Internet infrastructure 1. Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing.

Slides:



Advertisements
Similar presentations
Review iClickers. Ch 1: The Importance of DNS Security.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
An Engineering Approach to Computer Networking
Firewalls and Intrusion Detection Systems
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
ITIS 6167/8167: Network and Information Security Weichao Wang.
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 9 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Network Layer4-1 NAT: Network Address Translation local network (e.g., home network) /24 rest of.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
CSUF Chapter 6 1. Computer Networks: Domain Name System 2.
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
Issues in Internet Security. Securing the Internet How does the internet hold up security-wise? How does the internet hold up security-wise? Not well:
IIT Indore © Neminath Hubballi
DNS: Domain Name System
DNS (Domain Name System) Protocol On the Internet, the DNS associates various sorts of information with domain names. A domain name is a meaningful and.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
DNS security. How DNS works Ask local resolver first about name->IP mapping – It returns info from cache if any If info not in cache, resolver asks servers.
COMT 6251 Network Layers COMT Overview IP and general Internet Operations Address Mapping ATM LANs Other network protocols.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Packet Filtering & Firewalls. Stateless Packet Filtering Assume We can classify a “good” packet and/or a “bad packet” Each rule can examine that single.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
TODAY & TOMORROW DAY 2 - GROUP 5 PRESENTED BY: JAMES SPEIRS CHARLES HIGBY BRADY REDFEARN Domain Name System (DNS)
CS426Network Security1 Computer Security CS 426 Network Security (1)
Naming March 8, Networks What is naming?  Associations between some elements in a set of names and some elements in a set of values  Binding.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
ARP Spoofing Attacks Dr. Neminath Hubballi IIT Indore © Neminath Hubballi.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
CS526Topic 18: Network Security1 Information Security CS 526 Network Security (1)
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
* Agenda  What is the DNS ?  Poisoning the cache  Short term solution  Long term solution.
DNS Cache Poisoning. History 1993 – DNS protocol allowed attacker to inject false data which was then cached 1997 – BIND 16-bit transaction ids not randomized,
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Networking (Cont’d). Congestion Control l Is achieved by informing nodes along a route that congestion has occurred and asking them to reduce their packet.
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: interne t interface DNS server IP:
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
IP - Internet Protocol No. 1  Seattle Pacific University IP: The Internet Protocol Kevin Bolding Electrical Engineering Seattle Pacific University.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
MAN-IN-THE-MIDDLE ATTACK STEGANOGRAPHY Lab# MAC Addresses and ARP  32-bit IP address:  network-layer address  used to get datagram to destination.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
An Introduction To ARP Spoofing & Other Attacks
Executive Director and Endowed Chair
DNS Security.
DNS Security Issues SeongHo Cho DPNM Lab., POSTECH
DNS Cache Poisoning Attack
DNS security.
NET 536 Network Security Lecture 8: DNS Security
NET 536 Network Security Lecture 6: DNS Security
Presentation transcript:

Internet infrastructure 1

Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing  Partial expectations – “good” route (not through malicious nodes), confidentiality, integrity  Implied expectations: temporary data, blending with the crowd r Unreliable endpoints or routes facilitate attacks on confidentiality and integrity  Routes through malicious nodes = MITM 2

Some Infrastructure Features r Networks  LAN  AS (ISP network)  Inter AS connections, r Routers r Application level servers (e.g. web, mail,…) r Protocols  ARP  DNS  Routing protocols 3

ARP 4

r Resolves IP address to link-layer address r Simple request-reply protocol r Packet includes MAC and IP addresses for sender and target. r If target MAC is unknown send request for target IP and broadcast MAC (all 0xF) r Response includes MAC address r Requester stores MAC-IP mapping in ARP table r Any node in LAN requires at least one ARP request to connect to Internet 5

ARP Spoofing / Poisoning r ARP is stateless – requests are not connected too replies in a session r Implementations update ARP tables in response to ARP replies (even if entries are still valid) r ARP spoofing – send ARP reply with attacker’s MAC and spoofed (usually gateway) IP r Result – poisoned ARP tables r Legitimate use – force registration to receive full network access, e.g. in hotels 6

Countermeasures r Static ARP tables r Update ARP entries only after timeout r Update ARP entries only after sending request (Linux) r Check unusual ARP behavior, e.g. large number of packets r Upgrade to protocol with cryptographic protection (SEND is a secure version of NDP over IPv6)  Example of IPsec problem – chicken and egg with IP addresses in IKE 7

Attack on Behavior Analysis* r Assume node disregards “abnormal” ARP activity, e.g.  If MAC x sends many ARP replies with IP y then node assumes that MAC x is not IP y r Attack:  Attacker spoofs gateway MAC (in Ethernet and ARP headers)  Attacker mimics “bad” behavior for gateway  Node disregards gateway  Attacker sends single reply with its own MAC and gateway IP 8

