Tony Kombol ITIS 3110. www.teacherstalk.com Who knows this? Who controls this? DNS!

Slides:



Advertisements
Similar presentations
Review iClickers. Ch 1: The Importance of DNS Security.
Advertisements

Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Domain Name System. DNS is a client/server protocol which provides Name to IP Address Resolution.
DNS Session 4: Delegation and reverse DNS Joe Abley AfNOG 2006 workshop.
Introduction to the DNS AfCHIX 2011 Blantyre, Malawi.
1 DNS. 2 BIND DNS –Resolve names to IP address –Resolve IP address to names (reverse DNS) BIND –Berkeley Internet Name Domain system Version 4 is still.
The Domain Name System. CeylonLinux DNS concepts using BIND 2 Hostnames IP Addresses are great for computers –IP address includes information used for.
CS335 Networking & Network Administration Wednesday, May 26, 2010.
Domain Name System (DNS) Network Information Center (NIC) : HOSTS.TXT.
Recursive Server. Overview Recursive Service Root server list localhost in-addr.arpa named.conf.
Domain Name System: DNS
Hands-On Microsoft Windows Server 2003 Administration Chapter 9 Administering DNS.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008.
DNS Security Extensions (DNSSEC) Ryan Dearing. Topics History What is DNS? DNS Stats Security DNSSEC DNSSEC Validation Deployment.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Domain Name System ( DNS )  DNS is the system that provides name to address mapping for the internet.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
Domain Name Services Oakton Community College CIS 238.
DNS Domain Name Systems Introduction 1. DNS DNS is not needed for the internet to work IP addresses are all that is needed The internet would be extremely.
Host Name Resolution. Overview Name resolution Name resolution Addressing a host Addressing a host Host names Host names Host name resolution Host name.
Domain Name System (DNS) Ayitey Bulley Session-1: Fundamentals.
Netprog: DNS and name lookups1 Address Conversion Functions and The Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Domain Names System The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the.
IIT Indore © Neminath Hubballi
Geoff Huston APNIC Labs
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Domain Name System HISTORY File hosts (the size of Internet became more than 1000.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
Chapter 17 Domain Name System
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Troubleshooting.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Chapter 16 – The Domain Name System (DNS) Presented by Shari Holstege Tuesday, June 18, 2002.
Module 8 DNS Tools & Diagnostics. Objectives Understand dig and nslookup Understand BIND toolset Understand BIND logs Understand wire level messages.
Netprog: DNS and name lookups1 Address Conversion Functions and The Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
Internet and Intranet Protocols and Applications Lecture 5 Application Protocols: DNS February 20, 2002 Joseph Conron Computer Science Department New York.
1 Kyung Hee University Chapter 18 Domain Name System.
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Practicalities.
Tony Kombol ITIS DNS! overview history features architecture records name server resolver dnssec.
Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
Configuring Name Resolution and Additional Services Lesson 12.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
Module 8 DNS Tools & Diagnostics. Dig always available with BIND (*nix) and windows Nslookup available on windows and *nix Dig on windows – unpack zip,
DNS DNS overview DNS operation DNS zones. DNS Overview Name to IP address lookup service based on Domain Names Some DNS servers hold name and address.
Linux Operations and Administration
AfNOG-2003 Domain Name System (DNS) Ayitey Bulley
Web Server Administration Chapter 4 Name Resolution.
1 CMPT 471 Networking II DNS © Janice Regan,
OPTION section It is the first section of the named.conf User can use only one option statement and many option-value pair under the section. Syntax is.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
Domain Name System (DNS) Joe Abley AfNOG Workshop, AIS 2014, Djibouti Session-1: Fundamentals.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Domain Name System DPNM Lab. Seongho Cho
Monitoring, analyzing and cleaning DNS configuration errors across European NRENs Slavko Gajin University of Belgrade, Serbia
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
Domain Name System (DNS) Ayitey Bulley extended by Phil Regnauld DNS Fundamentals AfNOG 2006.
Track E0 AfNOG workshop April Abuja, Nigeria Introduction to the DNS.
1 CMPT 471 Networking II DNS © Janice Regan,
Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved
Domain Name System (DNS)
Domain Name System (DNS)
Introduction to the DNS
Domain Name System Tony Kombol ITIS 3110.
DNS.
DNS and Bind Presenter David Wood
Managing Name Resolution
Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
Domain Name System: DNS
Presentation transcript:

Tony Kombol ITIS 3110

Who knows this? Who controls this? DNS!

history features architecture records name server resolver dnssec

Mapping IP addresses was done using a hosts file stored on every computer Master HOSTS.TXT was at Stanford Research Institute (now SRI International) Computers had to update their copy of the host file any time a change was made mapping A more scalable solution was required

DNS was that solution Invented in 1983 Server rewritten in 1985, became BIND Distributed database of name and IP address mapping Supports other record types

