Written By: David Dagon Manos Antonakakis Paul Vixie Georgia Institute of Georgia Institute ofInternet Systems. Technology Technology Consortium Wenke.

Slides:



Advertisements
Similar presentations
Module 4: Configuring a Client for Name Resolution
Advertisements

Chapter 16. Windows Internet Name Service(WINS) Network Basic Input/Output System (NetBIOS) N etBIOS over TCP/IP (NetBT) provides commands and support.
INTERNET PROTOCOLS Class 9 CSCI 6433 David C. Roberts Entire contents copyright 2011, David C. Roberts, all rights reserved.
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Implementing Domain Name System
Presented by: Syed Nasir Mehdi PhD Computer Science and Engineering Biocom Lab hanyang.ac.kr 1 INCREASED DNS FORGERY RESISTANCE THROUGH 0X20.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 2: Name Resolution and DNS.
Application Layer At long last we can ask the question - how does the user interface with the network?
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Domain Name System: DNS
DNS Security Extensions (DNSSEC) Ryan Dearing. Topics History What is DNS? DNS Stats Security DNSSEC DNSSEC Validation Deployment.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Domain Name System ( DNS )  DNS is the system that provides name to address mapping for the internet.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
DNS. Outline r Domain Name System r DNS Hierarchy r Resolution.
Chapter 25 Domain Name System
The Domain Name System Presented by: Baolan Bo Bo Liangzhen LiangzhenShuguangWeihuaYujun Instructor: Dr. Sharon P. Hall.
Ch25 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
Unicode, character sets, and a a little history. Historical Perspective First came EBCIDIC (6 Bits?) Then in the early 1960s came ASCII – Most computers.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
CS426Fall 2010/Lecture 341 Computer Security CS 426 Lecture 34 DNS Security.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Ch-9: NAME SERVICES By Srinivasa R. Gudipati. To be discussed.. Fundamentals of Naming Services Naming Resolution The Domain Name System (DNS) Directory.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
IIT Indore © Neminath Hubballi
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 17 Domain Name System (DNS)
CS526Topic 19: DNS Security1 Information Security CS 526 Topic 19: DNS Security.
Domain names and IP addresses Resolver and name server DNS Name hierarchy Domain name system Domain names Top-level domains Hierarchy of name servers.
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Network Protocols Chapter 25 (Data Communication & Networking Book): Domain Name System (DNS) 1.
Chapter 17 Domain Name System
Paper Presentation – CAP Page 2 Outline Review - DNS Proposed Solution Simulation Results / Evaluation Discussion.
Chapter 29 Domain Name System (DNS) Allows users to reference computer names via symbolic names translates symbolic host names into associated IP addresses.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
Domain Name System CH 25 Aseel Alturki
Domain Name Registration Presented By: Jessica Bradley David Cunningham John Morrison.
1 Kyung Hee University Chapter 18 Domain Name System.
Domain Name System (DNS). DNS Server Service Overview of Domain Name System What Is a Domain Namespace? Standards for DNS Naming.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
Agenda Character representation Numerical Conversions ASCII EBCDIC
Mapping IP Addresses to Hardware Addresses Chapter 5.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 18 Windows Internet Name Service (WINS)
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
Internet Naming Service: DNS* Chapter 5. The Name Space The name space is the structure of the DNS database –An inverted tree with the root node at the.
Domain Name System INTRODUCTION to Eng. Yasser Al-eimad
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
THE DOMAIN NAME SYSTEM AS AN ADDRESS DIRECTORY FOR THE WORLDWIDE WEB. 1.
MAN-IN-THE-MIDDLE ATTACK STEGANOGRAPHY Lab# MAC Addresses and ARP  32-bit IP address:  network-layer address  used to get datagram to destination.
Domain Name System: DNS To identify an entity, TCP/IP protocols use the IP address, which uniquely identifies the Connection of a host to the Internet.
Understand Names Resolution
Chapter 25 Domain Name System.
Module 5: Resolving Host Names by Using Domain Name System (DNS)
IMPLEMENTING NAME RESOLUTION USING DNS
Net 323 D: Networks Protocols
Chapter 19 Domain Name System (DNS)
Subject Name: Computer Communication Networks Subject Code: 10EC71
NET 536 Network Security Lecture 8: DNS Security
Chapter 25 Domain Name System
NET 536 Network Security Lecture 6: DNS Security
Chapter 25 Domain Name System
Domain Name System: DNS
COMPUTER NETWORKS PRESENTATION
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Presentation transcript:

