Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1143549.1143804acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
Article

Resolving islands of security problem for DNSSEC

Published: 03 July 2006 Publication History

Abstract

The DNS Security Extensions (DNSSEC) were developed to add origin authentication and integrity. DNSSEC defined a public key infrastructure over DNS tree hierarchy for the public key validation. In DNSSEC, a parent zone authenticates public keys of its child zones. The authentication hierarchy is broken when a parent does not support DNSSEC. This paper proposes an effective mechanism to overcome this partial deployment problem. Our solution uses a public bulletin board for zones to post their DNSKEY information. Resolvers use posted key information to find key authentication chains that can be used to validate the DNSKEY. Bulletin Board(BB) provides complete trust relationship information when the key authentication hierarchy is broken, and distributes the complete key information even when false zones provide the invalid keys. The bulletin board does not guarantee the correctness of DNSKEY information, but it does guarantee the completeness of the key information. Our approach helps DNS zones to deploy DNSSEC even when their parent zones do not deploy DNSSEC, and it does not require any changes to the current DNSSEC protocol and the existing software.

References

[1]
DNSSEC in .NL. http://www.nlnetlabs.nl/dnssec.
[2]
DNSSEC in .SE. http://dnssec.nic-se.se.
[3]
Marc Horowitz, PGP public key serve. http://www.mit.edu/people/marc/pks, 1997.
[4]
John Jones, Daniel Berger, and Chinya Ravishankar. Layering a Publick-Key Distribution Service over Secure DNS. In 21st Annual Computer Security Applications Conference, pages 409--418, 2005.
[5]
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In Proceddings of the 1996 IEEE Symposium on Security and Privacy, page 164, 1996.
[6]
P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation Systems. Communications of the ACM, 43(12):45--48, December 2000.
[7]
Patrick McDaniel and Sugih Jamin. A Scalable Key Distribution Hierarchy. In Technical Report, Electrical Engineering and Computer Science, University of Michigan, pages CSE-TR-366--98, 1998.
[8]
Philip R. Zimmermann. The official PGP user's guide, 1995.
[9]
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. DNS Security Introduction and Requirements, March 2005.
[10]
Russ Cox, Athicha Muthitacharoen, and Robert T. Morri. Serving DnS using a Peer-to-Peer Lookup Service. In International Workshop on Peer-to-Peer Systems (IPTPS '02), March 2002.

Cited By

View all
  • (2014)Emergency Key Rollover in DNSSECProceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2014.76(598-604)Online publication date: 24-Sep-2014

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IWCMC '06: Proceedings of the 2006 international conference on Wireless communications and mobile computing
July 2006
2006 pages
ISBN:1595933069
DOI:10.1145/1143549
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 July 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. DNS security
  2. authentication chains
  3. bulletin board
  4. key authentication
  5. key distribution
  6. sanity check
  7. starting points
  8. trust relationship

Qualifiers

  • Article

Conference

IWCMC06
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2014)Emergency Key Rollover in DNSSECProceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2014.76(598-604)Online publication date: 24-Sep-2014

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media