Investigations into BIND Dynamic Update with OpenSSL by David Wilkinson.

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
Lecture 23 Internet Authentication Applications
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Mar 19, 2002Mårten Trolin1 This lecture On the assignment Certificates and key management SSL/TLS –Introduction –Phases –Commands.
Enhanced Secure DNS: A Defense Against DDOS Attacks by David B. Wilkinson University of Colorado at Colorado Springs November 26, 2003.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Jonas Lippuner. Overview IPCop  Introduction  Network Structure  Services  Addons Installing IPCop on a SD card  Hardware  Installation.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Design and Implementation of Alternative Route Against DDOS Jing Yang and Su Li.
Implementing Native Mode and Internet Based Client Management.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Using Multiple Gateways to Foil DDOS Attack by David Wilkinson.
Enhanced Secure Dynamic DNS Update with Indirect Route David Wilkinson, C. Edward Chow, Yu Cai 06/11/2004 University of Colorado at Colorado Springs IEEE.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
SSL Technology Overview and Troubleshooting Tips.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Host Identity Protocol
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Name Resolution Domain Name System.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
Secure Socket Layer (SSL)
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Module 11: Remote Access Fundamentals
Secured Dynamic Updates. Caution Portions of this slide set present features that do not appear in BIND until BIND 9.3 –Snapshot code is available for.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
ECE Prof. John A. Copeland fax Office: Klaus 3362.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Module 9: Fundamentals of Securing Network Communication.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
DNS Session 5 Additional Topics Joe Abley AfNOG 2006, Nairobi, Kenya.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Windows Vista Configuration MCTS : Advanced Networking.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
Security Issues with Domain Name Systems
Module 8: Securing Network Traffic by Using IPSec and Certificates
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
NET 536 Network Security Lecture 8: DNS Security
Module 8: Securing Network Traffic by Using IPSec and Certificates
Unit 8 Network Security.
Presentation transcript:

Investigations into BIND Dynamic Update with OpenSSL by David Wilkinson

Overview of DDOS attack DNS... Victim A = Agent R = Router AAAAAAAA compromised.netvigilant.netincompetent.net DNS... R R reflecting networks R R R R R R R

Stopping attack with the Secure Collective Defense (SCOD) DNS... Victim A = Agent R = Router AAAAAAAA compromised.netvigilant.netincompetent.net DNS... R R reflecting networks R R RR R R proxy blocked blocked by IDS blocked reroute “Could I get some help here?”

This project: focus on sending the reroute message to the servers of authority (soa) of preferred clientele Potential roadblocks/snafus: –How to authenticate machine sending the reroute command to the various DNS servers, and visa versa? –How to change DNS software to accept this new command and reroute clients accordingly?

Using OpenSSL for Authentication BIND9’s transaction signatures (TSIG) use shared keys for verification; not practical for verifying any machine on Internet BIND9’S DNS Security Extensions (DNSSEC) utilize public key cryptography to allow the client to authenticate the server, but not the other way around A secure socket layer (SSL) on the other hand, enables any client and server on the Internet to verify the legitimacy of each other using public key cryptography. Use OpenSSL here because it’s free.

Combine OpenSSL with a modified version of ‘nsupdate’ to create ‘reroute’ In BIND9, the nsupdate command allows an authorized machine to change the zone data in a DNS server Mostly used by ISPs and large companies to assign IP addresses to dialup and cable modem customers dynamically ex: #nsupdate >prereq nxdomain mib.fx.movie.edu. >update add mib.fx.movie.edu. 300 A > result: host mib.fx.movie.edu with IP address is added to server’s zone file!

reroute is different from nsupdate in the following ways: reroute does not update the zone data for its own network’s (i.e., the victim’s) server of authority (soa). Instead it needs to add a new temporary zone file (that maps the victim host to the IP address of a proxy server in the SCOD schema) in the soa of every preferred client it has in its database. Dynamic updates cannot add new zones, period. (Or, in an alternate solution, reroute may add the preferred clients to a new ‘view’ in the victim’s DNS server. This view maps the victim host to the IP address of a proxy server. nsupdate cannot add new views nor add clients to the view list. However, during a DDOS attack, the victim’s DNS server may become unavailable, so the first option may be preferable.) Mutual authentication between server and client with SSL

Progress on adding SSL to nsupdate Learned how to configure OpenSSL to create a certificate for a trusted root CA. Changed configuration file to create client and server certs signed by this CA. Set up a simple client and server that authenticated each other and communicated through an encrypted channel. Traced the flow of nsupdate with GDB with the TCP option (-v) set. nsupdate.c and request.c must be modified on client (i.e., nsupdate) side; interfacemgr.c and client.c must be modified on server (i.e., named) side. Adding code to client side not without trials and tribulations; not enough time for server side.

Work Ahead Get nsupdate and named to actually authenticate each other Make new command, reroute, from nsupdate that adds temp. zone files to foreign DNS servers or, alternatively, adds a new view to the victim DNS server with a match-list of preferred customers. This view routes the clients to the victim through proxy servers.

References DNS and BIND. Paul Albitz and Cricket Liu, O’Reilly & Associates, Inc., Network Security with OpenSSL. John Viega, Matt Messier & Pravir Chandra, O’Reilly, “The ‘stacheldraht’ distributed denial of service attack tool.” David Dittrich, University of Washington, Dec. 31, “DRDoS: Distributed Reflection Denial of Service.” Steve Gibson, grc.com, Feb. 22, 2002.