[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3419394.3423638acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

The Reality of Algorithm Agility: Studying the DNSSEC Algorithm Life-Cycle

Published: 27 October 2020 Publication History

Abstract

The DNS Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System (DNS), the naming system of the Internet. With DNSSEC, signatures are added to the information provided in the DNS using public key cryptography. Advances in both cryptography and cryptanalysis make it necessary to deploy new algorithms in DNSSEC, as well as deprecate those with weakened security. If this process is easy, then the protocol has achieved what the IETF terms "algorithm agility".
In this paper, we study the lifetime of algorithms for DNSSEC. This includes: (i) standardizing the algorithm, (ii) implementing support in DNS software, (iii) deploying new algorithms at domains and recursive resolvers, and (iv) replacing deprecated algorithms. Using data from more than 6.7 million signed domains and over 10,000 vantage points in the DNS, combined with qualitative studies, we show that DNSSEC has only partially achieved algorithm agility. Standardizing new algorithms and deprecating insecure ones can take years. We highlight the main barriers for getting new algorithms deployed, but also discuss success factors. This study provides key insights to take into account when new algorithms are introduced, for example when the Internet must transition to quantum-safe public key cryptography.

Supplementary Material

MP4 File (imc2020-136-long_01.mp4)
In this video, we present some of our findings of our paper ?The Reality of Algorithm Agility: Studying the DNSSEC Algorithm Life-Cycle?. We study the lifetime of algorithms for DNSSEC, the security extensions of the Domain Name System (DNS). This includes: (i) standardizing the algorithm, (ii) implementing support in DNS software, (iii) deploying new algorithms at domains and recursive resolvers, and (iv) replacing deprecated algorithms. Using data from more than 6.7 million signed domains and over 10,000 vantage points in the DNS, combined with qualitative studies, we show that DNSSEC has only partially achieved algorithm agility. Standardizing new algorithms and deprecating insecure ones can take years. We highlight the main barriers for getting new algorithms deployed, but also discuss success factors. Our study provides key insights to take into account when new algorithms are introduced, for example when the Internet must transition to quantum-safe public key cryptography.

