CSE 534 – Fundamentals of Computer Networks Lecture 10: DNS (What’s in a Name?) Based on Slides by D. Choffnes (NEU). Revised by P. Gill Spring 2015. Some.

Slides:



Advertisements
Similar presentations
Daves DNS Show Read at your own risk. Domain Name Service Maps IP addresses to more human readable domain names Every domain name ultimately resolves.
Advertisements

INTERNET PROTOCOLS Class 9 CSCI 6433 David C. Roberts Entire contents copyright 2011, David C. Roberts, all rights reserved.
Network Attack via DNS Fagpakke: IT Sikkerhed Modul: Introduktion til IT Sikkerhed Jesper Buus Nielsen.
Fall Ch 8- DNS© Jörg Liebeherr and Magda El Zarki, 2002 Domain Name Service (DNS)
CSE 390 – Advanced Computer Networks Lecture 10: DNS (What’s in a Name?) Based on Slides by D. Choffnes (NEU). Revised by P. Gill Fall Some content.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
CSE331: Introduction to Networks and Security Lecture 8 Fall 2002.
DNS and HTTPs ACN Presentation. Domain Names We refer to computers on the Internet (Internet hosts), by names like: sharda.ac.in These are called domain.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Domain Name System. DNS is a client/server protocol which provides Name to IP Address Resolution.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
20101 The Application Layer Domain Name System Chapter 7.
Domain Name System: DNS
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Domain Name System Some slides used with permissions.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
CPSC 441: DNS1 Instructor: Anirban Mahanti Office: ICT Class Location: ICT 121 Lectures: MWF 12:00 – 12:50 Notes derived.
1 DNS,NFS & RPC Rizwan Rehman, CCS, DU. Netprog: DNS and name lookups 2 Hostnames IP Addresses are great for computers –IP address includes information.
DOMAIN NAME SYSTEM. Introduction  There are several applications that follow client server paradigm.  The client/server programs can be divided into.
DNS. Outline r Domain Name System r DNS Hierarchy r Resolution.
Chapter 25 Domain Name System
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks.
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts: – IP address (32 bit) - used for addressing datagrams – “name”, e.g.,
Internet Address and Domain Name Service (DNS) CS587x Lecture Department of Computer Science Iowa State University.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 18: Domain Name System Slides used with.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Chapter 16 – DNS. DNS Domain Name Service This service allows client machines to resolve computer names (domain names) to IP addresses DNS works at the.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
CSUF Chapter 6 1. Computer Networks: Domain Name System 2.
IIT Indore © Neminath Hubballi
DNS: Domain Name System
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Network Protocols Chapter 25 (Data Communication & Networking Book): Domain Name System (DNS) 1.
1 Application Layer Lecture 6 Imran Ahmed University of Management & Technology.
Chapter 29 Domain Name System (DNS) Allows users to reference computer names via symbolic names translates symbolic host names into associated IP addresses.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
CS 3700 Networks and Distributed Systems DNS (What’s in a Name?) Revised 8/20/15.
Internet and Intranet Protocols and Applications Lecture 5 Application Protocols: DNS February 20, 2002 Joseph Conron Computer Science Department New York.
1 Kyung Hee University Chapter 18 Domain Name System.
Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
CPSC 441: DNS 1. DNS: Domain Name System Internet hosts: m IP address (32 bit) - used for addressing datagrams m “name”, e.g., - used by.
Configuring Name Resolution and Additional Services Lesson 12.
Internet Address and Domain Name Service (DNS)
EE 122: Lecture 20 (Domain Name Server - DNS) Ion Stoica Nov 15, 2001 (* based on the some on-line slides of J. Kurose & K. Rose and of Raj Jain)
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
CS 4700 / CS 5700 Network Fundamentals Lecture 12: DNS (What’s in a Name?) Revised 10/8/14.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Domain Name System Some slides used with permissions.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
Internet Address and Domain Name Service (DNS) CS587x Lecture 5 Department of Computer Science Iowa State University.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
4343 X2 – Outline The Domain Name System The Web.
Web Server Administration Chapter 4 Name Resolution.
1. Internet hosts:  IP address (32 bit) - used for addressing datagrams  “name”, e.g., ww.yahoo.com - used by humans DNS: provides translation between.
COMP 431 Internet Services & Protocols
Internet Naming Service: DNS* Chapter 5. The Name Space The name space is the structure of the DNS database –An inverted tree with the root node at the.
Domain Name System INTRODUCTION to Eng. Yasser Al-eimad
4343 X2 – The Application Layer Tanenbaum Chapter 7.
Basics of the Domain Name System (DNS) By : AMMY- DRISS Mohamed Amine KADDARI Zakaria MAHMOUDI Soufiane Oujda Med I University National College of Applied.
MAN-IN-THE-MIDDLE ATTACK STEGANOGRAPHY Lab# MAC Addresses and ARP  32-bit IP address:  network-layer address  used to get datagram to destination.
Understand Names Resolution
CS 372 COMPUTER COMMUNICATION AND NETWORKS
DNS Security Advanced Network Security Peter Reiher August, 2014
Chapter 9: Domain Name Servers
Domain Name System (DNS)
CS 4700 / CS 5700 Network Fundamentals
CS 3700 Networks and Distributed Systems
IMPLEMENTING NAME RESOLUTION USING DNS
Net 323 D: Networks Protocols
Chapter 19 Domain Name System (DNS)
Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
Computer Networks Presentation
Presentation transcript:

CSE 534 – Fundamentals of Computer Networks Lecture 10: DNS (What’s in a Name?) Based on Slides by D. Choffnes (NEU). Revised by P. Gill Spring Some content on DNS censorship from N. Weaver.

Layer 8 (The Carbon-based nodes) 2  If you want to…  Call someone, you need to ask for their phone number You can’t just dial “P R O F G I L L ”  Mail someone, you need to get their address first  What about the Internet?  If you need to reach Google, you need their IP  Does anyone know Google’s IP?  Problem:  People can’t remember IP addresses  Need human readable names that map to IPs

Internet Names and Addresses 3  Addresses, e.g  Computer usable labels for machines  Conform to structure of the network  Names, e.g.  Human usable labels for machines  Conform to organizational structure  How do you map from one to the other?  Domain Name System (DNS)

History 4  Before DNS, all mappings were in hosts.txt  /etc/hosts on Linux  C:\Windows\System32\drivers\etc\hosts on Windows  Centralized, manual system  Changes were submitted to SRI via  Machines periodically FTP new copies of hosts.txt  Administrators could pick names at their discretion  Any name was allowed alans_server_at_sbu_pwns_joo_lol_kthxbye

Towards DNS 5  Eventually, the hosts.txt system fell apart  Not scalable, SRI couldn’t handle the load  Hard to enforce uniqueness of names e.g MIT Massachusetts Institute of Technology? Melbourne Institute of Technology?  Many machines had inaccurate copies of hosts.txt  Thus, DNS was born

 DNS Basics  DNS Security Outline 6

DNS at a High-Level 7  Domain Name System  Distributed database  No centralization  Simple client/server architecture  UDP port 53, some implementations also use TCP  Why?  Hierarchical namespace  As opposed to original, flat namespace  e.g..com  google.com  mail.google.com

Naming Hierarchy 8  Top Level Domains (TLDs) are at the top  Maximum tree depth: 128  Each Domain Name is a subtree .edu  neu.edu  ccs.neu.edu   Name collisions are avoided  neu.com vs. neu.edu Root educomgovmilorgnetukfretc. neumit ccsecehusky wwwloginmail

Hierarchical Administration 9  Tree is divided into zones  Each zone has an administrator  Responsible for the part of the hierarchy  Example:  CS controls *.cs.stonybrook.edu  SBU controls *.stonybrook.edu Root educomgovmilorgnetukfretc. neumit ccs wwwloginmail ICANN Verisign

Root Name Servers 10  Responsible for the Root Zone File  Lists the TLDs and who controls them  ~272KB in size com INNSa.gtld-servers.net. com INNSb.gtld-servers.net. com INNSc.gtld-servers.net.  Administered by ICANN  13 root servers, labeled A  M  6 are anycasted, i.e. they are globally replicated  Contacted when names cannot be resolved  In practice, most systems cache this information

Basic Domain Name Resolution 11  Every host knows a local DNS server  Sends all queries to the local DNS server  If the local DNS can answer the query, then you’re done 1. Local server is also the authoritative server for that name 2. Local server has cached the record for that name  Otherwise, go down the hierarchy and search for the authoritative name server  Every local DNS server knows the root servers  Use cache to skip steps if possible e.g. skip the root and go directly to.edu if the root file is cached

Recursive DNS Query 12  Puts the burden of resolution on the contacted name server  How does asgard know who to forward responses too?  Random IDs embedded in DNS queries Root com ns1.google.com asgard.ccs.neu.edu Where is

Iterated DNS query 13  Contact server replies with the name of the next authority in the hierarchy  “I don’t know this name, but this other server might”  This is how DNS works today Root com ns1.google.com asgard.ccs.neu.edu Where is

Administravia 14  Midterm on Monday  Closed notes  No electronic aids (you won’t need a calculator)  Exam is 80 minutes: 8:30-9:50  Arrive on time to get full time!  Questions?

