CIS3360: Security in Computing Chapter 6 : Network Security II Cliff Zou Spring 2012.

Slides:



Advertisements
Similar presentations
DNS: Domain Name System CMPSCI 491G: Computer Networking Lab V. Arun Slides adapted from Liebeherr & Zarki, Kurose & Ross, Kermani.
Advertisements

DNS – Domain Name system Converting domain names to IP addresses since 1983.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
Domain Name System (or Service) (DNS) Computer Networks Computer Networks Term B10.
1 EEC-484/584 Computer Networks Lecture 5 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 5 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 5 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Domain Name System (or Service) (DNS) Computer Networks Computer Networks Spring 2012 Spring 2012.
EEC-484/584 Computer Networks Lecture 5 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
2: Application Layer1 FTP, SMTP and DNS. 2: Application Layer2 FTP: separate control, data connections r FTP client contacts FTP server at port 21, specifying.
EEC-484/584 Computer Networks Lecture 5 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts, routers: –IP address (32 bit) - used for addressing datagrams –“name”, e.g., gaia.cs.umass.edu.
EEC-484/584 Computer Networks Lecture 5 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
2: Application Layer1 Chapter 2 Application Layer Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
Application Layer session 1 TELE3118: Network Technologies Week 12: DNS Some slides have been taken from: r Computer Networking: A Top Down Approach.
CPSC 441: DNS1 Instructor: Anirban Mahanti Office: ICT Class Location: ICT 121 Lectures: MWF 12:00 – 12:50 Notes derived.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Name Resolution and DNS. Domain names and IP addresses r People prefer to use easy-to-remember names instead of IP addresses r Domain names are alphanumeric.
Chapter 2 Application Layer
2: Application Layer1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks.
CS 4396 Computer Networks Lab
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts: – IP address (32 bit) - used for addressing datagrams – “name”, e.g.,
DNS & P2P A PPLICATIONS د. عـــادل يوسف أبو القاسم.
Domain Name System (DNS)
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 10 Omar Meqdadi Department of Computer Science and Software Engineering University.
DNS. 2 DNS: Domain Name System DNS services Hostname to IP address translation Host aliasing – Canonical and alias names Mail server aliasing Load distribution.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
21-1 Last time □ Finish HTTP □ FTP This time □ SMTP ( ) □ DNS.
CS 471/571 Domain Name Server Slides from Kurose and Ross.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
DNS: Domain Name System
Review: –Which protocol is used to move messages around in the Internet? –Describe how a message is moved from the sender’s UA to the receiver’s.
1 DNS: Domain Name System People: many identifiers: m SSN, name, Passport # Internet hosts, routers: m IP address (32 bit) - used for addressing datagrams.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
DNS: Domain Name System People: many identifiers: – SSN, name, Passport # Internet hosts, routers: – IP address (32 bit) - used for addressing datagrams.
Lecture 6: Video Streaming 2-1. Outline  Network basics:  HTTP protocols  Studies on HTTP performance from different views:  Browser types [NSDI 2014]
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 04 PHILLIPA GILL, STONY BROOK UNIVERSITY ACKS: SLIDES BASED ON MATERIAL FROM NICK WEAVER’S PRESENTATION.
Naming and the DNS. Names and Addresses  Names are identifiers for objects/services (high level)  Addresses are locators for objects/services (low level)
DNS. 2 DNS: Domain Name System DNS services Hostname to IP address translation Host aliasing – Canonical and alias names Mail server aliasing Load distribution.
2: Application Layer1 DNS: Domain Name System People have many identifiers: SSN, name, passport number Internet hosts, routers have identifiers, too: IP.
CPSC 441: DNS 1. DNS: Domain Name System Internet hosts: m IP address (32 bit) - used for addressing datagrams m “name”, e.g., - used by.
CS 3830 Day 10 Introduction 1-1. Announcements r Quiz #2 this Friday r Program 2 posted yesterday 2: Application Layer 2.
Lecture 5: Web Continued 2-1. Outline  Network basics:  HTTP protocols  Studies on HTTP performance from different views:  Browser types [NSDI 2014]
1 EEC-484/584 Computer Networks Lecture 5 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer Networking book.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
1 Kyung Hee University Chapter 19 DNS (Domain Name System)
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
1. Internet hosts:  IP address (32 bit) - used for addressing datagrams  “name”, e.g., ww.yahoo.com - used by humans DNS: provides translation between.
Application Layer, 2.5 DNS 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
Important r On Friday, could you ask students to please me their groups (one per group) for Project 2 so we can assign IP addresses. I’ll send.
CSEN 404 Application Layer II Amr El Mougy Lamia Al Badrawy.
Spring 2006 CPE : Application Layer_DNS 1 Special Topics in Computer Engineering Application layer: Domain Name System Some of these Slides are.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Last time Finish HTTP FTP.
Introduction to Networks
Session 6 INST 346 Technologies, Infrastructure and Architecture
Chapter 9: Domain Name Servers
Introduction to Communication Networks
Chapter 7: Application layer
Cookies, Web Cache & DNS Dr. Adil Yousif.
EEC-484/584 Computer Networks
DNS: Domain Name System
FTP, SMTP and DNS 2: Application Layer.
Chapter 2 Application Layer
Lecture 3 – Chapter 2 CIS 5617, Fall 2019 Anduo Wang
Presentation transcript:

CIS3360: Security in Computing Chapter 6 : Network Security II Cliff Zou Spring 2012

DNS Introduction 2

 DNS introduction content is mainly from the reference book:  Computer Networking: A Top Down Approach Featuring the Internet, J. Kurose & K. Ross, Addison Wesley, 5th ed.,

4 DNS: Domain Name System People: many identifiers:  SSN, name, passport # Internet hosts, routers:  IP address (32 bit) – unique ID  “name”, e.g., - used by humans Q: How to map between IP addresses and name ? Domain Name System:  distributed database implemented in hierarchy of many name servers

5 DNS Why not centralize DNS?  single point of failure  traffic volume  distant centralized database  maintenance doesn’t scale! DNS services  Hostname to IP address translation  Host aliasing  Canonical and alias names  Many names for a single host  Mail server aliasing  Load distribution  Replicated Web servers: set of IP addresses for one canonical name

6 Root DNS Servers com DNS servers org DNS serversedu DNS servers ucf.edu DNS servers umass.edu DNS servers yahoo.com DNS servers amazon.com DNS servers pbs.org DNS servers Distributed, Hierarchical Database Client wants IP for 1 st approx:  Client queries a root server to find com DNS server  Client queries “com” DNS server to get amazon.com DNS server  Client queries amazon.com DNS server to get IP address for

7 DNS: Root name servers b USC-ISI Marina del Rey, CA l ICANN Los Angeles, CA e NASA Mt View, CA f Internet Software C. Palo Alto, CA (and 17 other locations) i Autonomica, Stockholm (plus 3 other locations) k RIPE London (also Amsterdam, Frankfurt) m WIDE Tokyo a Verisign, Dulles, VA c Cogent, Herndon, VA (also Los Angeles) d U Maryland College Park, MD g US DoD Vienna, VA h ARL Aberdeen, MD j Verisign, ( 11 locations) 13 root name servers worldwide

8 TLD and Authoritative Servers  Top-level domain (TLD) servers: responsible for com, org, net, edu, etc, and all top-level country domains uk, fr, ca, jp.  Network solutions maintains servers for com TLD  Educause for edu TLD  Authoritative DNS servers: organization’s DNS servers, providing authoritative hostname to IP mappings for organization’s servers (e.g., Web and mail).  Can be maintained by organization or service provider (paid by the organization)

9 Local Name Server  Does not strictly belong to hierarchy  Each ISP (residential ISP, company, university) has one  Also called “default name server”  When a host makes a DNS query, query is sent to its local DNS server  Acts as a proxy (cache), forwards query into hierarchy

10 requesting host cis.poly.edu gaia.cs.umass.edu root DNS server local DNS server dns.poly.edu authoritative DNS server dns.cs.umass.edu 7 8 TLD DNS server Iterative and Recursive queries  Host at cis.poly.edu wants IP address for gaia.cs.umass.edu  The query to root DNS rarely happens due to cache of all TLD DNS information at local DNS server recursive iterative

11 requesting host cis.poly.edu gaia.cs.umass.edu root DNS server local DNS server dns.poly.edu authoritative DNS server dns.cs.umass.edu 7 8 TLD DNS server 3 Recursive queries recursive query: DNS client requires DNS server respond with either the requested resource record, or an error message stating that the record or domain name does not exist. iterative query: contacted server replies with name of server to contact “I don’t know this name, but ask this server” Reference:

12 DNS: caching and updating records  once (any) name server learns mapping, it caches mapping  cache entries timeout (disappear) after some time (keep fresh copy)  TLD servers typically cached in local name servers  Thus root name servers not often visited

13 DNS records DNS: distributed db storing Resource Records (RR) Type=NS  name is domain (e.g. foo.com)  value is IP address of authoritative DNS server for this domain RR format: (name, value, type, ttl) Type=A  name is hostname  value is IP address Type=CNAME  name is alias name for some “canonical” (the real) name is really servereast.backup2.ibm.com  value is canonical name Type=MX  value is name of mailserver associated with name

14 DNS protocol, messages DNS protocol : query and reply messages, both with same message format msg header identification: 16 bit # for query, reply to query uses same # flags:  query or reply  recursion desired  recursion available  reply is authoritative

