DNS Security Pacific IT Pros Nov. 5, 2013. Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.

Slides:



Advertisements
Similar presentations
Review iClickers. Ch 1: The Importance of DNS Security.
Advertisements

Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
SCADA Security, DNS Phishing
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
ITIS 6167/8167: Network and Information Security Weichao Wang.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
Network Attacks. Network Trust Issues – TCP Congestion control – IP Src Spoofing – Wireless transmission Denial of Service Attacks – TCP-SYN – Name Servers.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Introduction to Honeypot, Botnet, and Security Measurement
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Welcome Today Our Topics are: DNS (The Potential Problem for Complete Anonymity) Transparent DNS Proxy (The Problem & The Solution) How To.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
CSUF Chapter 6 1. Computer Networks: Domain Name System 2.
IIT Indore © Neminath Hubballi
1 DNS: Domain Name System People: many identifiers: m SSN, name, Passport # Internet hosts, routers: m IP address (32 bit) - used for addressing datagrams.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
October 15, 2002Serguei A. Mokhov, 1 Intro to DNS SOEN321 - Information Systems Security.
Final Introduction ---- Web Security, DDoS, others
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
Domain Name System CH 25 Aseel Alturki
CIS 450 – Network Security Chapter 3 – Information Gathering.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering & Firewalls. Stateless Packet Filtering Assume We can classify a “good” packet and/or a “bad packet” Each rule can examine that single.
DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor Craig Shue
TODAY & TOMORROW DAY 2 - GROUP 5 PRESENTED BY: JAMES SPEIRS CHARLES HIGBY BRADY REDFEARN Domain Name System (DNS)
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
* Agenda  What is the DNS ?  Poisoning the cache  Short term solution  Long term solution.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
DNS Cache Poisoning. History 1993 – DNS protocol allowed attacker to inject false data which was then cached 1997 – BIND 16-bit transaction ids not randomized,
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
RFC 3964 Security Considerations for 6to4 Speaker: Chungyi Wang Adviser: Quincy Wu Date:
DNS Cache Poisoning – The Next Generation by Joe Stewart, GCIH Presented by Stephen Karg CS510, Advanced Security Portland State University Oct. 24, 2005.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Ch 2. Application Layer Myungchul Kim
THE LARGEST NAME SERVICE ACTING AS A PHONE BOOK FOR THE INTERNET The Domain Name System click here to next page 1.
Internet infrastructure 1. Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing.
Denial-of-Service Attacks
© 2013 Infoblox Inc. All Rights Reserved. Paul UKNOF 26 – 13 Sep 2013, London Paul Ebersman.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
An Introduction To ARP Spoofing & Other Attacks
Security Issues with Domain Name Systems
DNS Operation And Security Protection
DNS Cache Poisoning Attack
DNS security.
Chapter 19 Domain Name System (DNS)
Network Security: DNS Spoofing, SQL Injection, ARP Poisoning
NET 536 Network Security Lecture 8: DNS Security
Chapter 25 Domain Name System
NET 536 Network Security Lecture 6: DNS Security
Chapter 25 Domain Name System
Domain Name System: DNS
Presentation transcript:

DNS Security Pacific IT Pros Nov. 5, 2013

Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage of Internal Information Domain Name Hijacking Typosquatting

DNS is Essential Without DNS, no one can use domain names like ccsf.edu Almost every Internet communication begins with a DNS resolution

Normal DNS Function

Root.com.net.edulocal DNS Delegation Servers cache content

Recursive DNS Query

Demo Resolving a domain through a Windows DNS server 238 packets, 4.3 sec – hills.ccsf.edu

Linux DNS Server 10 packets, 1 sec. – Windows client – nslookup hills.ccsf.edu

Over 3000 packets and 4 minutes for – hills.ccsf.edu +trace Linux used 317 packets and 2 seconds

DoS Attacks on DNS Servers

2007 Attack on DNS Root Six root servers attacked from Asia Volume 1 Gbps per server, bogus DNS requests Only two were affected, because they did not yet have Anycast configured Anycast allows one IP address to be shared by many different servers – Traffic automatically goes to closest working serer via BGP – Link Ch 1e

