Difference between revisions of "DNSSEC"

From ArchWiki
Jump to: navigation, search
(Facts)
m (rm red links)
(26 intermediate revisions by 9 users not shown)
Line 1: Line 1:
[[Category:Cryptography (English)]]
+
[[Category:Security]]
[[Category:Security (English)]]
+
[[Category:Domain Name System]]
[[Category:Web Server (English)]]
+
  
 +
{{Poor writing}}
 
{{stub}}
 
{{stub}}
  
Line 13: Line 13:
 
* https://www.dnssec-tools.org/
 
* https://www.dnssec-tools.org/
 
* http://linux.die.net/man/1/sshfp
 
* http://linux.die.net/man/1/sshfp
* http://bugs.archlinux.org/task/20325 - [DNSSEC] Add DNS validation support to ArchLinux
+
* https://bugs.archlinux.org/task/20325 - [DNSSEC] Add DNS validation support to ArchLinux
  
 
== DNSSEC Packages ==
 
== DNSSEC Packages ==
* '''dnssec-root-zone-trust-anchors''' http://aur.archlinux.org/packages.php?ID=39315
+
{{Merge|DNSSEC#Howto enable DNSSEC in specific software|Duplicated information}}
 +
* {{pkg|dnssec-anchors}}
 
** essential package contains keys to internet from [https://www.iana.org/dnssec/ IANA] stored in /usr/share/dnssec-trust-anchors/
 
** essential package contains keys to internet from [https://www.iana.org/dnssec/ IANA] stored in /usr/share/dnssec-trust-anchors/
 
** VERY important!
 
** VERY important!
* '''ldns''' http://aur.archlinux.org/packages.php?ID=18996
+
* {{Pkg|ldns}}
 
** DNS(SEC) library '''libldns'''
 
** DNS(SEC) library '''libldns'''
 
** drill tool (like dig with DNSSEC support)
 
** drill tool (like dig with DNSSEC support)
Line 30: Line 31:
 
***** '''drill -TD badsign-a.test.dnssec-tools.org'''
 
***** '''drill -TD badsign-a.test.dnssec-tools.org'''
 
**** to use root-zone trust anchor add option '''-k /usr/share/dnssec-trust-anchors/root-anchor.key'''
 
**** to use root-zone trust anchor add option '''-k /usr/share/dnssec-trust-anchors/root-anchor.key'''
* '''dnssec-tools''' http://aur.archlinux.org/packages.php?ID=39294 ''(package is very experimental and volatile right now)''
+
* {{aur|dnssec-tools}} ''(package is very experimental and volatile right now)''
** '''Currently SEGFAULTs on successfuly validated domains''' on ArchLinux... watch bugtrack: https://www.dnssec-tools.org/trac/search?q=archlinux
+
 
** https://www.dnssec-tools.org/
 
** https://www.dnssec-tools.org/
 
** another good library '''libval''' which can add DNSSEC support to lots of programs
 
** another good library '''libval''' which can add DNSSEC support to lots of programs
Line 38: Line 38:
 
*** https://www.dnssec-tools.org/wiki/index.php/Applications
 
*** https://www.dnssec-tools.org/wiki/index.php/Applications
 
** '''libval-shim''' LD_PRELOAD library to enable DNSSEC for lots of DNSSEC unaware programs http://www.dnssec-tools.org/docs/tool-description/libval_shim.html
 
** '''libval-shim''' LD_PRELOAD library to enable DNSSEC for lots of DNSSEC unaware programs http://www.dnssec-tools.org/docs/tool-description/libval_shim.html
** [[PERL]] API
+
** PERL API
* '''openssh-dnssec''' http://aur.archlinux.org/packages.php?ID=39296
+
* {{aur|openssh-dnssec}}
 
** see lower on this page
 
** see lower on this page
* '''sshfp''' http://aur.archlinux.org/packages.php?ID=29185
+
* {{aur|sshfp}}
 
** Generates DNS SSHFP-type records from SSH public keys from public keys from a known_hosts file or from scanning the host's sshd daemon.
 
** Generates DNS SSHFP-type records from SSH public keys from public keys from a known_hosts file or from scanning the host's sshd daemon.
 
