IT tutorials
 
Technology
 

Windows Server 2012 : Secure DNS with DNSSEC - Configuring a DNSSEC Zone

10/23/2013 2:10:15 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

1. DNSSEC Components

The DNSSEC relies on signed zones, which is a zone whose records are signed as defined by RFC 4035. A signed zone contains one or more of the new DNSEC record types, which are DNSKEY, NSEC, RRSIG, and DS records. These records allow DNS data to be validated by resolvers.

Zone Signing Key (ZSK) is the encryption key used to sign the zone, essentially a public and private key combination stored in a certificate. The Key Signing Key (KSK) is the key used to sign the ZSK to validate it, essentially a public and private key combination as well.

The DNSKEY record is a DNSSEC record type used to store a public key. The KSK and the ZSK public keys are stored in the DNSKEY records to allow the zone signatures to be validated.

The Next Secure (NSEC) record is a DNSSEC record type used to prove the nonexistence of a DNS name. This allows DNS clients to be sure that if a record is not retrieved in a DNS lookup, the record does not exist in the DNSSEC zone.

The Resource Record Signature (RRSIG) record is used to hold the signature for a DNS record. For each A record, there will be a corresponding RRSIG record. For each NSEC record, there will also be a corresponding RRSIG record.

The Delegation Signer (DS) record is used to secure delegations to other DNS servers and confirm their validity. This prevents man-in-the-middle DNS servers from breaking the security chain during recursive lookups.

A nonvalidating security-aware stub resolver is a security-aware stub resolver that trusts one or more security-aware DNS servers to perform DNSSEC validation on its behalf. All Windows DNS clients are nonvalidating security-aware stub resolvers, meaning they do not actually do the DNSSEC validation.

The Windows DNS client is nonvalidating, meaning that the Windows DNS client does not check to see whether the DNS records are secured but instead implicitly trusts the DNS server. The Windows DNS client flags the DNS request based on the NRPT table and expects the DNS server to perform the check for it. The DNS server returns the results regardless and indicates whether the check for DNSSEC was successful. If the check was successful, the Windows DNS client passes the results to the application requesting the DNS lookup.


Note

To really ensure the security of the DNS requests, the DNS client must be able to validate the DNS server. The method of doing this for Windows systems is to use IPsec. To really, really secure DNS, IPsec must be deployed as well.

2. Important Performance Considerations for DNSSEC

Although DNSSEC introduces important security benefits, there are some impacts to deploying it.

Some impacts to consider when deploying DNSSEC are as follows:

Increased memory requirements—A DNSSEC zone may require as much as five times the memory on the Windows Server 2012 server as an unsigned zone.

Increased network traffic—A response to a DNS query against a DNSSEC zone will return additional DNSSEC records as compared to a unsigned zone and will increase the network traffic accordingly.

Increased processor utilization—The additional workload of validating DNSSEC zone data during queries can increase the processor load on the Windows Server 2012 server hosting the DNSSEC zone.

Increased number of DNS records—A DNSSEC zone will have up to four times the number of records as an unsigned zone. For large zones, this can be a significant factor.

It is important to ensure that adequate server-level resources are available when deploying DNSSEC, especially into existing Windows Server 2012 servers. For well-tuned virtual servers that are running at capacity, the additional workload to support DNSSEC on large zones can be a significant increase.

3. Configuring a DNSSEC Zone

In this scenario, the zone companyabc.com will be encrypted. The zone is unsecured to start and contains several records, shown in Figure 1.

Image

Figure 1. Unsecured DNS zone.

The DNSSEC configuration and management is done using the DNS Manager utility. To sign a DNS zone, follow these steps:

1. Launch Server Manager from a Windows 2012 server with a full GUI.

2. Select the DNS section. The list of servers in the server pool with the DNS role installed will be shown.

3. Right-click the DNS server to configure and select DNS Manager.

4. Select the DNS server name to configure.

5. Select the Forward Lookup Zones node.

6. Select the zone to sign.

7. Right-click the zone and select DNSSEC and then Sign the Zone.

8. At the Zone Signing Wizard screen, click Next.

9. Select Use recommended setting to sign the zone, then click Next.

10. Review the settings, and then click Next to sign the zone.

11. Click Finish to exit the wizard.

The zone companyabc.com is now encrypted. Figure 2 shows the zone records after encryption.

