Measuring the Leakage of Onion at the Root A measurement of Tor’s.onion pseudo-top-level domain in the global domain name system Aziz Mohaisen Verisign.

Slides:



Advertisements
Similar presentations
Internet Protocols and Innovation John C Klensin John C Klensin and Associates
Advertisements

A look into Bullet Proof Hosting November DefCamp 5 Silviu Sofronie – Head of Forensics
SCADA Security, DNS Phishing
Sweeping lame DNS reverse delegations APNIC16 – DNS Operations SIG Seoul, Korea, 20 August 2003.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Open Resolvers in COM/NET Resolution Duane Wessels, Aziz Mohaisen DNS-OARC 2014 Spring Workshop Warsaw, Poland.
DNS DOMAIN NAME SYSTEM NAME SYSTEM By Lijo George.
Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic Matt Thomas Data Architect, Verisign Labs.
Domain Name System. DNS is a client/server protocol which provides Name to IP Address Resolution.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
The Domain Name System Overview Introduction DNS overview How DNS helps us? Summary.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Harness Your Internet Activity. DNS-Based DDoS Evolving Threat RIPE May 2015 Amsterdam Ralf Weber Bruce Van Nice.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 2: Name Resolution and DNS.
COS 420 DAY 23. Agenda Assignment 4 Corrected 2 B’s Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Measuring DANE TLSA Deployment Liang Zhu 1, Duane Wessels 2, Allison Mankin 2, John Heidemann 1 1. USC ISI 2. Verisign Labs 1.
© 2011 Autodesk Securing AutoCAD IP in the era of WikiLeaks Presenter: Rahul Kopikar Co-Founder, Seclore Technology.
#ICANN49 Security and Stability Advisory Committee Activities Update ICANN Singapore Meeting March 2014.
The University of Akron Summit College Business Technology Dept.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Norman SecureSurf Protect your users when surfing the Internet.
Name Collisions in the Domain Name System Burt Kaliski, Verisign USTelecom Webinar April 17, 2014.
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks.
Basic DNS Course Lecturer: Ron Aitchison. Module 1 DNS Theory.
Harness Your Internet Activity. Zeroing in On Zero Days DNS OARC Spring 2014 Ralf Weber
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts: – IP address (32 bit) - used for addressing datagrams – “name”, e.g.,
 Uniform Resource Identifier (URI)  Uniform Resource Locator (URL)  Uniform Resource Name (URN) URL includes.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Domain names and IP addresses Resolver and name server DNS Name hierarchy Domain name system Domain names Top-level domains Hierarchy of name servers.
CHAPTER 4 PLANNING A NAME RESOLUTION STRATEGY. Determining Name Resolution Requirement What is name resolution ? ◦ The name into 32-bit IP address conversion.
What DNS is Not 0 Kylie Brown, Jordan Eberst, Danielle Franz Drew Hanson, Dennis Kilgore, Charles Newton, Lindsay Romano, Lisa Soros 0 Paul Vixie
COMT 6251 Network Layers COMT Overview IP and general Internet Operations Address Mapping ATM LANs Other network protocols.
Chapter 29 Domain Name System (DNS) Allows users to reference computer names via symbolic names translates symbolic host names into associated IP addresses.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Domain Name System. CONTENTS Definitions. DNS Naming Structure. DNS Components. How DNS Servers work. DNS Organizations. Summary.
Why SLD Blocking Misses the Point Burt Kaliski, Verisign gTLD Collisions Workshop October 29, 2013.
Configuring and Troubleshooting Domain Name System
CPSC 441: DNS 1. DNS: Domain Name System Internet hosts: m IP address (32 bit) - used for addressing datagrams m “name”, e.g., - used by.
Domain Name System (DNS). DNS Server Service Overview of Domain Name System What Is a Domain Namespace? Standards for DNS Naming.
Self-Service Open Resolver Scanning Duane Wessels DNS-OARC Workshop Dublin May 12, 2013.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Internet Address and Domain Name Service (DNS)
A study of caching behavior with respect to root server TTLs Matthew Thomas, Duane Wessels October 3 rd, 2015.
Identifying DNS heavy hitters in root servers data Minas Gjoka CAIDA University of California, Irvine.
Internet Essentials. The History of the Internet The Internet started when the Advanced Research Projects Agency (ARPA) of the United States Defense Department.
Advanced, Programmable Cloud-based GSLB to Optimize Performance and Availability Terry Bernstein Senior Product Manager Verisign Managed DNS Service.
Web Server Administration Chapter 4 Name Resolution.
1. Internet hosts:  IP address (32 bit) - used for addressing datagrams  “name”, e.g., ww.yahoo.com - used by humans DNS: provides translation between.
COMP2322 Lab 3 DNS Steven Lee Feb. 19, Content Understand the Domain Name System (DNS). Analyze the DNS protocol with Wireshark. 2.
Tor Bruce Maggs relying on materials from
Domain Name System INTRODUCTION to Eng. Yasser Al-eimad
CSEN 404 Application Layer II Amr El Mougy Lamia Al Badrawy.
{ Domain Name System DNS & IP Address Protocols within the Internet Ecosystem. - Amanda Sparling, EMAC 6300.
The Domain Name System (DNS) – The online directory DNS Simplified.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
System Administration(SAD622S) Name of Presenter: Shadreck Chitauro Lecturer 18 July 2016 Faculty of Computing and Informatics.
MitM Attack by Name Collision: Cause Analysis & Vulnerability Assessment in the New gTLD Era Qi Alfred Chen, Eric Osterweil†, Matthew Thomas†, Z. Morley.
Module 5: Resolving Host Names by Using Domain Name System (DNS)
Domain Name System (DNS)
Configuring and Troubleshooting DNS
Dark Web – the modern threat for the Internet Security
DNS-Based DDoS Evolving Threat UKNOF Sept 2015 Manchester, UK
Exercise ?: TOR.
TRANCO: A Research-Oriented Top Sites Ranking Hardened Against Manipulation By Prudhvi raju G id:
Presentation transcript:

Measuring the Leakage of Onion at the Root A measurement of Tor’s.onion pseudo-top-level domain in the global domain name system Aziz Mohaisen Verisign Labs (Joint work with Matt Thomas)

Verisign Public Agenda The global DNS and private namespace usage.Onion measurements from the A and J root servers A Longitudinal Study of.Onion Traffic Root Sampling Completeness (Representative?) Volume and Diversity of Hidden Service Requests Most Requested Hidden Services ASN + Geo Diversity of Hidden Service Requests Tor and the World: Event Correlation Trends from Day in the Life (DITL) of Internet Concluding Remarks and Future Work Q&A 2

Verisign Public The Global DNS and Private Namespace Usage - The global DNS is a hierarchical system - Currently there are 13 groups [A-M] of root servers - Authoritative for TLDs such as “.com”, “net”, etc. - Many installed systems utilize non-delegated TLDs for internal namespaces - E.g. “.corp” “.home” - Queries to the roots for such TLDs result in NXDomains

Verisign Public The Global DNS and Private Namespace Usage - Delegation of new gTLDs spurred more critical studies of NXD requests at the roots. - Potential “Name Collision” Risks (see namecollisions.net). - Unintended leaked DNS queries may expose potentially sensitive private information and present additional threat vectors. - Tor is a system that exploits the absence of a non- delegated TLD -.onion – for its Hidden Services - Tor is designed not to route.onion requests into the public DNS - It relies on the hidden service protocol for “torizing” requests.

Verisign Public A primer on Tor’s Hidden Services 5 Source: torproject.org

Verisign Public A primer on Tor’s Hidden Services, cont. 6 Source: torproject.org

Verisign Public A primer on Tor’s Hidden Services, cont. 7 Source: torproject.org

Verisign Public A primer on Tor’s Hidden Services, cont. 8 Source: torproject.org

Verisign Public A primer on Tor’s Hidden Services, cont. 9 Source: torproject.org

Verisign Public A primer on Tor’s Hidden Services, cont. 10 Source: torproject.org

Verisign Public Tor Leaks DNS Queries… 11 Source: wired.com

.Onion Measurements From A and J Root General Overview 12

Verisign Public A Longitudinal Study of.Onion Traffic - Six month capture from A & J Roots M requests - 81K SLDs - 172K IPs - 105K /24s - 21K ASNs - Onion ranked 461

Verisign Public Root Sampling Completeness (Representative?) - A+J observe ~3300 SLDs/day - Separately ~ % combined - Prior SLD-root affinity reports suggests A&J observe 20% of total root traffic; confirmed by our study

Verisign Public Volume and Diversity of Hidden Service Requests - Various measures of traffic to SLD distribution - 90% <= 10 requests - 95% <= 10 ASNs - Very few SLDs with large and diverse traffic pattern

