edu dnssec testbed - lessons learned

31
.edu DNSSEC Testbed Lessons Learned Becky Granger, EDUCAUSE Shumon Huque, University of Pennsylvania April 20, 2010

Upload: shumon-huque

Post on 23-Feb-2017

89 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: EDU DNSSEC Testbed - Lessons Learned

.edu DNSSEC Testbed Lessons Learned

Becky Granger, EDUCAUSEShumon Huque, University of Pennsylvania

April 20, 2010

Page 2: EDU DNSSEC Testbed - Lessons Learned

2

2

Agenda

.edu testbed – Overview– Registrant experience– Findings– Lessons learned

EDUCAUSE registrar application functionality

Getting started with DNSSEC– Implementing your own testbed– Recruiting testers– Managing the process

Page 3: EDU DNSSEC Testbed - Lessons Learned

3

3

.edu DNSSEC Testbed Goal & Objectives

Goal– Exercise DNSSEC registration and resolution in a

representative end-to-end test environment

Objectives– Demonstrate that all components function properly– Document where actual behavior differs from expected behavior– Obtain technical feedback from registrants– Inform future DNSSEC implementations in larger zones

Page 4: EDU DNSSEC Testbed - Lessons Learned

4

4

Testbed Landscape

Duration – 2 months

Active Participants – 12– VeriSign: operator of the .edu registry– EDUCAUSE: registrar for the .edu zone – Registrants: 10 volunteering domain name holders

– 7 universities– 3 regional networks

Page 5: EDU DNSSEC Testbed - Lessons Learned

5

5

High-Level ArchitectureTest environment was a reproduction of the .edu domain name space

Page 6: EDU DNSSEC Testbed - Lessons Learned

6

6

Registrant preparation for testbed

Deploy authoritative DNS servers with signed zones– Test servers and test zones okay– Some participants used signed production servers

Run “validating” resolvers– Configured to use testbed .edu servers as authoritative for .edu

top level domain

Page 7: EDU DNSSEC Testbed - Lessons Learned

7

7

Overview of some registrant tests

Confirm connectivity to testbed

Add DS records of various algorithms and digests

Remove DS records

Add incorrect DS records

View DS record history report

Perform key rollover operations and DS updates

At each test stage, perform verification tests with appropriately configured validating resolver

Validate records of other participants

Chris Klein
Removing the word " Attempt To "
Page 8: EDU DNSSEC Testbed - Lessons Learned

8

8

Current DNSSEC activity inside .edu

Signed subdomains directly under .edu– 7 total second level domains– berkeley.edu, merit.edu, penn.edu, psc.edu, upenn.edu,

internet2.edu, ucaid.edu

Signed zones further down– 58 more (as of Jan 2010)– 3rd level domains inside universities– Many are subdomains for computer science departments, or for

DNS research projects.

Data from SecSpider (http://secspider.cs.ucla.edu/)

Chris Klein
Are any of these subdomains able to be viewed publicly that a registrar would be able to see or are these zones completely hidden
Page 9: EDU DNSSEC Testbed - Lessons Learned

9

9

Testbed Findings

Page 10: EDU DNSSEC Testbed - Lessons Learned

10

10

Testbed Findings

Registrant to Registrar application– General satisfaction from registrants– Minor functionality and display alterations suggested

Registrar to Registry application– Successfully exercised info, delete, and update EPP commands– Discovered a limitation in RFC 4310, which prompted a new

RFC revision (draft-gould-rfc4310bis)– << Reference: http://tools.ietf.org/html/draft-gould-rfc4310bis-07

>>

Chris Klein
Can we footnote the actual source of this RFC.
Page 11: EDU DNSSEC Testbed - Lessons Learned

11

11

Testbed Findings

Zone updates– No issues identified; zones were updated correctly

Name Server resolution– Resolution worked correctly– Current version of BIND is needed for NSEC3

– << Versions to consider which are DNSSEC compatible are BIND 9.6.x >>

Chris Klein
Can we recommend the version of BIND that is used for this statement? - Is it
Page 12: EDU DNSSEC Testbed - Lessons Learned

12

12

Participant Survey Results

100% of testbed participants…– Agreed that the test cases were representative of the

functionality required for DNSSEC– Had a high confidence level about implementing DNSSEC

Most testers used BIND but other software packages worked too– 7 used BIND– 2 used ZKT– 1 used a DNSSEC signing appliance