Image

Figure 2. Encrypted zone records.

There are four records for each previous entry now:

• Standard A Record

• RR Signature (RRSIG) Record for the Standard Record

• Next Secure (NSEC) Record

• RR Signature (RRSIG) Record for the Next Secure Record

To distribute the trust anchor for the DNSSEC zone, follow these steps:

1. Launch Server Manager from a Windows 2012 server with a full GUI.

2. Select the DNS section. The list of servers in the server pool with the DNS role installed will be shown.

3. Right-click the DNS server to configure and select DNS Manager.

4. Select the DNS server name to configure.

5. Select the Forward Lookup Zones node.

6. Select the zone to sign.

7. Right-click the zone and select DNSSEC and then Properties.

8. Select the Trust Anchor tab.

9. Check the Enable the Distribution of Trust Anchors for This Zone box.

10. Click OK to save the changes.

11. Click Yes to confirm the change.

12. Click OK when the setting is complete.

After the setting, there will be a new folder named Trust Points that contains the a pair of records for the zone of type DNS KEY. These contain the public key for the trust anchor for the signed zone.

Without any additional configuration, the DNS clients blissfully ignore the DNSSEC for the zone. To have the clients use the DNSSEC properties of the DNS zone, they must be configured to request secure DNS entries. This is done by configuring a Name Resolution Policy Table (NRPT) policy for clients.

The NRPT policy can be configured through group policy. To create a NRPT group policy for the secure.companyabc.com zone, follow these steps:

1. Launch Server Manager from a Windows 2012 server with a full GUI.

2. Select Tools and then Group Policy Management.

3. Expand Forest: companyabc.com, Domains, and select companyabc.com.

4. Right-click companyabc.com and select Create a GPO in This Domain, and Link It Here.

5. Enter NRPT Group Policy Object and click OK.

6. Right-click the NRPT Group Policy Object link and select Edit.

7. Expand Computer Configuration, Policies, Windows Settings, and select Name Resolution Policy.

8. In the To Which Part of the Namespace Does This Rule Apply? Field, select Suffix and enter companyabc.com.

9. On the DNSSEC tab, check the Enable DNSSEC in This Rule box.

10. Check the Validation box Require DNS Clients to Check That Name and Address Data Has Been Validated.


Note

The wording of this option is precise. The Windows DNS client will check that the DNS server has validated the data, but will not do the validation itself.


11. Figure 3 shows how the record should look. Click the Create button to create the record in the Name Resolution Policy Table at the bottom of the screen.

Image

Figure 3. Name-resolution policy.

12. Close the GPMC editor to save the changes.

Now, all domain DNS clients will request that DNS servers check the validity of the lookups for domain companyabc.com using DNSSEC.

 
Others
 
- SQL Server 2008 : DBCC validation - Controlling CHECKDB impact
- SQL Server 2008 : DBCC validation - Preventing and detecting corruption
- SQL Server 2008 : DBCC validation overview
- System Center Configuration Manager 2007 : Configuring Client Agents (part 5) - Software Metering
- System Center Configuration Manager 2007 : Configuring Client Agents (part 4) - Mobile Devices, Remote Tools , Network Access Protection
- System Center Configuration Manager 2007 : Configuring Client Agents (part 3) - Advertised Programs, Computer Client
- System Center Configuration Manager 2007 : Configuring Client Agents (part 2) - Modifying the SMS_Def.mof File, Software Inventory
- System Center Configuration Manager 2007 : Configuring Client Agents (part 1) - Hardware Inventory
- System Center Configuration Manager 2007 : Client Management - Configuring the Management Point
- System Center Configuration Manager 2007 : Related Technologies and References - AMT and vPro
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us