Lecture 18 Page 1 CS 236 Online DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.

Slides:



Advertisements
Similar presentations
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Advertisements

DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
COS 420 DAY 23. Agenda Assignment 4 Corrected 2 B’s Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
20101 The Application Layer Domain Name System Chapter 7.
Application Layer At long last we can ask the question - how does the user interface with the network?
Domain Name System: DNS
DNS Security Extensions (DNSSEC) Ryan Dearing. Topics History What is DNS? DNS Stats Security DNSSEC DNSSEC Validation Deployment.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 9 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
DNS Security Brad Pokorny The University of Minnesota Informal Security Seminar 4/18/03.
DNS. Outline r Domain Name System r DNS Hierarchy r Resolution.
CSE 461 Section (Week 0x02). Port numbers for applications MAC addresses for hardware IP addresses for a way to send data in a smart, routable way.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks.
Information-Centric Networks03a-1 Week 3 / Paper 1 What DNS is not –Paul Vixie –CACM, December 2009, vol. 52, no. 12 Main point –“DNS is many things to.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Ch-9: NAME SERVICES By Srinivasa R. Gudipati. To be discussed.. Fundamentals of Naming Services Naming Resolution The Domain Name System (DNS) Directory.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
CSUF Chapter 6 1. Computer Networks: Domain Name System 2.
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
Network security BGP and DNS Worms.
Issues in Internet Security. Securing the Internet How does the internet hold up security-wise? How does the internet hold up security-wise? Not well:
IIT Indore © Neminath Hubballi
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
DNS: Domain Name System
1 Application Layer Lecture 6 Imran Ahmed University of Management & Technology.
Chapter 29 Domain Name System (DNS) Allows users to reference computer names via symbolic names translates symbolic host names into associated IP addresses.
Domain Name System CH 25 Aseel Alturki
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Security Through Publicity Eric Osterweil Dan Massey Batsukh Tsendjav Beichuan Zhang Lixia Zhang.
TODAY & TOMORROW DAY 2 - GROUP 5 PRESENTED BY: JAMES SPEIRS CHARLES HIGBY BRADY REDFEARN Domain Name System (DNS)
Lecture 27 Page 1 Advanced Network Security Routing Security Advanced Network Security Peter Reiher August, 2014.
Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
EE 122: Lecture 20 (Domain Name Server - DNS) Ion Stoica Nov 15, 2001 (* based on the some on-line slides of J. Kurose & K. Rose and of Raj Jain)
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Lecture 11 Page 1 CS 136, Fall 2012 Network Security, Continued CS 136 Computer Security Peter Reiher November 6, 2012.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
Information-Centric Networks Section # 3.1: DNS Issues Instructor: George Xylomenos Department: Informatics.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
UNIT 2 LESSON 9 CS PRINCIPLES. UNIT 2 LESSON 9 OBJECTIVES Students will be able to: Explain the inefficiencies of everyone managing their own name-to-
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Lecture 18 Page 1 CS 236, Spring 2008 DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Internet infrastructure 1. Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing.
CSE 461 Section. Port numbers for applications MAC addresses for hardware IP addresses for a way to send data in a smart, routable way.
Lecture 18 Page 1 CS 236 Online Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems.
MAN-IN-THE-MIDDLE ATTACK STEGANOGRAPHY Lab# MAC Addresses and ARP  32-bit IP address:  network-layer address  used to get datagram to destination.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
Outline Routing security DNS security. Securing Key Internet Technologies Computer Security Peter Reiher March 14, 2017.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Security Issues with Domain Name Systems
DNS Security Advanced Network Security Peter Reiher August, 2014
Chapter 9: Domain Name Servers
IMPLEMENTING NAME RESOLUTION USING DNS
DNS Cache Poisoning Attack
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS security.
The Issue We all depend on the Internet
Chapter 19 Domain Name System (DNS)
NET 536 Network Security Lecture 8: DNS Security
NET 536 Network Security Lecture 6: DNS Security
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Presentation transcript:

Lecture 18 Page 1 CS 236 Online DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu translates to –DNS also provides other similar services It wasn’t designed with security in mind

Lecture 18 Page 2 CS 236 Online DNS Threats Threats to name lookup secrecy –Definition of DNS system says this data isn’t secret Threats to DNS information integrity –Very important, since everything trusts that this translation is correct Threats to DNS availability –Potential to disrupt Internet service

Lecture 18 Page 3 CS 236 Online What Could Really Go Wrong? DNS lookups could be faked –Meaning packets go to the wrong place The DNS service could be subject to a DoS attack –Or could be used to amplify one Attackers could “bug” a DNS server to learn what users are looking up

Lecture 18 Page 4 CS 236 Online Where Does the Threat Occur? Unlike routing, threat can occur in several places –At DNS servers –But also at DNS clients Which is almost everyone Core problem is that DNS responses aren’t authenticated

