Presentation is loading. Please wait.

Presentation is loading. Please wait.

DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.

Similar presentations


Presentation on theme: "DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it."— Presentation transcript:

1 DNS Security 1

2 Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it work, than on how to prevent abuses –Initial environment mostly consisted of research institutions---assumption on the benign behaviors of users Fundamental security problem of current network technology: –Has no way of telling whether the resource is located “correctly,” or the information is transferred “correctly” –Has no data authentication and confidentiality protection 2

3 Example Security Problems by Incorrect Resource Location DNS poisoning BGP routing vulnerabilities ARP poisoning –ARP (Address Resolution Protocol) is used to query for the MAC address associated with an IP address –Any device attached physically to a subnet can claim to be the “owner” of the IP IP Spoofing –Routers typically do not check source IP addresses –A packet can claim to be coming from any IP address Spam email 3

4 Fundamental Problems of TCP/IP No authentication for received messages No encryption for transmitted messages Applying cryptographic techniques can help –But must engineer very carefully

5 5 Borrowed from slides of Prof. Dan Massey at Colorado State University l Basic Internet Database n Maps names to IP addresses n Also stores IPv6 addresses, mail servers, service locators, Enum (phone numbers), etc. l Data organized as tree structure. n Each zone is the authority for its local data. Root educomuk ciscousfcoibm www The Domain Name System

6 Domain Name Service Provides binding between URL and IP address –Both forward and reverse mapping –Divide URL space into zones; Each name server handles mapping in its zone DNS Resource Record (RR) –Can be viewed as tuples of the form –types: A (IP address) MX (mail servers) NS (name servers) PTR (reverse look up) 6

7 DNS Protocol ISP ISP’s DNS Resolver NS Server for edu (192.41.162.30) NS Server for usf.edu (131.247.100.1) What is the IP address of www.usf.edu? Go ask 131.247.100.1 What is the IP address of www.usf.edu? 131.247.182.171 root Server What is the IP address of www.usf.edu? Go ask 192.41.162.30 7

8 Example Response from the.edu NS server ;; QUESTION SECTION: ;www.usf.edu.INA ;; AUTHORITY SECTION: usf.edu.172800INNSmother.usf.edu. usf.edu.172800INNSziggy.usf.edu. usf.edu.172800INNSclemson-ns1.usf.edu. ;; ADDITIONAL SECTION: mother.usf.edu.172800INA131.247.100.1 ziggy.usf.edu.172800INA131.247.1.40 clemson-ns1.usf.edu.172800INA205.186.58.129 … Delegation of authority Glue records 8

9 DNS Security Problems A DNS resolver has no way to determine if the response of a query does come from the legitimate server It will accept a response if –The port number matches the source port of the request –Has the correct Transaction ID (TXID). It will accept all RR’s that are in the queried server’s bailiwick –The bailiwick is the domain in which the server has authority according to the referral path 9

10 Classical DNS Poisoning ISP Recursive DNS resolver NS Server for usf.edu What is the IP address of www.usf.edu? 131.247.182.171 DoS flooding DNS queries recursive query faked responses 10

11 Conditions for classical DNS poisoning attacks Must guess right the correct source-port number Must guess right the correct TXID (16 bits) The fake response must arrive before the legitimate response If any of the above fails, the attack fails and there will be no chance to attack again until the TTL expires 11

12 Kaminsky Attack (2008) ISP Recursive DNS resolver NS Server for usf.edu What is the IP address of foo.usf.edu? No such url What is the IP address of foo.usf.edu? usf.edu. NS www.usf.eduwww.usf.edu www.usf.edu A 1.1.1.1 1.1.1.1 12

13 Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No longer needs to wait for TTL to expire –The attacker can control when and what queries are issued –A complete domain may be hijacked Even TLD’s are vulnerable –Only needs 10 secs to succeed 13


Download ppt "DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it."

Similar presentations


Ads by Google