Fast Flux Hosting and DNS ICANN SSAC
|
|
|
- Leona Sanders
- 10 years ago
- Views:
Transcription
1 Fast Flux Hosting and DNS ICANN SSAC
2 What is Fast Flux Hosting? An evasion technique Goal Avoid detection and take down of web sites used for illegal purposes Technique Host illegal content at many sites Rapidly change pointers (IP addresses) so that no one site is used long enough to isolate and shut down
3 Variations on a theme Basic fast flux hosting IP addresses of illegal web sites are fluxed Name Server (NS) fluxing IP addresses of DNS name servers are fluxed Double flux IP addresses of web sites and name servers are fluxed
4 Anatomy of an attack bot herder infects hosts, gathers herd into botnet Customer uses C&C to load zone file onto selected bots; flux host A records for boguswebsitesexample.tld have $TTL bot herder "leases" botnet to "customer" STEPS 5-7 repeat as TTLs expire Customer "acquires" phishing kit from malware author Via a registrar, customer registers nameserverservicenetwork.tld and boguswebsitesexample.tld Via a registrar, customer fluxes NS records for nameserverservicenetwork.tld to TLD zone file with $TTL 180 Customer uses botnet C&C channel to load bogus web site onto hosts identified in the zone file for boguswebsitesexample.tld 8 Customer spams phishing to lure victims to bogus web site
5 Mitigation Alternatives Shut down the bots (botnets) that host fast flux Shut down the fast flux hosts Remove domains used in fast flux hosting from service
6 Shut down the bots Bots number in the 100,000s or 1Ms Current mitigation techniques Anti-malware on desktops and at gateways Education and awareness Not close to stemming the tide Possible additional techniques include Process and executable white listing Network access/admission controls for private networks and public Internet service Inclusion of bot detection in unified threat management security
7 Shut down fast flux hosts Today, responders and law enforcement collect information (and obtain court orders) to shut down fast flux hosts Fast flux is designed to thwart these activities Fast flux hosts operate well beyond average illegal site lifetime of 4 days Possible additional measures Adopt procedures that accelerate the suspension of a domain name Improve information sharing among responders, CERTS, LEAs (will facilitate accelerated suspension procedures)
8 Remove domains used in fast flux hosting from service Practiced today (but not uniformly) Authenticate contacts before permitting changes to NS records Prevent automated changes to NS records Enforce a minimum TTL (e.g., 30 minutes) Implement or expand abuse monitoring systems to report excessive DNS configuration changes Enforce a Universal Terms of Service agreement that prohibits use of a registered domain and hosting services to abet illegal activities
9 Possible, additional measures Quarantine (and honeypot) domain names Rate-limit changes to name servers associated with a registered domain Separate "short TTL updates" from normal registration change processing Use suspended domains to educate consumers
10 Findings Fast flux hosting exploits domain name resolution and registration services to abet illegal activities Current methods to thwart fast flux hosting by detecting and dismantling botnets are not effective Fast flux hosting hampers current methods to detect and shut down illegal web sites Frequent modifications to NS records and short TTLs in NS A records in TLD zone files can be monitored to identify possible abuse Blocking automated changes to DNS info and enforcing a minimum TTL > 30 minutes are effective countermeasures but are not uniformly practiced
11 Recommendation SSAC encourages ICANN, registries and registrars to consider the practices mentioned in this Advisory, establish best practices to mitigate fast flux hosting consider incorporating such practices in future accreditation agreements.
