OARConline 32b

UTC
Anand Buddhdev (RIPE NCC), Jan Včelák (NS1), Keith Mitchell (DNS-OARC), Ralph Dolmans (NLnet Labs), Shumon Huque (Salesforce)
Description

DNS-OARC is currently only running online workshops.

The second OARConline will take place on August 11th (13:00 - 15:00 UTC).

DNS-OARC is a non-profit, membership organization that seeks to improve the security, stability, and understanding of the Internet's DNS infrastructure. Part of these aims are achieved through workshops.

DNS-OARC Workshops are open to OARC members and to all other parties interested in DNS operations and research.

Social Media hashtag: #OARC32b and #OARConline


WORKSHOP PATRONS 2020


PROMOTER

Verisign

Annual Workshop Patrons for 2020 are available. Details at:

https://www.dns-oarc.net/workshop/patronage-opportunities


OARConline 32b SPONSORS


HOST // DELUXE // ASSOCIATE // CONTRIBUTOR

Your company name here?

Sponsorship opportunities for OARC (online) 32b are available. Details at:

https://www.dns-oarc.net/workshop/sponsorship-opportunities


 

Participants
  • Akira Kato
  • Alejandro Acosta
  • Alexandre Pion
  • Anand Buddhdev
  • Andreas Schulze
  • Andreas Taudte
  • Anthony Maszeroski
  • Arife Vural-Butcher
  • Axel Koolhaas
  • Brantly Millegan
  • Brett Carr
  • Brian Hartvigsen
  • Carl Clements
  • Carlos Ganan
  • Casey Deccio
  • Cathy Almond
  • Christopher Baker
  • Cricket Liu
  • Daniel Hanks
  • Daniel Stirnimann
  • David Kinzel
  • David Lawrence
  • Denesh Bhabuta
  • Duane Powers
  • Eduardo Duarte
  • Eduardo Mercader
  • Edward LEWIS
  • Elmar K. Bins
  • Erwin Lansing
  • Florian Obser
  • Fred Baker
  • Geoff Huston
  • Gonzalo Romero
  • Guillermo Cicileo
  • Hanieh Bagheri
  • Henri L
  • Herbert Faleiros
  • Hiro Hotta
  • Hugo Salgado
  • James Richards
  • Jan Včelák
  • Jaromír Talíř
  • Jason Livingood
  • Jeff Damick
  • Jerry Lundström
  • Jessy Vetter
  • Jinyuan Feng
  • John Heidemann
  • John Kristoff
  • John Todd
  • Jonas Andersson
  • Jonathan Hewlett
  • Jonathan Reed
  • Jorge Cano
  • Josh Simpson
  • JOTHAN FRAKES
  • Karl Reuss
  • Kazunori Fujiwara
  • Keith Mitchell
  • Keith Rosenblatt
  • Kevin Chen
  • Klaus Darilion
  • Larry Campbell
  • Libor Peltan
  • Maarten Wullink
  • Manu Bretelle
  • Marc Groeneweg
  • Marco Diaz
  • Mat Ford
  • Matt Diffenderfer
  • Matthew Pounsett
  • Mauricio Vergara Ereche
  • Michael Daly
  • Miles McCredie
  • Milos Milosavljevic
  • Nicholas Kindberg
  • Nicolai Leymann
  • Niek Willems
  • Ondrej Sury
  • Otto Moerbeek
  • Pallavi Aras
  • Paul Duffy
  • Paul Harris
  • Paul Hoffman
  • Paul Muchene
  • Paul Vixie
  • Peter Davies
  • Peter Janssen
  • Peter Koch
  • Peter van Dijk
  • Petr Špaček
  • Phil Regnauld
  • Pieter Lexis
  • Puneet Sood
  • Ralf Weber
  • Ralph Dolmans
  • Ray Bellis
  • Ricardo Schmidt
  • Rick Burkinshaw
  • Robert Edmonds
  • Robert Story
  • Roger Murray
  • Roland Dobbins
  • Roy Arends
  • Sara Dickinson
  • Sebastian Castro
  • Shivan Sahib
  • Shuai Hao
  • Shumon Huque
  • Sion Lloyd
  • Steve DeJong
  • Steven Edwin
  • Steven Parsons
  • Susan Graves
  • Suzanne Woolf
  • Sven Van Dyck
  • Swapneel Patnekar
  • Tejas Karandikar
  • Tim April
  • Tjeerd Slokker
  • Ulrich Wisser
  • Vicky Risk
  • Viktor Dukhovni
  • Wayne MacLaurin
  • Wes Hardaker
  • Willem Toorop
  • Yaroslav Kolomiiets
  • Yazid AKANHO
  • Yoshitaka Aharen
  • Zarko Kecic
    • 12:45 13:00
      Webinar room opens - while waiting, grab a drink and mingle with your peers at https://chat.dns-oarc.net 15m

      Sign up for an account on the chat server, via:

      If you are an OARC member contact (ie, with a Portal login), email admin@dns-oarc.net for your specific invitation

      Anyone else via:
      https://chat.dns-oarc.net/signup_user_complete/?id=pr3ycckbc7ygzg38uwyr9kz74y

    • 13:00 13:05
      Welcome by Keith Mitchell (OARC President) 5m
    • 13:05 13:30
      The Current State of DNS Resolvers and RPKI Protection. 25m

      The Border Gateway Protocol (BGP) is responsible for routing on the Internet. BGP has no security measures which makes it prone to IP prefix hijacking and route leaks. To defend against these threads, Resource Public Key Infrastructure (RPKI) has been developed by the IETF. RPKI secures the Internet’s routing infrastructure by signing & validating prefix origin data.

