A New Approach to DNS Security (DNSSEC) Author: Giuseppe Ateniese Stefan Mangard Presenter: Liu, Xiaotao.

Slides:



Advertisements
Similar presentations
Chapter 14 – Authentication Applications
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Domain Name System. DNS is a client/server protocol which provides Name to IP Address Resolution.
DNS Security A.Lioy, F.Maino, M. Marian, D.Mazzocchi Computer and Network Security Group Politecnico di Torino (Italy) presented by: Marius Marian.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
1 DNS. 2 BIND DNS –Resolve names to IP address –Resolve IP address to names (reverse DNS) BIND –Berkeley Internet Name Domain system Version 4 is still.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Domain Name System (DNS) Network Information Center (NIC) : HOSTS.TXT.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Domain Name System ( DNS )  DNS is the system that provides name to address mapping for the internet.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
DNS Security Brad Pokorny The University of Minnesota Informal Security Seminar 4/18/03.
Domain Name Services Oakton Community College CIS 238.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Identity Management and DNS Services Tianyi XING.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Domain Names System The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the.
IIT Indore © Neminath Hubballi
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 17 Domain Name System (DNS)
DNS and C# SWE 344 Internet Protocols & Client Server Programming.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Domain Name System HISTORY File hosts (the size of Internet became more than 1000.
Olaf M. Kolkman. Domain Pulse, February 2005, Vienna. DNSSEC Basics, Risks and Benefits Olaf M. Kolkman
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 29 Domain Name System (DNS) Allows users to reference computer names via symbolic names translates symbolic host names into associated IP addresses.
Domain Name System CH 25 Aseel Alturki
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Chapter 16 – The Domain Name System (DNS) Presented by Shari Holstege Tuesday, June 18, 2002.
Wei-li Tang, August 28 th Department of Computer Science and Information Engineering, National Chi Nan University. On the Performance and Analysis.
Internet and Intranet Protocols and Applications Lecture 5 Application Protocols: DNS February 20, 2002 Joseph Conron Computer Science Department New York.
Objectives Discuss the basics of the Domain Name System (DNS) and its terminology Configure DNS clients Install a standard DNS server on Server 2008 Create.
Configuring Name Resolution and Additional Services Lesson 12.
Windows Server 2003 DNS 安裝設定與管理維護 林寶森
Domain Name System (DNS). DNS Server Service Overview of Domain Name System What Is a Domain Namespace? Standards for DNS Naming.
1 Internet Network Services. 2 Module - Internet Network Services ♦ Overview This module focuses on configuring and customizing the servers on the network.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
How to use DNS during the evolution of ICN? Zhiwei Yan.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
DNS DNS overview DNS operation DNS zones. DNS Overview Name to IP address lookup service based on Domain Names Some DNS servers hold name and address.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
Linux Operations and Administration
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Web Server Administration Chapter 4 Name Resolution.
1 CMPT 471 Networking II DNS © Janice Regan,
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Internet Naming Service: DNS* Chapter 5. The Name Space The name space is the structure of the DNS database –An inverted tree with the root node at the.
So DNS is A client-server application that maps domain names into their corresponding IP addresses with the help of name servers. Mapping domain names.
Basics of the Domain Name System (DNS) By : AMMY- DRISS Mohamed Amine KADDARI Zakaria MAHMOUDI Soufiane Oujda Med I University National College of Applied.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
AfNOG-2003 Domain Name System (DNS) Ayitey Bulley Setting up an Authoritative Name Server.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
Security Issues with Domain Name Systems
DNS Security Issues SeongHo Cho DPNM Lab., POSTECH
IMPLEMENTING NAME RESOLUTION USING DNS
DNS Cache Poisoning Attack
A New Approach to DNS Security (DNSSEC)
NET 536 Network Security Lecture 8: DNS Security
NET 536 Network Security Lecture 6: DNS Security
Computer Networks Presentation
Presentation transcript:

A New Approach to DNS Security (DNSSEC) Author: Giuseppe Ateniese Stefan Mangard Presenter: Liu, Xiaotao

Outline Overview of DNS Motivation PK-DNSSEC SK-DNSSEC Comparison with PK-DNSSEC Usage of DNSSEC

Outline

What is the DNS Domain Name System Distributed ‘ database ’ to resolve domain names Labels translate to Resource Records Address (A) Mail hosts (MX) Text (TXT) and much more …. Resource records stored in zones Highly scalable

domain zone A DNS tree.money.net.kids.net corp.money.net unix.os.net mac.os.net nt.os.net.os.net.net.com marnick.kids.net dop.kids.net. root top level

DNS data Labelttlclasstyperdata Example Zone file dacht.net 7200 IN SOA ns.ripe.net. olaf.ripe.net.( ; Serial ; Refresh 12 hours ; Retry 4 hours ; Expire 4 days 7200 ; Negative cache 2 hours ) dacht.net 7200 IN NS ns.ripe.net. dacht.net 7200 IN NS ns.high5.net. pinkje.dacht.net 3600 IN A host25.dacht.net 2600 IN A

