DNS & DHCP in the 21st Century William D. Kramp Network Administrator Finger Lakes Community College.

Slides:



Advertisements
Similar presentations
Review iClickers. Ch 1: The Importance of DNS Security.
Advertisements

State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Chapter 8 Managing Windows Server 2008 Network Services
1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 6 Managing and Administering DNS in Windows Server 2008.
Nassau Community College
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Domain Name System. DNS is a client/server protocol which provides Name to IP Address Resolution.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 5: Planning, Configuring, And Troubleshooting DHCP.
Chapter 7 HARDENING SERVERS.
RNDC & TSIG. What is RNDC? Remote Name Daemon Controller Command-line control of named daemon Usually on same host, can be across hosts –Locally or remotely.
Chapter 8 Administering TCP/IP.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 8: Managing and Troubleshooting DNS.
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
Chapter 13 Chapter 13: Managing Internet and Network Interoperability.
Hands-On Microsoft Windows Server 2003 Administration Chapter 9 Administering DNS.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Hands-On Microsoft Windows Server 2003 Networking Chapter 5 Dynamic Host Configuration Protocol.
Domain Name Server © N. Ganesan, Ph.D.. Reference.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Domain Name Services Oakton Community College CIS 238.
Windows Server 2008 Chapter 8 Last Update
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Ch 8-3 Working with domains and Active Directory.
AD DNS SRV RRs Active Directory DNS Service (SRV) Resource Records (RR)
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Name Resolution Domain Name System.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Windows Server 2008 R2 Domain Name System Chapter 5.
Module 2: Implementing DNS to Support Active Directory
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
Chapter 17 Domain Name System
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Chapter 16 – The Domain Name System (DNS) Presented by Shari Holstege Tuesday, June 18, 2002.
Secured Dynamic Updates. Caution Portions of this slide set present features that do not appear in BIND until BIND 9.3 –Snapshot code is available for.
5.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 5: Planning.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 10 Implementing Dynamic Host Configuration Protocol (DHCP)
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
1 Kyung Hee University Chapter 18 Domain Name System.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 5: Managing and Monitoring DHCP.
1 Internet Network Services. 2 Module - Internet Network Services ♦ Overview This module focuses on configuring and customizing the servers on the network.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
Linux Operations and Administration
Linux Operations and Administration
Web Server Administration Chapter 4 Name Resolution.
OPTION section It is the first section of the named.conf User can use only one option statement and many option-value pair under the section. Syntax is.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
Security Issues with Domain Name Systems
IMPLEMENTING NAME RESOLUTION USING DNS
Chapter 19 Domain Name System (DNS)
Managing Name Resolution
NET 536 Network Security Lecture 8: DNS Security
NET 536 Network Security Lecture 6: DNS Security
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
Presentation transcript:

DNS & DHCP in the 21st Century William D. Kramp Network Administrator Finger Lakes Community College

Where is FLCC located?

Resources DNS and BIND, 4 th Edition, by Paul Albitz & Cricket Liu Microsoft Win2000 DNS Documentation: /win2ksrv/reskit/tcpch06.asp /win2ksrv/reskit/tcpch06.asp Copy of the PowerPoint presentation: ations/DNS/index.htm

Presentation Topics BIND 9.1.x DNS Features BIND 9.1.x Diagnostic Tools DNS Security Practices DNS Security Extensions DNS and DHCP with Win2000

What is DNS? DNS stands for Domain Name System. A distributed database that matches domain names to IP numbers. Developed in the mid-1980’s to replace the use of the hosts file.

BIND 9.1.x DNS Features Multiple Views Multiprocessor Support IP Version 6 A6 DNAME Bitstring Labels Functional DNSSEC

BIND 9.1.x - Diagnostic Tools Named-checkconf – Will check the configuration file (named.conf) for any syntax errors. Named-checkzone – Will check a specified zone file for syntax errors. Example: named-checkzone /path/db.flcc

DNS Security Practices Operating System Security Restricting Access Transaction Signatures (TSIG) List of BIND vulnerabilities: -security.html

A Popular Port to Probe On dShields web site DNS was the single most probed port at 13%, with port 111 (rpc) second at 7% on June 13, Dshield takes reports from various firewalls like Cisco and ipchains to IDSs like Snort and ZoneAlarm.

Dshield Probe Graph

Other monitoring sites (SANS) SANS runs the Consensus Intrusion Database, that compiles information from dshield, mywatchman, and other data sources.

Operating System Security Chroot DNS Server - Trap the name server in a subdirectory of the file system. Least Privilege – Normally runs as root. Change owner and group to a user with lower privileges after binding to port 53.

