Just a guy in Vermont trying to connect all the dots...
Author's posts
Jul 11
TDYR #164 – Name Problems – And The Challenges Of Designing Web Forms For Global Names
Jul 11
New IPv6 Case Studies Out… But None From Application Developers!
As part of my job at the Internet Society Deploy360 Programme, we recently published a whole new batch of IPv6 case studies during the 2nd “Launchiversary” of World IPv6 Launch. However, if you scan down that list of case studies you’ll see one interesting omission:
There are NO case studies from application developers!
None. Zilch. Zero.
This needs to change! If you are an application developer and have migrated your application over to work on IPv6, my colleagues and I at the Internet Society would love to write up a bit about what you have done. PLEASE CONTACT US!
It doesn’t have to be anything gigantic. It could just be a simple article explaining what you did to make your application work over IPv6. Or it could be a paragraph linking to a video of a presentation you gave or a set of slides. We are glad to “interview” you, too, via email or a voice/video call to capture information that we will then write up. All we need is your interest and willingness to be included. Please do let us know.
Separately from that, I am still interested in including some case studies in the next version of this “Migrating Applications To IPv6” book that I’m targeting for early 2015. I have a list of questions that I’d like to ask some of you and include in the book. The benefit to other developers will be that they will get to learn about how to move to IPv6 based on your experience. The benefit to you is that I’ll mention your application and name and give you the added publicity from being in the book. The benefit to the Internet is that we’ll get more people moving over to IPv6 sooner rather than later! If you are interested in being considered for the book, please contact me directly!
Jul 08
Now Available – A Trend Chart Tracking DNSSEC Validation Globally (Featured Blog)
Jul 07
TDYR #163 – SoundCloud Removes Record Capability From Its Mobile Apps
Jul 07
Finally! A DNSSEC Validation Trend Chart – Up And To The Right!
Finally! What I’ve always wanted for tracking the growth of DNSSEC validation by DNS resolvers is some kind of “trend chart” along the lines of Google’s IPv6 Statistics page that could show the growth in DNSSEC validation. At the recent ICANN DNSSEC Workshop in London Geoff Huston of APNIC provided to us that exact kind of chart at the URL:
http://gronggrong.rand.apnic.net/cgi-bin/ccpage?c=XA&x=1&g=1&r=1&w=1&g=0
Sure, the URL is not exactly very typing-friendly, but a quick bookmark can solve that (and we’ve added it to our DNSSEC Statistics page to help in that regard). The chart looks like:
Which shows the nice upward trend. Geoff’s team includes some other tools so that, for instance, you can set the “average interval” to 7 days and get a much smoother line:
This is what I intend to start using now to show the growth in DNSSEC validation as we continue to see further deployment happening within networks around the world.
Speaking of geography, Geoff’s site also has a “world map” view showing DNSSEC validation by country at the URL:
Right now, of course, the map shows a whole lot of red for low levels of DNSSEC validation:
Let’s see if we can make that change! (Deploy DNSSEC-validating resolvers on your network today! )
A cool feature is that below the world map you can get individual trend charts for both various regions and even for individual countries. It also shows the ranking of countries in terms of DNSSEC validation (click/tap the image to get to the page – and then scroll down to see):
Our colleague Jan Žorž may be pleased to see how high his home of Slovenia is ranking!
All of this is based on the measurements Geoff’s team has been doing using Flash-based advertising using Google’s advertising network, something he explained in a recent talk at the RIPE 68 event.
While obviously the various charts show how far we have to go in getting DNSSEC deployed, at least now we have some solid measurement charts we can use to track the progress! Many thanks to Geoff and his team for making this site possible.
We’re looking forward to continuing to see the DNSSEC validation chart grow up and to the right!
P.S. If you want to understand how to get started with DNSSEC, please visit our Start Here page to find resources focused on your type of organization.
Jul 07
FIR #763 – 7/7/14 – For Immediate Release
Jul 06
TDYR #162 – On Living In A Place Where Fireworks Are Legal
Jul 03
Report on ICANN50 DNSSEC Workshop: CloudFlare, HSMs, OTR Demos and more…
We had an outstanding DNSSEC Workshop last Wednesday, June 25 ,2014, at ICANN 50 in London. This was the “big” session of the DNSSEC activities at ICANN 50 and had a big turnout! I counted around 120 people in the room at one point, many of whom stayed for most of the day, and we seemed to have 20-25 remote participants in the Adobe Connect room for much of the day. It was great to have so many people there and there was an excellent amount of interaction and engagement throughout the day – lots of questions and lots of discussions!
