DNS Session 5 Additional Topics

Slides:



Advertisements
Similar presentations
Review iClickers. Ch 1: The Importance of DNS Security.
Advertisements

State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
1 DNS. 2 BIND DNS –Resolve names to IP address –Resolve IP address to names (reverse DNS) BIND –Berkeley Internet Name Domain system Version 4 is still.
Investigations into BIND Dynamic Update with OpenSSL by David Wilkinson.
DNS Security Extensions (DNSSEC) Ryan Dearing. Topics History What is DNS? DNS Stats Security DNSSEC DNSSEC Validation Deployment.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
DNS. Introduction What is DNS? –Hierarchy or Tree –Dot used as a separator.
Advanced Module 3 Stealth Configurations.
1 DNSSEC at ESnet ESCC/Internet2 Joint Techs Workshop July 19, 2006 R. Kevin Oberman Network Engineer Lawrence Berkeley National Laboratory.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
IIT Indore © Neminath Hubballi
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
October 15, 2002Serguei A. Mokhov, 1 Intro to DNS SOEN321 - Information Systems Security.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Tony Kombol ITIS DNS! overview history features architecture records name server resolver dnssec.
* Agenda  What is the DNS ?  Poisoning the cache  Short term solution  Long term solution.
DNS Session 5 Additional Topics Joe Abley AfNOG 2006, Nairobi, Kenya.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
1 CMPT 471 Networking II DNS © Janice Regan,
ITU ccTLD Workshop March 3, 2003 A Survey of ccTLD DNS Vulnerabilities.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
THE DNS (DOMAIN NAME SYSTEM). Before the DNS, all computers connected to the internet through ARPANET (the worlds first operational packet switching network).
Track E0 AfNOG workshop April Abuja, Nigeria Introduction to the DNS.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Security Issues with Domain Name Systems
DNS Security Advanced Network Security Peter Reiher August, 2014
DNS Security.
Tutorial on Creating Certificates SSH Kerberos
DNS Security Issues SeongHo Cho DPNM Lab., POSTECH
State of DNSSEC deployment ISOC Advisory Council
Principles of Computer Security
SECURE SHELL MONIKA GUPTA COT 4810.
Geoff Huston APNIC Labs September 2017
DNS.
CPS 512 midterm exam #1, 10/5/17 Your name please: NetID:_______ Sign for your honor:____________________________.
Unit 5: Providing Network Services
DNS and Bind Presenter David Wood
Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009
DNS Cache Poisoning Attack
CPS 512 midterm exam #1, 10/5/17 Your name please: NetID:_______ Sign for your honor:____________________________.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Net 323 D: Networks Protocols
Chapter 19 Domain Name System (DNS)
DNSSEC Basics, Risks and Benefits
draft-zhang-dnsext-test-result-00
What DNSSEC Provides Cryptographic signatures in the DNS
A New Approach to DNS Security (DNSSEC)
NET 536 Network Security Lecture 8: DNS Security
NET 536 Network Security Lecture 6: DNS Security
Domain Name System: DNS
(DNS – Domain Name System)
Computer Networks Presentation
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Trust Anchor Signals from Custom Applications
DNS Cache Poisoning.
Domain Name Server Presented By: Mahesh Venkat Adusumelli
Neda Kianpour - Lead Network Engineer - Salesforce
Presentation transcript:

DNS Session 5 Additional Topics Joe Abley AfNOG 2006, Nairobi, Kenya

Upgrading BIND

Why Upgrade? Almost all software has bugs Although BIND 9 is much more conservative than previous versions, it is not immune to software defects Better performance New features

Where to Find BIND http://www.isc.org/sw/bind/ ftp://ftp.isc.org/isc/bind9/ Today, the recommended version to run is BIND 9.3.2 Maybe 0.01% of people have a reason to run BIND 8 instead of BIND 9 Nobody has a reason to run BIND 4

Warning! Many operating systems come with BIND built-in If you compile your own, you may end up with two copies of BIND on the same server confusing annoying

Securing Nameservers

Host Security Your authority servers contain valuable data If intruders can change the records in your zones, this could spell trouble phishing denial-of-service Long TTLs can make changes hard to back out (why?)

Restricting Recursion Why control which clients can perform recursive lookups? cache poisoning server load network load reflection attacks

Separate Recursive and Authority Servers Avoid serving stale zones authoritatively Avoiding exposing nameservers to cache poisoning attacks is even more important when the potential client population is large, and the answers are marked authoritative

Host Local Zones Locally Avoid leaking queries for private zones Avoid unnecessary query loads on the root servers, or on the AS112 servers Avoid calling ISC complaining that prisoner.iana.org is attacking you on port 53

By the Way... Encourage people who run your network to read and understand BCP 38 http://www.ietf.org/rfc/rfc2827.txt Preventing source spoofing helps reduce the opportunity for many attacks, including Reflection Attacks

Restricting AXFR/IXFR People can extract information about you and your customers by reading your zones hosts to try and attack (e.g. ssh brute force attacks) mail servers to exploit (e.g. relay attempts, dictionary attacks) cache poisioning opportunities

Transaction Signatures (TSIG) Master and slave servers: share a common secret key agree on the key name have clocks which are approximately in sync (e.g. they both use NTP) (why?) The shared information is used to authenticate a client to a server

Zone Transfers TSIG is most-commonly used to authenticate slave servers to master servers during zone transfers alternative to using source IP address ACLs better than IP address ACLs (why?)

Secrets, Secrets If you don’t run the slave servers and the mater servers yourself, you need a way to distribute the secret key to the slave server operator how? You also probably want to change the key every now and then (why?)

DNS Security

DNS Insecurity? How can you trust answers you get from a cache? How can a cache trust the answers it gets from authority servers? How do you know that the www.centralbank.go.ke address you obtained is genuine?

DNSSEC DNSSEC is a 10+ year effort to introduce security into the DNS Secures the data in the DNS, not the transport Provides a way for clients to be able to judge the security of data they extract from the DNS

General Concepts Public Key Cryptography Clients obtain a trusted copy of a public key used to sign the root zone Each zone includes a signed copy of the public key of each signed daughter zone All resource records in a signed zones are signed by a zone-signing key

Detailed Description Ha ha, not here! Maybe if you have a spare week!

Questions?