DNS Security Practices Hiding the BIND version. Restricting: Query Requests Recursion Zone Transfers Notify Sending DNS requests to the Blackhole

Security by Obscurity Stop BIND from providing a version number. Makes it easier for Black Hats to find vulnerable servers. Command txt chaos version.bind” In options section: version “FLCC BIND”

Restricting Query Access Allow-query – Restrict access to who can look up information in local zones. This could be used to allow only local users to look at an internal DNS (view). Example: allow-query { /16; };

Restricting Recursion Allow-recursion – Restrict who can use the DNS server for recursive lookups. Leaving this open could allow a remote user to use your DNS resources. Example: allow-recursion { /24; /24; };

Restricting Zone Transfer Allow-transfer – Restricts which secondary DNS servers can perform zone transfers. Don’t want to give the Black Hats a road map of your site. Example: allow-transfer { ; ; }; or allow-transfer { none; };

Restricting Notify Allow-notify – Primary server can send a message to the secondary to initiate a zone transfer. A third party could launch a DoS attack by causing the secondary to repeatedly query the Primary server. Example: allow-notify { ; };

Restricting Dynamic Update Allow-update – This allows the DNS zones to be updated with new Resource Records (RR). Win2000 depends on this feature to operate. But could be used by clients to for unauthorized additions and deletions from the zone. Example: allow-update { none; };

Blackhole The blackhole command allows you to ignore any DNS requests or commands from a single IP, or a list of IP ranges. Could also block RFC1918 reserved addresses, multicast, etc. Example: blackhole { /16; };

Transaction Signatures (TSIG) TSIG uses a one-way hash function with a shared key for authenticating: DNS responses and updates. Only useful between a small number of servers. A compromised server would expose the shared key of all the servers. Used when IP based security is not enough.

DNS Security Extensions DNSSEC RFC2535 Updates: RFC3008, RFC3090, RFC3110 Available in BIND 8.2, but not fully functional. Public Key Cryptography – Key pairs: one public, one private.

DNSSEC Information DNS Records KEY SIG NXT Chain of Trust

DNS KEY Record KEY record used to publish Public key. The KEY record can also be used for other purposes like encryption. Various encryption algorithms: RSA/MD5, Diffie-Hellman, DSA.

DNS SIG Record SIG (Signature) record holds the digital signature of a RRset using the private keys. RRset A Resource Record set is collection of resource records with the same name, type and class. Used with Dynamic DNS

DNS NXT Record The NXT record is sent in response to a failed query. Provides a list of record types that are available for the query, plus the next domain name in the list. The list is composed of the all the domain names in the zone, sorted by dictionary order, case-insensitively.

Chain of Trust Each RRset in a secure zone has a SIG record. Public KEY record used to verify SIG record. Public KEY record certified by a higher authority (.edu zone) KEY record of.edu zone certified by root servers.

DNS and DHCP with Win2000 DNS and DHCP are the backbone to the operation of Windows LDAP and Kerberos also play a big part to form Active Directory (AD). Wave goodbye to WINS and browsing!!!

Windows Dynamic DNS RFC compliant DNS service. Windows relies on dynamic DNS to operate. Win2000 Clients and Servers register with the DNS server to provide a name and corresponding IP number. They also register service (SRV) record information as needed.

SRV Records SRV records are used for locating services. Example: _ldap._tcp.library.flcc.edu The first label specifies the ldap service. The second label specifies the protocol. The domain name is then listed.

SRV Records, Part 2 Static IP#s don’t have to be assigned to the servers since they will be dynamically registered in the zone. Problem, some network devices can only use static IP numbers for connecting to the servers.

Sample of Library DNS Zone _ldap._tcp 600 SRV dale.library. 600 SRV chip.library. _kerberos._udp 600 SRV dale.library. 600 SRV chip.library. chip 900 A dale 900 A library1 900 A library A

Windows DHCP Security Windows has supports several features for security of DNS and DHCP. Windows 2000 DHCP servers can not hand out IP’s without first being registered with the local AD server. Can also detect and log the IP of rogue DHCP servers.

Windows Dynamic Update During the DHCP process, the Win2000 client will send the DHCP server a DHCPREQUEST packet with FQDN option. The FQDN option has several flags that indicate if the client will register with the DNS server, or if the DHCP server should do it.

Registering with DDNS If the Windows 2000 client performs the registration with the Dynamic DNS server. It will check to see if there is an address record registered for the domain name or an alias. If no to both, it will send a dynamic update to the DDNS server.

Non-Win2000 Client Updates Clients that are not running Windows 2000 like: Win98/98, NT, Linux, Mac’s; will not send the FQDN option. If the DHCP server is configured to perform the dynamic update, it will automatically do so for the client.

Statically Configured Win2000 Windows 2000 clients that are statically configured with an IP address will still dynamically update the DNS server. Every 24 hours, or after a reboot. The Win2000 clients (and servers) will attempt to register their A, PTR, and other Resource Records.

Secure Dynamic Update Normal dynamic DNS updates are open for abuse. Microsoft offers a secure update service which uses a GSS algorithm for TSIG (an IETF Internet-Draft). Uses Kerberos for authentication. Won’t work with non-Win200 clients.

Stale DNS Records Over time, dynamic DNS entries will be left behind in the zones. Clients and DHCP servers are suppose to remove their Resource Records automatically. But if clients are not shut down properly, or if the network is disrupted…

Scavenging DNS Records Windows 2000 DNS servers can be set to scavenge stale DNS records. But it is not the default setting. Must be sure you understand all the ramifications before enabling it. Scavenging can be enabled by: server, zone, or record.