DNS Security Brad Pokorny The University of Minnesota Informal Security Seminar 4/18/03.

Slides:



Advertisements
Similar presentations
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Advertisements

Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Lecture 18 Page 1 CS 236 Online DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
DNS Security A.Lioy, F.Maino, M. Marian, D.Mazzocchi Computer and Network Security Group Politecnico di Torino (Italy) presented by: Marius Marian.
A New Approach to DNS Security (DNSSEC) Author: Giuseppe Ateniese Stefan Mangard Presenter: Liu, Xiaotao.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
DNS: Revising the Current Protocol Matt Gustafson Matt Weaver CS522 Computer Communications University of Colorado, Colorado Springs.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Domain Name System ( DNS )  DNS is the system that provides name to address mapping for the internet.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
DNS Domain Name Service References: Wikipedia 1.
Domain Name Services Oakton Community College CIS 238.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
CS 4396 Computer Networks Lab
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts: – IP address (32 bit) - used for addressing datagrams – “name”, e.g.,
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Chapter 16 – DNS. DNS Domain Name Service This service allows client machines to resolve computer names (domain names) to IP addresses DNS works at the.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
IIT Indore © Neminath Hubballi
DNS: Domain Name System
1 DNS: Domain Name System People: many identifiers: m SSN, name, Passport # Internet hosts, routers: m IP address (32 bit) - used for addressing datagrams.
Chapter 17 Domain Name System
Chapter 29 Domain Name System (DNS) Allows users to reference computer names via symbolic names translates symbolic host names into associated IP addresses.
Domain Name System CH 25 Aseel Alturki
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Chapter 16 – The Domain Name System (DNS) Presented by Shari Holstege Tuesday, June 18, 2002.
Wei-li Tang, August 28 th Department of Computer Science and Information Engineering, National Chi Nan University. On the Performance and Analysis.
Internet and Intranet Protocols and Applications Lecture 5 Application Protocols: DNS February 20, 2002 Joseph Conron Computer Science Department New York.
Naming March 8, Networks What is naming?  Associations between some elements in a set of names and some elements in a set of values  Binding.
1 Kyung Hee University Chapter 18 Domain Name System.
Tony Kombol ITIS DNS! overview history features architecture records name server resolver dnssec.
CPSC 441: DNS 1. DNS: Domain Name System Internet hosts: m IP address (32 bit) - used for addressing datagrams m “name”, e.g., - used by.
Configuring Name Resolution and Additional Services Lesson 12.
EE 122: Lecture 20 (Domain Name Server - DNS) Ion Stoica Nov 15, 2001 (* based on the some on-line slides of J. Kurose & K. Rose and of Raj Jain)
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
DNS DNS overview DNS operation DNS zones. DNS Overview Name to IP address lookup service based on Domain Names Some DNS servers hold name and address.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Lecture 18 Page 1 CS 236, Spring 2008 DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Basics of the Domain Name System (DNS) By : AMMY- DRISS Mohamed Amine KADDARI Zakaria MAHMOUDI Soufiane Oujda Med I University National College of Applied.
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Short Intro to DNS (part of Tirgul 9) Nir Gazit. What is DNS? DNS = Domain Name System. For translation of host names to IPs. A Distributed Database System.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
MAN-IN-THE-MIDDLE ATTACK STEGANOGRAPHY Lab# MAC Addresses and ARP  32-bit IP address:  network-layer address  used to get datagram to destination.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
Security Issues with Domain Name Systems
DNS Security Advanced Network Security Peter Reiher August, 2014
DNS Security Issues SeongHo Cho DPNM Lab., POSTECH
DNS Cache Poisoning Attack
Chapter 19 Domain Name System (DNS)
A New Approach to DNS Security (DNSSEC)
NET 536 Network Security Lecture 8: DNS Security
Chapter 25 Domain Name System
NET 536 Network Security Lecture 6: DNS Security
DNS: Domain Name System
Chapter 25 Domain Name System
COMPUTER NETWORKS PRESENTATION
Computer Networks Presentation
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Presentation transcript:

DNS Security Brad Pokorny The University of Minnesota Informal Security Seminar 4/18/03

Outline  Introduction to DNS  The problems with it  PK-DNSSEC  SK-DNSSEC  Comparison of PK-DNSSEC to SK- DNSSEC

Intro to DNS  Domain Name System – Distributed, hierarchical database that associates host names with IP addresses –Allows a user to find a system without knowing its IP (convenience) silicon.cs.umn.edu –Organizes the internet into domains

Hierarchical Ordering  Domains logically organized as an inverted tree –exa.cs.umn.edu - full specification of the machine with name exa –cs.umn.edu - the cs domain at umn –umn.edu - the University of Minnesota domain –edu - subdomain of root domain, denoted “.”  Divided into zones, delegating responsibilities  Allows scalability required by the internet  The Internet Corporation for Assigned Names and Numbers (ICANN) oversees the domain name assignments

Hierarchical Ordering

Each zone has a Name Server (NS)  NS maintains database of host information for its zone  Contact the authoritative NS of that zone to get host information (such as IP)  Information needs to be updated when host info changes in the zone  Dynamic updates change DNS data without having to rebuild any other part of the DNS tree

Resource Records (RR’s)  Hold all DNS data  Some examples –NS - Defines the name server of a zone –A - Maps a hostname to an IP address –CNAME (Canonical Name) - Maps a hostname alias to an A record  RR’s can be cached for performance –The TTL field of an RR specifies how long it should be cached for