Delegation o DNS is split into zones o A zone can be split into sub-zones o A zone can delegate control of a sub-zone to another server o A sub-zone may be under the control of a different organization

Replication o Read-only copies of entire zones can be sent to other servers o Replication can be used for load-balancing or failure mitigation

Caching o Query responses can be cached to speed subsequent queries o Every query response has an associated lifetime that it will be cached for

 Nobody ◦ No single entity controls the mappings  Everybody! ◦ Every entity controls their mappings  Nobody and Everybody

DNS is a tree-like structure Split into ‘zones’ Servers for the root zone are all over the world All records in a zone are maintained by the same entity A portion of a zone can be delegated to another entity

Everything is a resource record Resource records map a key to a value

recorddescriptionkeyvalue NSname serverdomain nameIPv4 address AIPv4 address recordhost nameIPv4 address AAAAIPv6 address recordhost nameIPv6 address CNAMEaliashost name

recorddescriptionkeyvalue PTRreverse DNS IPv4 or IPv6 address host name MXmail serverdomain namehost name TXTfree-form text host or domain name free-form text SRVservice location service name and protocol host name and port

SOA record is required for every zone Contains: o Authoritative name server and contact o Serial number of zone o Refresh, retry, and expire times for zone replication o Cache time-to-live for negative responses

$TTL 20m example.com. IN SOA ns.example.com. jwatso8.uncc.edu. ( ; serial 2d ; refresh 15m ; retry 2w ; expire 30m ; negative cache @A www A testCNAMEwww ns1A ns2.example.com.A

Used to delegate a sub-zone to another server Prevent circular dependencies Hard-coded A (or AAAA) records of the sub-zone’s DNS servers Normal ns records use domain names See previous example Problem if the name server finds itself Fixed by the name server setting an IP address These are set in the parent name servers

Server-side of DNS Runs on port 53 uses udp and tcp TCP only used when response is too big for UDP UDP not responding

Can have authority over zero or more zones Server with zero zones is a caching name server Many different name server implementations are available We will be using BIND in the lab

Two ways an address can be resolved o Iteratively o Recursively Iterative usually used by servers o Returns partial responses (or errors) Recursive usually used by clients o Returns complete responses (or errors) o Will recurse until a server responds with an iterative lookup

nslookup, host, and dig all DNS clients Talk directly to a DNS server Bypasses host’s resolver library dig is recommended as it is very informative part of dnsutils

 Dig ◦ Domain Information Groper  Online YouTube ◦

$ dig ; > DiG APPLE-P2 > ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ; IN A ;; WHEN: Wed Jan 26 15:35: ;; MSG SIZE rcvd: 148

;; ANSWER SECTION: IN CNAME IN A IN A IN A IN A IN A IN A ;; Query time: 7 msec ;; SERVER: #53( ) ;; WHEN: Wed Jan 26 15:35: ;; MSG SIZE rcvd: 148

Help you troubleshoot when DNS has problems Below are a few you might encounter NOERROR Query completed successfully NXDOMAIN Query returned with a “no such domain” error SERVFAIL Unable to contact the server

DNS lookups on a host are handled by the resolver library /etc/resolv.conf specifies DNS servers /etc/nsswitch.conf specifies how addresses lookups are performed o Handles other databases as well

 Retrieves information from: ◦ config files ◦ databases  E.G. ◦ getent hosts  Retrieves the contents of the hosts file ◦ getent hosts localhost  Retrieves the contents for localhost in the hosts file  getent works on a variety of data formats

$ getent hosts

search unc.edu oit.unc.edu domain unc.edu nameserver nameserver

Implementations of DNS (e.g. bind) have a history of security flaws Any server in your path can modify responses Any server in your path can see requests Zone transfers are a security hole

Extension to DNS to cryptographically sign responses Guarantees resource records have not been tampered with Ensures NXDOMAIN responses are genuine Implemented using resource records

recorddescription DNSKEYPublic key DS Delegation signer, added to parent zone, validates this zone NSEC Next secure record, for validating negative responses NSEC3NSEC replacement RRSIGDNSSEC signature

Uses public-private key cryptography Two key sets o Zone-signing key o Key-signing key

Used to sign all records in a zone Should be switched out often since it will be used often Stored in a DNSKEY resource record

Used to sign a zone-signing key Stored in a DNSKEY resource record A pointer to KSK’s resource record and its digest are stored in a DS record in parent zone o Creates a chain of trust

NSEC records create a linked-list of all records in a zone NXDOMAIN responses can reference the NSEC records that would come before and after the query o This proves that there is no record exists o Shows if someone inserted a fake record

Replace NSEC records Linked list of the hash of each record in a zone NXDOMAIN responses can reference the two NSEC records that would come before and after the query

All DNS servers in lookup chain must support DNSSEC to ensure results are genuine DNSSEC allows walking of a domain via NSEC records o Fixed in RFC5155 with introduction of NSEC3 records