DNS 9

DNS Architecture r Objective – map name to IP address r Domain – e.g. *.bgu.ac.il. *cse.bgu.ac.il could be a sub-domain or separate domain r DNS client (resolver) r Records: A (IP address), NS (name server), MX (mail server) etc. r Name server –  Authoritative  Recursive r Hierarchy 10

Server Hierarchy r 13 root name servers  Named by letters A,…,M  Responsible for root domain (empty string) r Name limited by 512 byte size of DNS packet over UDP without fragmentation r All root servers are clusters r Some are geographically distributed by anycast r Top Level Domain Servers  20 GTLD (global/generic) – e.g. responsible for.net,.com etc.  ~250 Country code TLD 11

DNS Query r Triggered by application r Local DNS server may  Be authoritative  Cache recently seen record  Send query to root name server r Queries follow recursive path to authoritative name server r Answered queries populate cache. r Each entry in cache has TTL (set by administrator) 12

Cache Poisoning and Defenses r Cache poisoning – fill name server’s cache with mapping of domains to attacker’s IP r Defense:  Response destination port matches request source port  Response Question ID (QID), 16 bits, must match  Bailiwick checking – response is for lower domain in hierarchy, NS for ac.il not accepted for bank.co.il r Weaknesses in “old” implementations – QID incremented by 1 for each query, source port does not change, bad replies are simply dropped 13

DNS poisoning r Attacker sets up name server for attacker domain. r Attacker gets target name server to send DNS request to its own server learning QID  Directly  Open web page and users will ask for it r Attacker sends query through target name server for some domain, e.g. bank.co.il r Attacker floods name server with forged replies, guessing source port and QID. r If attacker reply arrives before real reply, the cache is poisoned. 14

Countermeasures r Randomize QID r Refresh source port  Will have negative impact on performance r Monitor for flood situation  Will have negative impact on performance 15

Kaminsky Attack (2008) r Send request for name that doesn’t exist in a real domain r Send flood of forged replies as in previous attacks r Each reply forges name server of domain r Set very long TTL r Same idea could work for GTLD servers (i.e..com) but not for root servers r Mitigation – randomize source port, currently Windows has 2500 source ports for DNS – 2500*2 16 possibilities 16

DNSSEC r Objectives for DNS traffic  Origin authentication  Integrity protection  Authenticated denial of existence r Method: PKI with certificate for every DNS server anchored (root CA) by root DNS. r PKI is chain of:  DNSKEY – public keys for signature verification  DS – Delegation Signer, includes hash of keys  Parent DNSKEY signs DS. Each DS includes hashes of public keys used for self signing the child DNSKEY and for signing zone data 17

DNSSEC (cont.) r DNSKEY often includes  ZSK – Zone Signing Keys – validating zone data  KSK – Key Signing Keys – Validating other keys r Resolver is configured with root public key  May be configured with additional anchors r Resolver uses DNS to collect DNSKEY and DS records from root to key signing the requested zone r Zone data is signed in RRSIG records 18

Denial of existence r Attackers goal:  Spoof “does not exist” r To solve problem, DNS servers that comply with DNSSEC store NSEC records  Names appear in canonical form  NSEC - signed “next existing” name  Result: signed ranges of non-existent names r Query for name that doesn’t exist is answered with signed range that “covers” this name 19

Zone Enumeration in DNSSEC r Zone enumeration – obtain all addresses in domain  Creators of DNSSEC did not consider this to be a threat  Most organizations consider this secret r Attacker enumerates zone by  Querying random name  Receiving range  Deducing that names in range bounds exist  Iterating 20

Mitigation of Zone Enumeration r Online approach (currently RFC 4470)  Name server signs “does not exist” online  Name server constructs small (and ever-decreasing range to sign) r NSEC3 approach (currently RFC 5155)  Same idea as NSEC, but use hashed name (cryptographic hash) instead of name  Range does not reveal names r Common names may still be found by dictionary attack  NSEC3 uses several hash functions with a counter on the number of iterated uses of the hash, increasing attacker dictionaries. 21

DoS Attacks r October 2002  One hour  All 13 root name servers simultaneously  About 900 Mbps total  ICMP flood, SYN flood, fragment flood  No server crashed, some queries were lost r February 2007  24 hours  4 root servers, 3.info servers  Botnet of ~5000 hosts mostly in Korea  Flood of DNS queries  Two name servers lost up to 90% of the queries 22

BGP 23

Border Gateway Protocol r One of the standard suite of Internet routing protocols r Is the most common inter-domain routing protocol  Connects different AS, often different service providers  Tens of thousand of different AS r Attackers want to break integrity  MITM  Block access to sites  Use rare IP addresses for e.g. spam r Several prominent incidents led to outage or redirection of large part of Internet 24

IP blocks and AS numbers 25

BGP route advertisements 26

False route 27

More specific route 28

Additional problems r Manipulation of BGP attributes  Prepending – adding the same AS multiple times to a route, causing it to be longer r BGP runs over TCP – vulnerable to various TCP issues r Solutions – deployed solutions include route filtering and route registries, nothing strong 29