.Onion Measurements From A and J Root Popular Services and Requesters 16

Verisign Public Most Requested Hidden Services - Total of 81k SLDs! - Trackers - P2P systems - Tor Directory - Search Engines - Tor-related, etc - Deep web: - Silk road - Agora marketplace - (bitcoin) % of all.Onion traffic to one Hidden Service - Long tail distribution over remaining Hidden Services - Top 10 SLDs account for 38% of all.Onion traffic

Verisign Public ASN + Geo Diversity of Hidden Service Requests - Geo distribution of requests differs from that reported by Tor - USA (  13.4). Germany (  8.8), France (  6.2) and Spain (  4.4). - Large percentage of traffic issued from public DNS services - Google (AS15169), OpenDNS (AS36692)

.Onion Measurements From A and J Root Event Correlation 19

Verisign Public Tor and the World: Event Correlation - Several spikes in Onion Traffic can be correlated to specific hidden services and reported events. - Many spikes coincide with postings of Onion URLs on popular websites

Verisign Public Tor and the World: Event Correlation, cont. - Reported events within Turkey during elections - Measure onion requests from Turkish IP addresses

.Onion Measurements From DITL An Overview 22

Verisign Public DITL Dataset DITL provides archival data Simultaneous measurement effort from roots and name servers; two days a year; data managed by DNS-OARC. Covers 7 years, from 2008 to 2014 (1-2 days per year) From all root servers (‘A’ through ‘M’); 6,850,728.onion queries Originated from 5,324,412 IP address, over 336,273 /24 addresses Queried 18,330.onion SLDs the total of 7 years 23 Year# rootsRoot serversTotal queries 20087(A,C,F,H,K,L,M)3, (A,C,E,F,H,K,L,M)13, ALL2,371, All except B and G691, All except B, D, and G693, All except B and G137, All except B, D, G, and L1,705,247

Verisign Public DITL Dataset, cont. 24 RootOrganization# queries# yearsTraffic (%) A-rootVerisign515, B-rootUSC-ISI97, C-rootCogent723, D-rootUMD205, E-rootNASA151, F-rootInternet Sys763, G-rootDefense Info Sys72, H-rootUS Army360, I-rootNetnod975, J-rootVerisign842, K-rootRIPE733, L-rootICANN649, M-rootWIDE761,

Verisign Public DITL Dataset, cont. 25 z6gw6skubmo2pj43.onion

Verisign Public DITL Dataset, cont. 26

Verisign Public Potential Causes of Leakage and Remedies “Ignorance of the crowd” Hypothetical scenarios support that from analogous contexts. Search list processing Browser prefetching A problem with other collision-related incidents. Malware: Chewbacca, 64-bit variants of Zeus, etc As suggested in many reports. Bundle misconfiguration Potential remedies : Enabling blocking at the stub and recursive resolvers. Automated configuration. User notification for further actions. 27

Verisign Public Potential Implications The potential implications depend on who is querying Individual user IP: most severe; clear identification and potential privacy threat to the individual users. Recursive DNS resolvers: outbound queries are aggregated, and less threat to privacy. Incentives may prevent recursive from sharing such information. ISP resolver: outbound queries are aggregated. Incentives may guard user privacy, even when ISP sees individual user IP. Open resolvers: outbound queries are aggregated, but some threat to privacy. Open resolver’s incentives are unclear. DPRIVE (DNS PRIVate Exchange) and privacy enhanced resolution are two potential ways to address an observer and remedy risk 28

Verisign Public Concluding Remarks and Future Work - We measured a sample of.Onion DNS requests to A+J - Examined unique characteristics of these requests longitudinally - Network and Geographical - Increased traffic spikes correlated with specific events - URL postings, Censorship - Certain causes of leaked DNS queries remains unknown - Misconfiguration, search lists, typos, poor user understanding, etc. - We plan to continue the examination of the leaked queries - Other non-delegated privacy TLDs (i2p, exit, etc). - Malware (by name/family)

© 2014 VeriSign, Inc. All rights reserved. VERISIGN and other Verisign-related trademarks, service marks, and designs appearing herein are registered or unregistered trademarks and/or service marks of VeriSign, Inc., and/or its subsidiaries in the United States and in foreign countries. All other trademarks, service marks, and designs are property of their respective owners.