Page 13: EDU DNSSEC Testbed - Lessons Learned

13

13

Participant Survey Results - Challenges

Developing a strong technical understanding of the end-to-end DNSSEC process

Lack of documentation and best practices for DNSSEC implementations

Timing, managing, and automating key rollovers

Troubleshooting validation failures

Page 14: EDU DNSSEC Testbed - Lessons Learned

14

14

Lessons Learned

Page 15: EDU DNSSEC Testbed - Lessons Learned

15

15

Lessons Learned - General

Learn, Live, Know the RFCs– RFC 4033 – DNSSEC introduction and requirements– RFC 4034 – Resource records for DNSSEC – RFC 4310 – DNSSEC mapping for EPP

– Also see revision draft-gould-rfc4310bis

– RFC 4641 – DNSSEC operational practices

Reference : http://tools.ietf.org

Brush up on DNS

Chris Klein
Changed the word "Love"...
Chris Klein
adding a reference to ietf.org
Page 16: EDU DNSSEC Testbed - Lessons Learned

16

16

Lessons Learned – <<Registrant>> Application

Validate << customer submitted data >>– Key Tag must be an integer between 1 and 65535– Algorithm must be an integer– Digest Type must be an integer– SHA-1 Digests must be a sequence of 40 hexadecimal digits– SHA-256 Digests must be a sequence of 64 hexadecimal digits

Dig to compare the entered DS data against the public key in the domain’s zone

Chris Klein
<< customer submitted data >>
Chris Klein
Becky - Isn't this the "Registrar application" for the customers
Page 17: EDU DNSSEC Testbed - Lessons Learned

17

17

Lessons Learned – <<Registrant>> Application

Remove whitespace automatically

Allow multiple Digests to have the same Key Tag

Consider automatically generating DS records– Allow upload of BIND DSSET file

or– Allow data entry of public key information

Chris Klein
Becky - Isn't this the "Registrar application" for customers?
Page 18: EDU DNSSEC Testbed - Lessons Learned

18

18

EDUCAUSE Registrar Application

Page 19: EDU DNSSEC Testbed - Lessons Learned

19

19

EDUCAUSE Registrar Application

Page 20: EDU DNSSEC Testbed - Lessons Learned

20

20

EDUCAUSE Registrar Application

Page 21: EDU DNSSEC Testbed - Lessons Learned

21

21

EDUCAUSE Registrar Application

Page 22: EDU DNSSEC Testbed - Lessons Learned

22

22

EDUCAUSE Registrar Application

Chris Klein
Becky - are you ok w/ leaving your email address on this page - you may get some calls from Registrars.
Page 23: EDU DNSSEC Testbed - Lessons Learned

23

23

EDUCAUSE Registrar Application

Page 24: EDU DNSSEC Testbed - Lessons Learned

24

24

EDUCAUSE Registrar Application

Page 25: EDU DNSSEC Testbed - Lessons Learned

25

25

Getting Started with DNSSEC

Page 26: EDU DNSSEC Testbed - Lessons Learned

26

26

Why Implement a DNSSEC Testbed?

Make sure *you* understand the intricacies of DNSSEC

Evaluate the user interface of your registrar application

Make sure your <<registrant>> application WORKS

Get your registrants involved

Build confidence throughout the community

Chris Klein
Is this the "registrar" application
Page 27: EDU DNSSEC Testbed - Lessons Learned

27

27

Recruiting Testers

Ask!

Include registrants with different technical ability

Include registrants using different software packages

Page 28: EDU DNSSEC Testbed - Lessons Learned

28

28

Managing Your Testbed

Create a set of tests for testers to perform– Specify expected results of each test and ask testers to note

where their results differed

Provide a way for testers to interact when they have questions

Provide a central location for tracking testing progress, noting inconsistencies, and making suggestions

Survey testers after testbed completion to gauge comfort with process and challenges faced

Page 29: EDU DNSSEC Testbed - Lessons Learned

29

29

Many Resources Available

Use VeriSign's DNSSEC OTE for .net and .com

Test the Registrar to Registry EPP interface– Leverage VeriSign’s EPP SDK & active EPP Tool– EPP SDK:

http://www.verisign.com/domain-name-services/current-registrars/epp-sdk/index.html

– EPP Tool: https://epptool-ctld.verisign-grs.com/epptool/

Test your signing and key management solution– Leverage VeriSign’s DNSSEC Tool Guide to evaluate signing

solutions– Engage with VeriSign’s DNSSEC Forum to ask your questions

and dialogue with technical colleagues– DNSSEC Forum: https://dnssecforum.verisign.com

Chris Klein
Adding url's for EPP SDK and EPP tool
Chris Klein
Adding Link to the DNSSEC Forum
Page 30: EDU DNSSEC Testbed - Lessons Learned

30

Q&A

Page 31: EDU DNSSEC Testbed - Lessons Learned

31

Thank YouQuestions?

Contact Becky Granger [email protected]