首页> 外文会议>IEEE Workshop on Secure Network Protocols >Limiting replay vulnerabilities in DNSSEC
【24h】

Limiting replay vulnerabilities in DNSSEC

机译:限制DNSSEC中的重播漏洞

获取原文

摘要

The DNS Security Extensions (DNSSEC) added public key cryptography to the DNS, but problems remain in selecting signature lifetimes. A zone’s master server distributes signatures to secondary servers. The signatures lifetimes should be long so that a secondary server can still operate if the master fails. However, DNSSEC lacks revocation. Signed data can be replayed until the signature expires and thus zones should select a short signature lifetime. Operators must choose between reduced robustness or long replay vulnerability windows. This paper introduces a revised DNSSEC signature that allows secondary servers to operate even if the master has failed while simultaneously limiting replay windows to twice the TTL. Each secondary server constructs a hash chain and relays the hash chain anchor to the master server. The signature produced by the master server ensures the authenticity of the hash anchor and the DNS data. A secondary server includes both the signature and a hash chain value used by resolvers to limit signature replay. Our implementation shows the added costs are minimal compared to DNSSEC and ensures robustness against long-term master server failures. At the same time, we limit replay to twice the record TTL value.
机译:DNS安全扩展(DNSSEC)向DNS添加了公钥加密,但问题仍在选择签名生命周期内。区域的主服务器将签名分配给辅助服务器。签名寿命应该很长,使得如果主设备失败,则辅助服务器仍然可以运行。但是,DNSSEC缺乏撤销。可以重播签名的数据,直到签名到期,因此区域应选择短签名寿命。操作员必须在减少稳健性或长期重播漏洞Windows之间进行选择。本文介绍了一个修改后的DNSSEC签名,即使主服务器在同时限制重放Windows到TTL的两倍时,也允许辅助服务器运行。每个辅助服务器构造哈希链并将哈希链锚驻留到主服务器。主服务器产生的签名可确保散列锚和DNS数据的真实性。辅助服务器包括签名和解析器使用的哈希链值来限制签名重播。与DNSSEC相比,我们的实现显示增加的成本最小,并确保对长期主服务器故障的鲁棒性。与此同时,我们将重播重播到TTL值的两倍。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号