34
DNSSEC for the Root Zone MENOG 6 Riyadh , Saudi Arabia April 2010 Mehmet Akc cin, ICANN Thursday, April 8, 2010

Rootsign menog6-overview

Embed Size (px)

Citation preview

Page 1: Rootsign menog6-overview

DNSSECfor the Root Zone

MENOG 6 Riyadh , Saudi ArabiaApril 2010

Mehmet Akcin, ICANNMehmet Akcin, ICANN

Thursday, April 8, 2010

Page 2: Rootsign menog6-overview

This design is the result of a cooperation between ICANN & VeriSign withsupport from the U.S. DoC NTIA

Thursday, April 8, 2010

Page 3: Rootsign menog6-overview

Roles and Responsibilities

Thursday, April 8, 2010

Page 4: Rootsign menog6-overview

ICANNIANA Functions Operator

• Manages the Key Signing Key (KSK)

• Accepts DS records from TLD operators

• Verifies and processes request

• Sends update requests to DoC for authorization and to VeriSign for implementation

Thursday, April 8, 2010

Page 5: Rootsign menog6-overview

DoC NTIAU.S. Department of Commerce

National Telecommunications and Information Administration

• Authorizes changes to the root zone

‣ DS records

‣ Key Signing Keys

‣ DNSSEC update requests follow the same process as other changes

• Checks that ICANN has followed their agreed upon verification/processing policies and procedures

Thursday, April 8, 2010

Page 6: Rootsign menog6-overview

VeriSignRoot Zone Maintainer

• Manages the Zone Signing Key (ZSK)

• Incorporates NTIA-authorized changes

• Signs the root zone with the ZSK

• Distributes the signed zone to the root server operators

Thursday, April 8, 2010

Page 7: Rootsign menog6-overview

ICANN VeriSign

DoCRZM SignerTLDOperator Signed root

KSK Management

DNS records sent fromTLD operator to ICANN

Verified datasent to DoC

Authorized datasent to VeriSign

ZSK sent from VeriSign to ICANN

Root Zonedistributed toroot servers

ZSK Management

Root Servers

KSK publishedby ICANN

Keyset is signed by KSK and sent back from ICANN to VeriSign

Unsigned root

Thursday, April 8, 2010

Page 8: Rootsign menog6-overview

Deployment

Thursday, April 8, 2010

Page 9: Rootsign menog6-overview

Goals

• Deploy a signed root zone

‣ Transparent processes

‣ Audited procedures

‣ DNSSEC deployment

• validators, registries, registrars, name server operators

• Communicate early and often!

Thursday, April 8, 2010

Page 10: Rootsign menog6-overview

Anticipated Issues

Thursday, April 8, 2010

Page 11: Rootsign menog6-overview

DO=1

• A significant proportion of DNS clients send queries with EDNS0 and DO=1

• Some (largely unquantified, but potentially significant) population of such clients are unable to receive large responses

• Serving signed responses might break those clients

Thursday, April 8, 2010

Page 12: Rootsign menog6-overview

Rollback

• If we sign the root, there will be some early validator deployment

• There is the potential for some clients to break, perhaps badly enough that we need to un-sign the root (e.g., see previous slide)

• Un-signing the root will break the DNS for validators

Thursday, April 8, 2010

Page 13: Rootsign menog6-overview

Staged Deployment

Thursday, April 8, 2010

Page 14: Rootsign menog6-overview

Deploy Incrementally

• The goal is to leave the client population with some root servers not offering large responses until the impact of those large responses is better understood

• Relies upon resolvers not always choosing a single server

Thursday, April 8, 2010

Page 15: Rootsign menog6-overview

DURZ

• Deploy conservatively

‣ It is the root zone, after all

• Prevent a community of validators from forming

‣ This allows us to unsign the root zone during the deployment phase (if we have) to without collateral damage

Thursday, April 8, 2010

Page 16: Rootsign menog6-overview

DURZ

• “Deliberately Unvalidatable Root Zone”

• Sign RRSets with keys that are not published in the zone (but with matching keytag…)

• Publish keys in the zone which are not used, and which additionally contain advice for operators (see next slide)

• Swap in actual signing keys (which enables validation) at the end of the deployment process

Thursday, April 8, 2010

Page 17: Rootsign menog6-overview

DURZ

.       3600    IN     DNSKEY  257  3  5 (                       AwEAAa++++++++++++++++++++++++++++++                       ++THIS/KEY/AN/INVALID/KEY/AND/SHOULD                       /NOT/BE/USED/CONTACT/ROOTSIGN/AT/ICA                       NN/DOT/ORG/FOR/MORE/INFORMATION+++++                       ++++++++++++++++++++++++++++++++++++                       ++++++++++++++++++++++++++++++++++++                       ++++++++++++++++++++++++++++++++++++                       ++++++++++++++++++++++++++++++++++++                       ++++++++++++++++++++++++++++++++++++                       ++++++++++++++++++++++/=                       ) ; Key ID = 6477

