{"id":1938,"date":"2015-09-22T15:21:22","date_gmt":"2015-09-22T14:21:22","guid":{"rendered":"http:\/\/blogs-new.it.ox.ac.uk\/networks\/?p=1938"},"modified":"2015-09-24T11:40:01","modified_gmt":"2015-09-24T10:40:01","slug":"dns-resolvers-dnssec","status":"publish","type":"post","link":"https:\/\/blogs-new.it.ox.ac.uk\/networks\/2015\/09\/22\/dns-resolvers-dnssec\/","title":{"rendered":"DNS Resolvers &#8211; DNSSEC"},"content":{"rendered":"<p>\nWe are approaching deployment of a new fleet of DNS resolvers and there are a few questions that we would like feedback from the wider ITSS community. Specifically this post is broaching the subject of DNSSEC. Just to be clear, this is nothing to do with securing and signing our own zones (ox.ac.uk being but an example), but rather whether we will request and validate signed responses from zones who have already implemented DNSSEC. I have views and opinions on this matter, but I will put them to one side and offer an untainted exposition. If my bias creeps through then I apologize.\n<\/p>\n<p>\nOn the subject of comments, whereas I welcomed comments in my previous blog posts, I actively encourage it here. A dialogue would be nice in an informal channel and will hopefully help us reach a consensus. The informal place is because ultimately, you are free to do whatever you like with the validation data; this is only to decide the central resolvers&#8217; default behaviour.\n<\/p>\n<h2>What is DNSSEC?<\/h2>\n<p>\nHopefully you are already aware of what DNSSEC does, and possibly how it achieves it. There are some <a href=\"https:\/\/www.isc.org\/downloads\/bind\/dnssec\/\" title=\"DNSSEC and BIND\">good guides<\/a> <a href=\"http:\/\/www.dnssec.net\/\" title=\"DNSSEC website\">already online<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Domain_Name_System_Security_Extensions\" title=\"Wikipedia article on DNSSEC\">explaining DNSSEC<\/a>. In essence, before DNSSEC, you had to take it on trust that the reply you received for a DNS query was valid. In some sense, nothing has changed, you are still trusting that the DNS resolvers are correctly validating any responses received (by default, you are free to replicate the validation yourself). However, you can now be sure that if you want www.cam.ac.uk to resolve to an IP address, with DNSSEC requested (via something called an AD bit), any validated response will either be the correct answer, or will fail (NXDOMAIN).\n<\/p>\n<h2>Does this decision affect me?<\/h2>\n<dl>\n<dt>I am running my own resolver \/ am not using the central resolvers<\/dt>\n<dd>No<\/dd>\n<dt>I&#8217;m running a stub resolver and am using the central resolvers as a forwarder<\/dt>\n<dd>Potentially<\/dd>\n<dt>I&#8217;m running a stub resolver and validating my own queries<\/dt>\n<dd>No<\/dd>\n<dt>I&#8217;m running a laptop plugged into eduroam and am using the DNS resolvers provided by DHCP<\/dt>\n<dd>Potentially<\/dd>\n<dt>I&#8217;m running a laptop connected to OWL and have authenticated as a guest<\/dt>\n<dd>You shouldn&#8217;t be a member of the University and connected to OWL, but in any case no.<\/dd>\n<\/dl>\n<h2>Why is it good?<\/h2>\n<p>\nThis subheading is almost redundant as it should be fairly clear what the benefits of DNSSEC are. Any request for a record in a signed zone will always be relied upon to be correct (unless there has been a SIG key breach or some other disaster.) This means that problems in the past, like cache poisoning are just that; problems of the past. If you want to ensure that a hostname resolves to an IP address with confidence that no man-in-the-middle has tampered with any response, then there really is no other tool available, it&#8217;s DNSSEC or nothing.\n<\/p>\n<h2>Why is it not so good?<\/h2>\n<ol>\n<li>There is additional complexity. For us to deploy resolvers that validate records, it&#8217;s just a simple configuration option. However, for those zones that are signed, the ease at which you can make every record you serve an NX (aka Not found) is alarming. Since I have worked here, one organization has gone completely dark to the outside for validating resolvers due to key mismatches, and another due to TTLs on expired keys. Any records would have resolved on any resolvers which didn&#8217;t do validation.