** not directly related to DNSSEC, but i guess this will become very popular because of DNSSEC
 
** not directly related to DNSSEC, but i guess this will become very popular because of DNSSEC
 +
* {{aur|opendnssec}}
 +
** Signs DNS zones to be later published by a DNS server (bind, nsd, etc.)
 +
** Automates refreshing signatures, key rollovers
  
 
== Howto enable DNSSEC in specific software ==
 
== Howto enable DNSSEC in specific software ==
 +
 +
{{Merge|DNSSEC#DNSSEC Packages|Duplicated information}}
  
 
If you want full support of DNSSEC, you need each single application to use DNSSEC validation. It can be done using several ways:
 
If you want full support of DNSSEC, you need each single application to use DNSSEC validation. It can be done using several ways:
Line 61: Line 66:
 
* dnssec-tools + patch: https://www.dnssec-tools.org/wiki/index.php/Ssh
 
* dnssec-tools + patch: https://www.dnssec-tools.org/wiki/index.php/Ssh
 
** http://www.dnssec-tools.org/readme/README.ssh
 
** http://www.dnssec-tools.org/readme/README.ssh
* openssh-dnssec wrapper http://aur.archlinux.org/packages.php?ID=39296
+
* {{aur|openssh-dnssec}} wrapper
 
** DNSSEC (ldns) wrapper for OpenSSH client.
 
** DNSSEC (ldns) wrapper for OpenSSH client.
 
** instantly adds minimal DNSSEC support to ssh (no SSHFP support).
 
** instantly adds minimal DNSSEC support to ssh (no SSHFP support).
Line 72: Line 77:
 
* dnssec-tools + firefox patch: https://www.dnssec-tools.org/wiki/index.php/Firefox
 
* dnssec-tools + firefox patch: https://www.dnssec-tools.org/wiki/index.php/Firefox
  
=== [[Chromium]]/<s>[[Google Chrome]]</s> (secure browsing - enchancment of HTTPS) ===
+
=== [[Chromium]]/<s>Google Chrome</s> (secure browsing - enchancment of HTTPS) ===
 
* Vote for [http://code.google.com/p/chromium/issues/detail?id=50874 #50874]
 
* Vote for [http://code.google.com/p/chromium/issues/detail?id=50874 #50874]
 
** Patches not yet...
 
** Patches not yet...
Line 78: Line 83:
 
*** you need ldns and dnssec-root-zone-trust-anchors packages for this plugin
 
*** you need ldns and dnssec-root-zone-trust-anchors packages for this plugin
  
=== [[Bind]] (serving signed DNS zones) ===
+
=== BIND (serving signed DNS zones) ===
 +
* See [[BIND]] for more information on BIND
 
* http://www.dnssec.net/practical-documents
 
* http://www.dnssec.net/practical-documents
 
** http://www.cymru.com/Documents/secure-bind-template.html '''(configuration template!)'''
 
** http://www.cymru.com/Documents/secure-bind-template.html '''(configuration template!)'''
Line 84: Line 90:
 
** http://www.bind9.net/BIND-FAQ
 
** http://www.bind9.net/BIND-FAQ
 
* http://blog.techscrawl.com/2009/01/13/enabling-dnssec-on-bind/
 
* http://blog.techscrawl.com/2009/01/13/enabling-dnssec-on-bind/
 +
* Or use an external mechanisms such as OpenDNSSEC (fully-automatic key rollover)
  
 
=== [[Postfix]] (fight spam and frauds) ===
 
=== [[Postfix]] (fight spam and frauds) ===
 
* dnssec-tools + patch
 
* dnssec-tools + patch
=== [[jabberd]] (fight spam and frauds) ===
+
=== jabberd (fight spam and frauds) ===
 
* dnssec-tools + patch
 
* dnssec-tools + patch
 
=== [[Thunderbird]] (secure logins) ===
 
=== [[Thunderbird]] (secure logins) ===
 
* dnssec-tools + patch
 
* dnssec-tools + patch
=== [[lftp]] (secure downloads and logins) ===
+
=== lftp (secure downloads and logins) ===
 
* dnssec-tools + patch
 
* dnssec-tools + patch
 
=== [[wget]] (secure downloads) ===
 
=== [[wget]] (secure downloads) ===
Line 99: Line 106:
 
=== [[Sendmail]] (fight spam and frauds) ===
 
=== [[Sendmail]] (fight spam and frauds) ===
 
* dnssec-tools + patch
 
* dnssec-tools + patch
=== [[LibSPF]] ===
+
=== LibSPF ===
 
* dnssec-tools + patch
 
* dnssec-tools + patch
=== [[ncftp]] (secure downloads and logins) ===
+
=== ncftp (secure downloads and logins) ===
 
