1 / 1

Windows DNSSEC Status

Windows DNSSEC Status. Windows Server® 2008 R2 provides support for DNSSEC Recommend: Start learning today ! Designed to secure internal DNS static zones, and be a DNSSEC NSEC SHA1 validator for Internet DNSSEC

frye
Download Presentation

Windows DNSSEC Status

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Windows DNSSEC Status • Windows Server® 2008 R2 provides support for DNSSEC • Recommend: Start learning today ! • Designed to secure internal DNS static zones, and be a DNSSEC NSEC SHA1 validator for Internet DNSSEC • But Internet DNS deployed root NSEC RSA SHA256, and TLDs used NSEC3 with RSA SHA1, so Windows Server® 2008 R2 DNS Server can’t validate Internet DNSSEC • Windows Server® 2008 R2 can remain as DNSSEC validator for internal static zones • Need 3rd party validating resolver to handle Internet DNS validation • Windows® 7 DNS client can be “DNSSEC aware”, but does not support client validation • Designed to make sure internal domain DNS namespace is validated, not Internet • Name Resolution Policy Table (NRPT) specifies suffix that requires validation from DNS server • Can exempt Internet resolvable “internal” names used for split DNS, e.g. email.corp.contoso.com • For mobile clients, don’t use NRPT to enforce DNSSEC validation for public DNS zones e.g. www.socialsecurity.gov – if not behind DNSSEC validating resolver, query will fail & access blocked • Windows® 7 DNS client APIs do not expose DNSSEC details • Model is that Internet validation is by ISP caching resolver, so app-transparent • Windows® 7 nslookup tool – own DNS client, not DNSSec aware, use Netmon for tshoot • Client tools: dig 9.6.1 distrib with BIND, QTools validator from DHS/Sparta, Netmon 3.4 • Caution: DNSSEC-aware applications likely providing a separate DNS client within the app. Will likely run into deployment and performance issues

More Related