Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

Slides:



Advertisements
Similar presentations
Decentralized User Authentication in a Global File System Max Meisterhans - Seminar in Distributed Computing WS 05/06.
Advertisements

DNS Transfers in DNSSEC world Olafur Gudmundsson Steve Crocker Shinkuro, Inc.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Measuring DNSSEC validation i.e. how to do it Ólafur Guðmundsson Steve Crocker ogud, steve at shinkuro.com.
DNS Security Overview AROC Guatemala July What’s the Problem? Until July of 2008 the majority of authoritative DNS servers worldwide were completely.
BGP Multiple Origin AS (MOAS) Conflict Analysis Xiaoliang Zhao, NCSU S. Felix Wu, UC Davis Allison Mankin, Dan Massey, USC/ISI Dan Pei, Lan Wang, Lixia.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Lecture 18 Page 1 CS 236 Online DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
Information-Centric Networks03c-1 Week 3 / Paper 3 The design and implementation of a next generation name service for the Internet –Venugopalan Ramasubramanian.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
A New Approach to DNS Security (DNSSEC) Author: Giuseppe Ateniese Stefan Mangard Presenter: Liu, Xiaotao.
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
1 SecSpider: Distributed DNSSEC Monitoring Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
Security and Information Assurance for the DNS Dan Massey USC/ISI.
1 Observations from the DNSSEC Deployment Dan Massey Colorado State University Joint work with Eric Osterweil and Lixia Zhang UCLA.
Impact of Configuration Errors on DNS Robustness Vasileios Pappas, Zhiguo Xu, Songwu Lu, Daniel Massey, Andreas Terzis, Lixia Zhang SIGCOMM 2004 Presented.
1 The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
DNS Security Extensions (DNSSEC) Ryan Dearing. Topics History What is DNS? DNS Stats Security DNSSEC DNSSEC Validation Deployment.
PKI To The Masses IPCCC 2004 Dan Massey USC/ISI. 1 March PKI Is Necessary l My PKI related actions since arriving at IPCCC n Used an.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Deploying DNSSEC in Windows Server 2012 Rob Kuehfus Program Manager Microsoft Corporation WSV325.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Josh Benaloh Brian LaMacchia Winter Side-Channel Attacks Breaking a cryptosystem is a frontal attack, but there may be easier access though a side.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Identity Management and DNS Services Tianyi XING.
1 DNSSEC at ESnet ESCC/Internet2 Joint Techs Workshop July 19, 2006 R. Kevin Oberman Network Engineer Lawrence Berkeley National Laboratory.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
IIT Indore © Neminath Hubballi
Geoff Huston APNIC Labs
Olaf M. Kolkman. Domain Pulse, February 2005, Vienna. DNSSEC Basics, Risks and Benefits Olaf M. Kolkman
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Security Through Publicity Eric Osterweil Dan Massey Batsukh Tsendjav Beichuan Zhang Lixia Zhang.
© Afilias Limitedwww.afilias.info SM Deploying DNSSEC Ram Mohan.
Olaf M. Kolkman. Apricot 2005, February 2005, Kyoto. DNSSEC An Update Olaf M. Kolkman
TODAY & TOMORROW DAY 2 - GROUP 5 PRESENTED BY: JAMES SPEIRS CHARLES HIGBY BRADY REDFEARN Domain Name System (DNS)
15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management.
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
BGPSEC Router Key Roll-over draft-rogaglia-sidr-bgpsec-rollover-00 Roque Gagliano Keyur Patel Brian Weis.
* Agenda  What is the DNS ?  Poisoning the cache  Short term solution  Long term solution.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
What if Everyone Did It? Geoff Huston APNIC Labs.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Building Trust with Anchors Eric Osterweil Dan Massey Lixia Zhang 1.
Lecture 18 Page 1 CS 236, Spring 2008 DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
1 Is an Internet PKI the Right Approach? Eric Osterweil Join work with: Dan Massey and Lixia Zhang.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Internet infrastructure 1. Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Security Issues with Domain Name Systems
DNS Security Advanced Network Security Peter Reiher August, 2014
DNS Security.
CS480 Cryptography and Information Security
Chapter 15 Key Management
DNS Cache Poisoning Attack
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS security.
A New Approach to DNS Security (DNSSEC)
NET 536 Network Security Lecture 8: DNS Security
NET 536 Network Security Lecture 6: DNS Security
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Presentation transcript:

Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

1 Outline What are DNS & DNSSEC Key Revocation Problem Threat Model ZSR Approach ZSR design Conclusion

2 DNS Global hierarchical namespaces (zones) ucla.edu is a zone www is a record Largest globally distributed database Too large for standard management approaches Zones use SOA serial numbers to indicate changes Nameservers serve zone data

3 Caching in DNS 10’s of millions of zones Caching needed to scale Caching resolvers are between clients and nameservers Caching resolvers walk DNS tree, not client machines 3 types of machines

