Master System & Network Engineering Securing the last mile of DNS with CGA-TSIG Research Project 2 Student: Supervisors: Marc Buijsman Matthijs Mekking
[email protected] (NLnet Labs)
[email protected] Jeroen van der Ham (UvA)
[email protected] 7 January 2014 Abstract This document describes the research performed during the course of Research Project 2 of the Master's in System and Network Engineering at the University of Amsterdam, under the supervision of NLnet Labs. Research has been done on the use of a proposed protocol called CGA-TSIG as a potential solution to the last mile problem of the Domain Name System (DNS). A proof of concept has been implemented, which resulted in the identification of several problems with the proposed protocol. Nevertheless, it was found that CGA-TSIG can work as believed to be intended, even though the protocol only works on IPv6. An automated method for authenticating the IP addresses of recursive name servers is additionally needed for CGA-TSIG to be a useful and fully secure solution to the last mile problem, but research to such methods was out of the scope of this project and would require future research. CONTENTS Contents 1 Introduction 1 1.1 Research question.........................................2 1.2 Approach.............................................2 2 Background 4 2.1 Transaction Signature (TSIG)..................................4 2.1.1 Signature creation....................................4 2.1.2 Signature verification..................................5 2.1.3 Security..........................................6 2.1.4 Drawbacks........................................6 2.2 Cryptographically Generated Addresses (CGA)........................7 2.2.1 CGA generation.....................................7 2.2.2 CGA verification.....................................8 2.2.3 CGA signatures.....................................