All the fun one can have with DNS

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
IUT– Network Security Course 1 Network Security Firewalls.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
Grid Computing, B. Wilkinson, 20046c.1 Globus III - Information Services.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Enabling Secure Internet Access with ISA Server.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks.
Module 3 DNS Types.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
ENOG-7 27 May 2014 Moscow Marriott Grand Hotel, Moscow, Russia IPv6 Golden Networks Jeroen Massar, Farsight Security, Inc. A watchful eye.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cybersecurity Coordination and Cooperation Colloquium (f41lf3st 2015) 17 June 2015 Tallinna Tehnickaülikool, Tallinn, Estonia IPv6 Golden Networks Jeroen.
Domain Name System CH 25 Aseel Alturki
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Deploying a Web Application Presented By: Muhammad Naveed Date:
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Naming March 8, Networks What is naming?  Associations between some elements in a set of names and some elements in a set of values  Binding.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Security fundamentals Topic 10 Securing the network perimeter.
Module 10: Windows Firewall and Caching Fundamentals.
Registry Functions Essential components for operating a ccTLD registry.
1 Virtual Dark IP for Internet Threat Detection Akihiro Shimoda & Shigeki Goto Waseda University
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 1 Managing Network Threat Information  Giri Raichur, Network Services.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Monitoring, analyzing and cleaning DNS configuration errors across European NRENs Slavko Gajin University of Belgrade, Serbia
Swiss NREN protection with DNS RPZ
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Central Management of 300 Firewalls and Access-Lists Fabian Mauchle TNC 2012 Reykjavík, 21-May-2012.
Security fundamentals
Module 3: Enabling Access to Internet Resources
DNS Security Advanced Network Security Peter Reiher August, 2014
PCNSE7 Palo Alto Networks Certified Network Security Engineer
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 9: Domain Name Servers
Paul Vixie, Ph.D CEO, Farsight Security
Secure Software Confidentiality Integrity Data Security Authentication
IMPLEMENTING NAME RESOLUTION USING DNS
Securing the Network Perimeter with ISA 2004
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Exam Name: CCIE Security Written
Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009
Lecture 6: TCP/IP Networking By: Adal Alashban
TCP Transport layer Er. Vikram Dhiman LPU.
Chapter 19 Domain Name System (DNS)
ECET 465 Innovative Education--snaptutorial.com
IIS.
CCNA 2 v3.1 Module 10 Intermediate TCP/IP
Proactive Network Protection Through DNS
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
RPZ Configuration DNS RPZ Configuration Lecturer: Ron Aitchison
Chapter 8: Monitoring the Network
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
دیواره ی آتش.
Chapter 25 Domain Name System
Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
Chapter 25 Domain Name System
(DNS – Domain Name System)
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Securing Your DNS Infrastructure in 5 Minutes
Validating MANRS of a network
Presentation transcript:

All the fun one can have with DNS The DNS Toolkit All the fun one can have with DNS

Private Hat Slide: Where is your IPv6!? (Farsight is 2620:11c:f000::/44, AS393667)

Farsight Security, Inc. https://www.farsightsecurity.com Founded by Dr. Paul Vixie and Dr. Paul Mockapetris Team based in US, Canada, Poland and Switzerland Security defense and insight based on DNS Projects: SIE (Security Information Exchange) DNSDB (DNS Database) NOD (Newly Observed Domains) Domain Sentry, Brand Sentry and more… This Talk: RRL – Response Rate Limiting DNS Query Collection (Logging, PassiveDNS, dnstap) DNSDB – DNS Database NOD – Newly Observed Domains

Spoof much? Do you have MANRS?

