Towards Adoption of DNSSEC: Availability and Security Challenges

نویسندگان

  • Amir Herzberg
  • Haya Shulman
چکیده

DNSSEC deployment is long overdue; however, it seems to be finally taking off. Recent cache poisoning attacks motivate protecting DNS, with strong cryptography, rather than with challenge-response ‘defenses’. Our goal is to motivate and help correct DNSSEC deployment. We discuss the state of DNSSEC deployment, obstacles to adoption and potential ways to increase adoption. We then present a comprehensive overview of challenges and potential pitfalls of DNSSEC, well known and less known, including: • Vulnerable DNSSEC configurations: we present several DNSSEC configurations, which are natural and, based on the limited deployment so far, expected to be popular, yet are vulnerable to attack. This includes typical DNS inter-domain NS, MX and CNAME records, NSEC3 opt-out records. • Pitfalls of Incremental Deployment: we discuss the common practice of incremental deployment, and show that it may cause increased vulnerability to poisoning. • Super-sized Response Challenges: DNSSEC responses include cryptographic keys and hence are relatively long; we explain how this extra-long responses cause interoperability challenges, and can be abused for DoS and even DNS poisoning. We discuss potential solutions, ranging from using TCP for long responses (easy but costly and possibly even DoS-prone), to extensions to DNSSEC for secure agreement only on needed keying material.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure

We study the challenges of deploying DNSSEC on Domain Name System (DNS) name servers. DNSSEC, a defence mechanism for DNS, was designed to provide cryptographic assurance for DNS records against cache poisoning attacks. Although standardised more than 15 years ago, DNSSEC is still not widely deployed. Multiple efforts are focused on identifying deployment obstacles and it is generally believed ...

متن کامل

The Design of Metrics for Quantifying the DNSSEC Deployment

This paper examines the deployment of the DNS Security Extensions (DNSSEC), which adds cryptographic protection to DNS, one of the core components in the Internet infrastructure. We analyze the data collected from the initial DNSSEC deployment which started in 2005, and identify three critical metrics to gauge the deployment: availability, verifiability, and validity. Our results provide the fi...

متن کامل

Challenges and Opportunities In Deploying DNSSEC A progress report on an investigation into DNSSEC deployment

In the process of building a web portal[1] focused on providing real-world deployment information about DNS Security Extensions (DNSSEC), Internet Society staff identified a number of areas where DNSSEC deployment can be simplified for domain name holders, domain name infrastructure operators and domain name consumers (i.e. users of DNSSEC-signed domains). Some areas were predictably around the...

متن کامل

Economic Incentives on DNSSEC Deployment: Time to Move from Quantity to Quality

The security extensions to the DNS (DNSSEC) currently cover approximately 3% of all domains worldwide. In response to the low deployment of DNSSEC, a few top-level domains started offering ‘per-domain’ economic incentives to encourage adoption of the protocol by offering a yearly discount on each signed domain. However, it remains unclear whether these incentives are well-balanced and foster th...

متن کامل

Negotiating DNSSEC Algorithms over Legacy Proxies

To ensure best security and efficiency, cryptographic protocols should allow parties to negotiate the use of the ‘best’ cryptographic algorithms supported by the different parties; this is usually referred to as cipher-suite negotiation, and considered an essential feature of such protocols, e.g., TLS and IPsec. However, such negotiation is absent from protocols designed for distribution of cry...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013