The problem: Domain Hijacking  IP addresses in DNS database are changed by unauthorized hosts to point traffic destined for one domain to another  Several ways to do it 1.DNS Spoofing - Trick the DNS server into trusting an update of IP addresses 2.Cache Poisoning - False IP with a high TTL, which the DNS server will cache for a long time 3. Spoofing - Registration with ICANN often done via and authenticated by the address. Return addresses can be falsified 4.Hack the DNS Server - Change the data on the server itself 5.Human Error - Administrator enters the DNS information incorrectly  DNSSEC can help prevent the first two

PK-DNSSEC - authenticate DNS data requests and replies  Use public key cryptography to implement digital signatures  Include security related DNS data as new resource records in servers and hosts

What PK-DNSSEC does NOT do  DNS data is public –No differentiation of responses to different inquirers –No confidentiality  No Denial of Service protection

Verifying Data Authenticity and Integrity  Each RRset sent as a reply to a DNS query will be accompanied by a digital signature generated with the sender’s private key  The receiver can verify the authenticity and integrity of the message by verifying the signature  DNSSEC specifies a new RR called KEY, the public key of a system –As always, we MUST have an authentic public key  The SIG resource record is the digital signature of a reply/request Host A NS for Host B 1. DNS Request 2. DNS Answer || Signature(DNS Answer) 3. Host A verifies signature

The SIG RR  Contains RDATA and the signature field that binds all RR data to a sender –The digital signature algorithm can be specified –Takes input of data = RDATA | RR(s)... –RDATA is the plaintext data in the SIG RR –RR(s) is the set of RR's being transmitted –Sender computes s = E kr [h(data)]  Receiver: verifies –D ku [s] =? h(data)

The SIG RR

 Usually doesn't require changes to the original DNS protocol.  However, we do need authentic public keys...

Walking the chain of trust - Obtaining Authentic Public Keys  Host A queries for information about Host B  There is 1 trusted server (the authentic public key is known)  That server knows the public key of Host B  The trusted server sends the public key of Host B to Host A with a digital signature of the key  Host A can authenticate Host B’s public key because the trusted server’s public key is known  Can be recursively applied to obtain the public key of any system

Authenticating negative replies - NXT RR  Host A sends a request for host B's (in another domain) DNS data  There is no host B, so the NS for a zone replies that it doesn't exist  An attacker obtains a copy of this message and can replay it for request for other hosts  The attacker makes existing systems "disappear"  The NXT record prevents this attack –NXT is used to get the “next” host in the domain –NXT can be authenticated –The chain of NXT’s will show that a host really doesn’t exist if there is no entry for it

SK-DNSSEC (Ateniese)  Using symmetric key cryptography would be more efficient  Encryption and decryption are faster and require smaller keys  Notice that with PK-DNSSEC –The DNS system acts as an online Certificate Authority –Each DNS name server that supplies public keys must be unconditionally trusted  Ateniese says we can use symmetric key crypto because of these requirements

SK-DNSSEC uses both public and private key crypto  Root has a globally known public key –All systems can authenticate communications from root  Use symmetric key certificates build chain of trust

Protocol Overview Root Host A 1.E ku_root (PH,k1,k2,Root_Cert_Req).edu 2.P RA,E k1 (k RA,MAC k2 (k RA,P RA )) 3.P RA,DNS_Req,Nonce 0 4.P.eduA,DNS_Ans 0,E kRA_1 (k.eduA,MAC kRA_2 (DN S_Ans 0,Nonce 0,k.eduA )) 5.P.eduA,DNS_Req,Nonce 1 6.P umn.eduA,DNS_Ans 1,E k.eduA_1 (k umn.eduA,MAC k.eduA_2 (DNS_Ans 1, Nonce 1,k umn.eduA )) umn.edu 7.P umn.eduA,DNS_Req,Nonce 2 8.DNS_Ans 2,MAC kumn.eduA_2 (DNS_Ans 2,Nonce 2 ) Host A requests information about host.umn.edu

SK-DNSSEC Protocol Details

Protocol Details

Advantages of SK-DNSSEC  Efficiency –SK signatures can be created and verified much faster than PK signatures –PK signatures can be reused for performance, but verification is slow and must be done for every answer

Advantages of SK-DNSSEC  Query and response sizes –Authenticated PK-DNSSEC queries and responses don’t fit into 512byte UDP datagrams, but SK- DNSSEC authoritative answers and referrals will –PK-DNSSEC must send a signature for each RRset, but SK-DNSSEC only sends 1 signature per query  Storage Size –Signing a zone file in a PK-DNSSEC server increases its size by 7 times –SK-DNSSEC gives a minimal increase –Don’t need to store NXT records with SK-DNSSEC –Smaller size means that more certificates can be cached to increase performance

Advantages of SK-DNSSEC  Replay protection –PK-DNSSEC signatures may be replayed if the validity time is long –SK-DNSSEC uses nonces to prevent replay  Possible extensions –Mutual authentication –Confidentiality –Can be combined with PK-DNSSEC Top level domains use PK certificates Lower level use SK certificates

Resources ATEN01 Ateniese, G., Mangard, S. "A New Approach to DNS Security (DNSSEC). “Eighth ACM Conference on Computer and Communications Security, November EAST99 Eastlake, D. "Domain Name System Security Extensions." RFC 2535, March PK-DNSSEC diagram from EAST99 SK-DNSSEC diagrams from ATEN01