2007 Attack on DNS Root

DoS Attacks by DNS Servers

DNS Amplification Find a domain name that gives a large response Also called "DRDoS Attack" (Distributed Reflection and Amplification Denial of Service) Attacker Target DNS Server DNS Queries Source IP: Target DNS Responses Destination IP: Target Target is attacking me! DNS Server is attacking me!

dig any yahoo.com

Request: 69 bytes Reply: 379 bytes Amplification: 5.5 x

dig any ietf.org Large DNSSEC signatures

dig any ietf.org Request: 28 bytes (+66 header) Reply: 4183 bytes (+ headers) Amplification: 45 x (but via TCP)

Extension Mechanisms for DNS (EDNS) Allows transmission of larger packets via UDP Normal max. is 512 bytes This extends it to larger values, such as 4096 Essential for DNSSEC efficiency, but will make DNS amplification much more powerful – Link Ch 1k

Failure to Restrict Access Recursive DNS servers should only accept queries from your own clients – Block outside addresses with access control lists

Open Resolver Project Link Ch 3b

Testing CCSF's DNS Servers dig ns ccsf.edu shows 6 servers – ns5.cenic.org CLOSED – ns4.cenic.org CLOSED – rudra3.ccsf.cc.ca.us CLOSED – ns6.cenic.org CLOSED – ns1.csu.net OPEN – ns3.csu.net OPEN

Poisoning DNS Records

Changed local DNS server address – Link Ch 1h

DNS Cache Poisoning Malicious altering of cache records redirects traffic for users of that server 2005 attack redirected traffic for more than 1000 companies – Link Ch 1g, from 2005

DNS Cache Poisoning A false response that tricks the client puts a false entry into its cache

DNS Cache Poisoning Attacker DNS Resolver Target Where is is at Where is is at

Kaminsky DNS Vulnerability Serious vulnerability in 2008 Allowed poisoning caches on many servers Patched before it was widely exploited – Link Ch 1h

Link Ch 3f

Link Ch 3g

Consequences of the Kaminsky Attack Attack can be placed in a Web page – Many img tags – – etc. If one Comcast customer views that page, all other Comcast customers will be sent to the fake paypal.com Poisoning can take as few as 10 seconds

DEMO

Source Port Randomization This was patched in Windows Server 2008 Good video Link Ch 3e

Randomness of Transaction ID Each DNS query and response has a TXID field – 16 bits long (65,536 possible values) – Should be random Bind 8 & 9 used predictable transaction IDs – So only ten guesses were needed to spoof the reply

Randomness of Transaction ID

DNS Traffic as a Gauge of Malicious Activity

DNS Monitoring Infected machines often make many DNS queries Spam relays make DNS requests to find addresses of mail servers Botnets often make many DNS requests to obscure domains

Conficker Worm Domains Algorithm made 50,000 new domains per day Registrars tried to block them all – Links Ch 1u, 1v

From Link Ch 1q Bots Normal Traffic Requests per hour

Blocking DNS Resolution for Known Malicious Domains

OpenDNS Anycast for reliability Reports of DNS activity for management Blocks malicious servers Can enforce other rules like Parental Controls

Leakage of Internal Information

Exposure of Internal Information Only public Web-facing servers should be in the external DNS zone files Your DNS server is a target of attack and may be compromised

Leakage of Internal Queries to the Internet Some Windows DHCP clients leak dynamic DNS updates to the Internet – Link Ch 3a

Windows Versions These packets were sent from Windows 2000, Windows XP, and Server 2003 – When tested in 2006 To prevent this, configure local DNS servers not to refer internal machines to external name servers – And block DNS requests directly to the Internet

Dynamic DNS Registration Stupid Requests

AS 112: RFC 6304 Special autonomous system set up just to handle these stupid queries

RFC 6305

Domain Name Hijacking

DNS Registrars Registrar connects your domain name to its authoritative servers (SOA) Changing that data hijacks your domain

NY Times Rapid7

Defense: Registry Locks "Test of Domain Locking" In "Domain Name Hijacking" section

Typosquatting

Doppelganger domains are spelled almost identically to legitimate domains – seibm.com – instead of – se.ibm.com (IBM's division in Sweden)