Skip to content

Datasheets

DNSSEC Management

November 7, 2022 |

The DNS service is one of the most important Internet and corporate network services, allowing the mapping of domain names to IP addresses. Without DNS, key applications simply do not work: web portals, e-mail, instant messaging, applications and internet protocols all rely on DNS to perform their operations.

Given this importance, DNS is a service which must be secured against all kinds of threats, whether malicious attacks or unintentional misconfigurations.

Over recent years, several vulnerabilities have illustrated the risks around DNS security. Dan Kaminsky demonstrated that the cache of a name server can easily be poisoned, enabling attackers to redirect users to a non-official website. The IP address associated to a domain requested by users can be modified in the DNS cache by a hacker, in order to redirect users to the hacker’s website. Then the hacker can steal confidential login and password data before redirecting users to the real website. There are many other examples which illustrate the importance of DNS data integrity, all related to everyday use.

The open source community has released patches and new versions to remediate vulnerabilities and mitigate risks. But the most effective solution to the cache poisoning threat is to implement and deploy DNSSEC.

Highlights

  • Simplified signature of zones
  • Automated signing keys (ZSK and KSK) generation, management and roll over
  • Guaranteed DNSSEC keys confidentiality with SOLIDserver™ KeyRing
  • Automated Management of asymmetric cryptography key, DNSSEC Resource Records, Trust Anchors, and Delegation Signers
  • NSEC and NSEC3 supported applying denial of existence
  • DLV (DNSSEC Lookaside Validation)

DNSSEC Principles

An important point to underline is that DNSSEC (DNS Security Extensions) does not modify DNS protocol. DNSSEC is an extension of DNS. Thus, it is possible to use DNSSEC through standard DNS caches. A DNS client which does not use DNSSEC can interact with a DNS server which uses DNSSEC (and vice versa).

DNSSEC is a mechanism enabling the validation and authentication of the origin and integrity of DNS data. DNSSEC mechanisms are based on asymmetric cryptography keys exchanged between the authoritative Name server and DNS client or resolver. All keys generated are contained within the DNS zone with new RR types (resource record). Each signed zone and RR is associated with two cryptography keys, also known as a “key pair”:

  • Confidential private key: This key is used to sign data authenticity and integrity by signing the Resource Records Sets. This key is confidential.
  • Public key: This key is used to decrypt data that was encrypted with the private key to verify data authenticity and integrity
  • Public and private are linked, but it is not possible to find the other key by knowing only one of them.
  • The data signed with a public key proves that it has been signed by the authentic private key.

When a DNS client requests DNS records hosted in a signed DNS zone it receives the requested RR and a digital signature of the RR created by the cryptographic key. The client checks the validity of the signature by requesting the public key of the DNS server hosting the zone which should validate the signature. The validation of the DNS server as a “true source” is then performed thanks to “Trust Anchors”. DNSSEC delivers benefits in two key areas:

  • Origin authentication: ensures that the DNS answer is delivered by the official DNS server which is supposed to deliver the answer
  • Integrity checking: ensures that the DNS zone data has not been modified by a third party, as it would require the private key to do so

EfficientIP Solution for DNSSEC

EfficientIP provides a complete solution to easily deploy and maintain DNSSEC. Key management has been simplified to help accelerate rollout of DNSSEC. SOLIDserver™ is part of EfficientIP’s unique 360° security technology to protect against volumetric, exploit and stealth attacks for both public and private DNS infrastructures.

SOLIDserver™ enables you to manage your DNSSEC deployment from a centralized point, with full control over enforcement of your standards through a user-friendly Web interface.

SOLIDserver™ eliminates complexity and the risk of errors due to command-line operations, as well as tedious tasks.

Asymmetric Cryptography Key

  • RSA/MD5, DSA, RSA/SHA1, RSA/SHA256, RSA/SHA512, DSA/SHA1/ NSEC3, RSA/SHA1/NSEC3
  • From 512 to 4096 bits for SHA keys and 512 to 1025 for DSA

DNSSEC Resource Records

SOLIDserver™ supports all required resource records to deploy and provide DNSSEC including Resource Record Signature (RRSIGs), DNSKEY, Next Secure Records (NSEC) and Next secure 3 Records (N3SEC).

Zone Signing Keys (ZSK) Management

  • Automated zone signing and re-signing after modifications of zone data
  • Automated ZSK rollover (30 days by default)
  • Dual signature for key rollover process management
  • Validity period and TTL conformity management
  • Private key extraction
  • Pre-signed key automation
  • Alert on key expiration

Key Signing Keys (KSK) Management

  • Overlapped zone signature for key rollover process management
  • Validity period and TTL conformity management
  • Expiration time threshold alert
  • Footprint key export for Trust Anchors and Delegation Signers (DS)
  • Trusted key export
  • Alert on key expiration

Download PDF

Access the full DNSSEC Management datasheet as a pdf

Key Resources

Ddi Observability Center
Datasheets
DDI Observability Center
Explore
Dns Intelligence Center
Datasheets
DNS Intelligence Center
Explore
Dns Threat Pulse
Datasheets
DNS Threat Pulse: Leverage DNS Threat Intelligence for a Proactive Defense
Explore
Network Object Manager
Datasheets
Network Object Manager: Trusted Network Objects Repository for IT Design and Automation
Explore
Datasheets
Cloud Observer: Cloud Instances Discovery and Management
Explore
Solidserver Ddi Suite of Appliances
Datasheets
SOLIDserver DDI Suite of Appliances
Explore
Dns Blast
Datasheets
DNS Blast: High Performing DNS Cache Against DDoS Attacks
Explore
Datasheets
DNS Cloud: Powered By AWS Route 53 and Azure DNS Zones
Explore
Datasheets
DNS Firewall: Protecting and Defending Against Malware
Explore
Datasheets
DNS Guardian: Real-time Behavioral Threat Detection
Explore