DNS Security.

Slides:



Advertisements
Similar presentations
Review iClickers. Ch 1: The Importance of DNS Security.
Advertisements

Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 9 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
PKI To The Masses IPCCC 2004 Dan Massey USC/ISI. 1 March PKI Is Necessary l My PKI related actions since arriving at IPCCC n Used an.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Measuring DANE TLSA Deployment Liang Zhu 1, Duane Wessels 2, Allison Mankin 2, John Heidemann 1 1. USC ISI 2. Verisign Labs 1.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
CS426Fall 2010/Lecture 341 Computer Security CS 426 Lecture 34 DNS Security.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
CSUF Chapter 6 1. Computer Networks: Domain Name System 2.
IIT Indore © Neminath Hubballi
October 15, 2002Serguei A. Mokhov, 1 Intro to DNS SOEN321 - Information Systems Security.
Chapter 17 Domain Name System
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Security Through Publicity Eric Osterweil Dan Massey Batsukh Tsendjav Beichuan Zhang Lixia Zhang.
Packet Filtering & Firewalls. Stateless Packet Filtering Assume We can classify a “good” packet and/or a “bad packet” Each rule can examine that single.
1 Kyung Hee University Chapter 18 Domain Name System.
1 Madison, Wisconsin 9 September14. 2 Security Overlays on Core Internet Protocols – DNSSEC and RPKI Mark Kosters ARIN Engineering.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Internet infrastructure 1. Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
MAN-IN-THE-MIDDLE ATTACK STEGANOGRAPHY Lab# MAC Addresses and ARP  32-bit IP address:  network-layer address  used to get datagram to destination.
Domain Name System: DNS To identify an entity, TCP/IP protocols use the IP address, which uniquely identifies the Connection of a host to the Internet.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
Ip addressing: dhcp & dns
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Security Issues with Domain Name Systems
Networking Applications
Attacking DNS Slides adapted from Olaf Kolkman, RIPE Lecture 18
DNS Security Advanced Network Security Peter Reiher August, 2014
Domain Name System Tony Kombol ITIS 3110.
Module 5: Resolving Host Names by Using Domain Name System (DNS)
DNS Security Issues SeongHo Cho DPNM Lab., POSTECH
State of DNSSEC deployment ISOC Advisory Council
Living on the Edge: (Re)focus DNS Efforts on the End-Points
DNS Cache Poisoning Attack
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNSSEC Iván González Montemayor A
DNS security.
Net 323 D: Networks Protocols
Information Security CS 526 Omar Chowdhury
Chapter 19 Domain Name System (DNS)
DNSSEC Basics, Risks and Benefits
Managing Name Resolution
Distributed Peer-to-peer Name Resolution
NET 536 Network Security Lecture 8: DNS Security
Casey Deccio Sandia National Laboratories
NET 536 Network Security Lecture 6: DNS Security
Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
Ip addressing: dhcp & dns
COMPUTER NETWORKS PRESENTATION
Advanced Computer Networks
Computer Networks Presentation
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Presentation transcript:

DNS Security

Fundamental Problems of Network Security Internet was designed without security in mind Initial design focused more on how to make it work, than on how to prevent abuses Initial environment mostly consisted of research institutions---assumption on the benign behaviors of users Fundamental security problem of current network technology: Has no way of telling whether the resource is located “correctly,” or the information is transferred “correctly” Has no data authentication and confidentiality protection

Example Security Problems by Incorrect Resource Location DNS poisoning BGP routing vulnerabilities ARP poisoning ARP (Address Resolution Protocol) is used to query for the MAC address associated with an IP address Any device attached physically to a subnet can claim to be the “owner” of the IP IP Spoofing Routers typically do not check source IP addresses A packet can claim to be coming from any IP address Routers have no good way to check IP addresses either

The Domain Name System Basic Internet Database Maps names to IP addresses Also stores IPv6 addresses, mail servers, service locators, Enum (phone numbers), etc. Data organized as tree structure. Each zone is the authority for its local data. Root edu com uk usf cisco ibm co www Adapted from slides of Prof. Dan Massey at Colorado State University

Domain Name Service Provides binding between URL and IP address Both forward and reverse mapping Divide URL space into zones; Each name server handles mapping in its zone DNS Resource Record (RR) Can be viewed as tuples of the form <name, TTL, class, type, data> types: A (IP address) MX (mail servers) NS (name servers) PTR (reverse look up)

DNS Protocol ISP What is the IP address of www.usf.edu? root Server Go ask 192.41.162.30 What is the IP address of www.usf.edu? ISP NS Server for edu (192.41.162.30) What is the IP address of www.usf.edu? Go ask 131.247.100.1 What is the IP address of www.usf.edu? 131.247.182.171 ISP’s DNS Resolver NS Server for usf.edu (131.247.100.1)

Example Response from the .edu NS server Delegation of authority ;; QUESTION SECTION: ;www.usf.edu. IN A ;; AUTHORITY SECTION: usf.edu. 172800 IN NS mother.usf.edu. usf.edu. 172800 IN NS ziggy.usf.edu. usf.edu. 172800 IN NS clemson-ns1.usf.edu. ;; ADDITIONAL SECTION: mother.usf.edu. 172800 IN A 131.247.100.1 ziggy.usf.edu. 172800 IN A 131.247.1.40 clemson-ns1.usf.edu. 172800 IN A 205.186.58.129 … Glue records

