SPF/Sender-ID DNS & DDoS Threats Operations Analysis and Research Center for the Internet Douglas Otis November 3, 2007

Slides:



Advertisements
Similar presentations
1 Eloqua Providing Industry-Leading Management Tools May 2009.
Advertisements

Eloqua Providing Industry-Leading Management Tools.
Review iClickers. Ch 1: The Importance of DNS Security.
IP Warming Overview and Implementation Using Eloqua.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
DNSOP WG IETF-67 SPF/Sender-ID DNS & Internet Threat Douglas Otis
DKIM WG IETF-67 DKIM Originating Signing Policy Douglas Otis
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Sender policy framework. Note: is a good reference source for SPFhttp://
Series DATA MANAGEMENT. 1 Why ? Alarm/Status Notification –Remote unattended sites »Pumping stations –Pharmaceutical/Plant maintenance.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
© Copyright MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Spam Reduction Techniques Using greylisting and SpamAssassin.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Implementing High Availability
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Identity Based Sender Authentication for Spam Mitigation Sufian Hameed (FAST-NUCES) Tobias Kloht (University of Goetingen) Xiaoming Fu (University.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Welcome Today Our Topics are: DNS (The Potential Problem for Complete Anonymity) Transparent DNS Proxy (The Problem & The Solution) How To.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
IIT Indore © Neminath Hubballi
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Wireless and Security CSCI 5857: Encoding and Encryption.
DNS-based Message-Transit Authentication Techniques D. Crocker Brandenburg InternetWorking D. Crocker Brandenburg InternetWorking.
Defending DKIM IETF 65 Threats and Strategies Douglas Otis
October 15, 2002Serguei A. Mokhov, 1 Intro to DNS SOEN321 - Information Systems Security.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
A Trust Overlay for Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Packet Filtering & Firewalls. Stateless Packet Filtering Assume We can classify a “good” packet and/or a “bad packet” Each rule can examine that single.
| imodules.com Marketing Renovation Andrea Ganier and Josh Bourdon.
IETF 65, Dallas, TX1 Introduction to SSP Jim Fenton 22 March 2006.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
FCC CSRIC III Working Group 5 DNSSEC Implementation Practices Steve Crocker CEO, Shinkuro, Inc. March 6, 2013 Working Group 5: DNSSEC.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
SIMPLE MAIL TRANSFER PROTOCOL. Introduction Simple Mail Transfer Protocol is the standard protocol on the Internet and part of the TCP/IP protocol.
SPF/Sender-ID DNS & DDoS Threats Internet Security Operations and Intelligence II Douglas Otis
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
Sender policy framework. Note: is a good reference source for SPFhttp://
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Fall 2006CS 395: Computer Security1 Key Management.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
ADDRESS INTERNATIONALIZATION ( EAI ) ICANN-55 Mar 06, 2016 TF-AIDN Member 35+ Min : 10- Min ( Q & A )
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
sender policy framework
Sender ID: An Overview for Registrars ICANN Vancouver December 1, 2005
NET 536 Network Security Lecture 8: DNS Security
Slides Credit: Sogand Sadrhaghighi
Wireless Spoofing Attacks on Mobile Devices
How We Fight Against Scam
Presentation transcript:

SPF/Sender-ID DNS & DDoS Threats Operations Analysis and Research Center for the Internet Douglas Otis November 3,

Copyright Trend Micro Inc. 2 How SPF/Sender-ID uses DNS SPF/Sender-ID first passes initial parameters to a script parser SPF/Sender-ID stores scripts in TXT (16) or SPF (99) RRs SPF scripts might chain as many as 11 RRs using Redirect, Include, & Exp script based macro-expanded mechanisms SPF scripts may also contain any number of IPv4 or IPv6 inclusionary or exclusionary addresses using CIDR notation Each chained set may contain 10 macro-expanded mechanisms with domain name & CIDR overlays Mechanisms may also subsequently resolve A, AAAA, MX, r-PTR or test the existence of A or AAAA using the Exist macro Mechanisms for MX or r-PTR may require 10 additional DNS transactions each. (10 x 10 = 100)‏

Copyright Trend Micro Inc. 3 Initial parameters supplied to SPF scripts IP Address of SMTP client EHLO host-name (when not for Sender-ID) MAIL FROM -address (when not for Sender-ID)‏ Sender-ID replaces MAIL FROM with either: –RFC 2822 Resent-Sender -address –RFC 2822 Resent-From -address –RFC 2822 Sender -address –RFC 2822 From -address Some propose also checking DKIM domains to limit possible signature replay abuse

