Efficientip DNSSEC Management Ds
Efficientip DNSSEC Management Ds
DNSSEC Management
Highlights
Why DNSSEC?
Simplified signature of zones The DNS service is one of the most important Internet and
corporate network services, allowing the mapping of do-
Automated signing keys (ZSK and KSK) main names to IP addresses. Without DNS, key applica-
generation, management and roll over
tions simply do not work: web portals, e-mail, instant mes-
Guaranteed DNSSEC keys confidentia- saging, applications and internet protocols all rely on DNS
lity with SOLIDserver KeyRing to perform their operations.
Automated Management of asymmetric Given this importance, DNS is a service which must be
cryptography key, DNSSEC Resource secured against all kinds of threats, whether malicious at-
Records, Trust Anchors, and Delegation tacks or unintentional misconfigurations.
Signers
Over the last years several vulnerabilities have illustrated
NSEC and NSEC3 supported applying the risks around DNS security. In 2008 Dan Kaminsky has
denial of existence demonstrated that the cache of a name server can easily
be poisoned, enabling attackers to redirect users to a non-
DLV (DNSSEC Lookaside Validation) official website. The IP address associated to a domain
requested by users is modified in the DNS cache the hac-
kers, in order to redirect users to the hackers website.
Then the hacker can steal confidential login and password
data before redirecting users to the real website.
www.efficientip.com
EfficientIP | Product Description DNSSEC MANAGEMENT
C
onfidential private key: This key is used to sign
data authenticity and integrity by signing the Re-
source Records Sets. This key is confidential.
P
ublic key: This key is used to decrypt data that was
encrypted with the private key to verify data authen-
ticity and integrity.
Asymmetric Cryptography Key
P
ublic and private are linked, but it is not possible to R
SA/MD5, DSA, RSA/SHA1, RSA/SHA256, RSA/
find the other key by knowing only one of them. SHA512, DSA/SHA1/NSEC3, RSA/SHA1/NSEC3
T
he data signed with a public key proves that it has F
rom 512 to 4096 bits for SHA keys and 512 to 1025
been signed by the authentic private key. for DSA.
When a DNS client requests DNS records hosted in a sig- DNSSEC Resource Records
ned DNS zone it receives the requested RR and a digi-
tal signature of the RR created by the cryptographic key. SOLIDserver supports all required resource records to
The client checks the validity of the signature by reques- deploy and provide DNSSEC including Resource Record
ting the public key of the DNS server hosting the zone Signature (RRSIGs), DNSKEY, Next Secure Records
which should validate the signature. The validation of the (NSEC) and Next secure 3 Records (N3SEC).
DNS server as a true source is then performed thanks to
Trust Anchors. Zone Signing Keys (ZSK) Management
A
utomated zone signing and re-signing after
DNSSEC delivers benefits in two key areas:
modifications of zone data
O
rigin authentication: ensures that the DNS ans- Automated ZSK rollover (30 days by default)
wer is delivered by the official DNS server which is
Dual signature for key rollover process management
supposed to deliver the answer.
Validity period and TTL conformity management
Integrity checking: ensures that the DNS zone data
has not been modified by a third party, as it would Private key extraction
require the private key to do so. Pre-signed key automation
Alert on key expiration
2 www.efficientip.com
EfficientIP | Product Description DNSSEC MANAGEMENT
Delegation Signers
A
utomated DS creation at the SmartArchitecture
level
Key importation
Trust Anchors
Key exportation
Automated configuration
Footprint exportation