to browsers Real Soon Now • Let’s Encrypt certificates as an alternative to ones issued by conventional CAs • DANE support emerging in MTAs
  • 23. Deployment Today - 1 • Most of the important TLDs are signed • Contractual requirement for new gTLDs • Some European ccTLDs have 70%+ signed delegations • Registrar discounts rather than DNSSEC enthusiasm • Very few of the busiest domain names are signed • Just paypal.com and nih.gov of the Alexa top 100 • The number of signed zones looks OK-ish quantitatively but not so good qualitatively
  • 24. Deployment Today - 2 • Validation uptake is a lot healthier • Around 15% of users world-wide depend on a validating resolver • See https://stats.labs.apnic.net/dnssec • Much of this is attributed to just three providers: • Comcast, google’s 8.8.8.8 and TeliaSonera • This is great, but are they validating anything that actually matters? • What are the other big ISPs doing?
  • 25. Externalities • For signers: • Why sign if almost nobody is thought to be validating? • What's the impact when/if someone else's validator fails? • For validators: • Why validate if hardly anyone important signs their zones? • When someone else's signer screws up, you end up taking the hit(s) for their mistake(s).What will the impact(s) be? • i.e.A rival ISP's customers have no problem getting to badlysigned.com because that ISP doesn't validate while your customers can't because we are validating
  • 26. Customer Support • Training & education for helpdesk/support staff • Ditto for customers • DNSSEC troubleshooting • N-th level support staff will need training • How to tell the difference between a Secure DNS validation error SERVFAIL and a regular SERVFAIL • How to troubleshoot validation problems and fix or escalate them • Expired signatures, key mismatches, etc.
  • 27. Documentation • Make sure everything gets properly documented: • Design/architecture, deployment plans & roadmap • Policies (e.g. key sizes, rotation, signing interval, audit, etc.) • Write a DNSSEC Policy/Practice Statement - DPS • RFC6841 is a good starting point • DPS for the root zone is an excellent template: •https://www.iana.org/dnssec/icann-dps.txt • Document DNSSEC tools and new processes • Produce white papers and use cases for stakeholders?
  • 28. Training • How will your staff get trained? • Knowledge transfer from in-house and external experts • Commercial training courses, webinars, etc. • Not just for your DNS team • Network operations & system administrators • Developers & helpdesk • Customer relations & support staff • Upper management
  • 29. The “Last Mile” Issue • AD header bit is set by the validating resolver • Vulnerable to spoofing by an attacker • Can the path between some stub resolver and its resolving server be trusted? • Windows uses IPsec to protect this • If the local net isn’t considered secure, run a validating resolver on the edge device itself • IETF’s DNS-over-TLS could be the answer
  • 30. Validator Crunch Time! • Major test is just around the corner • First ever rollover of root zone’s KSK due Real Soon Now • Validators which don’t support or use RFC5011 key rollover will almost certainly break • BIND configurations with trusted-keys{} statements • Old/clunky/buggy DNSSEC implementations • IANA’s giving plenty of advance warning • Nothing important should fail • Famous last words….
  • 31. Negative Trust Anchors • How to tell the validator that DNSSEC for some domain(s) are broken • Don't validate these domains for now, but carry on validating elsewhere • Provably insecure (and possibly bad) data might be better than nothing • Features in BIND and unbound to support this • A necessary evil - unfortunately • Workarounds for other people's mistakes
  • 32. DNSSEC Troubleshooting • Can be very painful • Debugging vanilla DNS problems is hard enough • DNSSEC makes things even harder • Checking DNSSEC-related RRtypes, keeping track of key IDs & flags, algorithm numbers, etc. • Tools are getting better, but still far too difficult for many DNS administrators • Error messages should be clearer:“you forgot to re-sign”, “that signature has the wrong hash value”,“there's no DS record for this KSK”, etc.
  • 33. drill • The best DNSSEC debugging tool by far • Also replicates dig’s commonly used functionality • Open source from NLnetLabs • Can illustrate validation in action • Shows which keys (algorithms & key lengths) are used • Work on a single signature or top-down from the root • Pinpoint stale keys & signatures • Identify DS record and KSK mismatches • drill -TD some-domain is just awesome!
  • 34. delv • ISC's answer to drill • Distributed in BIND9.10+ • Command-line options almost identical to dig • Not as chatty as drill • Use the +vtrace option to see the validations
  • 35. DNSVIZ • A web-based DNS visualisation tool • Draws nice pictures • Can display details of revoked keys • Visit dnsviz.net and type in your favourite signed domain name • Uses the web site's validating resolver, not yours • Doesn't check your validator's configuration • Can't check internal-only signed domains • Download DNSVIZ source code and run it locally?
  • 36. DNSVIZ Example • Hover over elements to see details of the key, algorithm, TTL, key tags, etc • Shaded elements are the KSKs • Double circle around the trust anchor: the root's KSK
  • 37. A Never Ending Task? • Keeping DNSSEC software and tools up-to-date • Can you rely on your vendor/supplier? • Crypto arms race • Changing DNSSEC keys regularly • Tweaking DNSSEC policies • Interactions with parent zone(s) • New operational problems and failure modes • Customer service/support and helpdesk issues