12 Report on Domain Name Front Running ICANN SSAC
13 Background SSAC issued Domain Name Front Running Advisory (October 2007) Advisory offers preliminary findings: Some Internet users claim that parties associated with the domain name registration process participate in domain name front running (DNFR) No Internet user had presented sufficient information to support or disprove such claims Advisory called for community input
14 Disposition of Claims SSAC members reviewed each claim using information provided by claimant Registration records, domain history, current status of domain, DNS checks, and current use of domain name used to create chronology of registration related events Majority of claimants were contacted by for additional information Majority of claimants were informed of SSAC s interpretation of the chronology of events leading to the claim that front running occurred
15 Analysis and Classification of 120 Claims Unable to study (19%) Non-renewal (10%) Sought-after name (25%) Domain Tasted (37%) Typo-squatter (8%) DNFR (0%) No smoking gun SSAC identified alternate, plausible explanations for all of the claims
16 Noteworthy statistics Of the 120 domains studied 38% are live and host advertising 27% are registered using private/proxy services 15% were available at time SSAC studied the domain SSAC found that many of these were tasted and returned to the available pool 14% were available for purchase in after market Many of these domains host advertising One domain is locked (redemption grace period) 6% relate to a back-order process 2% appear to be candidates for UDRP
17 Observations (from the Report) 74% of front running claims can be attributed to domain tasting and secondary market activities The community does not understand the complexities of the domain registration process and the domain name marketplace Domain names believed to be of limited or exclusive interest are not as unique as claimants imagine. Competition for domain names containing commonly used or popular words, phrases and even surnames is intense Measurable interest in typo-squat and visually deceptive names (often to host PPC) Tasting of non-renewed domains is a problem for many Internet users Interest in tasting deleted names intensifies this problem
18 Conclusions SSAC cannot confirm any incident of DNFR based on community responses Nor can we disprove the possibility entirely Many internet users do not approve of domain name kiting, front running, hijacking, and tasting and conclude that the registration process is not trustworthy SSAC observes a deteriorating trust relationship between registrants and registrars Any agent who collects information about an Internet user s interest in a domain name and who discloses it in a public way violates a trust relationship This violation is exacerbated when agents put themselves or third parties in an advantageous market position with respect to acquiring that domain name at the expense of its client
19 Recommendations All parties should help educate registrants about the global market for domain names, the existence of after markets and how these affect registrants Eliminate the use of industry jargon wherever possible Registrars should Clearly state how they treat information Internet users submit when checking the availability of a domain name Seek to eliminate the apparent confusion over the nature and benefits of back ordering domain names Registrants should appreciate that Domain names are a speculated and sought-after commodity Availability checks may disclose an interest in a name Preparing in advance and registering a name at the time they perform an availability check is the surest course of action
SAC 025 SSAC Advisory on Fast Flux Hosting and DNS
Fast and Double Flux Attacks 1 SAC 025 SSAC Advisory on Fast Flux Hosting and DNS An Advisory from the ICANN Security and Stability Advisory Committee (SSAC) January 2008 Fast and Double Flux Attacks 2
ACCEPTABLE USE AND TAKEDOWN POLICY
ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words
.tirol Anti-Abuse Policy
Translation from German.tirol Anti-Abuse Policy This policy is based on Austrian legislation. In case of doubt the German version of this policy is in force. Page 1 Contents 1. Management Summary... 3
Acceptable Use Policy and Terms of Service
Acceptable Use Policy and Terms of Service Vox Populi Registry Ltd. 3-110 Governors Square 23 Lime Tree Bay Ave. Grand Cayman, Cayman Islands PO Box 1361, George Town, KY1-1108 www.nic.sucks Version 1.0
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name.
This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name. This Acceptable Use Policy forms part of the Registry Policies that apply to and
Policy Overview and Definitions
Overview The following policies, which govern the top level domain (TLD or Registry) indicated on Schedule A, are based on policies and best practices drawn from ICANN, WIPO, and other relevant sources,
Acceptable Use Policy
Introduction This Acceptable Use Policy (AUP) sets forth the terms and conditions for the use by a Registrant of any domain name registered in the top-level domain (TLD). This Acceptable Use Policy (AUP)
<.bloomberg> gtld Registration Policies
gtld Registration Policies General Statement... 2 Definitions... 2 String Requirements... 3 Reserved Names... 3 Name Collision... 3 Acceptable Use... 4 Reservation of Rights... 4 Rapid Takedown
SAC 049 SSAC Report on DNS Zone Risk Assessment and Management
SAC 049 SSAC Report on DNS Zone Risk Assessment and Management A Report from the ICANN Security and Stability Advisory Committee (SSAC) 03 June 2011 SAC049 1 Preface This is a Report of the Security and
Guidance for Preparing Domain Name Orders, Seizures & Takedowns
Guidance for Preparing Domain Name Orders, Seizures & Takedowns Abstract This thought paper offers guidance for anyone who prepares an order that seeks to seize or take down domain names. Its purpose is
Domain Name Registration Agreement
Domain Name Registration Agreement THIS AGREEMENT HAS A PROVISION FOR ARBITRATION OF DISPUTES BETWEEN THE PARTIES. This Services Agreement ("Agreement") sets forth the terms and conditions of your use
General Terms & Conditions for the Registration of.vg Domain Names April 14, 2014
General Terms & Conditions for the Registration of.vg Domain Names April 14, 2014 KSregistry GmbH (operating under the trade name Nic.VG) administers and operates the registry for internet Domain Names
Policy for the Registration of.hamburg Domain Names
Policy for the Registration of.hamburg Domain Names Hamburg Top-Level-Domain GmbH (subsequently called the "registry") is the registration office for domain names under the generic top level domain (gtld).hamburg.
