Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Speaker Deck
PRO
Sign in
Sign up
for free
DNSSEC and Bind
Chinmay Pendharkar
May 21, 2014
Technology
1
81
DNSSEC and Bind
Basics of DNS and DNSSEC. Setting up Bind locally.
Chinmay Pendharkar
May 21, 2014
Tweet
Share
More Decks by Chinmay Pendharkar
See All by Chinmay Pendharkar
notthetup
0
25
notthetup
0
17
notthetup
0
42
notthetup
0
15
notthetup
0
49
notthetup
2
100
notthetup
0
68
notthetup
0
99
notthetup
0
16
Other Decks in Technology
See All in Technology
clustervr
0
140
buildersbox
0
190
lancers_pr
4
1.4k
mii3king
0
420
mmarukaw
0
1.9k
karabish
0
210
futo23
1
280
miyakemito
1
570
tnmt
2
200
yoku0825
PRO
3
120
binarymist
0
1.3k
grapecity_dev
0
130
Featured
See All Featured
lynnandtonic
272
16k
brettharned
93
3k
denniskardys
219
120k
scottboms
251
11k
keithpitt
401
20k
3n
163
22k
mojombo
358
62k
tammielis
237
23k
lara
590
61k
caitiem20
308
17k
holman
448
130k
maltzj
501
36k
Transcript
DNSSEC + Bind Chinmay Pendharkar
Disclaimer - Crypto Noob! - Developer ==> Please correct me
if I’m wrong!
What shall we talk about? - DNS - DNSSEC
What is DNS? - Domain Name System - Translate URLs
to IP Addresses (and more) www.google.com => 74.125.135.147
Why? Humans like letter addresses (URLs) - www.google.com Computers prefers
numbers - 74.125.135.147
How does it work?
No really... - UDP - User Datagram Protocol (mostly) -
Me - Q: “What’s the IP for www.google.com” - DNS - A: “74.125.135.147”
In Action
Actual Response
Who is this DNS you speak of?
Nameservers!
Iterative query + Caching
Everything is AWESOME! NOT SO FAST!!!
DNS has issues. - No guarantee that you’re talking to
a authentic name server - Me - Q: “What’s the IP for www.google.com” - Evil ISP Server - A: 1.0.0.1
How? Send a request generally in the direction of the
assigned DNS name server. Anyone in between can respond to that query!!
DNS has more issues DNS Responses can be tampered with
in flight. - Me - Q: “What’s the IP for www.google.com” - DNS Nameserver - A: “74.125.135.147” - Evil ISP Server - A: “74.125.135.148”
DNSSEC to the Rescue Domain Name System Security Extensions “provide
origin authentication, authenticated denial of existence, and data integrity”
But how?? “digitally signing records for DNS lookup using public-key
cryptography” “authenticated via a chain of trust” “you trust the root, then use the root to verify the rest of the chain”
None
Example Requesting IP of bursar.university.edu
Setup for Domain owners. - generate own public/private key pair.
- upload public key to registrar, - registrar pushes the keys via secDNS to the zone operator (e.g.: Verisign for .com) - zone operator signs and publishes them in DNS.
What if my registrar/root doesn’t DNSSEC? - DNSSEC Lookaside Validation
- Internet Systems Consortium DLV Registry. - an additional entry point (besides the root zone) to obtain DNSSEC validation information
How can I use this stuff? We need. 1. A
Name server that speaks DNSSEC 2. All clients speak DNSSEC
#2
What can we do? Run our own Name server!
But but but... HTTP Stack -> Local Name server (DNS)
Local Name server Server -> DNS (DNSSEC)
Introducing... BIND - Berkeley Internet Name Domain - Default Name
server software used by many
Get bound? http://www.bind9.net/ Your favourite package manager should have it
apt-get bind9; pacman -S bind9 port install bind9
Configure bind - Linux : http://haller.ws/projects/bind/dnssec/ - OSX: https://gist.github. com/notthetup/5381693
- Win: http://alex.charrett.com/bind-on-windows
What are we doing? - Generate and verify DNSSEC root
key - Generate and verify DLV key - Add the keys into bind configuration - Enable DNSSEC in bind configuration dnssec-enable yes; dnssec-validation yes; dnssec-lookaside "." trust-anchor dlv.isc.org.;
Setup Bind Make sure it only listens to YOU! listen-on
{ 127.0.0.1; }; Run Bind as a Daemon. sudo launchctl load -w /System/Library/LaunchDaemons/org.isc.named.plist
Use Bind Use Bind as your default DNS Server instead.
Now you can haz DNSSEC
Has it worked out? - No noticeable delay in queries.
- No noticeable increase in CPU usage. - Rare domains don’t work (yimg/yahoo WTH??)
Go get your DNS SEC today!