Casey Deccio Sandia National Laboratories

Slides:



Advertisements
Similar presentations
Review iClickers. Ch 1: The Importance of DNS Security.
Advertisements

Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
1 SecSpider: Distributed DNSSEC Monitoring Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Deploying DNSSEC in Windows Server 2012 Rob Kuehfus Program Manager Microsoft Corporation WSV325.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Chapter 16 – DNS. DNS Domain Name Service This service allows client machines to resolve computer names (domain names) to IP addresses DNS works at the.
IIT Indore © Neminath Hubballi
Test cases for domain checks – a step towards a best practice Mats Dufberg,.SE Sandoche Balakrichenan, AFNIC.
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
Olaf M. Kolkman. Domain Pulse, February 2005, Vienna. DNSSEC Basics, Risks and Benefits Olaf M. Kolkman
Paper Presentation – CAP Page 2 Outline Review - DNS Proposed Solution Simulation Results / Evaluation Discussion.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Naming March 8, Networks What is naming?  Associations between some elements in a set of names and some elements in a set of values  Binding.
1 Kyung Hee University Chapter 18 Domain Name System.
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
DNS DNS overview DNS operation DNS zones. DNS Overview Name to IP address lookup service based on Domain Names Some DNS servers hold name and address.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Basics of the Domain Name System (DNS) By : AMMY- DRISS Mohamed Amine KADDARI Zakaria MAHMOUDI Soufiane Oujda Med I University National College of Applied.
Monitoring, analyzing and cleaning DNS configuration errors across European NRENs Slavko Gajin University of Belgrade, Serbia
Monitoring, analyzing and cleaning DNS configuration errors across European NRENs Slavko Gajin University of Belgrade, Serbia
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
DNSSEC an introduction ccTLD workshop November 26-29th, 2007 Amman, Jordan Based on slides from RIPE NCC.
BIND 10 DNS Project Status + DNS Resolver Status/Plans Shane Kerr 23 January 2013.
High performance recursive DNS solution
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Security Issues with Domain Name Systems
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
A longitudinal, End-to-End View of the DNSSEC Ecosystem
DNS Security Advanced Network Security Peter Reiher August, 2014
Geoff Huston APNIC March 2017
DNS Security.
Domain Name System Tony Kombol ITIS 3110.
Module 5: Resolving Host Names by Using Domain Name System (DNS)
Principles of Computer Security
IMPLEMENTING NAME RESOLUTION USING DNS
Configuring and Troubleshooting DNS
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Geoff Huston APNIC Labs September 2017
DNS Session 5 Additional Topics
DNS Cache Poisoning Attack
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Lame DNS Server Sweeping
A Longitudinal, End-to-End View of the DNSSEC Ecosystem
DNS security.
DNSSEC Basics, Risks and Benefits
Managing Name Resolution
Distributed Peer-to-peer Name Resolution
Re-Engineering the Root of the DNS
Measuring KSK Roll Readiness
NET 536 Network Security Lecture 8: DNS Security
NET 536 Network Security Lecture 6: DNS Security
Geoff Huston APNIC Labs
Measuring KSK Roll Readiness
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
The Curious Case of the Crippling DS record
Trust Anchor Signals from Custom Applications
ECDSA P-256 support in DNSSEC-validating Resolvers
Presentation transcript:

Modeling DNS Security: Misconfiguration, Availability, and Visualization Casey Deccio Sandia National Laboratories BYU Computer Science Dept. Colloquium Sep 9, 2010 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000.