References

[1]
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. 2005. DNS Security Introduction and Requirements. RFC 4033 (Proposed Standard)., 21 pages. https://doi.org/10.17487/RFC4033 Updated by RFCs 6014, 6840.
[2]
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. 2005. Protocol Modifications for the DNS Security Extensions. RFC 4035 (Proposed Standard)., 53 pages. https://doi.org/10.17487/RFC4035 Updated by RFCs 4470, 6014, 6840, 8198.
[3]
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. 2005. Resource Records for the DNS Security Extensions. RFC 4034 (Proposed Standard)., 29 pages. https://doi.org/10.17487/RFC4034 Updated by RFCs 4470, 6014, 6840, 6944.
[4]
Various Authors. [n.d.]. IETF DNSEXT Mailing List Archive, June 2006. https://mailarchive.ietf.org/arch/browse/namedroppers/?gbt=1&index=7M 2k1FW261sYIoDIqinA8WOrOZs.
[5]
Various Authors. [n.d.]. IETF DNSOP Mailing List Archive, June 2020. https://mailarchive.ietf.org/arch/msg/dnsop/EYv_-LfkyiQmdguYpbJ3LLX-4Ls/.
[6]
S. Bradner. 1996. The Internet Standards Process - Revision 3. RFC 2026 (Best Current Practice)., 36 pages. https://doi.org/10.17487/RFC2026 Updated by RFCs 3667, 3668, 3932, 3978, 3979, 5378, 5657, 5742, 6410, 7100, 7127, 7475, 8179.
[7]
Brian Murray. 2020. Ubuntu Wiki: Stable Release Updates. https://wiki.ubuntu. com/StableReleaseUpdates.
[8]
Lily Chen, Lily Chen, Stephen Jordan, Yi-Kai Liu, Dustin Moody, Rene Peralta, Ray Perlner, and Daniel Smith-Tone. 2016. Report on Post-Quantum Cryptography. US Department of Commerce, National Institute of Standards and Technology.
[9]
Taejoong Chung, Roland van Rijswijk-Deij, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, and Christo Wilson. 2017. Understanding the Role of Registrars in DNSSEC Deployment. In Proceedings of the Internet Measurement Conference (IMC), 2017 (IMC '17). Association for Computing Machinery, New York, NY, USA, 369--383. https://doi.org/10.1145/3131365.3131373
[10]
Council of European National Top-Level Domain Registries (CENTR). 2020. CENTR Homepage. https://centr.org.
[11]
Frank Dennis. 2020. libsodium Releases. https://github.com/jedisct1/libsodium/releases?after=0.4.
[12]
Not Disclosed. 2020. On the zone policy of a European ccTLD. Private correspondence.
[13]
DNS OARC. 2020. DNSViz | A DNS visualization tool. https://dnsviz.net/.
[14]
DNSThought website. 2018. Atlas measurements used with DNSThought. https://dnsthought.nlnetlabs.nl/raw/.
[15]
V. Dolmatov (Ed.), A. Chuprina, and I. Ustinov. 2010. Use of GOST Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC. RFC 5933 (Proposed Standard)., 9 pages. https://doi.org/10.17487/RFC5933 Updated by RFC 6944.
[16]
D. Eastlake 3rd. 2001. RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS). RFC 3110 (Proposed Standard)., 7 pages. https://doi.org/10. 17487/RFC3110 Updated by RFC 6944.
[17]
Tony Finch. 2020. Archive of the DNS root zone. https://github.com/fanf2/save root.
[18]
Internet Engineering Task Force. [n.d.]. History of draft-hoffman-dnssec-dsasha2. https://datatracker.ietf.org/doc/draft-hoffman-dnssec-dsa-sha2/history/.
[19]
Dani Grant. 2015. Announcing Universal DNSSEC: Secure DNS for Every Domain. https://blog.cloudflare.com/introducing-universal-dnssec/.
[20]
O. Gudmundsson. 2003. Delegation Signer (DS) Resource Record (RR). RFC 3658 (Proposed Standard)., 19 pages. https://doi.org/10.17487/RFC3658 Obsoleted by RFCs 4033, 4034, 4035, updated by RFC 3755.
[21]
O. Gudmundsson and P. Wouters. 2017. Managing DS Records from the Parent via CDS/CDNSKEY. RFC 8078 (Proposed Standard)., 10 pages. https://doi.org/10.17487/RFC8078
[22]
Mike Hamubrg. 2020. libdecaf Changelog. https://github.com/krionbsd/libdecaf/blob/master/ChangeLog.
[23]
W. Hardaker. 2006. Use of SHA-256 in DNSSEC Delegation Signer(DS) Resource Records(RRs). RFC 4509 (Proposed Standard)., 7 pages. https://doi.org/10.17487/RFC4509
[24]
P. Hoffman and W.C.A. Wijngaards. 2012. Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC. RFC 6605 (Proposed Standard)., 8 pages. https://doi.org/10.17487/RFC6605
[25]
Hoffman, Paul. 2020. It's Time to Move Away From Using SHA-1 in the DNS. https://www.icann.org/news/blog/it-s-time-to-move-away-from-using-sha-1-in-the-dns.
[26]