Copyright Trend Micro Inc. 4 Label Components created from SPF Macros %{symbol | rev-label-seq | # of right-most labels | chars-into-“.” } rev-label-seq = “r” chars-into-“.” = “-” | “+” | “,” | “/” | “_” | “=” # of right-most labels = symbols = s = -address or EHLO (initial parameter)‏ l = left-hand side -address (initial parameter)‏ o = right-hand side of -address (initial parameter)‏ d = -address domain or EHLO (initial parameter)‏ i = SMTP client IP addr decimal octet labels (initial parameter)‏ p = r-PTR domain with IP addr validated (not initial parameter)‏ v = "in-addr" IPv4, or "ip6" if IPv6 (auto generated)‏ h = EHLO host-name (initial parameter)‏

Copyright Trend Micro Inc. 5 Estimating SPF exploit risks A cached SPF record can leverage local-parts of a spam campaign that repeat beyond the negative caching period DNS amplification would be 10:1 until the sequence is beyond the negative caching period, at which point the attack becomes free while spamming DNS 2304 bit q a = 5088 bits (example attack)‏ DNS 5088 bits x 100 = 508 kbits / -address evaluation Without consuming additional attacker's resources, each recipient evaluation could generate 508 kbits of DNS traffic targeting a victim domain not contained within the message Message evaluations might occur 1-3 times per inbound system or MUA and may involve hundreds of recipients

Copyright Trend Micro Inc. 6 Estimating SPF related DDoS Potentials Each second: –An SMTP session is blocked per 16,400 mailboxes –A message is tagged per 7,040 mailboxes –A message is not tagged per 27,400 mailboxes Millions of compromised systems send > 70% of spam > 80% of is spam 230 kbit/sec In & 278 kbit/sec Out per example SPF attack script 100k Bot campaign at a msg rate of one per minute and just 2 SPF ops/msg sent to an average of 10 recipients, delivers spam, and will reflect an attack at 8 Gb/s In and 10 Gb/s Out The attack is virtually free to the bad actors The victim may have had nothing to do with SPF or even Congestion avoidance is circumvented in SPF libraries Millions of domains are added and deleted every day

Copyright Trend Micro Inc. 7 SPF/Sender-ID Deployment Increases Risk ~3% of domains with MX RR publish SPF Fortune 100 & Top 20 domains: –72% / 70% offer no SPF records – 6% / 10% SPF records fail Neutral –13% / 10% SPF records fail Softfail – 9% / 10% SPF records fail Fail Abusive sources: –77% offer no SPF records –0.2% SPF records Pass –14% SPF records offer Neutral results – 6% SPF records offer Softfail results –2.6% SPF records offer Fail results

Copyright Trend Micro Inc. 8 Hard to detect SPF enabled attacks Flood of DNS traffic from highly distributed sources Sources within otherwise well managed domains Queries may exhibit large random names for: –Wildcard SPF RRs –Wildcard MX RRs –Invalid address records Packet source/destination addresses are valid logs do not explain the high level of DNS traffic Traffic originates from DNS serving access points & MTAs Attack concurrent with legitimate DNS traffic Might also be concurrent with suspicious poisoning traffic Might also be concurrent with a high level of DNS timeouts

Copyright Trend Micro Inc. 9 Preventing SPF attacks Authenticate the client before evaluating message content Avoid processing scripts referenced from unknown clients If one must publish SPF for white-listing: –Publish just IP addresses –Terminate SPF scripts with '+all' to nullify advantage in using SPF script libraries When SPF/Sender-ID becomes widely deployed & exploited: –Establish AUPs that prohibit use of SPF script processing –Return 0 answers for records containing SPF scripts

Copyright Trend Micro Inc. 10 Providers Hiding their Role in Spam Sender-ID may require more than 400 DNS transactions to keep the SMTP client nameless (when IPv6 becomes common)‏ A safer approach: –Confirm SMTP client by the IP address –Associate the host-name (even an IP address literal) with originating domains within 1 small DNS transaction DKIM's unnecessary limitation on linking identities will force customers into giving provider's their private-keys or access to their DNS... Why? –Obscuring SMTP client domains avoids complaints –Spam is someone else's problem, never the one sending it –Customers are causing the problem, not us

Copyright Trend Micro Inc. 11 DKIM withThird-Party Authorization DKIM still allows message replay, but Sender-ID does not offer a good fix. DKIM also expects providers to have use of their customer's keys which also greatly increases risks. A solution: Allow third-party domains to authorize signing domain Provide a small single DNS lookup mechanism to associate originating domains with the signing domain (i.e. isp.com). isp.com as a sha1/base32 reference within example.com: hgssd3snmi6635j5743vdjhajkmpmfif._ssp.example.com.