The schedule, slides and archived video and audio can be found at:
http://london50.icann.org/en/schedule/wed-dnssec
In the section below, I’ll walk through a bit of what happened during the day. First, though, here is one photo of what the room looked like:
… and there were more people sitting behind where I took the photo and on the sides. I have many more photos that at some point I’ll try to get into our Flickr account or somewhere.
Introduction and Challenges/Opportunities for DNSSEC
I (Dan York) began the session with the normal introduction session and review of the latest DNSSEC deployment statistics. Much of this is drawn from the weekly DNSSEC deployment maps we now generate but we also had a good discussion about how we’d like to go to the next level and start generating more second-level statistics.
I followed that with a 2014 view into the Challenges and Opportunities in DNSSEC Deployment and Usage where I looked back on a presentation I gave in 2012 and assessed how far we’ve come in the time since then. I also covered newer issues that have emerged since that time.
DNSSEC Activities in the European Region
We then had the first panel of the day with Cath Goulding of NominetUK moderating a set of presentations from country-code top-level-domain (ccTLD) operators from across Europe:
- Anne-Marie Eklund-Löwinder, .SE – DNSSEC Deployment in Sweden: How Do We Do It?
- Ondrej Filip, CZNIC – DNSSEC .CZ
- Peter Janssen, EURid – DNSSEC @ .EU
- Vincent Levigneron, AFNIC – AFNIC: Promoting DNSSEC – 2013 Results, 2014 Action Plan
- Alexander Mayrhofer, NIC.AT – DNSSEC (Not Just) for .at
- Sara Monteiro, .PT: Facts and Figures
I think many of us were taking copious notes because these were really case studies of how different ccTLDs were deploying DNSSEC… what they’d done, what they hadn’t done… the success they’d had – or not. Lots of great info ranging from .CZ’s YouTube videos to Afnic’s deployment guide to .AT’s “bump-in-the-wire” signing service and much, much more. You can expect to see some of this info turn up in blog posts here on the Deploy360 site! The discussion was great and the sharing among participants was quite good to see.
DNSSEC Key Rollovers and Transfers
Next up Jim Galvin of Afilias talked about the challenges that with ensuring that a DNSSEC-signed domain remains valid during the transition from one DNS hosting provider to another. In particular he pointed out the challenge of the “5 day grace period” that comes into play with registrars. This is a critical challenge that we will continue to be discussing until we can collectively agree on a solution to make this work.
CloudFlare – DNSSEC and DNS Proxying
Following Jim was the presentation that many of us were very much looking forward to. John Graham-Cumming of CloudFlare spoke about the challenges of using DNSSEC in an environment such as a content-distribution network (CDN) where DNS proxying and redirection plays such a pivotal role. This is important as the lack of DNSSEC support in CDNs is one of the major blockages right now for many content providers to sign their websites with DNSSEC. John provided some solid information about the challenges they’ve seen, the tools they’ve developed and their plans for the future.
He very clearly stated that CloudFlare will support DNSSEC by the end of 2014 and is aiming to make it as easy for their customers as they have made IPv6 (which initially was a toggle button and now is on by default).
We certainly hope they will follow through on this – and doing so will immediately help secure a great number of web sites… and bring pressure on other CDN providers to follow suit.
Hardware Security Modules (HSMs) Benefits and Challenges
Next up we dove a bit down into crypto geekery and explored different options for the HSMs that are used by some to generate keys for DNSSEC. Roy Arends of NominetUK moderated and the presenters included:
- Richard Lamb, ICANN – Hardware Security Modules (HSMs) Benefits and Challenges
- Mark Southam, Ultra Electronics AEP – Hardware Security Modules (HSMs) Benefits and Challenges
- Roland van Rijswijk-Deij, SURFnet – SoftHSM: A Brief Overview
Rick Lamb kicked off the panel with an overview of why you might want to consider HSMs and what risk they are protecting against. Mark Southam followed with some info about his Keyper HSM product and then Roland van Rijswijk-Deij talked about the SoftHSM project aimed at letting you do all of this in software without requiring any specific hardware.
