|  ICACT20220132 Slide.01 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | My name is Yong Jin from Tokyo Institute of Technology, Japan, today, I am going to talk about acceleration of a client based DNSSEC validation system in parallel with two full-service resolvers". | 
   
    |  ICACT20220132 Slide.02 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | Here is the outline of my presentation. | 
   
    |  ICACT20220132 Slide.03 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | As you know well, IP addresses are necessary for the communication in the Internet 
but they are not appropriate for memorizing. Therefore domain names are mainly 
used instead for Internet users and service providers. Accordingly, domain name 
system is necessary for the translation between IP addresses and domain names. | 
   
    |  ICACT20220132 Slide.04 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | In domain name system, there are two types of DNS servers, authoritative DNS server 
and cache DNS server.  Authoritative DNS server runs domain name management with 
authorization while cache DNS server provides name resolution service for the end 
clients. As shown in the figure, the client sends DNS query to the cache DNS server 
and the cache DNS server performs domain name resolution by querying each 
authoritative DNS server. Finally, the cache DNS server replies the answer back to the 
client. | 
   
    |  ICACT20220132 Slide.05 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | Although cache DNS server can improve domain name resolution performance, it has 
a well-known security concern named cache poisoning attack. The attacker can make 
cache DNS server add fake DNS resource records which make the client access malicious 
web sites. A normal cache DNS server has no function to verify the integrity of DNS 
responses. | 
   
    |  ICACT20220132 Slide.06 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | As an effective solution for cache poisoning attack, DNSSEC has been proposed and 
standardized. DNSSEC uses public cryptography and guarantees the integrity of DNS 
responses between cache DNS server and authoritative DNS server. As shown in this 
figure, the authoritative DNS server signs the zone file using its secret key and replies 
the corresponding DNS resource records with the signature and the public key to the 
cache DNS server. Then, the cache DNS server verifies the signature using the public 
key and check the integrity of the DNS response. Although DNSSEC can avoid cache 
poisoning attacks but it also cause some issues in terms of workload increase on 
cache DNS server and domain name resolution failure in case of DNSSEC validation 
failure. | 
   
    |  ICACT20220132 Slide.07 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | In order to solve the existing issues of DNSSEC we have proposed a client based 
DNSSEC validation system.In the system, the DNSSEC validation will be conducted 
on each end client and the DNSSEC validation will be turned off. This system can 
solve some existing issues in DNSSEC such as the workload increase of cache 
DNS server and domain name resolution failure due to DNSSEC misconfiguration. 
In addition, the system also provides a function that displays a pop-up message to 
the users in case of DNSSEC validation failure and timeout. | 
   
    |  ICACT20220132 Slide.08 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | Although the previous work can solve some existing issues in DNSSEC, it also causes 
another issue. In the previous system, each end client conducts DNSSEC validation and 
the results only store in the internal cache. It means that the successfully validated DNS 
resources records cannot be shared with other end clients. Accordingly, the system may 
cause low name resolution performance on end clients. | 
   
    |  ICACT20220132 Slide.09 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | The objective of this paper is to accelerate name resolution on end clients by improving 
the cache hit rate.In addition to use the client based DNSSEC validation system, a method 
to share the successfully validated DNS resource records will be added. Specifically, the 
DNSSEC validation will be enabled on each end client and the each end client also uses 
the successfully validated DNS resource records achieved from external  cache DNS 
server. | 
   
    |  ICACT20220132 Slide.10 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | The first approach we considered is to share successfully DNSSEC validated DNS 
resources records using a DNS sharing server. Each end client updates the successfully 
validated DNS resource records to the DNS sharing server using dynamic DNS update. 
Then each end client queries the DNS sharing server first in the domain name resolution 
and if there is no cache hit the end client will continue to query the external cache DNS 
server. However, this approach has a critical flaw that the malicious users or infected 
clients may add fake DNS resource records to the DNS sharing server. Moreover, 
although TSIG will be used in the dynamic DNS update, when the TSIG key is stolen it 
can be used maliciously. | 
   
    |  ICACT20220132 Slide.11 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | The second approach is that in addition to add a DNS sharing server, the DNS sharing 
server also performs DNSSEC validation before caching the updated DNS resource 
records. However, it needs complicated configuration on the DNS sharing server and 
the DNS sharing server needs to communicate with the external DNS servers in the 
Internet thus it may cause security concerns. | 
   
    |  ICACT20220132 Slide.12 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | Considering the possible issues in the two approaches, in this paper, we propose a new 
method by using two cache DNS server in parallel. In the proposed system, we assume 
that DNSSEC validation feature is enabled on each end client by installing the client 
based DNSSEC validation system. In the proposed system, the first try of name resolution 
for a domain name will be validated on each end client and the same request will also be 
sent to an external cache DNS server with DNSSEC enabled in parallel. Since the DNSSEC 
validation on the cache DNS server will take time thus the results of the end client will be 
used while the result of the cache DNS server will be cached on its own. From the second 
time, the response from the external cache DNS server will be fast since the successfully 
validated DNS resource records have been cached. Consequently, the results from the 
external cache DNS server will be used. | 
   
