Goals of this workshop

- Promote awareness of DNSSEC at the commerce and policy level
- Build technical capacity on DNSSEC, allowing participants to
  understand DNSSEC technology, acquire hands-on experience, and
  plan for deployment

Target audience:

* Technical workshop:

- Technical Staff
- Registrars/ISPs, DNS administrators

* Awareness:

Internet Community:
- ISPs, Telcos, Network Operators
- Registry stakeholders, registrars
- Academic Institutions, Government Agencies
- Security Officers, CFOs

CONTENTS:

* Day 1, morning: DNSSEC Awareness

1. Problems with DNS
- DNS threats (poisoning, hijacking)
- What is DNSSEC, and what does it solve ?
- DNSSEC: part of a multi-layered defense (SSL, ...)
- Actors in a DNSSEC world (registries, registrars, users, administrators, ...)
- State of DNSSEC deployment, future directions

2.

* Day 1, afternoon:

1. DNSSEC tech tutorial (see abstract)

2. DNS refreshers/reminders
	- Zone reminders, record 
    - Query resolution
    - Resource Record Sets

3. Security weaknesses in the DNS
	- Kaminsky attack (more tech details)

4. What does DNSSEC solve / NOT solve
    - Authentication, not encryption
	- Other points of attack - garbage in, garbage out
		- Compromised registry, SQL injections...

5. What does it take to sign a zone
	- Fairly easy, in fact...
	- Demo signing, resolving


* Day 2:

1. Hands-on (using BIND, NSD, Unbound and OpenDNSSEC)

    Authoritative:

    - A signed zone
    - Key generation
    - Signing and re-signing
    - Child delegeation, DS
    - NSEC3, opt-out

    Validation:

    - Validation and trust anchors
    - What happens when data is altered ?
    - RFC5011

    Rollover:

    - KSK and ZSK rollovers
    - methods (pre-generate, double-sign, pre-publish)

    HSMs and security perception

2. Operational aspects

    - Key management, key rollover, and signature validity
    - Re-signing - DNS becomes fragile
    - Policies and risk assessment
    - DS management, R<->R interaction, (RFC 5910)
	- Redelegation of signed zones
    - Dependency on external parties

* Day 3:

- Integrating DNSSEC in the production chain

    - End-to-end production control
    - Sign: yes, but are we signing the right data ?

- Tips:
	- Consider incremental deployment (e.g.: DURZ)
	- Write a DNSSEC Policy/Practice Statement (DPS)

- DNSSEC and the last mile (stub resolvers, local validation), TSIG

- Q&A session, discuss participants' setups

- Interaction of DNSSEC validation on application
	- DNSSEC validated != secure
	- TLS, Domain Keys, DKIM, ...

Last modified 8 years ago Last modified on May 15, 2011, 2:46:33 AM