Lecture 18 Page 5 CS 236 Online The DNS Lookup Process ping thesiger.cs.ucla.edu Should result in a ping packet being sent to lookup thesiger.cs.ucla.edu answer If the answer is wrong, in standard DNS the client is screwed

Lecture 18 Page 6 CS 236 Online How Did the DNS Server Perform the Lookup? Leaving aside details, it has a table of translations between names and addresses It looked up thesiger.cs.ucla.edu in the table And replied with whatever the address was

Lecture 18 Page 7 CS 236 Online Where Did That Table Come From? Ultimately, the table entries are created by those owning the domains –On a good day... And stored at servers that are authoritative for that domain In this case, the UCLA Computer Science Department DNS server ultimately stored it Other servers use a hierarchical lookup method to find the translation when needed

Lecture 18 Page 8 CS 236 Online Doing Hierarchical Translation lookup thesiger.cs.ucla.edu DNS root server Where’s edu? edu root server Where’s ucla.edu? ucla.edu root servercs.ucla.edu root server Where’s thesiger.cs.ucla.edu? Where’s cs.ucla.edu?

Lecture 18 Page 9 CS 236 Online Where Can This Go Wrong? Someone can spoof the answer from a DNS server –Relatively easy, since UDP is used One of the DNS servers can lie Someone can corrupt the database of one of the DNS servers

Lecture 18 Page 10 CS 236 Online The Spoofing Problem lookup thesiger.cs.ucla.edu answer answer Unfortunately, most DNS stub resolvers will take the first answer

Lecture 18 Page 11 CS 236 Online DNS Servers Lying lookup thesiger.cs.ucla.edu... answer That wasn’t very nice of him! thesiger.cs.ucla.edu

Lecture 18 Page 12 CS 236 Online DNS Database Corruption lookup thesiger.cs.ucla.edu... answer thesiger.cs.ucla.edu

Lecture 18 Page 13 CS 236 Online The DNSSEC Solution Sign the translations Who does the signing? –The server doing the response? –Or the server that “owns” the namespace in question? DNSSEC uses the latter solution

Lecture 18 Page 14 CS 236 Online Implications of the DNSSEC Solution DNS databases must store signatures of resource records There must be a way of checking the signatures The protocol must allow signatures to be returned

Lecture 18 Page 15 CS 236 Online Checking the Signature Basically, use certificates to validate public keys for namespaces Who signs the certificates? –The entity controlling the higher level namespace This implies a hierarchical solution

Lecture 18 Page 16 CS 236 Online The DNSSEC Signing Hierarchy In principle, ICANN signs for itself and for top level domains (TLDs) –Like.com,.edu, country codes, etc. Each TLD signs for domains under it Those domains sign for domains below them And so on down

Lecture 18 Page 17 CS 236 Online An Example Who signs the translation for thesiger.cs.ucla.edu to ? The UCLA CS DNS server How does someone know that’s the right server to sign? Because the UCLA server says so –Securely, with signatures The edu server verifies the UCLA server’s signature Ultimately, hierarchical signatures leading up to ICANN’s attestation of who controls the edu namespace Where do you keep that information? –In DNS databases

Lecture 18 Page 18 CS 236 Online Using DNSSEC To be really secure, you must check signatures yourself Next best is to have a really trusted authority check the signatures –And to have secure, authenticated communications between trusted authority and you

Lecture 18 Page 19 CS 236 Online A Major Issue When you look up something like cs.ucla.edu, you get back a signed record What if you look up a name that doesn’t exist? How can you get a signed record for every possible non-existent name?

Lecture 18 Page 20 CS 236 Online The DNSSEC Solution Names are alphabetically orderable Between any two names that exist, there are a bunch of names that don’t Sign the whole range of non-existent names If someone looks one up, give them the range signature

Lecture 18 Page 21 CS 236 Online For Example, lasr.cs.ucla.edu pelican.cs.ucla.edu toucan.cs.ucla.edu pelican.cs.ucla.edu toucan.cs.ucla.edu lbsr.cs.ucla.edu – pd.cs.ucla.edu NOT ASSIGNED > host last.cs.ucla.edu You get authoritative information that the name isn’t assigned Foils spoofing attacks

Lecture 18 Page 22 CS 236 Online Status of DNSSEC Working implementations available In use in some places Heavily promoted –First by DARPA –Now by DHS But not really successful –That may be changing –.gov is signed, as of 2010 –ICANN signed root July 1, 2010

Lecture 18 Page 23 CS 236 Online Status of DNSSEC Deployment ICANN has signed the root –.com,.gov,.edu,.org,.net all signed at top level –Not everyone below has signed, though Many “islands” of DNSSEC signatures –Signing for themselves and those below them –In most cases, just for themselves Utility depends on end machines checking signatures