310 likes | 330 Views
Explore the findings, lessons learned, and best practices from the .edu DNSSEC Testbed to improve DNSSEC implementation. Understand the test environment, participant feedback, and challenges faced to enhance registrar and registrant applications. Benefit from high-level architecture insights and discover effective strategies for managing DNSSEC processes.
E N D
.edu DNSSEC Testbed Lessons Learned Becky Granger, EDUCAUSE Shumon Huque,University of Pennsylvania April 20, 2010
Agenda • .edu testbed • Overview • Registrant experience • Findings • Lessons learned • EDUCAUSE registrar application functionality • Getting started with DNSSEC • Implementing your own testbed • Recruiting testers • Managing the process
.edu DNSSEC Testbed Goal & Objectives • Goal • Exercise DNSSEC registration and resolution in a representative end-to-end test environment • Objectives • Demonstrate that all components function properly • Document where actual behavior differs from expected behavior • Obtain technical feedback from registrants • Inform future DNSSEC implementations in larger zones
Testbed Landscape • Duration – 2 months • Active Participants – 12 • VeriSign: operator of the .edu registry • EDUCAUSE: registrar for the .edu zone • Registrants: 10 volunteering domain name holders • 7 universities • 3 regional networks
High-Level Architecture Test environment was a reproduction of the .edu domain name space
Registrant preparation for testbed • Deploy authoritative DNS servers with signed zones • Test servers and test zones okay • Some participants used signed production servers • Run “validating” resolvers • Configured to use testbed .edu servers as authoritative for .edu top level domain
Overview of some registrant tests • Confirm connectivity to testbed • Add DS records of various algorithms and digests • Remove DS records • Add incorrect DS records • View DS record history report • Perform key rollover operations and DS updates • At each test stage, perform verification tests with appropriately configured validating resolver • Attempt to validate records of other participants also
Current DNSSEC activity inside .edu • Signed subdomains directly under .edu • 7 total second level domains • berkeley.edu, merit.edu, penn.edu, psc.edu, upenn.edu, internet2.edu, ucaid.edu • Signed zones further down • 58 more (as of Jan 2010) • 3rd level domains inside universities • Many are subdomains for computer science departments, or for DNS research projects. Data from SecSpider (http://secspider.cs.ucla.edu/)
Testbed Findings • Registrant to Registrar application • General satisfaction from registrants • Minor functionality and display alterations suggested • Registrar to Registry application • Successfully exercised info, delete, and update EPP commands • Discovered a limitation in RFC 4310, which prompted a new RFC revision (draft-gould-rfc4310bis)
Testbed Findings • Zone updates • No issues identified; zones were updated correctly • Name Server resolution • Resolution worked correctly • Current version of BIND is needed for NSEC3
Participant Survey Results • 100% of testbed participants… • Agreed that the test cases were representative of the functionality required for DNSSEC • Had a high confidence level about implementing DNSSEC • Most testers used BIND but other software packages worked too • 7 used BIND • 2 used ZKT • 1 used a DNSSEC signing appliance
Participant Survey Results - Challenges • Developing a strong technical understanding of the end-to-end DNSSEC process • Lack of documentation and best practices for DNSSEC implementations • Timing, managing, and automating key rollovers • Troubleshooting validation failures
Lessons Learned - General • Learn, Live, Love the RFCs • RFC 4033 – DNSSEC introduction and requirements • RFC 4034 – Resource records for DNSSEC • RFC 4310 – DNSSEC mapping for EPP • Also see revision draft-gould-rfc4310bis • RFC 4641 – DNSSEC operational practices • Brush up on DNS
Lessons Learned – Registrant Application • Validate everything • Key Tag must be an integer between 1 and 65535 • Algorithm must be an integer • Digest Type must be an integer • SHA-1 Digests must be a sequence of 40 hexadecimal digits • SHA-256 Digests must be a sequence of 64 hexadecimal digits • Dig to compare the entered DS data against the public key in the domain’s zone
Lessons Learned – Registrant Application • Remove whitespace automatically • Allow multiple Digests to have the same Key Tag • Consider automatically generating DS records • Allow upload of BIND DSSET file or • Allow data entry of public key information
Why Implement a DNSSEC Testbed? • Make sure *you* understand the intricacies of DNSSEC • Evaluate the user interface of your registrar application • Make sure your registrant application WORKS • Get your registrants involved • Build confidence throughout the community
Recruiting Testers • Ask! • Include registrants with different technical ability • Include registrants using different software packages
Managing Your Testbed • Create a set of tests for testers to perform • Specify expected results of each test and ask testers to note where their results differed • Provide a way for testers to interact when they have questions • Provide a central location for tracking testing progress, noting inconsistencies, and making suggestions • Survey testers after testbed completion to gauge comfort with process and challenges faced
Many Resources Available • Use VeriSign's DNSSEC OTE for .net and .com • Test the Registrar to Registry EPP interface • Leverage VeriSign’s EPP SDK & active EPP Tool • Test your signing and key management solution • Leverage VeriSign’s DNSSEC Tool Guide to evaluate signing solutions • Engage with VeriSign’s DNSSEC Forum to ask your questions and dialogue with technical colleagues
Questions? Contact Becky Granger at rgranger@educause.edu