Presented by: Syed Nasir Mehdi PhD Computer Science and Engineering Biocom Lab hanyang.ac.kr 1 INCREASED DNS FORGERY RESISTANCE THROUGH 0X20.

Slides:



Advertisements
Similar presentations
Review iClickers. Ch 1: The Importance of DNS Security.
Advertisements

State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Lecture 18 Page 1 CS 236 Online DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
DNS Poisoning Attacks November 2005 John (Jenya) Neystadt Security Test Lead Microsoft Israel R&D.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
1 Internet Networking Spring 2006 Tutorial 8 DNS and DHCP as UDP applications.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
DNS and DNSSec Eustace Asanghanwa Andrew Bates Shane Jahnke Brian Wilke.
DNS Security Extensions (DNSSEC) Ryan Dearing. Topics History What is DNS? DNS Stats Security DNSSEC DNSSEC Validation Deployment.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Domain Name System ( DNS )  DNS is the system that provides name to address mapping for the internet.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
1 Secure DNS Solutions Rooster. 2 Introduction What does security mean for DNS? What security problems exist for DNS, what is being done about them, and.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Host Identity Protocol
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #2 DNS and DHCP.
Computer Security 2014 – Ymir Vigfusson Some slides borrowed from Amir Masoumzadeh’s INFSCI 1075, Dan
Information-Centric Networks03a-1 Week 3 / Paper 1 What DNS is not –Paul Vixie –CACM, December 2009, vol. 52, no. 12 Main point –“DNS is many things to.
CS426Fall 2010/Lecture 341 Computer Security CS 426 Lecture 34 DNS Security.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
IIT Indore © Neminath Hubballi
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 17 Domain Name System (DNS)
Geoff Huston APNIC Labs
CS526Topic 19: DNS Security1 Information Security CS 526 Topic 19: DNS Security.
Written By: David Dagon Manos Antonakakis Paul Vixie Georgia Institute of Georgia Institute ofInternet Systems. Technology Technology Consortium Wenke.
By Chris Racki. Outline  Introduction  How DNS works  A typical DNS lookup  Caching for later  Vulnerabilities of DNS  Anatomy of a cache poisoning.
Chapter 17 Domain Name System
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Paper Presentation – CAP Page 2 Outline Review - DNS Proposed Solution Simulation Results / Evaluation Discussion.
1 The INI is a cooperative endeavor of:Electrical and Computer EngineeringSchool of Computer Science Graduate School of Industrial AdministrationHeinz.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
IETF82, TAIWAN Meilian LU, Xiangyang GONG, Wendong WANG
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Packet Filtering & Firewalls. Stateless Packet Filtering Assume We can classify a “good” packet and/or a “bad packet” Each rule can examine that single.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
Strong Cache Consistency Support for Domain Name System Xin Chen, Haining Wang, Sansi Ren and Xiaodong Zhang College of William and Mary, Williamsburg,
TODAY & TOMORROW DAY 2 - GROUP 5 PRESENTED BY: JAMES SPEIRS CHARLES HIGBY BRADY REDFEARN Domain Name System (DNS)
How to use DNS during the evolution of ICN? Zhiwei Yan.
Use of the IPv6 Flow Label as a Transport-Layer Nonce draft-blake-ipv6-flow-nonce-02 Steven Blake IETF 76 November 2009.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
* Agenda  What is the DNS ?  Poisoning the cache  Short term solution  Long term solution.
DNS Cache Poisoning. History 1993 – DNS protocol allowed attacker to inject false data which was then cached 1997 – BIND 16-bit transaction ids not randomized,
DNS Session 5 Additional Topics Joe Abley AfNOG 2006, Nairobi, Kenya.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
Mitigating DNS DoS Attacks Hitesh Ballani, Paul Francis 1.
Computer Security 2014 – Ymir Vigfusson Some slides borrowed from Amir Masoumzadeh’s INFSCI 1075, Dan
DNS Cache Poisoning – The Next Generation by Joe Stewart, GCIH Presented by Stephen Karg CS510, Advanced Security Portland State University Oct. 24, 2005.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
CNNIC UPDATE NIR SIG, 26 th APNIC, Christchurch, New Zealand.
Lecture 18 Page 1 CS 236, Spring 2008 DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
The Design and Implementation of a Next Generation Name Service for the Internet V. Ramasubramanian, E. Gun Sirer Cornell Univ. SIGCOMM 2004 Ciprian Tutu.
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
MAN-IN-THE-MIDDLE ATTACK STEGANOGRAPHY Lab# MAC Addresses and ARP  32-bit IP address:  network-layer address  used to get datagram to destination.
Security Issues with Domain Name Systems
DNS Security Issues SeongHo Cho DPNM Lab., POSTECH
DNS Cache Poisoning Attack
DNS security.
Chapter 19 Domain Name System (DNS)
IP Addressing Research
Domain Name System: DNS
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Presentation transcript:

Presented by: Syed Nasir Mehdi PhD Computer Science and Engineering Biocom Lab hanyang.ac.kr 1 INCREASED DNS FORGERY RESISTANCE THROUGH 0X20 BIT ENCODING DAVID DAGON MANOS ANTONAKAKIS PAUL VIXIE TATUYA JINMEI WENKE LEE

