Presentation is loading. Please wait.

Presentation is loading. Please wait.

DNS Cookies draft-eastlake-dnsext-cookies-00.txt

Similar presentations


Presentation on theme: "DNS Cookies draft-eastlake-dnsext-cookies-00.txt"— Presentation transcript:

1 DNS Cookies draft-eastlake-dnsext-cookies-00.txt
Donald E. Eastlake 3rd July 2006 IETF DNSEXT WG Cookies

2 DNS Cookies Provides weak authentication of queries and responses. Can be viewed as a weak version of TSIG. No protection against “on-path” attackers, that is, no protection against anyone who can see the plain text queries and responses. Requires no set-up or configuration. July 2006 IETF DNSEXT WG Cookies

3 DNS Cookies (cont.) Intended to greatly reduce
Forged source IP address traffic amplification DOS attacks. Forged source IP address recursive server work load DOS attacks. Forged source IP address reply cache poisoning attacks. July 2006 IETF DNSEXT WG Cookies

4 The COOKIE RR A Meta-RR in the Additional Information Section. RDATA:
Resolver Cookie, 64 bits Server Cookie, 64 bits Error Code July 2006 IETF DNSEXT WG Cookies

5 Resolver Warm Fuzzies If DNS Cookies Enforced
Resolver puts a COOKIE RR in queries with A Resolver Cookie that varies with server Truncated HMAC(server-IP-address, resolver secret) The resolver cached Server Cookie for that Cookie if it has one Resolver ignores all replies that do not have the correct Resolver Cookie Caches new Server Cookie and retries query if it gets a Bad Cookie error with a correct Resolver Cookie July 2006 IETF DNSEXT WG Cookies

6 Simplified Server Warm Fuzzies
If DNS Cookies Enforced Server puts a COOKIE RR in replies with A Server Cookie that varies with resolver Truncated HMAC(resolver-IP-address, server secret) The Resolver Cookie if there was one in the corresponding query If query received with bad or no Server Cookie, send back short error message July 2006 IETF DNSEXT WG Cookies

7 Example Resolver Server Query: RC:123, SC:???,E:0 RC:123
ErrReply: RC:123, SC:789, E:BadC SC:789 Query: RC:123, SC:789,E:0 RC:123 AnsReply: RC:123, SC:789,E:0 ForgedQuery: RC:???, SC:???,E:0 ErrReply: RC:???, SC:789, E:BadC ForgedReply: RC:???, SC:???,E:0 July 2006 IETF DNSEXT WG Cookies

8 Complexities Bad guy Resolver behind a NAT Anycast Servers
Can get Server Cookie and attack other resolvers behind the NAT Solution: Mix Resolver Cookie into Server Cookie hash so multiple resolvers that appear to be at the same IP address are distinguished Anycast Servers Need to use the same server secret or assure that queries from the same resolver usually go to the same server July 2006 IETF DNSEXT WG Cookies


Download ppt "DNS Cookies draft-eastlake-dnsext-cookies-00.txt"

Similar presentations


Ads by Google