TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)

Slides:



Advertisements
Similar presentations
Review iClickers. Ch 1: The Importance of DNS Security.
Advertisements

Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Web Server Administration
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Domain Name System. DNS is a client/server protocol which provides Name to IP Address Resolution.
1 Internet Networking Spring 2006 Tutorial 8 DNS and DHCP as UDP applications.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
1 DNS. 2 BIND DNS –Resolve names to IP address –Resolve IP address to names (reverse DNS) BIND –Berkeley Internet Name Domain system Version 4 is still.
Domain Name System (DNS) Network Information Center (NIC) : HOSTS.TXT.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Domain Name System ( DNS )  DNS is the system that provides name to address mapping for the internet.
Module 12: Domain Name System (DNS)
DNS Domain Name Service References: Wikipedia 1.
Domain Name Services Oakton Community College CIS 238.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks.
DNS and Active Directory Integration
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts: – IP address (32 bit) - used for addressing datagrams – “name”, e.g.,
Name Resolution Domain Name System.
Chapter 16 – DNS. DNS Domain Name Service This service allows client machines to resolve computer names (domain names) to IP addresses DNS works at the.
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 17 Domain Name System (DNS)
DNS: Domain Name System
1 DNS: Domain Name System People: many identifiers: m SSN, name, Passport # Internet hosts, routers: m IP address (32 bit) - used for addressing datagrams.
October 15, 2002Serguei A. Mokhov, 1 Intro to DNS SOEN321 - Information Systems Security.
Chapter 17 Domain Name System
1 Application Layer Lecture 6 Imran Ahmed University of Management & Technology.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 6: Name Resolution.
Domain Name System CH 25 Aseel Alturki
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Deploying a Web Application Presented By: Muhammad Naveed Date:
Naming March 8, Networks What is naming?  Associations between some elements in a set of names and some elements in a set of values  Binding.
1 Kyung Hee University Chapter 18 Domain Name System.
CPSC 441: DNS 1. DNS: Domain Name System Internet hosts: m IP address (32 bit) - used for addressing datagrams m “name”, e.g., - used by.
Configuring Name Resolution and Additional Services Lesson 12.
Domain Name System (DNS). DNS Server Service Overview of Domain Name System What Is a Domain Namespace? Standards for DNS Naming.
1 Domain Name System (DNS). 2 3 How DNS Works Application Transport Internet Network Application Transport Internet Network DNS Resolver Name Server.
1 Internet Network Services. 2 Module - Internet Network Services ♦ Overview This module focuses on configuring and customizing the servers on the network.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
DNS DNS overview DNS operation DNS zones. DNS Overview Name to IP address lookup service based on Domain Names Some DNS servers hold name and address.
CIS 192B – Lesson 2 Domain Name System. CIS 192B – Lesson 2 Types of Services Infrastructure –DHCP, DNS, NIS, AD, TIME Intranet –SSH, NFS, SAMBA Internet.
Linux Operations and Administration
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
4343 X2 – Outline The Domain Name System The Web.
Web Server Administration Chapter 4 Name Resolution.
1 CMPT 471 Networking II DNS © Janice Regan,
OPTION section It is the first section of the named.conf User can use only one option statement and many option-value pair under the section. Syntax is.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
Internet Naming Service: DNS* Chapter 5. The Name Space The name space is the structure of the DNS database –An inverted tree with the root node at the.
WHAT IS DNS??????????.
4343 X2 – The Application Layer Tanenbaum Chapter 7.
Domain Name System DPNM Lab. Seongho Cho
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
Security Issues with Domain Name Systems
Domain Name System (DNS)
Networking Applications
Module 5: Resolving Host Names by Using Domain Name System (DNS)
DNS Security Issues SeongHo Cho DPNM Lab., POSTECH
IMPLEMENTING NAME RESOLUTION USING DNS
Configuring and Troubleshooting DNS
LINUX ADMINISTRATION 1
Chapter 19 Domain Name System (DNS)
Domain Name System (DNS)
A New Approach to DNS Security (DNSSEC)
NET 536 Network Security Lecture 8: DNS Security
NET 536 Network Security Lecture 6: DNS Security
Presentation transcript:

TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)

TELE 301 Lecture 11: DNS 2 Problem How to get the IP address given an Internet name? –Mapping between IP addresses and IP names Simple solution –Central database Domain Name Service (DNS) –A distributed solution

TELE 301 Lecture 11: DNS 3 How DNS works? The name space is divided into zones –At least one server in each zone –Zones are /(root), net, org, nz –Can have sub-zones in a zone, e.g. co.nz The servers in a zone are responsible for answering queries about the zone Zones are organized hierarchically so that servers of a zone can be traced from /(root) servers

