DNS Security A.Lioy, F.Maino, M. Marian, D.Mazzocchi Computer and Network Security Group Politecnico di Torino (Italy) presented by: Marius Marian.

Slides:



Advertisements
Similar presentations
Review iClickers. Ch 1: The Importance of DNS Security.
Advertisements

State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
A New Approach to DNS Security (DNSSEC) Author: Giuseppe Ateniese Stefan Mangard Presenter: Liu, Xiaotao.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
Who’s watching your network DNS Security Extensions Presentation to 19th NANOG meeting Albuquerque, NM Edward Lewis NAI Labs June 11-13,
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
DNS: Revising the Current Protocol Matt Gustafson Matt Weaver CS522 Computer Communications University of Colorado, Colorado Springs.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 9 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Domain Name System ( DNS )  DNS is the system that provides name to address mapping for the internet.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
DNS Security Brad Pokorny The University of Minnesota Informal Security Seminar 4/18/03.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Module 3 DNS Types.
Tony Kombol ITIS Who knows this? Who controls this? DNS!
Identity Management and DNS Services Tianyi XING.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Chapter 16 – DNS. DNS Domain Name Service This service allows client machines to resolve computer names (domain names) to IP addresses DNS works at the.
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
IIT Indore © Neminath Hubballi
1 DNS: Domain Name System People: many identifiers: m SSN, name, Passport # Internet hosts, routers: m IP address (32 bit) - used for addressing datagrams.
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Computer Communication & Networks Lecture 26 Application Layer: Domain Name System Waleed Ejaz.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
Domain Name System CH 25 Aseel Alturki
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Internet and Intranet Protocols and Applications Lecture 5 Application Protocols: DNS February 20, 2002 Joseph Conron Computer Science Department New York.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Tony Kombol ITIS DNS! overview history features architecture records name server resolver dnssec.
Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
Configuring Name Resolution and Additional Services Lesson 12.
1 Internet Network Services. 2 Module - Internet Network Services ♦ Overview This module focuses on configuring and customizing the servers on the network.
How to use DNS during the evolution of ICN? Zhiwei Yan.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
* Agenda  What is the DNS ?  Poisoning the cache  Short term solution  Long term solution.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
Using Public Key Cryptography Key management and public key infrastructures.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
Linux Operations and Administration
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Internet Naming Service: DNS* Chapter 5. The Name Space The name space is the structure of the DNS database –An inverted tree with the root node at the.
Basics of the Domain Name System (DNS) By : AMMY- DRISS Mohamed Amine KADDARI Zakaria MAHMOUDI Soufiane Oujda Med I University National College of Applied.
Internet infrastructure 1. Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing.
Monitoring, analyzing and cleaning DNS configuration errors across European NRENs Slavko Gajin University of Belgrade, Serbia
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
MAN-IN-THE-MIDDLE ATTACK STEGANOGRAPHY Lab# MAC Addresses and ARP  32-bit IP address:  network-layer address  used to get datagram to destination.
Security Issues with Domain Name Systems
DNS Security.
Module 5: Resolving Host Names by Using Domain Name System (DNS)
DNS Security Issues SeongHo Cho DPNM Lab., POSTECH
IMPLEMENTING NAME RESOLUTION USING DNS
DNS Cache Poisoning Attack
Chapter 19 Domain Name System (DNS)
A New Approach to DNS Security (DNSSEC)
NET 536 Network Security Lecture 8: DNS Security
Chapter 25 Domain Name System
NET 536 Network Security Lecture 6: DNS Security
Chapter 25 Domain Name System
Computer Networks Presentation
Presentation transcript:

DNS Security A.Lioy, F.Maino, M. Marian, D.Mazzocchi Computer and Network Security Group Politecnico di Torino (Italy) presented by: Marius Marian

What is DNS? n A replicated, hierarchical, distributed system that provides: n name IP address translation n mail handling information n DNS can use either UDP or TCP protocols n DNS major components: n the domain name space described by the resource records (RR) (e.g., SOA, NS, A, MX,...) n name servers n resolvers

Name resolution process User program Name resolver Local machine System call Resolver’s response Primary name server Cache Refreshes Recursive query References Response Name server Name server Iterative query Response Iterative query Referral

DNS standard message format DNS query DNS response Header Question Answer Authority Additional Header Question Answer Authority Additional

Why is DNS security important? n Used extensively by INTERNET applications! n DNS security problems: n name servers can be easily spoofed and are vulnerable to many types of attacks (DoS, buffer overrun, replay, a.s.o.) n resolvers can be lead into trusting false information n security measures (e.g., ACLs) and mechanisms (e.g., credibility) make spoofing more difficult but not impossible! n June 1997, Eugene Kashpureff (Alternic founder) redirected the internic.net domain to alternic.net by caching bogus information on the Internic name server

