1 Dr. David MacQuigg, President Open-mail.org Registry of Public Email Senders™ –A Secure DNS Database University of Arizona ECE 596c – Cyber Security.

Slides:



Advertisements
Similar presentations
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Advertisements

Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Securing Bruce Maggs. Separate Suites of Protocols Protocols for retrieving POP, IMAP, MAPI (Microsoft Exchange) Protocols for sending
Draft-lemonade-imap-submit-01.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.
How Will Authentication Reduce Global Spam? OECD Anti-Spam Task Force Pusan – September, 2004 Dave Crocker Brandenburg InternetWorking OECD Anti-Spam Task.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
SMTP – Simple Mail Transfer Protocol
1 Dr. David MacQuigg Research Associate Autonomic Computing Laboratory Autonomic Trust System – Verify Identity and Assess Reputation University of Arizona.
1 Dr. David MacQuigg Research Associate Autonomic Computing Laboratory System – The most important application of computer networks University of.
Investigations into BIND Dynamic Update with OpenSSL by David Wilkinson.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
Simple Mail Transfer Protocol (SMTP) Team: Zealous Team: Zealous Presented By: Vishal Parikh ( ) Vishal Parikh ( ) Ribhu Pathria( )
SMTP Simple Mail Transfer Protocol. Content I.What is SMTP? II.History of SMTP III.General Features IV.SMTP Commands V.SMTP Replies VI.A typical SMTP.
2440: 141 Web Site Administration Services Instructor: Enoch E. Damson.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Spam Sonia Jahid University of Illinois Fall 2007.
SIMPLE MAIL TRANSFER PROTOCOL SECURITY Guided By Prof : Richard Sinn Bhavesh Jadav Mayur Mulani.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
1 Introduction AfNOG CHIX 2011 Blantyre, Malawi By Evelyn NAMARA.
SMTP, POP3, IMAP.
Mail Services.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Login Screen This is the Sign In page for the Dashboard New User Registration Enter Id and Password to sign In.
FTP (File Transfer Protocol) & Telnet
DNS-based Message-Transit Authentication Techniques D. Crocker Brandenburg InternetWorking D. Crocker Brandenburg InternetWorking.
Section 2.2 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE
Prof. John A. Copeland fax Office: Klaus
Certified Server Validation (CSV) “ An MTA is talking to me directly. Are they OK?” D. Crocker Brandenburg InternetWorking mipassoc.org/csv 10/8/2015 6:36.
File Transfer Protocol (FTP)
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
1 Dr. David MacQuigg, President Open-mail.org Stopping Abuse – An Engineer’s Perspective University of Arizona ECE 596c August 2006.
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
Data Communications and Networks Chapter 5 – Network Services DNS, DHCP, FTP and SMTP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
SMTP - Simple Mail Transfer Protocol RFC 821
Chapter 16: Distributed Applications Business Data Communications, 4e.
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
Draft-lemonade-imap-submit-00.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.
Network Applications: DNS Y. Richard Yang 2/1/2016.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
concepts & protocols
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
An Application with Active Spoof Monitoring and Control
Chapter 19 Domain Name System (DNS)
Social Media And Global Computing Sending
Chapter 7 Network Applications
Slides Credit: Sogand Sadrhaghighi
Data Communications and Networks
Presentation transcript:

1 Dr. David MacQuigg, President Open-mail.org Registry of Public Senders™ –A Secure DNS Database University of Arizona ECE 596c – Cyber Security November 2006

July 15, Who is a Public Sender? –A domain-name owner –Authorizing an Internet Transmitter –To send to unrelated Receivers What does the Registry Provide? –Authentication Data – Does the sender authorize this transmitter? –Reputation Data – How likely are messages authorized by this sender to be spam? –A simple, effective whitelisting method that works well with exiting anti-spam methods –The first non-proprietary database of Public Senders Typical Registry Record amazon.com.s-id.net IN TXT "opt=df:5 svc=X1:B ip4= /19, /29, /29" Other Authentication/Reputation Systems –Senderbase™, Bonded Sender™, Gossip™, many others –Many private systems operated by large ISPs for their own recipients, or by “spam appliance” companies for their own customers T R Trust Boundary User Agent Registry DNS Database Fast Efficient Secure?

July 15, 20153

July 15, Registry DNS Architecture & Security Threats ThreatAreaVulnerabilitySolution 1File StorageLoss or corruption of dataEncrypted backup copies with journaling. Unix system security. Physical security. 2Dynamic updates to zone filesStolen admin password. IP address spoofing. Secure admin’s computer & network connection. Use Transaction Signatures (TSIG). 3Incremental zone transfers.IP address spoofing.TSIG with unique key for each connection. Private IP addresses. 4Incremental zone transfers.IP address spoofing. DoS.TSIG with unique key for each connection. IP addresses in reserve. 5Queries from client’s DNS server. Cache poisoning. Man in middle. DoS.DNSSEC. IP addresses in reserve. 6Queries from client.Cache poisoning. Man in middle.DNSSEC. Local network security.

