Domain Name Security Extensions (DNSSEC) are extensions to the Domain Name System (DNS) that provide:
- Authentication of the origin of DNS data
- Integrity of data
- Authentication of denial of existence
What is the DNS and why do we need to secure it?
The DNS is a hierarchical distributed naming system that translates easy to remember names (that are meaningful to people) into the IP numbers required for devices to network across the Internet. Likewise, it also provides the opposite (numbers to names) lookup, called Reverse DNS.
Each DNS lookup — the process of looking for web addresses using a domain name — occurs over several stages, and each stage is vulnerable to hijacking as the DNS does not include security in its native form.
DNSSEC tries to prevent someone from injecting false information into this DNS lookup by providing a set of extensions that digitally sign data so end users can be assured it is valid. Essentially, DNSSEC attests to the validity of the web address you want to visit.
How does it work?
When the DNS looks up particular information (DNS lookup), the answers are digitally signed allowing the DNS client (resolver) to check if the information is identical to the information on the authoritative name server. It provides a validation path for records and follows a chain of trust up to the root. It's important that DNSSEC is deployed across all domains to complete the chain of trust. This ensures that outgoing Internet traffic is always sent to the correct servers. New record types were created to facilitate this:
- RRSIG – Resource Record Signature
- DNSKEY – DNS Public Key
- DS – Delegation Signer
- NSEC – Next Secure
How APNIC is participating
APNIC has signed its own zones (stg.apnic.net), the reverse address zones under in-addr.arpa and ip6.arpa, and has introduced Member DNSSEC data. Members can activate DNSSEC protection to their reverse zones by updating the "ds-rdata' attribute of domain objects in the APNIC Whois Database. The value of the DS resource records from the zone file is used for the "ds-rdata" attribute. A successful update of the domain objects will result in updating the parent zone data that is stored in APNIC's name servers.
APNIC Labs measures the use of DNSSEC globally and provides DNSSEC-related research to the technical community.APNIC Labs DNSSEC measurement
What you need to do
You can update domain objects in MyAPNIC by adding an optional attribute field "ds-rdata" to your domain object and enter your DS resource records. To update multiple domain objects, you can use the bulk update form. APNIC only supports updates of this information through the use of the MyAPNIC portal which is secured by Member certificates.
Updating domain objects in MyAPNIC
Using the Whois template to update a single domain object
Add an optional attribute field 'ds-rdata' to your domain object and enter your DS resource records.
Using the Bulk update form to update multiple domain objects
Attach your plain text zone file containing your Name Server and/or DS resource records:Example:
0.168.192.in-addr.arpa. 86400 IN NS new.ns1.apnic.net. 0.168.192.in-addr.arpa. 86400 IN NS new.ns2.apnic.net. 0.168.192.in-addr.arpa. 86400 IN DS 33736 5 1 4B7ABE2701C6A6F34C479EBDDBC9706C91A4B454 0.168.192.in-addr.arpa. 86400 IN DS 33736 5 2 B1E76175EC4F7AEF17EC5DBD3BA24EA19728C96FAC 8713C008030EBB FD7A28FC
APNIC operational settings
The following values are the operational parameters used by APNIC for its DNSSEC:
|Key sizes||KSK is 2048-bit ZSK is 1024-bit|
|Roll-over frequency||KSK – mid-May after 02:00 (UTC +10) ZSK – monthly on the 1st of the month after 02:00 (UTC +10)|
|Zone re-sign frequency||Daily at 00:00 (UTC +10)|
|Signature validity||RRSIGs are valid for 30 days|
DNS Root Zone KSK Rollover
ICANN is planning to roll, or change, the 'top' pair of cryptographic keys used in the DNSSEC protocol, commonly known as the Root Zone KSK (Key Signing Key).
This will be the first time the KSK has been changed since it was initially generated in 2010. It is an important security step, in much the same way that regularly changing passwords is considered good practice by any Internet user.
Changing the key involves generating a new cryptographic key pair and distributing the new public component to all DNSSEC-validating resolvers globally.
This will be a significant change as every Internet query using DNSSEC depends on the root zone KSK to validate the destination.
Once the new keys have been generated, network operators performing DNSSEC validation will need to update their systems with the new key so that when a user attempts to visit a website, it can validate it against the new KSK.
Maintaining an up-to-date KSK is essential to ensuring DNSSEC-validating DNS resolvers continue to function following the rollover.
Failure to have the current root zone KSK will mean that DNSSEC-validating DNS resolvers will be unable to resolve any DNS queries.
Who needs to take action?
Network operators using DNSSEC-validating resolvers must update their systems with the new KSK to help ensure trouble-free Internet access for users.
- If your organization is performing DNSSEC validation, and your software supports automatic updates of DNSSEC trust anchors (RFC 5011) then the KSK will be updated automatically at the appropriate time. You may not need to take any additional action, however, some devices may require manual intervention.
- If your organization is performing DNSSEC validation, and your software does not support automatic updates of DNSSEC trust anchors (RFC 5011) or is not configured to use it, then manual updates of the software’s trust anchor file will be required.
In either case, it is worth checking and testing systems prior to the KSK rollover to confirm what action will be required. ICANN is providing a free testbed for operators to help you determine whether your systems can handle automated updates correctly.
APNIC will be contacting all its Members to advise of the KSK rollover, and provide information and resources to assist Members in taking appropriate action.
The KSK rollover will occur over several months. Systems can be updated at any time after the new KSK is published.
|11 July 2017||New KSK published in DNS|
|19 September 2017||Size increase for DNSKEY response from root name servers|
|1 February 2018||Public comment period for plan to resume the KSK rollover begins, ends 2 April 2018.|
|23 April 2018||Staff report on the Draft Plan Comments published.|
|13 May 2018||ICANN Board requests RSSAC, SSAC and RZERC advice on Draft Plan.|
|11 October 2018||KSK rollover (subject to change based on operational considerations).|
Information packsDetailed Guide
LinksICANN automated trust anchor update testbed
How to test if DNS validating resolvers are using the latest trust anchor (ICANN)
How to update DNS validating resolvers with the latest trust anchor (ICANN)
PresentationsRoot Zone DNSSEC KSK Rollover, Ed Lewis (June 2018)
Rolling the Root, Geoff Huston
Other resourcesAPNIC Labs DNSSEC measurement
Some of the highlights from DNS-OARC 27 held in San Jose from 29 September to 3 October 2017.
Why has the DNS Root Zone KSK roll been postponed? Geoff Huston digs into the data to explain.
Automating DNSSEC key management and validating issues with the KSK roll where two of the many novel discussions had during the recent IEPG meeting in Prague.
IEPG has moved to a new day in the IETF agenda, but it's still a very useful conversation between the operations and engineering community.
APNIC participated at the fourth Bhutan Network Operators Group (BhutanNOG 4) meeting on 5 June 2017.
Geoff recaps some highlights from the technical presentations at RIPE 74.
Guest Post: Here's how you can ready your network for the DNSSEC Root Zone KSK rollover this October.
The Root Zone KSK rollover is coming. Are your systems ready?
ICANN recently announced the operational plans to "roll" the Root Zone Key Signing Key, an essential part of DNSSEC.
After five years of operation, where are we with rolling over the Key Signing Key of the DNS Root Zone?
How to get helpIf you need technical support, your DNS software provider is the best place to start. Below is support information for some of the popular providers.
NLnet Labs Unbound
Secure64 DNS Signer
Ask a Question
Send an email to firstname.lastname@example.org with "KSK Rollover" in the subject line to submit your questions.