SDNP.mw cctld DOMAIN REGISTRATION POLICY Ver 1.2 of 23 July 2015
SDNP.mw cctld DOMAIN REGISTRATION POLICY Ver 1.2 of 23 July 2015 Table of Contents 1. DEFNITIONS 2. PURPOSE AND SCOPE 3. ELIGIBILITY 4. CHOOSING A DOMAIN NAME TO REGISTER 5. SELECTING A REGISTRAR 6. REGISTERING
.BIO DOMAIN NAME POLICY v2.0 - Last Update: May 30, 2014. Starting Dot Ltd..BIO DOMAIN NAME POLICY - V1.0 - AS OF 30 MAY 2014 1
.BIO DOMAIN NAME POLICY v2.0 - Last Update: May 30, 2014 Starting Dot Ltd..BIO DOMAIN NAME POLICY - V1.0 - AS OF 30 MAY 2014 1 Background 1..bio (also designated as the ".BIO domain") is a generic Top-Level
.taipei Domain Registration Policy
.taipei Domain Registration Policy This Policy sets forth the rules concerning.taipei Top Level Domain Name registration in General Availability. Registration Agreement The agreement about the registration
Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN [email protected]
Measures to Protect (University) Domain Registrations and DNS Against Attacks Dave Piscitello, ICANN [email protected] Why are we talking about Domain names and DNS? Domain names and URLs define
Making Waves in the Phisher s Safest Harbor: Exposing the Dark Side of Subdomain Registries. An APWG Industry Advisory
Making Waves in the Phisher s Safest Harbor: Exposing the Dark Side of Subdomain Registries An APWG Industry Advisory Committed to Wiping Out Internet Scams and Fraud SUMMARY 3 WHAT IS A SUBDOMAIN REGISTRY?
.paris Registration Policy
.PARIS REGISTRATION POLICY 1.paris Registration Policy Contents 1. Acceptance of this Registration Policy 2. Registration of Your.paris domain name 2.1 Eligibility conditions 2.2 "First come, first served"
.paris Registration Policy
REGISTRY-REGISTRAR AGREEMENT Appendix 1.paris Registration Policy Contents 1. Acceptance of this Registration Policy 2. Registration of Your.paris domain name 2.1 Eligibility conditions 2.2 "First come,
Acceptable Use (Anti-Abuse) Policy
Acceptable Use (Anti-Abuse) Policy This document describes the Acceptable Use Policy for the Rightside registry. Copyright 2014 Rightside Registry Copyright 2014 Rightside Domains Europe Ltd. Rightside
Domain Registration/Domain Transfer/Domain Renewal Contract TERMS OF SERVICE
Domain Registration/Domain Transfer/Domain Renewal Contract TERMS OF SERVICE This contract is between Enter.Net, Inc., located at 815 N 12th Street, Allentown PA 18102, ("Enter.Net") and you, Enter.Net
.IBM TLD Registration Policy
I. Introduction These registration conditions govern the rights and obligations of the Registry Operator, International Business Machines Corporation ( Registry Operator or IBM ), and the accredited registrars,
NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314
NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2002 LETTER NO.: 02-CU-16 TO: All Federally-Insured Credit Unions SUBJ: Protection of Credit Union Internet Addresses
.hitachi Domain Name Registration Policies
.hitachi Domain Name Registration Policies (May 12, 2014) Contents Contents... 2 Definitions... 3 Introduction... 5 Launch Phases... 5 Chapter 1.Domain Name Registration and Allocation... 6 1.1.Purpose
Phishing Trends Report
Phishing Trends Report Analysis of Online Financial Fraud Threats Second Quarter, 2009 For more information, please contact: [email protected] 888.239.6932 www.internetidentity.com Internet Identity
ARTE TLD REGISTRATION POLICY
ARTE TLD REGISTRATION POLICY 1. ELIGIBILITY Only Association Relative à la Télévision Européenne G.E.I.E. (ARTE), its Affiliates or the Trademark Licensees could be eligible to register a Domain Name under
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12. CentralNic. Version 1.0. July 31, 2012. https://www.centralnic.
CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12 CentralNic Privacy Policy Version 1.0 July 31, 2012 https://www.centralnic.com/ CentralNic Privacy Policy Last Updated: February 6, 2012
14. Privacy Policies. 14.1. Introduction
14. Privacy Policies 14.1. Introduction 14.2. Policy Accent Media Ltd, incorporated in England, is the Registry Operator for the Top Level Domain TLD.tickets ( the Registry ). As a company registered in
This policy has been prepared to assist the reporting process and does not modify and/or amend our Terms of Service.
Abuse Policy (Domain Names) The intended purpose of this policy is to ensure that third parties understand what constitutes Abuse (specifically Domain Name related Abuse), as well as to provide information
Policies for.design TLD Launch, Registration, and Acceptable Use
Policies for.design TLD Launch, Registration, and Acceptable Use Jan. 22, 2015 Top Level Design LLC ( the Registry ) supports open, unrestricted Top Level Domains in the interest of the free flow of information
Law Enforcement Recommendations Regarding Amendments to the Registrar Accreditation Agreement
* 1) The RAA should not explicitly condone or encourage the use of 1. Use of Proxy or Privacy Registrations Proxy Registrations or Privacy Services, as it appears in paragraphs a. In the event ICANN establishes
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
.Brand TLD Designation Application
.Brand TLD Designation Application Internet Corporation for Assigned Names and Numbers ( ICANN ) 12025 Waterfront Drive, Suite 300 Los Angeles, California 90094 Attention: New gtld Program Staff RE: Application
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Code of Conduct Exemption Request Form
Code of Conduct Exemption Request Form Internet Corporation for Assigned Names and Numbers ( ICANN ) 12025 Waterfront Drive, Suite 300 Los Angeles, California 90094 Attention: New gtld Program Staff RE:
.swiss Registration Policy
.swiss/grp.swiss Registration Policy Edition 1: 01.08.2015 Entry into force: 01.09.2015 Contents 1 General... 3 1.1 Scope... 3 1.2 Abbreviations... 3 1.3 Definitions... 3 2 Acceptance of this registration
Expert Q&A on Brand Protection in the Expanded gtld Program
Expert Q&A on Brand Protection in the Expanded gtld Program Practical Law Intellectual Property & Technology An expert Q&A with Lisa W. Rosaya of Baker & McKenzie LLP on the expanded generic top level
Abused Internet Domain Registration Analysis for Calculating Risk and Mitigating Malicious Activity
2012 Abused Internet Domain Registration Analysis for Calculating Risk and Mitigating Malicious Activity KnujOn.com LLC Brief Version 2/18/2012 Promising Research KnujOn.com LLC is proud to release this
Registration Agreement
Registration Agreement In order to complete the registration process you must read and agree to be bound by all terms and conditions herein. TERMS AND CONDITIONS 1.Definitions "You" and "your" refers to
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Domain Name Registration Policies (Version 1.1 June 10, 2014)
Domain Name Registration Policies (Version 1.1 June 10, 2014) Contents Contents... 2 Definitions... 3 Introduction... 5 Purpose and Principles of the.tokyo TLD... 5 Launch Phases... 6 Chapter 1. The Sunrise
INFORMATION SECURITY REVIEW
INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,
PLAN FOR ENHANCING INTERNET SECURITY, STABILITY, AND RESILIENCY
PLAN FOR ENHANCING INTERNET SECURITY, STABILITY, AND RESILIENCY June 2009 Table of Contents Executive Summary... 1 ICANN s Role... 2 ICANN Security, Stability and Resiliency Programs... 3 Plans to Enhance
.SKI DOMAIN NAME POLICY. May 21, 2015. Starting Dot Ltd. .SKI DOMAIN NAME POLICY
.SKI DOMAIN NAME POLICY May 21, 2015 Starting Dot Ltd..SKI DOMAIN NAME POLICY 1 .SKI DOMAIN NAME POLICY BACKGROUND 1..SKI (the "TLD") is a generic top-level domain generally available for registration
Current counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol [email protected] April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing
THE BEST WAY TO CATCH A THIEF Patrick Bedwell, Vice President, Product Marketing AlienVault Vision Accelerating and simplifying threat detection and incident response for IT teams with limited resources,
Security Incidents And Trends In Croatia. Domagoj Klasić [email protected]