July 15, Testing the Registry Dynamic Update from Admin dave]# python dnsupdate.py 48 Outgoing update query: ;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id: 0 ;; flags: ; ZONE: 0, PREREQ: 0, UPDATE: 0, ADDITIONAL: 0 ;; UPDATE SECTION: test1.s-id.net. 0 ANY ANY test1.s-id.net IN TXT "Test_Record_48"... a few seconds later on one of our public servers ~]$ txt test1.s-id.net +short "Test_Record_48"

July 15, Pieces of Python # dnsupdate.py DMQ 11/4/06... # Start an nsupdate client process & connect file pointers to its # input and output pipes. fi,fo = popen2('nsupdate')... # Commands to nsupdate: header = '''\ local server key updatedns 1M92TYO2dznMK0M2N/q62Q== zone %(ZONE)s ''' % VARS template = '''\ update delete %(NAME)s.%(ZONE)s update add %(NAME)s.%(ZONE)s %(TTL)s %(TYPE)s %(VAL)s ''' % VARS trailer = '''\ show send quit ''' text = header + template + trailer...

July 15, Other Systems Facing Similar Threats Root Servers –13 IP addresses, IP multicast –TTL = ( 6 days ) IP Blacklists ( Spamhaus, et. al.) –30 servers –One record per IP, TTL only a few hours Attacker Motivations –Vandalism (script kiddies) –Profit (spammers) –Tort (anger, revenge, politics, …) –Denial of Service –Defamation

July 15, Bibliography Pro DNS and BIND, Ron Aitchison, – Best book for learning DNS. Excellent examples. Thorough discussion of security. DNS and BIND, 4th ed., Albitz & Liu, – The DNS “Bible”. TCP/IP Illustrated, vol. I, The Protocols, W. Richard Stevens, Very thorough, yet readable. Good illustrations. Project Links – Current status of our Authentication and Reputation Systemhttps:// – Articles and notes from early development. A short list of the most useful books and articles on the technology behind the Registry.

July 15, 20159

July 15, Precise Terminology Border MTA – Mail Transfer Agent at the border of an Administrative Domain. If we exclude Open Relays, which are banned by most Receivers, all MTA’s, including the Forwarder above, can be associated with either the Sender or the Receiver, and the border is clearly defined. Administrative Domain – includes all MTA’s that have some pre-arrangement to exchange . An Administrative Domain may include servers using many different domain names. The two uses of “domain” are unrelated. Sender – poorly defined. Should mean the outgoing Border MTA, but can mean the original sending domain or even an author. Use only when the context is clear or precision doesn’t matter. Receiver – The incoming Border MTA, not including MTA’s that are internal to the Receiver’s Administrative Domain. Authentication should always be done at the border. Forwarder – An MTA that relays mail from one MTA to another. Transmitter – MTA that is the source for the current “hop”, and whose IP address appears in the Source field of the IP packets. Can include Senders and Forwarders. Return Address – The address in the MAIL FROM command, used by the mail system for Delivery Status Notifications (DSN’s). MUA, MSA, MDA – Other types of mail agents - Mail User Agent, Mail Submission Agent, Mail Distribution Agent.

July 15, Identities in an Session $ telnet open-mail.org open-mail.org ESMTP Sendmail /8.13.1; Wed, 30 Aug :36: HELO mailout1.phrednet.com 250 open-mail.org Hello ip068.subnet71.gci-net.com [ ], pleased to meet you MAIL FROM: Sender ok RCPT TO: Recipient ok DATA 354 Enter mail, end with "." on a line by itself From: Dave\r\nTo: Test Recipient\r\nSubject: SPAM SPAM SPAM\r\n\r\nThis is message 1 from our test script.\r\n.\r\n k7TKIBYb Message accepted for delivery QUIT open-mail.org closing connection RFC-2821 Helo Name Envelope Addresses: Return Address Recipient Addresses RFC-2822 Header Addresses: From Address Reply-To Address Network Owner

July 15, Border Patrol™ MTA

July 15, Forgery is the Critical Factor in Abuse Crooks hide their IP addresses by using a forwarder. Signature-based Authentication (DKIM): Sender provides a Public Key via a secure channel. Messages are signed with the related Private Key. End-to-end protocol works independently of forwarders. Slow but secure. IP-based Authentication (SPF, SenderID, CSV): Sender provides a list of authorized transmitter addresses. Fast but requires a “chain of trust” with forwarders.