Criticality of the DNS The DNS is the “phone book” for the Internet Domain name to IP address translation Mail server lookup Service discovery Most Internet applications rely on DNS name resolution Query: www.foo.com/A ? Answer: 192.0.2.16

Availability and security DNS must be both available and accurate Security was added as a retrofit Security increases complexity Troubleshooting is difficult Misconfigurations abound, rendering name resolution unavailable Examples: medicare.gov, nasa.gov, arpa

Objectives Establish model and metrics for assessing availability of DNSSEC deployments Quantify complexity that may increase potential for DNSSEC misconfiguration Introduce techniques to mitigate effects of misconfiguration Query: www.foo.com/A ? Answer: 192.0.2.16 4

Outline DNS/DNSSEC background DNSSEC availability model DNS complexity analysis Misconfiguration mitigation DNSSEC visualization Summary and future work

DNS namespace Namespace is organized hierarchically DNS root is top of namespace Zones are autonomously managed pieces of DNS namespace Subdomain namespace is delegated to child zones . com net baz.net bar.com foo.com

DNS name resolution Resolvers query authoritative servers Queries begin at root zone, resolvers follow downward referrals Resolver stops when it receives authoritative answer … . Query: www.bar.com/A ? … com Answer: 192.0.2.16 … bar.com stub resolver recursive resolver authoritative servers

DNS attacks Tainted DNS responses can direct users to malicious services To forge DNS responses: Guess query ID and UDP source port Arrive before legitimate response Attackers success rate increased by: Eliciting queries of the resolver Sending large number of responses attacker Query: www.bar.com/A ? bar.com Answer: ?? stub resolver recursive resolver authoritative servers

DNS Security Extensions (DNSSEC) DNS data signed with private keys for authentication Signatures (RRSIGs) and public keys (DNSKEYs) published in zone data Resolver response If authentic: Authenticated data (AD) bit is set If bogus: SERVFAIL message is returned Query: www.bar.com/A ? Query: www.bar.com/A ? bar.com Answer: 192.0.2.16 RRSIG Query: bar.com/DNSKEY ? validate Answer: DNSKEY… RRSIG Answer: 192.0.2.16 AD authoritative server recursive/validating resolver stub resolver 9

Chain of trust DNSKEY must be authenticated Resolver trust anchor . DNSKEY must be authenticated Resolver must have some notion of trust Trust extends through ancestry to a trust anchor at resolver DS resource record – provides digest of DNSKEY in child zone DNSKEY Zone data DS com DNSKEY Zone data DS bar.com DNSKEY Zone data 10

Insecure delegations Resolver trust anchor If child zone is unsigned, resolver must be able to prove it is insecure NSEC resource records provide proof of absence of DS . DNSKEY Zone data DS net DNSKEY Zone data NSEC/DS baz.net Zone data 11

DNSSEC maintenance RRSIGs must be periodically resigned to prevent expiration DNSKEYs must be periodically rolled (replaced) to avoid prolonged exposure Rollovers involving DS RRs must be coordinated with parent zones Authoritative servers must serve consistent data 12

Outline DNS/DNSSEC background DNSSEC availability model DNS complexity analysis Misconfiguration mitigation DNSSEC visualization Summary and future work

Classes of DNSSEC misconfiguration Zone misconfigurations Missing, expired, or bogus RRSIG Missing DNSKEYs Delegation misconfigurations No DNSKEY in child matching any DS in parent Missing NSEC RRs for insecure delegation Trust anchor misconfiguration Stale trust anchor at resolver

Failure potential Probability of bogus validation Based on fraction of responsive authoritative servers serving bogus or incomplete data Resolvers will retry if server non-responsive Not all servers will retry if server responds with bogus data Assumption: resolver queries any authoritative server with equal probability bar.com Valid Bogus Non-responsive authoritative server recursive/validating resolver

Failure potential Formula extends to chain of trust in ancestor zones Failure potential of each zone is combined independently of one another … . … com … bar.com Recursive/validating resolver 16 authoritative servers

DNSSEC Deployment Survey Polled ~1500 production signed zones over a six-week period Recorded validation errors resulting from misconfiguration Statistic Value Production signed zones polled 1,456 Total misconfigurations resulting in certain failure 194 Zone-class misconfigurations 134 (69%) Delegation-class errors resulting in certain failure 60 (31%) Errors (any class) caused by misconfigured ancestor zones 61 (31%)

Failure Potential of Zones

Outline DNS/DNSSEC background DNSSEC availability model DNS complexity analysis Misconfiguration mitigation DNSSEC visualization Summary and future work

Complexity analysis Complexity creates potential for misconfiguration Hierarchical complexity: Size of ancestry (zone depth) Administrative complexity: Servers administered by distinct organizations … . … com … bar.com 20 20

