190 likes | 200 Views
Internet Identity For All. .my DNSSEC Experience Yong Yaw Eng Sr. Software & Application Engineer (DNSSEC Project Leader) 1 st November 2010 Amman, Jordan. Agenda. myDNSSEC Status Some implementation considerations What’s Next?. myDNSSEC Status. .my DNSSEC Implementation Stages.
E N D
Internet Identity For All .my DNSSEC Experience Yong Yaw Eng Sr. Software & Application Engineer (DNSSEC Project Leader) 1st November 2010Amman, Jordan
Agenda • myDNSSEC Status • Some implementation considerations • What’s Next?
Deployment to Production Activities • Deployed Back-end DNSSEC Support on 9th Oct 2010 • Primary NS: Upgrade BIND to version 9.7 (to support RSASHA256 with NSEC3) • Configure servers to ensure that zone file can be retrieved and signed (in the hidden NS) before transferring to Primary name servers • Ensure keys generated from the Keygen server can generate and pass the key to the Hidden NS (signer)
Deployment to Production Activities • Also complete TSIG implementation for secondary NS on 10-Oct 2010. • Other than locally hosted secondary NS, the secondary servers at cuhk.edu.hk, nic.fr and iij.ad.jp responded in a timely fashion. • Similarly, enabled DNSSEC when we requested so. • Only uu.net did not respond to the request for both TSIG and DNSSEC.
Network Architecture before DNSSEC Database Plain zone Copied by script located on ns Hidden NS Plain zone Registry Web Application Sent via zone transfer dns1.mynic.net.my(Primary) dns.mynic.net.my(Primary) Secondary Name Servers
Network Architecture with DNSSEC Database KSK / ZSK Secure connection Plain zone Dsset File Sent by script located on keygen Copied by script located on ns Hidden NS Key Generator & Signer Signed zone Registry Web Application Sent via zone transfer TSIG TSIG dns1.mynic.net.my(Primary) dns.mynic.net.my(Primary) Secondary Name Servers
Deployment to Production Activities (cont’) • Deployed Front-end Application on 18th Oct 2010 • Deployed Registry System enhanced with DNSSEC: • Enable / Disable DNSSEC • Load / Update DS Records • Domain name DS Record properly generated from the database • Signed zone files contain the DS records and zones can be validated
* This uses our own recursive server with .my as the trust anchor, since .my DS Records have yet to be submitted to IANA
1. If DNSSEC NOT being managed well • Some level of fear that DNSSEC would disrupt how current DNS works (includes loss of service due to expired signature) • Since the DNSSEC enhancement design is able to: • Get DS Record digest by converting DNSKEY RR • Get the signature expiry of the zone • The following flow chart attempt to address the issue of zone being bogus when DNSSEC is not manage well
Flow chart of expiry checking mechanism Start Load / Update Keys Enable DNSSEC Keys in database to be included in zone files First Check Signature Expiring in: 7 days (first check) / 1 day (second check)? Second Check No Update new expiry No Yes Expiry extended (re-signing was done)? Key tags changed? Yes Yes No Send Email notice that signature expiring in 7 days (first check) /1 day (second check) After First Check Set all key status to Unpublished End After Second Check
2. Modification of Name Server • Disallow Name Server Modification when DNSSEC is enabled • To prevent the DS Record to be loaded IF new NS is without DNSSEC • At the very least, it is a reminder to the Technical Contact that DNSSEC is Enabled • DNSSEC need to be disabled before any change of NS can occur
3. No Transfer of DNSSEC • To transfer DNSSEC maybe tricky and very much dependent on the domain owner • A straight forward way is to “NOT transfer DNSSEC” • By default, New Registrant’s will start without DNSSEC (i.e. no DS Record will be included) • The “new” Technical Contact need to enable DNSSEC and load the DS Records again
Tasks At Hand… • Pending submission of DS Records to IANA. Obstacle: • uu.net (secondary name server operator) have not responded to the request to enable DNSSEC, therefore, • Submitted a request to IANA to remove the secondary NS. Still pending removal of that NS from IANA records before a new form can be submitted • To replace uu.net as the secondary NS, we are now in progress in getting ISC to host our secondary NS
Tasks Ahead… • Continue to engage with the public by organizing a DNSSEC training, and publicly announce that DNSSEC is ready by December • Further pursue ISPs to enable DNSSEC so that validation is done at the recursive server