DNS Resource Records 15  DNS queries have two fields: name and type  Resource record is the response to a query  Four fields: (name, value, type, TTL)  There may be multiple records returned for one query  What do the name and value mean?  Depends on the type of query and response

DNS Types 16  Type = A / AAAA  Name = domain name  Value = IP address  A is IPv4, AAAA is IPv6  Type = NS  Name = partial domain  Value = name of DNS server for this domain  “Go send your query to this other server” Query Name: Type: A Resp. Name: Value: Query Name: ccs.neu.educcs.neu.edu Type: NS Resp. Name: ccs.neu.educcs.neu.edu Value:

DNS Types, Continued 17  Type = CNAME  Name = hostname  Value = canonical hostname  Useful for aliasing  CDNs use this  Type = MX  Name = domain in address  Value = canonical name of mail server Query Name: foo.mysite.comfoo.mysite.com Type: CNAME Resp. Name: foo.mysite.comfoo.mysite.com Value: bar.mysite.combar.mysite.com Query Name: ccs.neu.educcs.neu.edu Type: MX Resp. Name: ccs.neu.educcs.neu.edu Value: amber.ccs.neu.eduamber.ccs.neu.edu

Reverse Lookups 18  What about the IP  name mapping?  Separate server hierarchy stores reverse mappings  Rooted at in-addr.arpa and ip6.arpa  Additional DNS record type: PTR  Name = IP address  Value = domain name  Not guaranteed to exist for all IPs Query Name: Type: PTR Resp. Name: Value: ccs.neu.educcs.neu.edu

DNS as Indirection Service 19  DNS gives us very powerful capabilities  Not only easier for humans to reference machines!  Changing the IPs of machines becomes trivial  e.g. you want to move your web server to a new host  Just change the DNS record!

Aliasing and Load Balancing 20  One machine can have many aliases *.blogspot.com david.choffnes.com alan.mislo.ve  One domain can map to multiple machines

 DNS Basics  DNS Security Outline 21

The Importance of DNS 22  Without DNS…  How could you get to any websites?  You are your mailserver  When you sign up for websites, you use your address  What if someone hijacks the DNS for your mail server?  DNS is the root of trust for the web  When a user types they expect to be taken to their bank’s websitewww.bankofamerica.com  What if the DNS record is compromised?

Denial Of Service 23  Flood DNS servers with requests until they fail  October 2002: massive DDoS against the root name servers  What was the effect?  … users didn’t even notice  Root zone file is cached almost everywhere  More targeted attacks can be effective  Local DNS server  cannot access DNS  Authoritative server  cannot access domain

DNS Hijacking 24  Infect their OS or browser with a virus/trojan  e.g. Many trojans change entries in /etc/hosts  *.bankofamerica.com  evilbank.com  Man-in-the-middle  Response Spoofing  Eavesdrop on requests  Race the servers response – Useful for censorship

Solution: DNSSEC 25  Cryptographically sign critical resource records  Resolver can verify the cryptographic signature  Two new resource types  Type = DNSKEY Name = Zone domain name Value = Public key for the zone  Type = RRSIG Name = (type, name) tuple, i.e. the query itself Value = Cryptographic signature of the query results  Deployment  On the roots since July 2010  Verisign enabled it on.com and.net in January 2011  Comcast is the first major ISP to support it (January 2012) Prevents hijacking and spoofing Creates a hierarchy of trust within each zone

DNSSEC Hierarchy of Trust 26 dns.bofa.com Where is bankofamerica.com? IP: Key: SIG: x9fnskflkalk.com (Verisign) Root Zone (ICANN) dns.evil.com IP: Key: SIG: 9na8x7040a3

Does DNSSEC Solve all our problems? 27  No.  DNS still vulnerable to reflection attacks + injected responses

DNS Reflection 28  Very big incident in 2012  (  65 Gbps DDoS  Would need to compromise 65,000 machines each with 1 Mbps uplink How was this attack possible?  Use DNS reflection to amplify a Botnet attack.  Key weak link: Open DNS resolvers will answer queries for anyone

So how does this work? 29  Remember: DNS is UDP  No handshaking between endpoints  I can send a DNS query with a forged IP address and the response will go to that IP address  Secret sauce: a small request that can elicit a large response  E.g., query for zone files, or DNSSEC records (both large record types).  Botnet hosts spoof DNS queries with victim’s IP address as source  Resolver responds by sending massive volumes of data to the victim

DNS amplification illustrated 30 Hosts infected by botnet Open Resolver Victim Src: Victim Dst: Open Resolver DNS … Src: Victim Dst: Open Resolver DNS … Sometimes the DNS resolver network thinks it is under attack by the victim!!

Amplification not unique to DNS 31  NTP is the latest protocol to be used in this way:  advisory-ddos-ntp-amplification.html  (Exploiting NTP Monlist command which returns a list of 600 most recent hosts to connect to the NTP server)

 DNS Basics  DNS Security  DNS + Censorship (reading presentation) Outline 32

Much More to DNS 33  Caching: when, where, how much, etc.  Other uses for DNS (i.e. DNS hacks)  Content Delivery Networks (CDNs)  Different types of DNS load balancing  Dynamic DNS (e.g. for mobile hosts)  DNS and botnets  Politics and growth of the DNS system  Governance  New TLDs (.xxx,.biz), eliminating TLDs altogether  Copyright, arbitration, squatting, typo-squatting