4 Why DNSSEC? Caching is vulnerable Eve can insert her own answer if she responds first DNS has no way to know what data is authentic Clients will get values from their cache and believe them

5 DNSSEC DNSSEC is a PKI Public/private keys Parents vouch for children DNSKEY records Public keys Uses pre-generated signatures No “online signing” Signatures valid for definitive period (inception to expiration)

6 Problem DNS is one of the largest-scale systems The zones in DNS are all independently run This mandates a very simple protocol Coordination is very difficult DNS can tolerate slight misconfigurations and slow coordination DNSSEC has stricter requirements

7 Problem(2) Normally, to change keys one must transition Due to caching, zones must serve old and new keys What about an unplanned emergency? i.e. a private key has been compromised! Need a way to flush millions of remote caches

8 Example If Eve can create records and insert them, caching resolvers will use valid keys to “verify” her records.

9 Attack Vectors Spoofing attack Eve replies before the real nameserver does Poisoning attack Eve tricks caches into taking data ahead of time Man in the Middle (1) Eve intercepts traffic to a n of m nameservers Man in the Middle (2) Eve intercepts traffic to m of m nameservers

10 ZSR’s Approach Signature lifetimes are temporal But emergencies are unplanned Orthogonal to temporal lifetimes In ZSR, zones can override lifetimes ZSR can notify millions of caches to flush compromised records

11 ZSR Requirements Designed to be incrementally deployable ZSR must be able to perform 3 operations to be robust against Eve: 1. Prove a key is compromised 2. Revoke data 3. Notify resolvers of revocations

12 ZSR’s Mechanism ZSR augments signatures with lease periods Lease: uses zones’ state (serial number) + lease period Signatures are valid while zone’s serial number is less than a lease Leases are broken by increasing serial numbers ZSR introduces a highly-scalable cache update protocol into modern DNS

13 Proving Key Compromise After suspecting a zone state change, key revocation must be proven REVKEY is a self-certified revocation certificate of a DNSKEY

14 Revoking Data RRSIGs include current inception/expiration dates + zone lease Lease is serial # that invalidates sig Lease is current serial number + L 2 31 based on evaluation Inception Time: Expiration Time: Signature Body Inception Time: Expiration Time: Lease: Signature Body Lease:

15 Example Just changing the zone’s state breaks leases, automatically

16 Notifying Resolvers After data is cached zones may need to revoke Zones notify by embedding the serial number in every DNS response Once a zone has broken leases, all cached records are flushed

17 Example Any query to the zone allows caches to flush revoked signatures Even for different records

18 Evaluation DNSSEC data taken from From 2.5 million zones 50,000 were randomly chosen and monitored DNS data observed during May, 2006 Query patterns taken from North American University 821 unique stub-resolvers 117,540 DNS names 55,632 unique zones

19 Feasibility DNSSEC data shows vulnerability period is a significant concern Our evaluation shows overloading the SOA serial number is unlikely to impair its current usage Sample usage pattern shows ZSR can significantly reduce zone vulnerability

20 Conclusion Emergencies will happen Lack of a revocation mechanism is a serious liability in DNSSEC ZSR is a scalable protocol to flush revoked keys at Internet scales ZSR uses existing mechanisms and can be incrementally deployed

21 Thank You Questions?

22 Backup

23 Spoofing Eve can spoof data, but she needs: To get the DNS query sequence # Spoof src/dst IP/port info Be faster than the real nameserver And must (likely) be on the local subnet

24 Poisoning Eve can poison caches If a cache asks Eve’s zone for anything, it may store everything she responds with She can add data with her own zone’s datawww.target.sec

25 Man in the Middle (1) If Eve can intercept all traffic to some of target.sec’s nameservers She can snoop, reply to, drop, etc. However, this will not be true for traffic to other nameservers

26 Man in the Middle (2) Eve has the same capacity as in the Man in the Middle (1) vector, but for all nameservers This does not imply that Eve can intercept all Internet traffic for C

27 DNSSEC Signature Lifetimes DS records (secure delegation records) signature lifetimes Average days DNSKEY signature lifetimes days Average days Without ZSR, zones must (potentially) wait this long for caching effects

28 SOA Serial Number 80% of monitored zones did not change their serial number Of remaining 20%, the period was 13.5 hours 99.2% seem to mishandle serial numbers Incorrect padding leads to ± oscillations ZSR can choose 2 31 as its lease-breaking value and stand out

29 Zone Access Patterns Window of vulnerability defined by query patterns Without ZSR, vulnerability independent of attack ZSR reduces window But unpopular zones skew results Only queried once during sample period

30 Query-Based Performance Using query rates Zone is only vulnerable if users are querying for its data This figure shows the number of queries vulnerable to each type of attack