* dnssec-tools + patch
 
* dnssec-tools + patch
=== [[libpurple]] ([[pidgin]] + [[finch]] -> secure messaging) ===
+
=== libpurple ([[pidgin]] + finch -> secure messaging) ===
 
* no patches yet
 
* no patches yet
 
* Vote for [http://developer.pidgin.im/ticket/12413 #12413]
 
* Vote for [http://developer.pidgin.im/ticket/12413 #12413]
 
  
 
== DNSSEC Hardware ==
 
== DNSSEC Hardware ==
You can check if your router/modem/AP/etc... supports DNSSEC (many different features) using [http://www.dnssec-tester.cz/ dnssec-tester] (Python & GTK+ based app) to know if it's DNSSEC compatible and using this tool you can also upload gathered data to server, so other users and manufacturers can be informed about compatibility of their devices and eventualy fix the firmware (they will be probably urged to do so). (Before running tester please make sure, that you do not have any other nameservers in /etc/resolv.conf). You can also find the results of performed tests on [http://www.dnssec-tester.cz/ dnssec-tester] website.
+
You can check if your router, modem, AP, etc. supports DNSSEC (many different features) using [http://www.dnssec-tester.cz/ dnssec-tester] (Python & GTK+ based app) to know if it is DNSSEC-compatible, and using this tool you can also upload gathered data to a server, so other users and manufacturers can be informed about compatibility of their devices and eventualy fix the firmware (they will be probably urged to do so). (Before running dnssec-tester please make sure, that you do not have any other nameservers in {{ic|/etc/resolv.conf}}). You can also find the results of performed tests on the [http://www.dnssec-tester.cz/ dnssec-tester] website.
  
 
== See Also ==
 
== See Also ==
 
* [[AppArmor]]
 
* [[AppArmor]]

Revision as of 17:38, 11 June 2013


Tango-edit-clear.pngThis article or section needs language, wiki syntax or style improvements.Tango-edit-clear.png

Reason: please use the first argument of the template to provide a brief explanation. (Discuss in Talk:DNSSEC#)

Tango-document-new.pngThis article is a stub.Tango-document-new.png

Notes: please use the first argument of the template to provide more detailed indications. (Discuss in Talk:DNSSEC#)

Facts

DNSSEC Packages

Merge-arrows-2.pngThis article or section is a candidate for merging with DNSSEC#Howto enable DNSSEC in specific software.Merge-arrows-2.png

Notes: Duplicated information (Discuss in Talk:DNSSEC#)

Howto enable DNSSEC in specific software

Merge-arrows-2.pngThis article or section is a candidate for merging with DNSSEC#DNSSEC Packages.Merge-arrows-2.png

Notes: Duplicated information (Discuss in Talk:DNSSEC#)

If you want full support of DNSSEC, you need each single application to use DNSSEC validation. It can be done using several ways:


OpenSSH (fixes only weak point in SSH design)

Firefox (secure browsing - enchancment of HTTPS)

Chromium/Google Chrome (secure browsing - enchancment of HTTPS)

  • Vote for #50874
    • Patches not yet...
    • DNSSEC Drill extension (EXPERIMENTAL!)
      • you need ldns and dnssec-root-zone-trust-anchors packages for this plugin

BIND (serving signed DNS zones)

Postfix (fight spam and frauds)

  • dnssec-tools + patch

jabberd (fight spam and frauds)

  • dnssec-tools + patch

Thunderbird (secure logins)

  • dnssec-tools + patch

lftp (secure downloads and logins)

  • dnssec-tools + patch

wget (secure downloads)

  • dnssec-tools + patch

proftpd

  • dnssec-tools + patch

Sendmail (fight spam and frauds)

  • dnssec-tools + patch

LibSPF

  • dnssec-tools + patch

ncftp (secure downloads and logins)

  • dnssec-tools + patch

libpurple (pidgin + finch -> secure messaging)

  • no patches yet
  • Vote for #12413

DNSSEC Hardware

You can check if your router, modem, AP, etc. supports DNSSEC (many different features) using dnssec-tester (Python & GTK+ based app) to know if it is DNSSEC-compatible, and using this tool you can also upload gathered data to a server, so other users and manufacturers can be informed about compatibility of their devices and eventualy fix the firmware (they will be probably urged to do so). (Before running dnssec-tester please make sure, that you do not have any other nameservers in /etc/resolv.conf). You can also find the results of performed tests on the dnssec-tester website.

See Also