<\/li>\n<li>Not every zone is signed. This really shouldn&#8217;t affect our decision since unsigned zones work fine whatever we decide, but there is the next point to consider<\/li>\n<li>Validating zones and records adds complexity to a resolver. We use BIND and the <a href=\"https:\/\/kb.isc.org\/article\/AA-00913\/0\/BIND-9-Security-Vulnerability-Matrix.html\" title=\"BIND 9 Security Vulnerability Matrix\">list of recent vulnerabilities<\/a> shows that a not insignificant number of them are related to DNSSEC. Some have not affected us as we do not currently do any validation.<\/li>\n<li>Your opinion may vary on this, but most important information on the internet is signed by other means already. Windows and Linux updates are almost without exception signed by an organization (perhaps some viruses don&#8217;t) and websites employ SSL to secure web communication. If you are concerned with the efficacy of SSL in general, then conceptually DNSSEC is no different; if a zone is compromised, then it&#8217;s compromised in all the sub-zones.<\/li>\n<\/ol>\n<h2>I disagree with the decision of validating\/not validating on the new resolvers! What can I do?<\/h2>\n<p>\nDNSSEC is supposed to be completely backwards compatible with existing infrastructure. I know of one unit that is validating all records while using the existing central resolvers as forwarders (as a point of information, it was this unit that led to the discovery of the TTL expiry NXDOMAIN problem. Most requests for this organization were being resolved fine as we weren&#8217;t validating!)\n<\/p>\n<p>\nSo, whatever the final outcome, there is nothing stopping anyone from running a STUB resolver that either asks to remove signing responsibility from the central resolvers (via the CD flag) or by requesting the extra DNSSEC records (via the DO flag). However, whatever is decided will be used for eduroam and unless you wish to configure individual clients, there will be no provision to change this.\n<\/p>\n<h2>Conclusion<\/h2>\n<p>\nIn some sense, there is not yet any conclusion. If you wish to ask me to expand on any point, of if I have neglected anything, then please write a comment below. The benefits are obvious, but hopefully this article lists some concerns that should at least be acknowledged if we are to validate zones by default.\n<\/p>\n<h2>Updates<\/h2>\n<p>Following are reponses to emails received:<\/p>\n<blockquote><p>Could you elaborate on the potential issues for someone running a laptop plugged into eduroam and am using the DNS resolvers provided by DHCP &#8211; that would probably account for two-thirds or more of the folk here these days.<\/p><\/blockquote>\n<p>The potential issues are exactly the same as outlined above, but for users connected to eduroam. These are the problems of mismatched keys and BIND vulnerabilities resulting in outages.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are approaching deployment of a new fleet of DNS resolvers and there are a few questions that we would like feedback from the wider ITSS community. Specifically this post is broaching the subject of DNSSEC. Just to be clear, &hellip; <a href=\"https:\/\/blogs-new.it.ox.ac.uk\/networks\/2015\/09\/22\/dns-resolvers-dnssec\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":136,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[450],"tags":[],"class_list":["post-1938","post","type-post","status-publish","format-standard","hentry","category-dns"],"_links":{"self":[{"href":"https:\/\/blogs-new.it.ox.ac.uk\/networks\/wp-json\/wp\/v2\/posts\/1938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs-new.it.ox.ac.uk\/networks\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs-new.it.ox.ac.uk\/networks\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs-new.it.ox.ac.uk\/networks\/wp-json\/wp\/v2\/users\/136"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs-new.it.ox.ac.uk\/networks\/wp-json\/wp\/v2\/comments?post=1938"}],"version-history":[{"count":14,"href":"https:\/\/blogs-new.it.ox.ac.uk\/networks\/wp-json\/wp\/v2\/posts\/1938\/revisions"}],"predecessor-version":[{"id":1955,"href":"https:\/\/blogs-new.it.ox.ac.uk\/networks\/wp-json\/wp\/v2\/posts\/1938\/revisions\/1955"}],"wp:attachment":[{"href":"https:\/\/blogs-new.it.ox.ac.uk\/networks\/wp-json\/wp\/v2\/media?parent=1938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs-new.it.ox.ac.uk\/networks\/wp-json\/wp\/v2\/categories?post=1938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs-new.it.ox.ac.uk\/networks\/wp-json\/wp\/v2\/tags?post=1938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}