DNS Security Problems A DNS resolver has no way to determine if the response of a query does come from the legitimate server It will accept a response if The port number matches the source port of the request Has the correct Transaction ID (TXID). It will accept all RR’s that are in the queried server’s bailiwick The bailiwick is the domain in which the server has authority according to the referral path

Classical DNS Poisoning DoS flooding DNS queries ISP faked responses What is the IP address of www.usf.edu? What is the IP address of www.usf.edu? recursive query 131.247.182.171 Recursive DNS resolver NS Server for usf.edu

Conditions for classical DNS poisoning attacks Must guess right the correct source-port number Must guess right the correct TXID (16 bits) The fake response must arrive before the legitimate response If any of the above fails, the attack fails and there will be no chance to attack again until the TTL expires

Kaminsky Attack (2008) 1.1.1.1 What is the IP address of foo.usf.edu? usf.edu. NS www.usf.edu www.usf.edu A 1.1.1.1 ISP What is the IP address of foo.usf.edu? No such url Recursive DNS resolver NS Server for usf.edu

Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning No longer needs to wait for TTL to expire The attacker can control when and what queries are issued A complete domain may be hijacked Even TLD’s are vulnerable Only needs 10 secs to succeed

Short-term mitigation Increase the brute-force search space 16 bits TXID is too small and can be easily brute-forced Randomize source port number Use other entropy in DNS messages e.g. Letter cases in URL

Long-term Solution: DNSSEC Use public-key signature to authenticate DNS messages Domain names already form a hierarchy Parent signs children’s public keys Resolver only needs to know the root public key to authenticate DNS messages

The Domain Name System Basic Internet Database Maps names to IP addresses Also stores IPv6 addresses, mail servers, service locators, Enum (phone numbers), etc. Data organized as tree structure. Each zone is the authority for its local data. Root edu com uk usf cisco ibm co www Adapted from slides of Prof. Dan Massey at Colorado State University

DNSSEC Provides a “natural” PKI Keys organized as tree structure. Maps zones to their keys Parent-zone sign child zones’ keys Keys organized as tree structure. Each zone is the authority for its local data. A zone’s key is only effective in its zone Root edu com uk usf cisco ibm co www Adapted from slides of Prof. Dan Massey at Colorado State University

DNS RR Review DNS Resource Record (RR) Can be viewed as tuples of the form <name, TTL, class, type, data> types: A (IP address) MX (mail servers) NS (name servers) PTR (reverse look up) RRSIG (signature) DNSKEY(public key) …

DNSSEC Records Introduce a new data type: RRSIG name TTL class type value {www.usf.edu. 82310 IN A 131.247.182.171} name TTL class type covered_type {www.usf.edu. 82310 IN RRSIG A … 20171216023910 20151216023910 … usf.edu. Base 64 encoding of signature} not after not before key name

DNSSEC Records Introduce a new data type: DNSKEY name TTL class type value { usf.edu. 82310 IN DNSKEY Base 64 encoding of public key} name TTL class type covered_type { usf.edu. 82310 IN RRSIG DNSKEY … 20171216023910 20151216023910 … edu. Base 64 encoding of signature} not after not before key name

Authenticated Non-existence What if the usf.edu server is asked the IP address of a non-existent url (e.g. foo.usf.edu)? Can’t sign non-existence on the fly because the server does not have the private key (why?) NSEC record “The url after eng.usf.edu is health.usf.edu” Order all the url’s in a zone and sign all the NSEC records ahead of time Problem: enables zone enumeration NSEC3 addresses this concern by using hashes of zone names instead of zone names themselves

Key Management PKedu PKusf PKusf2 PKusf2 Sig{PKusf }PKedu PKsigning DS Record NS for .edu Want to change PKusf to PKusf2 PKusf PKusf2 PKusf2 sign Sig{PKusf }PKedu PKsigning Do not need to notify parent if changed NS for usf.edu …

Potential Usage of DNSSEC If successfully deployed, DNSSEC can serve as a universal PKI Sign public keys for web sites Sign public keys for email addresses

SSL/TLS I am Alice I am Bob, inc PKB is Bob’s public key PKB E(PKB , s) {m}KC || MACKM(m) Alice Bob KC, KM = h(s)

DNS-based Authentication of Named Entities (DANE) Use DNSSEC to sign certain statements (DANE records) The currently proposed DANE records address trust of TLS certificates TLSA DANE records Yet another type of DNS resource record (RR) Three types of statements CA Constraints Service Certificate Constraints Trust Anchor Assertion CA Constraints: The client should only accept certificates issued under a specific CA. Service Certificate Constraints: The client should only accept a specific certificate. Trust Anchor Assertion: The client should use a domain-provided trust anchor to validate certificates for that domain.

Advantages of DANE compared with X.509 Real delegation of power Better accountability More flexibility Better damage control Clearer semantics DANE records only means that “this domain’s owner says…”

Problems of DNSSEC Key revocation If a zone’s private key is compromised, the damage continues even after the key is replaced, until the parent’s cert on the key expires Certificate revocation? All the revocation problems with digital signatures will apply Issue short-term certificates instead? Then the upper-level zones will have to be more involved in maintaining the DNSSEC structure Against the initial design principles of DNS: autonomy of individual zones

Deployment Status Has been on-going for a number of years Check http://www.dnssec-deployment.org/ Root domain signed July, 2010 DNSSEC now deployed at key zones including net, com, gov, and edu. “Almost” ready to use at the resolver level