15 DNS protocol, messages (UDP 53) Name, type fields for a query RRs in response to query records for authoritative servers additional “helpful” info that may be used

 Let’s check a web example using Wireshark!  Check MX record:  nslookup –type=MX cs.ucf.edu (Under Windows)  dig mx cs.ucf.edu (Under Unix) 16

2: Application Layer 17 Inserting records into DNS  Example: just created startup “Network Utopia”  Register name networkuptopia.com at a registrar (e.g., Network Solutions)  Need to provide registrar with names and IP addresses of your authoritative name server (primary and secondary)  Registrar inserts two RRs into the com TLD server: (networkutopia.com, dns1.networkutopia.com, NS) (dns1.networkutopia.com, , A)  Put in authoritative server dns1.networkutopia.com  Type A record for  Type CName for networkuptopia.com (alias)  Type MX record for networkutopia.com ( )  Type A record for the server  How do people get the IP address of your Web site?

DNS Security 18

Cybersquatting  Cybersquatting is to register a domain in anticipation of that domain being desirable to another organization  Intent to sell tot hat organization for big profit  For example, You can register “hurricane2013.com”, or “hurricane-in-Texas.com” if you think there will be a big one in Texas in the near future.  Sell it for big profit if it is true!  Domain name purchase is cheap!  Many organizations have to buy all related domain names to prevent cybersquatting  A legitimate example:  suspicious ones for tea party: party.com/ party.com/ 

Typosquatting  Register all possible typo domain names for another organization  Should a user accidentally enters an incorrect website address, he may be led to an alternative website owned by a cybersquatter.  Could lead to phishing attack (malicious), or increase web visits (not very malicious)  For example, for “bankofamerica.com”, a cybersquatter could register:  “bankamerica.com”, “bankoamerica.com”, “bankofamerican.com”, “bankfoamerica.com”, ……  Domain name purchase is cheap! 20

OS DNS Cache Privacy  Windows OS maintain a local DNS cache  Command “ipconfig/displaydns”  DNS cache reveals a user’s browsing history  Even if the user deletes browsing cache and cookies  Internet Explorer does not have its own DNS cache  Cross-platform browser, such as Firefox, has its own DNS cache 21

DNS Vulnerability  Most DNS queries and responses are in plaintext  No authentication is done for DNS response  You really has no good way to tell if the DNS response you get are trustable or not!  DNS is mostly relying on UDP packets  IP address spoofing is very easy for UDP packets  No seq/ack numbers 22

DNS Cache Poisoning Basic idea: give DNS servers false records and get it cached DNS uses a 16-bit request identifier to pair queries with answers Cache may be poisoned when a name server: – Disregards identifiers – Has predictable ids – Accepts unsolicited DNS records

DNS Cache Poisoning Procedure  Eve wants to poison attack an ISP DNS server  Eve transmits a DNS query to this server, which in turn queries authoritative DNS on behalf of Eve  Eve simultaneously sends a DNS response to the server, spoofing with the authoritative server’s IP  The ISP’s DNS server accepts the forged response and caches a wrong DNS entry  All downstream users of this ISP will be directed to the wrong website 24

DNS Cache Poisoning Prevention Use random identifiers for queries Make it hard to guess the ID number Always check identifiers Port randomization for DNS requests Deploy DNSSEC – Challenging because it is still being deployed and requires reciprocity

DNS Cache Poisoning against Query ID  Even if a DNS server checks response IDs and use random IDs, it is still vulnerable to the attack  Attacker generates a flux of DNS requests and send the corresponding flux of DNS response back  If one of the pair has matched ID, the attack is successful  Birthday Paradox: the prob. Of two persons in 23 people share the same birthday is more than 50%! 26

Some Defenses  Fact: Most DNS poisoning target local DNS (LDNS) server  Solution: Configure LDNS to only accept requests from internal networks  Why does it need to server outside users?  Source-port randomization (SPR)  DNS query sent out will have two randomized numbers:  Source port number (destination port always 53)  Query ID number (16 bits)  Check DNS response for both of these numbers 27

DNSSEC Guarantees: – Authenticity of DNS answer origin – Integrity of reply – Authenticity of denial of existence Accomplishes this by signing DNS replies at each step of the way Uses public-key cryptography to sign responses Typically use trust anchors, entries in the OS to bootstrap the process

DNS Signing Hard-coded with TLD’s public keys TLDs serve as Certificate Authority

DNSSEC Deployment As the internet becomes regarded as critical infrastructure there is a push to secure DNS NIST is in the process of deploying it on root servers now May add considerable load to dns servers with packet sizes considerably larger than 512 byte size of UDP packets There are political concerns with the US controlling the root level of DNS