Hierarchical reduction potential If ancestry might reasonably be consolidated, what is the reduction? Ancestry reduced, but original namespace can be preserved . . com com = 0.25 bar.com bar.com sub.bar.com

Administrative Complexity How diverse is the set of organizations administering a zone? Complexity measured by random sampling (with replacement) of authoritative servers to determine the probability that two organizations are selected bar.com ns.bar.com me.baz.net = 0.5

Hierarchical Reduction Potential

Administrative complexity

Outline DNS/DNSSEC background DNSSEC availability model DNS complexity analysis Misconfiguration mitigation DNSSEC visualization Summary and future work

Avoiding and mitigating effects of misconfiguration Follow best practice operational standards (RFCs) Key rollover procedures Trust anchor rollover procedures Validation diligence Resolver keeps trying alternative authoritative servers to find valid response Optimality can be difficult – where is the break in the chain? Implemented in BIND 9

Soft anchoring DNSKEYs typically don’t change often . DNSKEYs typically don’t change often Resolvers configured with “hard” (traditional) trust anchors “Soft” anchors are derived from DNSKEYs authenticated from existing hard anchors DNSKEY Zone data DS com DNSKEY Zone data DS Resolver Hard anchor bar.com DNSKEY Soft anchor Soft anchor Zone data

Impact of soft anchoring . Resolution not inhibited by: zone-class misconfigurations in ancestry delegation-class misconfigurations DNSKEY Zone data DS com DNSKEY Zone data DS Resolver Hard anchor bar.com DNSKEY Soft anchor Soft anchor Zone data

Maintaining soft anchors Resolvers follow procedure similar to that used for rolling hard trust anchors (RFC 5011) Resolver periodically polls soft anchor zone Soft anchor addition: Newly authenticated DNSKEYs persist for “hold down” period New DNSKEY seen with corresponding DS Soft anchor removal: Delegation to soft anchor made insecure DNSKEY is revoked DNSKEY and its DS RR are removed

Soft anchoring limitations Doesn’t help when misconfigurations are at or below the bottom “link” in the chain of trust Resolver must have authenticated soft anchors through valid chain of trust before misconfiguration Scalability Maintenance overhead of all trust anchors may be intense Least-recently used policy may help

Outline DNS/DNSSEC background DNSSEC availability model DNS complexity analysis Misconfiguration mitigation DNSSEC visualization Summary and future work

DNSSEC Visualization Live analysis of DNS authentication chain at: http://dnsviz.net/

arpa: the “root” of reverse name resolution RRSIG expired, invalidating NSEC necessary to prove insecure delegation

Some authoritative servers for kiae.ru not serving RRSIGs

Some authoritative servers for dshield.org have expired RRSIGs

medicare.gov: missing appropriate DNSKEY, resulting in broken delegation

Misconfiguration in a complex system of DNS dependencies

Outline DNS/DNSSEC background DNSSEC availability model DNS complexity analysis Misconfiguration mitigation DNSSEC visualization Summary and future work

Summary DNS responses must be both accurate and available DNSSEC deployment requires careful deployment and maintenance Soft anchoring can mitigate effects of misconfiguration DNSSEC visualization helps understanding and troubleshooting Query: www.foo.com/A ? Answer: 192.0.2.16

Future work Internet draft of soft anchoring to gain community support Improved usability of DNS visualization tool Monitoring and alerting Better analysis of server inconsistencies

Acknowledgements Jeff Sedayao, Krishna Kant at Intel Corporation Prasant Mohapatra at UC Davis

Questions? ctdecci@sandia.gov

Visualization components Domain name DNSKEY/DS RR SEP Revoke Published DNSKEY attributes Missing Trust anchor Missing NSEC proving non-existence of DS RRs (insecure delegation)

Visualization components Alias dependency Valid Bogus Expired Missing Signature or digest Secure Bogus Insecure Misconfigured Delegation Sufficient Insufficient Proof of insecure delegation

The bottom line Status of nodes in graph, based on chain of trust Secure Bogus Insecure