Anti-Spoof: Where are your MANRS? Good old BCP38 (year 2000): http://tools.ietf.org/html/bcp38 http://www.bcp38.info MANRS (Mutually Agreed Norms for Routing Security) https://www.routingmanifesto.org/manrs/

RRL: Response Rate Limiting Large DDoS attacks are common and big as amplification factor is large, as large number of open DNS recursors, large number of networks that allow spoofing (recent attacks with Mirai where btw not spoofed – do you NetFlow?) NTP is not alone, SNMP and DNS… RRL Limits the number of unique responses returned by a DNS server per e.g. IPv4 /24, or IPv6 /48 RRL makes informed decision, simple IP-based rate limiting would just randomly drop queries Implemented in: NSD, BIND, Knot, more coming Design & Implementation: Paul Vixie & Vernon Schryver More details: http://www.redbarn.org/dns/ratelimits

RRL: Example BIND & Knot rate-limit { responses-per-second 200; window 2; }; Knot server: rate-limit: 200 rate-limit-slip: 2

DNS Query Collection: Why? Useful for determining what sites are visited/looked-up Can indicate that a client in the network is connecting to a known C&C Botnet when using DNS – collect, analyze and know! Above the recursor: does not collect PII as one does not see Stub’s IP address 1) below, 2) above – the recursor

DNS Query Collection: Query Logging DNS Server logs queries to disk (file or syslog) Slows DNS server itself down as syslog/file-writing is typically a blocking operation Text-based, thus requires formatting/parsing and the overhead of ASCII Lose all details not logged at that time (DNSSEC flags, cache miss/hit, etc)

DNS Query Collection: Passive DNS Use a hub/mirror-port etc. to sniff the interface of the DNS server collection DNS responses Full packet details, which need to be parsed Requires TCP reassembly and UDP fragment reassembly No performance impact on the actual DNS server Can be done below and above the recursive

DNS Query Collection: dnstap The best of Query Logging + Passive DNS: dnstap Patch the DNS server to support logging using dnstap Duplicates the internal parsed DNS format message Uses circular queues & non-blocking logging techniques: minimal performance hit on DNS server Implemented in BIND, Unbound, Knot DNS and more Documentation / Tutorials / Mailinglist / Code: http://www.dnstap.info Design & Implementation: Robert Edmonds

DNSDB: The DNS Database Central repository from Passive DNS collectors data Web-based query interface @ http://www.dnsdb.info API (http://api.dnsdb.info) access for integration in various investigative tools dnsdb-query (Python) dnsdb_c (C ) Maltego Splunk DNSDB Export: On-premise Sensors Security Information Exchange Third-Party Threat Data DNSDB Real-Time Threat Intelligence Information Historical Threat

DNSDB Web Interface

NOD: Newly Observed Domains One can get ‘new’ domains from Zone File Access (ZFA) as provided by TLD operators (as per ICANN Base Registry Agreement) But ZFA is not available for e.g. ccTLDs, .mil / .gov and badly managed ones ZFA is only published every 24 hours Might miss domains that are registered and removed inside that period again (eg domain tasting) With the help of DNSDB, as it knows what is being queried: If domain not seen for last 10 days: Newly Observed Domain! NOD is published as RPZ zone, RBL zone or SIE channel 212 With RPZ: one can block or CNAME new domains to a safe place Easily Integrate into SpamAssassin and other tools Registration Hosting Propagation Payload Delivery Blocking

Questions!? massar@fsi.io

RPZ: Response Policy Zones Website with more details: http://www.dnsrpz.info Also dubbed “DNS Firewalls” Rules are carried in standard DNS zones Using IXFR, NOTIFY, TSIG zone updates are distributed automatically and efficiently to stealth secondaries Depending on rule, a different response might be returned than the real one

RPZ: Rule Types Rules: If the name being looked up is W. If the response contains any IP address in range X. If a listed name server name is Y. If any returned name server IP address is in range Z.

www.infected.example.@ CNAME . www.infected.example.@ CNAME *. RPZ: Actions Synthesize NXDOMAIN. www.infected.example.@ CNAME . Synthesize NODATA: www.infected.example.@ CNAME *. Synthesize an answer. www.infected.example.@ CNAME www.antivirus.example. www.malificent.example.@ AAAA 2001:db8::42 Answer with the truth by not having an entry.

RPZ: Examples BIND configuration options to enable 4 RPZ feeds: response-policy { zone "rpz.deteque.com”; zone “rpz.surbl.org”; zone “rpz.spamhaus.org”; zone “rpz.iidrpz.net”; }; Note that RPZ servers are ACLd, hence need permission of operator to get access to the data

End of Deck™ That is it folks!