Goals of this workshop - Promote awareness of DNSSEC at the commerce and policy level - Build technical capacity on DNSSEC, allowing participants to understand DNSSEC technology, acquire hands-on experience, and plan for deployment Target audience: * Technical workshop: - Technical Staff - Registrars/ISPs, DNS administrators * Awareness: Internet Community: - ISPs, Telcos, Network Operators - Registry stakeholders, registrars - Academic Institutions, Government Agencies - Security Officers, CFOs CONTENTS: * Day 1, morning: DNSSEC Awareness 1. Problems with DNS - DNS threats (poisoning, hijacking) - What is DNSSEC, and what does it solve ? - DNSSEC: part of a multi-layered defense (SSL, ...) - Actors in a DNSSEC world (registries, registrars, users, administrators, ...) - State of DNSSEC deployment, future directions 2. * Day 1, afternoon: 1. DNSSEC tech tutorial (see abstract) 2. DNS refreshers/reminders - Zone reminders, record - Query resolution - Resource Record Sets 3. Security weaknesses in the DNS - Kaminsky attack (more tech details) 4. What does DNSSEC solve / NOT solve - Authentication, not encryption - Other points of attack - garbage in, garbage out - Compromised registry, SQL injections... 5. What does it take to sign a zone - Fairly easy, in fact... - Demo signing, resolving * Day 2: 1. Hands-on (using BIND, NSD, Unbound and OpenDNSSEC) Authoritative: - A signed zone - Key generation - Signing and re-signing - Child delegeation, DS - NSEC3, opt-out Validation: - Validation and trust anchors - What happens when data is altered ? - RFC5011 Rollover: - KSK and ZSK rollovers - methods (pre-generate, double-sign, pre-publish) HSMs and security perception 2. Operational aspects - Key management, key rollover, and signature validity - Re-signing - DNS becomes fragile - Policies and risk assessment - DS management, R<->R interaction, (RFC 5910) - Redelegation of signed zones - Dependency on external parties * Day 3: - Integrating DNSSEC in the production chain - End-to-end production control - Sign: yes, but are we signing the right data ? - Tips: - Consider incremental deployment (e.g.: DURZ) - Write a DNSSEC Policy/Practice Statement (DPS) - DNSSEC and the last mile (stub resolvers, local validation), TSIG - Q&A session, discuss participants' setups - Interaction of DNSSEC validation on application - DNSSEC validated != secure - TLS, Domain Keys, DKIM, ...
Last modified 8 years ago
Last modified on May 15, 2011, 2:46:33 AM