Thursday, April 8, 2010

Page 18: Rootsign menog6-overview

Deploy IncrementallyL Completed on 27 January

A Completed on 10 February

M, I Completed on 3 March

D, K, E Completed March 22nd

B, H, C, G, F Being Completed this week. “April 14th”

J May 5th

Thursday, April 8, 2010

Page 19: Rootsign menog6-overview

Measurement

• For those root servers that are instrumented, full packet captures and subsequent analysis around signing events

• Ongoing dialogue with operator communities to assess real-world impact of changes

Thursday, April 8, 2010

Page 20: Rootsign menog6-overview

Testing

• A prerequisite for this proposal is a captive test of the deployment

‣ Test widely-deployed resolvers, with validation enabled and disabled, against the DURZ

‣ Test with clients behind broken networks that drop large responses

Thursday, April 8, 2010

Page 21: Rootsign menog6-overview

Interaction with TLDs

Thursday, April 8, 2010

Page 22: Rootsign menog6-overview

DS Change Requests

• Approach likely to be based on existing methods for TLD managers to request changes in root zone

• Anticipate being able to accept DS requests 1-2 months before the validatable signed root zone is in production

• Current topic of discussion within Root DNSSEC Design Team

Thursday, April 8, 2010

Page 23: Rootsign menog6-overview

Communication

Thursday, April 8, 2010

Page 24: Rootsign menog6-overview

Project Web Page

• http://www.root-dnssec.org

‣ Status updates

‣ Documents

‣ Presentation Archive

‣ Small collection of links to relevant tools

‣ Contact information

‣ RSS

Thursday, April 8, 2010

Page 25: Rootsign menog6-overview

Communicationwith non-technical audiences

• Will reach the non-technical and semi-technical audiences with press releases and other means.

• PR departments with people who know how to do this will be engaged.

Thursday, April 8, 2010

Page 26: Rootsign menog6-overview

Communicationwith technical audiences

• Reaching the technical audiences via mailing lists and other means

‣ IETF DNS lists (e.g. DNSOP)

‣ non-IETF DNS lists (e.g. DNS-OARC)

‣ General operator lists (e.g. MENOG)

‣ …

Thursday, April 8, 2010

Page 27: Rootsign menog6-overview

Draft Timeline• December 1, 2009

‣ Root zone signed

• Initially signed zone stays internal to ICANN and VeriSign

‣ ICANN and VeriSign begin KSR processing

• ZSK and KSK rolls

• January - July 2010

‣ Incremental roll out of signed root

• July 1, 2010

‣ KSK rolled and trust anchor published

‣ Signed root fully deployed

Thursday, April 8, 2010

Page 28: Rootsign menog6-overview

Deployment Status13 April 2010

Thursday, April 8, 2010

Page 29: Rootsign menog6-overview

Documentation

• Requirements document posted

• High-Level Architecture, Policy and Practice Statements, Trust Anchor Publication, Deployment documents posted in draft form

• Ceremony, KSK Facility Requirements, Testing documents expected to be posted soon

http://www.root-dnssec.org

Thursday, April 8, 2010

Page 30: Rootsign menog6-overview

Testing

• Data collection testing by Root Server Operators complete - have now done this for real

• Several KSR/SKR exchanges complete

• DURZ vs. Resolver testing complete

Thursday, April 8, 2010

Page 31: Rootsign menog6-overview

DURZ Roll-Out

• L, A, M, I, D, K, and E root servers are running the DURZ

• B C G F and H will complete the transition this week.

• J will have DURZ on 5 May 2010

Thursday, April 8, 2010

Page 32: Rootsign menog6-overview

Other zones

ARPA is now signed

Work on how to sign IN-ADDR.ARPA, IP6.ARPA is happening and reasonable progress

is expected.

Thursday, April 8, 2010

Page 33: Rootsign menog6-overview

Thoughts?

• Feedback is extremely welcome

‣ Email to [email protected]

Thursday, April 8, 2010

Page 34: Rootsign menog6-overview

Root DNSSEC Design Team

Joe AbleyMehmet AkcinDavid BlackaDavid ConradRichard LambMatt Larson

Fredrik LjunggrenDave Knight

Tomofumi OkuboJakob SchlyterDuane Wessels

Thursday, April 8, 2010