    |  ICACT20220132 Slide.13 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | This figure shows the procedure of domain name resolution in the proposed system. 
The client sends DNS query to DNSSEC enabled cache DNS server and DNSSEC 
disabled cache DNS server simultaneously. Since the overload of DNSSEC enabled 
cache DNS Server is high, thus the validation in the DNSSEC enabled cache DNS Server 
will be slow.On the other hand, the response from the DNSSEC disabled cache DNS 
Server will be fast and it need validation on the client. | 
   
    |  ICACT20220132 Slide.14 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | From the second time of DNS query for the same domain name, since the validation 
finished DNS resource records have been cached in the DNSSEC enabled cache DNS 
server, thus the response from the DNSSEC enabled cache DNS Server will be fast. 
Accordingly, the response from the DNSSEC disabled cache DNS Server will need validation on the client, thus the response will be late and dropped. | 
   
    |  ICACT20220132 Slide.15 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | We implemented 2 types of prototype systems using Perl language. The first type was 
implemented using fork function. In this type, when the system receives a DNS query, 
a child process will be created and the child process conducts the normal query and 
the query on the previously proposed client based DNSSEC validation system. The 
second type was implemented by creating a specific name resolution process. In this 
type, the specific process conducts normal DNS query and the previously proposed 
client based DNSSEC validation system works as usual. As a result, two processes 
reply DNS responses individually. We evaluated the two types of prototype systems 
and compared them with the conventional DNS name resolution method. | 
   
    |  ICACT20220132 Slide.16 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | We used two physical servers and several virtual machines in the prototype system. 
We used Perl language and Perl modules in the proposed system as shown in this slide. | 
   
    |  ICACT20220132 Slide.17 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | This slide shows the evaluation results on client1. We measured the latency of name 
resolution for domain name google.com.The first try on the client based DNSSSEC 
validation took 13.7 milliseconds and from the second try it took 46.4 milliseconds. 
In the proposed system, when we used the fork function it took 60.2 milliseconds 
and when we used the specific process it took 48.6 milliseconds. | 
   
    |  ICACT20220132 Slide.18 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | This slide shows the evaluation results on client2.When there is no cache hit on the client 
and the cache DNS server, the name resolution for google.com took 106 milliseconds and 
17.6 milliseconds when there was cache on the client. When we used the proposed system, 
in case of using fork function it took about 33.6 milliseconds and 24.4 milliseconds when 
we used the specific process. From the results, we can see that the overhead of using fork 
function causes 10 milliseconds more latency. | 
   
    |  ICACT20220132 Slide.19 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | This slide shows the evaluation results comparing for types of DNS queries in client1. 
From the results, we can see that when we used the specific process for the parallel 
query the name resolution latency is the smallest. While the latency of the previously 
proposed client based DNSSEC validation system was the biggest. | 
   
    |  ICACT20220132 Slide.20 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | This slide shows the evaluation results comparing the four types of DNS queries on 
client2. From the results, we can see the the latency of the previously proposed client 
based DNSSEC validation system was the biggest one as well.Then the latency of the 
case when there is cache on the client is the smallest. Moreover, when there is no cache 
on the client the latency of using the specific process in the parallel query is the 
smallest one. | 
   
    |  ICACT20220132 Slide.21 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | As a summary, in this paper, we proposed an acceleration method of a client based 
DNSSEC validation system in parallel with two full service resolvers. The first try of 
domain name resolution took about 100-150 milliseconds and the results will be 
cached on the end client if the validation successes. From the second try on the same 
client the domain name resolution took 20-40 milliseconds. If we use the parallel query 
to a cache DNS server, the first try with DNSSEC took 10 seconds if the validation was 
performed from the root DNS server. Therefore, in the proposed system, the first try for 
a domain name resolution will use the client based DNSSEC validation system. 
On the other hand, the first try on other clients for the same domain name resolution, 
it took 25-60 milliseconds. Accordingly, in the proposed system, the acceleration of the 
first try of name resolution on other clients has been realized. | 
   
    |  ICACT20220132 Slide.22 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | The future work includes four tasks. 
The first one is performance improvement for the specific process. 
The second one is to conditionally stop the DNSSEC validation on end clients when 
it receives responses from the DNSSEC enabled cache DNS server. 
The third one is to improve the performance of client DNSSEC validation system with 
changing the server configuration and packet process procedure.
The last one is to consider the topology of cache DNS servers in the proposed system. | 
   
    |  ICACT20220132 Slide.23 
       
             
        [Big Slide]
       
	        [YouTube] | Chrome  Click!! | 
  
    |  | That¡®s all for my presentation. Thank you. |