Operational Realities of Running DNSSEC
The final presentation before lunch was from Haya Schulman of the Technische Universität Darmstadt. She actually had two presentations although both were in a single slide deck. Her first presentation focused on measurements of recursive authoritative name servers and the methods that she undertook in her research. Given that a number of people in the audience were also involved with DNSSEC measurement her presentation generated some good discussion and questions. Her second presentation was on “Cipher-Suite Negotiation for DNSSEC” and presented ideas around how DNSSEC clients could know a servers algorithms and priorities. This again generated some good discussion.
Lunch Break
After Haya’s presentations we had lunch in the room, thanks to the generous sponsors of the event (THANK YOU!):
- Afilias
- CIRA
- Dyn
- Microsoft
- .SE
- SIDN
Having the food right there enabled many great conversations to continue – and allowed us to not have to find our way back to the room that was tucked in an odd part of the hotel.
DANE and DNSSEC Applications
After lunch we had our large panel session that involved multiple demos and running code! I was the moderator and the panelists included:
- Guido Witmond – A Use Case for DNSSEC: Phishing Protection
- Willem Toorop (Presenter), NLNet Labs — getDNS API Implementation
- Willem Toorop, NLNet Labs – Measuring DNSSEC Validating Resolvers Using RIPE ATLAS
- Paul Hoffman – DNSharness for DNSSEC
- Iain Learmonth (Presenter), University of Aberdeen – Demo of DANE-Enhanced Version of Off-the-Record Private Messaging Tool
- Joost Van Dijk, Surfnet – DANE Pilot: Integrating Certificate and Domain Services
Guido Witmond started off providing an overview of the DANE protocol and how it could be used to add a layer of trust to TLS certificates. He then went into a specific use case where he sees DANE and DNSSEC helping prevent phishing. Next Willem Toorop gave an overview of the getDNS API – this is really an important area and I would strongly encourage people to both view Willem’s slides and also view the getDNS API web site. I think this new API has some real promise to make it much easier for applications to interact with DNS and DNSSEC.
Willem continued with a second presentation around measuring DNSSEC validation using the RIPE Atlas probe network. This is important as we continue to search for meaningful ways to measure ongoing DNSSEC deployment. With Geoff Huston of APNIC Labs there in the room, who also does some DNSSEC measurements, there was some good discussion about how best to measure DNSSEC validation.
Paul Hoffman then took us back into application development with his presentation about DNSharness, a framework for testing name server implementations. While most people in the room were not aware of this open source work funded by VeriSign Labs, a good number expressed their interest in using the test framework when they returned to their regular organizations.
We then entered into that ever-risky segment of live demos with Iain Learmonth going first with a demo of a “Off-the-Record” (OTR) private instant messaging app based on draft-wouters-dane-otrfp. Iain used the dnskeys library for python in a modified version of Gajim’s OTR plugin to have a secure encrypted chat session with Willem sitting right next to him. It was very cool to see and while the demo was live Iain did provide some slides with screenshots so you can get a sense of what he was doing.
Joost van Dijk of SURFnet closed out the session with a live demo of how they integrated DANE into their service portal for their customers to automatically generate DANE’s TLSA record. Again, the demo was live but Joost provided a few slides that talk about what they did and some of the challenges they found.
All in all it was a great afternoon session with lots of technical meat for developers! Always great when you have running code inside of a workshop!
Wrapping Up
Finally, I ended the day thanking the participants and talking about how people in the session can help get DNSSEC deployed in different environments.
And then… after over 6.5 hours of intense focus on DNSSEC… we left the room to go back into all the other madness of a typical ICANN meeting!
On Toward ICANN 51 in Los Angeles on October 15…
With ICANN 51 behind us, the ICANN DNSSEC Workshop Program Committee is already looking forward to the next DNSSEC Workshop that will take place on Wednesday, October 15, 2014, at ICANN 51 in Los Angeles. The call for participation will be out soon, but I can see that in particular we are going to be looking for people who want to present on:
- NewgTLDs and DNSSEC – case studies, implementation details and more
- Email/SMTP and DANE/DNSSEC – we are seeing a great amount of interest in DANE from email providers and want to bring together people operating email services using DANE and also those involved with developing email servers and applications
- Root Key Rollover Potential Impacts – many of us are very concerned about the need to have a Root Key Rollover happen and want to talk more about potential impacts and also mitigation strategies.
Plus we are always looking for great DNSSEC or DANE case studies, measurements, cool tools or demos and other similar topics. Stay tuned for the announcement… but in the meantime start thinking about what YOU would like to present at ICANN 51 in LA!
P.S. If you haven’t yet started using DNSSEC, please check our “Start Here” page to find resources to help you out!