DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver (192.168.1.1) DNS Caching Server Client I want to access www.example.com.

Slides:



Advertisements
Similar presentations
Practical Considerations for DNSSEC Automation Joe Gersch OARC Presentation September 24, 2008.
Advertisements

Review iClickers. Ch 1: The Importance of DNS Security.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Deploying DNSSEC in Windows Server 2012 David Cates Platform Services Group Microsoft Corporation.
DNSSEC Brought to you by ISC-BIND, SUNYCT, and: Nick Merante – SUNYIT Comp Sci SysAdmin Nick Gasparovich – SUNYIT Campus SysAdmin Paul Brennan – SUNYIT.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
DNS Security A.Lioy, F.Maino, M. Marian, D.Mazzocchi Computer and Network Security Group Politecnico di Torino (Italy) presented by: Marius Marian.
A New Approach to DNS Security (DNSSEC) Author: Giuseppe Ateniese Stefan Mangard Presenter: Liu, Xiaotao.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
RNDC & TSIG. What is RNDC? Remote Name Daemon Controller Command-line control of named daemon Usually on same host, can be across hosts –Locally or remotely.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
DNS Security Extensions (DNSSEC) Ryan Dearing. Topics History What is DNS? DNS Stats Security DNSSEC DNSSEC Validation Deployment.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
DNS Security Brad Pokorny The University of Minnesota Informal Security Seminar 4/18/03.
Deploying DNSSEC in Windows Server 2012 Rob Kuehfus Program Manager Microsoft Corporation WSV325.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Tony Kombol ITIS Who knows this? Who controls this? DNS!
Advanced Module 3 Stealth Configurations.
Identity Management and DNS Services Tianyi XING.
1 DNSSEC at ESnet ESCC/Internet2 Joint Techs Workshop July 19, 2006 R. Kevin Oberman Network Engineer Lawrence Berkeley National Laboratory.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
CSUF Chapter 6 1. Computer Networks: Domain Name System 2.
IIT Indore © Neminath Hubballi
1 DNSSEC for the.edu Domain Becky Granger Director, Information Technology and Member Services EDUCAUSE April 29, 2010.
Olaf M. Kolkman. Domain Pulse, February 2005, Vienna. DNSSEC Basics, Risks and Benefits Olaf M. Kolkman
Introduction to DNSSEC AROC Bamako, Mali, What is DNSSEC?
DNSSEC an introduction ccTLD workshop November 26-29th, 2007 Amman, Jordan Based on slides from RIPE NCC.
Security and Stability of Root Name Server System Jun Murai (From the panel on Nov. 13 th by Paul Vixie, Mark Kosters, Lars-Johan Liman and Jun Murai)
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Secured Dynamic Updates. Caution Portions of this slide set present features that do not appear in BIND until BIND 9.3 –Snapshot code is available for.
Krit Witwiyaruj Thai Name Server Co., Ltd.th DNSSEC Implementation.
Olaf M. Kolkman. Apricot 2005, February 2005, Kyoto. DNSSEC An Update Olaf M. Kolkman
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License The details.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Tony Kombol ITIS DNS! overview history features architecture records name server resolver dnssec.
1 Madison, Wisconsin 9 September14. 2 Security Overlays on Core Internet Protocols – DNSSEC and RPKI Mark Kosters ARIN Engineering.
How to use DNS during the evolution of ICN? Zhiwei Yan.
* Agenda  What is the DNS ?  Poisoning the cache  Short term solution  Long term solution.
DNS Session 5 Additional Topics Joe Abley AfNOG 2006, Nairobi, Kenya.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
OpenDNSSEC Deployment Tianyi Xing. Roadmap By mid-term – Establish a DNSSEC server within the mobicloud system (Hopfully be done by next week) Successfully.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
OPTION section It is the first section of the named.conf User can use only one option statement and many option-value pair under the section. Syntax is.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
Developing a DNSSEC Policy The Compulsory Zone Distribution Which DNSSEC Protocol Keys – and Managing them Managing the Children Using DNSSEC Mark Elkins.
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Internet infrastructure 1. Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
DNSSEC an introduction ccTLD workshop November 26-29th, 2007 Amman, Jordan Based on slides from RIPE NCC.
Security Issues with Domain Name Systems
In collaboration with HKCERT and HKIRC July 2016
DNS Security Issues SeongHo Cho DPNM Lab., POSTECH
Living on the Edge: (Re)focus DNS Efforts on the End-Points
DNS Session 5 Additional Topics
DNS Cache Poisoning Attack
DNSSEC Iván González Montemayor A
DNSSEC Basics, Risks and Benefits
A New Approach to DNS Security (DNSSEC)
NET 536 Network Security Lecture 8: DNS Security
NET 536 Network Security Lecture 6: DNS Security
(DNS – Domain Name System)
Presentation transcript:

DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access 1 QID= QID=64569 QID=64570 QID= match! Root/GTLD QID=64571

RISKS  Misdirection of queries for an entire domain(Cache Poisoning) – Response to non-existent domains – MX hijacking – Make a large domain (SLD or TLD) domain “disappear” from an ISP's cache – DoS – Identity theft using SSL stripping attacks (banks, eGovernance)  Many more

DNS DOS Attack  DNS amplification  A type of reflection attack combined with amplification Source of attack reflected off another machine  Traffic received is bigger (amplified) than the traffic sent by the attacker UDP packet’s source address is spoofed Eg: (Spamhaus Attack)  DNS query floods  “flood of legitimate-seeming queries sent to target DNS server for a domain”  Uses botnet that automatically sends a significant number of queries  Difficult to differentiate between a standard and malicious query

Open Resolvers  DNS servers that answer recursive queries from any host on the Internet   Check if you’re running open resolvers  bin/openresolvercheck.pl  More statistics at  factory.com/surveys/openresolvers/ASN reports/latest.html

Good DNS Practices  Enter the correct address of the responsible person for each zone you add to or manage on a DNS server.  Do not combine authoritative and recursive nameserver functions -- have each function performed by separate server sets.  Run multiple, distributed authoritative servers, avoiding single points of failure in critical resource paths. A variety of strategies are available (including anycast and load-balancing) to ensure robust geographic and network diversity in your deployment.

