DNS Security Facilitation - Technical Study Group

From ICANNWiki
Jump to navigation Jump to search

The DNS Security Facilitation - Technical Study Group (DSFI-TSG) was formed to investigate and determine what ICANN should and should not do based on the technical landscape -- not about DNS Abuse -- but about security threats and attack vectors, including the DNS itself. This study group provides technical guidance to the ICANN CEO on what ICANN can initiate to facilitate DNS security.[1] This group does not make policy but it may make policy recommendations.

Members

Guiding Questions

  1. Which ICANN mechanisms or functions specifically address DNS security?[2]
  2. What are the most critical gaps in the DNS security landscape?
  3. what technical requirements are needed to fill the gaps?
  4. How to fix operational best practices to address the gaps?
  5. What are the hindrances to their deployments?
  6. Who should fill those gaps?
  7. what is ICANN Organization's role?
  8. What strategic partnerships should ICANN org make to enhance DNS security?
  9. What are the risks?
  10. What are the shortcomings of the current threat models?
  11. What are the externalities?
  12. which DNS characteristics attract security problems that other Internet services don’t have?
  13. What can ICANN learn from other protocols or industries that face similar issues?

History

The group met 29 times between June 2020 and September 2021 to answer the aforementioned questions and draft recommendations for the ICANN CEO.[3] The group submitted its draft report to the ICANN CEO in October 2021, just prior to ICANN 72.[4] At ICANN 72, the group presented its findings in a session during Prep Week.[5]

Work Product

The Final Report indicated that ICANN Organization can improve the security of the DNS directly, through funded research and education, and indirectly through partnerships, community collaboration, and contractual controls and offered 12 recommendations:[6]

  1. Develop a Tabletop Exercise Program
  2. Continue Existing Work on DNS Abuse
  3. Investigate DNS Security Enhancements
  4. Investigate Best Practices for Authentication
  5. Empower Contracted Parties to adopt security enhancements to the domain registration systems and authoritative name services
  6. Bug Bounty Program Feasibility Funding
  7. Educate DNS stakeholders to make available the appropriate standards-based authentication mechanisms for all interactions
  8. Improve documentation and understanding of Registry Lock features and promote their use; explain the differences between Registry and Registrar Lock to registrants; facilitate the standardization of minimum requirements for Registry and Registrar Lock services
  9. Raise Awareness of Best Practices for Infrastructure Security
  10. DNS Blocking and Filtering
  11. Incident Responses
  12. Raise Covert Channel Awareness

Of these recommendations, the TSG said the two top priorities for ICANN were conducting a study and offering a report on best practices for authentication against the different roles and risks in the DNS and encouraging the development and deployment of a formalized incident-response process across the DNS industry that allows for interaction with others in the ecosystem.

References