#ICANN49 Security and Stability Advisory Committee Activities Update ICANN Singapore Meeting March 2014.

Slides:



Advertisements
Similar presentations
SSAC Overview May 23, 2006 Steve Crocker
Advertisements

The Domain Name System Continuity of Operations Apricot 2008 Taipei TAIWAN 28feb2008.
ICANN Strategic planning process Draft key priorities for the July 2006 – June 2009 Plan for community comment November 2005.
ICANN Plan for Enhancing Internet Security, Stability and Resiliency.
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Text #ICANN50. Text #ICANN50 IDN Variant TLD Program GNSO Update Saturday 21 June 2014.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
SCADA Security, DNS Phishing
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Domain Name System. DNS is a client/server protocol which provides Name to IP Address Resolution.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
Chapter 7 HARDENING SERVERS.
Security Awareness: Applying Practical Security in Your World
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
New gTLD Basics. 2  Overview about domain names, gTLD timeline and the New gTLD Program  Why is ICANN doing this; potential impact of this initiative.
1 Secure DNS Solutions Rooster. 2 Introduction What does security mean for DNS? What security problems exist for DNS, what is being done about them, and.
Robert Horn, Agfa Corporation
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Chapter Overview TCP/IP Protocols IP Addressing.
Evolved from ARPANET (Advanced Research Projects Agency of the U.S. Department of Defense) Was the first operational packet-switching network Began.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Configuration Management Supplement 67 Robert Horn, Agfa Healthcare.
Name Collisions in the Domain Name System Burt Kaliski, Verisign USTelecom Webinar April 17, 2014.
2011 – 2014 ICANN Strategic Plan Development Stakeholder Review 4 November 2010.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
CSUF Chapter 6 1. Computer Networks: Domain Name System 2.
Working Group #4: Network Security – Best Practices March 6, 2013 Presenters: Rod Rasmussen, Internet Identity Tony Tauber, Comcast WG #4.
Update report on GNSO- requested Whois studies Liz Gasster Senior Policy Counselor 7–12 March 2010.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Prohibiting Redirection & Synthesized DNS Responses in Top Level Domains Mar 2010 Kuala Lumpur APTLD Meeting.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
ICANN COMMUNITY STRATEGIC PLANNING DISCUSSION Brussels, June
Update from ICANN staff on SSR Activities Greg Rattray Tuesday 21 st 2010.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
JIG (Joint ccNSO-GNSO IDN Group) Update APTLD | New Delhi Feb 23, 2012.
New gTLD Basics. 2  Overview about domain names, gTLD timeline and the New gTLD Program  Why is ICANN doing this; potential impact of this initiative.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
BCOP on Anti-Spoofing Long known problem Deployment status Reason for this work Where more input needed.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
ICANN Root Name Server System Advisory Committee March 2, 1999 SUNTEC Convention Center Singapore.
Working Group #4: Network Security Best Practices September 12, 2012 Presenter: Rod Rasmussen, Internet Identity WG #4 Co-Chair.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
1 1 The GNSO Role in Internet Governance Presented by: Chuck Gomes Date: 13 May 2010.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
DNS DNS overview DNS operation DNS zones. DNS Overview Name to IP address lookup service based on Domain Names Some DNS servers hold name and address.
IDN UPDATE Tina Dam ICANN Chief gTLD Registry Liaison Public Forum, Wellington 30 March 2006.
ICANN 48 Security and Stability Advisory Committee Activities Update ICANN Buenos Aires Meeting November 2013.
Linux Operations and Administration
BZUPAGES.COM. Presented to: Sir. Muizuddin sb Presented by: M.Sheraz Anjum Roll NO Atif Aneaq Roll NO Khurram Shehzad Roll NO Wasif.
Update on WHOIS- related policy activities in the GNSO Liz Gasster Senior Policy Counselor ICANN ICANN 5 March
IRTP Part B PDP Final Report Overview. Background Inter-Registrar Transfer Policy (IRTP) Straightforward process for registrants to transfer domain names.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
Update on Consumer Choice, Competition and Innovation (CCI) WG Rosemary Sinclair.
COMP 431 Internet Services & Protocols
Internet infrastructure 1. Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing.
{ Domain Name System DNS & IP Address Protocols within the Internet Ecosystem. - Amanda Sparling, EMAC 6300.
© A10 Networks, Inc. Distributed Prevention of DoS Collaboration is key.
Monitoring, analyzing and cleaning DNS configuration errors across European NRENs Slavko Gajin University of Belgrade, Serbia
Measuring the Leakage of Onion at the Root A measurement of Tor’s.onion pseudo-top-level domain in the global domain name system Aziz Mohaisen Verisign.
High performance recursive DNS solution
Security Issues with Domain Name Systems
IDN Variant TLDs Program Update
IS4680 Security Auditing for Compliance
Presentation transcript:

#ICANN49 Security and Stability Advisory Committee Activities Update ICANN Singapore Meeting March 2014

Agenda 1. SSAC Overview and Activities – Patrik Fältström 2. SAC 064: SSAC Advisory on Search List Processing – Patrik Fältström 3. SAC 065: SSAC Advisory on DDoS Attacks Leveraging DNS Infrastructure – Merike Kaeo 4. Discussion & Questions 2 2 #ICANN49

Security and Stability Advisory Committee (SSAC) Overview 2001: SSAC initiated; 2002: Began operation. Provides guidance to ICANN Board, Supporting Organizations and Advisory Committees, staff and general community. Charter: To advise the ICANN community and Board on matters relating to the security and integrity of the Internet's naming and address allocation systems. Members as of March 2014: 40; appointed by ICANN Board for 3-year terms #ICANN49

2014 Work Plan: Current Activities 4 SSAC Membership Committee DNSSEC Workshop Identifier Abuse Metrics SSAC Outreach to Law Enforcement IGF Workshop Public Suffix Lists 4 4 #ICANN49

Publications by Category 5 DNS Security [SAC064]: SSAC Advisory on DNS “Search List” Processing – 13 February 2014 [SAC063]: SSAC Advisory on DNSSEC Key Rollover in the Root Zone – 07 November 2013 [SAC062]: SSAC Advisory Concerning the Mitigation of Name Collision Risk – 07 November 2013 [SAC059]: SSAC Letter to the ICANN Board Regarding Interdisciplinary Studies – 18 April 2013 [SAC057] SSAC Advisory on Internal Name Certificates— March #ICANN49

6 DNS Abuse [SAC065]: SSAC Advisory on DDoS Attacks Leveraging DNS Infrastructure – 18 February 2014 Internationalized Domain Names (IDNs) [SAC060]: SSAC Comment on Examining the User Experience Implications of Active Variant TLDs Report—23 July 2013 Registration Data (WHOIS): [SAC061] SSAC Comment on ICANN’s Initial Report from the Expert Working Group on gTLD Directory Services—06 September 2013 [SAC058] SSAC Report on Domain Name Registration Data Validation Taxonomy—March Publications by Category 6 6 #ICANN49

SAC064: SSAC Advisory on DNS “Search List” Processing Patrik Fältström 7 7 #ICANN49

8 Overview In SAC 064, the SSAC: Examines how current operating systems and applications process search lists; Highlights security and stability implications with some search list behaviors; and Proposes a strawman to improve search list processing. 8 8 #ICANN49

9 Background What is search list processing? –a feature that allows a user to enter a partial name in an application, with the operating system expanding the name through entries in a search list. –a search list of “somedomain1.com; somedomain2.com” and a user types “system” into her browser’s address box, the operating system would try “system.somedomain1.com”, “system.somedomain2.com”, and “system.” in some order. 9 9 #ICANN49

10 Issues Issue 1: Non-Standardization 10 #ICANN49 NameBehavior nevernever apply the search list, the original name is queried. always always apply the search list, the synthesized names are queried in the DNS, and the original name is never queried in the DNS. pre The search list is first applied to the original name in DNS queries, and if iterations of the application of the search list generate a NXDOMAIN response, the original name is queried in the DNS. post The original name is queried in the DNS. If it generates an NXDOMAIN response, the search list is applied to the original name in DNS queries. www / search “www” is prepended to the original QNAME, or the string is used as a search term to the default search engine.

11 Issues, Cont. Issue 2: Query Leakage and Privacy Issues Applications and resolver libraries in the “post” behavior leak queries that may result in them reaching the root servers. Applications move between different environments (e.g., from corporate to home network) where different search lists are set, queries will be appended with search list entries that may not match the user’s original intent, causing unintended and unnecessary queries. 11 #ICANN49

12 Issues, Cont. 12 #ICANN49 Figure 1: NXDOMAIN traffic to some proposed TLDs (source 2012, 2013 DITL)

13 Issues, Cont. 13 #ICANN49 Figure 2: NXDOMAIN traffic to some proposed TLDs (source 2012, 2013 DITL). Note the log scale of the Y-Axis.