TELE 301 Lecture 11: DNS 4

TELE 301 Lecture 11: DNS 5 DNS clients The DNS clients use the resolver library –Resolver is a collection of C functions. The central routines are gethostbyname and gethostbyaddr Client queries are divided into two kinds –Recursive: get the final answer of the query –Iterative: may get redirected to another server There are two important files used by those routines: host.conf and nsswitch.conf

TELE 301 Lecture 11: DNS 6 DNS clients (cont.) –/etc/host.conf: used by older Linux standard library libc Order: use hosts file, or dns or nis Multi: allow to have several IP addresses for a host in /etc/hosts Nospoof: check for spoofing Alert: syslog for spoofing –/etc/nsswitch.conf: used by GNU standard library glibc Can specify the order of how to retrieve each info field such as hosts and networks The retrieve methods are dns, nis, files, etc

TELE 301 Lecture 11: DNS 7 DNS servers Types of servers –Primary (master) server: data is stored in authoritative source files and maintained by system administrators –Secondary (slave) server: mirrors the data in the primary server and downloads its data second-hand from a primary server at regular intervals The name servers are specified in the file resolv.conf

TELE 301 Lecture 11: DNS 8 DNS servers (cont.) To configure a name server, there are several important files –/etc/named.conf: specify where to find files for lookups and reverse lookups at the local domain, where to forward requests for outside of the domain –Database files for each local domain and local subnets Often under pz or sz, but not required Get a template to create them –named.cache or named.root Contains the names of root servers The name server needs them when a request is out of its knowledge To start up name server simply type –/usr/sbin/named

TELE 301 Lecture 11: DNS 9 Resource record Resource record format for named server –Domain [ttl] [class] type data –Domain: to which domain this entry applies –ttl: force resolvers to discard info after a certain time –Class: IN for IP addresses (Internet) –Record type: A, SOA, PTR, NS, and MX –Data: depends on type Best practices –Set proper ttl field for RR –Create PTR records (reverse records) for verifying IP addresses with IP names

TELE 301 Lecture 11: DNS 10 RR types Types of records in DNS database –SOA: indicates the start of authority for this domain –NS: lists a name server for this domain or sub-domain –MX: lists a mail exchanger for this domain with priority –A: defines the canonical name of a host with a given IP address –CNAME: associates an alias with a canonical name –PTR: for reverse lookup (IP address to name) –HINFO: advertises host info, CPU and OS –TXT: description

TELE 301 Lecture 11: DNS 11 Advanced features Delegation of sub-zones –Forward requests to servers in sub-domains –Needs to specify a server for each sub-domain Query forwarding Remote control of name server –rndc: talk with named through a TCP connection

TELE 301 Lecture 11: DNS 12 Security issues DNS cache poisoning –The attacker sends DNS queries to the victim’s DNS server and guesses the proper reply ID of the server –The attacker then forges a reply and sends to the victim –The attacker causes the victim to send a query. Since the forged reply is already there the victim puts the forged answer into its cache. Therefore, the cache is poisoned –The attacker can take advantage of the poisoned cache to impersonate a trusted host.

TELE 301 Lecture 11: DNS 13 DNS cache poisoning

TELE 301 Lecture 11: DNS 14 Other forms of DNS cache poisoning Request: what are the address records for subdomain.attacker.example? Attacker's response: –Answer: (no response) Authority section: attacker.example IN NS ns.kiwi_bank.co.nz. Additional section: ns.kiwi_bank.co.nz. IN A w.x.y.z (an IP address controlled by the attacker) A vulnerable server would cache the additional A-record (IP address) for ns.kiwi_bank.co.nz, allowing the attacker to resolve queries to the entire kiwi_bank.co.nz domain.

TELE 301 Lecture 11: DNS 15 Bit-squatting At Black Hat 2011, Artem Dinaburg introduced a “bit-squatting” attack against DNS where an attacker registers new domain names that differ by one bit from popular ones, in order to collect traffic intended for those names when bit errors occur during communications or storage. DNSSEC has begun to be established as a mechanism for securing information distributed in DNS records. The new DANE protocol being developed in the IETF leverages DNSSEC to enable a domain name owner to inform relying parties which certificates and certificate authorities it trusts.

TELE 301 Lecture 11: DNS 16 Security issues (cont.) DNS-SEC: DNS Security Extensions –origin authentication of DNS data –data integrity –authenticated denial of existence –No confidentiality of data (no encryption) –No protection against DDoS (Distributed Denial of Service) DNS-TSIG –Secret Key Transaction Authentication for DNS

TELE 301 Lecture 11: DNS 17 Other issue Should the names be English? –Internationalised Domain Names (IDNs)