DNS cache poisoning attack 1. anyhost.evil.com? 2. anyhost.evil.com? evil.com 3. Store query ID ns.evil.com A.B.C.D Attacker host broker.com any.broker.com cache 4. anyhost.evil.com=A.B.C.E ns.broker.com anyhost.evil.com=A.B.C.E 8. flooding false responses to name server bank.com ns.bank.com 9. A.B.C.D wrong connection to the attacker’s host 11.wrong response from cache

DNSSEC definition n DNS security extensions (RFC ): n SIG- stores digital signatures (asymmetric keys) n KEY- stores public keys n NXT- authenticates the non-existence of names or types of RRs in a domain n DNSSEC deals with RR sets (same label, type and class, different data), not singular RRs! n DNSSEC intends to provide: n data origin authentication and data integrity n key distribution n on a smaller scale - transaction and request authentication

DNSSEC characteristics (1) n KEY RR specifies n the type of key (zone, host, user), n the protocol (DNSSEC, IPSEC, TLS, etc.), n the algorithm (RSA/MD5, DSA, etc.), n SIG RR specifies n the RR type covered (SOA, A, NS, MX, etc.), n the algorithm (RSA/MD5, DSA, etc.), n the inception & expiration times, n the signer key footprint

DNSSEC characteristics (2) n NXT RR specifies n the next name in the zone n all the RR types covered by the current name n The private key is kept off-line and is used to sign the RR sets of the zone file n The public key is published in the KEY RR n The public key of a zone is signed by the parent zone private key n The parent zone signature on the zone’s public key is added to the zone file

DNS and DNSSEC zone files foo.com.SOA… foo.com.NS… a.foo.com.A… d.foo.com. A... foo.com. SOA… foo.com. SIG SOA… foo.com. SIG AXFR… foo.com. NS… foo.com. SIG NS… foo.com. KEY… foo.com. SIG KEY… foo.com. NXT a.foo.com. SOA AXFR NS KEY SIG foo.com. SIG NXT… a.foo.com. A… a.foo.com. SIG A … a.foo.com. NXT d.foo.com. A SIG a.foo.com. SIG NXT… d.foo.com. A… d.foo.com. SIGA… d.foo.com. NXTfoo.com. A SIG d.foo.com. SIGNXT…

DNSSEC chain of trust Root name server of the DNS tree com. Local name server. foo.com. name server host.foo.com host.foo.com. ? It receives the RRs: A, SIG, KEY KEY for com. ? It receives KEY, SIG RRs of com. The public key of root domain is pre - trusted by all the name servers! it. polito.it.

DNS transaction security n Transaction Signature (TSIG) is another security extension using shared secret keys - still an Internet draft! n A better solution - to have communication security between name servers and resolvers n TSIG authenticates DNS queries and responses n TKEY is a meta RR containing the secret key n TSIG, TKEY - not stored in the zone files/cache n PROBLEM: storage of the shared secret! n HMAC/MD5 provides authentication and integrity checking for transactions

DNS as a public key infrastructure n DNS with these security extensions can become the first implementation of a PKI world wide available n DNSSEC “chain of trust” is a model of certification n For storing certificates a new RR is added to DNS - the CERT RR defined in RFC 2538 n CERT can store PGP, X.509, SPKI certificates n RFC 2538 recommends that the size of certificates should be reduced at maximum - if possible, no extensions at all!

Remarks on DNSSEC n In the DNS, cryptography is used for authen- tication/ integrity, not for confidentiality n Attention must be paid to key generation, key storage and key lifetime - (RFC 2541) n Special care for root and TLD’s pair of keys! n Secure resolvers must be configured with some pre-trusted on-line public key (root) n The size of zone files grows up dramatically n Augments the data transferred, the messages (hence, TCP instead of UDP), also the number of computations (CPU cycles) n The responsibility of the administrators increases!

State of the Art n 1998, first prototype of a DNSSEC package based on BIND v4.9.4 produced by TIS Labs (Trusted Information Systems) n The new BIND v9 (ISC) will be a major rewrite of the underlying DNS architecture and will provide support for DNSSEC, TSIG and CERT n RSA Co. provides the DNSsafe cryptographic library for BIND v9

Conclusions n The security extensions provide: n protection of Internet-wide transfers: n the data is signed with public keys (SIG, KEY) n the absence of DNS data is notified (NXT) n protection of local DNS transfers: n the messages between name server and resolver are authenticated (TSIG) n zone transfers between primary/secondary name servers n public key infrastructure: n distribution of public keys for other security aware protocols (KEY) n distribution of different types of certificates (CERT)