Download presentation
Presentation is loading. Please wait.
Published byJeffry Parks Modified over 9 years ago
1
江健, Tsinghua University 梁锦津, Tsinghua University 李康, University of Georgia 李军, University of Oregon 段海新, Tsinghua University 吴建平, Tsinghua University 19 th NDSS (February 2012)
2
Outline Introduction Background The DNS Name Revocation Vulnerability Experiments Possible Defense Approaches Response from Industries 2012/2/212A Seminar at Advanced Defense Lab
3
Introduction While primarily used for legitimate purposes, domain names have also been heavily leveraged by malicious activities Ex: botnet A major endeavour in stopping these malicious activities has thus been identifying and deleting malicious domain names. Ex: Waledac and Rustock 2012/2/21A Seminar at Advanced Defense Lab3
4
DNS Mechanism 2012/2/21A Seminar at Advanced Defense Lab4.com.phishing.com Recursive Resolver client Cache: NS of.phishing.com TTL: 86400 sec
5
Background DNS response 2012/2/21A Seminar at Advanced Defense Lab5 Question Section Answer Section Authority Section Additional Section DNS Delegation ;; ANSWER SECTION ;; AUTHORITY SECTION phishing.com. 86400 IN NS ns.phishing.com. ;; ADDITIONAL SECTION ns.phishing.com. 86400 IN A 10.0.0.1
6
DNS Cache Update Policy The bailiwick rule The credibility rule Ex: Trust levels in BIND 9.4.1 2012/2/21A Seminar at Advanced Defense Lab6
7
The DNS Name Revocation Vulnerability 2012/2/21A Seminar at Advanced Defense Lab7.com.phishing.com Recursive Resolver ;; AUTHORITY SECTION phishing.com. NS ns.phishing.com. TTL: 100 ;; AUTHORITY SECTION phishing.com. NS ns2.phishing.com. TTL: 200 OK!!
8
Ghost Domain Names 2012/2/21A Seminar at Advanced Defense Lab8.com.phishing.com Recursive Resolver ;; AUTHORITY SECTION phishing.com. NS ns.phishing.com. TTL: 100 ;; AUTHORITY SECTION phishing.com. NS ns2.phishing.com. TTL: 86400 Attacker
9
Experiments Vulnerability testing of popular DNS implementations 2012/2/21A Seminar at Advanced Defense Lab9 BIND9.8.0-P4 (CVE-2012-1033) DJB dnscache1.05 (CVE-2012-1191) Unbound 1.4.11 1.4.7 (CVE-2012-1192) PowerDNSRecursor 3.3 (CVE-2012-1193) MaraDNS Deadwood-3.0.03 Deadwood-2.3.05 Microsoft DNS Windows Server 2008 R2 Windows Server 2008 (CVE-2012-1194)
10
Experiments Vulnerability testing of public DNS servers 2012/2/21A Seminar at Advanced Defense Lab10 Google DNS Advantage OpenDNS Norton GTEI DNS
11
Measurement 19,045 open DNS resolvers 2012/2/21A Seminar at Advanced Defense Lab11
12
Measurement 2012/2/21A Seminar at Advanced Defense Lab12 TTL: 1800, 3600, 14400 Refresh rate: TTL/2, TTL/4, TTL/8
13
Results 2012/2/21A Seminar at Advanced Defense Lab13 70% 10%
14
Geographic View 2012/2/21A Seminar at Advanced Defense Lab14
15
Refresh Rate 2012/2/21A Seminar at Advanced Defense Lab15
16
Possible Defense Approaches Strengthening the bailiwick rule Accept authority records only from the parent ○ Ex: MaraDNS Refining the credibility rule Accept authority records from child on the first reply TTL constraints update the records EXCEPT TTL ○ Ex: Unbound 1.4.11 2012/2/21A Seminar at Advanced Defense Lab16
17
Response from Industries Some new CVE entries ISC (vendor of BIND) published an advisory for the vulnerability about Ghost Domain [link]link Security team of Microsoft has been aware of the problem, and a case has been created to track it 2012/2/21A Seminar at Advanced Defense Lab17
18
2012/2/21A Seminar at Advanced Defense Lab18
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.