Securing NameServers  Run the most recent version of the DNS software  Apply the latest patch  Hide version  Restrict queries  Allow-query { acl_match_list; };  Prevent unauthorized zone transfers  Allow-transfer { acl_match_list; };  Run BIND with the least privilege (use chroot)  Use TSIG and DNSSEC

DNS: Data Flow master Caching forwarder Zone administrator Zone file Dynamic updates 12 slaves 345 resolver

DNS Vulnerabilities master Caching forwarder Zone administrator Zone file Dynamic updates 12 slaves 345 resolver Server protection Data protection Corrupting data Impersonating master Unauthorized updates Cache impersonation Cache pollution by Data spoofing

TSIG Protected Vulnerabilities master Caching forwarder Zone administrator Zone file Dynamic updates slaves resolver Impersonating master Unauthorized updates

What is TSIG - Transaction Signature?  A mechanism for protecting a message from a primary to secondary and vice versa  A keyed-hash is applied (like a digital signature) so recipient can verify message  DNS question or answer  and the timestamp  Based on a shared secret - both sender and receiver are configured with it

Transaction Signatures (TSIG)  TSIG is most-commonly used to authenticate slave servers to master servers during zone transfers  Protects against impersonating master and unauthorized updates  Master and slave servers:  share a common secret key & agree on key name  Synchronized clocks (NTP)  The shared information (key) is used to authenticate a client to a server  Remember to change the key periodically

What is TSIG - Transaction Signature?  TSIG (RFC 2845)  authorizing dynamic updates & zone transfers  authentication of caching forwarders  Used in server configuration, not in zone file

TSIG steps  Generate secret dnssec-keygen -a -b -n host  Communicate secret :  Configure servers key { algorithm...; secret...;} server x { key...; } Test AXFR -k

DNS Security Extensions (DNSSEC) Protects the integrity of data in the DNS by establishing a chain of trust Uses public key cryptography – each link in the chain has a public/private key pair A form of digitally signing the data to attest its validity Standard is defined in RFC4033, RFC4034, and RFC4035 Guarantees – Authenticity – Integrity – Non-existence of a domain

DNSSEC Concepts  Changes DNS trust model from one of ”open” and ”trusting” to one of ”verifiable”  Use of public key cryptography to provide:  Authentication of origin  Data integrity  Authenticated denial of existence  No attempt to provide confidentiality (NO encryption)  DNSSEC does not normally place computational load on the authoritative servers ( != those signing the zone)  No modifications to the core protocol.

DNSSEC Concepts  Build a chain of trust using the existing delegation-based model of distribution that is the DNS.

DNSSEC Concepts  Don't sign the entire zone, sign a RRset  Note: the parent DOES NOT sign the child zone.  The parent signs a pointer (hash) to the key used to sign the data of child zone (DS record).  Always on the master server.  Check if slaves are receiving the signed zones.

DNSSEc: new RRs  RRSIG = Signature over RRset made using private key  DNSKEY = Public key, needed for verifying a RRSIG  DS = Delegation Signer; ‘Pointer’ for building chains of authentication  NSEC = Returned as verifiable evidence that the name and/or RR type does not exist  DS record provides a mechanism to delegate trust to public keys of third parties

Types of Keys  Zone Signing Key (ZSK)  Sign the RRsets within the zone  Public key of ZSK is defined by a DNSKEY RR  Key Signing Key (KSK)  Signed the keys which includes ZSK and KSK and may also be used outside the zone

Signing the zone (using the BIND tools) 1. Generate keypairs 2. Include public DNSKEYs in zone file 3. Sign the zone using the secret key ZSK 4. Publishing the zone 5. Push DS record up to your parent(how?) (Note:signing always done in Master and validation in resolver)

Key Generation # Generate ZSK dnssec-keygen [-a rsasha1 -b 1024] -n ZONE myzone # Generate KSK dnssec-keygen [-a rsasha1 -b 2048] -n ZONE -f KSK myzone  Signing Of Zone:dnssec-signzone myzone

KEY MANAGEMENT  Need to implement secure key storage, management procedures  Need to sign your zones  Registries need to accept DS records from users (how?)  Need to publish DS records to parents (how?)  Manual Signing: Key RollOvers  Key Never expires. Need to resign  Automated Signing: Opendnssec or inline signing.

Inline Signing  Dnssec Signing made easy.(automatic signing and key rollovers)  Requires Bind Version 9.9 and above.  Enabled by the "inline-signing yes;" statement in named.conf  Create zsk and ksk but sign using inline and resign using (auto-dnssec maintain).  Check if it’s signing.  Check logs.  $ mytld NS +dnssec(to check if dnssec is working, for manual also)  $ sudo named-checkzone -D -f raw -o - mytld mytld.signed | less  how do we update the zone and resign it ?  Problem:Doesn’t generate keys in some distro,use “”haveged”.