14 Issues, Cont. Issue 3: Security and Name Collision Issues 14 #ICANN49 1) User > Resolver: A? 2) Resolver > User: NXDomain q: A? 3) User > Resolver: A? 4) Resolver > User: NXDomain q: A? 5) User > Resolver: A? 6) Resolver > User: NXDomain q: A? 7) User > Resolver: A? 8) Resolver > User: A?

15 Strawman Proposal No automatically generated search lists: –Administrators (including DHCP server administrators) should configure the search list explicitly, and must not use implicit search lists. Unqualified single-label domain names are never queried directly: –When a user enters a single label name, that name may be subject to search list processing if a search list is specified, but must never be queried in the DNS in its original single- label form. Unqualified multi-label domain names never use search lists: –When a user queries a hostname that contain two or more labels separated by dots, such as applications and resolvers must query the DNS directly. Search lists must not be applied. 15 #ICANN49

16 Recommendations In SAC 064, the SSAC: Invites ICANN SO/ACs, the IETF, and the DNS operations community to consider the proposed behavior for search list processing and comment on its correctness, completeness, utility and feasibility; Recommends ICANN staff to work with the DNS community and the IETF to encourage the standardization of search list processing behavior; and Recommends in the context of mitigating name collisions, ICANN should consider additional steps to address search list processing behavior. 16 #ICANN49

SAC065: SSAC Advisory on DDoS Attacks Leveraging DNS Infrastructure Merike Kaeo 17 #ICANN49

18 Overview Contemporary DDoS attacks use DNS reflection and amplification to achieve attack data bit rates reportedly exceeding 300 gigabits per second. Underlying many of these attacks is packet-level source address forgery or spoofing, the attacker: –Generates and transmits UDP packets purporting to be from the victim’s IP address; –Uses query-response protocols (e.g., DNS, NTP, or SNMP) to reflect and/or amplify responses to achieve attack data transfer rates exceeding the victim’s network capacity; and –DNS is especially suitable for such attack. 18 #ICANN49

DNS Amplification Attacks Utilizing Forged IP Addresses Attacker Victim Open recursive DNS servers send legitimate queries to authoritative servers Authoritative servers send back legitimate replies to recursive DNS servers Open recursive DNS server legitimate responses create massive DDoS attack to victim’s IP address. Authoritative DNS Servers Authoritative DNS Servers Authoritative servers send replies directly to the victim Open Resolvers Use forged IP address of intended victim to send legitimate queries to open recursive DNS servers. BotNet Attacker has control of a BotNet Abusing Open Recursive DNS ServersAbusing Authoritative DNS Servers Attacker BotNet sends queries appearing to come from victim to authoritative servers

20 Overview, Cont. Critically, basic controls for network access and DNS security have not been as widely implemented as is necessary to maintain and grow a resilient Internet. Increasingly higher-speed Internet connections combined with the growing power of individual end user devices results in an extraordinary and growing capacity for conducting extremely large scale and highly disruptive DDoS attacks using unsecured DNS infrastructure. 20 #ICANN49

21 Summary In SAC 065, the SSAC: Explores several unresolved critical design and deployment issues that have enabled increasingly large and severe Distributed Denial of Service (DDoS) attacks using the DNS; and Recommends ICANN and operators of Internet infrastructure and manufacturers take specific actions. 21 #ICANN49

22 Recommendations The SSAC Recommends that: 1.ICANN should help facilitate an Internet-wide community effort to reduce the number of open resolvers and networks that allow network spoofing. This effort should involve measurement efforts and outreach; 2.All network operators should take immediate steps to prevent network address spoofing; 3.Recursive DNS server operators should take immediate steps to secure open recursive DNS servers; 4.Authoritative DNS server operators should support efforts to investigate authoritative response rate limiting. 22 #ICANN49

23 Recommendations, Cont. The SSAC Recommends that: 5.DNS server operators should put in place operational processes to ensure that their DNS software is regularly updated and communicate with their software vendors to keep abreast of the latest developments; and 6.Manufacturers and/or configurators of customer premise networking equipment should take immediate steps to secure these devices and ensure that they are field upgradable when new software is available to fix security vulnerabilities, and aggressively replace the installed base of non-upgradeable devices with upgradeable devices. 23 #ICANN49

Thank You and Questions