Written By: David Dagon Manos Antonakakis Paul Vixie Georgia Institute of Georgia Institute ofInternet Systems. Technology Technology Consortium Wenke Lee Tatuya Jinmei Presented By: Georgia Institute of Internet Systems Consortium Jarrod Williams Technology

 Overview  Domain Name System(DNS)  0x20 Bit Encoding  Conclusion

 DNS labels, matching, and the resolution process are all case insensitive  DNS query strings can have the alphabetical characters switched between lower case and upper by adding 0x20 or subtracting 0x20  Using different capitalization schemes DNS queries can be made unique and more resistant to DNS poisoning attacks

 Domain Name Field Value ◦ Uppercase = 0, Lowercase = 1    

 No radical changes  Protocol Stability  Backward Compatible  To protect the recursive resolver in its transaction with the authority servers

 Overview  Domain Name System(DNS)  0x20 Bit Encoding  Conclusion

 is a hierarchical naming system for computers, services, and any other resource participating on the internet to associate various information with domain names  DNS initiators on host machines are called stub resolvers

 Each domain is a node  Each zone consist of many nodes  Each node can have a subzone  DNS authority servers are sometimes called the SOA or Start of Authority.

 First, the stub resolver sends the query to the recursive server  Next, the recursive resolver consults with the root servers  Then the recursive server will consult with the “.com” zone authority servers  Finally, the answer is returned to the stub resolver, and cached by the recursive resolver to assist in future resolutions.

 Is a maliciously created or unintended situation that provides data to a Domain Name Server that did not originate from authoritative DNS sources  Attackers exploit DNS software by making it accept incorrect information and if the DNS response to the server is not accurately validated, it will end up caching the incorrect entries locally and serve them to users that make the same request

 Overview  Domain Name System(DNS)  0x20 Bit Encoding  Conclusion

 A DNS query is not copied into memory, it is rewritten just as it arrives over the wire  Almost all authority DNS servers preserve the case encoding of DNS queries, bit-for-bit, as they are presented by the recursive server  A pattern of mixed case encoding of domain names, make unique transactions between DNS initiators and responders and provides an additional means to track messages between servers

 A domain name input arrives as an answer from a server, or a query from a stub resolver  Transform the query field into a canonical format  Use a chosen encryption scheme to encrypt the canonical query  Bits are read in sequential fashion one byte at a time and all “0x20 capable” characters are encoded

 if the jth bit is 0, make the i query character upper case (i.e., buff[i] |= 0x20)  if the jth bit is 1, make the i query character lower case(i.e., buff[i] &= 0x20)  This produces a 0x20-encoded domain name that can be sent to an authority server, it can also be used to verify the query field returned by an authority server.

 0x20 capable character is a letter character on the ASCII table in hexadecimal format  American Standard Code for Information Interchange (ASCII)  The range is: ◦ A…Z 0x41 – 0x5A ◦ a…z 0x61 – 0x7A

 - 6, 0x20 capable characters ◦ 6 bit key length ◦ 2 6 = 64 unique combinations  - 5, 0x20 capable character ◦ 5 bit key length ◦ 2 5 = 32  – 18, 0x20 capable characters ◦ 18 bit key length ◦ 2 18 = 262,144

 Authority servers were checked for proper preservation and support of 0x20 encoding  For 3 weeks authority servers listed in the.com and.net zones were targeted  Yielding 75 million server names on average and 7 million probed queries, spread across every DNS server listed in these zones

 99.7% of all DNS servers studied could support DNS 0x20 encoding scheme without changing their code base  0.3% of the servers tended to display a failure to preserve DNS 0x20 encodings under very high query volumes  There is a high confidence in DNS bit encoding under high query volume

 Overview  Domain Name System(DNS)  0x20 Bit Encoding  Conclusion

 DNS poisoning attacks present a persistent, and ongoing threat to the Internet’s critical infrastructure  0x20 bit encoding makes an attackers job more difficult and makes the DNS server more resistant to attack, not impenetrable  This solution provides little over-head on the recursive server so performance is not sacrificed

 It is a light weight and practical improvement to DNS security  It does not require a radical restructure of the DNS infrastructure, and can be adopted unilaterally by recursive servers  Immediate improvement of DNS security and it does not require a community effort

 Focuses only on recursive DNS servers  The encoding does not provide strong guarantees for transaction integrity.  Encoding length is restricted to domain name capable characters only

 Explain in more detail how the keys would be managed  Investigate a way to expand DNS key length so keys are not limited to domain name capable characters only

    