      However, there are still situations that one may indirectly fall victim to prefix hijacks even if their own AS is RPKI protected. A good example of this is the Amazon Route 53 BGP hijack. In this example, the prefixes of the Amazon authoritative DNS servers were hijacked. Any AS with a DNS resolver not protected by RPKI would receive a valid but malicious response from the hijacked authoritative DNS server, even if the AS where the query originated from was RPKI protected. For end-users to be fully protected, in addition to the network in which they reside, they also need their DNS resolvers to be in RPKI protected networks.

      In this talk we will present on a research on the state of RPKI protection of DNS resolvers. We used RIPE Atlas to send queries through the RIPE Atlas probe configured DNS resolvers. The queries resolution was through a CNAME referencing to a domain served on a invalid prefix. This enabled us to determine whether a probe’s DNS resolver was RPKI protected or not. Measurements have been done all DNS Resolvers on all RIPE Atlas probes, hourly since 23rd of January.

      Speaker: Willem Toorop (NLnet Labs)
    • 13:30 13:45
      LocalRoot -- Serve yourself the DNS root plus 15m

      The LocalRoot project at ISI, driven by Wes Hardaker, is a project that allows users to:

      • Deploy a securely-obtained and pre-cached copy of the root and other zones in resolvers
      • Easily implement and deploy a pre-caching technology (like, but not equal to, RFC8806)
      • Receive DNS notifications when the root and other zones change
      • Perform research about the DNS root and other zones

      A talk at DNS-OARC would concentrate on two aspects:

      1. The background behind LocalRoot and its architecture
      2. Recent updates in the infrastructure and new features, which include:
        • IPv6 support
        • LocalRoot now has three upstream name-serves to serve mirrored domains
        • Suport added for generation of additional nameserver configuration:
          • Bind
          • Unbound
          • NSD
        • LocalRoot infrastructure is now in place to mirror zones other than just the root. Currently available zones for mirroring:
          • . (The root zone)
          • .arpa
          • root-servers.net
          • dnssec-tools.org
        • Infrastructure is in place for E-Mailing LocalRoot announcements and error tracking (automated monitoring of your systems coming soon)
        • Selection of E-Mail notifications can be set in the new account preferences page.
        • Multiple usability improvements (its now possible to delete keys, servers, etc)
      Speaker: Wes Hardaker (USC/ISI)
    • 13:45 14:00
      Break 15m
    • 14:00 14:25
      Defragmenting DNS - Determining the optimal maximum UDP response size for DNS 25m

      DNS uses the connectionless User Datagram Protocol (UDP) by default, which causes problems with Path MTU Discovery. This is because DNS servers are stateless, and do not remember queries they have already answered. The Path MTU (PMTU) should be used as maximum size to stop fragmentation from happening. Extension Mechanisms for DNS (EDNS(0)) expands DNS with the UDP Message Size field, which communicates the response size capability of the resolver. This allows resolvers to specify the EDNS(0) they support.
      This presentation reports on a research, with as aim to provide data for a considered optimal maximum EDNS(0) UDP message size, by measuring the PMTU to which resolvers and stub resolvers on the Internet are subject. We did this by creating an environment to serve different sized DNS responses and querying this environment across the Internet. This aligns with the goals DNS Flag Day 2020. Our ambition is to suggest defaults for the maximum EDNS(0) message size for DNS.

      Speakers: Axel Koolhaas (University of Amsterdam), Tjeerd Slokker (University of Amsterdam)
    • 14:25 14:50
      Defining a DNS Statistical Core 25m

      For the purposes of long-term statistical studies of the DNS, a "DNS Statistical Core" is introduced. This is meant to be a basis for statistical studies but the development of the core's map has been its own interesting project. "Core" in the name refers to the inclusion of the global public Internet's root zone, top-level zones, reverse map zones and other affiliated zones, relying mostly on access to reports of process activity related to the Root Registry, widely available zone files and other resources. The map produces JSON-formatted files for consumption by observation and analysis scripts, with easy access to many features of zones, nameservers, and addresses involved.

      Speaker: Edward LEWIS (ICANN)
    • 14:50 15:00
      Additional Q&A / Wrap Up 10m
    • 15:00 16:00
      BYOD OARConline Social Event 1h

      Time to catch up with industry peers and colleagues. This will be a free-flow session and we will facilitate online breakout rooms if needed. Details will only be sent to those who attend the main Workshop prior to this.

Your browser is out of date!

Update your browser to view this website correctly. Update my browser now

×