Common Resource Records RECORD TYPEDESCRIPTIONUSAGE AAn address recordMaps FQDN into an IP address PTRA pointer recordMaps an IP address into FQDN NSA name server recordDenotes a name server for a zone SOAA Start of Authority recordSpecifies many attributes concerning the zone, such as the name of the domain (forward or inverse), administrative contact, the serial number of the zone, refresh interval, retry interval, etc. CNAMEA canonical name recordDefines an alias name and maps it to the absolute (canonical) name MXA Mail Exchanger recordUsed to redirect for a given domain or host to another host

DNS resolving stub resolver Question: A ? resolver. A ? ask.com server the ip address of.com server.com A ? ask cnn.com server the ip address of cnn.com server cnn.com A ? xxx.xxx.xxx.xxx add to cache lab.cs.umass.edu dns.cs.umass.edu

DNS Data flow master resolver stub resolver Zone administrator Zone file slaves Dynamic updates

Outline

Data Protection Server Protection DNS Vulnerabilities Zone file slaves master resolver stub resolver Zone administrator Dynamic updates Cache pollution by Data spoofing Unauthorized updates Corrupting data Impersonating master Cache impersonation

Why DNSSEC DNSSEC protects against data spoofing and corruption DNSSEC also provides mechanisms to authenticate servers and requests DNSSEC provides mechanisms to establish authenticity and integrity

Outline

PK-DNSSEC (Public Key) The DNS servers sign (digitally encrypt)the hash of resource record set with its private keys Resouce record set: The set of resource records of the same type. Public KEYs can be used to verify the SIGs The authenticity of public KEYs is established by a SIGnature over the keys with the parent ’ s private key In the ideal case, only one public KEY needs to be distributed off-band (the root ’ s public KEY)

DNSSEC new RRs 2 Public key related RRs SIG signature over RRset made using private key KEY public key, needed for verifying a SIG over a RRset, signed by the parent ’ s private key One RR for internal consistency (authenticated denial of data) NXT RR to indicate which RRset is the next one in the zone For non DNSSEC public keys: CERT

SIG RRs Cover each resource record set with a public-key signature which is stored as a resource record called SIG RR SIG RRs are computed for every RRset in a zone file and stored Add the corresponding pre-calculated signature for each RRset in answers to queries Must include the entire RRset in an answer, otherwise the resolver could not verify the signature

SIG(0) Use public-key signature to sign the whole message each time the server responses the queries Provide integrity protection and authentication of the whole message Can be scaled to provide authentication of query requests Not be practical to use on a large scale environment

Compare SIG RRs with SIG(0) More computation on DNS server caused by SIG(0) More network traffic caused by SIG RRs More storage need by SIG RRs

Verifying the tree stub resolver Question: A ? resolver. (root) A ? ask.com server SIG(the ip address and PK of.com server) by its private key.com A ? ask cnn.com server SIG(the ip address and PK of cnn.com server) by its private key cnn.com A ? SIG(xxx.xxx.xxx.xxx) by its private key xxx.xxx.xxx.xxx add to cache lab.cs.umass.edu dns.cs.umass.edu transaction signatures slave servers transaction signatures

Verify a SIG over data using the public KEY DNS data is signed with the private key Verify the SIG with the KEY mentioned in the SIG record The key can be found in the DNS or can be locally configured Verifying

Outline

SK-DNSSEC (Symmetric Certificates) The usage of symmetric ciphers through AES or Blowfish in CBC mode. The usage of symmetric signatures via MAC functions. Combine encryption techniques with MAC functions as E k (m, MAC l (m)). Each message contains a nonce to avoid replay attack. A nonce is pair of a random number and a timestamp.

SK-DNSSEC (cont.) Given the DNS tree of domains, each node shares a key with its parent, called master key The root domain has an asymmetric key pair(public and private key) as well as its own master key that is not shared with any others The resolvers must have an authentic copy of root ’ s public key

Notation

DNS Root Certificate

DNS Request to Root Info(P xy ) has to minimally contain the identity strings I x and I y. Inception and expiration dates, details about the encryption and authentication algorithms employed, certificate and key unique identifiers, and the identity of the creator of the certificate

DNS Request to Intermediate Server

DNS Request to Authoritative Server

For mutual authentication For any 0  i  n

The problem of PK and SK DNSSEC In SK-DNSSEC, the root servers need to decrypt the message encrypted by the public key In PK-DNSSEC, the potential increase of network traffic due to larger DNS messages In PK-DNSSEC, the high cost of verifying the public-key digital signatures at the resolvers side

Hybrid Approach The root servers use PK-DNSSEC The top-level domains use SK-DNSSEC

Outline

Efficiency PK-DNSSEC with SIG RR. For each RRset in the answer, a pre-calculated SIG RR is included PK-DNSSEC with SIG(0). DNS messages do not contain SIG RRs, but are rather signed as a whole by SIG(0)-type signature. SK-DNSSEC. DNS messages are secured by symmetric signatures and encryption.

Performance (800M HZ)

Performance (cont.)

Network Traffic

Storage

Outline

Public-key Distribution System Global real time availability Easy access to DNS Scalability Hierarchical organization Globally unique names Globally unique host name Cryptographic binding of name and key KEY RR binds DNS names with keys

Q&A Thank You!