Holland, Nick and Mestdagh, Steven and Knight, Joel and Jackson, Eric and Vandeputtem Wim and Cappuccio, Chris. 2020. OpenBSD FAQ - Package Management. https://www.openbsd.org/faq/faq15.html.
[27]
R. Housley. 2015. Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms. RFC 7696 (Best Current Practice)., 19 pages. https://doi.org/10.17487/RFC7696
[28]
Geoff Houston. 2014. ECDSA and DNSSEC. https://blog.apnic.net/2014/10/23/ec dsa-and-dnssec/.
[29]
Geoff Houston. 2015. Happy Eyeballs for the DNS. OARC 2015 Fall Workshop, https://indico.dns-oarc.net/event/24/contributions/377/attachments/341/600/2015-10-04-dns-dual-stack.pdf.
[30]
Internet Assigned Numbers Authority (IANA). [n.d.]. Domain Name System Security (DNSSEC) Algorithm Numbers. https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml.
[31]
ICANN. 2020. Delegated Strings. https://newgtlds.icann.org/en/program-status/delegated-strings.
[32]
Internet Engineering Task Force (IETF). [n.d.]. IESG states. https://datatracker.ie tf.org/help/state/draft/iesg.
[33]
Internet Corporation for Assigned Names and Numbers (ICANN). 2012. Transition to Delegation. In gTLD Applicant Guidebook.
[34]
Internet Corporation for Assigned Names and Numbers (ICANN). 2013. User Documentation on Delegating and Redelegating a Generic Top-Level Domain (gTLD). https://www.icann.org/en/system/files/files/gtld-drd-ui-10sep13-en.pdf.
[35]
Internet Engineering Task Force (IETF). 2020. Mail Archive. https://mailarchive. ietf.org/arch/.
[36]
Internet Systems Consortium (ISC). 2019. Release Notes for BIND Version 9.14.0. https://downloads.isc.org/isc/bind9/9.14.0/RELEASE-NOTES-bind-9.14.0.txt.
[37]
J. Jansen. 2009. Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC. RFC 5702 (Proposed Standard)., 10 pages. https://doi.org/10.17487/RFC5702 Updated by RFC 6944.
[38]
Pierre Karpman, Thomas Peyrin, and Marc Stevens. 2015. Practical Free-Start Collision Attacks on 76-step SHA-1. In Annual Cryptology Conference. Springer, 623--642.
[39]
Robert Kisteleki. 2016. Ethics of RIPE Atlas Measurements. https://labs.ripe.net/Members/kistel/ethics-of-ripe-atlas-measurements.
[40]
O. Kolkman, W. Mekking, and R. Gieben. 2012. DNSSEC Operational Practices, Version 2. RFC 6781 (Informational)., 71 pages. https://doi.org/10.17487/RFC6781
[41]
Platon Kotzias, Abbas Razaghpanah, Johanna Amann, Kenneth G Paterson, Narseo Vallina-Rodriguez, and Juan Caballero. 2018. Coming of Age: A Longitudinal Study of TLS Deployment. In Proceedings of the Internet Measurement Conference (IMC), 2018.415--428.
[42]
W. Kumari, O. Gudmundsson, and G. Barwood. 2014. Automating DNSSEC Delegation Trust Maintenance. RFC 7344 (Proposed Standard)., 18 pages. https://doi.org/10.17487/RFC7344 Updated by RFC 8078.
[43]
B. Laurie, G. Sisson, R. Arends, and D. Blacka. 2008. DNS Security (DNSSEC) Hashed Authenticated Denial of Existence. RFC 5155 (Proposed Standard)., 52 pages. https://doi.org/10.17487/RFC5155 Updated by RFCs 6840, 6944.
[44]
Tho Le, Roland van Rijswijk-Deij, Luca Allodi, and Nicola Zannone. 2018. Economic Incentives on DNSSEC Deployment: Time to Move from Quantity to Quality. In NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium. IEEE, 1--9.
[45]
Gaëtan Leurent and Thomas Peyrin. 2019. From Collisions to Chosen-Prefix Collisions Application to Full SHA-1. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 527--555.
[46]
Florian Mendel, Norbert Pramstaller, and Christian Rechberger. 2008. A (Second) Preimage Attack on the GOST Hash Function. In Fast Software Encryption, Kaisa Nyberg (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 224--234.
[47]
Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, and Janusz Szmidt. 2008. Cryptanalysis of the GOST Hash Function. In Advances in Cryptology - CRYPTO 2008, David Wagner (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 162--178.
[48]
Moritz Müller, Jins de Jong, Maran van Heesch, Benno Overeinder, and Roland van Rijswijk-Deij. 2020. Retrofitting Post-Quantum Cryptography in Internet Protocols: A Case Study of DNSSEC. ACM SIGCOMM Computer Communication Review 50, 4 (2020).
[49]
Moritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker, Taejoong Chung, Willem Toorop, and Roland van Rijswijk-Deij. 2019. Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover. In Proceedings of the Internet Measurement Conference (IMC), 2019.1--14.