Security Incidents And Trends In Croatia Domagoj Klasić [email protected] Croatian National CERT About us Founded in 2008. in accordance with the Information Security Act We are a department of the Croatian
Email [email protected] Phone 847-467-5930 Fax 847-467-6000
Information Technology Information and Systems Security/Compliance Northwestern University 1800 Sherman Av Suite 209 Evanston, IL 60201 Email [email protected] Phone 847-467-5930 Fax 847-467-6000
Specifications for Registrars' Interaction with the Domain Registration System During Landrush and General Registration Periods
Фонд содействия развитию технологий и инфраструктуры Интернета Введено в действие: 24 сентября 2014 г. Foundation for Assistance for Internet Technologies and Infrastructure Development Specifications
THIRD-LEVEL DOMAIN NAMES REGISTRATION POLICY
Foundation for Assistance for Internet Technologies and Infrastructure Development Effective April 21, 2015 Version 1.0 THIRD-LEVEL DOMAIN NAMES REGISTRATION POLICY This Third-Level Domain Names Registration
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
Registration Agreement
Note: while Registrars may require Registrants to agree to certain Registrar-specific Terms & Conditions, the terms of the.london Registration Agreement set out below must be fully incorporated in any
IBM Security X-Force Threat Intelligence
IBM Security X-Force Threat Intelligence Use dynamic IBM X-Force data with IBM Security QRadar to detect the latest Internet threats Highlights Automatically feed IBM X-Force data into IBM QRadar Security
Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.
Cyber Security. Environment, Solutions and Case study. Special Telecommunications Service David Gabriel, Buciu Adrian Contact: [email protected] [email protected] Environment Network/services can be damaged
REGISTRATION AND SERVICES AGREEMENT. All capitalized terms shall have the meaning ascribed to them in this Section 1 or elsewhere in this Agreement.
REGISTRATION AND SERVICES AGREEMENT This Registration and Services Agreement (together with any Exhibits and Appendices hereto the Agreement ) is made and entered into by and between you or the entity
.HOMES Registration Policy. a. Registrant, "You" and "Your" refers to the individual or entity that applies for, or registers, a.homes domain name.
.HOMES Registration Policy This Registration Policy sets forth the terms and conditions that govern.homes domain name registrations. In this Registration Policy: a. Registrant, "You" and "Your" refers
Microsoft Security Response Center (MSRC) Microsoft Malware Protection Center (MMPC)
Security@Microsoft Trustworthy Computing (TwC) Programs supporting security outreach and engagement Microsoft Active Protections Program (MAPP), Government Security Program (GSP) (was SCP) Microsoft Security
1.3 By requesting us to register or manage a domain names or names on your behalf, you agree to:
SPECIAL TERMS AND CONDITIONS FOR DOMAIN NAME MANAGEMENT SERVICES (DOMAIN PORTFOLIO MANAGEMENT SERVICE, LOCAL PRESENCE SERVICES AND ANONYMOUS REGISTRATION SERVICES) 1. Services 1.1 These Special Terms and
Securing Your Business with DNS Servers That Protect Themselves
Product Summary: The Infoblox DNS security product portfolio mitigates attacks on DNS/DHCP servers by intelligently recognizing various attack types and dropping attack traffic while responding only to
1. The following terms and conditions apply to the domain registration Service: 1. You acknowledge and recognize that the domain name system and the
1. The following terms and conditions apply to the domain registration Service: 1. You acknowledge and recognize that the domain name system and the practice of registering and administering domain names
ENOM, INC. REGISTRATION AGREEMENT
ENOM, INC. REGISTRATION AGREEMENT This Registration Agreement ("Agreement") sets forth the terms and conditions of your use of enom, Inc.'s ("enom") domain name registration services to register an Internet
Allocation means the method by which a domain name is created and assigned to an Applicant, Allocated shall have a corresponding meaning.
1 Definitions ASCII means the American standard code for information interchange. Allocation means the method by which a domain name is created and assigned to an Applicant, Allocated shall have a corresponding
