|
You are hereHome » NANOG Meeting Presentation Abstract
|
|
NANOG Meeting Presentation Abstract
Elliptic curves to the rescue: tackling availability and attack potential in DNSSEC | Meeting: | NANOG67 | |
Date / Time: | 2016-06-13 2:00pm - 2:30pm

| |
Room: | Imperial Ballroom (B2 Level) | |
Presenters: | Speakers:
Roland van Rijswijk-Deij, SURFnetI'm an external Ph.D. student in the Design and Analysis of Communication Systems (DACS) group at the Centre for Telematics and Information Technology (CTIT) at the University of Twente.
When I'm not working on my research in Twente, I am an R&D project manager at SURFnet, the National Research and Education Network (NREN) in The Netherlands. In my job I'm responsible for Internet innovation in the areas of network security and privacy. | |
Abstract: | Over the past decade, we have seen the gradual rollout of DNSSEC across the name space, with adoption growing slowly but steadily. While DNSSEC was introduced to solve security problems in the DNS, it is not without its own problems. In particular, it suffers from two big problems: 1) Use of DNSSEC can lead to fragmentation of DNS responses, which impacts the availability of signed domains due to resolvers being unable to receive fragmented responses and 2) DNSSEC can be abused to create potent denial-of-service attacks based on amplification. Arguably, the choice of the RSA cryptosystem as default algorithm for DNSSEC is the root cause of these problems. RSA signatures need to be large to be cryptographically strong. Given that DNS responses can contain multiple signatures, this has a major impact on the size of these responses.
Using elliptic curve cryptography, we can solve both problems with DNSSEC, because ECC offers much better cryptographic strength with far smaller keys and signatures. But using ECC will introduce one new problem: signature validation - the most commonly performed operation in DNSSEC - can be up to two orders of magnitude slower than with RSA. Thus, we run the risk of pushing workload to the edges of the network by introducing ECC in DNSSEC.
This talk discusses solid research results that show 1) the benefits of using ECC in terms of solving open issues in DNSSEC, and 2) that the potential new problem of CPU use for signature validation on resolvers is not prohibitive, to such an extent that even if DNSSEC becomes universally deployed, the signature validations a resolver would need to perform can easily be handled on a single modern CPU core. Based on these results, we call for an overhaul of DNSSEC where operators move away from using RSA to using elliptic curve-based signature schemes. | |
Files: | Elliptic curves to the rescue: tackling availability and attack potential in DNSSEC(PDF)
Elliptic curves to the rescue: tackling availability and attack potential in DNSSEC
| |
Sponsors: | None. | |
Back to NANOG67 agenda. NANOG67 Abstracts- Conference Opening
Moderators: Daniel Golding, NANOG Board, Google; Speakers: Peter JacobyRCN; .L Sean Kennedy, XO Communications; Don MacNeilJay Borkenhagen.
- Conference Opening
Moderators: Daniel Golding, NANOG Board, Google; Speakers: Peter JacobyRCN; .L Sean Kennedy, XO Communications; Don MacNeilJay Borkenhagen.
- Conference Opening
Moderators: Daniel Golding, NANOG Board, Google; Speakers: Peter JacobyRCN; .L Sean Kennedy, XO Communications; Don MacNeilJay Borkenhagen.
- Conference Opening
Moderators: Daniel Golding, NANOG Board, Google; Speakers: Peter JacobyRCN; .L Sean Kennedy, XO Communications; Don MacNeilJay Borkenhagen.
- Conference Opening
Moderators: Daniel Golding, NANOG Board, Google; Speakers: Peter JacobyRCN; .L Sean Kennedy, XO Communications; Don MacNeilJay Borkenhagen.
- Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
Moderators: Sandra Murphy, Parsons, Inc.; Doug Montgomery, National Institute of Standards and Technologies (NIST); Panelists: Tony Tauber, Comcast; Rick Mayberry, Microsoft; John Scudder, Juniper Networks; Thomas KingHenk Steenman, AMS-IX; Greg Hankins, Nokia; Mark Kosters, ARIN; Arjun SreekantiahCisco; .Keyur Patel, Cisco; Matthias Wählisch, Freie Universitaet Berlin;
- Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
Moderators: Sandra Murphy, Parsons, Inc.; Doug Montgomery, National Institute of Standards and Technologies (NIST); Panelists: Tony Tauber, Comcast; Rick Mayberry, Microsoft; John Scudder, Juniper Networks; Thomas KingHenk Steenman, AMS-IX; Greg Hankins, Nokia; Mark Kosters, ARIN; Arjun SreekantiahCisco; .Keyur Patel, Cisco; Matthias Wählisch, Freie Universitaet Berlin;
- Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
Moderators: Sandra Murphy, Parsons, Inc.; Doug Montgomery, National Institute of Standards and Technologies (NIST); Panelists: Tony Tauber, Comcast; Rick Mayberry, Microsoft; John Scudder, Juniper Networks; Thomas KingHenk Steenman, AMS-IX; Greg Hankins, Nokia; Mark Kosters, ARIN; Arjun SreekantiahCisco; .Keyur Patel, Cisco; Matthias Wählisch, Freie Universitaet Berlin;
- Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
Moderators: Sandra Murphy, Parsons, Inc.; Doug Montgomery, National Institute of Standards and Technologies (NIST); Panelists: Tony Tauber, Comcast; Rick Mayberry, Microsoft; John Scudder, Juniper Networks; Thomas KingHenk Steenman, AMS-IX; Greg Hankins, Nokia; Mark Kosters, ARIN; Arjun SreekantiahCisco; .Keyur Patel, Cisco; Matthias Wählisch, Freie Universitaet Berlin;
- Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
Moderators: Sandra Murphy, Parsons, Inc.; Doug Montgomery, National Institute of Standards and Technologies (NIST); Panelists: Tony Tauber, Comcast; Rick Mayberry, Microsoft; John Scudder, Juniper Networks; Thomas KingHenk Steenman, AMS-IX; Greg Hankins, Nokia; Mark Kosters, ARIN; Arjun SreekantiahCisco; .Keyur Patel, Cisco; Matthias Wählisch, Freie Universitaet Berlin;
- Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
Moderators: Sandra Murphy, Parsons, Inc.; Doug Montgomery, National Institute of Standards and Technologies (NIST); Panelists: Tony Tauber, Comcast; Rick Mayberry, Microsoft; John Scudder, Juniper Networks; Thomas KingHenk Steenman, AMS-IX; Greg Hankins, Nokia; Mark Kosters, ARIN; Arjun SreekantiahCisco; .Keyur Patel, Cisco; Matthias Wählisch, Freie Universitaet Berlin;
- Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
Moderators: Sandra Murphy, Parsons, Inc.; Doug Montgomery, National Institute of Standards and Technologies (NIST); Panelists: Tony Tauber, Comcast; Rick Mayberry, Microsoft; John Scudder, Juniper Networks; Thomas KingHenk Steenman, AMS-IX; Greg Hankins, Nokia; Mark Kosters, ARIN; Arjun SreekantiahCisco; .Keyur Patel, Cisco; Matthias Wählisch, Freie Universitaet Berlin;
- Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
Moderators: Sandra Murphy, Parsons, Inc.; Doug Montgomery, National Institute of Standards and Technologies (NIST); Panelists: Tony Tauber, Comcast; Rick Mayberry, Microsoft; John Scudder, Juniper Networks; Thomas KingHenk Steenman, AMS-IX; Greg Hankins, Nokia; Mark Kosters, ARIN; Arjun SreekantiahCisco; .Keyur Patel, Cisco; Matthias Wählisch, Freie Universitaet Berlin;
- Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
Moderators: Sandra Murphy, Parsons, Inc.; Doug Montgomery, National Institute of Standards and Technologies (NIST); Panelists: Tony Tauber, Comcast; Rick Mayberry, Microsoft; John Scudder, Juniper Networks; Thomas KingHenk Steenman, AMS-IX; Greg Hankins, Nokia; Mark Kosters, ARIN; Arjun SreekantiahCisco; .Keyur Patel, Cisco; Matthias Wählisch, Freie Universitaet Berlin;
- Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
Moderators: Sandra Murphy, Parsons, Inc.; Doug Montgomery, National Institute of Standards and Technologies (NIST); Panelists: Tony Tauber, Comcast; Rick Mayberry, Microsoft; John Scudder, Juniper Networks; Thomas KingHenk Steenman, AMS-IX; Greg Hankins, Nokia; Mark Kosters, ARIN; Arjun SreekantiahCisco; .Keyur Patel, Cisco; Matthias Wählisch, Freie Universitaet Berlin;
- Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
Moderators: Sandra Murphy, Parsons, Inc.; Doug Montgomery, National Institute of Standards and Technologies (NIST); Panelists: Tony Tauber, Comcast; Rick Mayberry, Microsoft; John Scudder, Juniper Networks; Thomas KingHenk Steenman, AMS-IX; Greg Hankins, Nokia; Mark Kosters, ARIN; Arjun SreekantiahCisco; .Keyur Patel, Cisco; Matthias Wählisch, Freie Universitaet Berlin;
- Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
Moderators: Sandra Murphy, Parsons, Inc.; Doug Montgomery, National Institute of Standards and Technologies (NIST); Panelists: Tony Tauber, Comcast; Rick Mayberry, Microsoft; John Scudder, Juniper Networks; Thomas KingHenk Steenman, AMS-IX; Greg Hankins, Nokia; Mark Kosters, ARIN; Arjun SreekantiahCisco; .Keyur Patel, Cisco; Matthias Wählisch, Freie Universitaet Berlin;
- DNS Track
Speakers: edward lewisICANN; .Duane Wessels, Verisign; Kazunori FujiwaraJPRS; .Casey Deccio, Verisign Labs; Yacin Nadji.
- DNS Track
Speakers: edward lewisICANN; .Duane Wessels, Verisign; Kazunori FujiwaraJPRS; .Casey Deccio, Verisign Labs; Yacin Nadji.
- DNS Track
Speakers: edward lewisICANN; .Duane Wessels, Verisign; Kazunori FujiwaraJPRS; .Casey Deccio, Verisign Labs; Yacin Nadji.
- DNS Track
Speakers: edward lewisICANN; .Duane Wessels, Verisign; Kazunori FujiwaraJPRS; .Casey Deccio, Verisign Labs; Yacin Nadji.
- DNS Track
Speakers: edward lewisICANN; .Duane Wessels, Verisign; Kazunori FujiwaraJPRS; .Casey Deccio, Verisign Labs; Yacin Nadji.
- Security Track
Speakers: John Kristoff, DePaul University; Christoph Dietzel.Ryan Haley.Jelena Mirkovic.
- Security Track
Speakers: John Kristoff, DePaul University; Christoph Dietzel.Ryan Haley.Jelena Mirkovic.
- Security Track
Speakers: John Kristoff, DePaul University; Christoph Dietzel.Ryan Haley.Jelena Mirkovic.
- Security Track
Speakers: John Kristoff, DePaul University; Christoph Dietzel.Ryan Haley.Jelena Mirkovic.
|
|