[50]
Moritz Müller, Willem Toorop, Taejoong Chung, and Roland van Rijswijk-Deij. 2020. CENTR Survey: Supported DNSSEC Signing Algorithms. https://docs.google.com/forms/d/e/1FAIpQLSfpLT_aPWDnBLt2kmkcihgXJPZquy3tQSBvV77-2Ct9izsBwg/viewform?usp=sf_link.
[51]
M. Müller, T. Chung, A. Mislove, and R. van Rijswijk-Deij. 2019. Rolling With Confidence: Managing the Complexity of DNSSEC Operations. IEEE Transactions on Network and Service Management 16, 3 (2019), 1199--1211.
[52]
NLnet Labs. 2020. Unbound Resolver Change Log. https://nlnetlabs.nl/svn/unbound/tags/release-1.8.0/doc/Changelog.
[53]
National Institute of Standards and Technology (NIST). [n.d.]. Secure Hashing. https://web.archive.org/web/20110625054822/http://csrc.nist.gov/groups/S T/toolkit/secure_hashing.html.
[54]
PowerDNS. 2020. Changelogs for 4.0.x --- PowerDNS Authoritative Server documentation. https://doc.powerdns.com/authoritative/changelog/4.0.html.
[55]
PowerDNS. 2020. Changelogs for 4.2.x --- PowerDNS Authoritative Server documentation. https://doc.powerdns.com/authoritative/changelog/4.2.html.
[56]
RIPE NCC Staff. 2015. RIPE Atlas: A Global Internet Measurement Network. Internet Protocol Journal (IPJ) 18, 3 (Sep 2015).
[57]
S. Rose. 2013. Applicability Statement: DNS Security (DNSSEC) DNSKEY Algorithm Implementation Status. RFC 6944 (Proposed Standard)., 7 pages. https://doi.org/10.17487/RFC6944
[58]
Peter W Shor. 1994. Polynomial Time Algorithms for Discrete Logarithms and Factoring on a Quantum Computer. In International Algorithmic Number Theory Symposium. Springer, 289--289.
[59]
Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, and Yarik Markov. 2017. The first collision for full SHA-1. In Annual International Cryptology Conference. Springer, 570--596.
[60]
O. Sury and R. Edmonds. 2017. Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC. RFC 8080 (Proposed Standard)., 7 pages. https://doi.org/10.17487/RFC8080
[61]
Roland van Rijswijk-Deij, Taejoong Chung, David Choffnes, Alan Mislove, and Willem Toorop. 2017. The Root Canary: Monitoring and Measuring the DNSSEC Root Key Rollover. In Proceedings of the 2017 SIGCOMM Posters and Demos, Part of ACM SIGCOMM 2017. ACM Press, Los Angeles, CA, USA.
[62]
Roland van Rijswijk-Deij, Mattijs Jonker, and Anna Sperotto. 2016. On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC. In 2016 12th International Conference on Network and Service Management (CNSM). IEEE, 258--262.
[63]
Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto, and Aiko Pras. 2016. A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements. IEEE Journal on Selected Areas in Communications 34, 6 (2016), 1877--1888.
[64]
Roland van Rijswijk-Deij, Anna Sperotto, and Aiko Pras. 2015. Making the case for elliptic curves in DNSSEC. ACM SIGCOMM computer communication review 45, 5 (2015), 13--19.
[65]
S. Weiler. 2004. Legacy Resolver Compatibility for Delegation Signer (DS). RFC 3755(Proposed Standard)., 9 pages. https://doi.org/10.17487/RFC3755 Obsoleted by RFCs 4033, 4034, 4035, updated by RFCs 3757, 3845.
[66]
S. Weiler (Ed.) and D. Blacka (Ed.). 2013. Clarifications and Implementation Notes for DNS Security (DNSSEC). RFC 6840 (Proposed Standard)., 21 pages. https://doi.org/10.17487/RFC6840
[67]
Willem Toorop. 2017. All RSAMD5 signed zones are BOGUS. https://issuetracker.google.com/issues/62692406.
[68]
Wisser, Ulrich. 2020. Internetstiftelsen: se incentives. private correspondence.
[69]
Paul Wouters and Ondřej Surý. 2019. Algorithm Implementation Requirements and Usage Guidance for DNSSEC. RFC 8624. https://doi.org/10.17487/RFC8624
[70]
Yahoo Finance. 2020. Internet Grows to 370.1 Million Domain Name Registrations at the End of the Second Quarter of 2020. https://finance.yahoo.com/news/internet-grows-370-1-million-201500616.html.
[71]
Dan York, Ondřej Surý, Paul Wouters, and Ólafur Guðmundsson. 2018. Observations on Deploying New DNSSEC Cryptographic Algorithms. Internet-Draft draft-york-dnsop-deploying-dnssec-crypto-algs-06. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-york-dnsop-deploying-dnssec-crypto-algs-06 Work in Progress.