 Introduction  Background  DNS Nomenclature  DNS Poisoning  Basic DNS Poisoning Model  DNS Ox20 Bit Encoding Queries  Analysis  Ox20 Probing  Related Work  Future Work  Conclusion 2 OUTLINE

 Main Goal: To make DNS queries more resistant to poisoning attacks:  What it entails: Creation of DNS light-weight forgery-resistance technology  How :  Preservation of case encoding of DNS Queries by Authority Servers bit- for-bit and upon return the verification of the same and caching by recursive server.  Constraints:  No Radical Changes. DNS Infrastructure should remain intact  Protocol Stability. DNS Protocol should remain intact  Backward Compatible. Other technologies that rely on existing DNS standards should remain intact  Example: recursive DNS servers would instead query for 3 INTRODUCTION

 DNS  Stub Resolver(Client)  Resolver(Name Server)  Recursive Resolver(NS Client)  Authoritative Servers(SOA)  Zone(.net,.org)  Delegation  Caching  RR  Root(13)  WHOIS(Registrant,nameserver TTL) 4 DNS OVERVIEW

 Attackers can iteratively Observe cache values over time  OR be forced to do lookups  Guess the 16 bit ID-field  Birthday Attacks  Exploit weak random number generation.  Berstein suggests UDP ports+ID  Kaminsky class(IN A answer+NS update)  No of guesses attacker can make.  Port randomization to grow the key space. 5 DNS POISONING

Definition 1: DNS server is forgery resistant where TTL (caching period) ≫ △ t, and the chance of an attack being successful within △ t time is low. Assumption 1. If attack is not 10% likely to succeed within Tmax, we deem the DNS server is forgery resistant. 6 DNS POISONING MODEL

 DNSSEC DNS servers, King Kaminsky-class advocate the Importance of RTT.  Calculate tA,tB, tC and Then calculate RTT= tC-tB. Verify tC-tB ≈ tC −tA  If domain cached, Avg response time<100ms  If not cached, 400ms.  Answer’s TTL (caching period) 7 RTT

8 RTT OBSERVATIONS  Randomly select 5000 servers, with hosts open recursive.

 α = Number of Different DNS IDs 2¹ 6  β = Number of Source Ports (conceptually 2¹ 6 )  γ = Number of Ports excluded 1024 as per kernel resources  θ = Number of authority servers and recursive IPs.  attacker has to spoof the correct authority source address apart from query ID and port.  = 1/ α ∗ (β − γ) ∗ θ  With 3 authority servers, =1/ 2¹ 6 ∗ (2¹ 6 − 1024) ∗ 3≈1 12.7B  = n/α ∗ (β − γ) ∗ θ  Observations: 1.not every recursive DNS server can implement port randomization, since it poses unique engineering challenges.+ sockets selection 2.Some DNS servers are more important targets e.g ISP  We therefore need additional DNS protection measures 9 RTT OBSERVATIONS

 Cached Query Resolver-OR  RTT: SOA-OR  First Query: Resolver-SOA 10 RTT OBSERVATIONS

11 DNS OX20 BIT ENCODING QUERIES

12 ANALYSIS

13 OX20 PROBING

14 PROBING..

15 PROBING

 3 weeks non stop internet scan  75 million name servers  7 million queries .3% who don’t support  Under high volumes they return identical queries/s for same Domain  DNS fingerprinting scans <0.28%, behave this way, load balancers or hardware accelerators  99.7% support 0x20 encoding scheme without changing their code base. 16 MORE OBSERVATIONS

 TSIG or SIG(0) and TKEY for message integrity  Domain Name System (DNS) Cookies”  IETF draft on DNS forgery resilience discusses many aspects of DNS poisoning  DoX, a peer-to-peer DNS replacement, motivated by DNS poisoning  TCP SYN Cookies proposed by DJ Bernstein and Eric Schenk in 1996 as a means to stop resource exhaustion DDoS attacks on TCP stacks, Most related, similar the DNS encoding scheme 17 RELATED WORK

 Approach adopted 1.Require no radical changes to the DNS infrastructure; 2.Make no major changes to the existing protocol 3. Be backwards compatible, so that even just a few DNS servers can elect to adopt it  With small exceptions (≈ 0.3%) the world’s authority servers appear to already preserve the encoding scheme.  DNS-0x20 encoding does not provide strong guarantees for transaction integrity, it just raises the bar.  DNS messages can have an additional 12-bits of state, perhaps a reason of slow adoption of other comprehensive DNS security schemes. 18 CONCLUSION

 There may be key management issues to consider.  Stateless encoding schemes for domain names using ox20 bitset of queries,  Modifications and implementation for embedded devices  Update deployed embedded DNS systems  Policy options for DNS-0x20 recursive servers  Capacity of the covert channel that DNS ox20 creates 19 FUTURE WORK

 This material was based upon work supported in part by the National Science Foundation under Grant No and the Department of Homeland Security under Contract No. FA Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation and the Department of Homeland Security. 20 ACKNOWLEDGEMENTS