Limiting replay vulnerabilities in DNSSEC

Orlando, FL(2008)

引用 10|浏览12
暂无评分
摘要
The DNS security extensions (DNSSEC) added public key cryptography to the DNS, but problems remain in selecting signature lifetimes. A zonepsilas master server distributes signatures to secondary servers. The signatures lifetimes should be long so that a secondary server can still operate if the master fails. However, DNSSEC lacks revocation. Signed data can be replayed until the signature expires and thus zones should select a short signature lifetime. Operators must choose between reduced robustness or long replay vulnerability windows. This paper introduces a revised DNSSEC signature that allows secondary servers to operate even if the master has failed while simultaneously limiting replay windows to twice the TTL. Each secondary server constructs a hash chain and relays the hash chain anchor to the master server. The signature produced by the master server ensures the authenticity of the hash anchor and the DNS data. A secondary server includes both the signature and a hash chain value used by resolvers to limit signature replay. Our implementation shows the added costs are minimal compared to DNSSEC and ensures robustness against long-term master server failures. At the same time, we limit replay to twice the record TTL value.
更多
查看译文
关键词
secondary servers,hash anchor authenticity,dnssec signature,signature lifetimes,master server,network servers,replay vulnerability,dns security extensions,hash chain,internet,public key cryptography,vulnerability windows,digital signatures,short signature lifetime,silicon,security,limiting,robustness,public key,servers
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要