Related: DNS, Encryption and Encoding
Is additional stack of protocol insuring DNS Security
It solely exists because DNS was designed at the time when Internet was viewed as a friendly thing and attacks were not common.
/Attachments/Pasted-image-20230121042850.png)
/Attachments/Pasted-image-20230121042912.png)
/Attachments/Pasted-image-20230121042958.png)
DNSSEC RPSIG - signature proves valid queries
/Attachments/Untitled-picture-1.png)
RRSET - Resource Record Set (Records of the same type (A,MX..) are in the set.)
/Attachments/Pasted-image-20230121043154.png)
RRSIG - Verifies RRSETs
- Zone Signing Key - Private key is not related to the zone, but Public key is.
- Key Signing Key (KSK) - Creates RRSIG from DNSKEY
We tale RRSET and sign it with private key and hashing algorithm. Now, hash+signature is created.
How to verify?
Aside from other records in the zone we have DNSKEY record containing Public key of ZSK and maybe KSK. Record contains value 256 = ZSK, 257 = KSK.
We take MX Records, RRSIG MX records and public key, so we trust RRSET and that only Zone admin has the private key.
DNS Integrity Protection
/Attachments/Pasted-image-20230121043234.png)
How chain of trust is created.
- Zone .org delegates control of icann.org to ICANN NS servers. This is a normal DNS thing.
- Zone .org has DS records, these DS records contain a hash of icann.org’s (child) KSK. This is DNSSEC
- Zone creates RRSIG DS by using it’s private key on DS records.
- Then Zone creates DNSKEY record containing pub of it’s ZSK and KSK
- Then Zone Private KSK creates RRSIG DNSKEY.
- We trust zone .org same way as for icann.org, the Root Zone (which too has DS record set which contains a hash of child DNS KSK)
Root Keys are trust anchors (the are just trusted)
Root KSK Ceremony 47 - YouTube- how Root Zone keys created.