Cited By

View all
  • (2022)Improving Agility Performance Among Athletes by Jami Agility Table (JAT)International Journal of Sport Studies for Health10.5812/intjssh-1284145:1Online publication date: 25-Jun-2022
  • (2022)Observable KINDNSProceedings of the 22nd ACM Internet Measurement Conference10.1145/3517745.3563016(740-741)Online publication date: 25-Oct-2022
  • (2022)From the Beginning: Key Transitions in the First 15 Years of DNSSECIEEE Transactions on Network and Service Management10.1109/TNSM.2022.319540619:4(5265-5283)Online publication date: Dec-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IMC '20: Proceedings of the ACM Internet Measurement Conference
October 2020
751 pages
ISBN:9781450381383
DOI:10.1145/3419394
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 October 2020

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • NFS

Conference

IMC '20
IMC '20: ACM Internet Measurement Conference
October 27 - 29, 2020
Virtual Event, USA

Acceptance Rates

IMC '20 Paper Acceptance Rate 53 of 216 submissions, 25%;
Overall Acceptance Rate 277 of 1,083 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)55
  • Downloads (Last 6 weeks)4
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Improving Agility Performance Among Athletes by Jami Agility Table (JAT)International Journal of Sport Studies for Health10.5812/intjssh-1284145:1Online publication date: 25-Jun-2022
  • (2022)Observable KINDNSProceedings of the 22nd ACM Internet Measurement Conference10.1145/3517745.3563016(740-741)Online publication date: 25-Oct-2022
  • (2022)From the Beginning: Key Transitions in the First 15 Years of DNSSECIEEE Transactions on Network and Service Management10.1109/TNSM.2022.319540619:4(5265-5283)Online publication date: Dec-2022
  • (2022)Addressing the challenges of modern DNS a comprehensive tutorialComputer Science Review10.1016/j.cosrev.2022.10046945(100469)Online publication date: Aug-2022
  • (2022)Measurement for encrypted open resolversComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2022.109081213:COnline publication date: 4-Aug-2022
  • (2021)Predictive Cipher-Suite Negotiation for Boosting Deployment of New CiphersProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3485349(2423-2425)Online publication date: 12-Nov-2021
  • (2021)Negotiating PQC for DNSSEC2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S)10.1109/DSN-S52858.2021.00015(9-10)Online publication date: Jun-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media