Sergei Komarov. DNS  Mechanism for IP <> hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.

Slides:



Advertisements
Similar presentations
Review iClickers. Ch 1: The Importance of DNS Security.
Advertisements

2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Domain Name System. DNS is a client/server protocol which provides Name to IP Address Resolution.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
A New Approach to DNS Security (DNSSEC) Author: Giuseppe Ateniese Stefan Mangard Presenter: Liu, Xiaotao.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
1 DNS. 2 BIND DNS –Resolve names to IP address –Resolve IP address to names (reverse DNS) BIND –Berkeley Internet Name Domain system Version 4 is still.
Security and Information Assurance for the DNS Dan Massey USC/ISI.
DNS: Revising the Current Protocol Matt Gustafson Matt Weaver CS522 Computer Communications University of Colorado, Colorado Springs.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008.
DNS Security Extensions (DNSSEC) Ryan Dearing. Topics History What is DNS? DNS Stats Security DNSSEC DNSSEC Validation Deployment.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Domain Name System ( DNS )  DNS is the system that provides name to address mapping for the internet.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
DNS Security Brad Pokorny The University of Minnesota Informal Security Seminar 4/18/03.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Module 3 DNS Types.
Identity Management and DNS Services Tianyi XING.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Domain Names System The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the.
IIT Indore © Neminath Hubballi
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 17 Domain Name System (DNS)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
Olaf M. Kolkman. Domain Pulse, February 2005, Vienna. DNSSEC Basics, Risks and Benefits Olaf M. Kolkman
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 17 Domain Name System
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
Domain Name System CH 25 Aseel Alturki
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Chapter 16 – The Domain Name System (DNS) Presented by Shari Holstege Tuesday, June 18, 2002.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Netprog: DNS and name lookups1 Address Conversion Functions and The Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
Naming March 8, Networks What is naming?  Associations between some elements in a set of names and some elements in a set of values  Binding.
1 Kyung Hee University Chapter 18 Domain Name System.
Tony Kombol ITIS DNS! overview history features architecture records name server resolver dnssec.
Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
Configuring Name Resolution and Additional Services Lesson 12.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
* Agenda  What is the DNS ?  Poisoning the cache  Short term solution  Long term solution.
DNS Cache Poisoning. History 1993 – DNS protocol allowed attacker to inject false data which was then cached 1997 – BIND 16-bit transaction ids not randomized,
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
DNS DNS overview DNS operation DNS zones. DNS Overview Name to IP address lookup service based on Domain Names Some DNS servers hold name and address.
DNS Cache Poisoning – The Next Generation by Joe Stewart, GCIH Presented by Stephen Karg CS510, Advanced Security Portland State University Oct. 24, 2005.
Linux Operations and Administration
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Internet Naming Service: DNS* Chapter 5. The Name Space The name space is the structure of the DNS database –An inverted tree with the root node at the.
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Short Intro to DNS (part of Tirgul 9) Nir Gazit. What is DNS? DNS = Domain Name System. For translation of host names to IPs. A Distributed Database System.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
Security Issues with Domain Name Systems
DNS Security Issues SeongHo Cho DPNM Lab., POSTECH
DNS Cache Poisoning Attack
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 19 Domain Name System (DNS)
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
A New Approach to DNS Security (DNSSEC)
NET 536 Network Security Lecture 8: DNS Security
Chapter 25 Domain Name System
NET 536 Network Security Lecture 6: DNS Security
Chapter 25 Domain Name System
Presentation transcript:

Sergei Komarov

DNS  Mechanism for IP <> hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components n A “name space” n Servers making that name space available n Resolvers (clients) which query the servers about the name space

DNS  Name servers answer ‘DNS’ questions, give authoritative answers for one or more zones.  Several types of name servers Authoritative servers ○ master (primary) The master server normally loads the data from a zone file ○ slave (secondary) A slave server normally replicates the data from the master via a zone transfer (Caching) recursive servers ○ also caching forwarders

DNS zones & domains Zone - sub-tree of a larger tree identified by a domain name, contains resource records and sub-domains

DNS Records  ‘A’ record Defines a host, contains IPv4 address  ‘AAAA’ record Defines a host, contains IPv6 address  ‘MX’ record Defines mail servers for particular domain  ‘NS’ record authoritative nameservers for domain  ‘CNAME’ Record Alias

DNS Security Vulnerabilities  Packet Sniffing DNS queries/responses come unsigned and unencrypted as one packet  Transaction ID guessing A 16-bit field identifying a specific DNS transaction. The transaction ID is created by the message originator. Using the transaction ID, the DNS client can match responses to its requests.  Caching problems No fast & secure way of propagating updates and invalidations

DNS Security Vulnerabilities  Information Leakage Zone transfer not configured correctly Result: anyone can query the nameserver  DNS Dynamic Update Vulnerabilities e.g. DHCP uses DNS Dynamic Updates to add/delete RRs on demand Authenication takes place on the primary server of the zone, based on the IP address, which could be spoofed  BIND Security Old versions still in use extensively

DNS Security Attacks  MITM(Man in the Middle Attacks) The attacker makes connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection In DNS only IP address, ports and Query ID of source can be verified, but this is easy to spoof.

DNS Security Attacks  Cache Poisoning using Name Chaining Victim issues a query Atacker injects DNS names into the response of RR’s and can reroute subsequent DNS queries to another server This is achieved by means of DNS RRs(resource records) whose RDATA portion includes a DNS name which can be used as a hook to let an attacker feed bad data into a victim’s cache. The most affected types of RRs are CNAME, NS, and DNAME(alias for the whole DNS domain) RRs.

DNS Security Attacks  Cache Poisoning using Transaction ID Prediction Transaction ID field is only a 16-bit field There are only 232 possible combinations of ID and client UDP ports Some transaction ID generators are flawed, can be predicted

Solution?  DNSSEC Adds new records: ○ Origin authentication ○ Transaction authentication ○ Request authentication  Each secured zone has a key pair Public key, stored as a resource record (type KEY) in the secured zone. The public key is used by DNS servers and Resolvers to verify the zone’s digital signature. A private key is used to sign a RRset. If data is modified during transport the signature is no longer valid. Nothing is encrypted, only signatures are used.  Easy to implement if hardware support present  Has been around for years

DNS Attacks  Questions?